schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-642q-2q68-9j3p
2023-01-10T00:52:48Z
2022-12-29T18:30:24Z
null
['CVE-2022-4849']
usememos/memos Cross-Site Request Forgery vulnerability
Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos 0.9.0 and prior.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4849'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/c9bb2b785dc5852655405d5c9ab127a2d5aa3948'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/404ce7dd-f345-4d98-ad80-c53ac74f4e5c'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T22:53:06Z', 'nvd_published_at': '2022-12-29T18:15:00Z'}
1.4.0
GHSA-p8j8-wxvp-h695
2023-01-06T23:07:38Z
2022-12-25T12:30:25Z
null
['CVE-2020-36629']
SimbCo httpster vulnerable to Path Traversal
A vulnerability classified as critical was found in SimbCo httpster. This vulnerability affects the function fs.realpathSync of the file src/server.coffee. The manipulation leads to path traversal. The exploit has been disclosed to the public and may be used. The name of the patch is d3055b3e30b40b65d30c5a06d6e053dffa7f35d0. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216748.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'httpster'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36629'}, {'type': 'WEB', 'url': 'https://github.com/SimbCo/httpster/pull/36'}, {'type': 'WEB', 'url': 'https://github.com/SimbCo/httpster/commit/d3055b3e30b40b65d30c5a06d6e053dffa7f35d0'}, {'type': 'PACKAGE', 'url': 'https://github.com/SimbCo/httpster'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.216748'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-06T23:07:38Z', 'nvd_published_at': '2022-12-25T11:15:00Z'}
1.4.0
GHSA-jwrv-x6rx-8vfm
2023-01-06T22:14:29Z
2022-12-25T12:30:25Z
null
['CVE-2020-36627']
Macaron i18n Open Redirect vulnerability
A vulnerability was found in Macaron i18n. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file i18n.go. The manipulation leads to open redirect. The attack can be launched remotely. Upgrading to version 0.5.0 can address this issue. The name of the patch is 329b0c4844cc16a5a253c011b55180598e707735. It is recommended to upgrade the affected component. The identifier VDB-216745 was assigned to this vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/go-macaron/i18n'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36627'}, {'type': 'WEB', 'url': 'https://github.com/go-macaron/i18n/commit/329b0c4844cc16a5a253c011b55180598e707735'}, {'type': 'PACKAGE', 'url': 'https://github.com/go-macaron/i18n'}, {'type': 'WEB', 'url': 'https://github.com/go-macaron/i18n/releases/tag/v0.5.0'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-1187'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.216745'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T17:19:29Z', 'nvd_published_at': '2022-12-25T11:15:00Z'}
1.4.0
GHSA-jpgg-cp2x-qrw3
2023-08-29T18:58:37Z
2022-12-28T00:30:23Z
null
['CVE-2021-4236']
ecnepsnai/web vulnerable to Uncontrolled Resource Consumption
Web Sockets do not execute any AuthenticateMethod methods which may be set, leading to a nil pointer dereference if the returned UserData pointer is assumed to be non-nil, or authentication bypass. This issue only affects WebSockets with an AuthenticateMethod hook. Request handlers that do not explicitly use WebSockets are not vulnerable.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ecnepsnai/web'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.5.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4236'}, {'type': 'WEB', 'url': 'https://github.com/ecnepsnai/web/commit/5a78f8d5c41ce60dcf9f61aaf47a7a8dc3e0002f'}, {'type': 'PACKAGE', 'url': 'https://github.com/ecnepsnai/web'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0107'}]
{'cwe_ids': ['CWE-400', 'CWE-476'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T18:54:08Z', 'nvd_published_at': '2022-12-27T22:15:00Z'}
1.4.0
GHSA-6mv3-wm7j-h4w5
2022-12-23T18:01:54Z
2022-12-22T20:03:43Z
null
['CVE-2022-46171']
Tauri Filesystem Scope Glob Pattern is too Permissive
### Impact The filesystem glob pattern wildcards `*`, `?`, and `[...]` match file path literals and leading dots by default, which unintentionally exposes sub folder content of allowed paths. Example: The `fs` scope `$HOME/*.key` would also allow `$HOME/.ssh/secret.key` to be read even though it is in a sub directory of `$HOME` and is inside a hidden folder. Scopes without the wildcards are not affected. As `**` allows for sub directories the behavior there is also as expected. ### Patches The issue has been patched in the latest release and was backported into the currently supported 1.x branches. ### Workarounds No workaround is known at the time of publication. ### References The original report contained information that the `dialog.open` component automatically allows one sub directory to be read, regardless of the `recursive` option. Imagine a file system looking like ``` o ../ o documents/ - file.txt - deeper/ o deep_file.txt ``` Reproduction steps: 1. Trying to load “file.txt” or “deep_file.txt” doesn’t work. Expected 2. Select “documents” as folder to open(ie. with window.__TAURI__.dialog.open) 3. Trying to load “file.txt” works. Expected 5. Trying to load “deep_file.txt” also works, which isn’t expected The recursive flag is used in https://github.com/tauri-apps/tauri/blob/cd8c074ae6592303d3f6844a4fb6d262eae913b2/core/tauri/src/scope/fs.rs#L154 to scope the filesystem access to either files in the folder or to also include sub directories. The original issue was replicated and further investigated. The root cause was triaged to the `glob` crate facilitating defaults, which allow the `*` and `[...]` to also match path literals. ```rust MatchOptions { case_sensitive: true, require_literal_separator: false, require_literal_leading_dot: false } ``` This implicated that not only the `dialog.open` component was affected but rather all `fs` scopes containing the `*` or `[...]` glob. During this investigation it became obvious that the current glob matches would also match hidden folder (e.g: `.ssh`) content by default, without explicitly allowing hidden folders to be matched. This is not commonly expected behavior in comparison to for example `bash`. The new default Match options are: ```rust MatchOptions { case_sensitive: true, require_literal_separator: true, require_literal_leading_dot: true } ``` > Another note security relevant for developers building applications interacting with case sensitive filesystems is, that the `case_sensitive` option only affects ASCII file paths and is not valid in Unicode based paths. This is considered a known risk until the `glob` crate supports non-ASCII file paths for this type of case sensitive matching. ### For more Information If you have any questions or comments about this advisory: Open an issue in tauri Email us at [security@tauri.app](mailto:security@tauri.app)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'tauri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.8'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'tauri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'tauri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.3'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'tauri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-alpha.0'}, {'fixed': '2.0.0-alpha.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/tauri-apps/tauri/security/advisories/GHSA-6mv3-wm7j-h4w5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46171'}, {'type': 'WEB', 'url': 'https://github.com/tauri-apps/tauri/commit/14d567f7ecb25a6d1024cf3d796f86aee89d0dd4'}, {'type': 'WEB', 'url': 'https://github.com/tauri-apps/tauri/commit/72389b00d7b495ffd7750eb1e75a3b8537d07cf3'}, {'type': 'WEB', 'url': 'https://github.com/tauri-apps/tauri/commit/f0602e7c294245ab6ef6fbf2a976ef398340ef58'}, {'type': 'PACKAGE', 'url': 'https://github.com/tauri-apps/tauri'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T20:03:43Z', 'nvd_published_at': '2022-12-23T14:15:00Z'}
1.4.0
GHSA-wcwm-c3mr-pxcr
2022-12-27T18:09:03Z
2022-12-20T06:30:36Z
null
['CVE-2022-25931']
easy-static-server vulnerable to Directory Traversal
All versions of package easy-static-server are vulnerable to Directory Traversal due to missing input sanitization and sandboxes being employed to the `req.url` user input that is passed to the server code.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'easy-static-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25931'}, {'type': 'WEB', 'url': 'https://gist.github.com/lirantal/fdfbe26561788c8194a54bf6d31772c9'}, {'type': 'PACKAGE', 'url': 'https://github.com/cunjieliu/easyServer'}, {'type': 'WEB', 'url': 'https://github.com/cunjieliu/easyServer/blob/master/index.js#23L27'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-EASYSTATICSERVER-3153539'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T17:38:01Z', 'nvd_published_at': '2022-12-20T05:15:00Z'}
1.4.0
GHSA-qwmp-2cf2-g9g6
2022-12-26T19:42:25Z
2022-12-23T00:30:23Z
null
['CVE-2022-40898']
pypa/wheel vulnerable to Regular Expression denial of service (ReDoS)
Python Packaging Authority (PyPA) Wheel is a reference implementation of the Python wheel packaging standard. Wheel 0.37.1 and earlier are vulnerable to a Regular Expression denial of service via attacker controlled input to the wheel cli. The vulnerable regex is used to verify the validity of Wheel file names. This has been patched in version 0.38.1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'wheel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.38.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.37.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40898'}, {'type': 'PACKAGE', 'url': 'https://github.com/pypa/wheel'}, {'type': 'WEB', 'url': 'https://github.com/pypa/wheel/blob/main/src/wheel/wheelfile.py#L18'}, {'type': 'WEB', 'url': 'https://pypi.org/project/wheel/'}, {'type': 'WEB', 'url': 'https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/'}, {'type': 'WEB', 'url': 'https://pyup.io/vulnerabilities/CVE-2022-40898/51499/'}]
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-26T19:42:25Z', 'nvd_published_at': '2022-12-23T00:15:00Z'}
1.4.0
GHSA-67fx-wx78-jx33
2023-08-30T18:38:16Z
2022-12-14T21:39:06Z
null
['CVE-2022-23526']
Helm vulnerable to denial of service through schema file
Fuzz testing, by Ada Logics and sponsored by the CNCF, identified input to functions in the `_chartutil_` package that can cause a segmentation violation. Applications that use functions from the `_chartutil_` package in the Helm SDK can have a Denial of Service attack when they use this package and it panics. ### Impact The `_chartutil_` package contains a parser that loads a JSON Schema validation file. For example, the Helm client when rendering a chart will validate its values with the schema file. The `_chartutil_` package parses the schema file and loads it into structures Go can work with. Some schema files can cause array data structures to be created causing a memory violation. Applications that use the `_chartutil_` package in the Helm SDK to parse a schema file can suffer a Denial of Service when that input causes a panic that cannot be recovered from. The Helm Client will panic with a schema file that causes a memory violation panic. Helm is not a long running service so the panic will not affect future uses of the Helm client. ### Patches This issue has been resolved in 3.10.3. ### Workarounds SDK users can validate schema files that are correctly formatted before passing them to the `_chartutil_` functions. ### For more information Helm's security policy is spelled out in detail in our [SECURITY](https://github.com/helm/community/blob/master/SECURITY.md) document. ### Credits Disclosed by Ada Logics in a fuzzing audit sponsored by CNCF.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'helm.sh/helm/v3'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.10.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/helm/helm/security/advisories/GHSA-67fx-wx78-jx33'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23526'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/commit/bafafa8bb1b571b61d7a9528da8d40c307dade3d'}, {'type': 'PACKAGE', 'url': 'https://github.com/helm/helm'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-1166'}]
{'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-14T21:39:06Z', 'nvd_published_at': '2022-12-15T19:15:00Z'}
1.4.0
GHSA-fx2c-96vj-985v
2023-01-13T17:18:24Z
2022-12-12T21:24:29Z
null
['CVE-2022-41881']
HAProxyMessageDecoder Stack Exhaustion DoS
### Impact A StackOverflowError can be raised when parsing a malformed crafted message due to an infinite recursion. ### Patches Users should upgrade to 4.1.86.Final. ### Workarounds There is no workaround, except using a custom HaProxyMessageDecoder. ### References When parsing a TLV with type = PP2_TYPE_SSL, the value can be again a TLV with type = PP2_TYPE_SSL and so on. The only limitation of the recursion is that the TLV length cannot be bigger than 0xffff because it is encoded in an unsigned short type. Providing a TLV with a nesting level that is large enough will lead to raising of a StackOverflowError. The StackOverflowError will be caught if HAProxyMessageDecoder is used as part of Netty’s ChannelPipeline, but using it directly without the ChannelPipeline will lead to a thrown exception / crash. ### For more information If you have any questions or comments about this advisory: * Open an issue in [netty](https://github.com/netty/netty)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.netty:netty-codec-haproxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.86.Final'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/netty/netty/security/advisories/GHSA-fx2c-96vj-985v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41881'}, {'type': 'PACKAGE', 'url': 'https://github.com/netty/netty'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/01/msg00008.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230113-0004/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5316'}]
{'cwe_ids': ['CWE-674'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T21:24:29Z', 'nvd_published_at': '2022-12-12T18:15:00Z'}
1.4.0
GHSA-3w37-5p3p-jv92
2023-09-07T14:48:39Z
2022-12-13T15:30:27Z
null
['CVE-2022-46363']
Apache CXF vulnerable to Exposure of Sensitive Information
A vulnerability in Apache CXF before versions 3.5.5 and 3.4.10 allows an attacker to perform a remote directory listing or code exfiltration. The vulnerability only applies when the CXFServlet is configured with both the static-resources-list and redirect-query-check attributes. These attributes are not supposed to be used together, and so the vulnerability can only arise if the CXF service is misconfigured.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5.0'}, {'fixed': '3.5.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46363'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/cxf'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/pdzo1qgyplf4y523tnnzrcm7hoco3l8c'}]
{'cwe_ids': ['CWE-20', 'CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T19:26:03Z', 'nvd_published_at': '2022-12-13T15:15:00Z'}
1.4.0
GHSA-468w-8x39-gj5v
2022-12-12T22:26:28Z
2022-12-08T16:11:12Z
null
['CVE-2022-46153']
Traefik routes exposed with an empty TLSOption
## Impact There is a potential vulnerability in Traefik managing the TLS connections. A router configured with a not well-formatted [TLSOption](https://doc.traefik.io/traefik/v2.9/https/tls/#tls-options) is exposed with an empty TLSOption. For instance, a route secured using an mTLS connection set with a wrong CA file is exposed without verifying the client certificates. ## Patches https://github.com/traefik/traefik/releases/tag/v2.9.6 ## Workarounds Check the logs to detect the following error messages and fix your TLS options: - Empty CA: ``` {"level":"error","msg":"invalid clientAuthType: RequireAndVerifyClientCert, CAFiles is required","routerName":"Router0@file"} ``` - Bad CA content (or bad path): ``` {"level":"error","msg":"invalid certificate(s) content","routerName":"Router0@file"} ``` - Unknown Client Auth Type: ``` {"level":"error","msg":"unknown client auth type \"FooClientAuthType\"","routerName":"Router0@file"} ``` - Invalid cipherSuites ``` {"level":"error","msg":"invalid CipherSuite: foobar","routerName":"Router0@file"} ``` - Invalid curvePreferences ``` {"level":"error","msg":"invalid CurveID in curvePreferences: foobar","routerName":"Router0@file"} ``` ## For more information If you have any questions or comments about this advisory, please [open an issue](https://github.com/traefik/traefik/issues).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/traefik/traefik/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/traefik/traefik/security/advisories/GHSA-468w-8x39-gj5v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46153'}, {'type': 'WEB', 'url': 'https://github.com/traefik/traefik/commit/7e3fe48b80083b41e9ff82a474a36484cabc701a'}, {'type': 'WEB', 'url': 'https://doc.traefik.io/traefik/v2.9/https/tls/#tls-options'}, {'type': 'PACKAGE', 'url': 'https://github.com/traefik/traefik'}, {'type': 'WEB', 'url': 'https://github.com/traefik/traefik/releases/tag/v2.9.6'}]
{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-08T16:11:12Z', 'nvd_published_at': '2022-12-08T22:15:00Z'}
1.4.0
GHSA-xxfx-w2rw-gh63
2022-12-14T14:06:08Z
2022-12-14T00:30:23Z
null
['CVE-2022-43996']
csaf-poc/csaf_distribution Cross-site Scripting vulnerability
The csaf_provider package before 0.8.2 allows XSS via a crafted CSAF document uploaded as text/html. The endpoint upload allows valid CSAF advisories (JSON format) to be uploaded with Content-Type text/html and filenames ending in .html. When subsequently accessed via web browser, these advisories are served and interpreted as HTML pages. Such uploaded advisories can contain JavaScript code that will execute within the browser context of users inspecting the advisory.
