schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-qvx2-59g8-8hph
2023-01-06T03:15:39Z
2022-12-25T21:30:21Z
null
['CVE-2022-4741']
docconv vulnerable to Memory Allocation with Excessive Size Value
A vulnerability was found in docconv up to 1.2.0 and classified as problematic. This issue affects the function `ConvertDocx/ConvertODT/ConvertPages/ConvertXML/XMLToText`. The manipulation leads to uncontrolled memory allocation. The attack may be initiated remotely. Upgrading to version 1.2.1 can address this issue. The name of the patch is 42bcff666855ab978e67a9041d0cdea552f20301. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216779.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/sajari/docconv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'code.sajari.com/docconv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4741'}, {'type': 'WEB', 'url': 'https://github.com/sajari/docconv/pull/111'}, {'type': 'WEB', 'url': 'https://github.com/sajari/docconv/commit/42bcff666855ab978e67a9041d0cdea552f20301'}, {'type': 'PACKAGE', 'url': 'https://github.com/sajari/docconv'}, {'type': 'WEB', 'url': 'https://github.com/sajari/docconv/releases/tag/v1.2.1'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-1188'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.216779'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.216779'}]
{'cwe_ids': ['CWE-789'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T17:19:54Z', 'nvd_published_at': '2022-12-25T20:15:00Z'}
1.4.0
GHSA-j69f-fgh5-f7mc
2023-01-10T00:40:37Z
2022-12-30T12:30:25Z
null
['CVE-2017-20151']
iText RUPS XML External Entity vulnerability
A vulnerability classified as problematic was found in iText RUPS. This vulnerability affects unknown code of the file `src/main/java/com/itextpdf/rups/model/XfaFile.java`. The manipulation leads to xml external entity reference. The name of the patch is ac5590925874ef810018a6b60fec216eee54fb32. It is recommended to apply a patch to fix this issue. VDB-217054 is the identifier assigned to this vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.itextpdf:itext-rups'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '7.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-20151'}, {'type': 'WEB', 'url': 'https://github.com/itext/rups/commit/ac5590925874ef810018a6b60fec216eee54fb32'}, {'type': 'PACKAGE', 'url': 'https://github.com/itext/rups'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217054'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217054'}]
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-10T00:40:37Z', 'nvd_published_at': '2022-12-30T12:15:00Z'}
1.4.0
GHSA-2j2x-2gpw-g8fm
2023-01-06T03:16:40Z
2022-12-25T21:30:22Z
null
['CVE-2020-36632']
flat vulnerable to Prototype Pollution
flat helps flatten/unflatten nested Javascript objects. A vulnerability, which was classified as critical, was found in hughsk flat up to 5.0.0. This affects the function unflatten of the file index.js. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). It is possible to initiate the attack remotely. Upgrading to version 5.0.1 can address this issue. The name of the patch is 20ef0ef55dfa028caddaedbcb33efbdb04d18e13. It is recommended to upgrade the affected component. The identifier VDB-216777 was assigned to this vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'flat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36632'}, {'type': 'WEB', 'url': 'https://github.com/hughsk/flat/issues/105'}, {'type': 'WEB', 'url': 'https://github.com/hughsk/flat/pull/106'}, {'type': 'WEB', 'url': 'https://github.com/hughsk/flat/commit/20ef0ef55dfa028caddaedbcb33efbdb04d18e13'}, {'type': 'PACKAGE', 'url': 'https://github.com/hughsk/flat'}, {'type': 'WEB', 'url': 'https://github.com/hughsk/flat/releases/tag/5.0.1'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.216777'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.216777'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T16:27:14Z', 'nvd_published_at': '2022-12-25T20:15:00Z'}
1.4.0
GHSA-3mmh-vq9w-4c3g
2022-12-27T01:01:51Z
2022-12-21T03:30:24Z
null
['CVE-2022-4617']
Microweber vulnerable to Reflected Cross-site Scripting
Microweber versions 1.3.1 and prior are vulnerable to Reflected Cross-site Scripting (XSS). A patch is available on the 1.4, dev, and laravel-sail branches.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4617'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/df8add930ecfa7f5b18c67c3f748c137fe890906'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1fb2ce08-7016-45fa-b402-ec08d700e4df'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T17:21:34Z', 'nvd_published_at': '2022-12-21T01:15:00Z'}
1.4.0
GHSA-vc9x-gmmr-p7jj
2023-02-22T00:11:56Z
2022-12-12T15:30:31Z
2023-02-22T00:11:56Z
['CVE-2021-4243']
Duplicate advisory: @claviska/jquery-minicolors vulnerable to Cross-site Scripting
## Duplicate advisory This advisory has been withdrawn because it is a duplicate of [GHSA-crh5-vv2v-c82q](https://github.com/advisories/GHSA-crh5-vv2v-c82q). This link is maintained to preserve external references. ## Original Description A vulnerability was found in claviska jquery-minicolors up to 2.3.5. It has been rated as problematic. Affected by this issue is some unknown functionality of the file jquery.minicolors.js. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.3.6 is able to address this issue. The name of the patch is ef134824a7f4110ada53ea6c173111a4fa2f48f3. It is recommended to upgrade the affected component. VDB-215306 is the identifier assigned to this vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@claviska/jquery-minicolors'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4243'}, {'type': 'WEB', 'url': 'https://github.com/claviska/jquery-minicolors/commit/ef134824a7f4110ada53ea6c173111a4fa2f48f3'}, {'type': 'WEB', 'url': 'https://codepen.io/webbiesdk/pen/oNBQNNV'}, {'type': 'PACKAGE', 'url': 'https://github.com/claviska/jquery-minicolors/'}, {'type': 'WEB', 'url': 'https://github.com/claviska/jquery-minicolors/releases/tag/2.3.6'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2021-1045_jQuery_MiniColors_Plugin/'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.215306'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.215306'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T22:22:21Z', 'nvd_published_at': '2022-12-12T14:15:00Z'}
1.4.0
GHSA-rrfc-7g8p-99q8
2022-12-17T00:32:44Z
2022-12-13T17:51:40Z
null
['CVE-2022-23520']
Possible XSS vulnerability with certain configurations of rails-html-sanitizer
## Summary There is a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer. This is due to an incomplete fix of CVE-2022-32209. - Versions affected: ALL - Not affected: NONE - Fixed versions: 1.4.4 ## Impact A possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer's allowed tags to allow both "select" and "style" elements. Code is only impacted if allowed tags are being overridden using either of the following two mechanisms: 1. Using the Rails configuration `config.action_view.sanitized_allow_tags=`: ```ruby # In config/application.rb config.action_view.sanitized_allowed_tags = ["select", "style"] ``` (see https://guides.rubyonrails.org/configuring.html#configuring-action-view) 2. Using the class method `Rails::Html::SafeListSanitizer.allowed_tags=`: ```ruby # class-level option Rails::Html::SafeListSanitizer.allowed_tags = ["select", "style"] ``` All users overriding the allowed tags by either of the above mechanisms to include both "select" and "style" should either upgrade or use one of the workarounds immediately. NOTE: Code is _not_ impacted if allowed tags are overridden using either of the following mechanisms: - the `:tags` option to the Action View helper method `sanitize`. - the `:tags` option to the instance method `SafeListSanitizer#sanitize`. ## Workarounds Remove either "select" or "style" from the overridden allowed tags. ## References - [CWE - CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (4.9)](https://cwe.mitre.org/data/definitions/79.html) - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32209 - https://hackerone.com/reports/1654310 ## Credit This vulnerability was responsibly reported by Dominic Breuker.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rails-html-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-rrfc-7g8p-99q8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23520'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1654310'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails-html-sanitizer'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails-html-sanitizer/CVE-2022-23520.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/09/msg00012.html'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T17:51:40Z', 'nvd_published_at': '2022-12-14T18:15:00Z'}
1.4.0
GHSA-4v48-4q5m-8vx4
2022-12-05T22:02:05Z
2022-12-05T22:01:08Z
null
[]
Prometheus vulnerable to basic authentication bypass
### Impact Prometheus can be secured by a web.yml file that specifies usernames and hashed passwords for basic authentication. Passwords are hashed with bcrypt, which means that even if you have access to the hash, it is very hard to find the original password back. However, a flaw in the way this mechanism was implemented in the [exporter toolkit](https://github.com/prometheus/exporter-toolkit) makes it possible with people who know the hashed password to authenticate against Prometheus. A request can be forged by an attacker to poison the internal cache used to cache the computation of hashes and make subsequent requests successful. This cache is used in both happy and unhappy scenarios in order to limit side channel attacks that could tell an attacker if a user is present in the file or not. ### Patches Prometheus 2.37.4 ([LTS](https://prometheus.io/docs/introduction/release-cycle/)) and 2.40.4 have been released to address this issue. ### Workarounds There is no workaround but attacker must have access to the hashed password, stored in disk, to bypass the authentication.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/prometheus/prometheus'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.24.1'}, {'fixed': '2.37.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/prometheus/prometheus'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.38.0'}, {'fixed': '2.40.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/prometheus/prometheus/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.24.1'}, {'fixed': '2.37.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/prometheus/prometheus/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.38.0'}, {'fixed': '2.40.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/prometheus/prometheus/security/advisories/GHSA-4v48-4q5m-8vx4'}, {'type': 'WEB', 'url': 'https://github.com/prometheus/prometheus/commit/31a2db3ae9c0f4b486b6895973beabc1d1beac93'}, {'type': 'WEB', 'url': 'https://github.com/prometheus/prometheus/releases/tag/v2.37.4'}, {'type': 'WEB', 'url': 'https://github.com/prometheus/prometheus/releases/tag/v2.40.4'}, {'type': 'PACKAGE', 'url': 'github.com/prometheus/prometheus'}]
{'cwe_ids': ['CWE-303'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-05T22:01:08Z', 'nvd_published_at': None}
1.4.0
GHSA-vx2x-9cff-fhjw
2022-12-06T21:13:49Z
2022-12-06T21:13:49Z
null
[]
DSInternals Credential Roaming Elevation of Privilege Vulnerability
### Impact A vulnerability exists in the `DSInternals.Common.Data.RoamedCredential.Save()` method, which incorrectly parses the `msPKIAccountCredentials` LDAP attribute values. As a consequence, a malicious actor would be able to modify the file system of the computer where an application using this function is executed with administrative privileges. A [similar security issue](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30170) used to be present in the Windows operating system, as DSInternals re-implements the Credential Roaming feature of Windows. ### Exploitability The vulnerability can be exploited under the following circumstances: - An attacker is able to modify the `msPKIAccountCredentials` attribute of a user account in Active Directory. This attribute is used by the Credential Roaming feature of Windows and each AD user can modify their own roamed credentials. AND - A 3rd party application uses the `DSInternals.Common` library to export roamed credentials from Active Directory to a file system. AND - The application has administrative privileges on the local system. The probability of any 3rd-party product using the `DSInternals.Common` library being affected by this vulnerability is extremely low. ### Patches The issue had been fixed in DSInternals 4.8. ### References https://www.mandiant.com/resources/blog/apt29-windows-credential-roaming
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'DSInternals.Common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.21'}, {'fixed': '4.8'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/MichaelGrafnetter/DSInternals/security/advisories/GHSA-vx2x-9cff-fhjw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30170'}, {'type': 'PACKAGE', 'url': 'https://github.com/MichaelGrafnetter/DSInternals'}, {'type': 'WEB', 'url': 'https://www.mandiant.com/resources/blog/apt29-windows-credential-roaming'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T21:13:49Z', 'nvd_published_at': None}
1.4.0
GHSA-252h-2cmq-pmr6
2022-12-20T15:46:28Z
2022-12-15T21:30:28Z
null
['CVE-2020-24855']
easywebpack-cli Path Traversal vulnerability
Directory Traversal vulnerability in easywebpack-cli before 4.5.2 allows attackers to obtain sensitive information via crafted GET request.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@easy-team/easywebpack-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24855'}, {'type': 'WEB', 'url': 'https://github.com/easy-team/easywebpack-cli/issues/25'}, {'type': 'WEB', 'url': 'https://github.com/easy-team/easywebpack-cli/commit/eb3f54603f58ea706d0c03fd6eb76c94176eae52'}, {'type': 'PACKAGE', 'url': 'https://github.com/easy-team/easywebpack-cli'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T23:30:37Z', 'nvd_published_at': '2022-12-15T19:15:00Z'}
1.4.0
GHSA-qcf5-m2c6-89f2
2023-01-10T15:45:55Z
2022-12-28T15:30:45Z
null
['CVE-2022-4798']
usememos/memos Improper Authorization vulnerability
usememos/memos 0.9.0 and prior is vulnerable to Improper Authorization.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4798'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/e12eed25-1a8e-4ee1-b846-2d4df1db2fae'}]
{'cwe_ids': ['CWE-285', 'CWE-639'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T19:57:20Z', 'nvd_published_at': '2022-12-28T14:15:00Z'}
1.4.0
GHSA-m3cq-xcx9-3gvm
2023-08-29T22:40:39Z
2022-12-21T17:24:10Z
null
['CVE-2022-47633']
kyverno verifyImages rule bypass possible with malicious proxy/registry
### Impact Users of Kyverno on versions 1.8.3 or 1.8.4 who use `verifyImages` rules to verify container image signatures, and do not prevent use of unknown registries. ### Patches This issue has been fixed in version [1.8.5](https://github.com/kyverno/kyverno/releases/tag/v1.8.5) ### Workarounds Configure a Kyverno policy to restrict registries to a set of secure trusted image registries ([sample](https://kyverno.io/policies/best-practices/restrict_image_registries/restrict_image_registries/)). ### References
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/kyverno/kyverno'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.3'}, {'fixed': '1.8.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/kyverno/kyverno/security/advisories/GHSA-m3cq-xcx9-3gvm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-47633'}, {'type': 'WEB', 'url': 'https://github.com/kyverno/kyverno/pull/5713'}, {'type': 'PACKAGE', 'url': 'https://github.com/kyverno/kyverno'}, {'type': 'WEB', 'url': 'https://github.com/kyverno/kyverno/compare/v1.8.4...v1.8.5'}, {'type': 'WEB', 'url': 'https://github.com/kyverno/kyverno/releases/tag/v1.8.5'}, {'type': 'WEB', 'url': 'https://kyverno.io/docs/writing-policies/verify-images/'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-1180'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20230426095744/https://kyverno.io/policies/best-practices/restrict_image_registries/restrict_image_registries/'}]
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T17:24:10Z', 'nvd_published_at': '2022-12-23T23:15:00Z'}
1.4.0
GHSA-5x79-w82f-gw8w
2022-12-13T17:43:02Z
2022-12-13T17:43:02Z
null
['CVE-2022-23517']
Inefficient Regular Expression Complexity in rails-html-sanitizer
