schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 8 154 | details stringlengths 31 19.1k | severity stringlengths 2 92 | affected stringlengths 75 28.5k | references stringlengths 79 7.48k | database_specific stringlengths 131 196 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-qvx2-59g8-8hph | 2023-01-06T03:15:39Z | 2022-12-25T21:30:21Z | null | ['CVE-2022-4741'] | docconv vulnerable to Memory Allocation with Excessive Size Value | A vulnerability was found in docconv up to 1.2.0 and classified as problematic. This issue affects the function `ConvertDocx/ConvertODT/ConvertPages/ConvertXML/XMLToText`. The manipulation leads to uncontrolled memory allocation. The attack may be initiated remotely. Upgrading to version 1.2.1 can address this issue. The name of the patch is 42bcff666855ab978e67a9041d0cdea552f20301. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216779. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/sajari/docconv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'code.sajari.com/docconv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4741'}, {'type': 'WEB', 'url': 'https://github.com/sajari/docconv/pull/111'}, {'type': 'WEB', 'url': 'https://github.com/sajari/docconv/commit/42bcff666855ab978e67a9041d0cdea552f20301'}, {'type': 'PACKAGE', 'url': 'https://github.com/sajari/docconv'}, {'type': 'WEB', 'url': 'https://github.com/sajari/docconv/releases/tag/v1.2.1'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-1188'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.216779'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.216779'}] | {'cwe_ids': ['CWE-789'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T17:19:54Z', 'nvd_published_at': '2022-12-25T20:15:00Z'} |
1.4.0 | GHSA-j69f-fgh5-f7mc | 2023-01-10T00:40:37Z | 2022-12-30T12:30:25Z | null | ['CVE-2017-20151'] | iText RUPS XML External Entity vulnerability | A vulnerability classified as problematic was found in iText RUPS. This vulnerability affects unknown code of the file `src/main/java/com/itextpdf/rups/model/XfaFile.java`. The manipulation leads to xml external entity reference. The name of the patch is ac5590925874ef810018a6b60fec216eee54fb32. It is recommended to apply a patch to fix this issue. VDB-217054 is the identifier assigned to this vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.itextpdf:itext-rups'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '7.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-20151'}, {'type': 'WEB', 'url': 'https://github.com/itext/rups/commit/ac5590925874ef810018a6b60fec216eee54fb32'}, {'type': 'PACKAGE', 'url': 'https://github.com/itext/rups'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217054'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217054'}] | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-10T00:40:37Z', 'nvd_published_at': '2022-12-30T12:15:00Z'} |
1.4.0 | GHSA-2j2x-2gpw-g8fm | 2023-01-06T03:16:40Z | 2022-12-25T21:30:22Z | null | ['CVE-2020-36632'] | flat vulnerable to Prototype Pollution | flat helps flatten/unflatten nested Javascript objects. A vulnerability, which was classified as critical, was found in hughsk flat up to 5.0.0. This affects the function unflatten of the file index.js. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). It is possible to initiate the attack remotely. Upgrading to version 5.0.1 can address this issue. The name of the patch is 20ef0ef55dfa028caddaedbcb33efbdb04d18e13. It is recommended to upgrade the affected component. The identifier VDB-216777 was assigned to this vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'flat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36632'}, {'type': 'WEB', 'url': 'https://github.com/hughsk/flat/issues/105'}, {'type': 'WEB', 'url': 'https://github.com/hughsk/flat/pull/106'}, {'type': 'WEB', 'url': 'https://github.com/hughsk/flat/commit/20ef0ef55dfa028caddaedbcb33efbdb04d18e13'}, {'type': 'PACKAGE', 'url': 'https://github.com/hughsk/flat'}, {'type': 'WEB', 'url': 'https://github.com/hughsk/flat/releases/tag/5.0.1'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.216777'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.216777'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T16:27:14Z', 'nvd_published_at': '2022-12-25T20:15:00Z'} |
1.4.0 | GHSA-3mmh-vq9w-4c3g | 2022-12-27T01:01:51Z | 2022-12-21T03:30:24Z | null | ['CVE-2022-4617'] | Microweber vulnerable to Reflected Cross-site Scripting | Microweber versions 1.3.1 and prior are vulnerable to Reflected Cross-site Scripting (XSS). A patch is available on the 1.4, dev, and laravel-sail branches. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4617'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/df8add930ecfa7f5b18c67c3f748c137fe890906'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1fb2ce08-7016-45fa-b402-ec08d700e4df'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T17:21:34Z', 'nvd_published_at': '2022-12-21T01:15:00Z'} |
1.4.0 | GHSA-vc9x-gmmr-p7jj | 2023-02-22T00:11:56Z | 2022-12-12T15:30:31Z | 2023-02-22T00:11:56Z | ['CVE-2021-4243'] | Duplicate advisory: @claviska/jquery-minicolors vulnerable to Cross-site Scripting | ## Duplicate advisory
This advisory has been withdrawn because it is a duplicate of [GHSA-crh5-vv2v-c82q](https://github.com/advisories/GHSA-crh5-vv2v-c82q). This link is maintained to preserve external references.
## Original Description
A vulnerability was found in claviska jquery-minicolors up to 2.3.5. It has been rated as problematic. Affected by this issue is some unknown functionality of the file jquery.minicolors.js. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.3.6 is able to address this issue. The name of the patch is ef134824a7f4110ada53ea6c173111a4fa2f48f3. It is recommended to upgrade the affected component. VDB-215306 is the identifier assigned to this vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@claviska/jquery-minicolors'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4243'}, {'type': 'WEB', 'url': 'https://github.com/claviska/jquery-minicolors/commit/ef134824a7f4110ada53ea6c173111a4fa2f48f3'}, {'type': 'WEB', 'url': 'https://codepen.io/webbiesdk/pen/oNBQNNV'}, {'type': 'PACKAGE', 'url': 'https://github.com/claviska/jquery-minicolors/'}, {'type': 'WEB', 'url': 'https://github.com/claviska/jquery-minicolors/releases/tag/2.3.6'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2021-1045_jQuery_MiniColors_Plugin/'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.215306'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.215306'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T22:22:21Z', 'nvd_published_at': '2022-12-12T14:15:00Z'} |
1.4.0 | GHSA-rrfc-7g8p-99q8 | 2022-12-17T00:32:44Z | 2022-12-13T17:51:40Z | null | ['CVE-2022-23520'] | Possible XSS vulnerability with certain configurations of rails-html-sanitizer | ## Summary
There is a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer. This is due to an incomplete fix of CVE-2022-32209.
- Versions affected: ALL
- Not affected: NONE
- Fixed versions: 1.4.4
## Impact
A possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer's allowed tags to allow both "select" and "style" elements.
Code is only impacted if allowed tags are being overridden using either of the following two mechanisms:
1. Using the Rails configuration `config.action_view.sanitized_allow_tags=`:
```ruby
# In config/application.rb
config.action_view.sanitized_allowed_tags = ["select", "style"]
```
(see https://guides.rubyonrails.org/configuring.html#configuring-action-view)
2. Using the class method `Rails::Html::SafeListSanitizer.allowed_tags=`:
```ruby
# class-level option
Rails::Html::SafeListSanitizer.allowed_tags = ["select", "style"]
```
All users overriding the allowed tags by either of the above mechanisms to include both "select" and "style" should either upgrade or use one of the workarounds immediately.
NOTE: Code is _not_ impacted if allowed tags are overridden using either of the following mechanisms:
- the `:tags` option to the Action View helper method `sanitize`.
- the `:tags` option to the instance method `SafeListSanitizer#sanitize`.
## Workarounds
Remove either "select" or "style" from the overridden allowed tags.
## References
- [CWE - CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (4.9)](https://cwe.mitre.org/data/definitions/79.html)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32209
- https://hackerone.com/reports/1654310
## Credit
This vulnerability was responsibly reported by Dominic Breuker.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rails-html-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-rrfc-7g8p-99q8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23520'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1654310'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails-html-sanitizer'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails-html-sanitizer/CVE-2022-23520.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/09/msg00012.html'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T17:51:40Z', 'nvd_published_at': '2022-12-14T18:15:00Z'} |
1.4.0 | GHSA-4v48-4q5m-8vx4 | 2022-12-05T22:02:05Z | 2022-12-05T22:01:08Z | null | [] | Prometheus vulnerable to basic authentication bypass | ### Impact
Prometheus can be secured by a web.yml file that specifies usernames and hashed passwords for basic authentication.
Passwords are hashed with bcrypt, which means that even if you have access to the hash, it is very hard to find the original password back.
However, a flaw in the way this mechanism was implemented in the [exporter toolkit](https://github.com/prometheus/exporter-toolkit) makes it possible with people who know the hashed password to authenticate against Prometheus.
A request can be forged by an attacker to poison the internal cache used to cache the computation of hashes and make subsequent requests successful. This cache is used in both happy and unhappy scenarios in order to limit side channel attacks that could tell an attacker if a user is present in the file or not.
### Patches
Prometheus 2.37.4 ([LTS](https://prometheus.io/docs/introduction/release-cycle/)) and 2.40.4 have been released to address this issue.
### Workarounds
There is no workaround but attacker must have access to the hashed password, stored in disk, to bypass the authentication. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/prometheus/prometheus'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.24.1'}, {'fixed': '2.37.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/prometheus/prometheus'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.38.0'}, {'fixed': '2.40.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/prometheus/prometheus/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.24.1'}, {'fixed': '2.37.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/prometheus/prometheus/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.38.0'}, {'fixed': '2.40.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/prometheus/prometheus/security/advisories/GHSA-4v48-4q5m-8vx4'}, {'type': 'WEB', 'url': 'https://github.com/prometheus/prometheus/commit/31a2db3ae9c0f4b486b6895973beabc1d1beac93'}, {'type': 'WEB', 'url': 'https://github.com/prometheus/prometheus/releases/tag/v2.37.4'}, {'type': 'WEB', 'url': 'https://github.com/prometheus/prometheus/releases/tag/v2.40.4'}, {'type': 'PACKAGE', 'url': 'github.com/prometheus/prometheus'}] | {'cwe_ids': ['CWE-303'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-05T22:01:08Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vx2x-9cff-fhjw | 2022-12-06T21:13:49Z | 2022-12-06T21:13:49Z | null | [] | DSInternals Credential Roaming Elevation of Privilege Vulnerability | ### Impact
A vulnerability exists in the `DSInternals.Common.Data.RoamedCredential.Save()` method, which incorrectly parses the `msPKIAccountCredentials` LDAP attribute values. As a consequence, a malicious actor would be able to modify the file system of the computer where an application using this function is executed with administrative privileges.
A [similar security issue](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30170) used to be present in the Windows operating system, as DSInternals re-implements the Credential Roaming feature of Windows.
### Exploitability
The vulnerability can be exploited under the following circumstances:
- An attacker is able to modify the `msPKIAccountCredentials` attribute of a user account in Active Directory. This attribute is used by the Credential Roaming feature of Windows and each AD user can modify their own roamed credentials. AND
- A 3rd party application uses the `DSInternals.Common` library to export roamed credentials from Active Directory to a file system. AND
- The application has administrative privileges on the local system.
The probability of any 3rd-party product using the `DSInternals.Common` library being affected by this vulnerability is extremely low.
### Patches
The issue had been fixed in DSInternals 4.8.
### References
https://www.mandiant.com/resources/blog/apt29-windows-credential-roaming
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'DSInternals.Common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.21'}, {'fixed': '4.8'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/MichaelGrafnetter/DSInternals/security/advisories/GHSA-vx2x-9cff-fhjw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30170'}, {'type': 'PACKAGE', 'url': 'https://github.com/MichaelGrafnetter/DSInternals'}, {'type': 'WEB', 'url': 'https://www.mandiant.com/resources/blog/apt29-windows-credential-roaming'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T21:13:49Z', 'nvd_published_at': None} |
1.4.0 | GHSA-252h-2cmq-pmr6 | 2022-12-20T15:46:28Z | 2022-12-15T21:30:28Z | null | ['CVE-2020-24855'] | easywebpack-cli Path Traversal vulnerability | Directory Traversal vulnerability in easywebpack-cli before 4.5.2 allows attackers to obtain sensitive information via crafted GET request. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@easy-team/easywebpack-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24855'}, {'type': 'WEB', 'url': 'https://github.com/easy-team/easywebpack-cli/issues/25'}, {'type': 'WEB', 'url': 'https://github.com/easy-team/easywebpack-cli/commit/eb3f54603f58ea706d0c03fd6eb76c94176eae52'}, {'type': 'PACKAGE', 'url': 'https://github.com/easy-team/easywebpack-cli'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T23:30:37Z', 'nvd_published_at': '2022-12-15T19:15:00Z'} |
1.4.0 | GHSA-qcf5-m2c6-89f2 | 2023-01-10T15:45:55Z | 2022-12-28T15:30:45Z | null | ['CVE-2022-4798'] | usememos/memos Improper Authorization vulnerability | usememos/memos 0.9.0 and prior is vulnerable to Improper Authorization. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4798'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/e12eed25-1a8e-4ee1-b846-2d4df1db2fae'}] | {'cwe_ids': ['CWE-285', 'CWE-639'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T19:57:20Z', 'nvd_published_at': '2022-12-28T14:15:00Z'} |
1.4.0 | GHSA-m3cq-xcx9-3gvm | 2023-08-29T22:40:39Z | 2022-12-21T17:24:10Z | null | ['CVE-2022-47633'] | kyverno verifyImages rule bypass possible with malicious proxy/registry | ### Impact
Users of Kyverno on versions 1.8.3 or 1.8.4 who use `verifyImages` rules to verify container image signatures, and do not prevent use of unknown registries.
### Patches
This issue has been fixed in version [1.8.5](https://github.com/kyverno/kyverno/releases/tag/v1.8.5)
### Workarounds
Configure a Kyverno policy to restrict registries to a set of secure trusted image registries ([sample](https://kyverno.io/policies/best-practices/restrict_image_registries/restrict_image_registries/)).
### References
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/kyverno/kyverno'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.3'}, {'fixed': '1.8.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/kyverno/kyverno/security/advisories/GHSA-m3cq-xcx9-3gvm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-47633'}, {'type': 'WEB', 'url': 'https://github.com/kyverno/kyverno/pull/5713'}, {'type': 'PACKAGE', 'url': 'https://github.com/kyverno/kyverno'}, {'type': 'WEB', 'url': 'https://github.com/kyverno/kyverno/compare/v1.8.4...v1.8.5'}, {'type': 'WEB', 'url': 'https://github.com/kyverno/kyverno/releases/tag/v1.8.5'}, {'type': 'WEB', 'url': 'https://kyverno.io/docs/writing-policies/verify-images/'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-1180'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20230426095744/https://kyverno.io/policies/best-practices/restrict_image_registries/restrict_image_registries/'}] | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T17:24:10Z', 'nvd_published_at': '2022-12-23T23:15:00Z'} |
1.4.0 | GHSA-5x79-w82f-gw8w | 2022-12-13T17:43:02Z | 2022-12-13T17:43:02Z | null | ['CVE-2022-23517'] | Inefficient Regular Expression Complexity in rails-html-sanitizer | ## Summary
Certain configurations of rails-html-sanitizer `< 1.4.4` use an inefficient regular expression that is susceptible to excessive backtracking when attempting to sanitize certain SVG attributes. This may lead to a denial of service through CPU resource consumption.
## Mitigation
Upgrade to rails-html-sanitizer `>= 1.4.4`.
## Severity
The maintainers have evaluated this as [High Severity 7.5 (CVSS3.1)](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
## References
- [CWE - CWE-1333: Inefficient Regular Expression Complexity (4.9)](https://cwe.mitre.org/data/definitions/1333.html)
- https://hackerone.com/reports/1684163
## Credit
This vulnerability was responsibly reported by @ooooooo-q (https://github.com/ooooooo-q).