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/csaf-poc/csaf_distribution'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43996'}, {'type': 'WEB', 'url': 'https://github.com/csaf-poc/csaf_distribution/commit/17f22855ee8d4270dd17ff748c30ed7304846fdc'}, {'type': 'PACKAGE', 'url': 'https://github.com/csaf-poc/csaf_distribution'}, {'type': 'WEB', 'url': 'https://github.com/csaf-poc/csaf_distribution/releases/tag/v0.8.2'}, {'type': 'WEB', 'url': 'https://wid.cert-bund.de/.well-known/csaf/white/2022/bsi-2022-0003.json'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-14T14:06:08Z', 'nvd_published_at': '2022-12-13T22:15:00Z'}
1.4.0
GHSA-j34r-57xj-pfm5
2022-12-20T22:09:36Z
2022-12-15T21:30:26Z
null
['CVE-2022-4520']
WSO2 carbon-registry Cross-site Scripting vulnerability
A vulnerability was found in WSO2 carbon-registry up to 4.8.11. It has been rated as problematic. Affected by this issue is some unknown functionality of the file `components/registry/org.wso2.carbon.registry.search.ui/src/main/resources/web/search/advancedSearchForm-ajaxprocessor.jsp` of the component `Advanced Search`. The manipulation of the argument `mediaType/rightOp/leftOp/rightPropertyValue/leftPropertyValue` leads to cross site scripting. The attack may be launched remotely. Upgrading to version 4.8.12 can address this issue. The name of the patch is 0c827cc1b14b82d8eb86117ab2e43c34bb91ddb4. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-215900.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.wso2.carbon.registry:carbon-registry'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.8.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4520'}, {'type': 'WEB', 'url': 'https://github.com/wso2/carbon-registry/pull/404'}, {'type': 'WEB', 'url': 'https://github.com/wso2/carbon-registry/commit/0c827cc1b14b82d8eb86117ab2e43c34bb91ddb4'}, {'type': 'PACKAGE', 'url': 'https://github.com/wso2/carbon-registry'}, {'type': 'WEB', 'url': 'https://github.com/wso2/carbon-registry/releases/tag/v4.8.12'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.215900'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T22:09:36Z', 'nvd_published_at': '2022-12-15T21:15:00Z'}
1.4.0
GHSA-9895-g6x5-xwcp
2022-12-12T22:25:49Z
2022-12-06T21:30:46Z
null
['CVE-2022-4147']
Quarkus CORS filter allows simple GET and POST requests with an invalid Origin to proceed
Quarkus CORS filter allows simple GET and POST requests with invalid Origin to proceed. Simple GET or POST requests made with XMLHttpRequest are the ones which have no event listeners registered on the object returned by the XMLHttpRequest upload property and have no ReadableStream object used in the request.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.quarkus:quarkus-vertx-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.14.0.CR1'}, {'fixed': '2.14.2.Final'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.quarkus:quarkus-vertx-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.13.5.Final'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4147'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2022-4147'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2148867'}, {'type': 'PACKAGE', 'url': 'https://github.com/quarkusio/quarkus'}, {'type': 'WEB', 'url': 'https://quarkus.io/blog/quarkus-2-14-2-final-released/'}]
{'cwe_ids': ['CWE-285'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T22:25:38Z', 'nvd_published_at': '2022-12-06T19:15:00Z'}
1.4.0
GHSA-r7hg-2cpp-8wqq
2023-01-10T15:48:18Z
2022-12-29T18:30:24Z
null
['CVE-2022-4847']
usememos/memos has Incorrectly Specified Destination in a Communication Channel
Incorrectly Specified Destination in a Communication Channel in GitHub repository usememos/memos 0.9.0 and prior.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4847'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/c9bb2b785dc5852655405d5c9ab127a2d5aa3948'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ff6d4b5a-5e75-4a14-b5ce-f318f8613b73'}]
{'cwe_ids': ['CWE-941'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T22:52:48Z', 'nvd_published_at': '2022-12-29T18:15:00Z'}
1.4.0
GHSA-cmwm-45mj-mpg3
2022-12-16T21:57:53Z
2022-12-14T12:30:42Z
null
['CVE-2022-4493']
SCIFIO vulnerable to Path Traversal
A vulnerability classified as critical was found in scifio. Affected by this vulnerability is the function downloadAndUnpackResource of the file src/test/java/io/scif/util/DefaultSampleFilesService.java of the component ZIP File Handler. The manipulation leads to path traversal. The attack can be launched remotely. The patch is at commit fcb0dbca0ec72b22fe0c9ddc8abc9cb188a0ff31. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-215803.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.scif:scifio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.43.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4493'}, {'type': 'WEB', 'url': 'https://github.com/scifio/scifio/commit/fcb0dbca0ec72b22fe0c9ddc8abc9cb188a0ff31'}, {'type': 'PACKAGE', 'url': 'https://github.com/scifio/scifio'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.215803'}]
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-16T21:57:53Z', 'nvd_published_at': '2022-12-14T12:15:00Z'}
1.4.0
GHSA-33vh-7x8q-mg35
2023-01-02T16:24:43Z
2022-12-20T06:30:36Z
null
['CVE-2022-25904']
safe-eval vulnerable to Prototype Pollution
All versions of package safe-eval are vulnerable to Prototype Pollution which allows an attacker to add or modify properties of the Object.prototype.Consolidate when using the function safeEval. This is because the function uses vm variable, leading an attacker to modify properties of the Object.prototype.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'safe-eval'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25904'}, {'type': 'WEB', 'url': 'https://github.com/hacksparrow/safe-eval/issues/26'}, {'type': 'PACKAGE', 'url': 'https://github.com/hacksparrow/safe-eval'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-SAFEEVAL-3175701'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T17:38:42Z', 'nvd_published_at': '2022-12-20T05:15:00Z'}
1.4.0
GHSA-p782-4j23-xqcg
2022-12-20T15:47:22Z
2022-12-14T09:30:24Z
null
['CVE-2022-34271']
Apache Atlas: zip path traversal in import functionality
A vulnerability in import module of Apache Atlas allows an authenticated user to write to web server filesystem. This issue affects Apache Atlas versions from 0.8.4 to 2.2.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.atlas:apache-atlas'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8.4'}, {'fixed': '2.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34271'}, {'type': 'WEB', 'url': 'https://github.com/apache/atlas/commit/3415913d252597c24c6b5d19d315375a49e64152'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/atlas'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/ATLAS-4622'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/0rqvcxo6brmos9w3lzfsdn2lsmlblpw3'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-14T21:41:34Z', 'nvd_published_at': '2022-12-14T09:15:00Z'}
1.4.0
GHSA-3839-6r69-m497
2023-01-06T03:20:27Z
2022-12-28T00:30:23Z
null
['CVE-2021-4238']
GoUtils's randomly-generated alphanumeric strings contain significantly less entropy than expected
Randomly-generated alphanumeric strings contain significantly less entropy than expected. The `RandomAlphaNumeric` and `CryptoRandomAlphaNumeric` functions always return strings containing at least one digit from 0 to 9. This significantly reduces the amount of entropy in short strings generated by these functions.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/Masterminds/goutils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4238'}, {'type': 'WEB', 'url': 'https://github.com/Masterminds/goutils/commit/869801f20f9f1e7ecdbdb6422049d8241270d5e1'}, {'type': 'PACKAGE', 'url': 'https://github.com/Masterminds/goutils'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0411'}]
{'cwe_ids': ['CWE-331'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T18:53:53Z', 'nvd_published_at': '2022-12-27T22:15:00Z'}
1.4.0
GHSA-m688-cx2p-rgq9
2023-01-09T21:50:29Z
2022-12-29T09:30:19Z
null
['CVE-2018-25058']
Twitter-Post-Fetcher vulnerable to Use of Web Link to Untrusted Target with window.opener Access
A vulnerability classified as problematic has been found in Twitter-Post-Fetcher up to 17.x. This affects an unknown part of the file `js/twitterFetcher.js` of the component Link Target Handler. The manipulation leads to use of web link to untrusted target with window.opener access. It is possible to initiate the attack remotely. Upgrading to version 18.0.0 can address this issue. The name of the patch is 7d281c6fb5acbc29a2cad295262c1f0c19ca56f3. It is recommended to upgrade the affected component. The identifier VDB-217017 was assigned to this vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'twitter-fetcher-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '18.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25058'}, {'type': 'WEB', 'url': 'https://github.com/jasonmayes/Twitter-Post-Fetcher/pull/170'}, {'type': 'WEB', 'url': 'https://github.com/jasonmayes/Twitter-Post-Fetcher/commit/7d281c6fb5acbc29a2cad295262c1f0c19ca56f3'}, {'type': 'PACKAGE', 'url': 'https://github.com/jasonmayes/Twitter-Post-Fetcher'}, {'type': 'WEB', 'url': 'https://github.com/jasonmayes/Twitter-Post-Fetcher/releases/tag/18.0.0'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217017'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217017'}]
{'cwe_ids': ['CWE-1022'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T21:50:29Z', 'nvd_published_at': '2022-12-29T08:15:00Z'}
1.4.0
GHSA-hhxg-px5h-jc32
2023-01-09T21:58:58Z
2022-12-30T12:30:25Z
null
['CVE-2018-25060']
Macaron csrf missing encryption and has sensitive cookies in HTTP session without secure attribute
A vulnerability was found in Macaron csrf and classified as problematic. Affected by this issue is some unknown functionality of the file `csrf.go`. The manipulation of the argument Generate leads to sensitive cookie without secure attribute. The attack may be launched remotely. The name of the patch is dadd1711a617000b70e5e408a76531b73187031c. It is recommended to apply a patch to fix this issue. VDB-217058 is the identifier assigned to this vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/go-macaron/csrf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20180426211050-dadd1711a617'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25060'}, {'type': 'WEB', 'url': 'https://github.com/go-macaron/csrf/pull/7'}, {'type': 'WEB', 'url': 'https://github.com/go-macaron/csrf/commit/dadd1711a617000b70e5e408a76531b73187031c'}, {'type': 'PACKAGE', 'url': 'https://github.com/go-macaron/csrf'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-1213'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217058'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217058'}]
{'cwe_ids': ['CWE-311', 'CWE-614'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T21:58:58Z', 'nvd_published_at': '2022-12-30T12:15:00Z'}
1.4.0
GHSA-6gwx-gw56-qhf7
2023-01-10T16:02:13Z
2022-12-31T09:30:42Z
null
['CVE-2022-4867']
Froxlor vulnerable to Cross-Site Request Forgery
Cross-Site Request Forgery (CSRF) in GitHub repository froxlor/froxlor prior to 2.0.0-beta1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'froxlor/froxlor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-beta0'}, {'fixed': '2.0.0-beta1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4867'}, {'type': 'WEB', 'url': 'https://github.com/froxlor/froxlor/commit/f7f356e896173558248c43f4f68612f78e73a65d'}, {'type': 'PACKAGE', 'url': 'https://github.com/froxlor/froxlor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c91364dd-9ead-4bf3-96e6-663a017e08fa'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-04T15:18:22Z', 'nvd_published_at': '2022-12-31T09:15:00Z'}
1.4.0
GHSA-v279-v2xm-whq9
2022-12-27T22:03:13Z
2022-12-19T15:30:29Z
null
['CVE-2021-4260']
Oils JS vulnerable to Open Redirect
A vulnerability was found in oils-js. This vulnerability affects unknown code of the file core/Web.js. The manipulation leads to open redirect and the attack can be initiated remotely. The name of the patch is fad8fbae824a7d367dacb90d56cb02c5cb999d42. It is recommended to apply a patch to fix this issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'oils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4260'}, {'type': 'WEB', 'url': 'https://github.com/mannyvergel/oils-js/commit/fad8fbae824a7d367dacb90d56cb02c5cb999d42'}, {'type': 'PACKAGE', 'url': 'https://github.com/mannyvergel/oils-js'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.216268'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20211204010604/https://www.npmjs.com/package/oils'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-19T21:05:11Z', 'nvd_published_at': '2022-12-19T14:15:00Z'}
1.4.0
GHSA-ghw3-5qvm-3mqc
2022-12-22T19:59:58Z
2022-12-22T19:59:58Z
null
['CVE-2022-23556']
CodeIgniter4 allows spoofing of IP address when using proxy
### Impact This vulnerability may allow attackers to spoof their IP address when your server is behind a reverse proxy. ### Patches Upgrade to v4.2.11 or later, and configure `Config\App::$proxyIPs`. ### Workarounds Do not use `$request->getIPAddress()`. ### References - https://codeigniter4.github.io/userguide/incoming/request.html#CodeIgniter\HTTP\Request::getIPAddress ### For more information If you have any questions or comments about this advisory: * Open an issue in [codeigniter4/CodeIgniter4](https://github.com/codeigniter4/CodeIgniter4/issues) * Email us at [SECURITY.md](https://github.com/codeigniter4/CodeIgniter4/blob/develop/SECURITY.md)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'codeigniter4/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.11'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/codeigniter4/CodeIgniter4/security/advisories/GHSA-ghw3-5qvm-3mqc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23556'}, {'type': 'WEB', 'url': 'https://github.com/codeigniter4/CodeIgniter4/commit/5ca8c99b2db09a2a08a013836628028ddc984659'}, {'type': 'WEB', 'url': 'https://codeigniter4.github.io/userguide/incoming/request.html#CodeIgniter\\HTTP\\Request::getIPAddress'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/codeigniter4/framework/CVE-2022-23556.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/codeigniter4/CodeIgniter4'}]
{'cwe_ids': ['CWE-345'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T19:59:58Z', 'nvd_published_at': '2022-12-22T19:15:00Z'}
1.4.0
GHSA-w6qf-j4qr-f946
2023-01-10T16:02:57Z
2022-12-31T12:30:20Z
null
['CVE-2022-4868']
Froxlor Improper Authorization vulnerability
Improper Authorization in GitHub repository froxlor/froxlor prior to 2.0.0-beta1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'froxlor/froxlor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-beta0'}, {'fixed': '2.0.0-beta1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4868'}, {'type': 'WEB', 'url': 'https://github.com/froxlor/froxlor/commit/0527f22dc942483430f8449e25a096bb8d683a5d'}, {'type': 'PACKAGE', 'url': 'https://github.com/froxlor/froxlor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3a8f36ac-5eda-41e7-a9c4-e0f3d63e6e3b'}]