## Summary Certain configurations of rails-html-sanitizer `< 1.4.4` use an inefficient regular expression that is susceptible to excessive backtracking when attempting to sanitize certain SVG attributes. This may lead to a denial of service through CPU resource consumption. ## Mitigation Upgrade to rails-html-sanitizer `>= 1.4.4`. ## Severity The maintainers have evaluated this as [High Severity 7.5 (CVSS3.1)](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). ## References - [CWE - CWE-1333: Inefficient Regular Expression Complexity (4.9)](https://cwe.mitre.org/data/definitions/1333.html) - https://hackerone.com/reports/1684163 ## Credit This vulnerability was responsibly reported by @ooooooo-q (https://github.com/ooooooo-q).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rails-html-sanitizer'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-5x79-w82f-gw8w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23517'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails-html-sanitizer/commit/56c61c0cebd1e493e8ad7bca2a0191609a4a6979'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1684163'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails-html-sanitizer'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails-html-sanitizer/CVE-2022-23517.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/09/msg00012.html'}]
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T17:43:02Z', 'nvd_published_at': '2022-12-14T17:15:00Z'}
1.4.0
GHSA-mjmj-j48q-9wg2
2023-03-03T13:52:50Z
2022-12-12T21:19:47Z
null
['CVE-2022-1471']
SnakeYaml Constructor Deserialization Remote Code Execution
### Summary SnakeYaml's `Constructor` class, which inherits from `SafeConstructor`, allows any type be deserialized given the following line: new Yaml(new Constructor(TestDataClass.class)).load(yamlContent); Types do not have to match the types of properties in the target class. A `ConstructorException` is thrown, but only after a malicious payload is deserialized. ### Severity High, lack of type checks during deserialization allows remote code execution. ### Proof of Concept Execute `bash run.sh`. The PoC uses Constructor to deserialize a payload for RCE. RCE is demonstrated by using a payload which performs a http request to http://127.0.0.1:8000. Example output of successful run of proof of concept: ``` $ bash run.sh [+] Downloading snakeyaml if needed [+] Starting mock HTTP server on 127.0.0.1:8000 to demonstrate RCE nc: no process found [+] Compiling and running Proof of Concept, which a payload that sends a HTTP request to mock web server. [+] An exception is expected. Exception: Cannot create property=payload for JavaBean=Main$TestDataClass@3cbbc1e0 in 'string', line 1, column 1: payload: !!javax.script.ScriptEn ... ^ Can not set java.lang.String field Main$TestDataClass.payload to javax.script.ScriptEngineManager in 'string', line 1, column 10: payload: !!javax.script.ScriptEngineManag ... ^ at org.yaml.snakeyaml.constructor.Constructor$ConstructMapping.constructJavaBean2ndStep(Constructor.java:291) at org.yaml.snakeyaml.constructor.Constructor$ConstructMapping.construct(Constructor.java:172) at org.yaml.snakeyaml.constructor.Constructor$ConstructYamlObject.construct(Constructor.java:332) at org.yaml.snakeyaml.constructor.BaseConstructor.constructObjectNoCheck(BaseConstructor.java:230) at org.yaml.snakeyaml.constructor.BaseConstructor.constructObject(BaseConstructor.java:220) at org.yaml.snakeyaml.constructor.BaseConstructor.constructDocument(BaseConstructor.java:174) at org.yaml.snakeyaml.constructor.BaseConstructor.getSingleData(BaseConstructor.java:158) at org.yaml.snakeyaml.Yaml.loadFromReader(Yaml.java:491) at org.yaml.snakeyaml.Yaml.load(Yaml.java:416) at Main.main(Main.java:37) Caused by: java.lang.IllegalArgumentException: Can not set java.lang.String field Main$TestDataClass.payload to javax.script.ScriptEngineManager at java.base/jdk.internal.reflect.UnsafeFieldAccessorImpl.throwSetIllegalArgumentException(UnsafeFieldAccessorImpl.java:167) at java.base/jdk.internal.reflect.UnsafeFieldAccessorImpl.throwSetIllegalArgumentException(UnsafeFieldAccessorImpl.java:171) at java.base/jdk.internal.reflect.UnsafeObjectFieldAccessorImpl.set(UnsafeObjectFieldAccessorImpl.java:81) at java.base/java.lang.reflect.Field.set(Field.java:780) at org.yaml.snakeyaml.introspector.FieldProperty.set(FieldProperty.java:44) at org.yaml.snakeyaml.constructor.Constructor$ConstructMapping.constructJavaBean2ndStep(Constructor.java:286) ... 9 more [+] Dumping Received HTTP Request. Will not be empty if PoC worked GET /proof-of-concept HTTP/1.1 User-Agent: Java/11.0.14 Host: localhost:8000 Accept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2 Connection: keep-alive ``` ### Further Analysis Potential mitigations include, leveraging SnakeYaml's SafeConstructor while parsing untrusted content. See https://bitbucket.org/snakeyaml/snakeyaml/issues/561/cve-2022-1471-vulnerability-in#comment-64581479 for discussion on the subject. A fix was released in version 2.0. See https://bitbucket.org/snakeyaml/snakeyaml/issues/561/cve-2022-1471-vulnerability-in#comment-64876314 for more information. ### Timeline **Date reported**: 4/11/2022 **Date fixed**: **Date disclosed**: 10/13/2022
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.yaml:snakeyaml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.33'}}]
[{'type': 'WEB', 'url': 'https://github.com/google/security-research/security/advisories/GHSA-mjmj-j48q-9wg2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1471'}, {'type': 'PACKAGE', 'url': 'https://bitbucket.org/snakeyaml/snakeyaml'}, {'type': 'WEB', 'url': 'https://bitbucket.org/snakeyaml/snakeyaml/commits/5014df1a36f50aca54405bb8433bc99a8847f758'}, {'type': 'WEB', 'url': 'https://bitbucket.org/snakeyaml/snakeyaml/commits/acc44099f5f4af26ff86b4e4e4cc1c874e2dc5c4'}, {'type': 'WEB', 'url': 'https://bitbucket.org/snakeyaml/snakeyaml/issues/561/cve-2022-1471-vulnerability-in#comment-64581479'}, {'type': 'WEB', 'url': 'https://bitbucket.org/snakeyaml/snakeyaml/issues/561/cve-2022-1471-vulnerability-in#comment-64634374'}, {'type': 'WEB', 'url': 'https://bitbucket.org/snakeyaml/snakeyaml/issues/561/cve-2022-1471-vulnerability-in#comment-64876314'}, {'type': 'WEB', 'url': 'https://bitbucket.org/snakeyaml/snakeyaml/wiki/CVE-2022-1471'}, {'type': 'WEB', 'url': 'https://github.com/mbechler/marshalsec'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/kubernetes-security-announce/c/mwrakFaEdnc'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230818-0015/'}, {'type': 'WEB', 'url': 'https://snyk.io/blog/unsafe-deserialization-snakeyaml-java-cve-2022-1471/'}, {'type': 'WEB', 'url': 'https://www.github.com/mbechler/marshalsec/blob/master/marshalsec.pdf?raw=true'}]
{'cwe_ids': ['CWE-20', 'CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T21:19:47Z', 'nvd_published_at': '2022-12-01T11:15:00Z'}
1.4.0
GHSA-m5v8-wpw4-rj3x
2022-12-21T17:22:43Z
2022-12-21T06:30:29Z
null
['CVE-2022-24431']
abacus-ext-cmdline vulnerable to Command Injection
All versions of package abacus-ext-cmdline are vulnerable to Command Injection via the execute function due to improper user-input sanitization.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'abacus-ext-cmdline'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.6-dev.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24431'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-ABACUSEXTCMDLINE-3157950'}]
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T17:22:43Z', 'nvd_published_at': '2022-12-21T05:15:00Z'}
1.4.0
GHSA-hrm3-3xm6-x33h
2023-01-10T15:49:55Z
2022-12-28T00:30:23Z
null
['CVE-2020-36569']
golang-nanoauth authentication bypass vulnerability
Authentication is globally bypassed in github.com/nanobox-io/golang-nanoauth between v0.0.0-20160722212129-ac0cc4484ad4 and v0.0.0-20200131131040-063a3fb69896 if ListenAndServe is called with an empty token.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/nanobox-io/golang-nanoauth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0-20160722212129-ac0cc4484ad4'}, {'fixed': '0.0.0-20200131131040-063a3fb69896'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36569'}, {'type': 'WEB', 'url': 'https://github.com/nanobox-io/golang-nanoauth/pull/5'}, {'type': 'WEB', 'url': 'https://github.com/nanobox-io/golang-nanoauth/commit/063a3fb69896acf985759f0fe3851f15973993f3'}, {'type': 'PACKAGE', 'url': 'https://github.com/nanobox-io/golang-nanoauth'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0004'}]
{'cwe_ids': ['CWE-287', 'CWE-305'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T18:54:51Z', 'nvd_published_at': '2022-12-27T22:15:00Z'}
1.4.0
GHSA-w57v-6xp4-rm2v
2023-01-02T20:15:37Z
2022-12-23T12:30:25Z
null
['CVE-2022-4689']
usememos/memos vulnerable to account takeover due to improper access control
usememos/memos is an open-source, self-hosted memo hub with knowledge management and socialization. Versions prior to 0.9.0 improperly maintain access control allowing an attacker to take over an account by changing header values in the HTTP request.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4689'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/pull/831'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/dca35bde877aab6e64ef51b52e590b5d48f692f9'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a78c4326-6e7b-47fe-aa82-461e5c12a4e3'}]
{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-27T01:57:10Z', 'nvd_published_at': '2022-12-23T12:15:00Z'}
1.4.0
GHSA-m8xw-9x5x-6vh3
2022-12-09T15:55:22Z
2022-12-06T21:30:45Z
null
['CVE-2022-44900']
py7zr directory traversal vulnerability
A directory traversal vulnerability in the SevenZipFile.extractall() function of the python library py7zr v0.20.0 and earlier allows attackers to write arbitrary files via extracting a crafted 7z file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'py7zr'}, 'ecosystem_specific': {'affected_functions': ['py7zr.py7zr.SevenZipFile.extractall', 'py7zr.py7zr.SevenZipFile._extract', 'py7zr.py7zr.Worker._extract_single', 'py7zr.py7zr.Worker.extract']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.20.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.20.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-44900'}, {'type': 'WEB', 'url': 'https://github.com/miurahr/py7zr/commit/1bb43f17515c7f69673a1c88ab9cc72a7bbef406'}, {'type': 'WEB', 'url': 'https://advisory-inbox.githubapp.com/advisory_reviews/GHSA-m8xw-9x5x-6vh3'}, {'type': 'PACKAGE', 'url': 'https://github.com/miurahr/py7zr'}, {'type': 'WEB', 'url': 'https://lessonsec.com/cve/cve-2022-44900/'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/170127/py7zr-0.20.0-Directory-Traversal.html'}]
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T22:34:58Z', 'nvd_published_at': '2022-12-06T20:15:00Z'}
1.4.0
GHSA-399p-vq28-5hg8
2023-01-10T16:08:01Z
2022-12-31T12:30:20Z
null
['CVE-2017-20159']
keynote Cross-site Scripting vulnerability
A vulnerability was found in rf Keynote up to 0.x. It has been rated as problematic. Affected by this issue is some unknown functionality of the file lib/keynote/rumble.rb. The manipulation of the argument value leads to cross site scripting. The attack may be launched remotely. Upgrading to version 1.0.0 can address this issue. The name of the patch is 05be4356b0a6ca7de48da926a9b997beb5ffeb4a. It is recommended to upgrade the affected component. VDB-217142 is the identifier assigned to this vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'keynote'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-20159'}, {'type': 'WEB', 'url': 'https://github.com/rf-/keynote/commit/05be4356b0a6ca7de48da926a9b997beb5ffeb4a'}, {'type': 'PACKAGE', 'url': 'https://github.com/rf-/keynote'}, {'type': 'WEB', 'url': 'https://github.com/rf-/keynote/releases/tag/v1.0.0'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/keynote/CVE-2017-20159.yml'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217142'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217142'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-04T14:24:55Z', 'nvd_published_at': '2022-12-31T11:15:00Z'}
1.4.0
GHSA-3v6v-2x6p-32mc
2022-12-19T21:09:48Z
2022-12-13T18:30:34Z
null
['CVE-2022-4223']
pgadmin4 vulnerable to Code Injection
The pgAdmin server includes an HTTP API that is intended to be used to validate the path a user selects to external PostgreSQL utilities such as pg_dump and pg_restore. The utility is executed by the server to determine what PostgreSQL version it is from. Versions of pgAdmin prior to 6.17 failed to properly secure this API, which could allow an unauthenticated user to call it with a path of their choosing, such as a UNC path to a server they control on a Windows machine. This would cause an appropriately named executable in the target path to be executed by the pgAdmin server.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pgadmin4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.17'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4223'}, {'type': 'WEB', 'url': 'https://github.com/pgadmin-org/pgadmin4/issues/5593'}, {'type': 'PACKAGE', 'url': 'https://github.com/pgadmin-org/pgadmin4'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R5EYTPKHVFSDCETBJI7LBZE4EYHBPN2Q/'}]
{'cwe_ids': ['CWE-862', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-19T21:09:48Z', 'nvd_published_at': '2022-12-13T16:15:00Z'}
1.4.0
GHSA-jw6x-4h8h-569x
2022-12-21T16:12:56Z
2022-12-15T21:30:26Z
null
['CVE-2022-4524']
Roots Soil plugin vulnerable to Cross-site Scripting
A vulnerability, which was classified as problematic, was found in Roots soil Plugin up to 4.1.0. Affected is the function language_attributes of the file src/Modules/CleanUpModule.php. The manipulation of the argument language leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 4.1.1 is able to address this issue. The name of the patch is 0c9151e00ab047da253e5cdbfccb204dd423269d. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-215904.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'roots/soil'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4524'}, {'type': 'WEB', 'url': 'https://github.com/roots/soil/pull/285'}, {'type': 'WEB', 'url': 'https://github.com/roots/soil/commit/0c9151e00ab047da253e5cdbfccb204dd423269d'}, {'type': 'PACKAGE', 'url': 'https://github.com/roots/soil'}, {'type': 'WEB', 'url': 'https://github.com/roots/soil/releases/tag/4.1.0'}, {'type': 'WEB', 'url': 'https://github.com/roots/soil/releases/tag/4.1.1'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.215904'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T23:28:07Z', 'nvd_published_at': '2022-12-15T21:15:00Z'}
1.4.0
GHSA-p82q-rxpm-hjpc
2022-12-21T19:26:02Z
2022-12-21T18:48:22Z
null
['CVE-2022-23551']
AAD Pod Identity obtaining token with backslash
### Impact _What kind of vulnerability is it? Who is impacted?_ The [NMI](https://azure.github.io/aad-pod-identity/docs/concepts/nmi/) component in AAD Pod Identity intercepts and validates token requests based on regex. In this case, a token request made with backslash in the request (example: `/metadata/identity\oauth2\token/`) would bypass the NMI validation and be sent to [IMDS](https://learn.microsoft.com/en-us/azure/virtual-machines/windows/instance-metadata-service?tabs=windows) allowing a pod in the cluster to access identities that it shouldn't have access to. ### Patches _Has the problem been patched? What versions should users upgrade to?_ - We analyzed this bug and determined that we needed to fix it. This fix has been included in AAD Pod Identity release [v1.8.13](https://github.com/Azure/aad-pod-identity/releases/tag/v1.8.13) - If using the [AKS pod-managed identities add-on](https://learn.microsoft.com/en-us/azure/aks/use-azure-ad-pod-identity), no action is required. The clusters should now be running the `v1.8.13` release. ### For more information If you have any questions or comments about this advisory: Open an issue in [Azure/aad-pod-identity](https://github.com/Azure/aad-pod-identity)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:H/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/Azure/aad-pod-identity'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.13'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Azure/aad-pod-identity/security/advisories/GHSA-p82q-rxpm-hjpc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23551'}, {'type': 'WEB', 'url': 'https://github.com/Azure/aad-pod-identity/commit/7e01970391bde6c360d077066ca17d059204cb5d'}, {'type': 'PACKAGE', 'url': 'https://github.com/Azure/aad-pod-identity'}, {'type': 'WEB', 'url': 'https://github.com/Azure/aad-pod-identity/releases/tag/v1.8.13'}]
{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T18:48:22Z', 'nvd_published_at': '2022-12-21T20:15:00Z'}
1.4.0
GHSA-6rmf-cv6p-4h27
2022-12-22T19:53:24Z
2022-12-17T15:30:23Z
null
['CVE-2022-4589']
Terms and Conditions Module vulnerable to Open Redirect