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rails-html-sanitizer'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-5x79-w82f-gw8w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23517'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails-html-sanitizer/commit/56c61c0cebd1e493e8ad7bca2a0191609a4a6979'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1684163'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails-html-sanitizer'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails-html-sanitizer/CVE-2022-23517.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/09/msg00012.html'}] | {'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T17:43:02Z', 'nvd_published_at': '2022-12-14T17:15:00Z'} |
1.4.0 | GHSA-mjmj-j48q-9wg2 | 2023-03-03T13:52:50Z | 2022-12-12T21:19:47Z | null | ['CVE-2022-1471'] | SnakeYaml Constructor Deserialization Remote Code Execution | ### Summary
SnakeYaml's `Constructor` class, which inherits from `SafeConstructor`, allows any type be deserialized given the following line:
new Yaml(new Constructor(TestDataClass.class)).load(yamlContent);
Types do not have to match the types of properties in the target class. A `ConstructorException` is thrown, but only after a malicious payload is deserialized.
### Severity
High, lack of type checks during deserialization allows remote code execution.
### Proof of Concept
Execute `bash run.sh`. The PoC uses Constructor to deserialize a payload
for RCE. RCE is demonstrated by using a payload which performs a http request to
http://127.0.0.1:8000.
Example output of successful run of proof of concept:
```
$ bash run.sh
[+] Downloading snakeyaml if needed
[+] Starting mock HTTP server on 127.0.0.1:8000 to demonstrate RCE
nc: no process found
[+] Compiling and running Proof of Concept, which a payload that sends a HTTP request to mock web server.
[+] An exception is expected.
Exception:
Cannot create property=payload for JavaBean=Main$TestDataClass@3cbbc1e0
in 'string', line 1, column 1:
payload: !!javax.script.ScriptEn ...
^
Can not set java.lang.String field Main$TestDataClass.payload to javax.script.ScriptEngineManager
in 'string', line 1, column 10:
payload: !!javax.script.ScriptEngineManag ...
^
at org.yaml.snakeyaml.constructor.Constructor$ConstructMapping.constructJavaBean2ndStep(Constructor.java:291)
at org.yaml.snakeyaml.constructor.Constructor$ConstructMapping.construct(Constructor.java:172)
at org.yaml.snakeyaml.constructor.Constructor$ConstructYamlObject.construct(Constructor.java:332)
at org.yaml.snakeyaml.constructor.BaseConstructor.constructObjectNoCheck(BaseConstructor.java:230)
at org.yaml.snakeyaml.constructor.BaseConstructor.constructObject(BaseConstructor.java:220)
at org.yaml.snakeyaml.constructor.BaseConstructor.constructDocument(BaseConstructor.java:174)
at org.yaml.snakeyaml.constructor.BaseConstructor.getSingleData(BaseConstructor.java:158)
at org.yaml.snakeyaml.Yaml.loadFromReader(Yaml.java:491)
at org.yaml.snakeyaml.Yaml.load(Yaml.java:416)
at Main.main(Main.java:37)
Caused by: java.lang.IllegalArgumentException: Can not set java.lang.String field Main$TestDataClass.payload to javax.script.ScriptEngineManager
at java.base/jdk.internal.reflect.UnsafeFieldAccessorImpl.throwSetIllegalArgumentException(UnsafeFieldAccessorImpl.java:167)
at java.base/jdk.internal.reflect.UnsafeFieldAccessorImpl.throwSetIllegalArgumentException(UnsafeFieldAccessorImpl.java:171)
at java.base/jdk.internal.reflect.UnsafeObjectFieldAccessorImpl.set(UnsafeObjectFieldAccessorImpl.java:81)
at java.base/java.lang.reflect.Field.set(Field.java:780)
at org.yaml.snakeyaml.introspector.FieldProperty.set(FieldProperty.java:44)
at org.yaml.snakeyaml.constructor.Constructor$ConstructMapping.constructJavaBean2ndStep(Constructor.java:286)
... 9 more
[+] Dumping Received HTTP Request. Will not be empty if PoC worked
GET /proof-of-concept HTTP/1.1
User-Agent: Java/11.0.14
Host: localhost:8000
Accept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2
Connection: keep-alive
```
### Further Analysis
Potential mitigations include, leveraging SnakeYaml's SafeConstructor while parsing untrusted content.
See https://bitbucket.org/snakeyaml/snakeyaml/issues/561/cve-2022-1471-vulnerability-in#comment-64581479 for discussion on the subject.
A fix was released in version 2.0. See https://bitbucket.org/snakeyaml/snakeyaml/issues/561/cve-2022-1471-vulnerability-in#comment-64876314 for more information.
### Timeline
**Date reported**: 4/11/2022
**Date fixed**:
**Date disclosed**: 10/13/2022 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.yaml:snakeyaml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.33'}}] | [{'type': 'WEB', 'url': 'https://github.com/google/security-research/security/advisories/GHSA-mjmj-j48q-9wg2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1471'}, {'type': 'PACKAGE', 'url': 'https://bitbucket.org/snakeyaml/snakeyaml'}, {'type': 'WEB', 'url': 'https://bitbucket.org/snakeyaml/snakeyaml/commits/5014df1a36f50aca54405bb8433bc99a8847f758'}, {'type': 'WEB', 'url': 'https://bitbucket.org/snakeyaml/snakeyaml/commits/acc44099f5f4af26ff86b4e4e4cc1c874e2dc5c4'}, {'type': 'WEB', 'url': 'https://bitbucket.org/snakeyaml/snakeyaml/issues/561/cve-2022-1471-vulnerability-in#comment-64581479'}, {'type': 'WEB', 'url': 'https://bitbucket.org/snakeyaml/snakeyaml/issues/561/cve-2022-1471-vulnerability-in#comment-64634374'}, {'type': 'WEB', 'url': 'https://bitbucket.org/snakeyaml/snakeyaml/issues/561/cve-2022-1471-vulnerability-in#comment-64876314'}, {'type': 'WEB', 'url': 'https://bitbucket.org/snakeyaml/snakeyaml/wiki/CVE-2022-1471'}, {'type': 'WEB', 'url': 'https://github.com/mbechler/marshalsec'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/kubernetes-security-announce/c/mwrakFaEdnc'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230818-0015/'}, {'type': 'WEB', 'url': 'https://snyk.io/blog/unsafe-deserialization-snakeyaml-java-cve-2022-1471/'}, {'type': 'WEB', 'url': 'https://www.github.com/mbechler/marshalsec/blob/master/marshalsec.pdf?raw=true'}] | {'cwe_ids': ['CWE-20', 'CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T21:19:47Z', 'nvd_published_at': '2022-12-01T11:15:00Z'} |
1.4.0 | GHSA-m5v8-wpw4-rj3x | 2022-12-21T17:22:43Z | 2022-12-21T06:30:29Z | null | ['CVE-2022-24431'] | abacus-ext-cmdline vulnerable to Command Injection | All versions of package abacus-ext-cmdline are vulnerable to Command Injection via the execute function due to improper user-input sanitization. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'abacus-ext-cmdline'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.6-dev.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24431'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-ABACUSEXTCMDLINE-3157950'}] | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T17:22:43Z', 'nvd_published_at': '2022-12-21T05:15:00Z'} |
1.4.0 | GHSA-hrm3-3xm6-x33h | 2023-01-10T15:49:55Z | 2022-12-28T00:30:23Z | null | ['CVE-2020-36569'] | golang-nanoauth authentication bypass vulnerability | Authentication is globally bypassed in github.com/nanobox-io/golang-nanoauth between v0.0.0-20160722212129-ac0cc4484ad4 and v0.0.0-20200131131040-063a3fb69896 if ListenAndServe is called with an empty token. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/nanobox-io/golang-nanoauth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0-20160722212129-ac0cc4484ad4'}, {'fixed': '0.0.0-20200131131040-063a3fb69896'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36569'}, {'type': 'WEB', 'url': 'https://github.com/nanobox-io/golang-nanoauth/pull/5'}, {'type': 'WEB', 'url': 'https://github.com/nanobox-io/golang-nanoauth/commit/063a3fb69896acf985759f0fe3851f15973993f3'}, {'type': 'PACKAGE', 'url': 'https://github.com/nanobox-io/golang-nanoauth'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0004'}] | {'cwe_ids': ['CWE-287', 'CWE-305'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T18:54:51Z', 'nvd_published_at': '2022-12-27T22:15:00Z'} |
1.4.0 | GHSA-w57v-6xp4-rm2v | 2023-01-02T20:15:37Z | 2022-12-23T12:30:25Z | null | ['CVE-2022-4689'] | usememos/memos vulnerable to account takeover due to improper access control | usememos/memos is an open-source, self-hosted memo hub with knowledge management and socialization. Versions prior to 0.9.0 improperly maintain access control allowing an attacker to take over an account by changing header values in the HTTP request. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4689'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/pull/831'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/dca35bde877aab6e64ef51b52e590b5d48f692f9'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a78c4326-6e7b-47fe-aa82-461e5c12a4e3'}] | {'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-27T01:57:10Z', 'nvd_published_at': '2022-12-23T12:15:00Z'} |
1.4.0 | GHSA-m8xw-9x5x-6vh3 | 2022-12-09T15:55:22Z | 2022-12-06T21:30:45Z | null | ['CVE-2022-44900'] | py7zr directory traversal vulnerability | A directory traversal vulnerability in the SevenZipFile.extractall() function of the python library py7zr v0.20.0 and earlier allows attackers to write arbitrary files via extracting a crafted 7z file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'py7zr'}, 'ecosystem_specific': {'affected_functions': ['py7zr.py7zr.SevenZipFile.extractall', 'py7zr.py7zr.SevenZipFile._extract', 'py7zr.py7zr.Worker._extract_single', 'py7zr.py7zr.Worker.extract']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.20.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.20.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-44900'}, {'type': 'WEB', 'url': 'https://github.com/miurahr/py7zr/commit/1bb43f17515c7f69673a1c88ab9cc72a7bbef406'}, {'type': 'WEB', 'url': 'https://advisory-inbox.githubapp.com/advisory_reviews/GHSA-m8xw-9x5x-6vh3'}, {'type': 'PACKAGE', 'url': 'https://github.com/miurahr/py7zr'}, {'type': 'WEB', 'url': 'https://lessonsec.com/cve/cve-2022-44900/'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/170127/py7zr-0.20.0-Directory-Traversal.html'}] | {'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T22:34:58Z', 'nvd_published_at': '2022-12-06T20:15:00Z'} |
1.4.0 | GHSA-399p-vq28-5hg8 | 2023-01-10T16:08:01Z | 2022-12-31T12:30:20Z | null | ['CVE-2017-20159'] | keynote Cross-site Scripting vulnerability | A vulnerability was found in rf Keynote up to 0.x. It has been rated as problematic. Affected by this issue is some unknown functionality of the file lib/keynote/rumble.rb. The manipulation of the argument value leads to cross site scripting. The attack may be launched remotely. Upgrading to version 1.0.0 can address this issue. The name of the patch is 05be4356b0a6ca7de48da926a9b997beb5ffeb4a. It is recommended to upgrade the affected component. VDB-217142 is the identifier assigned to this vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'keynote'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-20159'}, {'type': 'WEB', 'url': 'https://github.com/rf-/keynote/commit/05be4356b0a6ca7de48da926a9b997beb5ffeb4a'}, {'type': 'PACKAGE', 'url': 'https://github.com/rf-/keynote'}, {'type': 'WEB', 'url': 'https://github.com/rf-/keynote/releases/tag/v1.0.0'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/keynote/CVE-2017-20159.yml'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217142'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217142'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-04T14:24:55Z', 'nvd_published_at': '2022-12-31T11:15:00Z'} |
1.4.0 | GHSA-3v6v-2x6p-32mc | 2022-12-19T21:09:48Z | 2022-12-13T18:30:34Z | null | ['CVE-2022-4223'] | pgadmin4 vulnerable to Code Injection | The pgAdmin server includes an HTTP API that is intended to be used to validate the path a user selects to external PostgreSQL utilities such as pg_dump and pg_restore. The utility is executed by the server to determine what PostgreSQL version it is from. Versions of pgAdmin prior to 6.17 failed to properly secure this API, which could allow an unauthenticated user to call it with a path of their choosing, such as a UNC path to a server they control on a Windows machine. This would cause an appropriately named executable in the target path to be executed by the pgAdmin server. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pgadmin4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.17'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4223'}, {'type': 'WEB', 'url': 'https://github.com/pgadmin-org/pgadmin4/issues/5593'}, {'type': 'PACKAGE', 'url': 'https://github.com/pgadmin-org/pgadmin4'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R5EYTPKHVFSDCETBJI7LBZE4EYHBPN2Q/'}] | {'cwe_ids': ['CWE-862', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-19T21:09:48Z', 'nvd_published_at': '2022-12-13T16:15:00Z'} |
1.4.0 | GHSA-jw6x-4h8h-569x | 2022-12-21T16:12:56Z | 2022-12-15T21:30:26Z | null | ['CVE-2022-4524'] | Roots Soil plugin vulnerable to Cross-site Scripting | A vulnerability, which was classified as problematic, was found in Roots soil Plugin up to 4.1.0. Affected is the function language_attributes of the file src/Modules/CleanUpModule.php. The manipulation of the argument language leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 4.1.1 is able to address this issue. The name of the patch is 0c9151e00ab047da253e5cdbfccb204dd423269d. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-215904. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'roots/soil'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4524'}, {'type': 'WEB', 'url': 'https://github.com/roots/soil/pull/285'}, {'type': 'WEB', 'url': 'https://github.com/roots/soil/commit/0c9151e00ab047da253e5cdbfccb204dd423269d'}, {'type': 'PACKAGE', 'url': 'https://github.com/roots/soil'}, {'type': 'WEB', 'url': 'https://github.com/roots/soil/releases/tag/4.1.0'}, {'type': 'WEB', 'url': 'https://github.com/roots/soil/releases/tag/4.1.1'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.215904'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T23:28:07Z', 'nvd_published_at': '2022-12-15T21:15:00Z'} |
1.4.0 | GHSA-p82q-rxpm-hjpc | 2022-12-21T19:26:02Z | 2022-12-21T18:48:22Z | null | ['CVE-2022-23551'] | AAD Pod Identity obtaining token with backslash | ### Impact
_What kind of vulnerability is it? Who is impacted?_
The [NMI](https://azure.github.io/aad-pod-identity/docs/concepts/nmi/) component in AAD Pod Identity intercepts and validates token requests based on regex. In this case, a token request made with backslash in the request (example: `/metadata/identity\oauth2\token/`) would bypass the NMI validation and be sent to [IMDS](https://learn.microsoft.com/en-us/azure/virtual-machines/windows/instance-metadata-service?tabs=windows) allowing a pod in the cluster to access identities that it shouldn't have access to.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
- We analyzed this bug and determined that we needed to fix it. This fix has been included in AAD Pod Identity release [v1.8.13](https://github.com/Azure/aad-pod-identity/releases/tag/v1.8.13)
- If using the [AKS pod-managed identities add-on](https://learn.microsoft.com/en-us/azure/aks/use-azure-ad-pod-identity), no action is required. The clusters should now be running the `v1.8.13` release.
