schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
stringlengths 20
20
⌀ | aliases
stringlengths 2
20
| summary
stringlengths 20
140
| details
stringlengths 56
37.2k
| severity
stringlengths 2
92
| affected
stringlengths 88
7.07k
| references
stringlengths 139
4.72k
| database_specific
stringlengths 131
185
|
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0
|
GHSA-3x59-vrmc-5mx6
|
2023-08-31T18:51:43Z
|
2023-08-24T22:16:20Z
| null |
['CVE-2023-41167']
|
@webiny/react-rich-text-renderer vulnerable to insecure rendering of rich text content
|
## Overview
`@webiny/react-rich-text-renderer` is a react component to render data coming from Webiny Headless CMS and Webiny Form Builder. The `@webiny/react-rich-text-renderer` package depends on the [editor.js](https://editorjs.io/) rich text editor to handle rich text content. The CMS stores rich text content from the `editor.js` into the database. When the `@webiny/react-rich-text-renderer` is used to render such content, it uses the `dangerouslySetInnerHTML` prop, without applying HTML sanitization. The issue arises when an actor, who in this context would specifically be a content manager with access to the CMS, inserts a malicious script as part of the user-defined input. This script is then injected and executed within the user's browser when the main page or admin page loads.
## Am I affected?
You will be affected if you're running a Webiny project created prior to `5.35.0` and you're using the legacy rich text editor (which uses `editor.js` library under the hood). If you've already switched to using the new rich text editor, powered by Lexical editor, you will not be affected by this.
## How do I patch this vulnerability?
Update to Webiny version `5.37.2`.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@webiny/react-rich-text-renderer'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.37.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.37.1'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/webiny/webiny-js/security/advisories/GHSA-3x59-vrmc-5mx6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-41167'}, {'type': 'WEB', 'url': 'https://github.com/webiny/webiny-js/commit/8748bc53fe862bb03d4459ccc0be39084a5d35c0'}, {'type': 'PACKAGE', 'url': 'https://github.com/webiny/webiny-js'}, {'type': 'WEB', 'url': 'https://webiny.com'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-24T22:16:20Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-qppv-j76h-2rpx
|
2023-08-14T21:34:17Z
|
2023-08-14T21:34:17Z
| null |
[]
|
Tornado vulnerable to HTTP request smuggling via improper parsing of `Content-Length` fields and chunk lengths
|
## Summary
Tornado interprets `-`, `+`, and `_` in chunk length and `Content-Length` values, which are not allowed by the HTTP RFCs. This can result in request smuggling when Tornado is deployed behind certain proxies that interpret those non-standard characters differently. This is known to apply to older versions of haproxy, although the current release is not affected.
## Details
Tornado uses the `int` constructor to parse the values of `Content-Length` headers and chunk lengths in the following locations:
### `tornado/http1connection.py:445`
```python3
self._expected_content_remaining = int(headers["Content-Length"])
```
### `tornado/http1connection.py:621`
```python3
content_length = int(headers["Content-Length"]) # type: Optional[int]
```
### `tornado/http1connection.py:671`
```python3
chunk_len = int(chunk_len_str.strip(), 16)
```
Because `int("0_0") == int("+0") == int("-0") == int("0")`, using the `int` constructor to parse and validate strings that should contain only ASCII digits is not a good strategy.
|
[]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'tornado'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/tornadoweb/tornado/security/advisories/GHSA-qppv-j76h-2rpx'}, {'type': 'WEB', 'url': 'https://github.com/tornadoweb/tornado/commit/b7a5dd29bb02950303ae96055082c12a1ea0a4fe'}, {'type': 'PACKAGE', 'url': 'https://github.com/tornadoweb/tornado'}]
|
{'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-14T21:34:17Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-hv48-hgp6-xpqf
|
2023-08-16T21:12:56Z
|
2023-08-16T15:30:18Z
| null |
['CVE-2023-40342']
|
Jenkins Flaky Test Handler Plugin stored cross-site scripting vulnerability
|
Jenkins Flaky Test Handler Plugin 1.2.2 and earlier does not escape JUnit test contents when showing them on the Jenkins UI.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control JUnit report file contents.
Flaky Test Handler Plugin 1.2.3 escapes JUnit test contents when showing them on the Jenkins UI.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:flaky-test-handler'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40342'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3223'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/16/3'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:12:56Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-rg2c-cfxv-qp6f
|
2023-09-06T15:32:33Z
|
2023-08-08T18:30:37Z
| null |
['CVE-2023-3894']
|
Denial of service in jackson-dataformats-text
|
Those using jackson-dataformats-text to parse TOML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.dataformat:jackson-dataformats-text'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.15.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3894'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-dataformats-text/pull/398'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-dataformats-text/commit/5dd5f740aedcf37adad7ffece460e75e54abb0ed'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50083'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-dataformats-text'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-dataformats-text/blob/2.16/release-notes/VERSION-2.x'}]
|
{'cwe_ids': ['CWE-20', 'CWE-400', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T12:52:21Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-876p-8259-xjgg
|
2023-09-11T18:32:44Z
|
2023-08-09T13:18:18Z
| null |
['CVE-2023-39533']
|
libp2p nodes vulnerable to attack using large RSA keys
|
### Impact
A malicious peer can use large RSA keys to run a resource exhaustion attack & force a node to spend time doing signature verification of the large key. This vulnerability is present in the core/crypto module of go-libp2p and can occur during the Noise handshake and the libp2p x509 extension verification step.
To prevent this attack, go-libp2p now restricts RSA keys to <= 8192 bits.
### Patches
Users should upgrade their go-libp2p versions to >=v0.27.8, >= v0.28.2, or >=v0.29.1
To protect your application, it's necessary to update to these patch releases **AND** to use the updated Go compiler (1.20.7 or 1.19.12, respectively)
### Workarounds
There are no known workarounds
### References
The Golang crypto/tls package also had this vulnerability ("verifying certificate chains containing large RSA keys is slow” https://github.com/golang/go/issues/61460)
Fix in golang/go crypto/tls: https://github.com/golang/go/commit/2350afd2e8ab054390e284c95d5b089c142db017
Fix in quic-go https://github.com/quic-go/quic-go/pull/4012
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/libp2p/go-libp2p'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.27.8'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/libp2p/go-libp2p'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.28.0'}, {'fixed': '0.28.2'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/libp2p/go-libp2p'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.29.0'}, {'fixed': '0.29.1'}]}], 'versions': ['0.29.0']}]
|
[{'type': 'WEB', 'url': 'https://github.com/libp2p/go-libp2p/security/advisories/GHSA-876p-8259-xjgg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39533'}, {'type': 'WEB', 'url': 'https://github.com/golang/go/issues/61460'}, {'type': 'WEB', 'url': 'https://github.com/libp2p/go-libp2p/pull/2454'}, {'type': 'WEB', 'url': 'https://github.com/quic-go/quic-go/pull/4012'}, {'type': 'WEB', 'url': 'https://github.com/golang/go/commit/2350afd2e8ab054390e284c95d5b089c142db017'}, {'type': 'WEB', 'url': 'https://github.com/libp2p/go-libp2p/commit/0cce607219f3710addc7e18672cffd1f1d912fbb'}, {'type': 'WEB', 'url': 'https://github.com/libp2p/go-libp2p/commit/445be526aea4ee0b1fa5388aa65d32b2816d3a00'}, {'type': 'WEB', 'url': 'https://github.com/libp2p/go-libp2p/commit/e30fcf7dfd4715ed89a5e68d7a4f774d3b9aa92d'}, {'type': 'PACKAGE', 'url': 'https://github.com/libp2p/go-libp2p'}, {'type': 'WEB', 'url': 'https://go.dev/issue/61460'}]
|
{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T13:18:18Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-67c6-q4j4-hccg
|
2023-08-16T21:02:52Z
|
2023-08-16T21:02:52Z
| null |
['CVE-2023-40033']
|
Flarum vulnerable to LFI and Blind SSRF via Avatar upload
|
## Impact
The Flarum forum software is affected by a vulnerability that allows an attacker to conduct a Blind SSRF attack or disclose any file on the server, even with a basic user account on any Flarum forum. By uploading a file containing a URL and spoofing the MIME type, an attacker can manipulate the application to execute unintended actions. The vulnerability is due to the behavior of the `intervention/image` package, which attempts to interpret the supplied file contents as a URL, which then fetches its contents. This allows an attacker to exploit the vulnerability to perform SSRF attacks, disclose local file contents, or conduct a blind oracle attack.
### Patches
This has been patched in Flarum **v1.8**.
## Workarounds
As a temporary workaround for the SSRF aspect of the vulnerability, one can disable PHP's `allow_url_fopen` which will prevent the fetching of external files via URLs.
### Credits
Adam Kues - [Assetnote](https://assetnote.io/)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'flarum/core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'flarum/framework'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/flarum/framework/security/advisories/GHSA-67c6-q4j4-hccg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40033'}, {'type': 'WEB', 'url': 'https://github.com/flarum/framework/commit/d1059c1cc79fe61f9538f3da55e8f42abbede570'}, {'type': 'PACKAGE', 'url': 'https://github.com/flarum/framework'}]
|
{'cwe_ids': ['CWE-918', 'CWE-98'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:02:52Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-5mf8-v43w-mfxp
|
2023-08-21T20:10:55Z
|
2023-08-21T20:10:55Z
| null |
['CVE-2023-40177']
|
XWiki Platform privilege escalation (PR) from account through AWM content fields
|
### Impact
Any registered user can use the content field of their user profile page to execute arbitrary scripts with programming rights, thus effectively performing rights escalation.
The problem is present [since version 4.3M2](https://jira.xwiki.org/browse/XWIKI-7369) when AppWithinMinutes Application added support for the Content field, allowing any wiki page (including the user profile page) to use its content as an AWM Content field, which has a custom displayer that executes the content with the rights of the ``AppWithinMinutes.Content`` author, rather than the rights of the content author.