A vulnerability has been found in cyface Terms and Conditions Module up to 2.0.10 and classified as problematic. Affected by this vulnerability is the function returnTo of the file termsandconditions/views.py. The manipulation leads to open redirect. The attack can be launched remotely. Upgrading to version 2.0.11 can address this issue. The name of the patch is 03396a1c2e0af95e12a45c5faef7e47a4b513e1a. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216175.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django-termsandconditions'}, 'ecosystem_specific': {'affected_functions': ['termsandconditions.views.GetTermsViewMixin.get_return_to', 'termsandconditions.views.GetTermsViewMixin.is_safe_url', 'termsandconditions.views.AcceptTermsView.get_initial', 'termsandconditions.views.AcceptTermsView.post', 'termsandconditions.views.EmailTermsView.get_initial', 'termsandconditions.views.EmailTermsView.form_valid']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4589'}, {'type': 'WEB', 'url': 'https://github.com/cyface/django-termsandconditions/pull/239'}, {'type': 'WEB', 'url': 'https://github.com/cyface/django-termsandconditions/commit/03396a1c2e0af95e12a45c5faef7e47a4b513e1a'}, {'type': 'PACKAGE', 'url': 'https://github.com/cyface/django-termsandconditions'}, {'type': 'WEB', 'url': 'https://github.com/cyface/django-termsandconditions/releases/tag/v2.0.10'}, {'type': 'WEB', 'url': 'https://github.com/cyface/django-termsandconditions/releases/tag/v2.0.11'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.216175'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-19T18:14:46Z', 'nvd_published_at': '2022-12-17T13:15:00Z'}
1.4.0
GHSA-jfp7-79g7-89rf
2022-12-13T17:04:02Z
2022-12-13T17:04:02Z
null
['CVE-2022-23501']
TYPO3 CMS vulnerable to Weak Authentication in Frontend Login
### Problem Restricting frontend login to specific users, organized in different storage folders (partitions), can be bypassed. A potential attacker might use this ambiguity in usernames to get access to a different account - however, credentials must be known to the adversary. ### Solution Update to TYPO3 versions 8.7.49 ELTS, 9.5.38 ELTS, 10.4.33, 11.5.20, 12.1.1 that fix the problem described above. ### References * [TYPO3-CORE-SA-2022-013](https://typo3.org/security/advisory/typo3-core-sa-2022-013)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.7.49'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.38'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.33'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.5.20'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0.0'}, {'fixed': '12.1.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.33'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.5.20'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0.0'}, {'fixed': '12.1.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-jfp7-79g7-89rf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23501'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/commit/28be9cdb3fed02ce4cfc6fa2d39f7d8e2266eced'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2022-23501.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2022-23501.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3/typo3'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2022-013'}]
{'cwe_ids': ['CWE-287', 'CWE-302'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T17:04:02Z', 'nvd_published_at': '2022-12-14T08:15:00Z'}
1.4.0
GHSA-hggr-p7v6-73p5
2022-12-30T00:57:23Z
2022-12-28T00:30:23Z
null
['CVE-2020-36568']
revel is vulnerable to resource exhaustion
Unsanitized input in the query parser in github.com/revel/revel before v1.0.0 allows remote attackers to cause resource exhaustion via memory allocation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/revel/revel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36568'}, {'type': 'WEB', 'url': 'https://github.com/revel/revel/issues/1424'}, {'type': 'WEB', 'url': 'https://github.com/revel/revel/pull/1427'}, {'type': 'WEB', 'url': 'https://github.com/revel/revel/commit/d160ecb72207824005b19778594cbdc272e8a605'}, {'type': 'PACKAGE', 'url': 'https://github.com/revel/revel'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0003'}]
{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T00:57:23Z', 'nvd_published_at': '2022-12-27T22:15:00Z'}
1.4.0
GHSA-mq5q-gpgv-pwxw
2023-01-10T15:41:58Z
2022-12-28T15:30:46Z
null
['CVE-2022-4805']
usememos/memos Incorrect Use of Privileged APIs vulnerability
In usememos/memos 0.9.0 and prior, a user can archive any private memos, delete any shortcut, and edit any shortcut from other users via API.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4805'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b03f6a9b-e49b-42d6-a318-1d7afd985873'}]
{'cwe_ids': ['CWE-648'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T19:58:45Z', 'nvd_published_at': '2022-12-28T14:15:00Z'}
1.4.0
GHSA-h4q8-96p6-jcgr
2022-12-19T22:48:32Z
2022-12-19T22:48:32Z
null
['CVE-2022-39304']
ghinstallation returns app JWT in error responses
### Impact In ghinstallation v1, when the request to refresh an installation token failed, the HTTP request and response would be returned for debugging. https://github.com/bradleyfalzon/ghinstallation/blob/24e56b3fb7669f209134a01eff731d7e2ef72a5c/transport.go#L172-L174 The request contained the bearer JWT for the App, and was returned back to clients. This token is short lived (10 minute maximum). ### Patches - This has already been patched in d24f14f8be70d94129d76026e8b0f4f9170c8c3e, and is available in releases >= v2.0.0. ### References _Are there any links users can visit to find out more?_ - See https://docs.github.com/en/developers/apps/building-github-apps/authenticating-with-github-apps#authenticating-as-an-installation for the App installation flow. ### For more information If you have any questions or comments about this advisory: * Open an issue in [ghinstallation](https://github.com/bradleyfalzon/ghinstallation)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/bradleyfalzon/ghinstallation'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/bradleyfalzon/ghinstallation/security/advisories/GHSA-h4q8-96p6-jcgr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39304'}, {'type': 'WEB', 'url': 'https://github.com/bradleyfalzon/ghinstallation/commit/d24f14f8be70d94129d76026e8b0f4f9170c8c3e'}, {'type': 'WEB', 'url': 'https://docs.github.com/en/developers/apps/building-github-apps/authenticating-with-github-apps#authenticating-as-an-installation'}, {'type': 'PACKAGE', 'url': 'https://github.com/bradleyfalzon/ghinstallation'}, {'type': 'WEB', 'url': 'https://github.com/bradleyfalzon/ghinstallation/blob/24e56b3fb7669f209134a01eff731d7e2ef72a5c/transport.go#L172-L174'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-1178'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2022-061_ghinstallation/'}]
{'cwe_ids': ['CWE-209'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-19T22:48:32Z', 'nvd_published_at': '2022-12-20T20:15:00Z'}
1.4.0
GHSA-8r76-fr72-j32w
2022-12-12T22:02:42Z
2022-12-12T22:02:42Z
null
[]
Creator Verification Error when Bubblegum Activate
This was an error found by @metamania01 of the Audit Company Solshield. It allowed one to verify a creator that did not sign by making use of a provision in Token Metadata that allows Creators who have signed compressed nfts to allow them to decompress with verified creators. The issue is now patched. For more info see. https://twitter.com/thehasheddude/status/1601642138143375360
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'mpl-bubblegum'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.0'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'mpl-token-metadata'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.6.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/metaplex-foundation/metaplex-program-library/security/advisories/GHSA-8r76-fr72-j32w'}, {'type': 'WEB', 'url': 'https://github.com/metaplex-foundation/metaplex-program-library/commit/c18591a7ce9bb561940cb94df4b7c35ef9cc0f57'}, {'type': 'PACKAGE', 'url': 'https://github.com/metaplex-foundation/metaplex-program-library'}, {'type': 'WEB', 'url': 'https://twitter.com/thehasheddude/status/1601642138143375360'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T22:02:42Z', 'nvd_published_at': None}
1.4.0
GHSA-x39j-h85h-3f46
2022-12-09T15:21:18Z
2022-12-08T16:12:26Z
null
['CVE-2022-23495']
go-merkledag's ProtoNode may be modified such that common method calls may panic
### Impact A `ProtoNode` may be modified in such a way as to cause various encode errors which will trigger a panic on common method calls that don't allow for error returns. A `ProtoNode` should only be able to encode to valid DAG-PB, attempting to encode invalid DAG-PB forms will result in an error from the codec. Manipulation of an existing (newly created or decoded) `ProtoNode` using the modifier methods did not account for certain states that would place the `ProtoNode` into an unencodeable form. Due to conformance with the [`github.com/ipfs/go-block-format#Block`](https://pkg.go.dev/github.com/ipfs/go-block-format#Block) and [`github.com/ipfs/go-ipld-format#Node`](https://pkg.go.dev/github.com/ipfs/go-ipld-format#Node) interfaces, certain methods, which internally require a re-encode if state has changed, will panic due to the inability to return an error. Additionally, use of the `ProtoNode#SetCidBuilder()` method to set a non-functioning `CidBuilder` (such as one that refers to a multihash where an implementation of that hash function is not available) may cause the same methods to panic as a new CID is required but cannot be created. ### Patches Releases involving fixes for this issue are [v0.8.0](https://github.com/ipfs/go-merkledag/releases/tag/v0.8.0) and [v0.8.1](https://github.com/ipfs/go-merkledag/releases/tag/v0.8.1). The recommended minimum version is **v0.8.1**. * Additional checks are performed on `ProtoNode` state changes to avoid the possibility of creating unencodeable forms, errors are returned where this is the case. * The builder passed in to `SetCidBuilder()` is inspected to attempt to determine if it is usable to generate CIDs, otherwise an error is returned. * The panics have been removed and replaced with default values (empty byte slice for `RawData()` and a default zero-bytes DAG-PB CID for methods involving CIDs). ### Workarounds These workarounds are available when using impacted versions to avoid panic conditions, and may be generally appropriate in order to provide meaningful feedback to users and avoid generating bad, or unexpected encoded data: * Sanitise inputs when allowing user-input to set a new `CidBuilder` on a `ProtoNode`. * Sanitise `Tsize` (`Link#Size`) values such that they are a reasonable byte-size for sub-DAGs where derived from user-input. ### References * https://github.com/ipfs/kubo/issues/9297 * https://github.com/ipfs/go-merkledag/issues/90 * https://github.com/ipfs/go-merkledag/releases/tag/v0.8.0 * https://github.com/ipfs/go-merkledag/pull/91 * https://github.com/ipfs/go-merkledag/pull/92 * https://github.com/ipfs/go-merkledag/pull/93 * https://github.com/ipfs/go-merkledag/releases/tag/v0.8.1 ### Credit Thanks to [@mrd0ll4r](https://github.com/mrd0ll4r) for reporting the original error to Kubo!
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ipfs/go-merkledag'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.0'}, {'fixed': '0.8.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ipfs/go-merkledag/security/advisories/GHSA-x39j-h85h-3f46'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23495'}, {'type': 'WEB', 'url': 'https://github.com/ipfs/go-merkledag/issues/90'}, {'type': 'WEB', 'url': 'https://github.com/ipfs/kubo/issues/9297'}, {'type': 'WEB', 'url': 'https://github.com/ipfs/go-merkledag/pull/91'}, {'type': 'WEB', 'url': 'https://github.com/ipfs/go-merkledag/pull/92'}, {'type': 'WEB', 'url': 'https://github.com/ipfs/go-merkledag/pull/93'}, {'type': 'WEB', 'url': 'https://en.wikipedia.org/wiki/Directed_acyclic_graph'}, {'type': 'PACKAGE', 'url': 'https://github.com/ipfs/go-merkledag'}, {'type': 'WEB', 'url': 'https://github.com/ipfs/go-merkledag/releases/tag/v0.8.0'}, {'type': 'WEB', 'url': 'https://github.com/ipfs/go-merkledag/releases/tag/v0.8.1'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-1155'}]
{'cwe_ids': ['CWE-252', 'CWE-755'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-08T16:12:26Z', 'nvd_published_at': '2022-12-08T22:15:00Z'}
1.4.0
GHSA-rmj9-q58g-9qgg
2023-01-10T15:55:39Z
2022-12-28T00:30:23Z
null
['CVE-2020-36560']
go-unzip vulnerable to Path Traversal
Due to improper path santization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/artdarek/go-unzip'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36560'}, {'type': 'WEB', 'url': 'https://github.com/artdarek/go-unzip/pull/2'}, {'type': 'WEB', 'url': 'https://github.com/artdarek/go-unzip/commit/4975cbe0a719dc50b12da8585f1f207c82f7dfe0'}, {'type': 'PACKAGE', 'url': 'https://github.com/artdarek/go-unzip'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0034'}, {'type': 'WEB', 'url': 'https://snyk.io/research/zip-slip-vulnerability'}]
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T19:06:21Z', 'nvd_published_at': '2022-12-27T22:15:00Z'}
1.4.0
GHSA-gp5f-gqgq-7254
2022-12-20T21:55:36Z
2022-12-15T21:30:26Z
null
['CVE-2022-4521']
WSO2 carbon-registry vulnerable to Cross-site Scripting
A vulnerability classified as problematic has been found in WSO2 carbon-registry before 4.8.7. This affects an unknown part of the component Request Parameter Handler. The manipulation of the argument parentPath/path/username/path/profile_menu leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 4.8.7 or later will address this issue. The name of the patch is 9f967abfde9317bee2cda469dbc09b57d539f2cc. It is recommended to upgrade the affected component. The identifier VDB-215901 was assigned to this vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.wso2.carbon.registry:carbon-registry'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.8.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4521'}, {'type': 'WEB', 'url': 'https://github.com/wso2/carbon-registry/pull/399'}, {'type': 'WEB', 'url': 'https://github.com/wso2/carbon-registry/commit/9f967abfde9317bee2cda469dbc09b57d539f2cc'}, {'type': 'PACKAGE', 'url': 'https://github.com/wso2/carbon-registry'}, {'type': 'WEB', 'url': 'https://github.com/wso2/carbon-registry/releases/tag/v4.8.12'}, {'type': 'WEB', 'url': 'https://github.com/wso2/carbon-registry/releases/tag/v4.8.7'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.215901'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T23:28:37Z', 'nvd_published_at': '2022-12-15T21:15:00Z'}
1.4.0
GHSA-87mm-qxm5-cp3f
2022-12-29T00:34:38Z
2022-12-28T03:30:28Z
null
['CVE-2022-3346']
go-resolver vulnerable to attacker-controlled domains due to unvalidated RRSIG RRs
go-resolver's DNSSEC validation is not performed correctly. An attacker can cause this package to report successful validation for invalid, attacker-controlled records. The owner name of RRSIG RRs is not validated, permitting an attacker to present the RRSIG for an attacker-controlled domain in a response for any other domain.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/peterzen/goresolver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3346'}, {'type': 'WEB', 'url': 'https://github.com/peterzen/goresolver/issues/5'}, {'type': 'PACKAGE', 'url': 'https://github.com/peterzen/goresolver'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0979'}]
{'cwe_ids': ['CWE-345'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-29T00:34:38Z', 'nvd_published_at': '2022-12-28T03:15:00Z'}
1.4.0
GHSA-g8q8-fggx-9r3q
2023-01-25T21:37:00Z
2022-12-13T19:44:56Z
null
['CVE-2022-3782']
Keycloak vulnerable to path traversal via double URL encoding
Keycloak does not properly validate URLs included in a redirect. An attacker could construct a malicious request to bypass validation and access other URLs and potentially sensitive information within the domain, or possibly conduct further attacks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20.0.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 20.0.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/security/advisories/GHSA-g8q8-fggx-9r3q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3782'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/pull/15982/commits/1987c942f527b9f3bbf2a86ba71ba8ae0154ac37'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2022-3782'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}]
{'cwe_ids': ['CWE-177', 'CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T19:44:56Z', 'nvd_published_at': '2023-01-13T06:15:00Z'}
1.4.0
GHSA-xrjj-mj9h-534m
2023-01-18T00:05:16Z
2022-12-08T21:30:19Z
null
['CVE-2022-41717']
golang.org/x/net/http2 vulnerable to possible excessive memory growth
An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'golang.org/x/net/http2'}, 'ecosystem_specific': {'affected_functions': ['Server.ServeConn']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41717'}, {'type': 'PACKAGE', 'url': 'https://cs.opensource.google/go/x/net'}, {'type': 'WEB', 'url': 'https://go.dev/cl/455635'}, {'type': 'WEB', 'url': 'https://go.dev/cl/455717'}, {'type': 'WEB', 'url': 'https://go.dev/issue/56350'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-1144'}]