{'cwe_ids': ['CWE-285'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-04T15:18:06Z', 'nvd_published_at': '2022-12-31T10:15:00Z'}
1.4.0
GHSA-957m-g6rf-4c2m
2022-12-14T21:54:33Z
2022-12-12T15:30:31Z
null
['CVE-2022-45970']
Alist Cross-site Scripting vulnerability
Alist v3.5.1 is vulnerable to Cross Site Scripting (XSS) via the bulletin board.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/alist-org/alist/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.5.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45970'}, {'type': 'WEB', 'url': 'https://github.com/alist-org/alist/issues/2457'}, {'type': 'PACKAGE', 'url': 'https://github.com/alist-org/alist'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T22:49:04Z', 'nvd_published_at': '2022-12-12T14:15:00Z'}
1.4.0
GHSA-w9rv-xmf7-x3gh
2023-01-10T16:12:55Z
2022-12-30T12:30:25Z
null
['CVE-2022-44621']
Apache Kylin vulnerable to Command injection by Diagnosis Controller
Diagnosis Controller miss parameter validation, so user may attacked by command injection via HTTP Request.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin-server-base'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '4.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-44621'}, {'type': 'WEB', 'url': 'https://github.com/apache/kylin/pull/2011'}, {'type': 'WEB', 'url': 'https://github.com/apache/kylin/pull/2011/commits/418a63c61379d429312972fc94b87994e06b664f'}, {'type': 'WEB', 'url': 'https://github.com/apache/kylin/commit/fd2977e21c51f1afed668f2d9713cf562f2dc42d'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/kylin'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/7ctchj24dofgsj9g1rg1245cms9myb34'}]
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-03T12:34:35Z', 'nvd_published_at': '2022-12-30T11:15:00Z'}
1.4.0
GHSA-cq2g-pw6q-hf7j
2022-12-27T22:04:00Z
2022-12-19T21:09:05Z
null
['CVE-2022-23536']
Cortex's Alertmanager can expose local files content via specially crafted config
### Impact A local file inclusion vulnerability exists in Cortex versions v1.13.0, v1.13.1 and v1.14.0, where a malicious actor could remotely read local files as a result of parsing maliciously crafted Alertmanager configurations when submitted to the [Alertmanager Set Configuration API](https://cortexmetrics.io/docs/api/#set-alertmanager-configuration). Only users of the Cortex Alertmanager service using `-experimental.alertmanager.enable-api` or `enable_api: true` are affected. ### Patches Affected Cortex users are advised to upgrade to versions 1.13.2 or 1.14.1. ### Workarounds Patching is ultimately advised. Using out-of-bound validation, Cortex administrators may reject Alertmanager configurations containing the `api_key_file` setting in the `opsgenie_configs` section and `opsgenie_api_key_file` in the `global` section before sending to the [Set Alertmanager Configuration API](https://cortexmetrics.io/docs/api/#set-alertmanager-configuration) as a workaround. ### References - Fixed Versions: - https://github.com/cortexproject/cortex/releases/tag/v1.14.1 - https://github.com/cortexproject/cortex/releases/tag/v1.13.2 - https://cortexmetrics.io/docs/api/#set-alertmanager-configuration ### For more information If you have any questions or comments about this advisory: * Open an issue in [cortex](https://github.com/cortexproject/cortex/issues/new/choose) * Email us at [cortex-team@googlegroups.com](mailto:cortex-team@googlegroups.com).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cortexproject/cortex/pkg/alertmanager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.14.0'}, {'fixed': '1.14.1'}]}], 'versions': ['1.14.0']}, {'package': {'ecosystem': 'Go', 'name': 'github.com/cortexproject/cortex/pkg/alertmanager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.0'}, {'fixed': '1.13.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/cortexproject/cortex/security/advisories/GHSA-cq2g-pw6q-hf7j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23536'}, {'type': 'WEB', 'url': 'https://github.com/cortexproject/cortex/commit/03e023d8b012887b31cc268d0d011b01e1e65506'}, {'type': 'WEB', 'url': 'https://cortexmetrics.io/docs/api/#set-alertmanager-configuration'}, {'type': 'PACKAGE', 'url': 'https://github.com/cortexproject/cortex'}, {'type': 'WEB', 'url': 'https://github.com/cortexproject/cortex/releases/tag/v1.13.2'}, {'type': 'WEB', 'url': 'https://github.com/cortexproject/cortex/releases/tag/v1.14.1'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-1175'}]
{'cwe_ids': ['CWE-184', 'CWE-641', 'CWE-73'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-19T21:09:05Z', 'nvd_published_at': '2022-12-19T22:15:00Z'}
1.4.0
GHSA-cm9x-c3rh-7rc4
2022-12-29T01:49:47Z
2022-12-29T01:49:47Z
null
['CVE-2022-4318']
CRI-O vulnerable to /etc/passwd tampering resulting in Privilege Escalation
### Impact It is possible to craft an environment variable with newlines to add entries to a container's /etc/passwd. It is possible to circumvent admission validation of username/UID by adding such an entry. Note: because the pod author is in control of the container's /etc/passwd, this is not considered a new risk factor. However, this advisory is being opened for transparency and as a way of tracking fixes. ### Patches 1.26.0 will have the fix. More patches will be posted as they're available. ### Workarounds Additional security controls like SELinux should prevent any damage a container is able to do with root on the host. Using SELinux is recommended because this class of attack is already possible by manually editing the container's /etc/passwd ### References
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cri-o/cri-o'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.26.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/cri-o/cri-o/security/advisories/GHSA-cm9x-c3rh-7rc4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4318'}, {'type': 'WEB', 'url': 'https://github.com/cri-o/cri-o/pull/6450'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:1033'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:1503'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2022-4318'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2152703'}, {'type': 'PACKAGE', 'url': 'https://github.com/cri-o/cri-o'}]
{'cwe_ids': ['CWE-913'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-29T01:49:47Z', 'nvd_published_at': None}
1.4.0
GHSA-x2jx-w3wm-9p3p
2022-12-05T23:29:35Z
2022-12-05T06:30:22Z
null
['CVE-2022-41777']
nadesiko3 allows remote attacker to inject invalid value to decodeURIComponent of nako3edit
Nako3edit is the editor component of Nadeshiko 3, a programming language developed based on Japanese. Improper check or handling of exceptional conditions in Nako3edit v3.3.74 and earlier allows a remote attacker to inject an invalid value to decodeURIComponent of nako3edit, which may lead the server to crash.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'nadesiko3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.75'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41777'}, {'type': 'WEB', 'url': 'https://github.com/kujirahand/nadesiko3/issues/1325'}, {'type': 'WEB', 'url': 'https://github.com/kujirahand/nadesiko3/issues/1347'}, {'type': 'PACKAGE', 'url': 'https://github.com/kujirahand/nadesiko3'}, {'type': 'WEB', 'url': 'https://github.com/kujirahand/nadesiko3/releases/tag/3.3.75'}, {'type': 'WEB', 'url': 'https://jvn.jp/en/jp/JVN56968681/index.html'}]
{'cwe_ids': ['CWE-703', 'CWE-755'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-05T23:29:35Z', 'nvd_published_at': '2022-12-05T04:15:00Z'}
1.4.0
GHSA-qr97-v87p-x965
2023-01-09T21:51:34Z
2022-12-31T12:30:20Z
null
['CVE-2017-20157']
Ariadne Component Library vulnerable to Server-Side Request Forgery
A vulnerability was found in Ariadne Component Library up to 2.x. It has been classified as critical. Affected is an unknown function of the file src/url/Url.php. The manipulation leads to server-side request forgery. Upgrading to version 3.0 can address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217140.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'arc/web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-20157'}, {'type': 'WEB', 'url': 'https://github.com/Ariadne-CMS/arc-web/commit/1feb1cc11e6c9f218408f15f53f537ea0d788656'}, {'type': 'PACKAGE', 'url': 'https://github.com/Ariadne-CMS/arc-web'}, {'type': 'WEB', 'url': 'https://github.com/Ariadne-CMS/arc-web/releases/tag/3.0'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217140'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217140'}]
{'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T21:51:34Z', 'nvd_published_at': '2022-12-31T10:15:00Z'}
1.4.0
GHSA-3vqj-43w4-2q58
2023-04-14T17:02:26Z
2022-12-13T15:30:26Z
null
['CVE-2022-45688']
json stack overflow vulnerability
A stack overflow in the XML.toJSONObject component of hutool-json v5.8.10 and org.json:json before version 20230227 allows attackers to cause a Denial of Service (DoS) via crafted JSON or XML data.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'cn.hutool:hutool-json'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.8.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.json:json'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20230227'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45688'}, {'type': 'WEB', 'url': 'https://github.com/dromara/hutool/issues/2748'}, {'type': 'WEB', 'url': 'https://github.com/stleary/JSON-java/issues/708'}, {'type': 'WEB', 'url': 'https://github.com/stleary/JSON-java/commit/a6e412bded7a0ad605adfeca029318f184c32102'}]
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T19:25:03Z', 'nvd_published_at': '2022-12-13T15:15:00Z'}
1.4.0
GHSA-mgj2-q8wp-29rr
2022-12-13T17:06:07Z
2022-12-13T17:06:07Z
null
['CVE-2022-23502']
TYPO3 CMS vulnerable to Insufficient Session Expiration after Password Reset
### Problem When users reset their password using the corresponding password recovery functionality, existing sessions for that particular user account were not revoked. This applied to both frontend user sessions and backend user sessions. ### Solution Update to TYPO3 versions 10.4.33, 11.5.20, 12.1.1 that fix the problem described above. ### References * [TYPO3-CORE-SA-2022-014](https://typo3.org/security/advisory/typo3-core-sa-2022-014)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.33'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.5.20'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0.0'}, {'fixed': '12.1.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.33'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.5.20'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0.0'}, {'fixed': '12.1.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-mgj2-q8wp-29rr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23502'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/commit/d9ffbf24fcc62068033ebb3912538347bd380a6c'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2022-23502.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2022-23502.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3/typo3'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2022-014'}]
{'cwe_ids': ['CWE-613'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T17:06:07Z', 'nvd_published_at': '2022-12-14T08:15:00Z'}
1.4.0
GHSA-m5pr-wm6q-x4g2
2023-01-10T15:44:18Z
2022-12-28T15:30:46Z
null
['CVE-2022-4812']
usememos/memos vulnerable to Comparison of Object References Instead of Object Contents
Comparison of Object References Instead of Object Contents in GitHub repository usememos/memos 0.9.0 and prior.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4812'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/33924891-5c36-4b46-b417-98eaab688c4c'}]
{'cwe_ids': ['CWE-595', 'CWE-639'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T22:11:56Z', 'nvd_published_at': '2022-12-28T14:15:00Z'}
1.4.0
GHSA-97g8-xfvw-q4hg
2023-09-20T22:30:19Z
2022-12-13T19:44:33Z
null
['CVE-2022-3916']
Keycloak vulnerable to session takeover with OIDC offline refreshtokens
An issue was discovered in Keycloak when using a client with the `offline_access` scope. Reuse of session ids across root and user authentication sessions and a lack of root session validation enabled attackers to resolve a user session attached to a different previously authenticated user. This issue most affects users of shared computers. Suppose a user logs out of their account (without clearing their cookies) in a mobile app or similar client that includes the `offline_access` scope, and another user authenticates to the application. In that case, it will share the same root session id, and when utilizing the refresh token, they will be issued a token for the original user.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20.0.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 19.0.2'}}]
[{'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/security/advisories/GHSA-97g8-xfvw-q4hg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3916'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2022:8961'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2022:8962'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2022:8963'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2022:8964'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2022:8965'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:1043'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:1044'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:1045'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:1047'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:1049'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2022-3916'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2141404'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}]
{'cwe_ids': ['CWE-287', 'CWE-304', 'CWE-488', 'CWE-613'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T19:44:33Z', 'nvd_published_at': None}
1.4.0
GHSA-qf9q-3wwx-8qjv
2023-01-10T15:43:21Z
2022-12-28T15:30:46Z
null
['CVE-2022-4810']
usememos/memos Improper Access Control vulnerability
In usememos/memos 0.9.0 and prior, a user can view any content from private memos from other users via the API.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4810'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/f0c8d778-db86-4ed3-85bb-5315ab56915e'}]
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T22:11:35Z', 'nvd_published_at': '2022-12-28T14:15:00Z'}
1.4.0
GHSA-rp2v-v467-q9vq
2022-12-15T21:59:36Z
2022-12-02T22:25:25Z
null
['CVE-2022-23531']
GuardDog vulnerable to arbitrary file write when scanning a specially-crafted PyPI package