### Patches
The issue has been fixed in XWiki 14.10.5 and 15.1RC1 by https://github.com/xwiki/xwiki-platform/commit/dfb1cde173e363ca5c12eb3654869f9719820262 . The fix is in the content of the [AppWithinMinutes.Content](https://github.com/xwiki/xwiki-platform/commit/dfb1cde173e363ca5c12eb3654869f9719820262#diff-850f6875c40cf7932f40a985e99679a041891c6ee75d10239c06921c0019cf78R82) page that defines the custom displayer. By using the ``display`` script service to render the content we make sure that the proper author is used for access rights checks.
### Workarounds
If you want to fix this problem on older versions of XWiki that have not been patched then you need to modify the content of ``AppWithinMinutes.Content`` page to use the ``display`` script service to render the content, like this:
```
- {{html}}$tdoc.getRenderedContent($tdoc.content, $tdoc.syntax.toIdString()).replace('{{', '&#123;&#123;'){{/html}}
+ {{html}}$services.display.content($tdoc, {
+ 'displayerHint': 'default'
+ }).replace('{{/html}}', '&#123;&#123;/html&#125;&#125;'){{/html}}
```
### References
* JIRA issue https://jira.xwiki.org/browse/XWIKI-19906
* Fix https://github.com/xwiki/xwiki-platform/commit/dfb1cde173e363ca5c12eb3654869f9719820262
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)
* Email us at [Security Mailing List](mailto:security@xwiki.org)
### Attribution
This vulnerability has been found and reported by @michitux .
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-appwithinminutes-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3-milestone-2'}, {'fixed': '14.10.5'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-5mf8-v43w-mfxp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40177'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/dfb1cde173e363ca5c12eb3654869f9719820262'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-7369'}]
|
{'cwe_ids': ['CWE-95'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-21T20:10:55Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-gcq9-qqwx-rgj3
|
2023-09-14T16:23:15Z
|
2023-08-24T22:22:59Z
| null |
['CVE-2023-40583']
|
libp2p nodes vulnerable to OOM attack
|
### Summary
In go-libp2p, by using signed peer records a malicious actor can store an arbitrary amount of data in a remote node’s memory. This memory does not get garbage collected and so the victim can run out of memory and crash.
It is feasible to do this at scale. An attacker would have to transfer ~1/2 as much memory it wants to occupy (2x amplification factor).
The attacker can perform this attack over time as the target node’s memory will not be garbage collected.
This can occur because when a signed peer record is received, only the signature validity check is performed but the sender signature is not checked. Signed peer records from randomly generated peers can be sent by a malicious actor. A target node will accept the peer record as long as the signature is valid, and then stored in the peer store.
There is cleanup logic in the peer store that cleans up data when a peer disconnects, but this cleanup is never triggered for the fake peer (from which signed peer records were accepted) because it was never “connected”.
### Impact
If users of go-libp2p in production are not monitoring memory consumption over time, it could be a silent attack i.e. the attacker could bring down nodes over a period of time (how long depends on the node resources i.e. a go-libp2p node on a virtual server with 4 gb of memory takes about 90 sec to bring down; on a larger server, it might take a bit longer.)
### Patches
Update your go-libp2p dependency to the latest release, v0.30.0 at the time of writing.
If you'd like to stay on the 0.27.x release, we strongly recommend users to update to go-libp2p [0.27.7](https://github.com/libp2p/go-libp2p/releases/tag/v0.27.7). Though this OOM issue was fixed in 0.27.4, there were subsequent patch releases afterwards (important fixes for other issues unrelated to the OOM).
### Workarounds
None
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/libp2p/go-libp2p'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.27.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.27.3'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/libp2p/go-libp2p/security/advisories/GHSA-gcq9-qqwx-rgj3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40583'}, {'type': 'WEB', 'url': 'https://github.com/libp2p/go-libp2p/commit/45d3c6fff662ddd6938982e7e9309ad5fa2ad8dd'}, {'type': 'PACKAGE', 'url': 'https://github.com/libp2p/go-libp2p'}, {'type': 'WEB', 'url': 'https://github.com/libp2p/go-libp2p/releases/tag/v0.27.4'}, {'type': 'WEB', 'url': 'https://github.com/libp2p/go-libp2p/releases/tag/v0.27.7'}]
|
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-24T22:22:59Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-qq8m-9rpx-w2fm
|
2023-08-09T14:30:23Z
|
2023-08-06T03:30:13Z
| null |
['CVE-2023-4190']
|
Admidio Insufficient Session Expiration vulnerability
|
Insufficient Session Expiration in GitHub repository admidio/admidio prior to 4.2.11. This vulnerability allows a user's session to remain valid even after the user has logged out, potentially granting unauthorized access to sensitive areas and functionalities.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'admidio/admidio'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.11'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4190'}, {'type': 'WEB', 'url': 'https://github.com/admidio/admidio/commit/391fb2af5bee641837a58e7dd66ff76eac92bb74'}, {'type': 'PACKAGE', 'url': 'https://github.com/admidio/admidio'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/71bc75d2-320c-4332-ad11-9de535a06d92'}]
|
{'cwe_ids': ['CWE-613'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T14:30:23Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-65rp-cv85-263x
|
2023-08-31T16:54:03Z
|
2023-08-22T21:30:26Z
| null |
['CVE-2022-34038']
|
etcd denial of service vulnerability
|
Etcd v3.5.4 allows remote attackers to cause a denial of service via function PageWriter.write in pagewriter.go
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'go.etcd.io/etcd/v3'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.5'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34038'}, {'type': 'WEB', 'url': 'https://github.com/etcd-io/etcd/pull/14022'}, {'type': 'WEB', 'url': 'https://github.com/etcd-io/etcd/pull/14452'}, {'type': 'WEB', 'url': 'https://github.com/etcd-io/etcd/commit/5a315ef88fbfa454e02d27b0b8acb4f89457cd90'}, {'type': 'PACKAGE', 'url': 'https://github.com/etcd-io/etcd'}]
|
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-23T13:25:22Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-7vxc-q7rv-qfj8
|
2023-08-21T19:33:46Z
|
2023-08-11T15:30:46Z
| null |
['CVE-2021-29057']
|
SUCHMOKUO node-worker-threads-pool denial of service Vulnerability
|
An issue was discovered in StaticPool in SUCHMOKUO node-worker-threads-pool version 1.4.3 that allows attackers to cause a denial of service.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'node-worker-threads-pool'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29057'}, {'type': 'WEB', 'url': 'https://github.com/SUCHMOKUO/node-worker-threads-pool/issues/20'}, {'type': 'PACKAGE', 'url': 'https://github.com/SUCHMOKUO/node-worker-threads-pool'}]
|
{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T22:16:44Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-8c93-4hch-xgxp
|
2023-08-31T16:43:19Z
|
2023-08-03T16:34:31Z
| null |
['CVE-2023-3348']
|
Cloudflare Wrangler directory traversal vulnerability
|
### Impact
The Wrangler command line tool (<=wrangler@3.1.0 or <=wrangler@2.20.1) was affected by a directory traversal vulnerability when running a local development server for Pages (wrangler pages dev command). This vulnerability enabled an attacker in the same network as the victim to connect to the local development server and access the victim's files present outside of the directory for the development server.
### Patches
Wrangler2: Upgrade to v2.20.1 or higher.
Wrangler3: Upgrade to v3.1.1 or higher.
### References
[Workers SDK on Github](https://github.com/cloudflare/workers-sdk)
[Wrangler docs](https://developers.cloudflare.com/workers/wrangler/)
[CVE-2023-3348](https://www.cve.org/CVERecord?id=CVE-2023-3348)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'wrangler'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.20.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/cloudflare/workers-sdk/security/advisories/GHSA-8c93-4hch-xgxp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3348'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/workers-sdk/pull/3498'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/workers-sdk/commit/fddffdf0c23d2ca56f2139a2c6bc278052594cba'}, {'type': 'WEB', 'url': 'https://developers.cloudflare.com/workers/wrangler/'}, {'type': 'PACKAGE', 'url': 'https://github.com/cloudflare/workers-sdk'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/workers-sdk/releases/tag/wrangler%403.1.1'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T16:34:31Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-7vh7-fw88-wj87
|
2023-08-08T17:12:00Z
|
2023-08-08T17:12:00Z
| null |
[]
|
Several quadratic complexity bugs may lead to denial of service in Commonmarker
|
## Impact
Several quadratic complexity bugs in commonmarker's underlying [`cmark-gfm`](https://github.com/github/cmark-gfm) library may lead to unbounded resource exhaustion and subsequent denial of service.
The following vulnerabilities were addressed:
* [CVE-2023-37463](https://github.com/github/cmark-gfm/security/advisories/GHSA-w4qg-3vf7-m9x5)
For more information, consult the release notes for version [`0.29.0.gfm.12`](https://github.com/github/cmark-gfm/releases/tag/0.29.0.gfm.12).
## Mitigation
Users are advised to upgrade to commonmarker version [`0.23.10`](https://rubygems.org/gems/commonmarker/versions/0.23.10).
|
[]
|
[{'package': {'ecosystem': 'RubyGems', 'name': 'commonmarker'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.23.10'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/gjtorikian/commonmarker/security/advisories/GHSA-7vh7-fw88-wj87'}, {'type': 'WEB', 'url': 'https://github.com/gjtorikian/commonmarker/commit/db8cd377b54541f7fd484d168b7682a282a680f7'}, {'type': 'WEB', 'url': 'https://github.com/github/cmark-gfm/releases/tag/0.29.0.gfm.12'}, {'type': 'PACKAGE', 'url': 'https://github.com/gjtorikian/commonmarker'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/commonmarker/versions/0.23.10'}]
|
{'cwe_ids': ['CWE-407'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-08T17:12:00Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-j8g2-6fc7-q8f8
|
2023-09-01T17:38:42Z
|
2023-08-25T18:49:25Z
| null |
['CVE-2023-40587']
|
Pyramid static view path traversal up one directory
|
### Impact
This impacts users of Python 3.11 that are using a Pyramid static view with a full filesystem path and have a `index.html` file that is located exactly one directory above the location of the static view's file system path. No further path traversal exists, and the only file that could be disclosed accidentally is `index.html`.