{'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-18T00:05:16Z', 'nvd_published_at': '2022-12-08T20:15:00Z'}
1.4.0
GHSA-7rf3-mqpx-h7xg
2023-01-04T14:27:01Z
2022-12-13T15:30:26Z
null
['CVE-2022-45685']
Jettison Out-of-bounds Write vulnerability
A stack overflow in Jettison before v1.5.2 allows attackers to cause a Denial of Service (DoS) via crafted JSON data.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.codehaus.jettison:jettison'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45685'}, {'type': 'WEB', 'url': 'https://github.com/jettison-json/jettison/issues/54'}, {'type': 'PACKAGE', 'url': 'https://github.com/jettison-json/jettison'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/12/msg00045.html'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5312'}]
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-04T14:27:01Z', 'nvd_published_at': '2022-12-13T15:15:00Z'}
1.4.0
GHSA-rgj5-jj5q-v3v7
2022-12-23T21:53:07Z
2022-12-19T12:30:23Z
null
['CVE-2022-4609']
Memos Cross-site Scripting vulnerability
Memos, an open-source, self-hosted memo hub, is vulnerable to stored Cross-site Scripting (XSS) in versions 0.8.3 and prior. A patch is available and anticipated to be part of version 0.9.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.8.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4609'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/726285e63467820f94cbf872abe71025a161c212'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/5b3115c5-776c-43d3-a7be-c8dc13ab81ce'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-19T18:20:07Z', 'nvd_published_at': '2022-12-19T12:15:00Z'}
1.4.0
GHSA-r9hx-vwmv-q579
2022-12-27T14:51:05Z
2022-12-23T00:30:23Z
null
['CVE-2022-40897']
pypa/setuptools vulnerable to Regular Expression Denial of Service (ReDoS)
Python Packaging Authority (PyPA)'s setuptools is a library designed to facilitate packaging Python projects. Setuptools version 65.5.0 and earlier could allow remote attackers to cause a denial of service by fetching malicious HTML from a PyPI package or custom PackageIndex page due to a vulnerable Regular Expression in `package_index`. This has been patched in version 65.5.1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'setuptools'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '65.5.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40897'}, {'type': 'WEB', 'url': 'https://github.com/pypa/setuptools/issues/3659'}, {'type': 'WEB', 'url': 'https://github.com/pypa/setuptools/commit/43a9c9bfa6aa626ec2a22540bea28d2ca77964be'}, {'type': 'PACKAGE', 'url': 'https://github.com/pypa/setuptools/'}, {'type': 'WEB', 'url': 'https://github.com/pypa/setuptools/blob/fe8a98e696241487ba6ac9f91faa38ade939ec5d/setuptools/package_index.py#L200'}, {'type': 'WEB', 'url': 'https://github.com/pypa/setuptools/compare/v65.5.0...v65.5.1'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ADES3NLOE5QJKBLGNZNI2RGVOSQXA37R/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YNA2BAH2ACBZ4TVJZKFLCR7L23BG5C3H/'}, {'type': 'WEB', 'url': 'https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/'}, {'type': 'WEB', 'url': 'https://pyup.io/vulnerabilities/CVE-2022-40897/52495/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230214-0001/'}, {'type': 'WEB', 'url': 'https://setuptools.pypa.io/en/latest/'}]
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-27T14:51:05Z', 'nvd_published_at': '2022-12-23T00:15:00Z'}
1.4.0
GHSA-j82x-fh8h-326g
2023-01-09T21:59:35Z
2022-12-31T12:30:20Z
null
['CVE-2017-20158']
Yii2 FileAPI Widget vulnerable to Cross-site Scripting
A vulnerability was found in vova07 Yii2 FileAPI Widget up to 0.1.8. It has been declared as problematic. Affected by this vulnerability is the function run of the file actions/UploadAction.php. The manipulation of the argument file leads to cross site scripting. The attack can be launched remotely. Upgrading to version 0.1.9 can address this issue. The name of the patch is c00d1e4fc912257fca1fce66d7a163bdbb4c8222. It is recommended to upgrade the affected component. The identifier VDB-217141 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'vova07/yii2-fileapi-widget'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-20158'}, {'type': 'WEB', 'url': 'https://github.com/vova07/yii2-fileapi-widget/commit/c00d1e4fc912257fca1fce66d7a163bdbb4c8222'}, {'type': 'PACKAGE', 'url': 'https://github.com/vova07/yii2-fileapi-widget'}, {'type': 'WEB', 'url': 'https://github.com/vova07/yii2-fileapi-widget/releases/tag/0.1.9'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217141'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217141'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T21:59:35Z', 'nvd_published_at': '2022-12-31T11:15:00Z'}
1.4.0
GHSA-4jv9-3563-23j3
2023-01-08T15:23:32Z
2022-12-19T09:30:23Z
null
['CVE-2016-20018']
Knex.js has a limited SQL injection vulnerability
Knex Knex.js through 2.3.0 has a limited SQL injection vulnerability that can be exploited to ignore the WHERE clause of a SQL query. This vulnerability has been fixed in version 2.4.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'knex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-20018'}, {'type': 'WEB', 'url': 'https://github.com/knex/knex/issues/1227'}, {'type': 'PACKAGE', 'url': 'https://github.com/knex/knex'}, {'type': 'WEB', 'url': 'https://github.com/knex/knex/releases/tag/2.4.0'}, {'type': 'WEB', 'url': 'https://www.ghostccamm.com/blog/knex_sqli/'}]
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T17:19:47Z', 'nvd_published_at': '2022-12-19T09:15:00Z'}
1.4.0
GHSA-rf3g-v8p5-p675
2022-12-05T23:06:14Z
2022-12-05T23:06:14Z
null
['CVE-2022-46164']
NodeBB vulnerable to account takeover via prototype vulnerability
### Impact Due to a plain object with a prototype being used in socket.io message handling a specially crafted payload can be used to impersonate other users and takeover accounts. ### Patches Patched in 2.6.1 ### Workarounds Site maintainers can cherry-pick https://github.com/NodeBB/NodeBB/commit/48d143921753914da45926cca6370a92ed0c46b8 into their codebase to patch the exploit. ### For more information If you have any questions or comments about this advisory: Discuss it on [our community forum](https://github.com/NodeBB/NodeBB/security/advisories/community.nodebb.org/) Email us at [support@nodebb.org](mailto:support@nodebb.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'nodebb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/security/advisories/GHSA-rf3g-v8p5-p675'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46164'}, {'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/commit/48d143921753914da45926cca6370a92ed0c46b8'}, {'type': 'PACKAGE', 'url': 'https://github.com/NodeBB/NodeBB'}, {'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/releases/tag/v2.6.1'}]
{'cwe_ids': ['CWE-665'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-05T23:06:14Z', 'nvd_published_at': '2022-12-05T21:15:00Z'}
1.4.0
GHSA-cp9c-phxx-55xm
2022-12-12T22:08:01Z
2022-12-11T15:30:45Z
null
['CVE-2022-4407']
phpMyFAQ vulnerable to Cross-site Scripting
phpMyFAQ prior to version 3.1.9 is vulnerable to reflected Cross-site Scripting (XSS).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4407'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/1d73af34bf42764f9f9491c7ba5e9495d70e3ca5'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpmyfaq'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a1649f43-78c9-4927-b313-36911872a84b'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T22:08:01Z', 'nvd_published_at': '2022-12-11T15:15:00Z'}
1.4.0
GHSA-jpf8-h7h7-3ppm
2023-08-30T11:49:22Z
2022-12-28T00:30:23Z
null
['CVE-2020-36566']
tar-utils Path Traversal vulnerability
Due to improper path sanitization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/whyrusleeping/tar-utils'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20201201191210-20a61371de5b'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36566'}, {'type': 'WEB', 'url': 'https://github.com/whyrusleeping/tar-utils/commit/20a61371de5b51380bbdb0c7935b30b0625ac227'}, {'type': 'PACKAGE', 'url': 'https://github.com/whyrusleeping/tar-utils'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0106'}, {'type': 'WEB', 'url': 'https://snyk.io/research/zip-slip-vulnerability'}]
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T19:05:32Z', 'nvd_published_at': '2022-12-27T22:15:00Z'}
1.4.0
GHSA-8m3f-g62j-3vx8
2023-01-19T00:59:08Z
2022-12-27T12:30:19Z
null
['CVE-2021-4287']
binwalk vulnerable to UNIX Symbolic Link (Symlink) Following
A vulnerability, which was classified as problematic, was found in ReFirm Labs binwalk up to 2.3.2. Affected is an unknown function of the file src/binwalk/modules/extractor.py of the component Archive Extraction Handler. The manipulation leads to symlink following. It is possible to launch the attack remotely. Upgrading to version 2.3.3 can address this issue. The name of the patch is fa0c0bd59b8588814756942fe4cb5452e76c1dcd. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216876.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'binwalk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4287'}, {'type': 'WEB', 'url': 'https://github.com/ReFirmLabs/binwalk/pull/556'}, {'type': 'WEB', 'url': 'https://github.com/ReFirmLabs/binwalk/commit/fa0c0bd59b8588814756942fe4cb5452e76c1dcd'}, {'type': 'PACKAGE', 'url': 'https://github.com/ReFirmLabs/binwalk'}, {'type': 'WEB', 'url': 'https://github.com/ReFirmLabs/binwalk/releases/tag/v2.3.3'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.216876'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.216876'}]
{'cwe_ids': ['CWE-59', 'CWE-61'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T17:48:02Z', 'nvd_published_at': '2022-12-27T11:15:00Z'}
1.4.0
GHSA-p228-4mrh-ww7r
2022-12-30T16:57:11Z
2022-12-30T16:57:11Z
null
['CVE-2022-46173']
Elrond-GO processing: fallback search of SCRs when not found in the main cache
### Impact Processing issue, nodes are affected when trying to process a cross-shard relayed transaction with a smart contract deploy transaction data. The problem was a bad correlation between the transaction caches and the processing component. If the above-mentioned transaction was sent with more gas than required, the smart contract result (SCR transaction) that should have returned the leftover gas, would have been wrongly added to a cache that the processing unit did not consider. The node stopped notarizing metachain blocks. The fix was actually to extend the SCR transaction search in all other caches if it wasn't found in the correct (expected) sharded-cache. ### Patches All versions >= v1.3.50 will contain this patch ### Workarounds For the moment there is no workaround ### References N/A ### For more information If you have any questions or comments about this advisory: * Open an issue in [elrond-go main repo](https://github.com/ElrondNetwork/elrond-go)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ElrondNetwork/elrond-go'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.50'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.48'}}]
[{'type': 'WEB', 'url': 'https://github.com/ElrondNetwork/elrond-go/security/advisories/GHSA-p228-4mrh-ww7r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46173'}, {'type': 'WEB', 'url': 'https://github.com/ElrondNetwork/elrond-go/pull/4718'}, {'type': 'WEB', 'url': 'https://github.com/ElrondNetwork/elrond-go/commit/39d7ddcb08bb34217dab6daef7cd9d287fb8cab3'}, {'type': 'PACKAGE', 'url': 'https://github.com/ElrondNetwork/elrond-go'}]
{'cwe_ids': ['CWE-669'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T16:57:11Z', 'nvd_published_at': '2022-12-28T07:15:00Z'}
1.4.0
GHSA-vwg4-846x-f94v
2023-01-02T20:16:09Z
2022-12-23T12:30:25Z
null
['CVE-2022-4688']
usememos/memos vulnerable to improper authorization
usememos/memos is an open-source, self-hosted memo hub with knowledge management and socialization. Memos versions prior to 0.9.0 are vulnerable to improper authorization, which can allow a user to modify the nickname, username and email of other users without permission.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4688'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/dca35bde877aab6e64ef51b52e590b5d48f692f9'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/23856e7e-94ff-4dee-97d0-0cd47e9b8ff6'}]
{'cwe_ids': ['CWE-285'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-27T01:57:43Z', 'nvd_published_at': '2022-12-23T12:15:00Z'}
1.4.0
GHSA-cjcc-46j8-xmr8
2022-12-30T22:21:25Z
2022-12-22T12:30:17Z
null
['CVE-2020-36625']
destiny.gg chat vulnerable to cross-site request forgery
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in destiny.gg chat. It has been rated as problematic. This issue affects the function websocket.Upgrader of the file main.go. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The name of the patch is bebd256fc3063111fb4503ca25e005ebf6e73780. It is recommended to apply a patch to fix this issue. The identifier VDB-216521 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/destinygg/chat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.0-20220628124252-0981d5add8f3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36625'}, {'type': 'WEB', 'url': 'https://github.com/destinygg/chat/pull/35'}, {'type': 'WEB', 'url': 'https://github.com/destinygg/chat/commit/bebd256fc3063111fb4503ca25e005ebf6e73780'}, {'type': 'PACKAGE', 'url': 'https://github.com/destinygg/chat'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.216521'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T22:21:25Z', 'nvd_published_at': '2022-12-22T10:15:00Z'}
1.4.0
GHSA-qqff-4vw4-f6hx
2022-12-05T17:58:16Z
2022-12-05T17:58:16Z
null
['CVE-2022-46149']
Cap'n Proto and its Rust implementation vulnerable to out-of-bounds read due to logic error handling list-of-list
The Cap'n Proto library and capnp Rust package are vulnerable to out-of-bounds read due to logic error handling list-of-list. If a message consumer expects data of type "list of pointers", and if the consumer performs certain specific actions on such data, then a message producer can cause the consumer to read out-of-bounds memory. This could trigger a process crash in the consumer, or in some cases could allow exfiltration of private in-memory data. Impact ====== - Remotely segfault a peer by sending it a malicious message, if the victim performs certain actions on a list-of-pointer type. - Possible exfiltration of memory, if the victim performs additional certain actions on a list-of-pointer type. - To be vulnerable, an application must perform a specific sequence of actions, described below. At present, **we are not aware of any vulnerable application**, but we advise updating regardless. Fixed in ======== Unfortunately, the bug is present in inlined code, therefore the fix will require rebuilding dependent applications. C++ fix: - git commit [25d34c67863fd960af34fc4f82a7ca3362ee74b9][0] - release 0.11 (future) - release 0.10.3: - Unix: https://capnproto.org/capnproto-c++-0.10.3.tar.gz - Windows: https://capnproto.org/capnproto-c++-win32-0.10.3.zip - release 0.9.2: - Unix: https://capnproto.org/capnproto-c++-0.9.2.tar.gz - Windows: https://capnproto.org/capnproto-c++-win32-0.9.2.zip - release 0.8.1: - Unix: https://capnproto.org/capnproto-c++-0.8.1.tar.gz - Windows: https://capnproto.org/capnproto-c++-win32-0.8.1.zip - release 0.7.1: - Unix: https://capnproto.org/capnproto-c++-0.7.1.tar.gz - Windows: https://capnproto.org/capnproto-c++-win32-0.7.1.zip - release 0.5.4: - Unix: https://capnproto.org/capnproto-c++-0.5.4.tar.gz - Windows: https://capnproto.org/capnproto-c++-win32-0.5.4.zip Rust fix: - `capnp` crate version `0.15.2`, `0.14.11`, or `0.13.7` [0]: https://github.com/capnproto/capnproto/commit/25d34c67863fd960af34fc4f82a7ca3362ee74b9 Details ======= A specially-crafted pointer could escape bounds checking by exploiting inconsistent handling of pointers when a list-of-structs is downgraded to a list-of-pointers. For an in-depth explanation of how this bug works, see [David Renshaw's blog post](https://dwrensha.github.io/capnproto-rust/2022/11/30/out_of_bounds_memory_access_bug.html). This details below focus only on determining whether an application is vulnerable. In order to be vulnerable, an application must have certain properties. First, the application must accept messages with a schema in which a field has list-of-pointer type. This includes `List(Text)`, `List(Data)`, `List(List(T))`, or `List(C)` where `C` is an interface type. In the following discussion, we will assume this field is named `foo`. Second, the application must accept a message of this schema from a malicious source, where the attacker can maliciously encode the pointer representing the field `foo`. Third, the application must call `getFoo()` to obtain a `List<T>::Reader` for the field, and then use it in one of the following two ways: 1. Pass it as the parameter to another message's `setFoo()`, thus copying the field into a new message. Note that copying the parent struct as a whole will *not* trigger the bug; the bug only occurs if the specific field `foo` is get/set on its own. 2. Convert it into `AnyList::Reader`, and then attempt to access it through that. This is much less likely; very few apps use the `AnyList` API. The dynamic API equivalents of these actions (`capnp/dynamic.h`) are also affected. If the application does these steps, the attacker may be able to cause the Cap'n Proto implementation to read beyond the end of the message. This could induce a segmentation fault. Or, worse, data that happened to be in memory immediately after the message might be returned as if it were part of the message. In the latter case, if the application then forwards that data back to the attacker or sends it to another third party, this could result in exfiltration of secrets. Any exfiltration of data would have the following limitations: * The attacker could exfiltrate no more than 512 KiB of memory immediately following the message buffer. * The attacker chooses in advance how far past the end of the message to read. * The attacker's message itself must be larger than the exfiltrated data. Note that a sufficiently large message buffer will likely be allocated using mmap() in which case the attack will likely segfault. * The attack can only work if the 8 bytes immediately following the exfiltrated data contains a valid in-bounds Cap'n Proto pointer. The easiest way to achieve this is if the pointer is null, i.e. 8 bytes of zero. * The attacker must specify exactly how much data to exfiltrate, so must guess exactly where such a valid pointer will exist. * If the exfiltrated data is not followed by a valid pointer, the attack will throw an exception. If an application has chosen to ignore exceptions (e.g. by compiling with `-fno-exceptions` and not registering an alternative exception callback) then the attack may be able to proceed anyway.