### For more information
If you have any questions or comments about this advisory:
Open an issue in [Azure/aad-pod-identity](https://github.com/Azure/aad-pod-identity)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:H/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/Azure/aad-pod-identity'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.13'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Azure/aad-pod-identity/security/advisories/GHSA-p82q-rxpm-hjpc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23551'}, {'type': 'WEB', 'url': 'https://github.com/Azure/aad-pod-identity/commit/7e01970391bde6c360d077066ca17d059204cb5d'}, {'type': 'PACKAGE', 'url': 'https://github.com/Azure/aad-pod-identity'}, {'type': 'WEB', 'url': 'https://github.com/Azure/aad-pod-identity/releases/tag/v1.8.13'}] | {'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T18:48:22Z', 'nvd_published_at': '2022-12-21T20:15:00Z'} |
1.4.0 | GHSA-6rmf-cv6p-4h27 | 2022-12-22T19:53:24Z | 2022-12-17T15:30:23Z | null | ['CVE-2022-4589'] | Terms and Conditions Module vulnerable to Open Redirect | A vulnerability has been found in cyface Terms and Conditions Module up to 2.0.10 and classified as problematic. Affected by this vulnerability is the function returnTo of the file termsandconditions/views.py. The manipulation leads to open redirect. The attack can be launched remotely. Upgrading to version 2.0.11 can address this issue. The name of the patch is 03396a1c2e0af95e12a45c5faef7e47a4b513e1a. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216175. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django-termsandconditions'}, 'ecosystem_specific': {'affected_functions': ['termsandconditions.views.GetTermsViewMixin.get_return_to', 'termsandconditions.views.GetTermsViewMixin.is_safe_url', 'termsandconditions.views.AcceptTermsView.get_initial', 'termsandconditions.views.AcceptTermsView.post', 'termsandconditions.views.EmailTermsView.get_initial', 'termsandconditions.views.EmailTermsView.form_valid']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4589'}, {'type': 'WEB', 'url': 'https://github.com/cyface/django-termsandconditions/pull/239'}, {'type': 'WEB', 'url': 'https://github.com/cyface/django-termsandconditions/commit/03396a1c2e0af95e12a45c5faef7e47a4b513e1a'}, {'type': 'PACKAGE', 'url': 'https://github.com/cyface/django-termsandconditions'}, {'type': 'WEB', 'url': 'https://github.com/cyface/django-termsandconditions/releases/tag/v2.0.10'}, {'type': 'WEB', 'url': 'https://github.com/cyface/django-termsandconditions/releases/tag/v2.0.11'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.216175'}] | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-19T18:14:46Z', 'nvd_published_at': '2022-12-17T13:15:00Z'} |
1.4.0 | GHSA-jfp7-79g7-89rf | 2022-12-13T17:04:02Z | 2022-12-13T17:04:02Z | null | ['CVE-2022-23501'] | TYPO3 CMS vulnerable to Weak Authentication in Frontend Login | ### Problem
Restricting frontend login to specific users, organized in different storage folders (partitions), can be bypassed. A potential attacker might use this ambiguity in usernames to get access to a different account - however, credentials must be known to the adversary.
### Solution
Update to TYPO3 versions 8.7.49 ELTS, 9.5.38 ELTS, 10.4.33, 11.5.20, 12.1.1 that fix the problem described above.
### References
* [TYPO3-CORE-SA-2022-013](https://typo3.org/security/advisory/typo3-core-sa-2022-013)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.7.49'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.38'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.33'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.5.20'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0.0'}, {'fixed': '12.1.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.33'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.5.20'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0.0'}, {'fixed': '12.1.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-jfp7-79g7-89rf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23501'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/commit/28be9cdb3fed02ce4cfc6fa2d39f7d8e2266eced'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2022-23501.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2022-23501.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3/typo3'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2022-013'}] | {'cwe_ids': ['CWE-287', 'CWE-302'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T17:04:02Z', 'nvd_published_at': '2022-12-14T08:15:00Z'} |
1.4.0 | GHSA-hggr-p7v6-73p5 | 2022-12-30T00:57:23Z | 2022-12-28T00:30:23Z | null | ['CVE-2020-36568'] | revel is vulnerable to resource exhaustion | Unsanitized input in the query parser in github.com/revel/revel before v1.0.0 allows remote attackers to cause resource exhaustion via memory allocation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/revel/revel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36568'}, {'type': 'WEB', 'url': 'https://github.com/revel/revel/issues/1424'}, {'type': 'WEB', 'url': 'https://github.com/revel/revel/pull/1427'}, {'type': 'WEB', 'url': 'https://github.com/revel/revel/commit/d160ecb72207824005b19778594cbdc272e8a605'}, {'type': 'PACKAGE', 'url': 'https://github.com/revel/revel'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0003'}] | {'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T00:57:23Z', 'nvd_published_at': '2022-12-27T22:15:00Z'} |
1.4.0 | GHSA-mq5q-gpgv-pwxw | 2023-01-10T15:41:58Z | 2022-12-28T15:30:46Z | null | ['CVE-2022-4805'] | usememos/memos Incorrect Use of Privileged APIs vulnerability | In usememos/memos 0.9.0 and prior, a user can archive any private memos, delete any shortcut, and edit any shortcut from other users via API. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4805'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b03f6a9b-e49b-42d6-a318-1d7afd985873'}] | {'cwe_ids': ['CWE-648'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T19:58:45Z', 'nvd_published_at': '2022-12-28T14:15:00Z'} |
1.4.0 | GHSA-h4q8-96p6-jcgr | 2022-12-19T22:48:32Z | 2022-12-19T22:48:32Z | null | ['CVE-2022-39304'] | ghinstallation returns app JWT in error responses | ### Impact
In ghinstallation v1, when the request to refresh an installation token failed, the HTTP request and response would be returned for debugging.
https://github.com/bradleyfalzon/ghinstallation/blob/24e56b3fb7669f209134a01eff731d7e2ef72a5c/transport.go#L172-L174
The request contained the bearer JWT for the App, and was returned back to clients. This token is short lived (10 minute maximum).
### Patches
- This has already been patched in d24f14f8be70d94129d76026e8b0f4f9170c8c3e, and is available in releases >= v2.0.0.
### References
_Are there any links users can visit to find out more?_
- See https://docs.github.com/en/developers/apps/building-github-apps/authenticating-with-github-apps#authenticating-as-an-installation for the App installation flow.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [ghinstallation](https://github.com/bradleyfalzon/ghinstallation)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/bradleyfalzon/ghinstallation'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/bradleyfalzon/ghinstallation/security/advisories/GHSA-h4q8-96p6-jcgr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39304'}, {'type': 'WEB', 'url': 'https://github.com/bradleyfalzon/ghinstallation/commit/d24f14f8be70d94129d76026e8b0f4f9170c8c3e'}, {'type': 'WEB', 'url': 'https://docs.github.com/en/developers/apps/building-github-apps/authenticating-with-github-apps#authenticating-as-an-installation'}, {'type': 'PACKAGE', 'url': 'https://github.com/bradleyfalzon/ghinstallation'}, {'type': 'WEB', 'url': 'https://github.com/bradleyfalzon/ghinstallation/blob/24e56b3fb7669f209134a01eff731d7e2ef72a5c/transport.go#L172-L174'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-1178'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2022-061_ghinstallation/'}] | {'cwe_ids': ['CWE-209'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-19T22:48:32Z', 'nvd_published_at': '2022-12-20T20:15:00Z'} |
1.4.0 | GHSA-8r76-fr72-j32w | 2022-12-12T22:02:42Z | 2022-12-12T22:02:42Z | null | [] | Creator Verification Error when Bubblegum Activate | This was an error found by @metamania01 of the Audit Company Solshield.
It allowed one to verify a creator that did not sign by making use of a provision in Token Metadata that allows Creators who have signed compressed nfts to allow them to decompress with verified creators.
The issue is now patched.
For more info see.
https://twitter.com/thehasheddude/status/1601642138143375360 | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'mpl-bubblegum'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.0'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'mpl-token-metadata'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.6.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/metaplex-foundation/metaplex-program-library/security/advisories/GHSA-8r76-fr72-j32w'}, {'type': 'WEB', 'url': 'https://github.com/metaplex-foundation/metaplex-program-library/commit/c18591a7ce9bb561940cb94df4b7c35ef9cc0f57'}, {'type': 'PACKAGE', 'url': 'https://github.com/metaplex-foundation/metaplex-program-library'}, {'type': 'WEB', 'url': 'https://twitter.com/thehasheddude/status/1601642138143375360'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T22:02:42Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x39j-h85h-3f46 | 2022-12-09T15:21:18Z | 2022-12-08T16:12:26Z | null | ['CVE-2022-23495'] | go-merkledag's ProtoNode may be modified such that common method calls may panic | ### Impact
A `ProtoNode` may be modified in such a way as to cause various encode errors which will trigger a panic on common method calls that don't allow for error returns.
A `ProtoNode` should only be able to encode to valid DAG-PB, attempting to encode invalid DAG-PB forms will result in an error from the codec. Manipulation of an existing (newly created or decoded) `ProtoNode` using the modifier methods did not account for certain states that would place the `ProtoNode` into an unencodeable form.
Due to conformance with the [`github.com/ipfs/go-block-format#Block`](https://pkg.go.dev/github.com/ipfs/go-block-format#Block) and [`github.com/ipfs/go-ipld-format#Node`](https://pkg.go.dev/github.com/ipfs/go-ipld-format#Node) interfaces, certain methods, which internally require a re-encode if state has changed, will panic due to the inability to return an error.
Additionally, use of the `ProtoNode#SetCidBuilder()` method to set a non-functioning `CidBuilder` (such as one that refers to a multihash where an implementation of that hash function is not available) may cause the same methods to panic as a new CID is required but cannot be created.
### Patches
Releases involving fixes for this issue are [v0.8.0](https://github.com/ipfs/go-merkledag/releases/tag/v0.8.0) and [v0.8.1](https://github.com/ipfs/go-merkledag/releases/tag/v0.8.1). The recommended minimum version is **v0.8.1**.
* Additional checks are performed on `ProtoNode` state changes to avoid the possibility of creating unencodeable forms, errors are returned where this is the case.
* The builder passed in to `SetCidBuilder()` is inspected to attempt to determine if it is usable to generate CIDs, otherwise an error is returned.
* The panics have been removed and replaced with default values (empty byte slice for `RawData()` and a default zero-bytes DAG-PB CID for methods involving CIDs).
### Workarounds
These workarounds are available when using impacted versions to avoid panic conditions, and may be generally appropriate in order to provide meaningful feedback to users and avoid generating bad, or unexpected encoded data:
* Sanitise inputs when allowing user-input to set a new `CidBuilder` on a `ProtoNode`.
* Sanitise `Tsize` (`Link#Size`) values such that they are a reasonable byte-size for sub-DAGs where derived from user-input.
### References
* https://github.com/ipfs/kubo/issues/9297
* https://github.com/ipfs/go-merkledag/issues/90
* https://github.com/ipfs/go-merkledag/releases/tag/v0.8.0
* https://github.com/ipfs/go-merkledag/pull/91
* https://github.com/ipfs/go-merkledag/pull/92
* https://github.com/ipfs/go-merkledag/pull/93
* https://github.com/ipfs/go-merkledag/releases/tag/v0.8.1
### Credit
Thanks to [@mrd0ll4r](https://github.com/mrd0ll4r) for reporting the original error to Kubo! | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/ipfs/go-merkledag'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.0'}, {'fixed': '0.8.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ipfs/go-merkledag/security/advisories/GHSA-x39j-h85h-3f46'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23495'}, {'type': 'WEB', 'url': 'https://github.com/ipfs/go-merkledag/issues/90'}, {'type': 'WEB', 'url': 'https://github.com/ipfs/kubo/issues/9297'}, {'type': 'WEB', 'url': 'https://github.com/ipfs/go-merkledag/pull/91'}, {'type': 'WEB', 'url': 'https://github.com/ipfs/go-merkledag/pull/92'}, {'type': 'WEB', 'url': 'https://github.com/ipfs/go-merkledag/pull/93'}, {'type': 'WEB', 'url': 'https://en.wikipedia.org/wiki/Directed_acyclic_graph'}, {'type': 'PACKAGE', 'url': 'https://github.com/ipfs/go-merkledag'}, {'type': 'WEB', 'url': 'https://github.com/ipfs/go-merkledag/releases/tag/v0.8.0'}, {'type': 'WEB', 'url': 'https://github.com/ipfs/go-merkledag/releases/tag/v0.8.1'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-1155'}] | {'cwe_ids': ['CWE-252', 'CWE-755'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-08T16:12:26Z', 'nvd_published_at': '2022-12-08T22:15:00Z'} |
1.4.0 | GHSA-rmj9-q58g-9qgg | 2023-01-10T15:55:39Z | 2022-12-28T00:30:23Z | null | ['CVE-2020-36560'] | go-unzip vulnerable to Path Traversal | Due to improper path santization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/artdarek/go-unzip'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36560'}, {'type': 'WEB', 'url': 'https://github.com/artdarek/go-unzip/pull/2'}, {'type': 'WEB', 'url': 'https://github.com/artdarek/go-unzip/commit/4975cbe0a719dc50b12da8585f1f207c82f7dfe0'}, {'type': 'PACKAGE', 'url': 'https://github.com/artdarek/go-unzip'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0034'}, {'type': 'WEB', 'url': 'https://snyk.io/research/zip-slip-vulnerability'}] | {'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T19:06:21Z', 'nvd_published_at': '2022-12-27T22:15:00Z'} |
1.4.0 | GHSA-gp5f-gqgq-7254 | 2022-12-20T21:55:36Z | 2022-12-15T21:30:26Z | null | ['CVE-2022-4521'] | WSO2 carbon-registry vulnerable to Cross-site Scripting | A vulnerability classified as problematic has been found in WSO2 carbon-registry before 4.8.7. This affects an unknown part of the component Request Parameter Handler. The manipulation of the argument parentPath/path/username/path/profile_menu leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 4.8.7 or later will address this issue. The name of the patch is 9f967abfde9317bee2cda469dbc09b57d539f2cc. It is recommended to upgrade the affected component. The identifier VDB-215901 was assigned to this vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.wso2.carbon.registry:carbon-registry'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.8.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4521'}, {'type': 'WEB', 'url': 'https://github.com/wso2/carbon-registry/pull/399'}, {'type': 'WEB', 'url': 'https://github.com/wso2/carbon-registry/commit/9f967abfde9317bee2cda469dbc09b57d539f2cc'}, {'type': 'PACKAGE', 'url': 'https://github.com/wso2/carbon-registry'}, {'type': 'WEB', 'url': 'https://github.com/wso2/carbon-registry/releases/tag/v4.8.12'}, {'type': 'WEB', 'url': 'https://github.com/wso2/carbon-registry/releases/tag/v4.8.7'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.215901'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T23:28:37Z', 'nvd_published_at': '2022-12-15T21:15:00Z'} |
1.4.0 | GHSA-87mm-qxm5-cp3f | 2022-12-29T00:34:38Z | 2022-12-28T03:30:28Z | null | ['CVE-2022-3346'] | go-resolver vulnerable to attacker-controlled domains due to unvalidated RRSIG RRs | go-resolver's DNSSEC validation is not performed correctly. An attacker can cause this package to report successful validation for invalid, attacker-controlled records. The owner name of RRSIG RRs is not validated, permitting an attacker to present the RRSIG for an attacker-controlled domain in a response for any other domain. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/peterzen/goresolver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3346'}, {'type': 'WEB', 'url': 'https://github.com/peterzen/goresolver/issues/5'}, {'type': 'PACKAGE', 'url': 'https://github.com/peterzen/goresolver'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0979'}] | {'cwe_ids': ['CWE-345'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-29T00:34:38Z', 'nvd_published_at': '2022-12-28T03:15:00Z'} |