Example:
```
config.add_static_view(name='static', path='/usr/src/app/static', cache_max_age=0)
```
And directory tree:
```
/usr/src/app \
| - static \
| - file.css
| - index.html
| - ...
| - index.html <-- (this file could be disclosed with this bug)
```
### Patches
Pyramid now will reject any path that contains a null-byte out of caution. While valid in directory/file names, we would strongly consider it a mistake to use null-bytes in naming files/directories.
Secondly, Python 3.11, and 3.12 has fixed the underlying issue in `os.path.normpath` to no longer truncate on the first `0x00` found, returning the behavior to pre-3.11 Python, un an as of yet unreleased version, see:
- https://github.com/python/cpython/issues/106242
- https://github.com/python/cpython/pull/106816
At the time the following Python versions are not fixed:
- Python 3.11.0 to 3.11.4
- Python 3.12.0a1 to 3.12.0rc1
Fixes will be available in: Python 3.12.0rc2 or 3.11.5.
Please note that release candidates of Python are not production ready and should not be used for production workloads.
### Workarounds
Use a version of Python 3 that is not affected. Downgrade to Python 3.10 series temporarily, or wait till Python 3.11.5 is released and upgrade to the latest version of Python 3.11 series.
### References
- https://owasp.org/www-community/attacks/Path_Traversal
- VN: JVN#41113329
- TN: JPCERT#93311166
### Thanks
- Masashi Yamane of LAC Co., Ltd
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'pyramid'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/Pylons/pyramid/security/advisories/GHSA-j8g2-6fc7-q8f8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40587'}, {'type': 'WEB', 'url': 'https://github.com/python/cpython/issues/106242'}, {'type': 'WEB', 'url': 'https://github.com/python/cpython/pull/106816'}, {'type': 'WEB', 'url': 'https://github.com/Pylons/pyramid/commit/347d7750da6f45c7436dd0c31468885cc9343c85'}, {'type': 'PACKAGE', 'url': 'https://github.com/Pylons/pyramid'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYSDTQ7NP5GHPQ7HBE47MBJQK7YEIYMF/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQIPHQTM3XE5NIEXCTQFV2J2RK2YUSMT/'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-25T18:49:25Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-v9vc-7x69-c2x8
|
2023-08-03T16:42:28Z
|
2023-08-03T06:30:22Z
| null |
['CVE-2023-4124']
|
Answer Missing Authorization vulnerability
|
Missing Authorization in GitHub repository answerdev/answer prior to v1.1.1.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4124'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/964195fd859ee5d7171fac847374dfa31893e793'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/2c684f99-d181-4106-8ee2-64a76ae6a348'}]
|
{'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T16:42:28Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-rc33-44qp-vpvq
|
2023-08-16T21:04:57Z
|
2023-08-16T15:30:18Z
| null |
['CVE-2023-40349']
|
Jenkins Gogs Plugin vulnerable to unsafe default behavior and information disclosure
|
Jenkins Gogs Plugin provides a webhook endpoint at /gogs-webhook that can be used to trigger builds of jobs. In Gogs Plugin 1.0.15 and earlier, an option to specify a Gogs secret for this webhook is provided, but not enabled by default.
This allows unauthenticated attackers to trigger builds of jobs corresponding to the attacker-specified job name.
Additionally, the output of the webhook endpoint includes whether a job corresponding to the attacker-specified job name exists, even if the attacker has no permission to access it.
As of publication of this advisory, there is no fix.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:gogs-webhook'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.15'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40349'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-2894'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/16/3'}]
|
{'cwe_ids': ['CWE-665'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:04:57Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-8x8h-hcq8-jwwx
|
2023-08-31T18:25:08Z
|
2023-08-25T18:38:18Z
| null |
['CVE-2023-32077']
|
Netmaker has Hardcoded DNS Secret Key
|
### Impact
Hardcoded DNS key usage has been found in Netmaker allowing unauth users to interact with DNS API endpoints.
### Patches
Issue is patched in 0.17.1, and fixed in 0.18.6+.
If Users are using 0.17.1, they should run "docker pull gravitl/netmaker:v0.17.1" and "docker-compose up -d". This will switch them to the patched users
If users are using v0.18.0-0.18.5, they should upgrade to v0.18.6 or later.
### Workarounds
If using 0.17.1, can just pull the latest docker image of backend and restart server.
### References
Credit to Project Discovery, and in particular https://github.com/rootxharsh , https://github.com/iamnoooob, and https://github.com/projectdiscovery
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/gravitl/netmaker'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.17.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/gravitl/netmaker'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.18.0'}, {'fixed': '0.18.6'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/gravitl/netmaker/security/advisories/GHSA-8x8h-hcq8-jwwx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32077'}, {'type': 'WEB', 'url': 'https://github.com/gravitl/netmaker/pull/2170'}, {'type': 'WEB', 'url': 'https://github.com/gravitl/netmaker/commit/1621c27c1d176b639e9768b2acad7693e387fd51'}, {'type': 'WEB', 'url': 'https://github.com/gravitl/netmaker/commit/9362c39a9a822f0e07361aa7c77af2610597e657'}, {'type': 'PACKAGE', 'url': 'https://github.com/gravitl/netmaker'}]
|
{'cwe_ids': ['CWE-321', 'CWE-798'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-25T18:38:18Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-9v66-9239-cqv2
|
2023-08-23T20:07:24Z
|
2023-08-17T21:30:53Z
| null |
['CVE-2023-38905']
|
Jeecg-boot SQL Injection vulnerability
|
SQL injection vulnerability in Jeecg-boot v.3.5.0 and before allows a local attacker to cause a denial of service via the `Benchmark`, `PG_Sleep`, `DBMS_Lock.Sleep`, `Waitfor`, `DECODE`, and `DBMS_PIPE.RECEIVE_MESSAGE` functions.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-parent'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.5.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38905'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/issues/4737'}, {'type': 'WEB', 'url': 'https://gist.github.com/wealeson1/e24fc8575f4e051320d69e9a75080642'}, {'type': 'PACKAGE', 'url': 'https://github.com/jeecgboot/jeecg-boot'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-18T21:51:47Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-44wr-rmwq-3phw
|
2023-08-23T22:14:58Z
|
2023-08-21T19:58:04Z
| null |
['CVE-2023-40035']
|
Craft CMS vulnerable to Remote Code Execution via validatePath bypass
|
### Summary
Bypassing the validatePath function can lead to potential Remote Code Execution
(Post-authentication, ALLOW_ADMIN_CHANGES=true)
### Details
In bootstrap.php, the SystemPaths path is set as below.
```php
// Set the vendor path. By default assume that it's 4 levels up from here
$vendorPath = $findConfigPath('--vendorPath', 'CRAFT_VENDOR_PATH') ?? dirname(__DIR__, 3);
// Set the "project root" path that contains config/, storage/, etc. By default assume that it's up a level from vendor/.
$rootPath = $findConfigPath('--basePath', 'CRAFT_BASE_PATH') ?? dirname($vendorPath);
// By default the remaining directories will be in the base directory
$dotenvPath = $findConfigPath('--dotenvPath', 'CRAFT_DOTENV_PATH') ?? "$rootPath/.env";
$configPath = $findConfigPath('--configPath', 'CRAFT_CONFIG_PATH') ?? "$rootPath/config";
$contentMigrationsPath = $findConfigPath('--contentMigrationsPath', 'CRAFT_CONTENT_MIGRATIONS_PATH') ?? "$rootPath/migrations";
$storagePath = $findConfigPath('--storagePath', 'CRAFT_STORAGE_PATH') ?? "$rootPath/storage";
$templatesPath = $findConfigPath('--templatesPath', 'CRAFT_TEMPLATES_PATH') ?? "$rootPath/templates";
$translationsPath = $findConfigPath('--translationsPath', 'CRAFT_TRANSLATIONS_PATH') ?? "$rootPath/translations";
$testsPath = $findConfigPath('--testsPath', 'CRAFT_TESTS_PATH') ?? "$rootPath/tests";
```
Because paths are validated based on the /path1/path2 format, this can be bypassed using a file URI scheme such as file:///path1/path2. File scheme is supported in mkdir()
```php
/**
* @param string $attribute
* @param array|null $params
* @param InlineValidator $validator
* @return void
* @since 4.4.6
*/
public function validatePath(string $attribute, ?array $params, InlineValidator $validator): void
{
// Make sure it’s not within any of the system directories
$path = FileHelper::absolutePath($this->getRootPath(), '/');
$systemDirs = Craft::$app->getPath()->getSystemPaths();
foreach ($systemDirs as $dir) {
$dir = FileHelper::absolutePath($dir, '/');
if (str_starts_with("$path/", "$dir/")) {
$validator->addError($this, $attribute, Craft::t('app', 'Local volumes cannot be located within system directories.'));
break;
}
}
}
```
ref. https://www.php.net/manual/en/wrappers.file.php
### PoC
1) Create a new filesystem. **Base Path: file:///var/www/html/templates**

2) Create a new asset volume. Asset Filesystem: local_bypass

3) Upload a ttml file with rce template code. Confirm poc.ttml file created in /var/www/html/templates
```twig
{{'<pre>'}}
{{1337*1337}}
{{['cat /etc/passwd']|map('passthru')|join}}
{{['id;pwd;ls -altr /']|map('passthru')|join}}
```


4) Create a new route. URI: * , Template: poc.ttml

5) Confirm RCE on arbitrary path ( /* )

#### PoC Env

### Impact
Take control of vulnerable systems, Data exfiltrations, Malware execution, Pivoting, etc.
although the vulnerability is exploitable only in the authenticated users, configuration with ALLOW_ADMIN_CHANGES=true, there is still a potential security threat (Remote Code Execution)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-RC1'}, {'fixed': '4.4.15'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.4.14'}}, {'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.8.15'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.8.14'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/craftcms/cms/security/advisories/GHSA-44wr-rmwq-3phw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40035'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/commit/0bd33861abdc60c93209cff03eeee54504d3d3b5'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftcms/cms'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/releases/tag/3.8.15'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/releases/tag/4.4.15'}]
|
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-21T19:58:04Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-223m-pgcq-f3xg
|
2023-08-22T17:56:45Z
|
2023-08-22T00:31:11Z
| null |
['CVE-2023-4303']
|
Jenkins Fortify Plugin HTML injection vulnerability
|
Jenkins Fortify Plugin 22.1.38 and earlier does not escape the error message for a form validation method. This results in an HTML injection vulnerability.