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:L'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'capnp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.15.0'}, {'fixed': '0.15.2'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'capnp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.14.0'}, {'fixed': '0.14.11'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'capnp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.7'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/capnproto/capnproto/security/advisories/GHSA-qqff-4vw4-f6hx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46149'}, {'type': 'WEB', 'url': 'https://github.com/capnproto/capnproto/commit/25d34c67863fd960af34fc4f82a7ca3362ee74b9'}, {'type': 'WEB', 'url': 'https://dwrensha.github.io/capnproto-rust/2022/11/30/out_of_bounds_memory_access_bug.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/capnproto/capnproto'}, {'type': 'WEB', 'url': 'https://github.com/capnproto/capnproto/tree/master/security-advisories/2022-11-30-0-pointer-list-bounds.md'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EAHKLUMJAXJEV5BPBS5XXWBQ3ZTHGOLY/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTS6TWD6K2NKXLEEFBPROQXMOFUTEYWY/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WKXM4JAFXLTXU5IQB3OUBQVCIICZWGYX/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZOCQQOPMVQOFUWBWAGVGN76OYAV3WXY4/'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0068.html'}]
{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-05T17:58:16Z', 'nvd_published_at': '2022-11-30T17:15:00Z'}
1.4.0
GHSA-rx2m-xr4x-54hh
2023-01-10T15:46:25Z
2022-12-28T15:30:45Z
null
['CVE-2022-4802']
usememos/memos vulnerable to Improper Authorization
usememos/memos 0.9.0 and prior is vulnerable to Improper Authorization.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4802'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d47d4a94-92e3-4400-b012-a8577cbd7956'}]
{'cwe_ids': ['CWE-285', 'CWE-639'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T19:58:02Z', 'nvd_published_at': '2022-12-28T14:15:00Z'}
1.4.0
GHSA-4r9h-x77w-mffv
2022-12-21T17:23:08Z
2022-12-15T21:30:26Z
null
['CVE-2022-4527']
collective.task Cross-site Scripting vulnerability
A vulnerability was found in collective.task up to 3.0.9. It has been classified as problematic. This affects the function renderCell/AssignedGroupColumn of the file src/collective/task/browser/table.py. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 3.0.10 is able to address this issue. The name of the patch is 1aac7f83fa2c2b41d59ba02748912953461f3fac. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-215907.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'collective.task'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4527'}, {'type': 'WEB', 'url': 'https://github.com/collective/collective.task/commit/1aac7f83fa2c2b41d59ba02748912953461f3fac'}, {'type': 'PACKAGE', 'url': 'https://github.com/collective/collective.task'}, {'type': 'WEB', 'url': 'https://github.com/collective/collective.task/releases/tag/3.0.9'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.215907'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T17:23:08Z', 'nvd_published_at': '2022-12-15T21:15:00Z'}
1.4.0
GHSA-6cq5-8cj7-g558
2022-12-29T21:31:13Z
2022-12-22T20:01:18Z
null
['CVE-2022-46170']
CodeIgniter4 Potential Session Handlers Vulnerability
### Impact When an application uses (1) multiple session cookies (e.g., one for user pages and one for admin pages) and (2) a session handler is set to `DatabaseHandler`, `MemcachedHandler`, or `RedisHandler`, then if an attacker gets one session cookie (e.g., one for user pages), they may be able to access pages that require another session cookie (e.g., for admin pages). ### Patches Upgrade to version 4.2.11 or later. ### Workarounds - Use only one session cookie. ### References - https://codeigniter4.github.io/userguide/libraries/sessions.html#session-drivers ### For more information If you have any questions or comments about this advisory: * Open an issue in [codeigniter4/CodeIgniter4](https://github.com/codeigniter4/CodeIgniter4/issues) * Email us at [SECURITY.md](https://github.com/codeigniter4/CodeIgniter4/blob/develop/SECURITY.md)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'codeigniter4/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.11'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/codeigniter4/CodeIgniter4/security/advisories/GHSA-6cq5-8cj7-g558'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46170'}, {'type': 'WEB', 'url': 'https://github.com/codeigniter4/CodeIgniter4/commit/f9fb6574fbeb5a4aa63f7ea87296523e10db9328'}, {'type': 'WEB', 'url': 'https://codeigniter4.github.io/userguide/libraries/sessions.html#session-drivers'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/codeigniter4/framework/CVE-2022-46170.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/codeigniter4/CodeIgniter4'}]
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T20:01:18Z', 'nvd_published_at': '2022-12-22T19:15:00Z'}
1.4.0
GHSA-8w5q-5fpq-v4pm
2023-01-10T16:02:49Z
2022-12-31T09:30:42Z
null
['CVE-2022-4865']
usememos/memos Cross-site Scripting vulnerability
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4865'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/7670c9536000bb32c6345d4906a91268dcddd5fc'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/cd8765a2-bf28-4019-8647-882ccf63b2be'}]
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-04T15:19:12Z', 'nvd_published_at': '2022-12-31T09:15:00Z'}
1.4.0
GHSA-qw36-rw5q-gxcq
2023-01-10T15:47:06Z
2022-12-28T15:30:45Z
null
['CVE-2022-4804']
usememos/memos Improper Authorization vulnerability
usememos/memos 0.9.0 and prior is vulnerable to Improper Authorization.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4804'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/4ee48a1e-6332-4d95-a360-9c392643c533'}]
{'cwe_ids': ['CWE-285'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T19:58:34Z', 'nvd_published_at': '2022-12-28T14:15:00Z'}
1.4.0
GHSA-c8jh-vcjh-fx2w
2023-01-02T17:03:13Z
2022-12-23T12:30:25Z
null
['CVE-2022-4690']
usememos/memos vulnerable to stored cross-site scripting (XSS)
usememos/memos is an open-source, self-hosted memo hub with knowledge management and socialization. Memos prior to 0.9.0 has a feature to upload file and display it, and by uploading a crafted SVG file, an attacker could perform a stored cross-site scripting attack with the image direct link. This was patched in version 0.9.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4690'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/pull/833'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/65cc19c12efa392f792f6bb154b4838547e0af5e'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/c07b4a57caa89905e54b800f4d8fb720bbf5bf82'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos/'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/7e1be91d-3b13-4300-8af2-9bd9665ec335'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-27T01:29:44Z', 'nvd_published_at': '2022-12-23T12:15:00Z'}
1.4.0
GHSA-gfgm-chr3-x6px
2022-12-30T17:48:30Z
2022-12-30T17:48:30Z
null
[]
prettytable-rs: Force cast a &Vec<T> to &[T] may lead to undefined behavior
In function `Table::as_ref`, a reference of vector is force cast to slice. There are multiple problems here: 1. To guarantee the size is correct, we have to first do `Vec::shrink_to_fit`. The function requires a mutable reference, so we have to force cast from immutable to mutable, which is undefined behavior (UB). 2. Even if (1) is sound, `&Vec<T>` and `&[T]` still might not have the same layout. Treating them equally may lead to undefinted behavior (UB).
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'prettytable-rs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/phsym/prettytable-rs/issues/145'}, {'type': 'PACKAGE', 'url': 'https://github.com/phsym/prettytable-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0074.html'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T17:48:30Z', 'nvd_published_at': None}
1.4.0
GHSA-7w2v-35j3-xrm9
2022-12-07T14:56:47Z
2022-12-07T06:30:26Z
null
['CVE-2022-42486']
baserCMS vulnerable to stored Cross-site Scripting
Stored cross-site scripting vulnerability in User group management of baserCMS versions prior to 4.7.2 allows a remote authenticated attacker with an administrative privilege to inject an arbitrary script.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'baserproject/basercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.7.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42486'}, {'type': 'WEB', 'url': 'https://basercms.net/security/JVN_53682526'}, {'type': 'PACKAGE', 'url': 'https://github.com/baserproject/basercms'}, {'type': 'WEB', 'url': 'https://jvn.jp/en/jp/JVN53682526/index.html'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-07T14:56:47Z', 'nvd_published_at': '2022-12-07T04:15:00Z'}
1.4.0
GHSA-q6cq-m9gm-6q2f
2023-01-09T08:22:04Z
2022-12-25T06:30:20Z
null
['CVE-2022-45197']
Slixmpp lacks SSL Certificate hostname validation in XMLStream
Slixmpp before 1.8.3 lacks SSL Certificate hostname validation in XMLStream, allowing an attacker to pose as any server in the eyes of Slixmpp.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'slixmpp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45197'}, {'type': 'PACKAGE', 'url': 'https://github.com/poezio/slixmpp'}, {'type': 'WEB', 'url': 'https://github.com/poezio/slixmpp/commits/master/slixmpp/xmlstream/xmlstream.py'}, {'type': 'WEB', 'url': 'https://github.com/poezio/slixmpp/tags'}, {'type': 'WEB', 'url': 'https://lab.louiz.org/poezio/slixmpp/-/commit/b60b1b985db928532f97c4f61d6fbc801f0aa7fa'}, {'type': 'WEB', 'url': 'https://lab.louiz.org/poezio/slixmpp/-/commits/master'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202305-07'}]
{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T17:12:05Z', 'nvd_published_at': '2022-12-25T05:15:00Z'}
1.4.0
GHSA-f93f-55c2-8c89
2022-12-08T15:33:38Z
2022-12-07T03:30:18Z
null
['CVE-2022-44942']
Casdoor arbitrary file deletion vulnerability via uploadFile function
Casdoor before v1.126.1 was discovered to contain an arbitrary file deletion vulnerability via the `uploadFile` function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/casdoor/casdoor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.126.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-44942'}, {'type': 'WEB', 'url': 'https://github.com/casdoor/casdoor/issues/1171'}, {'type': 'WEB', 'url': 'https://github.com/casdoor/casdoor/pull/1174'}, {'type': 'PACKAGE', 'url': 'https://github.com/casdoor/casdoor'}, {'type': 'WEB', 'url': 'https://github.com/casdoor/casdoor/releases/tag/v1.126.1'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-07T14:15:45Z', 'nvd_published_at': '2022-12-07T02:15:00Z'}
1.4.0
GHSA-5x84-q523-vvwr
2023-01-10T15:55:56Z
2022-12-28T00:30:23Z
null
['CVE-2020-36564']
nosurf vulnerable to improper input validation
Due to improper validation of caller input, validation is silently disabled if the provided expected token is malformed, causing any user supplied token to be considered valid.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/justinas/nosurf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36564'}, {'type': 'WEB', 'url': 'https://github.com/justinas/nosurf/pull/60'}, {'type': 'WEB', 'url': 'https://github.com/justinas/nosurf/commit/4d86df7a4affa1fa50ab39fb09aac56c3ce9c314'}, {'type': 'PACKAGE', 'url': 'https://github.com/justinas/nosurf'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0049'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T19:06:40Z', 'nvd_published_at': '2022-12-27T22:15:00Z'}
1.4.0
GHSA-59fh-rjq3-xq7j
2022-12-08T21:44:18Z
2022-12-06T18:30:19Z
null
['CVE-2022-44289']
Thinkphp has a code logic error
Thinkphp 5.1.41 and 5.0.24 has a code logic error which causes file upload getshell.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'topthink/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.0.24'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'topthink/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1'}, {'last_affected': '5.1.41'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-44289'}, {'type': 'WEB', 'url': 'https://github.com/top-think/framework/issues/2772'}, {'type': 'PACKAGE', 'url': 'https://github.com/top-think/framework'}]
{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T21:11:46Z', 'nvd_published_at': '2022-12-06T16:15:00Z'}
1.4.0
GHSA-p46c-m4j7-mjvq
2022-12-08T15:16:04Z
2022-12-08T12:30:26Z
null
['CVE-2022-4350']
Mingsoft MCMS vulnerable to Cross-site Scripting
A vulnerability, which was classified as problematic, was found in Mingsoft MCMS 5.2.8. Affected is an unknown function of the file search.do. The manipulation of the argument content_title leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-215112.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4350'}, {'type': 'WEB', 'url': 'https://gitee.com/mingSoft/MCMS/issues/I5MT8Y'}, {'type': 'PACKAGE', 'url': 'https://github.com/ming-soft/MCMS'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.215112'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-08T15:16:04Z', 'nvd_published_at': '2022-12-08T10:15:00Z'}
1.4.0
GHSA-mwvp-qr62-cvjx
2023-01-09T21:51:01Z
2022-12-28T00:30:22Z
null
['CVE-2019-25091']
nsupdate.info has Sensitive Cookie Without 'HttpOnly' Flag
A vulnerability classified as problematic has been found in nsupdate.info. This affects an unknown part of the file `src/nsupdate/settings/base.py` of the component `CSRF Cookie Handler`. The manipulation of the argument `CSRF_COOKIE_HTTPONLY` leads to cookie without `httponly` flag. It is possible to initiate the attack remotely. The name of the patch is 60a3fe559c453bc36b0ec3e5dd39c1303640a59a. It is recommended to apply a patch to fix this issue. The identifier VDB-216909 was assigned to this vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'nsupdate'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.12.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-25091'}, {'type': 'WEB', 'url': 'https://github.com/nsupdate-info/nsupdate.info/pull/410'}, {'type': 'WEB', 'url': 'https://github.com/nsupdate-info/nsupdate.info/commit/60a3fe559c453bc36b0ec3e5dd39c1303640a59a'}, {'type': 'PACKAGE', 'url': 'https://github.com/nsupdate-info/nsupdate.info'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.216909'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.216909'}]
{'cwe_ids': ['CWE-1004'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T21:51:01Z', 'nvd_published_at': '2022-12-27T23:15:00Z'}