### Impact Running GuardDog against a specially-crafted package can allow an attacker to write an arbitrary file on the machine where GuardDog is executed. This is due to a path traversal vulnerability when extracting the `.tar.gz` file of the package being scanned, which exists by design in the `tarfile.TarFile.extractall` function. See also https://docs.python.org/3/library/tarfile.html#tarfile.TarFile.extractall ### Remediation Upgrade to GuardDog v0.1.5 or more recent. ### References * https://semgrep.dev/r?q=trailofbits.python.tarfile-extractall-traversal.tarfile-extractall-traversal * https://www.trellix.com/en-us/about/newsroom/stories/research/tarfile-exploiting-the-world.html * https://docs.python.org/3/library/tarfile.html#tarfile.TarFile.extractall
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'guarddog'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/DataDog/guarddog/security/advisories/GHSA-rp2v-v467-q9vq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23531'}, {'type': 'WEB', 'url': 'https://github.com/DataDog/guarddog/pull/89/commits/a56aff58264cb6b7855d71b00dc10c39a5dbd306'}, {'type': 'PACKAGE', 'url': 'https://github.com/DataDog/guarddog'}, {'type': 'WEB', 'url': 'https://github.com/DataDog/guarddog/releases/tag/v0.1.5'}]
{'cwe_ids': ['CWE-22', 'CWE-23'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T22:25:25Z', 'nvd_published_at': '2022-12-17T00:15:00Z'}
1.4.0
GHSA-ghx2-6v4g-9wmm
2023-01-10T15:45:19Z
2022-12-28T15:30:45Z
null
['CVE-2022-4796']
usememos/memos makes Incorrect Use of Privileged APIs
In usememos/memos 0.9.0 and prior, a user with login permission can delete all notes of the whole application via `API DELETE https://demo.usememos.com/api/memo/$idnote`. The vulnerability will lose all user notes data throughout the system, causing damage to user data.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4796'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/efe8001b-1d6a-41af-a64c-736705cc66a6'}]
{'cwe_ids': ['CWE-648'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T19:48:54Z', 'nvd_published_at': '2022-12-28T14:15:00Z'}
1.4.0
GHSA-f5c5-hmw9-v8hx
2023-08-30T11:48:44Z
2022-12-28T00:30:23Z
null
['CVE-2020-36561']
Unzip vulnerable to path traversal
Due to improper path sanitization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/yi-ge/unzip'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3-0.20200308084313-2adbaa4891b9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36561'}, {'type': 'WEB', 'url': 'https://github.com/yi-ge/unzip/pull/1'}, {'type': 'WEB', 'url': 'https://github.com/yi-ge/unzip/commit/2adbaa4891b9690853ef10216189189f5ad7dc73'}, {'type': 'PACKAGE', 'url': 'https://github.com/yi-ge/unzip'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0035'}, {'type': 'WEB', 'url': 'https://snyk.io/research/zip-slip-vulnerability'}]
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T19:07:02Z', 'nvd_published_at': '2022-12-27T22:15:00Z'}
1.4.0
GHSA-6rx9-889q-vv2r
2022-12-20T19:06:38Z
2022-12-14T21:36:56Z
null
['CVE-2022-23524']
Helm vulnerable to denial of service through string value parsing
Fuzz testing, by Ada Logics and sponsored by the CNCF, identified input to functions in the _strvals_ package that can cause a stack overflow. In Go, a stack overflow cannot be recovered from. Applications that use functions from the _strvals_ package in the Helm SDK can have a Denial of Service attack when they use this package and it panics. ### Impact The _strvals_ package contains a parser that turns strings into Go structures. For example, the Helm client has command line flags like `--set`, `--set-string`, and others that enable the user to pass in strings that are merged into the values. The _strvals_ package converts these strings into structures Go can work with. Some string inputs can cause array data structures to be created causing a stack overflow. Applications that use the _strvals_ package in the Helm SDK to parse user supplied input can suffer a Denial of Service when that input causes a panic that cannot be recovered from. The Helm Client will panic with input to `--set`, `--set-string`, and other value setting flags that causes a stack overflow. Helm is not a long running service so the panic will not affect future uses of the Helm client. ### Patches This issue has been resolved in 3.10.3. ### Workarounds SDK users can validate strings supplied by users won't create large arrays causing significant memory usage before passing them to the _strvals_ functions. ### For more information Helm's security policy is spelled out in detail in our [SECURITY](https://github.com/helm/community/blob/master/SECURITY.md) document. ### Credits Disclosed by Ada Logics in a fuzzing audit sponsored by CNCF.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'helm.sh/helm/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.10.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.10.2'}}]
[{'type': 'WEB', 'url': 'https://github.com/helm/helm/security/advisories/GHSA-6rx9-889q-vv2r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23524'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/commit/3636f6824757ff734cb265b8770efe48c1fb3737'}, {'type': 'PACKAGE', 'url': 'https://github.com/helm/helm'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-1167'}]
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-14T21:36:56Z', 'nvd_published_at': '2022-12-15T19:15:00Z'}
1.4.0
GHSA-qrrf-xvcf-p64q
2023-01-10T15:45:39Z
2022-12-28T15:30:45Z
null
['CVE-2022-4797']
usememos/memos vulnerable Improper Restriction of Excessive Authentication Attempts
In usememos/memos 0.9.0 and prior, an attacker can delete other users' posts via post id, which can be done via brute force.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4797'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/5233f76f-016b-4c65-b019-2c5d27802a1b'}]
{'cwe_ids': ['CWE-307'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T19:53:10Z', 'nvd_published_at': '2022-12-28T14:15:00Z'}
1.4.0
GHSA-jv85-mqxj-3f9j
2022-12-12T21:27:09Z
2022-12-12T21:27:09Z
null
['CVE-2022-23485']
Sentry vulnerable to invite code reuse via cookie manipulation
With a known valid invite link (i.e. not already accepted or expired) an unauthenticated attacker can manipulate the cookie to allow the same invite link to be reused on multiple accounts when joining an organization. ### Impact An attacker with a valid invite link can create multiple users and join the organization from which the invite link was generated. ### Patches This issue was patched in version 22.11.0. ### Workarounds Sentry SaaS customers do not need to take action. Self-hosted Sentry installs can disable the invite functionality until they are ready to deploy the patched version by editing their `sentry.conf.py` file (usually located at `~/.sentry/`). 1. Add the following line into `sentry.conf.py`: ```python SENTRY_FEATURES["organizations:invite-members"] = False ``` 2. Restart the Sentry web service. ``` docker compose restart web ``` ### For more information If you have any questions or comments about this advisory: * [Visit our FAQs on this CVE](https://help.sentry.io/account/security/cve-2022-23485-faqs/) * Open an issue in [getsentry/sentry](http://github.com/getsentry/sentry) * Email us at security[@]sentry.io
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'sentry'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '20.6.0'}, {'fixed': '22.11.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/getsentry/sentry/security/advisories/GHSA-jv85-mqxj-3f9j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23485'}, {'type': 'WEB', 'url': 'https://github.com/getsentry/sentry/commit/565f971da955d57c754a47f5802fe9f9f7c66b39'}, {'type': 'PACKAGE', 'url': 'https://github.com/getsentry/sentry'}]
{'cwe_ids': ['CWE-269', 'CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T21:27:09Z', 'nvd_published_at': '2022-12-10T01:15:00Z'}
1.4.0
GHSA-m3q4-7qmj-657m
2022-12-20T19:33:27Z
2022-12-20T19:33:27Z
null
['CVE-2022-23542']
OpenFGA Authorization Bypass
### Overview During our internal security assessment, it was discovered that OpenFGA versions v0.3.0 is vulnerable to authorization bypass under certain conditions. ### Am I Affected? You are affected by this vulnerability if **all** of the following applies: 1. You are using OpenFGA v0.3.0 2. You created a model using modeling language v1.1 that applies a type restriction to an object e.g. `define viewer: [user]` 3. You created tuples based on the aforementioned model, e.g. `document:1#viewer@user:jon` 4. You updated the previous model by adding a new type and replacing the previous restriction with the newly added type e.g. `define viewer: [employee]` 5. You use the tuples created against the first model (step 3) and issue checks against the updated model e.g. `user=user:jon, relation=viewer, object:document:1` ### How to fix that? Upgrade to version v0.3.1 ### Backward Compatibility This update is backward compatible.
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/openfga/openfga'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.0'}, {'fixed': '0.3.1'}]}], 'versions': ['0.3.0']}]
[{'type': 'WEB', 'url': 'https://github.com/openfga/openfga/security/advisories/GHSA-m3q4-7qmj-657m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23542'}, {'type': 'WEB', 'url': 'https://github.com/openfga/openfga/pull/422'}, {'type': 'PACKAGE', 'url': 'https://github.com/openfga/openfga'}, {'type': 'WEB', 'url': 'https://github.com/openfga/openfga/releases/tag/v0.3.1'}]
{'cwe_ids': ['CWE-285'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T19:33:27Z', 'nvd_published_at': '2022-12-20T21:15:00Z'}
1.4.0
GHSA-5jqp-wmhj-g33f
2023-01-10T00:52:28Z
2022-12-29T18:30:24Z
null
['CVE-2022-4844']
usememos/memos Cross-Site Request Forgery vulnerability
Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos 0.9.0 and prior.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4844'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/c9bb2b785dc5852655405d5c9ab127a2d5aa3948'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8e8df1f4-07ab-4b75-aec8-75b1229e93a3'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T22:52:57Z', 'nvd_published_at': '2022-12-29T18:15:00Z'}
1.4.0
GHSA-hw46-vg6w-88fj
2022-12-20T19:06:15Z
2022-12-15T21:30:28Z
null
['CVE-2021-33420']
replicator vulnerable to Deserialization of Untrusted Data
A deserialization issue discovered in inikulin replicator before 1.0.4 allows remote attackers to run arbitrary code via the fromSerializable function in TypedArray object.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'replicator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33420'}, {'type': 'WEB', 'url': 'https://github.com/inikulin/replicator/issues/16'}, {'type': 'WEB', 'url': 'https://github.com/inikulin/replicator/pull/17'}, {'type': 'WEB', 'url': 'https://github.com/inikulin/replicator/commit/2c626242fb4a118855262c64b5731b2ce98e521b'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2021-4787'}, {'type': 'PACKAGE', 'url': 'https://github.com/inikulin/replicator'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T23:31:51Z', 'nvd_published_at': '2022-12-15T19:15:00Z'}
1.4.0
GHSA-gfj4-wg89-m22r
2023-01-10T15:42:51Z
2022-12-28T15:30:46Z
null
['CVE-2022-4807']
usememos/memos Improper Access Control vulnerability
In usememos/memos 0.9.0 and prior, users can edit and delete all other users' shortcuts.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4807'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/704c9ed7-2120-47ea-aaf0-5fdcbd492954'}]
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T22:09:27Z', 'nvd_published_at': '2022-12-28T14:15:00Z'}
1.4.0
GHSA-gw62-c7w4-x449
2022-12-30T00:58:42Z
2022-12-21T21:30:15Z
null
['CVE-2021-4272']
studygolang vulnerable to cross-site scripting
A vulnerability classified as problematic has been found in studygolang. This affects an unknown part of the file static/js/topics.js. The manipulation of the argument contentHtml leads to cross site scripting. It is possible to initiate the attack remotely. The name of the patch is 0fb30f9640bd5fa0cae58922eac6c00bb1a94391. It is recommended to apply a patch to fix this issue. The identifier VDB-216477 was assigned to this vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/studygolang/studygolang'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4272'}, {'type': 'WEB', 'url': 'https://github.com/studygolang/studygolang/commit/0fb30f9640bd5fa0cae58922eac6c00bb1a94391'}, {'type': 'PACKAGE', 'url': 'https://github.com/studygolang/studygolang'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.216477'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T00:58:42Z', 'nvd_published_at': '2022-12-21T19:15:00Z'}
1.4.0
GHSA-jvgw-gccv-q5p8
2023-07-14T21:53:44Z
2022-12-07T20:28:46Z
null
['CVE-2022-23486']
libp2p DoS vulnerability from lack of resource management
### Impact An attacker node can cause a victim node to allocate a large number of small memory chunks, which can ultimately lead to the victim’s process running out of memory and thus getting killed by its operating system. When executed continuously, this can lead to a denial of service attack, especially relevant on a larger scale when run against more than one node of a libp2p based network. ### Details In the original version of the attack, the malicious node would continuously open new streams on a single connection using a stream multiplexer that doesn’t provide sufficient back pressure (mplex or yamux). While allocations per stream might be considered small, they multiply with the number of streams and connections. It is easy to defend against this one attack, e.g. by setting a strict per connection stream limit and connection limit. But there are other variations of this attack, e.g. causing memory allocations by sending partial payloads on various protocol levels, forcing the victim to buffer the partial payload for a period of time or by tricking the victim into pre-allocating buffers for messages which are never sent by the attacker. ### Patches Users are advised to upgrade to `libp2p` `v0.45.1` or above. ### References Please see our DoS Mitigation page for more information on how to incorporate mitigation strategies, monitor your application, and respond to attacks: https://docs.libp2p.io/reference/dos-mitigation/. Please see the related disclosure for go-libp2p: https://github.com/libp2p/go-libp2p/security/advisories/GHSA-j7qp-mfxf-8xjw and js-libp2p: https://github.com/libp2p/js-libp2p/security/advisories/GHSA-f44q-634c-jvwv ### For more information If you have any questions or comments about this advisory, please email us at security@libp2p.io.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'libp2p'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.45.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.45.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/libp2p/go-libp2p/security/advisories/GHSA-j7qp-mfxf-8xjw'}, {'type': 'WEB', 'url': 'https://github.com/libp2p/js-libp2p/security/advisories/GHSA-f44q-634c-jvwv'}, {'type': 'WEB', 'url': 'https://github.com/libp2p/rust-libp2p/security/advisories/GHSA-jvgw-gccv-q5p8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23486'}, {'type': 'PACKAGE', 'url': 'https://github.com/libp2p/rust-libp2p'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0084.html'}]
{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-07T20:28:46Z', 'nvd_published_at': '2022-12-07T21:15:00Z'}