Fortify Plugin 22.2.39 removes HTML tags from the error message.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:fortify'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.2.39'}]}], 'database_specific': {'last_known_affected_version_range': '<= 22.1.38'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4303'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/fortify-plugin/commit/357d7bfbcb0ff796ea7d078bee13159f1d000f5d'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/fortify-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3140'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-22T17:56:45Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-5x64-925v-h4gv
|
2023-08-18T15:48:16Z
|
2023-08-11T15:30:46Z
| null |
['CVE-2020-35141']
|
FaucetSDN Ryu Denial of Service Vulnerability
|
An issue was discovered in `OFPQueueGetConfigReply` in `parser.py` in FaucetSDN Ryu version 4.34, allows remote attackers to cause a denial of service (DoS) (infinite loop).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'ryu'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.34'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35141'}, {'type': 'WEB', 'url': 'https://github.com/faucetsdn/ryu/issues/118'}, {'type': 'PACKAGE', 'url': 'https://github.com/faucetsdn/ryu'}]
|
{'cwe_ids': ['CWE-770', 'CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T22:03:46Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-fh2r-99q2-6mmg
|
2023-09-19T22:28:38Z
|
2023-08-22T18:06:15Z
| null |
[]
|
rustls-webpki: CPU denial of service in certificate path building
|
When this crate is given a pathological certificate chain to validate, it will spend CPU time exponential with the number of candidate certificates at each step of path building.
Both TLS clients and TLS servers that accept client certificate are affected.
We now give each path building operation a budget of 100 signature verifications.
The original `webpki` crate is also affected, see [GHSA-8qv2-5vq6-g2g7](https://github.com/advisories/GHSA-8qv2-5vq6-g2g7).
This was previously reported in the original crate <https://github.com/briansmith/webpki/issues/69> and re-reported to us recently.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'rustls-webpki'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.100.2'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'rustls-webpki'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.101.0'}, {'fixed': '0.101.4'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/rustls/webpki/commit/4ea052366f342a06344aab589565179b59b342d3'}, {'type': 'WEB', 'url': 'https://github.com/rustls/webpki/commit/dcad2406c92169b72c110dd12183fcc74035b683'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8qv2-5vq6-g2g7'}, {'type': 'PACKAGE', 'url': 'https://github.com/rustls/webpki'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0053.html'}]
|
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-22T18:06:15Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-ffw3-6378-cqgp
|
2023-08-01T19:44:27Z
|
2023-08-01T03:31:17Z
| null |
['CVE-2023-4033']
|
mlflow vulnerable to OS Command Injection
|
OS Command Injection in GitHub repository mlflow/mlflow prior to 2.6.0.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'mlflow'}, 'ecosystem_specific': {'affected_functions': ['mlflow.pyfunc.backend.PyFuncBackend.predict']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4033'}, {'type': 'WEB', 'url': 'https://github.com/mlflow/mlflow/commit/6dde93758d42455cb90ef324407919ed67668b9b'}, {'type': 'PACKAGE', 'url': 'https://github.com/mlflow/mlflow'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/5312d6f8-67a5-4607-bd47-5e19966fa321'}]
|
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T19:44:27Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-xvv9-5j67-3rpq
|
2023-08-22T18:39:53Z
|
2023-08-14T03:30:32Z
| null |
['CVE-2023-40274']
|
zola Path Traversal vulnerability
|
An issue was discovered in zola 0.13.0 through 0.17.2. The custom implementation of a web server, available via the "zola serve" command, allows directory traversal. The `handle_request` function, used by the server to process HTTP requests, does not account for sequences of special path control characters (`../`) in the URL when serving a file, which allows one to escape the webroot of the server and read arbitrary files from the filesystem.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'zola'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.13.0'}, {'last_affected': '0.17.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40274'}, {'type': 'WEB', 'url': 'https://github.com/getzola/zola/issues/2257'}, {'type': 'WEB', 'url': 'https://github.com/getzola/zola/pull/2258'}, {'type': 'PACKAGE', 'url': 'https://github.com/getzola/zola'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-14T21:33:07Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-2qc8-r663-v864
|
2023-08-18T19:22:58Z
|
2023-08-11T18:31:49Z
| null |
['CVE-2023-0871']
|
OpenNMS Horizon XXE Injection Vulnerability
|
XXE injection in `/rtc/post/ endpoint` in OpenNMS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms is vulnerable to XML external entity (XXE) injection, which can be used for instance to force Horizon to make arbitrary HTTP requests to internal and external services. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.opennms.core:org.opennms.core.xml'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '31.0.8'}, {'fixed': '32.0.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0871'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/pull/6355'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/commit/5a3b0b62e0c612c9e2aa2c91c847abec71d767d5'}, {'type': 'WEB', 'url': 'https://docs.opennms.com/horizon/32/releasenotes/changelog.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenNMS/opennms'}]
|
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T23:04:51Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-m2f8-v8q4-3m59
|
2023-09-01T21:36:28Z
|
2023-08-11T03:30:21Z
| null |
['CVE-2023-27506']
|
Authenticated Local Privilege Escalation vulnerability in Intel Optimization for Tensorflow
|
Improper buffer restrictions in the Intel(R) Optimization for Tensorflow software before version 2.12 may allow an authenticated user to potentially enable escalation of privilege via local access.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:H/A:L'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'intel-tensorflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.12'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-intel'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.12'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'intel-tensorflow-avx512'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.12'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27506'}, {'type': 'WEB', 'url': 'http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00840.html'}]
|
{'cwe_ids': ['CWE-119'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-01T21:36:28Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-9rww-66w7-7vjx
|
2023-08-11T21:58:15Z
|
2023-08-11T09:30:36Z
| null |
['CVE-2023-4108']
|
Mattermost fails to sanitize post metadata
|
Mattermost fails to sanitize post metadata during audit logging, resulting in permalinks' contents being logged.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.8.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.8.7'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.9.0'}, {'fixed': '7.9.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.9.5'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.10.0'}, {'fixed': '7.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.10.3'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4108'}, {'type': 'PACKAGE', 'url': 'https://github.com/mattermost/mattermost'}, {'type': 'WEB', 'url': 'https://mattermost.com/security-updates'}]
|
{'cwe_ids': ['CWE-200', 'CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T21:58:15Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-jm7r-4pg6-gf26
|
2023-08-31T18:55:02Z
|
2023-08-25T21:30:47Z
| null |
['CVE-2023-24621']
|
Esoteric YamlBeans Unsafe Deserialization vulnerability
|
An issue was discovered in Esoteric YamlBeans through 1.15. It allows untrusted deserialisation to Java classes by default, where the data and class are controlled by the author of the YAML document being processed.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.esotericsoftware.yamlbeans:yamlbeans'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.15'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24621'}, {'type': 'WEB', 'url': 'https://contrastsecurity.com'}, {'type': 'WEB', 'url': 'https://github.com/Contrast-Security-OSS/yamlbeans/blob/main/SECURITY.md'}, {'type': 'WEB', 'url': 'https://github.com/EsotericSoftware'}, {'type': 'PACKAGE', 'url': 'https://github.com/EsotericSoftware/yamlbeans'}]
|
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-25T22:03:42Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-9rmf-6qgj-g3wj
|
2023-08-11T19:46:03Z
|
2023-08-11T03:30:19Z
| null |
['CVE-2023-4304']
|
Froxlor vulnerable to business logic errors
|
Business Logic Errors in GitHub repository froxlor/froxlor prior to 2.0.22
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'froxlor/froxlor'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.22'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4304'}, {'type': 'WEB', 'url': 'https://github.com/froxlor/froxlor/commit/ce9a5f97a3edb30c7d33878765d3c014a6583597'}, {'type': 'PACKAGE', 'url': 'https://github.com/Froxlor/Froxlor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/59fe5037-b253-4b0f-be69-1d2e4af8b4a9'}]
|
{'cwe_ids': ['CWE-284', 'CWE-862'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T19:46:03Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-7c28-wg7r-pg6f
|
2023-08-04T13:31:46Z
|
2023-08-01T15:30:30Z
| null |
['CVE-2022-39986']
|
RaspAP Command Injection vulnerability
|
A Command injection vulnerability in RaspAP 2.8.0 thru 2.8.7 allows unauthenticated attackers to execute arbitrary commands via the `cfg_id` parameter in `/ajax/openvpn/activate_ovpncfg.php` and `/ajax/openvpn/del_ovpncfg.php`.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'billz/raspap-webgui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'last_affected': '2.8.7'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39986'}, {'type': 'PACKAGE', 'url': 'https://github.com/RaspAP/raspap-webgui'}, {'type': 'WEB', 'url': 'https://github.com/RaspAP/raspap-webgui/blob/master/ajax/openvpn/activate_ovpncfg.php'}, {'type': 'WEB', 'url': 'https://medium.com/@ismael0x00/multiple-vulnerabilities-in-raspap-3c35e78809f2'}]
|
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T19:57:57Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-gwqq-6vq7-5j86
|
2023-08-09T20:37:47Z
|
2023-08-05T03:30:19Z
| null |
['CVE-2023-36095']
|
langchain Code Injection vulnerability
|
An issue in Harrison Chase langchain allows an attacker to execute arbitrary code via the PALChain,from_math_prompt(llm).run in the python exec method.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'langchain'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.236'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36095'}, {'type': 'WEB', 'url': 'https://github.com/langchain-ai/langchain/issues/5872'}, {'type': 'WEB', 'url': 'https://github.com/langchain-ai/langchain/pull/6003'}, {'type': 'WEB', 'url': 'https://github.com/langchain-ai/langchain/pull/7870'}, {'type': 'WEB', 'url': 'https://github.com/langchain-ai/langchain/commit/8ba9835b925473655914f63822775679e03ea137'}, {'type': 'WEB', 'url': 'https://github.com/langchain-ai/langchain/commit/e294ba475a355feb95003ed8f1a2b99942509a9e'}, {'type': 'WEB', 'url': 'https://github.com/hwchase17/langchain'}, {'type': 'PACKAGE', 'url': 'https://github.com/langchain-ai/langchain'}, {'type': 'WEB', 'url': 'https://github.com/langchain-ai/langchain/commits/v0.0.236?after=4d8b48bdb3f17c764c5c2e3c7140071603869e74+34&branch=v0.0.236&qualified_name=refs%2Ftags%2Fv0.0.236'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2023-138.yaml'}, {'type': 'WEB', 'url': 'http://langchain.com'}]
|
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T14:11:52Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-256m-j5qw-38f4
|
2023-08-25T18:41:16Z
|
2023-08-25T18:41:16Z
| null |
['CVE-2023-32078']
|
Netmaker IDOR Allows User to Update Other User's Password
|
### Impact
An IDOR vulnerability was found in the user update function. By specifying another user's username it is possible to update the other user's password.