1.4.0
GHSA-jvq8-w7qv-hqp6
2023-01-10T15:46:13Z
2022-12-28T15:30:45Z
null
['CVE-2022-4799']
usememos/memos Improper Authentication vulnerability
usememos/memos 0.9.0 and prior is vulnerable to Improper Authentication.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4799'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c5d70f9d-b7a7-4418-9368-4566a8143e79'}]
{'cwe_ids': ['CWE-287', 'CWE-639'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T19:57:32Z', 'nvd_published_at': '2022-12-28T14:15:00Z'}
1.4.0
GHSA-m8r5-7wf4-63mw
2022-12-06T22:26:30Z
2022-12-05T06:30:22Z
null
['CVE-2022-41642']
Nadesiko3 OS Command Injection vulnerability
OS command injection vulnerability in Nadesiko3 (PC Version) v3.3.68 and earlier allows a remote attacker to execute an arbitrary OS command when processing compression and decompression on the product. Release notes for versions 3.3.62 and 3.3.69 both link to patches for this particular issue. The [JPCERT/CC](https://jvn.jp/en/jp/JVN56968681/index.html) advisory lists versions 3.3.68 and prior as vulnerable, and the most recent patch for this issue is tagged with version 3.3.69.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'nadesiko3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.69'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.68'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41642'}, {'type': 'WEB', 'url': 'https://github.com/kujirahand/nadesiko3/issues/1325'}, {'type': 'WEB', 'url': 'https://github.com/kujirahand/nadesiko3/issues/1347'}, {'type': 'WEB', 'url': 'https://github.com/kujirahand/nadesiko3/commit/124871c064cfc65cdcd83205637e84fc246c76df'}, {'type': 'WEB', 'url': 'https://github.com/kujirahand/nadesiko3/commit/56ccfb2f9cceaec83e6a9d3024c3ba8c54ebe1a4'}, {'type': 'WEB', 'url': 'https://github.com/kujirahand/nadesiko3/commit/61a70792752a75b7f71df214e98a236721ea3fa6'}, {'type': 'PACKAGE', 'url': 'https://github.com/kujirahand/nadesiko3'}, {'type': 'WEB', 'url': 'https://github.com/kujirahand/nadesiko3/releases/tag/3.3.62'}, {'type': 'WEB', 'url': 'https://github.com/kujirahand/nadesiko3/releases/tag/3.3.69'}, {'type': 'WEB', 'url': 'https://jvn.jp/en/jp/JVN56968681/index.html'}]
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T22:26:30Z', 'nvd_published_at': '2022-12-05T04:15:00Z'}
1.4.0
GHSA-p4qr-vq2g-22wp
2023-01-04T13:51:57Z
2022-12-23T21:30:17Z
null
['CVE-2022-47945']
ThinkPHP Framework vulnerable to remote code execution
ThinkPHP Framework before 6.0.14 allows local file inclusion via the lang parameter when the language pack feature is enabled (`lang_switch_on=true`). An unauthenticated and remote attacker can exploit this to execute arbitrary operating system commands, as demonstrated by including `pearcmd.php`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'topthink/framework'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.14'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-47945'}, {'type': 'WEB', 'url': 'https://github.com/top-think/framework/commit/c4acb8b4001b98a0078eda25840d33e295a7f099'}, {'type': 'PACKAGE', 'url': 'https://github.com/top-think/framework'}, {'type': 'WEB', 'url': 'https://github.com/top-think/framework/compare/v6.0.13...v6.0.14'}, {'type': 'WEB', 'url': 'https://tttang.com/archive/1865/'}]
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-04T13:51:57Z', 'nvd_published_at': '2022-12-23T21:15:00Z'}
1.4.0
GHSA-3fm3-m23v-5r46
2023-01-10T15:58:49Z
2022-12-28T00:30:23Z
null
['CVE-2019-25072']
Tendermint Client package vulnerable to Uncontrolled Resource Consumption
Due to support of Gzip compression in request bodies, as well as a lack of limiting response body sizes, a malicious server can cause a client to consume a significant amount of system resources, which may be used as a denial of service vector.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/tendermint/tendermint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.31.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-25072'}, {'type': 'WEB', 'url': 'https://github.com/tendermint/tendermint/pull/3430'}, {'type': 'WEB', 'url': 'https://github.com/tendermint/tendermint/commit/03085c2da23b179c4a51f59a03cb40aa4e85a613'}, {'type': 'PACKAGE', 'url': 'https://github.com/tendermint/tendermint'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0037'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T19:15:32Z', 'nvd_published_at': '2022-12-27T22:15:00Z'}
1.4.0
GHSA-8h43-xg5g-9cj7
2023-01-10T00:46:33Z
2022-12-27T15:30:19Z
null
['CVE-2022-4732']
Microweber vulnerable to unrestricted malicious uploads
Unrestricted Upload of File with Dangerous Type in GitHub repository microweber/microweber prior to 1.3.2.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4732'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/0d279ac81052ce7ee97c18c811a9b8e912189da0'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d5be2e96-1f2f-4357-a385-e184cf0119aa'}]
{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-27T21:41:57Z', 'nvd_published_at': '2022-12-27T15:15:00Z'}
1.4.0
GHSA-54r5-wr8x-x5v3
2022-12-30T00:27:46Z
2022-12-20T00:30:27Z
null
[]
Apiman has insufficient checks for read permissions
Apiman 1.5.7 through 2.2.3.Final has insufficient checks for read permissions within the Apiman Manager REST API. A malicious user may be able to find and subscribe to private APIs they do not have permission for, thus accessing API Management-protected resources they should not be allowed to access. The root cause of the issue is the Apiman project's accidental acceptance of a large contribution that was not fully compatible with the security model of Apiman versions before 3.0.0.Final. Because of this, 3.0.0.Final is not affected by the vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.apiman:apiman-manager-api-rest-impl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.7'}, {'fixed': '3.0.0.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.3.Final'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-47551'}, {'type': 'WEB', 'url': 'https://github.com/apiman/apiman/discussions/2409'}, {'type': 'WEB', 'url': 'https://www.apiman.io/blog/permissions-bypass-disclosure/'}, {'type': 'PACKAGE', 'url': 'https://www.github.com/apiman/apiman'}]
{'cwe_ids': ['CWE-276', 'CWE-280'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T17:37:18Z', 'nvd_published_at': '2022-12-20T00:15:00Z'}
1.4.0
GHSA-2qjp-425j-52j9
2022-12-07T23:23:43Z
2022-12-07T23:23:43Z
null
['CVE-2022-23471']
containerd CRI stream server vulnerable to host memory exhaustion via terminal
### Impact A bug was found in containerd's CRI implementation where a user can exhaust memory on the host. In the CRI stream server, a goroutine is launched to handle terminal resize events if a TTY is requested. If the user's process fails to launch due to, for example, a faulty command, the goroutine will be stuck waiting to send without a receiver, resulting in a memory leak. Kubernetes and crictl can both be configured to use containerd's CRI implementation and the stream server is used for handling container IO. ### Patches This bug has been fixed in containerd 1.6.12 and 1.5.16. Users should update to these versions to resolve the issue. ### Workarounds Ensure that only trusted images and commands are used and that only trusted users have permissions to execute commands in running containers. ### For more information If you have any questions or comments about this advisory: * Open an issue in [containerd](https://github.com/containerd/containerd/issues/new/choose) * Email us at [security@containerd.io](mailto:security@containerd.io) To report a security issue in containerd: * [Report a new vulnerability](https://github.com/containerd/containerd/security/advisories/new) * Email us at [security@containerd.io](mailto:security@containerd.io)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/containerd/containerd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.16'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/containerd/containerd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.6.12'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/containerd/containerd/security/advisories/GHSA-2qjp-425j-52j9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23471'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/commit/241563be06a3de8b6a849414c4e805b68d3bb295'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/commit/a05d175400b1145e5e6a735a6710579d181e7fb0'}, {'type': 'PACKAGE', 'url': 'https://github.com/containerd/containerd'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/releases/tag/v1.5.16'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/releases/tag/v1.6.12'}]
{'cwe_ids': ['CWE-400', 'CWE-401'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-07T23:23:43Z', 'nvd_published_at': '2022-12-07T23:15:00Z'}
1.4.0
GHSA-6vm3-jj99-7229
2023-01-10T15:56:22Z
2022-12-27T21:30:20Z
null
['CVE-2020-36567']
Gin's default logger allows unsanitized input that can allow remote attackers to inject arbitrary log lines
Gin is a HTTP web framework written in Go (Golang). Unsanitized input in the default logger in github.com/gin-gonic/gin before v1.6.0 allows remote attackers to inject arbitrary log lines.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/gin-gonic/gin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36567'}, {'type': 'WEB', 'url': 'https://github.com/gin-gonic/gin/pull/2237'}, {'type': 'WEB', 'url': 'https://github.com/gin-gonic/gin/commit/a71af9c144f9579f6dbe945341c1df37aaf09c0d'}, {'type': 'PACKAGE', 'url': 'https://github.com/gin-gonic/gin'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0001'}]
{'cwe_ids': ['CWE-116', 'CWE-117'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T00:56:53Z', 'nvd_published_at': '2022-12-27T21:15:00Z'}
1.4.0
GHSA-gg8r-xjwq-4w92
2022-12-12T20:46:53Z
2022-12-08T23:30:01Z
null
['CVE-2022-23494']
Cross-site scripting vulnerability in TinyMCE alerts
### Impact A cross-site scripting (XSS) vulnerability was discovered in the alert and confirm dialogs when these dialogs were provided with malicious HTML content. This can occur in plugins that use the alert or confirm dialogs, such as in the `image` plugin, which presents these dialogs when certain errors occur. The vulnerability allowed arbitrary JavaScript execution when an alert presented in the TinyMCE UI for the current user. ### Patches This vulnerability has been patched in TinyMCE 5.10.7 and TinyMCE 6.3.1 by ensuring HTML sanitization was still performed after unwrapping invalid elements. ### Fix To avoid this vulnerability: - Upgrade to TinyMCE 5.10.7 or higher for TinyMCE 5.x. - Upgrade to TinyMCE 6.3.1 or higher for TinyMCE 6.x. ### Workaround To reduce the impact of this vulnerability: - Ensure the the `images_upload_handler` returns a valid value as per the images_upload_handler documentation. ### References - https://www.tiny.cloud/docs/release-notes/release-notes5107/#securityfixes - https://www.tiny.cloud/docs/tinymce/6/6.3-release-notes/#security-fixes ### For more information If you have any questions or comments about this advisory: * Email us at [infosec@tiny.cloud](mailto:infosec@tiny.cloud) * Open an issue in the [TinyMCE repo](https://github.com/tinymce/tinymce/issues)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'tinymce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.3.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'tinymce/tinymce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.3.1'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'TinyMCE'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.3.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'tinymce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.10.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'tinymce/tinymce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.10.7'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'TinyMCE'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.10.7'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/tinymce/tinymce/security/advisories/GHSA-gg8r-xjwq-4w92'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23494'}, {'type': 'WEB', 'url': 'https://github.com/tinymce/tinymce/commit/6923d85eba6de3e08ebc9c5a387b5abdaa21150e'}, {'type': 'WEB', 'url': 'https://github.com/tinymce/tinymce/commit/8bb2d2646d4e1a718fce61a775fa22e9d317b32d'}, {'type': 'PACKAGE', 'url': 'https://github.com/tinymce/tinymce'}, {'type': 'WEB', 'url': 'https://www.tiny.cloud/docs/release-notes/release-notes5107/#securityfixes'}, {'type': 'WEB', 'url': 'https://www.tiny.cloud/docs/tinymce/6/6.3-release-notes/#security-fixes'}, {'type': 'WEB', 'url': 'https://www.tiny.cloud/docs/tinymce/6/file-image-upload/#images_upload_handler'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-08T23:30:01Z', 'nvd_published_at': '2022-12-08T22:15:00Z'}
1.4.0
GHSA-mfvq-m3jj-8864
2023-01-10T15:40:34Z
2022-12-28T15:30:45Z
null
['CVE-2022-4800']
usememos/memos vulnerable to Improper Verification of Source of a Communication Channel
usememos/memos 0.9.0 and prior is vulnerable to Improper Verification of Source of a Communication Channel.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4800'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/aa45a6eb-cc38-45e5-a301-221ef43c0ef8'}]
{'cwe_ids': ['CWE-940'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T19:57:43Z', 'nvd_published_at': '2022-12-28T14:15:00Z'}
1.4.0
GHSA-83pm-7v48-5jp4
2023-01-06T18:11:13Z
2022-12-27T15:30:19Z
null
['CVE-2022-4721']
rdiffweb vulnerable to Special Element Injection
In rdiffweb prior to 2.5.5, lack of sanitisation of characters in SSH key name could allow attacker to inject a hyperlink injection that could allow attacker to redirect victim to malicious websites.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4721'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/6afaae56a29536f0118b3380d296c416aa6d078d'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3c48ef5d-da4d-4ee4-aaca-af65e7273720'}]
{'cwe_ids': ['CWE-75'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T18:01:57Z', 'nvd_published_at': '2022-12-27T15:15:00Z'}
1.4.0
GHSA-f5q9-j9r2-34gq
2023-01-10T16:13:03Z
2022-12-30T12:30:25Z
null
['CVE-2022-43396']
Apache Kylin vulnerable to Command injection by Useless configuration
In the fix for CVE-2022-24697, a blacklist is used to filter user input commands. But there is a risk of being bypassed. The user can control the command by controlling the `kylin.engine.spark-cmd` parameter of `conf`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '4.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43396'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/kylin/pull/2011'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/ob2ks04zl5ms0r44cd74y1xdl1rzfd1r'}]
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-03T12:34:52Z', 'nvd_published_at': '2022-12-30T11:15:00Z'}
1.4.0
GHSA-w3x5-427h-wfq6
2022-12-09T20:19:32Z
2022-12-09T20:19:32Z
null
['CVE-2022-46166']
Spring Boot Admins integrated notifier support allows arbitrary code execution
### Impact All users who run Spring Boot Admin Server, having enabled Notifiers (e.g. Teams-Notifier) and write access to environment variables via UI are possibly affected. ### Patches In the most recent releases of Spring Boot Admin 2.6.10 and 2.7.8 the issue is fixed by implementing `SimpleExecutionContext` of SpEL. This prevents the arbitrary code execution (i.e. SpEL injection). ### Workarounds * Disable any notifier * Disable write access (POST request) on `/env` actuator endpoint
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'de.codecentric:spring-boot-admin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'de.codecentric:spring-boot-admin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'de.codecentric:spring-boot-admin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0-M1'}, {'fixed': '3.0.0-M6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/codecentric/spring-boot-admin/security/advisories/GHSA-w3x5-427h-wfq6'}, {'type': 'PACKAGE', 'url': 'https://github.com/codecentric/spring-boot-admin'}]
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-09T20:19:32Z', 'nvd_published_at': '2022-12-09T21:15:00Z'}
1.4.0
GHSA-m82g-fv7v-h64m
2022-12-12T22:08:48Z
2022-12-12T09:30:35Z
null
['CVE-2022-46688']
Jenkins Sonar Gerrit Plugin vulnerable to Cross-Site Request Forgery
A cross-site request forgery (CSRF) vulnerability in Jenkins Sonar Gerrit Plugin 377.v8f3808963dc5 and earlier allows attackers to have Jenkins connect to Gerrit servers (previously configured by Jenkins administrators) using attacker-specified credentials IDs obtained through another method, potentially capturing credentials stored in Jenkins.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:sonar-gerrit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '377.v8f3808963dc5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46688'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/sonar-gerrit-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-12-07/#SECURITY-1002'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T22:08:48Z', 'nvd_published_at': '2022-12-12T09:15:00Z'}