1.4.0
GHSA-f8p3-q834-q9cj
2023-01-09T19:52:37Z
2022-12-26T09:30:26Z
null
['CVE-2021-30134']
php-mod/curl allows Cross-site Scripting
php-mod/curl (a wrapper of the PHP cURL extension) before 2.3.2 allows XSS via the `post_file_path_upload.php` key parameter and the POST data to `post_multidimensional.php`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'php-mod/curl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30134'}, {'type': 'WEB', 'url': 'https://github.com/php-mod/curl/commit/0bddefe8bbd292065f23dd6e24d2c745c4865cf7'}, {'type': 'PACKAGE', 'url': 'https://github.com/php-mod/curl'}, {'type': 'WEB', 'url': 'https://wpscan.com/vulnerability/0b547728-27d2-402e-ae17-90d539344ec7'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T19:52:37Z', 'nvd_published_at': '2022-12-26T07:15:00Z'}
1.4.0
GHSA-xr7p-8q82-878q
2022-12-06T15:36:15Z
2022-12-06T15:36:15Z
null
['CVE-2022-23466']
teler dashboard vulnerable to DOM-based cross-site scripting (XSS)
### Description teler prior to version <= 2.0.0-rc.4 is vulnerable to DOM-based cross-site scripting (XSS) in the teler dashboard. When teler requests messages from the event stream on the `/events` endpoint, the log data displayed on the dashboard are not sanitized. ### Impact This only affects authenticated users and can only be exploited based on detected threats if the log contains a DOM scripting payload. This indicates a low severity and there is no significant impact on the users. ### Affected Version This issue was introduced from version `v2.0.0-rc` to `v2.0.0-rc.3` & `v2.0.0-dev`. ### Patches This vulnerability has been fixed on version `v2.0.0-rc.4` & `v2.0.0-dev.2`. ### Workarounds Here are some workarounds to handle this case: - Deactivate the live event dashboard from the configuration file, or - Upgrade teler version to `v2.0.0-rc.4` or `v2.0.0-dev.2` & above. ### References - https://github.com/kitabisa/teler/commit/20f59eda2420ac64e29f199a61230a0abc875e8e
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'teler.app'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-rc'}, {'fixed': '2.0.0-rc.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.0-rc.3'}}, {'package': {'ecosystem': 'Go', 'name': 'teler.app'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-dev'}, {'fixed': '2.0.0-dev.2'}]}], 'versions': ['2.0.0-dev']}]
[{'type': 'WEB', 'url': 'https://github.com/kitabisa/teler/security/advisories/GHSA-xr7p-8q82-878q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23466'}, {'type': 'WEB', 'url': 'https://github.com/kitabisa/teler/commit/20f59eda2420ac64e29f199a61230a0abc875e8e'}, {'type': 'PACKAGE', 'url': 'https://github.com/kitabisa/teler'}]
{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T15:36:15Z', 'nvd_published_at': '2022-12-06T18:15:00Z'}
1.4.0
GHSA-c2v4-8r9g-g5xj
2023-01-09T08:20:53Z
2022-12-27T15:30:19Z
null
['CVE-2022-4695']
usememos/memos vulnerable to stored Cross-site Scripting
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4695'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/65cc19c12efa392f792f6bb154b4838547e0af5e'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/2559d548-b847-40fb-94d6-18c1ad58b789'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T18:02:37Z', 'nvd_published_at': '2022-12-27T15:15:00Z'}
1.4.0
GHSA-85fp-523q-5xwc
2022-12-29T16:59:42Z
2022-12-22T03:30:18Z
null
['CVE-2022-4646']
rdiffweb vulnerable to Cross-Site Request Forgery
rdiffweb prior to version 2.5.4 is vulnerable to Cross-Site Request Forgery (CSRF).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4646'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/e6f0d8002129be90fe82fa3e3ea0a6942caba398'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/17bc1b0f-1f5c-432f-88e4-c9866ccf6e10'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T20:01:59Z', 'nvd_published_at': '2022-12-22T02:15:00Z'}
1.4.0
GHSA-f83p-pg86-p922
2023-01-10T15:41:37Z
2022-12-28T15:30:45Z
null
['CVE-2022-4801']
usememos/memos has Insufficient Granularity of Access Control
usememos/memos 0.9.0 and prior allows an attacker to archive any user's public or private post.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4801'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b0795261-0f97-4f0b-be44-9dc079e01593'}]
{'cwe_ids': ['CWE-1220'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T19:57:52Z', 'nvd_published_at': '2022-12-28T14:15:00Z'}
1.4.0
GHSA-pppv-ch8p-rp2w
2022-12-27T17:55:21Z
2022-12-21T06:30:29Z
null
['CVE-2022-25895']
lite-dev-server vulnerable to Directory Traversal
All versions of package lite-dev-server are vulnerable to Directory Traversal due to missing input sanitization and sandboxes being employed to the `req.url` user input that is passed to the server code.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'lite-dev-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.2.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25895'}, {'type': 'WEB', 'url': 'https://gist.github.com/lirantal/0f8a48c3f5ac581ce73123abe9f7f120'}, {'type': 'PACKAGE', 'url': 'https://github.com/shadowwzw/lite-dev-server'}, {'type': 'WEB', 'url': 'https://github.com/shadowwzw/lite-dev-server/blob/master/src/server.js#23L134'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-LITEDEVSERVER-3153718'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T17:22:17Z', 'nvd_published_at': '2022-12-21T05:15:00Z'}
1.4.0
GHSA-r48c-4vfj-h426
2022-12-16T21:58:44Z
2022-12-14T15:30:16Z
null
['CVE-2022-4495']
collective.dms.basecontent Cross-site Scripting vulnerability
A vulnerability, which was classified as problematic, has been found in collective.dms.basecontent. This issue affects the function renderCell of the file src/collective/dms/basecontent/browser/column.py. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 1.7 or later will address this issue. The patch is at commit 6c4d616fcc771822a14ebae5e23f3f6d96d134bd. It is recommended to upgrade the affected component. The identifier VDB-215813 was assigned to this vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'collective.dms.basecontent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4495'}, {'type': 'WEB', 'url': 'https://github.com/collective/collective.dms.basecontent/commit/6c4d616fcc771822a14ebae5e23f3f6d96d134bd'}, {'type': 'PACKAGE', 'url': 'https://github.com/collective/collective.dms.basecontent'}, {'type': 'WEB', 'url': 'https://github.com/collective/collective.dms.basecontent/releases/tag/1.7'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.215813'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-16T21:58:44Z', 'nvd_published_at': '2022-12-14T15:15:00Z'}
1.4.0
GHSA-53c4-hhmh-vw5q
2023-08-30T18:40:46Z
2022-12-14T21:38:31Z
null
['CVE-2022-23525']
Helm vulnerable to denial of service through through repository index file
Fuzz testing, by Ada Logics and sponsored by the CNCF, identified input to functions in the `_repo_` package that can cause a segmentation violation. Applications that use functions from the `_repo_` package in the Helm SDK can have a Denial of Service attack when they use this package and it panics. ### Impact The `_repo_` package contains a handler that processes the index file of a repository. For example, the Helm client adds references to chart repositories where charts are managed. The `_repo_` package parses the index file of the repository and loads it into structures Go can work with. Some index files can cause array data structures to be created causing a memory violation. Applications that use the `_repo_` package in the Helm SDK to parse an index file can suffer a Denial of Service when that input causes a panic that cannot be recovered from. The Helm Client will panic with an index file that causes a memory violation panic. Helm is not a long running service so the panic will not affect future uses of the Helm client. ### Patches This issue has been resolved in 3.10.3. ### Workarounds SDK users can validate index files that are correctly formatted before passing them to the `_repo_` functions. ### For more information Helm's security policy is spelled out in detail in our [SECURITY](https://github.com/helm/community/blob/master/SECURITY.md) document. ### Credits Disclosed by Ada Logics in a fuzzing audit sponsored by CNCF.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'helm.sh/helm/v3'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.10.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/helm/helm/security/advisories/GHSA-53c4-hhmh-vw5q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23525'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/commit/638ebffbc2e445156f3978f02fd83d9af1e56f5b'}, {'type': 'PACKAGE', 'url': 'https://github.com/helm/helm'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-1165'}]
{'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-14T21:38:31Z', 'nvd_published_at': '2022-12-15T19:15:00Z'}
1.4.0
GHSA-cx45-565q-6qx8
2023-01-03T21:28:26Z
2022-12-19T18:19:11Z
null
['CVE-2022-42949']
SilverStripe Subsite weakens file permissions
The subsites module can weaken edit restrictions on some files and allow a malicious user to edit files they do not have edit rights to. This only affects projects with the subsites module installed. Regression testing should focus on custom file logic. Be advised that this is not a case of a user being able to edit a file in subsites they do not have access to. As a reminder, all separation of content achieved with the subsites module should be viewed as cosmetic and not appropriate for security-critical applications.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/subsites'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.6.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42949'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-subsites/commit/73f3d15bfb90ba779dd5498fcc5ae4ab292d6272'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/subsites/CVE-2022-42949.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/silverstripe/silverstripe-subsites'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/cve-2022-42949'}]
{'cwe_ids': ['CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-19T18:19:11Z', 'nvd_published_at': '2022-12-21T00:15:00Z'}
1.4.0
GHSA-pp3p-6jjh-rmg7
2023-01-10T15:42:32Z
2022-12-28T15:30:46Z
null
['CVE-2022-4806']
usememos/memos Improper Access Control vulnerability
An Improper Access Control vulnerability in usememos/memos 0.9.0 and prior can result in a user deleting others' public and private memos.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4806'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/2c7101bc-e6d8-4cd0-9003-bc8d86f4e4be'}]
{'cwe_ids': ['CWE-284', 'CWE-639'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T22:09:17Z', 'nvd_published_at': '2022-12-28T14:15:00Z'}
1.4.0
GHSA-9h6h-9g78-86f7
2022-12-29T01:50:20Z
2022-12-29T01:50:20Z
null
[]
Yapscan's report receiver server vulnerable to path traversal and log injection
### Impact If you make use of the **report receiver server** (experimental), a client may be able to forge requests such that arbitrary files on the host can be overwritten (subject to permissions of the yapscan server), leading to loss of data. This is particularly problematic if you do not authenticate clients and/or run the server with elevated permissions. ### Patches Vulnerable versions: - v0.18.0 - v0.19.0 (unreleased) This problem is patched in version v0.19.1 ### Workarounds Update to the newer version is highly encouraged! Measures to reduce the risk of this include authenticating clients (see `--client-ca` flag) and containerization of the yapscan server. ### References The tracking issue is #35. There you can find the commits, fixing the issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/fkie-cad/yapscan'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.18.0'}, {'fixed': '0.19.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/fkie-cad/yapscan/security/advisories/GHSA-9h6h-9g78-86f7'}, {'type': 'WEB', 'url': 'https://github.com/fkie-cad/yapscan/issues/35'}, {'type': 'WEB', 'url': 'https://github.com/fkie-cad/yapscan/commit/a75a20b50be673b96b1d42187b97f8cfe60728df'}, {'type': 'WEB', 'url': 'https://github.com/fkie-cad/yapscan/commit/fef9a33ceb66f6b929839f7eaf393b629681bc5d'}, {'type': 'PACKAGE', 'url': 'https://github.com/fkie-cad/yapscan'}, {'type': 'WEB', 'url': 'https://github.com/fkie-cad/yapscan/releases/tag/v0.19.1'}]
{'cwe_ids': ['CWE-117', 'CWE-22', 'CWE-73'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-29T01:50:20Z', 'nvd_published_at': None}
1.4.0
GHSA-jj8r-jw42-mw4w
2023-01-09T20:06:17Z
2022-12-28T00:30:22Z
null
['CVE-2022-4772']
Widoco Path Traversal vulnerability
A vulnerability was found in Widoco and classified as critical. Affected by this issue is the function `unZipIt` of the file `src/main/java/widoco/WidocoUtils.java`. The manipulation leads to path traversal. It is possible to launch the attack on the local host. The name of the patch is f2279b76827f32190adfa9bd5229b7d5a147fa92. It is recommended to apply a patch to fix this issue. VDB-216914 is the identifier assigned to this vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.github.dgarijo:Widoco'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.17'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4772'}, {'type': 'WEB', 'url': 'https://github.com/dgarijo/Widoco/pull/551'}, {'type': 'WEB', 'url': 'https://github.com/dgarijo/Widoco/commit/f2279b76827f32190adfa9bd5229b7d5a147fa92'}, {'type': 'PACKAGE', 'url': 'https://github.com/dgarijo/Widoco'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.216914'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.216914'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T20:06:17Z', 'nvd_published_at': '2022-12-27T23:15:00Z'}
1.4.0
GHSA-mhxg-2xf7-4xwx
2022-12-27T01:02:42Z
2022-12-19T12:30:23Z
null
['CVE-2022-47500']
Apache Helix UI vulnerable to Open Redirect
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Apache Software Foundation Apache Helix UI component.This issue affects Apache Helix all releases from 0.8.0 to and including 1.0.4. Solution: removed the the forward component since it was improper designed for UI embedding. User please upgrade to 1.1.0 to fix this issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.helix:helix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8.0'}, {'fixed': '1.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-47500'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/helix'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/lr74xtxxbb1t3dfn5qzzwl2xjr3qlbmh'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-19T18:22:50Z', 'nvd_published_at': '2022-12-19T11:15:00Z'}
1.4.0
GHSA-f44q-634c-jvwv
2023-07-14T21:52:56Z
2022-12-07T23:23:59Z
null
['CVE-2022-23487']
libp2p DoS vulnerability from lack of resource management