### Patches
Issue is patched in 0.17.1, and fixed in 0.18.6+.
If Users are using 0.17.1, they should run "docker pull gravitl/netmaker:v0.17.1" and "docker-compose up -d". This will switch them to the patched users
If users are using v0.18.0-0.18.5, they should upgrade to v0.18.6 or later.
### Workarounds
If using 0.17.1, can just pull the latest docker image of backend and restart server.
### References
Credit to Project Discovery, and in particular https://github.com/rootxharsh , https://github.com/iamnoooob, and https://github.com/projectdiscovery
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/gravitl/netmaker'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.17.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/gravitl/netmaker'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.18.0'}, {'fixed': '0.18.6'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/gravitl/netmaker/security/advisories/GHSA-256m-j5qw-38f4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32078'}, {'type': 'WEB', 'url': 'https://github.com/gravitl/netmaker/pull/2158'}, {'type': 'WEB', 'url': 'https://github.com/gravitl/netmaker/commit/b3be57c65bf0bbfab43b66853c8e3637a43e2839'}, {'type': 'PACKAGE', 'url': 'https://github.com/gravitl/netmaker'}]
|
{'cwe_ids': ['CWE-639'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-25T18:41:16Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-rwpg-4c4c-v3r4
|
2023-08-21T20:47:10Z
|
2023-08-21T12:30:19Z
|
2023-08-21T20:47:10Z
|
[]
|
Duplicate Advisory: Wallabag user can reset data unintentionally
|
## Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-p8gp-899c-jvq9. This link is maintained to preserve external references.
## Original Description
Cross-Site Request Forgery (CSRF) in GitHub repository wallabag/wallabag prior to 2.6.3.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'wallabag/wallabag'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-alpha.1'}, {'fixed': '2.6.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.6.2'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4454'}, {'type': 'WEB', 'url': 'https://github.com/wallabag/wallabag/commit/78b0b55c40511e1f22d5bbb4897aa10fca68441c'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/4ee0ef74-e4d4-46e7-a05c-076bce522299'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-21T20:47:10Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-j63x-f657-2m9g
|
2023-08-03T16:42:33Z
|
2023-08-03T06:30:22Z
| null |
['CVE-2023-4125']
|
Answer has Weak Password Requirements
|
Weak Password Requirements in GitHub repository answerdev/answer prior to v1.1.0.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4125'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/7d23b17cdbbefcd2e7b5c3150f0b5ec908dc835f'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/85bfd18f-8d3b-4154-8b7b-1f8fcf704e28'}]
|
{'cwe_ids': ['CWE-521'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T16:42:33Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-36hq-v2fc-rpqp
|
2023-08-16T21:13:57Z
|
2023-08-16T15:30:17Z
| null |
['CVE-2023-40338']
|
Jenkins Folders Plugin information disclosure vulnerability
|
Jenkins Folders Plugin displays an error message when attempting to access the Scan Organization Folder Log if no logs are available.
In Folders Plugin 6.846.v23698686f0f6 and earlier, this error message includes the absolute path of a log file, exposing information about the Jenkins controller file system.
Folders Plugin 6.848.ve3b_fd7839a_81 does not display the absolute path of a log file in the error message.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:cloudbees-folder'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.848.ve3b'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40338'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3109'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/16/3'}]
|
{'cwe_ids': ['CWE-209', 'CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:13:57Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-6xcx-gx7r-rccj
|
2023-08-21T19:33:39Z
|
2023-08-15T20:04:49Z
| null |
['CVE-2023-40024']
|
Scancode.io Reflected Cross-Site Scripting (XSS) in license endpoint
|
### Summary
In the `/license/` endpoint, the detailed view key is not properly validated and sanitized, which can result in a potential cross-site scripting (XSS) vulnerability when attempting to access a detailed license view that does not exist.
### Details
In the `/license/` endpoint, the `license_details_view` function is vulnerable to a potential cross-site scripting (XSS) attack due to inadequate validation and sanitization of the `key` parameter. This vulnerability arises when attempting to access a key with malicious javascript.
```python
def license_details_view(request, key):
"""
Display all available information about a given license `key` followed by
the full license text.
"""
licenses = get_licenses()
try:
data = saneyaml.dump(licenses[key].to_dict())
text = licenses[key].text
except KeyError:
return HttpResponseNotFound(f"License {key} not found.") # Leads to cross-site scripting when key is malicious javascript
return HttpResponse(f"<pre>{data}</pre><hr><pre>{text}</pre>")
```
### PoC
1. Access following endpoint on scancode.io instance: http://localhost/license/%3Cscript%3Ealert(document.cookie);%3C/script%3E/
### Impact
Attackers can exploit the vulnerability to inject malicious scripts into the response generated by the `license_details_view` function. When unsuspecting users visit the page, their browsers will execute the injected scripts, leading to unauthorized actions, session hijacking, or stealing sensitive information.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'scancodeio'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '32.5.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 32.5.1'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/nexB/scancode.io/security/advisories/GHSA-6xcx-gx7r-rccj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40024'}, {'type': 'PACKAGE', 'url': 'https://github.com/nexB/scancode.io'}, {'type': 'WEB', 'url': 'https://github.com/nexB/scancode.io/blob/dd7769fbc97c84545579cebf1dc4838214098a11/CHANGELOG.rst#v3252-2023-08-14'}, {'type': 'WEB', 'url': 'https://github.com/nexB/scancode.io/releases/tag/v32.5.2'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-15T20:04:49Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-8fjr-hghr-4m99
|
2023-09-06T19:17:29Z
|
2023-08-30T20:09:33Z
| null |
['CVE-2023-36811']
|
Archive spoofing vulnerability in borgbackup
|
### Impact
A flaw in the cryptographic authentication scheme in borgbackup allowed an attacker to fake archives and potentially indirectly cause backup data loss in the repository.
The attack requires an attacker to be able to
1. insert files (with no additional headers) into backups
2. gain write access to the repository
This vulnerability does not disclose plaintext to the attacker, nor does it affect the authenticity of existing archives.
Creating plausible fake archives may be feasible for empty or small archives, but is unlikely for large archives.
Affected are all borgbackup releases prior to 1.2.5.
Note: CVSS scoring model seemed to badly fit for this case, thus I manually set score to "moderate".
### Patches
The issue has been fixed in borgbackup 1.2.5.
But there was a bug in 1.2.5 upgrade instructions, thus 1.2.6 with an important fix in docs and code was released a day afterwards.
Additionally to installing the fixed code, users must follow the upgrade procedure as documented in the latest version of the change log.
### Workarounds
Data loss after being attacked can be avoided by reviewing the archives (timestamp and contents valid and as expected) after any "borg check --repair" and before "borg prune".
### References
https://github.com/borgbackup/borg/blob/1.2.6/docs/changes.rst#pre-125-archives-spoofing-vulnerability-cve-2023-36811
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'borgbackup'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.5'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/borgbackup/borg/security/advisories/GHSA-8fjr-hghr-4m99'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36811'}, {'type': 'WEB', 'url': 'https://github.com/borgbackup/borg/commit/3eb070191da10c2d3f7bc6484cf3d51c3045f884'}, {'type': 'PACKAGE', 'url': 'https://github.com/borgbackup/borg'}, {'type': 'WEB', 'url': 'https://github.com/borgbackup/borg/blob/1.2.5-cvedocs/docs/changes.rst#pre-125-archives-spoofing-vulnerability-cve-2023-36811'}, {'type': 'WEB', 'url': 'https://github.com/borgbackup/borg/blob/1.2.6/docs/changes.rst#pre-125-archives-spoofing-vulnerability-cve-2023-36811'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/borgbackup/PYSEC-2023-164.yaml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5Q3OHXERTU547SEQ3YREZXHOCYNLVD63/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOZDFIYEBIOKSIEAXUJJJFUJTAJ7TF3C/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZUCQSMAWOJBCRGF6XPKEZ2TPGAPNKIWV/'}]
|
{'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-30T20:09:33Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-ggcf-hwxp-rc77
|
2023-08-03T16:42:38Z
|
2023-08-03T06:30:22Z
| null |
['CVE-2023-4126']
|
Answer Insufficient Session Expiration vulnerability
|
Insufficient Session Expiration in GitHub repository answerdev/answer prior to v1.1.0.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4126'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/4f468b58d0dea51290bfbdd3e96332b0014c8730'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/7f50bf1c-bcb9-46ca-8cec-211493d280c5'}]
|
{'cwe_ids': ['CWE-613'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T16:42:38Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-8fp9-43pw-56vw
|
2023-08-22T18:38:18Z
|
2023-08-15T18:31:32Z
| null |
['CVE-2023-39661']
|
PandasAI vulnerable to arbitrary code execution
|
An issue in pandas-ai v.0.8.1 and before allows a remote attacker to execute arbitrary code via the `_is_jailbreak` function.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'pandasai'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.8.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39661'}, {'type': 'WEB', 'url': 'https://github.com/gventuri/pandas-ai/issues/410'}, {'type': 'PACKAGE', 'url': 'https://github.com/gventuri/pandas-ai'}]
|
{'cwe_ids': ['CWE-74', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-15T21:10:21Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-q7mc-fc87-v7w7
|
2023-08-08T22:37:00Z
|
2023-08-04T18:30:39Z
| null |
['CVE-2022-41401']
|
OpenRefine Server-Side Request Forgery vulnerability
|
OpenRefine <= v3.5.2 contains a Server-Side Request Forgery (SSRF) vulnerability, which permits unauthorized users to exploit the system, potentially leading to unauthorized access to internal resources and sensitive file disclosure.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.openrefine:main'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41401'}, {'type': 'WEB', 'url': 'https://github.com/OpenRefine/OpenRefine/commit/8cb2fec45dd90fda8ed9608c691f6bb8ed721cd2'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenRefine/OpenRefine'}, {'type': 'WEB', 'url': 'https://github.com/OpenRefine/OpenRefine/blob/30d6edb7b6586623bda09456c797c35983fb80ff/main/tests/server/src/com/google/refine/importing/ImportingUtilitiesTests.java#L180'}, {'type': 'WEB', 'url': 'https://github.com/OpenRefine/OpenRefine/blob/cb55cdfdf6f9ca916839778dc847cce803688998/main/src/com/google/refine/importing/ImportingUtilities.java#L103'}, {'type': 'WEB', 'url': 'https://github.com/ixSly/CVE-2022-41401'}]
|
{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-04T21:25:42Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-wwrg-2w5j-grvx
|
2023-08-03T22:20:11Z
|
2023-08-03T18:30:35Z
| null |
['CVE-2023-4138']
|
RDiffWeb vulnerable to Allocation of Resources Without Limits or Throttling
|
Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffweb prior to 2.8.0.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ecosystem_specific': {'affected_functions': ['rdiffweb.controller.page_pref_notification.PagePrefNotification']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4138'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/feef0d7b11d86aed29bf98c21526088117964d85'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1b1fa915-d588-4bb1-9e82-6a6be79befed'}]
|
{'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T22:20:11Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-w832-v3c6-m6rg
|
2023-08-21T20:46:52Z
|
2023-08-21T18:31:23Z
| null |
['CVE-2023-39660']
|
pandasai vulnerable to prompt injection
|
An issue in Gaberiele Venturi pandasai v.0.8.0 and before allows a remote attacker to execute arbitrary code via a crafted request to the prompt function.