1.4.0
GHSA-mcvf-2q2m-x72m
2023-09-14T16:22:23Z
2022-12-13T17:45:39Z
null
['CVE-2022-23518']
Improper neutralization of data URIs may allow XSS in rails-html-sanitizer
## Summary rails-html-sanitizer `>= 1.0.3, < 1.4.4` is vulnerable to cross-site scripting via data URIs when used in combination with Loofah `>= 2.1.0`. ## Mitigation Upgrade to rails-html-sanitizer `>= 1.4.4`. ## Severity The maintainers have evaluated this as [Medium Severity 6.1](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). ## References - [CWE - CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (4.9)](https://cwe.mitre.org/data/definitions/79.html) - [SVG MIME Type (image/svg+xml) is misleading to developers · Issue #266 · w3c/svgwg](https://github.com/w3c/svgwg/issues/266) - https://github.com/rails/rails-html-sanitizer/issues/135 - https://hackerone.com/reports/1694173 ## Credit This vulnerability was independently reported by Maciej Piechota (@haqpl) and Mrinmoy Das (@goromlagche).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rails-html-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.3'}, {'fixed': '1.4.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-mcvf-2q2m-x72m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23518'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails-html-sanitizer/issues/135'}, {'type': 'WEB', 'url': 'https://github.com/w3c/svgwg/issues/266'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1694173'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails-html-sanitizer'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails-html-sanitizer/CVE-2022-23518.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/09/msg00012.html'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T17:45:39Z', 'nvd_published_at': '2022-12-14T17:15:00Z'}
1.4.0
GHSA-jr65-gpj5-cw74
2022-12-29T00:33:22Z
2022-12-28T03:30:28Z
null
['CVE-2022-3347']
go-resolver's DNSSEC validation not performed correctly
go-resolver's DNSSEC validation is not performed correctly. An attacker can cause this package to report successful validation for invalid, attacker-controlled records. Root DNSSEC public keys are not validated, permitting an attacker to present a self-signed root key and delegation chain.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/peterzen/goresolver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3347'}, {'type': 'WEB', 'url': 'https://github.com/peterzen/goresolver/issues/5#issuecomment-1150214257'}, {'type': 'PACKAGE', 'url': 'https://github.com/peterzen/goresolver'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-1026'}]
{'cwe_ids': ['CWE-345', 'CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-29T00:33:22Z', 'nvd_published_at': '2022-12-28T03:15:00Z'}
1.4.0
GHSA-9h9g-93gc-623h
2022-12-17T00:32:41Z
2022-12-13T17:50:25Z
null
['CVE-2022-23519']
Possible XSS vulnerability with certain configurations of rails-html-sanitizer
## Summary There is a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer. - Versions affected: ALL - Not affected: NONE - Fixed versions: 1.4.4 ## Impact A possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer's allowed tags in either of the following ways: - allow both "math" and "style" elements, - or allow both "svg" and "style" elements Code is only impacted if allowed tags are being overridden. Applications may be doing this in four different ways: 1. using application configuration: ```ruby # In config/application.rb config.action_view.sanitized_allowed_tags = ["math", "style"] # or config.action_view.sanitized_allowed_tags = ["svg", "style"] ``` see https://guides.rubyonrails.org/configuring.html#configuring-action-view 2. using a `:tags` option to the Action View helper `sanitize`: ``` <%= sanitize @comment.body, tags: ["math", "style"] %> <%# or %> <%= sanitize @comment.body, tags: ["svg", "style"] %> ``` see https://api.rubyonrails.org/classes/ActionView/Helpers/SanitizeHelper.html#method-i-sanitize 3. using Rails::Html::SafeListSanitizer class method `allowed_tags=`: ```ruby # class-level option Rails::Html::SafeListSanitizer.allowed_tags = ["math", "style"] # or Rails::Html::SafeListSanitizer.allowed_tags = ["svg", "style"] ``` 4. using a `:tags` options to the Rails::Html::SafeListSanitizer instance method `sanitize`: ```ruby # instance-level option Rails::Html::SafeListSanitizer.new.sanitize(@article.body, tags: ["math", "style"]) # or Rails::Html::SafeListSanitizer.new.sanitize(@article.body, tags: ["svg", "style"]) ``` All users overriding the allowed tags by any of the above mechanisms to include (("math" or "svg") and "style") should either upgrade or use one of the workarounds immediately. ## Workarounds Remove "style" from the overridden allowed tags, or remove "math" and "svg" from the overridden allowed tags. ## References - [CWE - CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (4.9)](https://cwe.mitre.org/data/definitions/79.html) - https://hackerone.com/reports/1656627 ## Credit This vulnerability was responsibly reported by Dominic Breuker.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rails-html-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-9h9g-93gc-623h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23519'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1656627'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails-html-sanitizer'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails-html-sanitizer/CVE-2022-23519.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/09/msg00012.html'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T17:50:25Z', 'nvd_published_at': '2022-12-14T17:15:00Z'}
1.4.0
GHSA-2hvc-hwg3-hpvw
2022-12-09T20:08:15Z
2022-12-07T09:30:23Z
null
['CVE-2022-46741']
PaddlePaddle Out-of-bounds Read vulnerability
Out-of-bounds read in `gather_tree` in PaddlePaddle before 2.4. A [patch](https://github.com/PaddlePaddle/Paddle/commit/6712e262fc6734873cc6d5ca4f45973339a88697) is available in the `release/2.4` branch.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'paddlepaddle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46741'}, {'type': 'WEB', 'url': 'https://github.com/PaddlePaddle/Paddle/pull/47051'}, {'type': 'WEB', 'url': 'https://github.com/PaddlePaddle/Paddle/commit/6712e262fc6734873cc6d5ca4f45973339a88697'}, {'type': 'WEB', 'url': 'https://github.com/PaddlePaddle/Paddle/commit/ee6e6d511f9f33fc862c11722701fb5abb99ed94'}, {'type': 'PACKAGE', 'url': 'https://github.com/PaddlePaddle/Paddle'}, {'type': 'WEB', 'url': 'https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2022-001.md'}]
{'cwe_ids': ['CWE-125'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-09T20:08:15Z', 'nvd_published_at': '2022-12-07T08:15:00Z'}
1.4.0
GHSA-2r7v-cmch-5x26
2022-12-05T17:37:22Z
2022-12-05T17:37:22Z
null
['CVE-2022-41957']
muhammara and hummus vulnerable to Unchecked Return Value to NULL Pointer Dereference
### Impact The package muhammara before 2.6.2, from 3.0.0 and before 3.3.0; all versions of package hummus are vulnerable to Denial of Service (DoS) when supplied with a maliciously crafted PDF file to be parsed. ### Patches It has been patched in 3.4.0 and has been backported to 2.6.2 There is no patch for hummus, currently ### Workarounds Do not process files from untrusted sources or update. Replace hummus with muhammara ### References https://github.com/julianhille/MuhammaraJS/pull/235 https://github.com/julianhille/MuhammaraJS/pull/238
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'hummus'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.6.2'}}, {'package': {'ecosystem': 'npm', 'name': 'muhammara'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'muhammara'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/julianhille/MuhammaraJS/security/advisories/GHSA-2r7v-cmch-5x26'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41957'}, {'type': 'WEB', 'url': 'https://github.com/julianhille/MuhammaraJS/pull/235'}, {'type': 'WEB', 'url': 'https://github.com/julianhille/MuhammaraJS/pull/238'}, {'type': 'PACKAGE', 'url': 'https://github.com/julianhille/MuhammaraJS'}]
{'cwe_ids': ['CWE-690'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-05T17:37:22Z', 'nvd_published_at': '2022-11-28T15:15:00Z'}
1.4.0
GHSA-p86x-75j8-w4xh
2022-12-16T23:00:52Z
2022-12-12T09:30:35Z
null
['CVE-2022-46684']
Stored XSS vulnerability in Jenkins Checkmarx Plugin
heckmarx Plugin processes Checkmarx service API responses and generates HTML reports from them for rendering on the Jenkins UI. Checkmarx Plugin 2022.3.3 and earlier does not escape values returned from the Checkmarx service API before inserting them into HTML reports. This results in a stored cross-site scripting (XSS) vulnerability. While Jenkins users without Overall/Administer permission are not allowed to configure the URL to the Checkmarx service, this could still be exploited via man-in-the-middle attacks. Checkmarx Plugin 2022.4.3 escapes values returned from the Checkmarx service API before inserting them into HTML reports.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.checkmarx.jenkins:checkmarx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2022.4.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2022.3.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46684'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/checkmarx-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-12-07/#SECURITY-2869'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-16T23:00:52Z', 'nvd_published_at': '2022-12-12T09:15:00Z'}
1.4.0
GHSA-7249-8x22-4rg4
2022-12-06T19:43:30Z
2022-12-05T06:30:22Z
null
['CVE-2022-42496']
nadesiko3 vulnerable to OS Command Injection
OS command injection vulnerability in Nako3edit, editor component of nadesiko3 (PC Version) v3.3.74 and earlier allows a remote attacker to obtain appkey of the product and execute an arbitrary OS command on the product.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'nadesiko3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.75'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42496'}, {'type': 'WEB', 'url': 'https://github.com/kujirahand/nadesiko3/issues/1325'}, {'type': 'WEB', 'url': 'https://github.com/kujirahand/nadesiko3/issues/1347'}, {'type': 'PACKAGE', 'url': 'https://github.com/kujirahand/nadesiko3'}, {'type': 'WEB', 'url': 'https://github.com/kujirahand/nadesiko3/releases/tag/3.3.75'}, {'type': 'WEB', 'url': 'https://jvn.jp/en/jp/JVN56968681/index.html'}]
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T19:43:30Z', 'nvd_published_at': '2022-12-05T04:15:00Z'}
1.4.0
GHSA-3c5x-4hvx-qrrr
2023-01-10T00:47:41Z
2022-12-27T15:30:19Z
null
['CVE-2022-4728']
Graphite Web Cross-site Scripting vulnerability
A vulnerability has been found in Graphite Web and classified as problematic. This vulnerability affects unknown code of the component Cookie Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 2f178f490e10efc03cd1d27c72f64ecab224eb23. It is recommended to apply a patch to fix this issue. VDB-216742 is the identifier assigned to this vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'graphite-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4728'}, {'type': 'WEB', 'url': 'https://github.com/graphite-project/graphite-web/issues/2744'}, {'type': 'WEB', 'url': 'https://github.com/graphite-project/graphite-web/pull/2785'}, {'type': 'WEB', 'url': 'https://github.com/graphite-project/graphite-web/commit/2f178f490e10efc03cd1d27c72f64ecab224eb23'}, {'type': 'PACKAGE', 'url': 'https://github.com/graphite-project/graphite-web'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.216742'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T17:57:48Z', 'nvd_published_at': '2022-12-27T15:15:00Z'}
1.4.0
GHSA-c5hq-35h7-r9x4
2023-01-10T00:52:02Z
2022-12-29T18:30:24Z
null
['CVE-2022-4850']
usememos/memos Cross-Site Request Forgery vulnerability
Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos 0.9.0 and prior.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4850'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/c9bb2b785dc5852655405d5c9ab127a2d5aa3948'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/46dc4728-eacc-43f5-9831-c203fdbcc346'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T22:51:40Z', 'nvd_published_at': '2022-12-29T18:15:00Z'}
1.4.0
GHSA-vp22-232w-h9x8
2022-12-12T21:59:56Z
2022-12-08T09:30:30Z
null
['CVE-2022-4348']
RuoYi-Cloud Cross-site Scripting vulnerability
A vulnerability was found in y_project RuoYi-Cloud. It has been rated as problematic. Affected by this issue is some unknown functionality of the component JSON Handler. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-215108. A patch for this issue is available at https://gitee.com/y_project/RuoYi-Cloud/pulls/224.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.ruoyi:ruoyi-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.6.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4348'}, {'type': 'PACKAGE', 'url': 'https://gitee.com/y_project/RuoYi-Cloud'}, {'type': 'WEB', 'url': 'https://gitee.com/y_project/RuoYi-Cloud/issues/I5IRC8'}, {'type': 'WEB', 'url': 'https://gitee.com/y_project/RuoYi-Cloud/pulls/224/files'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.215108'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T21:59:56Z', 'nvd_published_at': '2022-12-08T08:15:00Z'}
1.4.0
GHSA-c6rp-wrp9-qr4q
2022-12-29T01:06:38Z
2022-12-21T21:30:15Z
null
['CVE-2021-4264']
dustjs-linkedin vulnerable to Prototype Pollution
A vulnerability was found in LinkedIn dustjs prior to version 3.0.0 and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.0.0 can address this issue. The name of the patch is ddb6523832465d38c9d80189e9de60519ac307c3. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216464.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'dustjs-linkedin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4264'}, {'type': 'WEB', 'url': 'https://github.com/linkedin/dustjs/issues/804'}, {'type': 'WEB', 'url': 'https://github.com/linkedin/dustjs/pull/805'}, {'type': 'WEB', 'url': 'https://github.com/linkedin/dustjs/commit/ddb6523832465d38c9d80189e9de60519ac307c3'}, {'type': 'PACKAGE', 'url': 'https://github.com/linkedin/dustjs'}, {'type': 'WEB', 'url': 'https://github.com/linkedin/dustjs/releases/tag/v3.0.0'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.216464'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.216464'}]
{'cwe_ids': ['CWE-1321', 'CWE-74', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T03:35:37Z', 'nvd_published_at': '2022-12-21T19:15:00Z'}
1.4.0
GHSA-hcpj-qp55-gfph
2022-12-06T14:33:52Z
2022-12-06T06:30:17Z
null
['CVE-2022-24439']
GitPython vulnerable to Remote Code Execution due to improper user input validation
All versions of package gitpython are vulnerable to Remote Code Execution (RCE) due to improper user input validation, which makes it possible to inject a maliciously crafted remote URL into the clone command. Exploiting this vulnerability is possible because the library makes external calls to git without sufficient sanitization of input arguments.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'GitPython'}, 'ecosystem_specific': {'affected_functions': ['git.repo.base.Repo.clone', 'git.repo.base.Repo.clone_from']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.30'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.1.29'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24439'}, {'type': 'WEB', 'url': 'https://github.com/gitpython-developers/GitPython/issues/1515'}, {'type': 'WEB', 'url': 'https://github.com/gitpython-developers/GitPython/commit/2625ed9fc074091c531c27ffcba7902771130261'}, {'type': 'PACKAGE', 'url': 'https://github.com/gitpython-developers/GitPython'}, {'type': 'WEB', 'url': 'https://github.com/gitpython-developers/GitPython/blob/bec61576ae75803bc4e60d8de7a629c194313d1c/git/repo/base.py#L1249'}, {'type': 'WEB', 'url': 'https://github.com/gitpython-developers/GitPython/blob/bec61576ae75803bc4e60d8de7a629c194313d1c/git/repo/base.py%23L1249'}, {'type': 'WEB', 'url': 'https://github.com/gitpython-developers/GitPython/releases/tag/3.1.30'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/07/msg00024.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AV5DV7GBLMOZT7U3Q4TDOJO5R6G3V6GH/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IKMVYKLWX62UEYKAN64RUZMOIAMZM5JN/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PF6AXUTC5BO7L2SBJMCVKJSPKWY52I5R/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJHN3QUXPJIMM6SULIR3PR34UFWRAE7X/'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-PYTHON-GITPYTHON-3113858'}]