1.4.0 | GHSA-g8q8-fggx-9r3q | 2023-01-25T21:37:00Z | 2022-12-13T19:44:56Z | null | ['CVE-2022-3782'] | Keycloak vulnerable to path traversal via double URL encoding | Keycloak does not properly validate URLs included in a redirect. An attacker could construct a malicious request to bypass validation and access other URLs and potentially sensitive information within the domain, or possibly conduct further attacks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20.0.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 20.0.0'}}] | [{'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/security/advisories/GHSA-g8q8-fggx-9r3q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3782'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/pull/15982/commits/1987c942f527b9f3bbf2a86ba71ba8ae0154ac37'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2022-3782'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}] | {'cwe_ids': ['CWE-177', 'CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T19:44:56Z', 'nvd_published_at': '2023-01-13T06:15:00Z'} |
1.4.0 | GHSA-xrjj-mj9h-534m | 2023-01-18T00:05:16Z | 2022-12-08T21:30:19Z | null | ['CVE-2022-41717'] | golang.org/x/net/http2 vulnerable to possible excessive memory growth | An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'golang.org/x/net/http2'}, 'ecosystem_specific': {'affected_functions': ['Server.ServeConn']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41717'}, {'type': 'PACKAGE', 'url': 'https://cs.opensource.google/go/x/net'}, {'type': 'WEB', 'url': 'https://go.dev/cl/455635'}, {'type': 'WEB', 'url': 'https://go.dev/cl/455717'}, {'type': 'WEB', 'url': 'https://go.dev/issue/56350'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-1144'}] | {'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-18T00:05:16Z', 'nvd_published_at': '2022-12-08T20:15:00Z'} |
1.4.0 | GHSA-7rf3-mqpx-h7xg | 2023-01-04T14:27:01Z | 2022-12-13T15:30:26Z | null | ['CVE-2022-45685'] | Jettison Out-of-bounds Write vulnerability | A stack overflow in Jettison before v1.5.2 allows attackers to cause a Denial of Service (DoS) via crafted JSON data. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.codehaus.jettison:jettison'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45685'}, {'type': 'WEB', 'url': 'https://github.com/jettison-json/jettison/issues/54'}, {'type': 'PACKAGE', 'url': 'https://github.com/jettison-json/jettison'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/12/msg00045.html'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5312'}] | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-04T14:27:01Z', 'nvd_published_at': '2022-12-13T15:15:00Z'} |
1.4.0 | GHSA-rgj5-jj5q-v3v7 | 2022-12-23T21:53:07Z | 2022-12-19T12:30:23Z | null | ['CVE-2022-4609'] | Memos Cross-site Scripting vulnerability | Memos, an open-source, self-hosted memo hub, is vulnerable to stored Cross-site Scripting (XSS) in versions 0.8.3 and prior. A patch is available and anticipated to be part of version 0.9.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.8.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4609'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/726285e63467820f94cbf872abe71025a161c212'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/5b3115c5-776c-43d3-a7be-c8dc13ab81ce'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-19T18:20:07Z', 'nvd_published_at': '2022-12-19T12:15:00Z'} |
1.4.0 | GHSA-r9hx-vwmv-q579 | 2022-12-27T14:51:05Z | 2022-12-23T00:30:23Z | null | ['CVE-2022-40897'] | pypa/setuptools vulnerable to Regular Expression Denial of Service (ReDoS) | Python Packaging Authority (PyPA)'s setuptools is a library designed to facilitate packaging Python projects. Setuptools version 65.5.0 and earlier could allow remote attackers to cause a denial of service by fetching malicious HTML from a PyPI package or custom PackageIndex page due to a vulnerable Regular Expression in `package_index`. This has been patched in version 65.5.1. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'setuptools'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '65.5.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40897'}, {'type': 'WEB', 'url': 'https://github.com/pypa/setuptools/issues/3659'}, {'type': 'WEB', 'url': 'https://github.com/pypa/setuptools/commit/43a9c9bfa6aa626ec2a22540bea28d2ca77964be'}, {'type': 'PACKAGE', 'url': 'https://github.com/pypa/setuptools/'}, {'type': 'WEB', 'url': 'https://github.com/pypa/setuptools/blob/fe8a98e696241487ba6ac9f91faa38ade939ec5d/setuptools/package_index.py#L200'}, {'type': 'WEB', 'url': 'https://github.com/pypa/setuptools/compare/v65.5.0...v65.5.1'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ADES3NLOE5QJKBLGNZNI2RGVOSQXA37R/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YNA2BAH2ACBZ4TVJZKFLCR7L23BG5C3H/'}, {'type': 'WEB', 'url': 'https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/'}, {'type': 'WEB', 'url': 'https://pyup.io/vulnerabilities/CVE-2022-40897/52495/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230214-0001/'}, {'type': 'WEB', 'url': 'https://setuptools.pypa.io/en/latest/'}] | {'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-27T14:51:05Z', 'nvd_published_at': '2022-12-23T00:15:00Z'} |
1.4.0 | GHSA-j82x-fh8h-326g | 2023-01-09T21:59:35Z | 2022-12-31T12:30:20Z | null | ['CVE-2017-20158'] | Yii2 FileAPI Widget vulnerable to Cross-site Scripting | A vulnerability was found in vova07 Yii2 FileAPI Widget up to 0.1.8. It has been declared as problematic. Affected by this vulnerability is the function run of the file actions/UploadAction.php. The manipulation of the argument file leads to cross site scripting. The attack can be launched remotely. Upgrading to version 0.1.9 can address this issue. The name of the patch is c00d1e4fc912257fca1fce66d7a163bdbb4c8222. It is recommended to upgrade the affected component. The identifier VDB-217141 was assigned to this vulnerability.
NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'vova07/yii2-fileapi-widget'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-20158'}, {'type': 'WEB', 'url': 'https://github.com/vova07/yii2-fileapi-widget/commit/c00d1e4fc912257fca1fce66d7a163bdbb4c8222'}, {'type': 'PACKAGE', 'url': 'https://github.com/vova07/yii2-fileapi-widget'}, {'type': 'WEB', 'url': 'https://github.com/vova07/yii2-fileapi-widget/releases/tag/0.1.9'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217141'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217141'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T21:59:35Z', 'nvd_published_at': '2022-12-31T11:15:00Z'} |
1.4.0 | GHSA-4jv9-3563-23j3 | 2023-01-08T15:23:32Z | 2022-12-19T09:30:23Z | null | ['CVE-2016-20018'] | Knex.js has a limited SQL injection vulnerability | Knex Knex.js through 2.3.0 has a limited SQL injection vulnerability that can be exploited to ignore the WHERE clause of a SQL query. This vulnerability has been fixed in version 2.4.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'knex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-20018'}, {'type': 'WEB', 'url': 'https://github.com/knex/knex/issues/1227'}, {'type': 'PACKAGE', 'url': 'https://github.com/knex/knex'}, {'type': 'WEB', 'url': 'https://github.com/knex/knex/releases/tag/2.4.0'}, {'type': 'WEB', 'url': 'https://www.ghostccamm.com/blog/knex_sqli/'}] | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T17:19:47Z', 'nvd_published_at': '2022-12-19T09:15:00Z'} |
1.4.0 | GHSA-rf3g-v8p5-p675 | 2022-12-05T23:06:14Z | 2022-12-05T23:06:14Z | null | ['CVE-2022-46164'] | NodeBB vulnerable to account takeover via prototype vulnerability | ### Impact
Due to a plain object with a prototype being used in socket.io message handling a specially crafted payload can be used to impersonate other users and takeover accounts.
### Patches
Patched in 2.6.1
### Workarounds
Site maintainers can cherry-pick https://github.com/NodeBB/NodeBB/commit/48d143921753914da45926cca6370a92ed0c46b8 into their codebase to patch the exploit.
### For more information
If you have any questions or comments about this advisory:
Discuss it on [our community forum](https://github.com/NodeBB/NodeBB/security/advisories/community.nodebb.org/)
Email us at [support@nodebb.org](mailto:support@nodebb.org)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'nodebb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/security/advisories/GHSA-rf3g-v8p5-p675'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46164'}, {'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/commit/48d143921753914da45926cca6370a92ed0c46b8'}, {'type': 'PACKAGE', 'url': 'https://github.com/NodeBB/NodeBB'}, {'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/releases/tag/v2.6.1'}] | {'cwe_ids': ['CWE-665'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-05T23:06:14Z', 'nvd_published_at': '2022-12-05T21:15:00Z'} |
1.4.0 | GHSA-cp9c-phxx-55xm | 2022-12-12T22:08:01Z | 2022-12-11T15:30:45Z | null | ['CVE-2022-4407'] | phpMyFAQ vulnerable to Cross-site Scripting | phpMyFAQ prior to version 3.1.9 is vulnerable to reflected Cross-site Scripting (XSS). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4407'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/1d73af34bf42764f9f9491c7ba5e9495d70e3ca5'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpmyfaq'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a1649f43-78c9-4927-b313-36911872a84b'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T22:08:01Z', 'nvd_published_at': '2022-12-11T15:15:00Z'} |
1.4.0 | GHSA-jpf8-h7h7-3ppm | 2023-08-30T11:49:22Z | 2022-12-28T00:30:23Z | null | ['CVE-2020-36566'] | tar-utils Path Traversal vulnerability | Due to improper path sanitization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/whyrusleeping/tar-utils'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20201201191210-20a61371de5b'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36566'}, {'type': 'WEB', 'url': 'https://github.com/whyrusleeping/tar-utils/commit/20a61371de5b51380bbdb0c7935b30b0625ac227'}, {'type': 'PACKAGE', 'url': 'https://github.com/whyrusleeping/tar-utils'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0106'}, {'type': 'WEB', 'url': 'https://snyk.io/research/zip-slip-vulnerability'}] | {'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T19:05:32Z', 'nvd_published_at': '2022-12-27T22:15:00Z'} |
1.4.0 | GHSA-8m3f-g62j-3vx8 | 2023-01-19T00:59:08Z | 2022-12-27T12:30:19Z | null | ['CVE-2021-4287'] | binwalk vulnerable to UNIX Symbolic Link (Symlink) Following | A vulnerability, which was classified as problematic, was found in ReFirm Labs binwalk up to 2.3.2. Affected is an unknown function of the file src/binwalk/modules/extractor.py of the component Archive Extraction Handler. The manipulation leads to symlink following. It is possible to launch the attack remotely. Upgrading to version 2.3.3 can address this issue. The name of the patch is fa0c0bd59b8588814756942fe4cb5452e76c1dcd. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216876. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'binwalk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4287'}, {'type': 'WEB', 'url': 'https://github.com/ReFirmLabs/binwalk/pull/556'}, {'type': 'WEB', 'url': 'https://github.com/ReFirmLabs/binwalk/commit/fa0c0bd59b8588814756942fe4cb5452e76c1dcd'}, {'type': 'PACKAGE', 'url': 'https://github.com/ReFirmLabs/binwalk'}, {'type': 'WEB', 'url': 'https://github.com/ReFirmLabs/binwalk/releases/tag/v2.3.3'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.216876'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.216876'}] | {'cwe_ids': ['CWE-59', 'CWE-61'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T17:48:02Z', 'nvd_published_at': '2022-12-27T11:15:00Z'} |
1.4.0 | GHSA-p228-4mrh-ww7r | 2022-12-30T16:57:11Z | 2022-12-30T16:57:11Z | null | ['CVE-2022-46173'] | Elrond-GO processing: fallback search of SCRs when not found in the main cache | ### Impact
Processing issue, nodes are affected when trying to process a cross-shard relayed transaction with a smart contract deploy transaction data. The problem was a bad correlation between the transaction caches and the processing component. If the above-mentioned transaction was sent with more gas than required, the smart contract result (SCR transaction) that should have returned the leftover gas, would have been wrongly added to a cache that the processing unit did not consider. The node stopped notarizing metachain blocks. The fix was actually to extend the SCR transaction search in all other caches if it wasn't found in the correct (expected) sharded-cache.
### Patches
All versions >= v1.3.50 will contain this patch
### Workarounds
For the moment there is no workaround
### References
N/A
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [elrond-go main repo](https://github.com/ElrondNetwork/elrond-go)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/ElrondNetwork/elrond-go'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.50'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.48'}}] | [{'type': 'WEB', 'url': 'https://github.com/ElrondNetwork/elrond-go/security/advisories/GHSA-p228-4mrh-ww7r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46173'}, {'type': 'WEB', 'url': 'https://github.com/ElrondNetwork/elrond-go/pull/4718'}, {'type': 'WEB', 'url': 'https://github.com/ElrondNetwork/elrond-go/commit/39d7ddcb08bb34217dab6daef7cd9d287fb8cab3'}, {'type': 'PACKAGE', 'url': 'https://github.com/ElrondNetwork/elrond-go'}] | {'cwe_ids': ['CWE-669'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T16:57:11Z', 'nvd_published_at': '2022-12-28T07:15:00Z'} |
1.4.0 | GHSA-vwg4-846x-f94v | 2023-01-02T20:16:09Z | 2022-12-23T12:30:25Z | null | ['CVE-2022-4688'] | usememos/memos vulnerable to improper authorization | usememos/memos is an open-source, self-hosted memo hub with knowledge management and socialization. Memos versions prior to 0.9.0 are vulnerable to improper authorization, which can allow a user to modify the nickname, username and email of other users without permission. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4688'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/dca35bde877aab6e64ef51b52e590b5d48f692f9'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/23856e7e-94ff-4dee-97d0-0cd47e9b8ff6'}] | {'cwe_ids': ['CWE-285'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-27T01:57:43Z', 'nvd_published_at': '2022-12-23T12:15:00Z'} |
1.4.0 | GHSA-cjcc-46j8-xmr8 | 2022-12-30T22:21:25Z | 2022-12-22T12:30:17Z | null | ['CVE-2020-36625'] | destiny.gg chat vulnerable to cross-site request forgery | ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in destiny.gg chat. It has been rated as problematic. This issue affects the function websocket.Upgrader of the file main.go. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The name of the patch is bebd256fc3063111fb4503ca25e005ebf6e73780. It is recommended to apply a patch to fix this issue. The identifier VDB-216521 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/destinygg/chat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.0-20220628124252-0981d5add8f3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36625'}, {'type': 'WEB', 'url': 'https://github.com/destinygg/chat/pull/35'}, {'type': 'WEB', 'url': 'https://github.com/destinygg/chat/commit/bebd256fc3063111fb4503ca25e005ebf6e73780'}, {'type': 'PACKAGE', 'url': 'https://github.com/destinygg/chat'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.216521'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T22:21:25Z', 'nvd_published_at': '2022-12-22T10:15:00Z'} |
1.4.0 | GHSA-qqff-4vw4-f6hx | 2022-12-05T17:58:16Z | 2022-12-05T17:58:16Z | null | ['CVE-2022-46149'] | Cap'n Proto and its Rust implementation vulnerable to out-of-bounds read due to logic error handling list-of-list | The Cap'n Proto library and capnp Rust package are vulnerable to out-of-bounds read due to logic error handling list-of-list. If a message consumer expects data of type "list of pointers", and if the consumer performs certain specific actions on such data, then a message producer can cause the consumer to read out-of-bounds memory. This could trigger a process crash in the consumer, or in some cases could allow exfiltration of private in-memory data.
Impact
======
- Remotely segfault a peer by sending it a malicious message, if the victim performs certain actions on a list-of-pointer type.
- Possible exfiltration of memory, if the victim performs additional certain actions on a list-of-pointer type.
- To be vulnerable, an application must perform a specific sequence of actions, described below. At present, **we are not aware of any vulnerable application**, but we advise updating regardless.
Fixed in
========
Unfortunately, the bug is present in inlined code, therefore the fix will require rebuilding dependent applications.