|
[]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'pandasai'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39660'}, {'type': 'WEB', 'url': 'https://github.com/gventuri/pandas-ai/issues/399'}, {'type': 'WEB', 'url': 'https://github.com/gventuri/pandas-ai/pull/409'}, {'type': 'WEB', 'url': 'https://github.com/gventuri/pandas-ai/commit/3aac79be8fc1d18b53d66a566adddbbdd2b38ad5'}, {'type': 'PACKAGE', 'url': 'https://github.com/gventuri/pandas-ai'}]
|
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-21T20:46:52Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-93wx-j2qv-49fg
|
2023-08-31T14:28:31Z
|
2023-08-23T06:30:17Z
| null |
['CVE-2023-41100']
|
hCaptcha for EXT:form Broken Access Control vulnerability
|
An issue was discovered in the hcaptcha (aka hCaptcha for EXT:form) extension before 2.1.2 for TYPO3. It fails to check that the required captcha field is submitted in the form data. allowing a remote user to bypass the CAPTCHA check.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'waldhacker/hcaptcha'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-41100'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/waldhacker/hcaptcha/CVE-2023-41100.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/waldhacker/ext-hcaptcha'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2023-007'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-23T18:41:21Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-8xhr-x3v8-rghj
|
2023-08-23T20:41:30Z
|
2023-08-23T20:41:30Z
| null |
['CVE-2023-40573']
|
XWiki Platform's Groovy jobs check the wrong author, allowing remote code execution
|
### Impact
XWiki supports scheduled jobs that contain Groovy scripts. Currently, the job checks the content author of the job for programming right. However, modifying or adding a job script to a document doesn't modify the content author. Together with a CSRF vulnerability in the job scheduler, this can be exploited for remote code execution by an attacker with edit right on the wiki.
For successful exploitation, the needs to have edit right on a document whose content has last been changed by a user with programming right. This could be the user profile for users created by admins. In this document, the attacker can create an object of class `XWiki.SchedulerJobClass` using the object editor. By setting job class to `com.xpn.xwiki.plugin.scheduler.GroovyJob`, cron expression to `0 0/5 * * * ?` and job script to `services.logging.getLogger("foo").error("Job content executed")`, the attacker can create a job. Now this job just needs to be triggered or scheduled. This can be achieved by embedding an image with the following XWiki syntax in any document that is visited by an admin: `[[image:path:/xwiki/bin/view/Scheduler/?do=trigger&which=Attacker.Document]]` where `Attacker.Document` is the document that has been prepared by the attacker. If the attack is successful, an error log entry with "Job content executed" will be produced.
### Patches
This vulnerability has been patched in XWiki 14.10.9 and 15.4RC1.
### Workarounds
There is no workaround.
### References
* https://jira.xwiki.org/browse/XWIKI-20852
* https://github.com/xwiki/xwiki-platform/commit/fcdcfed3fe2e8a3cad66ae0610795a2d58ab9662
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-scheduler-api'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '14.10.9'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.xpn.xwiki.platform.plugins:xwiki-plugin-scheduler'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-scheduler-api'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0-rc-1'}, {'fixed': '15.4-rc-1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-8xhr-x3v8-rghj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40573'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/fcdcfed3fe2e8a3cad66ae0610795a2d58ab9662'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20852'}]
|
{'cwe_ids': ['CWE-284'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-23T20:41:30Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-mhp6-jvpx-2p4m
|
2023-09-01T01:19:08Z
|
2023-08-29T18:31:53Z
| null |
['CVE-2023-40889']
|
Heap-based buffer overflow in ZBar
|
A heap-based buffer overflow exists in the qr_reader_match_centers function of ZBar 0.23.90. Specially crafted QR codes may lead to information disclosure and/or arbitrary code execution. To trigger this vulnerability, an attacker can digitally input the malicious QR code, or prepare it to be physically scanned by the vulnerable scanner.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'zbar'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.23.90'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40889'}, {'type': 'PACKAGE', 'url': 'https://github.com/mchehab/zbar'}, {'type': 'WEB', 'url': 'https://hackmd.io/@cspl/B1ZkFZv23'}]
|
{'cwe_ids': ['CWE-122', 'CWE-787'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-30T20:22:19Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-4f8m-7h83-9f6m
|
2023-09-01T19:44:42Z
|
2023-08-23T20:37:04Z
| null |
['CVE-2023-40572']
|
XWiki Platform vulnerable to CSRF privilege escalation/RCE via the create action
|
### Impact
The create action is vulnerable to a CSRF attack, allowing script and thus remote code execution when targeting a user with script/programming right, thus compromising the confidentiality, integrity and availability of the whole XWiki installation. To reproduce, the XWiki syntax `[[image:path:/xwiki/bin/create/Foo/WebHome?template=&parent=Main.WebHome&title=$services.logging.getLogger(%22foo%22).error(%22Script%20executed!%22)]]` can be added to any place that supports XWiki syntax like a comment. When a user with script right views this image and a log message `ERROR foo - Script executed!` appears in the log, the XWiki installation is vulnerable.
### Patches
This has been patched in XWiki 14.10.9 and 15.4RC1 by requiring a CSRF token for the actual page creation.
### Workarounds
There are no known workarounds.
### References
* https://jira.xwiki.org/browse/XWIKI-20849
* https://github.com/xwiki/xwiki-platform/commit/4b20528808d0c311290b0d9ab2cfc44063380ef7
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2-milestone-3'}, {'fixed': '14.10.9'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0-rc-1'}, {'fixed': '15.4-rc-1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-4f8m-7h83-9f6m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40572'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/123e5d7e4ca06bf75b95aaef665aafc4fa9cae64'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/4b20528808d0c311290b0d9ab2cfc44063380ef7'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20849'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-23T20:37:04Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-9v3w-w2jh-4hff
|
2023-08-01T16:58:49Z
|
2023-08-01T00:30:17Z
| null |
['CVE-2023-3462']
|
HashiCorp Vault and Vault Enterprise vulnerable to user enumeration
|
HashiCorp's Vault and Vault Enterprise are vulnerable to user enumeration when using the LDAP auth method. An attacker may submit requests of existent and non-existent LDAP users and observe the response from Vault to check if the account is valid on the LDAP server. This vulnerability is fixed in Vault 1.14.1 and 1.13.5.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.5'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.14.0'}, {'fixed': '1.14.1'}]}], 'versions': ['1.14.0']}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3462'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2023-24-vaults-ldap-auth-method-allows-for-user-enumeration/56714'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/vault'}]
|
{'cwe_ids': ['CWE-203'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T16:58:49Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-2ggp-cmvm-f62f
|
2023-08-09T14:41:23Z
|
2023-08-09T14:41:23Z
| null |
['CVE-2023-39523']
|
ScanCode.io command injection in docker image fetch process
|
## Command Injection in docker fetch process
### Summary
A possible command injection in the docker fetch process as it allows to append malicious commands in the docker_reference parameter.
### Details
In the function `scanpipe/pipes/fetch.py:fetch_docker_image`[1] the parameter `docker_reference` is user controllable. The `docker_reference` variable is then passed to the vulnerable function `get_docker_image_platform`.
```python
def fetch_docker_image(docker_reference, to=None):
"""
code snipped ....
"""
platform_args = []
platform = get_docker_image_platform(docker_reference) # User controlled `docker_reference` passed
"""
code snipped...
"""
```
However, the `get_docker_image_plaform` function constructs a shell command with the passed `docker_reference`. The `pipes.run_command` then executes the shell command without any prior sanitization, making the function vulnerable to command injections.
```python
def get_docker_image_platform(docker_reference):
"""
Return a platform mapping of a docker reference.
If there are more than one, return the first one by default.