### Impact Versions older than `v0.38.0` of js-libp2p are vulnerable to targeted resource exhaustion attacks. These attacks target libp2p’s connection, stream, peer, and memory management. An attacker can cause the allocation of large amounts of memory, ultimately leading to the process getting killed by the host’s operating system. While a connection manager tasked with keeping the number of connections within manageable limits has been part of js-libp2p, this component was designed to handle the regular churn of peers, not a targeted resource exhaustion attack. ### Patches (What to do as a js-libp2p consumer:) Update your js-libp2p dependency to `v0.38.0` or greater. ### Workarounds There are no workarounds, and so we recommend to upgrade your js-libp2p version. Some range of attacks can be mitigated using OS tools (like manually blocking malicious peers using iptables or ufw ) or making use of a load balancer in front of libp2p nodes. You can also use the [allow deny list in js-libp2p](https://docs.libp2p.io/concepts/security/dos-mitigation/#deny-specific-peers-or-create-an-allow-list-of-trusted-peers) to deny specific peers. However these require direct action & responsibility on your part and are no substitutes for upgrading js-libp2p. Therefore, we highly recommend upgrading your js-libp2p version for the way it enables tighter scoped limits and provides visibility into and easier reasoning about js-libp2p resource utilization. ### References * DoS Mitigation page for more information on how to incorporate mitigation strategies, monitor your application, and respond to attacks: https://docs.libp2p.io/reference/dos-mitigation/. * Documentation on how to configure limits to prevent excessive resource consumption: https://github.com/libp2p/js-libp2p/blob/master/doc/LIMITS.md * Documentation on how to configure metrics: https://github.com/libp2p/js-libp2p/blob/master/doc/METRICS.md Please see the related disclosure for go-libp2p: https://github.com/libp2p/go-libp2p/security/advisories/GHSA-j7qp-mfxf-8xjw and rust-libp2p: https://github.com/libp2p/rust-libp2p/security/advisories/GHSA-jvgw-gccv-q5p8 #### For more information If you have any questions or comments about this advisory, please email us at [security@libp2p.io](mailto:security@libp2p.io).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'libp2p'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.38.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/libp2p/js-libp2p/security/advisories/GHSA-f44q-634c-jvwv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23487'}, {'type': 'PACKAGE', 'url': 'https://github.com/libp2p/js-libp2p'}]
{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-07T23:23:59Z', 'nvd_published_at': '2022-12-07T21:15:00Z'}
1.4.0
GHSA-4crw-w8pw-2hmf
2022-12-12T20:44:49Z
2022-12-08T18:30:50Z
null
['CVE-2022-4122']
Buildah (as part of Podman) vulnerable to Link Following
A vulnerability was found in buildah. Incorrect following of symlinks while reading .containerignore and .dockerignore results in information disclosure.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/containers/podman/v4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4122'}, {'type': 'WEB', 'url': 'https://github.com/containers/podman/pull/16315'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2144983'}]
{'cwe_ids': ['CWE-59'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-08T23:39:14Z', 'nvd_published_at': '2022-12-08T16:15:00Z'}
1.4.0
GHSA-xv6x-456v-24xh
2022-12-30T00:58:09Z
2022-12-30T00:58:09Z
null
['CVE-2022-46181']
gotify/server vulnerable to Cross-site Scripting in the application image file upload
### Impact The XSS vulnerability allows authenticated users to upload .html files. With that, an attacker could execute client side scripts **if** another user opened a link, such as: ``` https://push.example.org/image/[alphanumeric string].html ``` An attacker could potentially take over the account of the user that clicked the link. Keep in mind, the Gotify UI won't natively expose such a malicious link, so an attacker has to get the user to open the malicious link in a context outside of Gotify. ### Patches The vulnerability has been fixed in version 2.2.2. ### Workarounds You can block access to non image files via a reverse proxy in the `./image` directory. ### References https://github.com/gotify/server/pull/534 https://github.com/gotify/server/pull/535 --- Thanks to rickshang (aka 无在无不在) for discovering and reporting this bug.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/gotify/server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.1'}}]
[{'type': 'WEB', 'url': 'https://github.com/gotify/server/security/advisories/GHSA-xv6x-456v-24xh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46181'}, {'type': 'WEB', 'url': 'https://github.com/gotify/server/pull/534'}, {'type': 'WEB', 'url': 'https://github.com/gotify/server/pull/535'}, {'type': 'PACKAGE', 'url': 'https://github.com/gotify/server'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T00:58:09Z', 'nvd_published_at': '2022-12-29T19:15:00Z'}
1.4.0
GHSA-65hj-9ppw-77xc
2022-12-21T18:16:26Z
2022-12-01T06:30:26Z
null
['CVE-2022-44262']
ff4j is vulnerable to Remote Code Execution (RCE)
ff4j 1.8.1 is vulnerable to Remote Code Execution (RCE). This issue has been patched in version 1.9.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.ff4j:ff4j-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.1'}, {'fixed': '1.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-44262'}, {'type': 'WEB', 'url': 'https://github.com/ff4j/ff4j/issues/624'}, {'type': 'WEB', 'url': 'https://github.com/ff4j/ff4j/commit/62d03140f3bfbd380d0f4b4e5a94dcb8baa9d9c6'}, {'type': 'PACKAGE', 'url': 'https://github.com/ff4j/ff4j'}]
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-05T22:13:55Z', 'nvd_published_at': '2022-12-01T05:15:00Z'}
1.4.0
GHSA-xv8h-43h9-v3jq
2022-12-19T19:15:29Z
2022-12-15T21:30:29Z
null
['CVE-2022-40373']
FeehiCMS Cross Site Scripting vulnerability
Cross Site Scripting (XSS) vulnerability in FeehiCMS 2.1.1 allows remote attackers to run arbitrary code via upload of crafted XML file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'feehi/feehicms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40373'}, {'type': 'WEB', 'url': 'https://github.com/liufee/cms/issues/67'}, {'type': 'PACKAGE', 'url': 'https://github.com/liufee/cms'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T23:34:53Z', 'nvd_published_at': '2022-12-15T19:15:00Z'}
1.4.0
GHSA-7p7c-pvvx-2vx3
2022-12-05T22:03:46Z
2022-12-05T22:03:46Z
null
[]
hyper-staticfile's improper validation of Windows paths could lead to directory traversal attack
Path resolution in `hyper-staticfile` didn't correctly validate Windows paths, meaning paths like `/foo/bar/c:/windows/web/screen/img101.png` would be allowed and respond with the contents of `c:/windows/web/screen/img101.png`. Thus users could potentially read files anywhere on the filesystem. This only impacts Windows. Linux and other unix likes are not impacted by this.
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'hyper-staticfile'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.2'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'hyper-staticfile'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.10.0-alpha.1'}, {'fixed': '0.10.0-alpha.2'}]}], 'versions': ['0.10.0-alpha.1']}]
[{'type': 'WEB', 'url': 'https://github.com/stephank/hyper-staticfile/issues/35'}, {'type': 'WEB', 'url': 'https://github.com/stephank/hyper-staticfile/pull/36'}, {'type': 'WEB', 'url': 'https://github.com/stephank/hyper-staticfile/commit/1e40e31d64bc6b32e595d24074092dcf84410b2b'}, {'type': 'PACKAGE', 'url': 'https://github.com/stephank/hyper-staticfile'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0069.html'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-05T22:03:46Z', 'nvd_published_at': None}
1.4.0
GHSA-w66j-xc7r-m2jv
2022-12-06T18:49:45Z
2022-12-05T15:30:28Z
null
['CVE-2022-45046']
camel-ldap component allows LDAP Injection when using the filter option
The camel-ldap component allows LDAP Injection when using the filter option. Users are recommended to either move to the Camel-Spring-Ldap component (which is not affected) or upgrade to 3.14.6 or 3.18.4.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-ldap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.14.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-ldap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.15.0'}, {'fixed': '3.18.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45046'}, {'type': 'WEB', 'url': 'https://camel.apache.org/security/CVE-2022-45046.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/camel'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/12/05/2'}]
{'cwe_ids': ['CWE-90'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-05T23:33:29Z', 'nvd_published_at': '2022-12-05T14:15:00Z'}
1.4.0
GHSA-967g-cjx4-h7j6
2023-02-09T21:40:05Z
2022-12-28T00:30:23Z
null
['CVE-2022-2584']
go-codec-dagpb vulnerable to panic when decoding invalid blocks
go-codec-dagpb is an implementation of the DAG-PB spec for Go. The dag-pb codec can panic when decoding invalid blocks. This issue has been patched in version 1.3.1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ipld/go-codec-dagpb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2584'}, {'type': 'WEB', 'url': 'https://github.com/ipld/go-codec-dagpb/commit/a17ace35cc760a2698645c09868f9050fa219f57'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0422'}, {'type': 'PACKAGE', 'url': 'github.com/ipld/go-codec-dagpb'}]
{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-29T01:51:36Z', 'nvd_published_at': '2022-12-27T22:15:00Z'}
1.4.0
GHSA-fxrc-hg6j-6v3x
2022-12-13T19:24:59Z
2022-12-13T15:30:26Z
null
['CVE-2022-45689']
hutool-json vulnerable to memory exhaustion
hutool-json v5.8.10 was discovered to contain an out of memory error. This issue is similar to CVE-2022-45690.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'cn.hutool:hutool-json'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.8.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45689'}, {'type': 'WEB', 'url': 'https://github.com/dromara/hutool/issues/2747'}, {'type': 'PACKAGE', 'url': 'https://github.com/dromara/hutool'}]
{'cwe_ids': ['CWE-400'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T19:24:59Z', 'nvd_published_at': '2022-12-13T15:15:00Z'}
1.4.0
GHSA-qr52-59r6-49f4
2023-01-02T20:21:58Z
2022-12-23T12:30:25Z
null
['CVE-2022-4684']
usememos/memos Improper Access Control vulnerability
Improper Access Control in GitHub repository usememos/memos prior to 0.9.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4684'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/dca35bde877aab6e64ef51b52e590b5d48f692f9'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b66f2bdd-8b41-456c-bf65-92302c2e03b5'}]
{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T16:27:48Z', 'nvd_published_at': '2022-12-23T12:15:00Z'}
1.4.0
GHSA-p6fg-723f-hgpw
2023-01-10T15:58:24Z
2022-12-28T03:30:28Z
null
['CVE-2020-36562']
shiyanhui/dht vulnerable to Uncontrolled Resource Consumption
Due to unchecked type assertions, maliciously crafted messages can cause panics, which may be used as a denial of service vector.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/shiyanhui/dht'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.0-20201219151056-5a20f3199263'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36562'}, {'type': 'WEB', 'url': 'https://github.com/shiyanhui/dht/issues/57'}, {'type': 'PACKAGE', 'url': 'https://github.com/shiyanhui/dht'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0040'}]
{'cwe_ids': ['CWE-400', 'CWE-617'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T19:48:43Z', 'nvd_published_at': '2022-12-28T03:15:00Z'}
1.4.0
GHSA-m54v-gv8p-9pqp
2022-12-19T15:54:56Z
2022-12-15T21:30:29Z
null
['CVE-2021-36572']
FeehiCMS Cross Site Scripting vulnerability
Cross Site Scripting (XSS) vulnerability in Feehi CMS thru 2.1.1 allows attackers to run arbitrary code via the user name field of the login page.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'feehi/feehicms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36572'}, {'type': 'WEB', 'url': 'https://github.com/liufee/cms/issues/58'}, {'type': 'PACKAGE', 'url': 'https://github.com/liufee/cms'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T23:32:38Z', 'nvd_published_at': '2022-12-15T19:15:00Z'}
1.4.0
GHSA-79mp-cxp4-9p6r
2023-01-10T15:57:21Z
2022-12-28T12:30:50Z
null
['CVE-2018-25053']
Json2html vulnerable to cross-site scripting
Json2html is a client side javascript HTML templating library with wrappers for both jQuery and Node.js. A vulnerability was found in moappi Json2html up to 1.1.x and classified as problematic. This issue affects some unknown processing of the file json2html.js. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 1.2.0 can address this issue. The name of the patch is 2d3d24d971b19a8ed1fb823596300b9835d55801. The associated identifier of this vulnerability is VDB-216959.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'node-json2html'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25053'}, {'type': 'WEB', 'url': 'https://github.com/moappi/json2html/commit/2d3d24d971b19a8ed1fb823596300b9835d55801'}, {'type': 'PACKAGE', 'url': 'https://github.com/moappi/json2html'}, {'type': 'WEB', 'url': 'https://github.com/moappi/json2html/releases/tag/1.2.0'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.216959'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.216959'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-28T20:35:02Z', 'nvd_published_at': '2022-12-28T12:15:00Z'}
1.4.0
GHSA-8cf7-32gw-wr33
2022-12-23T00:39:12Z
2022-12-22T03:32:22Z
null
['CVE-2022-23539']
jsonwebtoken unrestricted key type could lead to legacy keys usage
# Overview Versions `<=8.5.1` of `jsonwebtoken` library could be misconfigured so that legacy, insecure key types are used for signature verification. For example, DSA keys could be used with the RS256 algorithm. # Am I affected? You are affected if you are using an algorithm and a key type other than the combinations mentioned below | Key type | algorithm | |----------|------------------------------------------| | ec | ES256, ES384, ES512 | | rsa | RS256, RS384, RS512, PS256, PS384, PS512 | | rsa-pss | PS256, PS384, PS512 | And for Elliptic Curve algorithms: | `alg` | Curve | |-------|------------| | ES256 | prime256v1 | | ES384 | secp384r1 | | ES512 | secp521r1 | # How do I fix it? Update to version 9.0.0. This version validates for asymmetric key type and algorithm combinations. Please refer to the above mentioned algorithm / key type combinations for the valid secure configuration. After updating to version 9.0.0, If you still intend to continue with signing or verifying tokens using invalid key type/algorithm value combinations, you’ll need to set the `allowInvalidAsymmetricKeyTypes` option to `true` in the `sign()` and/or `verify()` functions. # Will the fix impact my users? There will be no impact, if you update to version 9.0.0 and you already use a valid secure combination of key type and algorithm. Otherwise, use the `allowInvalidAsymmetricKeyTypes` option to `true` in the `sign()` and `verify()` functions to continue usage of invalid key type/algorithm combination in 9.0.0 for legacy compatibility.