C++ fix:
- git commit [25d34c67863fd960af34fc4f82a7ca3362ee74b9][0]
- release 0.11 (future)
- release 0.10.3:
- Unix: https://capnproto.org/capnproto-c++-0.10.3.tar.gz
- Windows: https://capnproto.org/capnproto-c++-win32-0.10.3.zip
- release 0.9.2:
- Unix: https://capnproto.org/capnproto-c++-0.9.2.tar.gz
- Windows: https://capnproto.org/capnproto-c++-win32-0.9.2.zip
- release 0.8.1:
- Unix: https://capnproto.org/capnproto-c++-0.8.1.tar.gz
- Windows: https://capnproto.org/capnproto-c++-win32-0.8.1.zip
- release 0.7.1:
- Unix: https://capnproto.org/capnproto-c++-0.7.1.tar.gz
- Windows: https://capnproto.org/capnproto-c++-win32-0.7.1.zip
- release 0.5.4:
- Unix: https://capnproto.org/capnproto-c++-0.5.4.tar.gz
- Windows: https://capnproto.org/capnproto-c++-win32-0.5.4.zip
Rust fix:
- `capnp` crate version `0.15.2`, `0.14.11`, or `0.13.7`
[0]: https://github.com/capnproto/capnproto/commit/25d34c67863fd960af34fc4f82a7ca3362ee74b9
Details
=======
A specially-crafted pointer could escape bounds checking by exploiting inconsistent handling of pointers when a list-of-structs is downgraded to a list-of-pointers.
For an in-depth explanation of how this bug works, see [David Renshaw's blog post](https://dwrensha.github.io/capnproto-rust/2022/11/30/out_of_bounds_memory_access_bug.html). This details below focus only on determining whether an application is vulnerable.
In order to be vulnerable, an application must have certain properties.
First, the application must accept messages with a schema in which a field has list-of-pointer type. This includes `List(Text)`, `List(Data)`, `List(List(T))`, or `List(C)` where `C` is an interface type. In the following discussion, we will assume this field is named `foo`.
Second, the application must accept a message of this schema from a malicious source, where the attacker can maliciously encode the pointer representing the field `foo`.
Third, the application must call `getFoo()` to obtain a `List<T>::Reader` for the field, and then use it in one of the following two ways:
1. Pass it as the parameter to another message's `setFoo()`, thus copying the field into a new message. Note that copying the parent struct as a whole will *not* trigger the bug; the bug only occurs if the specific field `foo` is get/set on its own.
2. Convert it into `AnyList::Reader`, and then attempt to access it through that. This is much less likely; very few apps use the `AnyList` API.
The dynamic API equivalents of these actions (`capnp/dynamic.h`) are also affected.
If the application does these steps, the attacker may be able to cause the Cap'n Proto implementation to read beyond the end of the message. This could induce a segmentation fault. Or, worse, data that happened to be in memory immediately after the message might be returned as if it were part of the message. In the latter case, if the application then forwards that data back to the attacker or sends it to another third party, this could result in exfiltration of secrets.
Any exfiltration of data would have the following limitations:
* The attacker could exfiltrate no more than 512 KiB of memory immediately following the message buffer.
* The attacker chooses in advance how far past the end of the message to read.
* The attacker's message itself must be larger than the exfiltrated data. Note that a sufficiently large message buffer will likely be allocated using mmap() in which case the attack will likely segfault.
* The attack can only work if the 8 bytes immediately following the exfiltrated data contains a valid in-bounds Cap'n Proto pointer. The easiest way to achieve this is if the pointer is null, i.e. 8 bytes of zero.
* The attacker must specify exactly how much data to exfiltrate, so must guess exactly where such a valid pointer will exist.
* If the exfiltrated data is not followed by a valid pointer, the attack will throw an exception. If an application has chosen to ignore exceptions (e.g. by compiling with `-fno-exceptions` and not registering an alternative exception callback) then the attack may be able to proceed anyway. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:L'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'capnp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.15.0'}, {'fixed': '0.15.2'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'capnp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.14.0'}, {'fixed': '0.14.11'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'capnp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.7'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/capnproto/capnproto/security/advisories/GHSA-qqff-4vw4-f6hx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46149'}, {'type': 'WEB', 'url': 'https://github.com/capnproto/capnproto/commit/25d34c67863fd960af34fc4f82a7ca3362ee74b9'}, {'type': 'WEB', 'url': 'https://dwrensha.github.io/capnproto-rust/2022/11/30/out_of_bounds_memory_access_bug.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/capnproto/capnproto'}, {'type': 'WEB', 'url': 'https://github.com/capnproto/capnproto/tree/master/security-advisories/2022-11-30-0-pointer-list-bounds.md'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EAHKLUMJAXJEV5BPBS5XXWBQ3ZTHGOLY/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTS6TWD6K2NKXLEEFBPROQXMOFUTEYWY/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WKXM4JAFXLTXU5IQB3OUBQVCIICZWGYX/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZOCQQOPMVQOFUWBWAGVGN76OYAV3WXY4/'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0068.html'}] | {'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-05T17:58:16Z', 'nvd_published_at': '2022-11-30T17:15:00Z'} |
1.4.0 | GHSA-rx2m-xr4x-54hh | 2023-01-10T15:46:25Z | 2022-12-28T15:30:45Z | null | ['CVE-2022-4802'] | usememos/memos vulnerable to Improper Authorization | usememos/memos 0.9.0 and prior is vulnerable to Improper Authorization. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4802'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d47d4a94-92e3-4400-b012-a8577cbd7956'}] | {'cwe_ids': ['CWE-285', 'CWE-639'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T19:58:02Z', 'nvd_published_at': '2022-12-28T14:15:00Z'} |
1.4.0 | GHSA-4r9h-x77w-mffv | 2022-12-21T17:23:08Z | 2022-12-15T21:30:26Z | null | ['CVE-2022-4527'] | collective.task Cross-site Scripting vulnerability | A vulnerability was found in collective.task up to 3.0.9. It has been classified as problematic. This affects the function renderCell/AssignedGroupColumn of the file src/collective/task/browser/table.py. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 3.0.10 is able to address this issue. The name of the patch is 1aac7f83fa2c2b41d59ba02748912953461f3fac. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-215907. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'collective.task'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4527'}, {'type': 'WEB', 'url': 'https://github.com/collective/collective.task/commit/1aac7f83fa2c2b41d59ba02748912953461f3fac'}, {'type': 'PACKAGE', 'url': 'https://github.com/collective/collective.task'}, {'type': 'WEB', 'url': 'https://github.com/collective/collective.task/releases/tag/3.0.9'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.215907'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T17:23:08Z', 'nvd_published_at': '2022-12-15T21:15:00Z'} |
1.4.0 | GHSA-6cq5-8cj7-g558 | 2022-12-29T21:31:13Z | 2022-12-22T20:01:18Z | null | ['CVE-2022-46170'] | CodeIgniter4 Potential Session Handlers Vulnerability | ### Impact
When an application uses (1) multiple session cookies (e.g., one for user pages and one for admin pages) and (2) a session handler is set to `DatabaseHandler`, `MemcachedHandler`, or `RedisHandler`, then if an attacker gets one session cookie (e.g., one for user pages), they may be able to access pages that require another session cookie (e.g., for admin pages).
### Patches
Upgrade to version 4.2.11 or later.
### Workarounds
- Use only one session cookie.
### References
- https://codeigniter4.github.io/userguide/libraries/sessions.html#session-drivers
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [codeigniter4/CodeIgniter4](https://github.com/codeigniter4/CodeIgniter4/issues)
* Email us at [SECURITY.md](https://github.com/codeigniter4/CodeIgniter4/blob/develop/SECURITY.md)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'codeigniter4/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.11'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/codeigniter4/CodeIgniter4/security/advisories/GHSA-6cq5-8cj7-g558'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46170'}, {'type': 'WEB', 'url': 'https://github.com/codeigniter4/CodeIgniter4/commit/f9fb6574fbeb5a4aa63f7ea87296523e10db9328'}, {'type': 'WEB', 'url': 'https://codeigniter4.github.io/userguide/libraries/sessions.html#session-drivers'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/codeigniter4/framework/CVE-2022-46170.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/codeigniter4/CodeIgniter4'}] | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T20:01:18Z', 'nvd_published_at': '2022-12-22T19:15:00Z'} |
1.4.0 | GHSA-8w5q-5fpq-v4pm | 2023-01-10T16:02:49Z | 2022-12-31T09:30:42Z | null | ['CVE-2022-4865'] | usememos/memos Cross-site Scripting vulnerability | Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.1. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4865'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/7670c9536000bb32c6345d4906a91268dcddd5fc'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/cd8765a2-bf28-4019-8647-882ccf63b2be'}] | {'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-04T15:19:12Z', 'nvd_published_at': '2022-12-31T09:15:00Z'} |
1.4.0 | GHSA-qw36-rw5q-gxcq | 2023-01-10T15:47:06Z | 2022-12-28T15:30:45Z | null | ['CVE-2022-4804'] | usememos/memos Improper Authorization vulnerability | usememos/memos 0.9.0 and prior is vulnerable to Improper Authorization. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4804'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/4ee48a1e-6332-4d95-a360-9c392643c533'}] | {'cwe_ids': ['CWE-285'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T19:58:34Z', 'nvd_published_at': '2022-12-28T14:15:00Z'} |
1.4.0 | GHSA-c8jh-vcjh-fx2w | 2023-01-02T17:03:13Z | 2022-12-23T12:30:25Z | null | ['CVE-2022-4690'] | usememos/memos vulnerable to stored cross-site scripting (XSS) | usememos/memos is an open-source, self-hosted memo hub with knowledge management and socialization. Memos prior to 0.9.0 has a feature to upload file and display it, and by uploading a crafted SVG file, an attacker could perform a stored cross-site scripting attack with the image direct link. This was patched in version 0.9.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4690'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/pull/833'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/65cc19c12efa392f792f6bb154b4838547e0af5e'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/c07b4a57caa89905e54b800f4d8fb720bbf5bf82'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos/'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/7e1be91d-3b13-4300-8af2-9bd9665ec335'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-27T01:29:44Z', 'nvd_published_at': '2022-12-23T12:15:00Z'} |
1.4.0 | GHSA-gfgm-chr3-x6px | 2022-12-30T17:48:30Z | 2022-12-30T17:48:30Z | null | [] | prettytable-rs: Force cast a &Vec<T> to &[T] may lead to undefined behavior | In function `Table::as_ref`, a reference of vector is force cast to slice. There are multiple problems here:
1. To guarantee the size is correct, we have to first do `Vec::shrink_to_fit`. The function requires a mutable reference, so we have to force cast from immutable to mutable, which is undefined behavior (UB).
2. Even if (1) is sound, `&Vec<T>` and `&[T]` still might not have the same layout. Treating them equally may lead to undefinted behavior (UB).
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'prettytable-rs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/phsym/prettytable-rs/issues/145'}, {'type': 'PACKAGE', 'url': 'https://github.com/phsym/prettytable-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0074.html'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T17:48:30Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7w2v-35j3-xrm9 | 2022-12-07T14:56:47Z | 2022-12-07T06:30:26Z | null | ['CVE-2022-42486'] | baserCMS vulnerable to stored Cross-site Scripting | Stored cross-site scripting vulnerability in User group management of baserCMS versions prior to 4.7.2 allows a remote authenticated attacker with an administrative privilege to inject an arbitrary script. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'baserproject/basercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.7.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42486'}, {'type': 'WEB', 'url': 'https://basercms.net/security/JVN_53682526'}, {'type': 'PACKAGE', 'url': 'https://github.com/baserproject/basercms'}, {'type': 'WEB', 'url': 'https://jvn.jp/en/jp/JVN53682526/index.html'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-07T14:56:47Z', 'nvd_published_at': '2022-12-07T04:15:00Z'} |
1.4.0 | GHSA-q6cq-m9gm-6q2f | 2023-01-09T08:22:04Z | 2022-12-25T06:30:20Z | null | ['CVE-2022-45197'] | Slixmpp lacks SSL Certificate hostname validation in XMLStream | Slixmpp before 1.8.3 lacks SSL Certificate hostname validation in XMLStream, allowing an attacker to pose as any server in the eyes of Slixmpp. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'slixmpp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45197'}, {'type': 'PACKAGE', 'url': 'https://github.com/poezio/slixmpp'}, {'type': 'WEB', 'url': 'https://github.com/poezio/slixmpp/commits/master/slixmpp/xmlstream/xmlstream.py'}, {'type': 'WEB', 'url': 'https://github.com/poezio/slixmpp/tags'}, {'type': 'WEB', 'url': 'https://lab.louiz.org/poezio/slixmpp/-/commit/b60b1b985db928532f97c4f61d6fbc801f0aa7fa'}, {'type': 'WEB', 'url': 'https://lab.louiz.org/poezio/slixmpp/-/commits/master'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202305-07'}] | {'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T17:12:05Z', 'nvd_published_at': '2022-12-25T05:15:00Z'} |
1.4.0 | GHSA-f93f-55c2-8c89 | 2022-12-08T15:33:38Z | 2022-12-07T03:30:18Z | null | ['CVE-2022-44942'] | Casdoor arbitrary file deletion vulnerability via uploadFile function | Casdoor before v1.126.1 was discovered to contain an arbitrary file deletion vulnerability via the `uploadFile` function. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/casdoor/casdoor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.126.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-44942'}, {'type': 'WEB', 'url': 'https://github.com/casdoor/casdoor/issues/1171'}, {'type': 'WEB', 'url': 'https://github.com/casdoor/casdoor/pull/1174'}, {'type': 'PACKAGE', 'url': 'https://github.com/casdoor/casdoor'}, {'type': 'WEB', 'url': 'https://github.com/casdoor/casdoor/releases/tag/v1.126.1'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-07T14:15:45Z', 'nvd_published_at': '2022-12-07T02:15:00Z'} |
1.4.0 | GHSA-5x84-q523-vvwr | 2023-01-10T15:55:56Z | 2022-12-28T00:30:23Z | null | ['CVE-2020-36564'] | nosurf vulnerable to improper input validation | Due to improper validation of caller input, validation is silently disabled if the provided expected token is malformed, causing any user supplied token to be considered valid. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/justinas/nosurf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36564'}, {'type': 'WEB', 'url': 'https://github.com/justinas/nosurf/pull/60'}, {'type': 'WEB', 'url': 'https://github.com/justinas/nosurf/commit/4d86df7a4affa1fa50ab39fb09aac56c3ce9c314'}, {'type': 'PACKAGE', 'url': 'https://github.com/justinas/nosurf'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0049'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T19:06:40Z', 'nvd_published_at': '2022-12-27T22:15:00Z'} |
1.4.0 | GHSA-59fh-rjq3-xq7j | 2022-12-08T21:44:18Z | 2022-12-06T18:30:19Z | null | ['CVE-2022-44289'] | Thinkphp has a code logic error | Thinkphp 5.1.41 and 5.0.24 has a code logic error which causes file upload getshell. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'topthink/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.0.24'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'topthink/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1'}, {'last_affected': '5.1.41'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-44289'}, {'type': 'WEB', 'url': 'https://github.com/top-think/framework/issues/2772'}, {'type': 'PACKAGE', 'url': 'https://github.com/top-think/framework'}] | {'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T21:11:46Z', 'nvd_published_at': '2022-12-06T16:15:00Z'} |
1.4.0 | GHSA-p46c-m4j7-mjvq | 2022-12-08T15:16:04Z | 2022-12-08T12:30:26Z | null | ['CVE-2022-4350'] | Mingsoft MCMS vulnerable to Cross-site Scripting | A vulnerability, which was classified as problematic, was found in Mingsoft MCMS 5.2.8. Affected is an unknown function of the file search.do. The manipulation of the argument content_title leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-215112. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4350'}, {'type': 'WEB', 'url': 'https://gitee.com/mingSoft/MCMS/issues/I5MT8Y'}, {'type': 'PACKAGE', 'url': 'https://github.com/ming-soft/MCMS'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.215112'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-08T15:16:04Z', 'nvd_published_at': '2022-12-08T10:15:00Z'} |
1.4.0 | GHSA-mwvp-qr62-cvjx | 2023-01-09T21:51:01Z | 2022-12-28T00:30:22Z | null | ['CVE-2019-25091'] | nsupdate.info has Sensitive Cookie Without 'HttpOnly' Flag | A vulnerability classified as problematic has been found in nsupdate.info. This affects an unknown part of the file `src/nsupdate/settings/base.py` of the component `CSRF Cookie Handler`. The manipulation of the argument `CSRF_COOKIE_HTTPONLY` leads to cookie without `httponly` flag. It is possible to initiate the attack remotely. The name of the patch is 60a3fe559c453bc36b0ec3e5dd39c1303640a59a. It is recommended to apply a patch to fix this issue. The identifier VDB-216909 was assigned to this vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'nsupdate'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.12.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-25091'}, {'type': 'WEB', 'url': 'https://github.com/nsupdate-info/nsupdate.info/pull/410'}, {'type': 'WEB', 'url': 'https://github.com/nsupdate-info/nsupdate.info/commit/60a3fe559c453bc36b0ec3e5dd39c1303640a59a'}, {'type': 'PACKAGE', 'url': 'https://github.com/nsupdate-info/nsupdate.info'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.216909'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.216909'}] | {'cwe_ids': ['CWE-1004'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T21:51:01Z', 'nvd_published_at': '2022-12-27T23:15:00Z'} |
1.4.0 | GHSA-jvq8-w7qv-hqp6 | 2023-01-10T15:46:13Z | 2022-12-28T15:30:45Z | null | ['CVE-2022-4799'] | usememos/memos Improper Authentication vulnerability | usememos/memos 0.9.0 and prior is vulnerable to Improper Authentication. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4799'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c5d70f9d-b7a7-4418-9368-4566a8143e79'}] | {'cwe_ids': ['CWE-287', 'CWE-639'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T19:57:32Z', 'nvd_published_at': '2022-12-28T14:15:00Z'} |
1.4.0 | GHSA-m8r5-7wf4-63mw | 2022-12-06T22:26:30Z | 2022-12-05T06:30:22Z | null | ['CVE-2022-41642'] | Nadesiko3 OS Command Injection vulnerability | OS command injection vulnerability in Nadesiko3 (PC Version) v3.3.68 and earlier allows a remote attacker to execute an arbitrary OS command when processing compression and decompression on the product.