"""
skopeo_executable = _get_skopeo_location()
"""
Constructing a shell command with user controlled variable `docker_reference`
"""
cmd = (
f"{skopeo_executable} inspect --insecure-policy --raw --no-creds "
f"{docker_reference}"
)
logger.info(f"Fetching image os/arch data: {cmd}")
exitcode, output = pipes.run_command(cmd) # Executing command
logger.info(output)
if exitcode != 0:
raise FetchDockerImageError(output)
```
A malicious user who is able to create or add inputs to a project can inject commands. Although the command injections are blind and the user will not receive direct feedback without logs, it is still possible to cause damage to the server/container. The vulnerability appears for example if a malicious user adds a semicolon after the input of `docker://;`, it would allow appending malicious commands.
### PoC
1. Create a new project with following input `docker://;echo${IFS}"PoC"${IFS}&&cat${IFS}/etc/passwd` in the filed Download URLs

2. Check docker logs to see the command execution

```bash
curl -i -s -k -X $'POST' \
-H $'Host: localhost' -H $'User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/110.0' -H $'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8' -H $'Accept-Language: en-US,en;q=0.5' -H $'Accept-Encoding: gzip, deflate' -H $'Content-Type: multipart/form-data; boundary=---------------------------2742275543734015476190112060' -H $'Content-Length: 923' -H $'Origin: http://localhost' -H $'DNT: 1' -H $'Connection: close' -H $'Referer: http://localhost/project/add/' -H $'Upgrade-Insecure-Requests: 1' -H $'Sec-Fetch-Dest: document' -H $'Sec-Fetch-Mode: navigate' -H $'Sec-Fetch-Site: same-origin' -H $'Sec-Fetch-User: ?1' \
-b $'csrftoken=7H2chgA7jPHnXK0NNPftIoCW9z8SabKR' \
--data-binary $'-----------------------------2742275543734015476190112060\x0d\x0aContent-Disposition: form-data; name=\"csrfmiddlewaretoken\"\x0d\x0a\x0d\x0ayslGuNnvWloFUEUCWI5VlMuZ60ZDDSkFvZdIBTNs50VSHeKfznaeT0WL5pXlDTUm\x0d\x0a-----------------------------2742275543734015476190112060\x0d\x0aContent-Disposition: form-data; name=\"name\"\x0d\x0a\x0d\x0apoc\x0d\x0a-----------------------------2742275543734015476190112060\x0d\x0aContent-Disposition: form-data; name=\"input_files\"; filename=\"\"\x0d\x0aContent-Type: application/octet-stream\x0d\x0a\x0d\x0a\x0d\x0a-----------------------------2742275543734015476190112060\x0d\x0aContent-Disposition: form-data; name=\"input_urls\"\x0d\x0a\x0d\x0adocker://;echo${IFS}\"PoC\"${IFS}&&cat${IFS}/etc/passwd\x0d\x0a-----------------------------2742275543734015476190112060\x0d\x0aContent-Disposition: form-data; name=\"pipeline\"\x0d\x0a\x0d\x0a\x0d\x0a-----------------------------2742275543734015476190112060\x0d\x0aContent-Disposition: form-data; name=\"execute_now\"\x0d\x0a\x0d\x0aon\x0d\x0a-----------------------------2742275543734015476190112060--\x0d\x0a' \
$'http://localhost/project/add/'
```
**Mitigations**
The `docker_reference` input should be sanitized to avoid command injections and it is not recommend to create commands with user controlled input directly.
**Tested on:**
- Commit: Latest commit [bda3a70e0b8cd95433928db1fd4b23051bc7b7eb]
- OS: Ubuntu Linux Kernel 5.19.0
**References**
[1] https://github.com/nexB/scancode.io/blob/main/scanpipe/pipes/fetch.py#L185
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'scancodeio'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '32.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 32.5.0'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/nexB/scancode.io/security/advisories/GHSA-2ggp-cmvm-f62f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39523'}, {'type': 'WEB', 'url': 'https://github.com/nexB/scancode.io/commit/07ec0de1964b14bf085a1c9a27ece2b61ab6105c'}, {'type': 'PACKAGE', 'url': 'https://github.com/nexB/scancode.io'}, {'type': 'WEB', 'url': 'https://github.com/nexB/scancode.io/blob/main/scanpipe/pipes/fetch.py#L185'}, {'type': 'WEB', 'url': 'https://github.com/nexB/scancode.io/releases/tag/v32.5.1'}]
|
{'cwe_ids': ['CWE-77'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T14:41:23Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-wrrj-h57r-vx9p
|
2023-08-24T22:56:04Z
|
2023-08-24T22:15:51Z
| null |
['CVE-2023-40030']
|
Malicious dependencies can inject arbitrary JavaScript into cargo-generated timing reports
|
The Rust Security Response WG was notified that Cargo did not escape Cargo feature names when including them in the report generated by `cargo build --timings`. A malicious package included as a dependency may inject nearly arbitrary HTML here, potentially leading to XSS if the report is subsequently uploaded somewhere.
The severity of this vulnerability is "low" for users relying on dependencies from git, local paths, or alternative registries. Users who solely depend on crates.io are unaffected.
Note that **by design** Cargo allows code execution at build time, due to build scripts and procedural macros. The vulnerability in this advisory allows performing a subset of the possible damage in a harder to track down way. Your dependencies must still be trusted if you want to be protected from attacks, as it's possible to perform the same attacks with build scripts and procedural macros.
# Overview
Rust 1.60.0 [introduced](https://blog.rust-lang.org/2022/04/07/Rust-1.60.0.html#cargo---timings) `cargo build --timings`, which produces a report of how long the different steps of the build process took. It includes lists of Cargo features for each crate.
Prior to Rust 1.72, Cargo feature names were allowed to contain almost any characters (with some exceptions as used by the feature syntax), but it would produce a future incompatibility warning about them [since Rust 1.49](https://github.com/rust-lang/cargo/pull/8814). crates.io is far more stringent about what it considers a valid feature name and has not allowed such feature names.
As the feature names were included unescaped in the timings report, they could be used to inject Javascript into the page, for example with a feature name like `features = ["<img src='' onerror=alert(0)"]`. If this report were subsequently uploaded to a domain that uses credentials, the injected Javascript could access resources from the website visitor.
This issue was fixed by [turning the future incompatibility warning into an error](https://github.com/rust-lang/cargo/pull/12291).
# Affected versions
The vulnerability is present in all versions of Cargo after and including 1.60.0. Rust 1.72, to be released on August 24, will include a fix for it.
Users whose dependencies are entirely on crates.io are unaffected.
# Mitigations
We recommend users always excercise care in which package they download, by only including trusted dependencies in their projects. Please note that even with these vulnerabilities fixed, by design Cargo allows arbitrary code execution at build time thanks to build scripts and procedural macros: a malicious dependency will be able to cause damage regardless of these vulnerabilities.
crates.io has server-side checks preventing this attack, and there are no packages on crates.io exploiting these vulnerabilities. crates.io users still need to excercise care in choosing their dependencies though, as remote code execution is allowed by design there as well.
|
[]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'cargo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.60.0'}, {'fixed': '1.72'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/rust-lang/cargo/security/advisories/GHSA-wrrj-h57r-vx9p'}, {'type': 'WEB', 'url': 'https://github.com/rust-lang/cargo/commit/9835622853f08be9a4b58ebe29dcec8f43b64b33'}, {'type': 'WEB', 'url': 'https://github.com/rust-lang/cargo/commit/f975722a0eac934c0722f111f107c4ea2f5c4365'}, {'type': 'PACKAGE', 'url': 'https://github.com/rust-lang/cargo'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-24T22:15:51Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-7422-7rq6-j4qv
|
2023-09-01T17:45:02Z
|
2023-08-31T00:30:17Z
| null |
['CVE-2023-38970']
|
Badaso vulnerable to cross-site scripting
|
Cross Site Scripting vulnerabiltiy in Badaso v.0.0.1 thru v.2.9.7 allows a remote attacker to execute arbitrary code via a crafted payload to the Name of member parameter in the add new member function.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'uasoft-indonesia/badaso'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.9.7'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38970'}, {'type': 'WEB', 'url': 'https://github.com/anh91/uasoft-indonesia--badaso/blob/main/XSS3.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/uasoft-indonesia/badaso'}, {'type': 'WEB', 'url': 'https://panda002.hashnode.dev/badaso-version-297-has-an-xss-vulnerability-in-new-member'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-31T18:33:58Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-4987-5p3p-9r27
|
2023-08-18T15:47:53Z
|
2023-08-11T15:30:46Z
| null |
['CVE-2020-35139']
|
FaucetSDN Ryu Denial of Service Vulnerability
|
An issue was discovered in `OFPBundleCtrlMsg` in `parser.py` in FaucetSDN Ryu version 4.34, allows remote attackers to cause a denial of service (DoS) (infinite loop).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'ryu'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.34'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35139'}, {'type': 'WEB', 'url': 'https://github.com/faucetsdn/ryu/issues/118'}, {'type': 'PACKAGE', 'url': 'https://github.com/faucetsdn/ryu'}]
|
{'cwe_ids': ['CWE-770', 'CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T22:03:55Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-pm87-24wq-r8w9
|
2023-09-06T19:18:54Z
|
2023-08-23T18:30:34Z
| null |
['CVE-2023-40273']
|
Apache Airflow Session Fixation vulnerability
|
The session fixation vulnerability allowed the authenticated user to continue accessing Airflow webserver even after the password of the user has been reset by the admin - up until the expiry of the session of the user. Other than manually cleaning the session database (for database session backend), or changing the secure_key and restarting the webserver, there were no mechanisms to force-logout the user (and all other users with that).
With this fix implemented, when using the database session backend, the existing sessions of the user are invalidated when the password of the user is reset. When using the securecookie session backend, the sessions are NOT invalidated and still require changing the secure key and restarting the webserver (and logging out all other users), but the user resetting the password is informed about it with a flash message warning displayed in the UI. Documentation is also updated explaining this behaviour.