{'cwe_ids': ['CWE-20', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T14:33:52Z', 'nvd_published_at': '2022-12-06T05:15:00Z'}
1.4.0
GHSA-q7qq-9gx2-ggxv
2022-12-02T22:26:45Z
2022-12-02T22:26:45Z
null
[]
phpxmlrpc vulnerable to argument injection
phpxmlrpc vulnerable to argument injection via local file access in `Client:send` via manipulation of `$protocol` argument.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpxmlrpc/phpxmlrpc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.9.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/gggeek/phpxmlrpc/issues/81'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/phpxmlrpc/phpxmlrpc/2022-11-28-1.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/gggeek/phpxmlrpc'}, {'type': 'WEB', 'url': 'https://github.com/gggeek/phpxmlrpc/releases/tag/4.9.0'}]
{'cwe_ids': ['CWE-88'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T22:26:45Z', 'nvd_published_at': None}
1.4.0
GHSA-g86j-hwg9-77q5
2022-12-27T15:25:51Z
2022-12-27T15:25:51Z
null
[]
SentinelOne impersonated via PyPI packages
In December 2022, threat actors impersonated SentinelOne by uploading fake software development kits (SDKs) onto PyPI. The SDKs contain fully functional SentinelOne clients, but the packages also contained malicious backdoors that are only executed when called on programmatically, as opposed to during installation. The packages have since been taken down from PyPI.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'SentinelOne'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'last_affected': '1.2.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'sentinelone-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.2.1'}, {'last_affected': '6.2.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'SentineloneSDK'}, 'versions': ['1.0.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'Sentinelone'}, 'versions': ['1.0.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'SentinelOneSDK'}, 'versions': ['1.0.0']}]
[{'type': 'WEB', 'url': 'https://pypi.org/project/SentinelOne/'}, {'type': 'WEB', 'url': 'https://www.reversinglabs.com/blog/sentinelsneak-malicious-pypi-module-poses-as-security-sdk'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-27T15:25:51Z', 'nvd_published_at': None}
1.4.0
GHSA-6xrf-q977-5vgc
2023-01-06T03:21:28Z
2022-12-26T09:30:25Z
null
['CVE-2022-4742']
json-pointer vulnerable to Prototype Pollution
A vulnerability, which was classified as critical, has been found in json-pointer. Affected by this issue is the function set of the file index.js. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The attack may be launched remotely. The name of the patch is 859c9984b6c407fc2d5a0a7e47c7274daa681941. It is recommended to apply a patch to fix this issue. VDB-216794 is the identifier assigned to this vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'json-pointer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4742'}, {'type': 'WEB', 'url': 'https://github.com/manuelstofer/json-pointer/pull/36'}, {'type': 'WEB', 'url': 'https://github.com/manuelstofer/json-pointer/commit/859c9984b6c407fc2d5a0a7e47c7274daa681941'}, {'type': 'PACKAGE', 'url': 'https://github.com/manuelstofer/json-pointer'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.216794'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.216794'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T17:21:11Z', 'nvd_published_at': '2022-12-26T08:15:00Z'}
1.4.0
GHSA-4348-x292-h437
2023-01-06T03:19:36Z
2022-12-28T00:30:23Z
null
['CVE-2022-2583']
GoBase Race Condition vulnerability
A race condition can cause incorrect HTTP request routing.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ntbosscher/gobase'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2583'}, {'type': 'WEB', 'url': 'https://github.com/ntbosscher/gobase/commit/a8d40bce9c429d324122d18c446924dab809e812'}, {'type': 'PACKAGE', 'url': 'https://github.com/ntbosscher/gobase'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0400'}]
{'cwe_ids': ['CWE-362'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T18:04:09Z', 'nvd_published_at': '2022-12-27T22:15:00Z'}
1.4.0
GHSA-6vh6-72g6-xqx2
2022-12-19T19:15:19Z
2022-12-15T21:30:29Z
null
['CVE-2022-40002']
FeehiCMS Cross Site Scripting vulnerability
Cross Site Scripting (XSS) vulnerability in FeehiCMS-2.1.1 allows remote attackers to run arbirtary code via the callback parameter to /cms/notify.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'feehi/feehicms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40002'}, {'type': 'WEB', 'url': 'https://github.com/liufee/cms/issues/66'}, {'type': 'PACKAGE', 'url': 'https://github.com/liufee/cms'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T23:34:40Z', 'nvd_published_at': '2022-12-15T19:15:00Z'}
1.4.0
GHSA-pwh3-3pcm-6vjh
2022-12-19T14:40:09Z
2022-12-15T21:30:28Z
null
['CVE-2020-20589']
FeehiCMS vulnerable to Cross Site Scripting
Cross Site Scripting (XSS) vulnerability in FeehiCMS 2.0.8 allows remote attackers to run arbitrary code via tha lang attribute of an html tag.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'feehi/feehicms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-20589'}, {'type': 'WEB', 'url': 'https://github.com/liufee/cms/issues/45'}, {'type': 'PACKAGE', 'url': 'https://github.com/liufee/cms'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T23:30:15Z', 'nvd_published_at': '2022-12-15T19:15:00Z'}
1.4.0
GHSA-97rc-mm5j-f6rj
2023-01-09T08:21:22Z
2022-12-27T15:30:19Z
null
['CVE-2022-4691']
usememos/memos vulnerable to stored Cross-site Scripting
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4691'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/c07b4a57caa89905e54b800f4d8fb720bbf5bf82'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/459b55c1-22f5-4556-9cda-9b86aa91582f'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T18:03:06Z', 'nvd_published_at': '2022-12-27T15:15:00Z'}
1.4.0
GHSA-7qpw-2j9m-rw8c
2023-01-10T15:44:56Z
2022-12-28T15:30:46Z
null
['CVE-2022-4813']
usememos/memos has Insufficient Granularity of Access Control
An Insufficient Granularity of Access Control in usememos/memos prior to 0.9.0 can allow an attacker to delete a memo from the archives.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4813'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a24b45d8-554b-4131-8ce1-f33bf8cdbacc'}]
{'cwe_ids': ['CWE-1220'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T22:12:40Z', 'nvd_published_at': '2022-12-28T14:15:00Z'}
1.4.0
GHSA-7vx2-5349-qj99
2023-06-06T18:32:24Z
2022-12-06T00:30:16Z
2023-06-06T18:32:24Z
['CVE-2022-46464']
Withdrawn: ConcreteCMS vulnerable to Xpath injection attacks
## Withdrawn This advisory has been withdrawn because it has been found not to be a security issue and withdrawn by its CNA. Please see the message from NVD [here](https://nvd.nist.gov/vuln/detail/CVE-2022-46464) for more information. This link is maintained to preserve external references. ## Original Description ConcreteCMS v9.1.3 was discovered to be vulnerable to Xpath injection attacks. This vulnerability allows attackers to access sensitive XML data via a crafted payload injected into the URL path folder "3".
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '9.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46464'}, {'type': 'PACKAGE', 'url': 'https://github.com/concretecms/concretecms'}, {'type': 'WEB', 'url': 'https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/concretecms.org/2022/concretecms-9.1.3'}]
{'cwe_ids': ['CWE-91'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T15:35:16Z', 'nvd_published_at': '2022-12-05T23:15:00Z'}
1.4.0
GHSA-gxgj-xjcw-fv9p
2023-01-09T21:48:38Z
2022-12-28T00:30:23Z
null
['CVE-2013-10005']
socks Infinite Loop vulnerability
The `RemoteAddr` and `LocalAddr` methods on the returned `net.Conn` may call themselves, leading to an infinite loop which will crash the program due to a stack overflow.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/btcsuite/go-socks'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20130808000456-233bccbb1abe'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/btcsuitereleases/go-socks'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20130808000456-233bccbb1abe'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-10005'}, {'type': 'WEB', 'url': 'https://github.com/btcsuite/go-socks/commit/233bccbb1abe02f05750f7ace66f5bffdb13defc'}, {'type': 'PACKAGE', 'url': 'https://github.com/btcsuite/go-socks'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0024'}]
{'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T21:48:38Z', 'nvd_published_at': '2022-12-27T22:15:00Z'}
1.4.0
GHSA-c5hg-mr8r-f6jp
2023-03-20T15:45:32Z
2022-12-27T14:40:39Z
null
['CVE-2022-36437']
Hazelcast connection caching
### Impact The Connection handler in Hazelcast and Hazelcast Jet allows an unauthenticated, remote attacker to access and manipulate data in the cluster with another authenticated connection's identity. The affected Hazelcast versions are through 3.12.12, 4.0.6, 4.1.9, 4.2.5, 5.0.3, and 5.1.2. The affected Hazelcast Jet versions are through 4.5.3. ### Patches Hazelcast Jet (and Enterprise) 4.5.4. Hazelcast IMDG (and Enterprise)3.12.13 Hazelcast IMDG (and Enterprise) 4.1.10 Hazelcast IMDG (and Enterprise) 4.2.6 Hazelcast Platform (and Enterprise) 5.1.3 ### Workarounds There is no known workaround, but setups with TLS and mutual authentication enabled significantly lowers the exploitation risk. ### References https://support.hazelcast.com/s/article/Security-Advisory-for-CVE-2022-36437
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.hazelcast:hazelcast'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.12.13'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.12.12'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.hazelcast:hazelcast'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0'}, {'last_affected': '4.0.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.hazelcast:hazelcast'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1'}, {'fixed': '4.1.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.9'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.hazelcast:hazelcast'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2'}, {'fixed': '4.2.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.5'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.hazelcast:hazelcast'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0'}, {'fixed': '5.0.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.0.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.hazelcast:hazelcast'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1'}, {'fixed': '5.1.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.1.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.hazelcast.jet:hazelcast-jet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.5.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.hazelcast.jet:hazelcast-jet-enterprise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.5.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.hazelcast:hazelcast-enterprise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.12.13'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.12.12'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.hazelcast:hazelcast-enterprise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0'}, {'last_affected': '4.0.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.hazelcast:hazelcast-enterprise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1'}, {'fixed': '4.1.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.9'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.hazelcast:hazelcast-enterprise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2'}, {'fixed': '4.2.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.5'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.hazelcast:hazelcast-enterprise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0'}, {'fixed': '5.0.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.0.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.hazelcast:hazelcast-enterprise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1'}, {'fixed': '5.1.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.1.2'}}]
[{'type': 'WEB', 'url': 'https://github.com/hazelcast/hazelcast/security/advisories/GHSA-c5hg-mr8r-f6jp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36437'}, {'type': 'PACKAGE', 'url': 'https://github.com/hazelcast/hazelcast'}, {'type': 'WEB', 'url': 'https://support.hazelcast.com/s/article/Security-Advisory-for-CVE-2022-36437'}]
{'cwe_ids': ['CWE-384'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-27T14:40:39Z', 'nvd_published_at': '2022-12-29T23:15:00Z'}
1.4.0
GHSA-hh82-3pmq-7frp
2023-01-10T23:07:13Z
2022-12-12T21:25:44Z
null
['CVE-2022-41915']
Netty vulnerable to HTTP Response splitting from assigning header value iterator
### Impact When calling `DefaultHttpHeaders.set` with an _iterator_ of values (as opposed to a single given value), header value validation was not performed, allowing malicious header values in the iterator to perform [HTTP Response Splitting](https://owasp.org/www-community/attacks/HTTP_Response_Splitting). ### Patches The necessary validation was added in Netty 4.1.86.Final. ### Workarounds Integrators can work around the issue by changing the `DefaultHttpHeaders.set(CharSequence, Iterator<?>)` call, into a `remove()` call, and call `add()` in a loop over the iterator of values. ### References [HTTP Response Splitting](https://owasp.org/www-community/attacks/HTTP_Response_Splitting) [CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers](https://cwe.mitre.org/data/definitions/113.html) ### For more information If you have any questions or comments about this advisory: * Open an issue in [[example link to repo](https://github.com/netty/netty)](https://github.com/netty/netty) * Email us at [netty-security@googlegroups.com](mailto:netty-security@googlegroups.com)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.netty:netty-codec-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.83.Final'}, {'fixed': '4.1.86.Final'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/netty/netty/security/advisories/GHSA-hh82-3pmq-7frp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41915'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/issues/13084'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/pull/12760'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/commit/c37c637f096e7be3dffd36edee3455c8e90cb1b0'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/commit/fe18adff1c2b333acb135ab779a3b9ba3295a1c4'}, {'type': 'PACKAGE', 'url': 'https://github.com/netty/netty/'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/01/msg00008.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230113-0004/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5316'}]
{'cwe_ids': ['CWE-113', 'CWE-436'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T21:25:44Z', 'nvd_published_at': '2022-12-13T07:15:00Z'}
1.4.0
GHSA-42q2-m54f-jh95
2023-01-10T15:47:45Z
2022-12-29T18:30:23Z
null
['CVE-2022-4851']
sememos/memos vulnerable to Improper Handling of Values
In usememos/memos 0.9.0 and prior, an attacker can post malicious content to another user's memos page via POST request.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4851'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/e3cebc1a-1326-4a08-abad-0414a717fa0f'}]
{'cwe_ids': ['CWE-229'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T22:23:38Z', 'nvd_published_at': '2022-12-29T18:15:00Z'}
1.4.0
GHSA-x5q4-m45m-fm94
2023-01-09T21:49:36Z
2022-12-28T12:30:51Z
null
['CVE-2018-25050']
Harvest Chosen vulnerable to Cross-site Scripting
A vulnerability, which was classified as problematic, has been found in Harvest Chosen up to 1.8.6. Affected by this issue is the function AbstractChosen of the file coffee/lib/abstract-chosen.coffee. The manipulation of the argument group_label leads to cross site scripting. The attack may be launched remotely. Upgrading to version 1.8.7 can address this issue. The name of the patch is 77fd031d541e77510268d1041ed37798fdd1017e. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216956.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'harvesthq/chosen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25050'}, {'type': 'WEB', 'url': 'https://github.com/harvesthq/chosen/pull/2997'}, {'type': 'WEB', 'url': 'https://github.com/harvesthq/chosen/commit/77fd031d541e77510268d1041ed37798fdd1017e'}, {'type': 'PACKAGE', 'url': 'https://github.com/harvesthq/chosen'}, {'type': 'WEB', 'url': 'https://github.com/harvesthq/chosen/releases/tag/v1.8.7'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.216956'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.216956'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T21:49:36Z', 'nvd_published_at': '2022-12-28T10:15:00Z'}