Release notes for versions 3.3.62 and 3.3.69 both link to patches for this particular issue. The [JPCERT/CC](https://jvn.jp/en/jp/JVN56968681/index.html) advisory lists versions 3.3.68 and prior as vulnerable, and the most recent patch for this issue is tagged with version 3.3.69. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'nadesiko3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.69'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.68'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41642'}, {'type': 'WEB', 'url': 'https://github.com/kujirahand/nadesiko3/issues/1325'}, {'type': 'WEB', 'url': 'https://github.com/kujirahand/nadesiko3/issues/1347'}, {'type': 'WEB', 'url': 'https://github.com/kujirahand/nadesiko3/commit/124871c064cfc65cdcd83205637e84fc246c76df'}, {'type': 'WEB', 'url': 'https://github.com/kujirahand/nadesiko3/commit/56ccfb2f9cceaec83e6a9d3024c3ba8c54ebe1a4'}, {'type': 'WEB', 'url': 'https://github.com/kujirahand/nadesiko3/commit/61a70792752a75b7f71df214e98a236721ea3fa6'}, {'type': 'PACKAGE', 'url': 'https://github.com/kujirahand/nadesiko3'}, {'type': 'WEB', 'url': 'https://github.com/kujirahand/nadesiko3/releases/tag/3.3.62'}, {'type': 'WEB', 'url': 'https://github.com/kujirahand/nadesiko3/releases/tag/3.3.69'}, {'type': 'WEB', 'url': 'https://jvn.jp/en/jp/JVN56968681/index.html'}] | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T22:26:30Z', 'nvd_published_at': '2022-12-05T04:15:00Z'} |
1.4.0 | GHSA-p4qr-vq2g-22wp | 2023-01-04T13:51:57Z | 2022-12-23T21:30:17Z | null | ['CVE-2022-47945'] | ThinkPHP Framework vulnerable to remote code execution | ThinkPHP Framework before 6.0.14 allows local file inclusion via the lang parameter when the language pack feature is enabled (`lang_switch_on=true`). An unauthenticated and remote attacker can exploit this to execute arbitrary operating system commands, as demonstrated by including `pearcmd.php`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'topthink/framework'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.14'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-47945'}, {'type': 'WEB', 'url': 'https://github.com/top-think/framework/commit/c4acb8b4001b98a0078eda25840d33e295a7f099'}, {'type': 'PACKAGE', 'url': 'https://github.com/top-think/framework'}, {'type': 'WEB', 'url': 'https://github.com/top-think/framework/compare/v6.0.13...v6.0.14'}, {'type': 'WEB', 'url': 'https://tttang.com/archive/1865/'}] | {'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-04T13:51:57Z', 'nvd_published_at': '2022-12-23T21:15:00Z'} |
1.4.0 | GHSA-3fm3-m23v-5r46 | 2023-01-10T15:58:49Z | 2022-12-28T00:30:23Z | null | ['CVE-2019-25072'] | Tendermint Client package vulnerable to Uncontrolled Resource Consumption | Due to support of Gzip compression in request bodies, as well as a lack of limiting response body sizes, a malicious server can cause a client to consume a significant amount of system resources, which may be used as a denial of service vector. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/tendermint/tendermint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.31.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-25072'}, {'type': 'WEB', 'url': 'https://github.com/tendermint/tendermint/pull/3430'}, {'type': 'WEB', 'url': 'https://github.com/tendermint/tendermint/commit/03085c2da23b179c4a51f59a03cb40aa4e85a613'}, {'type': 'PACKAGE', 'url': 'https://github.com/tendermint/tendermint'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0037'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T19:15:32Z', 'nvd_published_at': '2022-12-27T22:15:00Z'} |
1.4.0 | GHSA-8h43-xg5g-9cj7 | 2023-01-10T00:46:33Z | 2022-12-27T15:30:19Z | null | ['CVE-2022-4732'] | Microweber vulnerable to unrestricted malicious uploads | Unrestricted Upload of File with Dangerous Type in GitHub repository microweber/microweber prior to 1.3.2. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4732'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/0d279ac81052ce7ee97c18c811a9b8e912189da0'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d5be2e96-1f2f-4357-a385-e184cf0119aa'}] | {'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-27T21:41:57Z', 'nvd_published_at': '2022-12-27T15:15:00Z'} |
1.4.0 | GHSA-54r5-wr8x-x5v3 | 2022-12-30T00:27:46Z | 2022-12-20T00:30:27Z | null | [] | Apiman has insufficient checks for read permissions | Apiman 1.5.7 through 2.2.3.Final has insufficient checks for read permissions within the Apiman Manager REST API. A malicious user may be able to find and subscribe to private APIs they do not have permission for, thus accessing API Management-protected resources they should not be allowed to access. The root cause of the issue is the Apiman project's accidental acceptance of a large contribution that was not fully compatible with the security model of Apiman versions before 3.0.0.Final. Because of this, 3.0.0.Final is not affected by the vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.apiman:apiman-manager-api-rest-impl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.7'}, {'fixed': '3.0.0.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.3.Final'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-47551'}, {'type': 'WEB', 'url': 'https://github.com/apiman/apiman/discussions/2409'}, {'type': 'WEB', 'url': 'https://www.apiman.io/blog/permissions-bypass-disclosure/'}, {'type': 'PACKAGE', 'url': 'https://www.github.com/apiman/apiman'}] | {'cwe_ids': ['CWE-276', 'CWE-280'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T17:37:18Z', 'nvd_published_at': '2022-12-20T00:15:00Z'} |
1.4.0 | GHSA-2qjp-425j-52j9 | 2022-12-07T23:23:43Z | 2022-12-07T23:23:43Z | null | ['CVE-2022-23471'] | containerd CRI stream server vulnerable to host memory exhaustion via terminal | ### Impact
A bug was found in containerd's CRI implementation where a user can exhaust memory on the host. In the CRI stream server, a goroutine is launched to handle terminal resize events if a TTY is requested. If the user's process fails to launch due to, for example, a faulty command, the goroutine will be stuck waiting to send without a receiver, resulting in a memory leak. Kubernetes and crictl can both be configured to use containerd's CRI implementation and the stream server is used for handling container IO.
### Patches
This bug has been fixed in containerd 1.6.12 and 1.5.16. Users should update to these versions to resolve the issue.
### Workarounds
Ensure that only trusted images and commands are used and that only trusted users have permissions to execute commands in running containers.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [containerd](https://github.com/containerd/containerd/issues/new/choose)
* Email us at [security@containerd.io](mailto:security@containerd.io)
To report a security issue in containerd:
* [Report a new vulnerability](https://github.com/containerd/containerd/security/advisories/new)
* Email us at [security@containerd.io](mailto:security@containerd.io) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/containerd/containerd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.16'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/containerd/containerd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.6.12'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/containerd/containerd/security/advisories/GHSA-2qjp-425j-52j9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23471'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/commit/241563be06a3de8b6a849414c4e805b68d3bb295'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/commit/a05d175400b1145e5e6a735a6710579d181e7fb0'}, {'type': 'PACKAGE', 'url': 'https://github.com/containerd/containerd'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/releases/tag/v1.5.16'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/releases/tag/v1.6.12'}] | {'cwe_ids': ['CWE-400', 'CWE-401'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-07T23:23:43Z', 'nvd_published_at': '2022-12-07T23:15:00Z'} |
1.4.0 | GHSA-6vm3-jj99-7229 | 2023-01-10T15:56:22Z | 2022-12-27T21:30:20Z | null | ['CVE-2020-36567'] | Gin's default logger allows unsanitized input that can allow remote attackers to inject arbitrary log lines | Gin is a HTTP web framework written in Go (Golang). Unsanitized input in the default logger in github.com/gin-gonic/gin before v1.6.0 allows remote attackers to inject arbitrary log lines. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/gin-gonic/gin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36567'}, {'type': 'WEB', 'url': 'https://github.com/gin-gonic/gin/pull/2237'}, {'type': 'WEB', 'url': 'https://github.com/gin-gonic/gin/commit/a71af9c144f9579f6dbe945341c1df37aaf09c0d'}, {'type': 'PACKAGE', 'url': 'https://github.com/gin-gonic/gin'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0001'}] | {'cwe_ids': ['CWE-116', 'CWE-117'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T00:56:53Z', 'nvd_published_at': '2022-12-27T21:15:00Z'} |
1.4.0 | GHSA-gg8r-xjwq-4w92 | 2022-12-12T20:46:53Z | 2022-12-08T23:30:01Z | null | ['CVE-2022-23494'] | Cross-site scripting vulnerability in TinyMCE alerts | ### Impact
A cross-site scripting (XSS) vulnerability was discovered in the alert and confirm dialogs when these dialogs were provided with malicious HTML content. This can occur in plugins that use the alert or confirm dialogs, such as in the `image` plugin, which presents these dialogs when certain errors occur. The vulnerability allowed arbitrary JavaScript execution when an alert presented in the TinyMCE UI for the current user.
### Patches
This vulnerability has been patched in TinyMCE 5.10.7 and TinyMCE 6.3.1 by ensuring HTML sanitization was still performed after unwrapping invalid elements.
### Fix
To avoid this vulnerability:
- Upgrade to TinyMCE 5.10.7 or higher for TinyMCE 5.x.
- Upgrade to TinyMCE 6.3.1 or higher for TinyMCE 6.x.
### Workaround
To reduce the impact of this vulnerability:
- Ensure the the `images_upload_handler` returns a valid value as per the images_upload_handler documentation.
### References
- https://www.tiny.cloud/docs/release-notes/release-notes5107/#securityfixes
- https://www.tiny.cloud/docs/tinymce/6/6.3-release-notes/#security-fixes
### For more information
If you have any questions or comments about this advisory:
* Email us at [infosec@tiny.cloud](mailto:infosec@tiny.cloud)
* Open an issue in the [TinyMCE repo](https://github.com/tinymce/tinymce/issues) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'tinymce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.3.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'tinymce/tinymce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.3.1'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'TinyMCE'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.3.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'tinymce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.10.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'tinymce/tinymce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.10.7'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'TinyMCE'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.10.7'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/tinymce/tinymce/security/advisories/GHSA-gg8r-xjwq-4w92'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23494'}, {'type': 'WEB', 'url': 'https://github.com/tinymce/tinymce/commit/6923d85eba6de3e08ebc9c5a387b5abdaa21150e'}, {'type': 'WEB', 'url': 'https://github.com/tinymce/tinymce/commit/8bb2d2646d4e1a718fce61a775fa22e9d317b32d'}, {'type': 'PACKAGE', 'url': 'https://github.com/tinymce/tinymce'}, {'type': 'WEB', 'url': 'https://www.tiny.cloud/docs/release-notes/release-notes5107/#securityfixes'}, {'type': 'WEB', 'url': 'https://www.tiny.cloud/docs/tinymce/6/6.3-release-notes/#security-fixes'}, {'type': 'WEB', 'url': 'https://www.tiny.cloud/docs/tinymce/6/file-image-upload/#images_upload_handler'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-08T23:30:01Z', 'nvd_published_at': '2022-12-08T22:15:00Z'} |
1.4.0 | GHSA-mfvq-m3jj-8864 | 2023-01-10T15:40:34Z | 2022-12-28T15:30:45Z | null | ['CVE-2022-4800'] | usememos/memos vulnerable to Improper Verification of Source of a Communication Channel | usememos/memos 0.9.0 and prior is vulnerable to Improper Verification of Source of a Communication Channel. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4800'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/aa45a6eb-cc38-45e5-a301-221ef43c0ef8'}] | {'cwe_ids': ['CWE-940'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T19:57:43Z', 'nvd_published_at': '2022-12-28T14:15:00Z'} |
1.4.0 | GHSA-83pm-7v48-5jp4 | 2023-01-06T18:11:13Z | 2022-12-27T15:30:19Z | null | ['CVE-2022-4721'] | rdiffweb vulnerable to Special Element Injection | In rdiffweb prior to 2.5.5, lack of sanitisation of characters in SSH key name could allow attacker to inject a hyperlink injection that could allow attacker to redirect victim to malicious websites. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4721'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/6afaae56a29536f0118b3380d296c416aa6d078d'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3c48ef5d-da4d-4ee4-aaca-af65e7273720'}] | {'cwe_ids': ['CWE-75'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T18:01:57Z', 'nvd_published_at': '2022-12-27T15:15:00Z'} |
1.4.0 | GHSA-f5q9-j9r2-34gq | 2023-01-10T16:13:03Z | 2022-12-30T12:30:25Z | null | ['CVE-2022-43396'] | Apache Kylin vulnerable to Command injection by Useless configuration | In the fix for CVE-2022-24697, a blacklist is used to filter user input commands. But there is a risk of being bypassed. The user can control the command by controlling the `kylin.engine.spark-cmd` parameter of `conf`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '4.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43396'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/kylin/pull/2011'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/ob2ks04zl5ms0r44cd74y1xdl1rzfd1r'}] | {'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-03T12:34:52Z', 'nvd_published_at': '2022-12-30T11:15:00Z'} |
1.4.0 | GHSA-w3x5-427h-wfq6 | 2022-12-09T20:19:32Z | 2022-12-09T20:19:32Z | null | ['CVE-2022-46166'] | Spring Boot Admins integrated notifier support allows arbitrary code execution | ### Impact
All users who run Spring Boot Admin Server, having enabled Notifiers (e.g. Teams-Notifier) and write access to environment variables via UI are possibly affected.
### Patches
In the most recent releases of Spring Boot Admin 2.6.10 and 2.7.8 the issue is fixed by implementing `SimpleExecutionContext` of SpEL. This prevents the arbitrary code execution (i.e. SpEL injection).