[]
[{'package': {'ecosystem': 'npm', 'name': 'jsonwebtoken'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.5.1'}}]
[{'type': 'WEB', 'url': 'https://github.com/auth0/node-jsonwebtoken/security/advisories/GHSA-8cf7-32gw-wr33'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23539'}, {'type': 'WEB', 'url': 'https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3'}, {'type': 'PACKAGE', 'url': 'https://github.com/auth0/node-jsonwebtoken'}]
{'cwe_ids': ['CWE-327'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T03:32:22Z', 'nvd_published_at': '2022-12-23T00:15:00Z'}
1.4.0
GHSA-68gw-r2x5-7r5r
2023-06-27T20:24:50Z
2022-12-23T12:30:25Z
null
['CVE-2022-4686']
usememos/memos Authorization Bypass Through User-Controlled Key vulnerability
Authorization Bypass Through User-Controlled Key in GitHub repository usememos/memos prior to 0.9.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4686'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/dca35bde877aab6e64ef51b52e590b5d48f692f9'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/caa0b22c-501f-44eb-af65-65c315cd1637'}]
{'cwe_ids': ['CWE-639'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T16:27:38Z', 'nvd_published_at': '2022-12-23T12:15:00Z'}
1.4.0
GHSA-pwhr-p68w-296x
2023-01-10T15:35:16Z
2022-12-29T18:30:24Z
null
['CVE-2022-4840']
usememos/memos vulnerable to stored Cross-site Scripting
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos 0.9.0 and prior.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4840'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/64e5c343c5f74b0abdf3ac0d21a6139daea58cf8'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b42aa2e9-c783-464c-915c-a80cb464ee01'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T22:53:37Z', 'nvd_published_at': '2022-12-29T17:15:00Z'}
1.4.0
GHSA-qqv9-gqh5-7h99
2023-01-02T20:26:14Z
2022-12-25T06:30:21Z
null
['CVE-2022-44381']
Snipe-IT allows attackers to check whether a user account exists
Snipe-IT through 6.0.14 allows attackers to check whether a user account exists because of response variations in a /password/reset request.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.0.14'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-44381'}, {'type': 'WEB', 'url': 'https://census-labs.com/news/2022/12/23/multiple-vulnerabilities-in-snipe-it/'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it'}]
{'cwe_ids': ['CWE-203'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T17:19:02Z', 'nvd_published_at': '2022-12-25T05:15:00Z'}
1.4.0
GHSA-cgp8-4m63-fhh5
2022-12-06T16:19:45Z
2022-12-03T15:30:26Z
null
['CVE-2021-37533']
Apache Commons Net vulnerable to information leakage via malicious server
Prior to Apache Commons Net 3.9.0, Net's FTP client trusts the host from PASV response by default. A malicious server can redirect the Commons Net code to use a different host, but the user has to connect to the malicious server in the first place. This may lead to leakage of information about services running on the private network of the client. The default in version 3.9.0 is now false to ignore such hosts, as cURL does. See https://issues.apache.org/jira/browse/NET-711.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'commons-net:commons-net'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37533'}, {'type': 'WEB', 'url': 'https://github.com/apache/commons-net/commit/4fe1bae56e53f32756b1ca3296f3dd2c45e3e060'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/commons-net'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/NET-711'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/o6yn9r9x6s94v97264hmgol1sf48mvx7'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/12/msg00038.html'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5307'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/12/03/1'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-05T23:21:08Z', 'nvd_published_at': '2022-12-03T15:15:00Z'}
1.4.0
GHSA-67mh-hw8v-x8v9
2022-12-19T14:40:24Z
2022-12-15T21:30:29Z
null
['CVE-2021-36573']
FeehiCMS Unrestricted Upload vulnerability
File Upload vulnerability in Feehi CMS thru 2.1.1 allows attackers to run arbitrary code via crafted image upload.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'feehi/feehicms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36573'}, {'type': 'WEB', 'url': 'https://github.com/liufee/cms/issues/59'}, {'type': 'PACKAGE', 'url': 'https://github.com/liufee/cms'}]
{'cwe_ids': ['CWE-434', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T23:33:11Z', 'nvd_published_at': '2022-12-15T19:15:00Z'}
1.4.0
GHSA-5wvv-q5fv-2388
2022-12-30T16:57:28Z
2022-12-30T16:57:28Z
null
[]
hyper-staticfile's location header incorporates user input, allowing open redirect
When `hyper-staticfile` performs a redirect for a directory request (e.g. a request for `/dir` that redirects to `/dir/`), the `Location` header value was derived from user input (the request path), simply appending a slash. The intent was to perform an origin-relative redirect, but specific inputs allowed performing a scheme-relative redirect instead. An attacker could craft a special URL that would appear to be for the correct domain, but immediately redirects to a malicious domain. Such a URL can benefit phishing attacks, for example an innocent looking link in an email.
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'hyper-staticfile'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.4'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'hyper-staticfile'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.10.0-alpha.1'}, {'fixed': '0.10.0-alpha.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/stephank/hyper-staticfile/commit/4db4afb811c553bc3d54a01a9985b9e6dfc5a115'}, {'type': 'WEB', 'url': 'https://github.com/stephank/hyper-staticfile/commit/f12cadc6666c6f555d29725f5bc45da2103f24ea'}, {'type': 'PACKAGE', 'url': 'https://github.com/stephank/hyper-staticfile'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0072.html'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T16:57:28Z', 'nvd_published_at': None}
1.4.0
GHSA-ppjq-qxhx-m25f
2022-12-15T21:59:51Z
2022-12-13T17:16:36Z
null
['CVE-2022-23505']
Authentication Bypass for passport-wsfed-saml2
# Overview A remote attacker can bypass WSFed authentication on a website using passport-wsfed-saml2. A successful attack requires that the attacker is in possession of an arbitrary IDP signed WSFed assertion. Depending on the IDP used, fully unauthenticated attacks (e.g without access to a valid user) might also be feasible if generation of a signed message can be triggered. # Am I affected? You are affected if you are using WSFed protocol with the passport-wsfed-saml2 library versions < 4.6.3. SAML2 protocol is not affected. # How do I fix it? Upgrade the library to version 4.6.3. # Will the fix impact my users? No, the fix will not impact your users.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'passport-wsfed-saml2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/auth0/passport-wsfed-saml2/security/advisories/GHSA-ppjq-qxhx-m25f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23505'}, {'type': 'WEB', 'url': 'https://github.com/auth0/passport-wsfed-saml2/pull/179'}, {'type': 'PACKAGE', 'url': 'https://github.com/auth0/passport-wsfed-saml2'}]
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T17:16:36Z', 'nvd_published_at': '2022-12-13T08:15:00Z'}
1.4.0
GHSA-x3x3-qwjq-8gj4
2022-12-15T22:00:04Z
2022-12-13T18:30:26Z
null
['CVE-2022-46364']
Apache CXF Server-Side Request Forgery vulnerability
A SSRF vulnerability in parsing the href attribute of XOP:Include in MTOM requests in versions of Apache CXF before 3.5.5 and 3.4.10 allows an attacker to perform SSRF style attacks on webservices that take at least one parameter of any type.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5.0'}, {'fixed': '3.5.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46364'}, {'type': 'WEB', 'url': 'https://cxf.apache.org/security-advisories.data/CVE-2022-46364.txt?version=1&modificationDate=1670944472739&api=v2'}]
{'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T19:45:21Z', 'nvd_published_at': '2022-12-13T17:15:00Z'}
1.4.0
GHSA-3rrx-364r-6wf6
2022-12-12T22:10:36Z
2022-12-12T09:30:35Z
null
['CVE-2022-46687']
Cross-site Scripting in Jenkins Spring Config Plugin
Jenkins Spring Config Plugin 2.0.0 and earlier does not escape build display names shown on the Spring Config view, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to change build display names. Spring Config Plugin 2.0.1 escapes build display names shown on the Spring Config view.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:spring-config'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46687'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/spring-config-plugin/commit/89fea88b24f92233ed31050b8e695eb9b502b8c0'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/spring-config-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-12-07/#SECURITY-2814'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T22:10:36Z', 'nvd_published_at': '2022-12-12T09:15:00Z'}
1.4.0
GHSA-52h2-m2cf-9jh6
2022-12-12T22:35:41Z
2022-12-12T22:35:41Z
null
['CVE-2022-23523']
linux-loader reading beyond EOF could lead to infinite loop
### Impact The linux-loader crate used the offsets and sizes provided in the ELF headers to determine the offsets to read from. If those offsets pointed beyond the end of the file this could lead to an infinite loop. Virtual Machine Monitors using the `linux-loader` crate could enter an infinite loop if the ELF header of the kernel they are loading was modified in a malicious manner. ### Patches The issue has been addressed in 0.8.1 ### Workarounds The issue can be mitigated by ensuring that only trusted kernel images are loaded or by verifying that the headers to not point beyond the end of the file. ### References See: https://github.com/rust-vmm/linux-loader/pull/125
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'linux-loader'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/rust-vmm/linux-loader/security/advisories/GHSA-52h2-m2cf-9jh6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23523'}, {'type': 'WEB', 'url': 'https://github.com/rust-vmm/linux-loader/pull/125'}, {'type': 'WEB', 'url': 'https://github.com/rust-vmm/linux-loader/commit/a44f152da4f38c538ed492b1efa8515be2047db2'}, {'type': 'PACKAGE', 'url': 'https://github.com/rust-vmm/linux-loader'}]
{'cwe_ids': ['CWE-119', 'CWE-125', 'CWE-835'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T22:35:41Z', 'nvd_published_at': '2022-12-13T08:15:00Z'}
1.4.0
GHSA-486f-hjj9-9vhh
2022-12-13T17:36:28Z
2022-12-13T17:36:28Z
null
['CVE-2022-23514']
Inefficient Regular Expression Complexity in Loofah
## Summary Loofah `< 2.19.1` contains an inefficient regular expression that is susceptible to excessive backtracking when attempting to sanitize certain SVG attributes. This may lead to a denial of service through CPU resource consumption. ## Mitigation Upgrade to Loofah `>= 2.19.1`. ## Severity The Loofah maintainers have evaluated this as [High Severity 7.5 (CVSS3.1)](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). ## References - [CWE - CWE-1333: Inefficient Regular Expression Complexity (4.9)](https://cwe.mitre.org/data/definitions/1333.html) - https://hackerone.com/reports/1684163 ## Credit This vulnerability was responsibly reported by @ooooooo-q (https://github.com/ooooooo-q).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'loofah'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.19.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/flavorjones/loofah/security/advisories/GHSA-486f-hjj9-9vhh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23514'}, {'type': 'WEB', 'url': 'https://github.com/flavorjones/loofah/commit/a6e0a1ab90675a17b1b2be189129d94139e4b143'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1684163'}, {'type': 'PACKAGE', 'url': 'https://github.com/flavorjones/loofah'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/loofah/CVE-2022-23514.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/09/msg00011.html'}]
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T17:36:28Z', 'nvd_published_at': '2022-12-14T14:15:00Z'}
1.4.0
GHSA-7gpw-frph-fwrg
2023-02-08T21:57:03Z
2022-12-14T21:30:16Z
null
['CVE-2022-47407']
TYPO3-EXT-SA-2022-018: Multiple vulnerabilities in extension "Master-Quiz" (fp_masterquiz)
An issue was discovered in the fp_masterquiz (aka Master-Quiz) extension before 2.2.1, and 3.x before 3.5.1, for TYPO3. An attacker can continue the quiz of a different user. In doing so, the attacker can view that user's answers and modify those answers.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'fixpunkt/fp-masterquiz'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.5.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'fixpunkt/fp-masterquiz'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-47407'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/fixpunkt/fp-masterquiz/CVE-2022-47407.yaml'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2022-018'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T21:57:03Z', 'nvd_published_at': '2022-12-14T21:15:00Z'}
1.4.0
GHSA-r3p3-5f35-h6mf
2023-01-09T20:06:47Z
2022-12-28T15:30:46Z
null
['CVE-2022-4808']
usememos/memos Improper Privilege Management vulnerability
Improper Privilege Management in GitHub repository usememos/memos prior to 0.9.1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4808'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/11877cbf-fcaf-42ef-813e-502c7293f2b5'}]
{'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T20:06:47Z', 'nvd_published_at': '2022-12-28T14:15:00Z'}
1.4.0
GHSA-9p95-fxvg-qgq2
2022-12-07T14:15:26Z
2022-12-06T06:30:17Z
null
['CVE-2022-25912']
simple-git vulnerable to Remote Code Execution when enabling the ext transport protocol
The package simple-git before 3.15.0 is vulnerable to Remote Code Execution (RCE) when enabling the `ext` transport protocol, which makes it exploitable via `clone()` method. This vulnerability exists due to an incomplete fix of [CVE-2022-24066](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-2434306).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'simple-git'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.15.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25912'}, {'type': 'WEB', 'url': 'https://github.com/steveukx/git-js/commit/774648049eb3e628379e292ea172dccaba610504'}, {'type': 'PACKAGE', 'url': 'https://github.com/steveukx/git-js'}, {'type': 'WEB', 'url': 'https://github.com/steveukx/git-js/blob/main/docs/PLUGIN-UNSAFE-ACTIONS.md%23overriding-allowed-protocols'}, {'type': 'WEB', 'url': 'https://github.com/steveukx/git-js/releases/tag/simple-git%403.15.0'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3153532'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3112221'}]
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-07T14:15:26Z', 'nvd_published_at': '2022-12-06T05:15:00Z'}
1.4.0
GHSA-6jvc-q2x7-pchv
2023-01-06T03:20:04Z
2022-12-28T00:30:23Z
null
['CVE-2022-2582']
AWS S3 Crypto SDK sends an unencrypted hash of the plaintext alongside the ciphertext as a metadata field