### Workarounds
* Disable any notifier
* Disable write access (POST request) on `/env` actuator endpoint
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'de.codecentric:spring-boot-admin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'de.codecentric:spring-boot-admin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'de.codecentric:spring-boot-admin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0-M1'}, {'fixed': '3.0.0-M6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/codecentric/spring-boot-admin/security/advisories/GHSA-w3x5-427h-wfq6'}, {'type': 'PACKAGE', 'url': 'https://github.com/codecentric/spring-boot-admin'}] | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-09T20:19:32Z', 'nvd_published_at': '2022-12-09T21:15:00Z'} |
1.4.0 | GHSA-m82g-fv7v-h64m | 2022-12-12T22:08:48Z | 2022-12-12T09:30:35Z | null | ['CVE-2022-46688'] | Jenkins Sonar Gerrit Plugin vulnerable to Cross-Site Request Forgery | A cross-site request forgery (CSRF) vulnerability in Jenkins Sonar Gerrit Plugin 377.v8f3808963dc5 and earlier allows attackers to have Jenkins connect to Gerrit servers (previously configured by Jenkins administrators) using attacker-specified credentials IDs obtained through another method, potentially capturing credentials stored in Jenkins. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:sonar-gerrit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '377.v8f3808963dc5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46688'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/sonar-gerrit-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-12-07/#SECURITY-1002'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T22:08:48Z', 'nvd_published_at': '2022-12-12T09:15:00Z'} |
1.4.0 | GHSA-mcvf-2q2m-x72m | 2023-09-14T16:22:23Z | 2022-12-13T17:45:39Z | null | ['CVE-2022-23518'] | Improper neutralization of data URIs may allow XSS in rails-html-sanitizer | ## Summary
rails-html-sanitizer `>= 1.0.3, < 1.4.4` is vulnerable to cross-site scripting via data URIs when used in combination with Loofah `>= 2.1.0`.
## Mitigation
Upgrade to rails-html-sanitizer `>= 1.4.4`.
## Severity
The maintainers have evaluated this as [Medium Severity 6.1](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
## References
- [CWE - CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (4.9)](https://cwe.mitre.org/data/definitions/79.html)
- [SVG MIME Type (image/svg+xml) is misleading to developers · Issue #266 · w3c/svgwg](https://github.com/w3c/svgwg/issues/266)
- https://github.com/rails/rails-html-sanitizer/issues/135
- https://hackerone.com/reports/1694173
## Credit
This vulnerability was independently reported by Maciej Piechota (@haqpl) and Mrinmoy Das (@goromlagche).
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rails-html-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.3'}, {'fixed': '1.4.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-mcvf-2q2m-x72m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23518'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails-html-sanitizer/issues/135'}, {'type': 'WEB', 'url': 'https://github.com/w3c/svgwg/issues/266'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1694173'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails-html-sanitizer'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails-html-sanitizer/CVE-2022-23518.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/09/msg00012.html'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T17:45:39Z', 'nvd_published_at': '2022-12-14T17:15:00Z'} |
1.4.0 | GHSA-jr65-gpj5-cw74 | 2022-12-29T00:33:22Z | 2022-12-28T03:30:28Z | null | ['CVE-2022-3347'] | go-resolver's DNSSEC validation not performed correctly | go-resolver's DNSSEC validation is not performed correctly. An attacker can cause this package to report successful validation for invalid, attacker-controlled records. Root DNSSEC public keys are not validated, permitting an attacker to present a self-signed root key and delegation chain. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/peterzen/goresolver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3347'}, {'type': 'WEB', 'url': 'https://github.com/peterzen/goresolver/issues/5#issuecomment-1150214257'}, {'type': 'PACKAGE', 'url': 'https://github.com/peterzen/goresolver'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-1026'}] | {'cwe_ids': ['CWE-345', 'CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-29T00:33:22Z', 'nvd_published_at': '2022-12-28T03:15:00Z'} |
1.4.0 | GHSA-9h9g-93gc-623h | 2022-12-17T00:32:41Z | 2022-12-13T17:50:25Z | null | ['CVE-2022-23519'] | Possible XSS vulnerability with certain configurations of rails-html-sanitizer | ## Summary
There is a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer.
- Versions affected: ALL
- Not affected: NONE
- Fixed versions: 1.4.4
## Impact
A possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer's allowed tags in either of the following ways:
- allow both "math" and "style" elements,
- or allow both "svg" and "style" elements
Code is only impacted if allowed tags are being overridden. Applications may be doing this in four different ways:
1. using application configuration:
```ruby
# In config/application.rb
config.action_view.sanitized_allowed_tags = ["math", "style"]
# or
config.action_view.sanitized_allowed_tags = ["svg", "style"]
```
see https://guides.rubyonrails.org/configuring.html#configuring-action-view
2. using a `:tags` option to the Action View helper `sanitize`:
```
<%= sanitize @comment.body, tags: ["math", "style"] %>
<%# or %>
<%= sanitize @comment.body, tags: ["svg", "style"] %>
```
see https://api.rubyonrails.org/classes/ActionView/Helpers/SanitizeHelper.html#method-i-sanitize
3. using Rails::Html::SafeListSanitizer class method `allowed_tags=`:
```ruby
# class-level option
Rails::Html::SafeListSanitizer.allowed_tags = ["math", "style"]
# or
Rails::Html::SafeListSanitizer.allowed_tags = ["svg", "style"]
```
4. using a `:tags` options to the Rails::Html::SafeListSanitizer instance method `sanitize`:
```ruby
# instance-level option
Rails::Html::SafeListSanitizer.new.sanitize(@article.body, tags: ["math", "style"])
# or
Rails::Html::SafeListSanitizer.new.sanitize(@article.body, tags: ["svg", "style"])
```
All users overriding the allowed tags by any of the above mechanisms to include (("math" or "svg") and "style") should either upgrade or use one of the workarounds immediately.
## Workarounds
Remove "style" from the overridden allowed tags, or remove "math" and "svg" from the overridden allowed tags.
## References
- [CWE - CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (4.9)](https://cwe.mitre.org/data/definitions/79.html)
- https://hackerone.com/reports/1656627
## Credit
This vulnerability was responsibly reported by Dominic Breuker.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rails-html-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-9h9g-93gc-623h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23519'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1656627'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails-html-sanitizer'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails-html-sanitizer/CVE-2022-23519.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/09/msg00012.html'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T17:50:25Z', 'nvd_published_at': '2022-12-14T17:15:00Z'} |
1.4.0 | GHSA-2hvc-hwg3-hpvw | 2022-12-09T20:08:15Z | 2022-12-07T09:30:23Z | null | ['CVE-2022-46741'] | PaddlePaddle Out-of-bounds Read vulnerability | Out-of-bounds read in `gather_tree` in PaddlePaddle before 2.4. A [patch](https://github.com/PaddlePaddle/Paddle/commit/6712e262fc6734873cc6d5ca4f45973339a88697) is available in the `release/2.4` branch. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'paddlepaddle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46741'}, {'type': 'WEB', 'url': 'https://github.com/PaddlePaddle/Paddle/pull/47051'}, {'type': 'WEB', 'url': 'https://github.com/PaddlePaddle/Paddle/commit/6712e262fc6734873cc6d5ca4f45973339a88697'}, {'type': 'WEB', 'url': 'https://github.com/PaddlePaddle/Paddle/commit/ee6e6d511f9f33fc862c11722701fb5abb99ed94'}, {'type': 'PACKAGE', 'url': 'https://github.com/PaddlePaddle/Paddle'}, {'type': 'WEB', 'url': 'https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2022-001.md'}] | {'cwe_ids': ['CWE-125'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-09T20:08:15Z', 'nvd_published_at': '2022-12-07T08:15:00Z'} |
1.4.0 | GHSA-2r7v-cmch-5x26 | 2022-12-05T17:37:22Z | 2022-12-05T17:37:22Z | null | ['CVE-2022-41957'] | muhammara and hummus vulnerable to Unchecked Return Value to NULL Pointer Dereference | ### Impact
The package muhammara before 2.6.2, from 3.0.0 and before 3.3.0; all versions of package hummus are vulnerable to Denial of Service (DoS) when supplied with a maliciously crafted PDF file to be parsed.
### Patches
It has been patched in 3.4.0 and has been backported to 2.6.2
There is no patch for hummus, currently
### Workarounds
Do not process files from untrusted sources or update.
Replace hummus with muhammara
### References
https://github.com/julianhille/MuhammaraJS/pull/235
https://github.com/julianhille/MuhammaraJS/pull/238 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'hummus'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.6.2'}}, {'package': {'ecosystem': 'npm', 'name': 'muhammara'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'muhammara'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/julianhille/MuhammaraJS/security/advisories/GHSA-2r7v-cmch-5x26'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41957'}, {'type': 'WEB', 'url': 'https://github.com/julianhille/MuhammaraJS/pull/235'}, {'type': 'WEB', 'url': 'https://github.com/julianhille/MuhammaraJS/pull/238'}, {'type': 'PACKAGE', 'url': 'https://github.com/julianhille/MuhammaraJS'}] | {'cwe_ids': ['CWE-690'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-05T17:37:22Z', 'nvd_published_at': '2022-11-28T15:15:00Z'} |
1.4.0 | GHSA-p86x-75j8-w4xh | 2022-12-16T23:00:52Z | 2022-12-12T09:30:35Z | null | ['CVE-2022-46684'] | Stored XSS vulnerability in Jenkins Checkmarx Plugin | heckmarx Plugin processes Checkmarx service API responses and generates HTML reports from them for rendering on the Jenkins UI.
Checkmarx Plugin 2022.3.3 and earlier does not escape values returned from the Checkmarx service API before inserting them into HTML reports. This results in a stored cross-site scripting (XSS) vulnerability.
While Jenkins users without Overall/Administer permission are not allowed to configure the URL to the Checkmarx service, this could still be exploited via man-in-the-middle attacks.
Checkmarx Plugin 2022.4.3 escapes values returned from the Checkmarx service API before inserting them into HTML reports. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.checkmarx.jenkins:checkmarx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2022.4.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2022.3.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46684'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/checkmarx-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-12-07/#SECURITY-2869'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-16T23:00:52Z', 'nvd_published_at': '2022-12-12T09:15:00Z'} |
1.4.0 | GHSA-7249-8x22-4rg4 | 2022-12-06T19:43:30Z | 2022-12-05T06:30:22Z | null | ['CVE-2022-42496'] | nadesiko3 vulnerable to OS Command Injection | OS command injection vulnerability in Nako3edit, editor component of nadesiko3 (PC Version) v3.3.74 and earlier allows a remote attacker to obtain appkey of the product and execute an arbitrary OS command on the product. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'nadesiko3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.75'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42496'}, {'type': 'WEB', 'url': 'https://github.com/kujirahand/nadesiko3/issues/1325'}, {'type': 'WEB', 'url': 'https://github.com/kujirahand/nadesiko3/issues/1347'}, {'type': 'PACKAGE', 'url': 'https://github.com/kujirahand/nadesiko3'}, {'type': 'WEB', 'url': 'https://github.com/kujirahand/nadesiko3/releases/tag/3.3.75'}, {'type': 'WEB', 'url': 'https://jvn.jp/en/jp/JVN56968681/index.html'}] | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T19:43:30Z', 'nvd_published_at': '2022-12-05T04:15:00Z'} |
1.4.0 | GHSA-3c5x-4hvx-qrrr | 2023-01-10T00:47:41Z | 2022-12-27T15:30:19Z | null | ['CVE-2022-4728'] | Graphite Web Cross-site Scripting vulnerability | A vulnerability has been found in Graphite Web and classified as problematic. This vulnerability affects unknown code of the component Cookie Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 2f178f490e10efc03cd1d27c72f64ecab224eb23. It is recommended to apply a patch to fix this issue. VDB-216742 is the identifier assigned to this vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'graphite-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4728'}, {'type': 'WEB', 'url': 'https://github.com/graphite-project/graphite-web/issues/2744'}, {'type': 'WEB', 'url': 'https://github.com/graphite-project/graphite-web/pull/2785'}, {'type': 'WEB', 'url': 'https://github.com/graphite-project/graphite-web/commit/2f178f490e10efc03cd1d27c72f64ecab224eb23'}, {'type': 'PACKAGE', 'url': 'https://github.com/graphite-project/graphite-web'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.216742'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T17:57:48Z', 'nvd_published_at': '2022-12-27T15:15:00Z'} |
1.4.0 | GHSA-c5hq-35h7-r9x4 | 2023-01-10T00:52:02Z | 2022-12-29T18:30:24Z | null | ['CVE-2022-4850'] | usememos/memos Cross-Site Request Forgery vulnerability | Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos 0.9.0 and prior. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4850'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/c9bb2b785dc5852655405d5c9ab127a2d5aa3948'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/46dc4728-eacc-43f5-9831-c203fdbcc346'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T22:51:40Z', 'nvd_published_at': '2022-12-29T18:15:00Z'} |
1.4.0 | GHSA-vp22-232w-h9x8 | 2022-12-12T21:59:56Z | 2022-12-08T09:30:30Z | null | ['CVE-2022-4348'] | RuoYi-Cloud Cross-site Scripting vulnerability | A vulnerability was found in y_project RuoYi-Cloud. It has been rated as problematic. Affected by this issue is some unknown functionality of the component JSON Handler. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-215108. A patch for this issue is available at https://gitee.com/y_project/RuoYi-Cloud/pulls/224. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.ruoyi:ruoyi-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.6.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4348'}, {'type': 'PACKAGE', 'url': 'https://gitee.com/y_project/RuoYi-Cloud'}, {'type': 'WEB', 'url': 'https://gitee.com/y_project/RuoYi-Cloud/issues/I5IRC8'}, {'type': 'WEB', 'url': 'https://gitee.com/y_project/RuoYi-Cloud/pulls/224/files'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.215108'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T21:59:56Z', 'nvd_published_at': '2022-12-08T08:15:00Z'} |
1.4.0 | GHSA-c6rp-wrp9-qr4q | 2022-12-29T01:06:38Z | 2022-12-21T21:30:15Z | null | ['CVE-2021-4264'] | dustjs-linkedin vulnerable to Prototype Pollution | A vulnerability was found in LinkedIn dustjs prior to version 3.0.0 and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.0.0 can address this issue. The name of the patch is ddb6523832465d38c9d80189e9de60519ac307c3. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216464. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'dustjs-linkedin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4264'}, {'type': 'WEB', 'url': 'https://github.com/linkedin/dustjs/issues/804'}, {'type': 'WEB', 'url': 'https://github.com/linkedin/dustjs/pull/805'}, {'type': 'WEB', 'url': 'https://github.com/linkedin/dustjs/commit/ddb6523832465d38c9d80189e9de60519ac307c3'}, {'type': 'PACKAGE', 'url': 'https://github.com/linkedin/dustjs'}, {'type': 'WEB', 'url': 'https://github.com/linkedin/dustjs/releases/tag/v3.0.0'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.216464'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.216464'}] | {'cwe_ids': ['CWE-1321', 'CWE-74', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T03:35:37Z', 'nvd_published_at': '2022-12-21T19:15:00Z'} |
1.4.0 | GHSA-hcpj-qp55-gfph | 2022-12-06T14:33:52Z | 2022-12-06T06:30:17Z | null | ['CVE-2022-24439'] | GitPython vulnerable to Remote Code Execution due to improper user input validation | All versions of package gitpython are vulnerable to Remote Code Execution (RCE) due to improper user input validation, which makes it possible to inject a maliciously crafted remote URL into the clone command. Exploiting this vulnerability is possible because the library makes external calls to git without sufficient sanitization of input arguments. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'GitPython'}, 'ecosystem_specific': {'affected_functions': ['git.repo.base.Repo.clone', 'git.repo.base.Repo.clone_from']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.30'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.1.29'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24439'}, {'type': 'WEB', 'url': 'https://github.com/gitpython-developers/GitPython/issues/1515'}, {'type': 'WEB', 'url': 'https://github.com/gitpython-developers/GitPython/commit/2625ed9fc074091c531c27ffcba7902771130261'}, {'type': 'PACKAGE', 'url': 'https://github.com/gitpython-developers/GitPython'}, {'type': 'WEB', 'url': 'https://github.com/gitpython-developers/GitPython/blob/bec61576ae75803bc4e60d8de7a629c194313d1c/git/repo/base.py#L1249'}, {'type': 'WEB', 'url': 'https://github.com/gitpython-developers/GitPython/blob/bec61576ae75803bc4e60d8de7a629c194313d1c/git/repo/base.py%23L1249'}, {'type': 'WEB', 'url': 'https://github.com/gitpython-developers/GitPython/releases/tag/3.1.30'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/07/msg00024.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AV5DV7GBLMOZT7U3Q4TDOJO5R6G3V6GH/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IKMVYKLWX62UEYKAN64RUZMOIAMZM5JN/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PF6AXUTC5BO7L2SBJMCVKJSPKWY52I5R/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJHN3QUXPJIMM6SULIR3PR34UFWRAE7X/'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-PYTHON-GITPYTHON-3113858'}] | {'cwe_ids': ['CWE-20', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T14:33:52Z', 'nvd_published_at': '2022-12-06T05:15:00Z'} |
1.4.0 | GHSA-q7qq-9gx2-ggxv | 2022-12-02T22:26:45Z | 2022-12-02T22:26:45Z | null | [] | phpxmlrpc vulnerable to argument injection | phpxmlrpc vulnerable to argument injection via local file access in `Client:send` via manipulation of `$protocol` argument. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpxmlrpc/phpxmlrpc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.9.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/gggeek/phpxmlrpc/issues/81'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/phpxmlrpc/phpxmlrpc/2022-11-28-1.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/gggeek/phpxmlrpc'}, {'type': 'WEB', 'url': 'https://github.com/gggeek/phpxmlrpc/releases/tag/4.9.0'}] | {'cwe_ids': ['CWE-88'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T22:26:45Z', 'nvd_published_at': None} |
1.4.0 | GHSA-g86j-hwg9-77q5 | 2022-12-27T15:25:51Z | 2022-12-27T15:25:51Z | null | [] | SentinelOne impersonated via PyPI packages | In December 2022, threat actors impersonated SentinelOne by uploading fake software development kits (SDKs) onto PyPI. The SDKs contain fully functional SentinelOne clients, but the packages also contained malicious backdoors that are only executed when called on programmatically, as opposed to during installation. The packages have since been taken down from PyPI. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'SentinelOne'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'last_affected': '1.2.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'sentinelone-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.2.1'}, {'last_affected': '6.2.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'SentineloneSDK'}, 'versions': ['1.0.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'Sentinelone'}, 'versions': ['1.0.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'SentinelOneSDK'}, 'versions': ['1.0.0']}] | [{'type': 'WEB', 'url': 'https://pypi.org/project/SentinelOne/'}, {'type': 'WEB', 'url': 'https://www.reversinglabs.com/blog/sentinelsneak-malicious-pypi-module-poses-as-security-sdk'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-27T15:25:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6xrf-q977-5vgc | 2023-01-06T03:21:28Z | 2022-12-26T09:30:25Z | null | ['CVE-2022-4742'] | json-pointer vulnerable to Prototype Pollution | A vulnerability, which was classified as critical, has been found in json-pointer. Affected by this issue is the function set of the file index.js. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The attack may be launched remotely. The name of the patch is 859c9984b6c407fc2d5a0a7e47c7274daa681941. It is recommended to apply a patch to fix this issue. VDB-216794 is the identifier assigned to this vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'json-pointer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4742'}, {'type': 'WEB', 'url': 'https://github.com/manuelstofer/json-pointer/pull/36'}, {'type': 'WEB', 'url': 'https://github.com/manuelstofer/json-pointer/commit/859c9984b6c407fc2d5a0a7e47c7274daa681941'}, {'type': 'PACKAGE', 'url': 'https://github.com/manuelstofer/json-pointer'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.216794'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.216794'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T17:21:11Z', 'nvd_published_at': '2022-12-26T08:15:00Z'} |
1.4.0 | GHSA-4348-x292-h437 | 2023-01-06T03:19:36Z | 2022-12-28T00:30:23Z | null | ['CVE-2022-2583'] | GoBase Race Condition vulnerability | A race condition can cause incorrect HTTP request routing. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/ntbosscher/gobase'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2583'}, {'type': 'WEB', 'url': 'https://github.com/ntbosscher/gobase/commit/a8d40bce9c429d324122d18c446924dab809e812'}, {'type': 'PACKAGE', 'url': 'https://github.com/ntbosscher/gobase'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0400'}] | {'cwe_ids': ['CWE-362'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T18:04:09Z', 'nvd_published_at': '2022-12-27T22:15:00Z'} |
1.4.0 | GHSA-6vh6-72g6-xqx2 | 2022-12-19T19:15:19Z | 2022-12-15T21:30:29Z | null | ['CVE-2022-40002'] | FeehiCMS Cross Site Scripting vulnerability | Cross Site Scripting (XSS) vulnerability in FeehiCMS-2.1.1 allows remote attackers to run arbirtary code via the callback parameter to /cms/notify. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'feehi/feehicms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40002'}, {'type': 'WEB', 'url': 'https://github.com/liufee/cms/issues/66'}, {'type': 'PACKAGE', 'url': 'https://github.com/liufee/cms'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T23:34:40Z', 'nvd_published_at': '2022-12-15T19:15:00Z'} |
1.4.0 | GHSA-pwh3-3pcm-6vjh | 2022-12-19T14:40:09Z | 2022-12-15T21:30:28Z | null | ['CVE-2020-20589'] | FeehiCMS vulnerable to Cross Site Scripting | Cross Site Scripting (XSS) vulnerability in FeehiCMS 2.0.8 allows remote attackers to run arbitrary code via tha lang attribute of an html tag. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'feehi/feehicms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-20589'}, {'type': 'WEB', 'url': 'https://github.com/liufee/cms/issues/45'}, {'type': 'PACKAGE', 'url': 'https://github.com/liufee/cms'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T23:30:15Z', 'nvd_published_at': '2022-12-15T19:15:00Z'} |
1.4.0 | GHSA-97rc-mm5j-f6rj | 2023-01-09T08:21:22Z | 2022-12-27T15:30:19Z | null | ['CVE-2022-4691'] | usememos/memos vulnerable to stored Cross-site Scripting | Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4691'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/c07b4a57caa89905e54b800f4d8fb720bbf5bf82'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/459b55c1-22f5-4556-9cda-9b86aa91582f'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T18:03:06Z', 'nvd_published_at': '2022-12-27T15:15:00Z'} |
1.4.0 | GHSA-7qpw-2j9m-rw8c | 2023-01-10T15:44:56Z | 2022-12-28T15:30:46Z | null | ['CVE-2022-4813'] | usememos/memos has Insufficient Granularity of Access Control | An Insufficient Granularity of Access Control in usememos/memos prior to 0.9.0 can allow an attacker to delete a memo from the archives. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4813'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a24b45d8-554b-4131-8ce1-f33bf8cdbacc'}] | {'cwe_ids': ['CWE-1220'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T22:12:40Z', 'nvd_published_at': '2022-12-28T14:15:00Z'} |
1.4.0 | GHSA-7vx2-5349-qj99 | 2023-06-06T18:32:24Z | 2022-12-06T00:30:16Z | 2023-06-06T18:32:24Z | ['CVE-2022-46464'] | Withdrawn: ConcreteCMS vulnerable to Xpath injection attacks | ## Withdrawn
This advisory has been withdrawn because it has been found not to be a security issue and withdrawn by its CNA. Please see the message from NVD [here](https://nvd.nist.gov/vuln/detail/CVE-2022-46464) for more information. This link is maintained to preserve external references.
## Original Description
ConcreteCMS v9.1.3 was discovered to be vulnerable to Xpath injection attacks. This vulnerability allows attackers to access sensitive XML data via a crafted payload injected into the URL path folder "3". | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '9.1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46464'}, {'type': 'PACKAGE', 'url': 'https://github.com/concretecms/concretecms'}, {'type': 'WEB', 'url': 'https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/concretecms.org/2022/concretecms-9.1.3'}] | {'cwe_ids': ['CWE-91'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T15:35:16Z', 'nvd_published_at': '2022-12-05T23:15:00Z'} |
1.4.0 | GHSA-gxgj-xjcw-fv9p | 2023-01-09T21:48:38Z | 2022-12-28T00:30:23Z | null | ['CVE-2013-10005'] | socks Infinite Loop vulnerability | The `RemoteAddr` and `LocalAddr` methods on the returned `net.Conn` may call themselves, leading to an infinite loop which will crash the program due to a stack overflow. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/btcsuite/go-socks'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20130808000456-233bccbb1abe'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/btcsuitereleases/go-socks'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20130808000456-233bccbb1abe'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-10005'}, {'type': 'WEB', 'url': 'https://github.com/btcsuite/go-socks/commit/233bccbb1abe02f05750f7ace66f5bffdb13defc'}, {'type': 'PACKAGE', 'url': 'https://github.com/btcsuite/go-socks'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0024'}] | {'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T21:48:38Z', 'nvd_published_at': '2022-12-27T22:15:00Z'} |
1.4.0 | GHSA-c5hg-mr8r-f6jp | 2023-03-20T15:45:32Z | 2022-12-27T14:40:39Z | null | ['CVE-2022-36437'] | Hazelcast connection caching | ### Impact
The Connection handler in Hazelcast and Hazelcast Jet allows an unauthenticated, remote attacker to access and manipulate data in the cluster with another authenticated connection's identity.
The affected Hazelcast versions are through 3.12.12, 4.0.6, 4.1.9, 4.2.5, 5.0.3, and 5.1.2.
The affected Hazelcast Jet versions are through 4.5.3.
### Patches
Hazelcast Jet (and Enterprise) 4.5.4.
Hazelcast IMDG (and Enterprise)3.12.13
Hazelcast IMDG (and Enterprise) 4.1.10
Hazelcast IMDG (and Enterprise) 4.2.6
Hazelcast Platform (and Enterprise) 5.1.3
### Workarounds
There is no known workaround, but setups with TLS and mutual authentication enabled significantly lowers the exploitation risk.
### References
https://support.hazelcast.com/s/article/Security-Advisory-for-CVE-2022-36437
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.hazelcast:hazelcast'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.12.13'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.12.12'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.hazelcast:hazelcast'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0'}, {'last_affected': '4.0.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.hazelcast:hazelcast'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1'}, {'fixed': '4.1.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.9'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.hazelcast:hazelcast'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2'}, {'fixed': '4.2.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.5'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.hazelcast:hazelcast'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0'}, {'fixed': '5.0.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.0.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.hazelcast:hazelcast'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1'}, {'fixed': '5.1.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.1.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.hazelcast.jet:hazelcast-jet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.5.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.hazelcast.jet:hazelcast-jet-enterprise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.5.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.hazelcast:hazelcast-enterprise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.12.13'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.12.12'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.hazelcast:hazelcast-enterprise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0'}, {'last_affected': '4.0.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.hazelcast:hazelcast-enterprise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1'}, {'fixed': '4.1.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.9'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.hazelcast:hazelcast-enterprise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2'}, {'fixed': '4.2.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.5'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.hazelcast:hazelcast-enterprise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0'}, {'fixed': '5.0.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.0.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.hazelcast:hazelcast-enterprise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1'}, {'fixed': '5.1.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.1.2'}}] | [{'type': 'WEB', 'url': 'https://github.com/hazelcast/hazelcast/security/advisories/GHSA-c5hg-mr8r-f6jp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36437'}, {'type': 'PACKAGE', 'url': 'https://github.com/hazelcast/hazelcast'}, {'type': 'WEB', 'url': 'https://support.hazelcast.com/s/article/Security-Advisory-for-CVE-2022-36437'}] | {'cwe_ids': ['CWE-384'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-27T14:40:39Z', 'nvd_published_at': '2022-12-29T23:15:00Z'} |
1.4.0 | GHSA-hh82-3pmq-7frp | 2023-01-10T23:07:13Z | 2022-12-12T21:25:44Z | null | ['CVE-2022-41915'] | Netty vulnerable to HTTP Response splitting from assigning header value iterator | ### Impact
When calling `DefaultHttpHeaders.set` with an _iterator_ of values (as opposed to a single given value), header value validation was not performed, allowing malicious header values in the iterator to perform [HTTP Response Splitting](https://owasp.org/www-community/attacks/HTTP_Response_Splitting).
### Patches
The necessary validation was added in Netty 4.1.86.Final.
### Workarounds
Integrators can work around the issue by changing the `DefaultHttpHeaders.set(CharSequence, Iterator<?>)` call, into a `remove()` call, and call `add()` in a loop over the iterator of values.
### References
[HTTP Response Splitting](https://owasp.org/www-community/attacks/HTTP_Response_Splitting)
[CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers](https://cwe.mitre.org/data/definitions/113.html)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [[example link to repo](https://github.com/netty/netty)](https://github.com/netty/netty)
* Email us at [netty-security@googlegroups.com](mailto:netty-security@googlegroups.com)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.netty:netty-codec-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.83.Final'}, {'fixed': '4.1.86.Final'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/netty/netty/security/advisories/GHSA-hh82-3pmq-7frp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41915'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/issues/13084'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/pull/12760'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/commit/c37c637f096e7be3dffd36edee3455c8e90cb1b0'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/commit/fe18adff1c2b333acb135ab779a3b9ba3295a1c4'}, {'type': 'PACKAGE', 'url': 'https://github.com/netty/netty/'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/01/msg00008.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230113-0004/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5316'}] | {'cwe_ids': ['CWE-113', 'CWE-436'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T21:25:44Z', 'nvd_published_at': '2022-12-13T07:15:00Z'} |
1.4.0 | GHSA-42q2-m54f-jh95 | 2023-01-10T15:47:45Z | 2022-12-29T18:30:23Z | null | ['CVE-2022-4851'] | sememos/memos vulnerable to Improper Handling of Values | In usememos/memos 0.9.0 and prior, an attacker can post malicious content to another user's memos page via POST request. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4851'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/e3cebc1a-1326-4a08-abad-0414a717fa0f'}] | {'cwe_ids': ['CWE-229'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T22:23:38Z', 'nvd_published_at': '2022-12-29T18:15:00Z'} |
1.4.0 | GHSA-x5q4-m45m-fm94 | 2023-01-09T21:49:36Z | 2022-12-28T12:30:51Z | null | ['CVE-2018-25050'] | Harvest Chosen vulnerable to Cross-site Scripting | A vulnerability, which was classified as problematic, has been found in Harvest Chosen up to 1.8.6. Affected by this issue is the function AbstractChosen of the file coffee/lib/abstract-chosen.coffee. The manipulation of the argument group_label leads to cross site scripting. The attack may be launched remotely. Upgrading to version 1.8.7 can address this issue. The name of the patch is 77fd031d541e77510268d1041ed37798fdd1017e. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216956. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'harvesthq/chosen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25050'}, {'type': 'WEB', 'url': 'https://github.com/harvesthq/chosen/pull/2997'}, {'type': 'WEB', 'url': 'https://github.com/harvesthq/chosen/commit/77fd031d541e77510268d1041ed37798fdd1017e'}, {'type': 'PACKAGE', 'url': 'https://github.com/harvesthq/chosen'}, {'type': 'WEB', 'url': 'https://github.com/harvesthq/chosen/releases/tag/v1.8.7'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.216956'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.216956'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T21:49:36Z', 'nvd_published_at': '2022-12-28T10:15:00Z'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.