The AWS S3 Crypto SDK sends an unencrypted hash of the plaintext alongside the ciphertext as a metadata field. This hash can be used to brute force the plaintext, if the hash is readable to the attacker. AWS now blocks this metadata field, but older SDK versions still send it.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/aws/aws-sdk-go'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.34.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2582'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-sdk-go/commit/35fa6ddf45c061e0f08d3a3b5119f8f4da38f6d1'}, {'type': 'PACKAGE', 'url': 'https://github.com/aws/aws-sdk-go'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0391'}]
{'cwe_ids': ['CWE-326'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T18:53:40Z', 'nvd_published_at': '2022-12-27T22:15:00Z'}
1.4.0
GHSA-xqqc-c5gw-c5r5
2022-12-14T21:35:24Z
2022-12-14T21:35:24Z
null
['CVE-2022-23507']
Tendermint light client verification not taking into account chain ID
### Impact Anyone using the `tendermint-light-client` and related packages to perform light client verification (e.g. IBC-rs, Hermes). At present, the light client does not check that the chain IDs of the trusted and untrusted headers match, resulting in a possible attack vector where someone who finds a header from an untrusted chain that satisfies all other verification conditions (e.g. enough overlapping validator signatures) could fool a light client. The attack vector is currently theoretical, and no proof-of-concept exists yet to exploit it on live networks. ### Patches Users of the light client-related crates can currently upgrade to `v0.28.0`. ### Workarounds None ### References - [Light Client specification](https://github.com/tendermint/tendermint/tree/main/spec/light-client)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'tendermint-light-client-verifier'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.28.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.27.0'}}, {'package': {'ecosystem': 'crates.io', 'name': 'tendermint-light-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.28.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.27.0'}}, {'package': {'ecosystem': 'crates.io', 'name': 'tendermint-light-client-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.28.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.27.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/informalsystems/tendermint-rs/security/advisories/GHSA-xqqc-c5gw-c5r5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23507'}, {'type': 'WEB', 'url': 'https://github.com/informalsystems/tendermint-rs/commit/5c32f31b97ac3172775699fe0d4ba6003ca4fb18'}, {'type': 'PACKAGE', 'url': 'https://github.com/informalsystems/tendermint-rs'}]
{'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-14T21:35:24Z', 'nvd_published_at': '2022-12-15T19:15:00Z'}
1.4.0
GHSA-j593-h5v3-45x6
2023-01-10T15:38:25Z
2022-12-27T15:30:19Z
null
['CVE-2022-4734']
usememos/memos may leak user information to an authenticated user
usememos/memos 0.9.0 and prior has endpoint that leaks user information like names, email, role, and OpenID to an authenticated user. A patch is available at commit 05b41804e33a34102f1f75bb2d69195dda6a1210 on the `main` branch.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4734'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/05b41804e33a34102f1f75bb2d69195dda6a1210'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/4b4421dc-73af-4dec-884c-836f9732cb5b'}]
{'cwe_ids': ['CWE-200', 'CWE-212'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T17:56:48Z', 'nvd_published_at': '2022-12-27T15:15:00Z'}
1.4.0
GHSA-qv6c-367r-3w6q
2022-12-02T22:26:22Z
2022-12-02T22:26:22Z
null
['CVE-2022-46147']
XBlock vulnerable to Cross-Site Scripting (XSS)
### Impact XSS Vulnerability in multiple XBlock Fields. Any platform that has deployed the XBlock will be impacted. ### Patches https://github.com/openedx/xblock-drag-and-drop-v2/commit/53c4482f9bb6d8c7ccdf5253bd82c84a222b2492 The fix is compatible with all Open edX releases newer than Lilac. ### Workarounds None. ### References https://github.com/openedx/xblock-drag-and-drop-v2/pull/295#issuecomment-1277693864
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'xblock-drag-and-drop-v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/openedx/xblock-drag-and-drop-v2/security/advisories/GHSA-qv6c-367r-3w6q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46147'}, {'type': 'WEB', 'url': 'https://github.com/openedx/xblock-drag-and-drop-v2/pull/295#issuecomment-1277693864'}, {'type': 'WEB', 'url': 'https://github.com/openedx/xblock-drag-and-drop-v2/commit/53c4482f9bb6d8c7ccdf5253bd82c84a222b2492'}, {'type': 'WEB', 'url': 'https://github.com/openedx/xblock-drag-and-drop-v2/commit/68887d1b4a44325d2de7573d450e41129ba98b1a'}, {'type': 'PACKAGE', 'url': 'https://github.com/openedx/xblock-drag-and-drop-v2'}, {'type': 'WEB', 'url': 'https://github.com/openedx/xblock-drag-and-drop-v2/releases/tag/v3.0.0'}]
{'cwe_ids': ['CWE-79', 'CWE-80'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T22:26:22Z', 'nvd_published_at': '2022-11-28T21:15:00Z'}
1.4.0
GHSA-9p62-x3c5-hr5p
2022-12-30T18:03:47Z
2022-12-30T18:03:47Z
null
['CVE-2022-46178']
Path Traversal In MeterSpere leads to upload file to any path
### Summary MeterSphere allow users to upload file, but not check the file name, may lead to upload file to any path if the file name in upload request is falsified. ### Details Metersphere's [`FileUtils.java`](https://github.com/metersphere/metersphere/blob/v2.5.0/framework/sdk-parent/sdk/src/main/java/io/metersphere/commons/utils/FileUtils.java#L57) didn't check the filePath. ```java public static void createFile(String filePath, byte[] fileBytes) { File file = new File(filePath); if (file.exists()) { file.delete(); } try { File dir = file.getParentFile(); if (!dir.exists()) { dir.mkdirs(); } file.createNewFile(); } catch (Exception e) { LogUtil.error(e); } try (InputStream in = new ByteArrayInputStream(fileBytes); OutputStream out = new FileOutputStream(file)) { final int MAX = 4096; byte[] buf = new byte[MAX]; for (int bytesRead = in.read(buf, 0, MAX); bytesRead != -1; bytesRead = in.read(buf, 0, MAX)) { out.write(buf, 0, bytesRead); } } catch (IOException e) { LogUtil.error(e); MSException.throwException(Translator.get("upload_fail")); } } ``` ### Patches The vulnerability has been fixed in [v2.5.1](https://github.com/metersphere/metersphere/releases/tag/v2.5.1). https://github.com/metersphere/metersphere/commit/3a890eeeb8a6b0887927c876a73bdb3a99a82138 : add validation for file name. ### Workarounds It is recommended to upgrade the version to [v2.5.1](https://github.com/metersphere/metersphere/releases/tag/v2.5.1). ### For more information If you have any questions or comments about this advisory, please [open an issue](https://github.com/metersphere/metersphere/issues).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.metersphere:metersphere'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/metersphere/metersphere/security/advisories/GHSA-9p62-x3c5-hr5p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46178'}, {'type': 'PACKAGE', 'url': 'https://github.com/metersphere/metersphere'}, {'type': 'WEB', 'url': 'https://github.com/metersphere/metersphere/blob/v2.5.0/framework/sdk-parent/sdk/src/main/java/io/metersphere/commons/utils/FileUtils.java#L5'}, {'type': 'WEB', 'url': 'https://github.com/metersphere/metersphere/releases/tag/v2.5.1'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T18:03:47Z', 'nvd_published_at': '2022-12-29T19:15:00Z'}
1.4.0
GHSA-hc5q-26h8-r9wf
2023-01-10T15:43:56Z
2022-12-28T15:30:46Z
null
['CVE-2022-4811']
usememos/memos Improper Authorization vulnerability
In usememos/memos 0.9.0 and prior, an unauthorized user can access any private memo by URL hacking a memo on the editing screen.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4811'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/e907b754-4f33-46b6-9dd2-0d2223cb060c'}]
{'cwe_ids': ['CWE-285', 'CWE-639', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T22:11:45Z', 'nvd_published_at': '2022-12-28T14:15:00Z'}
1.4.0
GHSA-fr54-72wr-cqvq
2023-01-09T21:59:21Z
2022-12-31T21:30:20Z
null
['CVE-2017-20160']
express-param vulnerable to Improper Handling of Extra Parameters
A vulnerability was found in flitto express-param up to 0.x. It has been classified as critical. This affects an unknown part of the file `lib/fetchParams.js`. The manipulation leads to improper handling of extra parameters. It is possible to initiate the attack remotely. Upgrading to version 1.0.0 can address this issue. The name of the patch is db94f7391ad0a16dcfcba8b9be1af385b25c42db. It is recommended to upgrade the affected component. The identifier VDB-217149 was assigned to this vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'express-param'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-20160'}, {'type': 'WEB', 'url': 'https://github.com/flitto/express-param/pull/19'}, {'type': 'WEB', 'url': 'https://github.com/flitto/express-param/commit/db94f7391ad0a16dcfcba8b9be1af385b25c42db'}, {'type': 'PACKAGE', 'url': 'https://github.com/flitto/express-param'}, {'type': 'WEB', 'url': 'https://github.com/flitto/express-param/releases/tag/1.0.0'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217149'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217149'}]
{'cwe_ids': ['CWE-235'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T21:59:21Z', 'nvd_published_at': '2022-12-31T20:15:00Z'}
1.4.0
GHSA-wmxm-6wxc-3xqf
2023-01-02T16:32:06Z
2022-12-22T12:30:16Z
null
['CVE-2022-45347']
Apache ShardingSphere-Proxy Incomplete Cleanup vulnerability
Apache ShardingSphere-Proxy prior to 5.3.0 when using MySQL as database backend didn't cleanup the database session completely after client authentication failed, which allowed an attacker to execute normal commands by constructing a special MySQL client. This vulnerability has been fixed in Apache ShardingSphere 5.3.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.shardingsphere:shardingsphere-proxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45347'}, {'type': 'PACKAGE', 'url': 'https://github.com/pjfanning/shardingsphere'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/l5rz7j4rg10o7ywtgknh2f5hxnv6yw3l'}]
{'cwe_ids': ['CWE-459'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T20:02:29Z', 'nvd_published_at': '2022-12-22T11:15:00Z'}
1.4.0
GHSA-g5ww-5jh7-63cx
2022-12-12T22:33:53Z
2022-12-12T15:30:33Z
null
['CVE-2022-3509']
Protobuf Java vulnerable to Uncontrolled Resource Consumption
A parsing issue similar to CVE-2022-3171, but with textformat in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.google.protobuf:protobuf-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.16.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.google.protobuf:protobuf-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.17.0'}, {'fixed': '3.19.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.google.protobuf:protobuf-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.20.0'}, {'fixed': '3.20.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.google.protobuf:protobuf-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.21.0'}, {'fixed': '3.21.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.google.protobuf:protobuf-javalite'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.16.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.google.protobuf:protobuf-javalite'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.17.0'}, {'fixed': '3.19.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.google.protobuf:protobuf-javalite'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.20.0'}, {'fixed': '3.20.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.google.protobuf:protobuf-javalite'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.21.0'}, {'fixed': '3.21.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3509'}, {'type': 'WEB', 'url': 'https://github.com/protocolbuffers/protobuf/commit/a3888f53317a8018e7a439bac4abeb8f3425d5e9'}, {'type': 'PACKAGE', 'url': 'https://github.com/protocolbuffers/protobuf/tree/main/java'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T22:33:53Z', 'nvd_published_at': '2022-12-12T13:15:00Z'}
1.4.0
GHSA-w9wc-4xcq-8gr6
2022-12-09T20:08:32Z
2022-12-09T20:08:32Z
null
['CVE-2022-46157']
Akeneo PIM Community Edition vulnerable to remote php code execution
### Impact Akeneo PIM Community Edition versions before v5.0.119 and v6.0.53 allows remote authenticated users to execute arbitrary PHP code on the server by uploading a crafted image. ### Patches Akeneo PIM Community Edition after the versions aforementioned provides patched Apache HTTP server configuration file, for docker setup and in documentation sample, to fix this vulnerability. Community Edition users must change their Apache HTTP server configuration accordingly to be protected. The patch for Cloud Based Akeneo PIM Services customers has been applied since 30th October 2022. ### Workarounds Replace any reference to `<FilesMatch \.php$>` in your apache httpd configurations with: `<Location "/index.php">`, as shown in https://github.com/akeneo/pim-community-dev/blob/b4d79bb073c8b68ea26ab227c97cc78d86c4cba1/docker/httpd.conf#L39. <!-- ### References _Are there any links users can visit to find out more?_ ### For more information If you have any questions or comments about this advisory: * Open an issue in [example link to repo](http://example.com) * Email us at [example email address](mailto:example@example.com) -->
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'akeneo/pim-community-dev'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.53'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'akeneo/pim-community-dev'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.119'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/akeneo/pim-community-dev/security/advisories/GHSA-w9wc-4xcq-8gr6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46157'}, {'type': 'WEB', 'url': 'https://github.com/akeneo/pim-community-dev/commit/891a2f70a9a200f199de06fe64d376d03787a81a'}, {'type': 'PACKAGE', 'url': 'https://github.com/akeneo/pim-community-dev'}, {'type': 'WEB', 'url': 'https://github.com/akeneo/pim-community-dev/blob/b4d79bb073c8b68ea26ab227c97cc78d86c4cba1/docker/httpd.conf#L39'}]
{'cwe_ids': ['CWE-434', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-09T20:08:32Z', 'nvd_published_at': '2022-12-09T21:15:00Z'}
1.4.0
GHSA-vh43-cc6x-prpr
2023-01-10T15:48:04Z
2022-12-29T18:30:24Z
null
['CVE-2022-4848']
usememos/memos vulnerable to Improper Verification of Source of a Communication Channel
Improper Verification of Source of a Communication Channel in GitHub repository usememos/memos 0.9.0 and prior.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4848'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/c9bb2b785dc5852655405d5c9ab127a2d5aa3948'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/25de88cc-8d0d-41a1-b069-9ef1327770bc'}]
{'cwe_ids': ['CWE-940'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T22:51:51Z', 'nvd_published_at': '2022-12-29T18:15:00Z'}