Users of Apache Airflow are advised to upgrade to version 2.7.0 or newer to mitigate the risk associated with this vulnerability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40273'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/33347'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/commit/2caa186935151683076b74357daad83d2538a3f6'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/apache-airflow/PYSEC-2023-158.yaml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/9rdmv8ln4y4ncbyrlmjrsj903x4l80nj'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2023/08/23/1'}]
|
{'cwe_ids': ['CWE-384'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-23T20:45:27Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-23qf-3jf9-h3q9
|
2023-08-23T20:07:20Z
|
2023-08-19T00:30:29Z
| null |
['CVE-2023-40037']
|
Apache NiFi Insufficient Property Validation vulnerability
|
Apache NiFi 1.21.0 through 1.23.0 support JDBC and JNDI JMS access in several Processors and Controller Services with connection URL validation that does not provide sufficient protection against crafted inputs. An authenticated and authorized user can bypass connection URL validation using custom input formatting. The resolution enhances connection URL validation and introduces validation for additional related properties. Upgrading to Apache NiFi 1.23.1 is the recommended mitigation.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi-dbcp-base'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.21.0'}, {'fixed': '1.23.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi-jms-processors'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.21.0'}, {'fixed': '1.23.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi-dbcp-service-api'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.21.0'}, {'fixed': '1.23.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi-dbcp-service-bundle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.21.0'}, {'fixed': '1.23.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40037'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi/pull/7586'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi/commit/064550aacc189f39d7ddd2c0446068adf250f1bf'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/nifi'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/NIFI-11920'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/bqbjlrs2p5ghh8sbk5nsxb8xpf9l687q'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security.html#CVE-2023-40037'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/18/2'}]
|
{'cwe_ids': ['CWE-184', 'CWE-697'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-21T20:16:05Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-prgp-w7vf-ch62
|
2023-08-22T18:38:10Z
|
2023-08-15T18:31:32Z
| null |
['CVE-2023-39659']
|
LangChain vulnerable to arbitrary code execution
|
An issue in langchain langchain-ai v.0.0.232 and before allows a remote attacker to execute arbitrary code via a crafted script to the PythonAstREPLTool._run component.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'langchain'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.232'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39659'}, {'type': 'WEB', 'url': 'https://github.com/langchain-ai/langchain/issues/7700'}, {'type': 'WEB', 'url': 'https://github.com/langchain-ai/langchain/pull/5640'}, {'type': 'PACKAGE', 'url': 'https://github.com/langchain-ai/langchain'}]
|
{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-15T20:01:29Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-4xmf-344q-m4cc
|
2023-08-22T17:53:47Z
|
2023-08-22T00:31:10Z
| null |
['CVE-2023-4302']
|
Jenkins Fortify Plugin missing permission check
|
Jenkins Fortify Plugin 22.1.38 and earlier does not perform permission checks in several HTTP endpoints.
This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Additionally, these HTTP endpoints do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
Fortify Plugin 22.2.39 requires POST requests and the appropriate permissions for the affected HTTP endpoints.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:fortify'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.2.39'}]}], 'database_specific': {'last_known_affected_version_range': '<= 22.1.38'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4302'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/fortify-plugin/commit/357d7bfbcb0ff796ea7d078bee13159f1d000f5d'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/fortify-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3115'}]
|
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-22T17:53:47Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-7h45-grc5-89wq
|
2023-08-14T21:14:08Z
|
2023-08-14T21:14:08Z
| null |
['CVE-2023-38687']
|
Svelecte item names vulnerable to execution of arbitrary JavaScript
|
### Summary
Svelecte item names are rendered as raw HTML with no escaping. This allows the injection of arbitrary HTML into the Svelecte dropdown. This can be exploited to execute arbitrary JavaScript whenever a Svelecte dropdown is opened.
### Details
Item names given to Svelecte appear to be directly rendered as HTML by the default item renderer. This means that any HTML tags in the name are rendered as HTML elements not as text.
Note that the custom item renderer shown in https://mskocik.github.io/svelecte/#item-rendering is also vulnerable to the same exploit.
To prevent this all special HTML characters in item names should be escaped (for example using `document.createTextNode()`).
### PoC
```svelte
<script>
import Svelecte from 'svelecte';
const list = [
{ id: 1, name: `Item 1` },
{ id: 2, name: `Item 2<img style="display:none;" src=1 onerror="alert('JavaScript executed!');"/>` },
{ id: 3, name: 'Item 3'}
];
</script>
<Svelecte options={list}></Svelecte>
```
This code snippet demonstrates how the vulnerability can be used to execute arbitrary JavaScript without the user's knowledge when the Svelecte dropdown is opened (note that visually item 2 appears identical to other items).
In this case the script is hardcoded, but in practice the real danger is that some applications may use Svelecte with items that are created by users or come from low-trust sources where someone else could add a malicious script to the item name.
### Impact
Any site that uses Svelecte with dynamically created items either from an external source or from user-created content could be vulnerable to an XSS attack (execution of untrusted JavaScript), clickjacking or any other attack that can be performed with arbitrary HTML injection.
The actual impact of this vulnerability for a specific application depends on how trustworthy the sources that provide Svelecte items are and the steps that the application has taken to mitigate XSS attacks. XSS attacks using this vulnerability are mostly mitigated by a Content Security Policy that blocks inline JavaScript.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'svelecte'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.16.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/mskocik/svelecte/security/advisories/GHSA-7h45-grc5-89wq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38687'}, {'type': 'PACKAGE', 'url': 'https://github.com/mskocik/svelecte'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-14T21:14:08Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-7r88-wjhj-jr8m
|
2023-08-04T13:31:59Z
|
2023-08-01T15:30:30Z
| null |
['CVE-2022-39987']
|
RaspAP Command Injection vulnerability
|
A Command injection vulnerability in RaspAP 2.8.0 thru 2.9.2 allows an authenticated attacker to execute arbitrary OS commands as root via the `entity` POST parameters in `/ajax/networking/get_wgkey.php`.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'billz/raspap-webgui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'last_affected': '2.9.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39987'}, {'type': 'PACKAGE', 'url': 'https://github.com/RaspAP/raspap-webgui'}, {'type': 'WEB', 'url': 'https://github.com/RaspAP/raspap-webgui/blob/master/ajax/networking/get_wgkey.php'}, {'type': 'WEB', 'url': 'https://medium.com/@ismael0x00/multiple-vulnerabilities-in-raspap-3c35e78809f2'}]
|
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T19:57:55Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-4gcf-5m39-98mc
|
2023-08-18T14:25:07Z
|
2023-08-16T21:02:29Z
| null |
['CVE-2023-40034']
|
Woodpecker does not validate webhook before changing any data
|
### Impact
An attacker can post malformed webhook data which leads to an update of the repository data that can e.g. allow the takeover of a repository.
This is only critical if the CI is configured for public usage and connected to a forge witch is also in public usage.
### Patches
Please use either next or the latest v1.0 e.g. v1.0.2
### Workarounds
Secure the CI system by making it inaccessible to untrusted entities, for example, by placing it behind a firewall.
### References
Fix: https://github.com/woodpecker-ci/woodpecker/pull/2221
Backport: https://github.com/woodpecker-ci/woodpecker/pull/2222
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/woodpecker-ci/woodpecker'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/woodpecker-ci/woodpecker/security/advisories/GHSA-4gcf-5m39-98mc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40034'}, {'type': 'WEB', 'url': 'https://github.com/woodpecker-ci/woodpecker/pull/2221'}, {'type': 'WEB', 'url': 'https://github.com/woodpecker-ci/woodpecker/pull/2222'}, {'type': 'WEB', 'url': 'https://github.com/woodpecker-ci/woodpecker/commit/6e4c2f84cc84661d58cf1c0e5c421a46070bb105'}, {'type': 'PACKAGE', 'url': 'https://github.com/woodpecker-ci/woodpecker'}, {'type': 'WEB', 'url': 'https://github.com/woodpecker-ci/woodpecker/releases/tag/v1.0.2'}]
|
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:02:29Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-6jwc-qr2q-7xwj
|
2023-08-10T22:16:47Z
|
2023-08-03T16:36:34Z
| null |
['CVE-2023-38697']
|
protocol-http1 HTTP Request/Response Smuggling vulnerability
|
### Impact
[RFC 9112 Section 7.1](https://www.rfc-editor.org/rfc/rfc9112#name-chunked-transfer-coding) defined the format of chunk size, chunk data and chunk extension (detailed ABNF is in Appendix section).
In summary:
- The value of Content-Length header should be a string of 0-9 digits.
- The chunk size should be a string of hex digits and should split from chunk data using CRLF.
- The chunk extension shouldn't contain any invisible character.
However, we found that Falcon has following behaviors while disobey the corresponding RFCs.
- Falcon accepts Content-Length header values that have "+" prefix.
- Falcon accepts Content-Length header values that written in hexadecimal with "0x" prefix.
- Falcon accepts "0x" and "+" prefixed chunk size.
- Falcon accepts LF in chunk extension.
This behavior can lead to desync when forwarding through multiple HTTP parsers, potentially results in HTTP request smuggling and firewall bypassing. Note that while these issues were reproduced in Falcon (the server), the issue is with `protocol-http1` which implements the HTTP/1 protocol parser. We have not yet been advised of any real world exploit or practical attack.
### Patches
Fixed in `protocol-http1` v0.15.1+.
### Workarounds
None.
### References
https://github.com/socketry/protocol-http1/pull/20
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'RubyGems', 'name': 'protocol-http1'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/socketry/protocol-http1/security/advisories/GHSA-6jwc-qr2q-7xwj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38697'}, {'type': 'WEB', 'url': 'https://github.com/socketry/protocol-http1/pull/20'}, {'type': 'WEB', 'url': 'https://github.com/socketry/protocol-http1/commit/e11fc164fd2b36f7b7e785e69fa8859eb06bcedd'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/protocol-http1/CVE-2023-38697.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/socketry/protocol-http1'}, {'type': 'WEB', 'url': 'https://www.rfc-editor.org/rfc/rfc9112#name-chunked-transfer-coding'}]
|
{'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T16:36:34Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-chgr-j2p9-jjh8
|
2023-08-23T20:07:26Z
|
2023-08-14T18:32:59Z
| null |
['CVE-2023-40312']
|
OpenNMS vulnerable to Cross-site Scripting
|
Multiple reflected XSS were found on different JSP files with unsanitized parameters in OpenNMS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms that an attacker can modify to craft a malicious XSS payload. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanks Jordi Miralles Comins for reporting this issue.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.opennms:opennms-webapp'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '31.0.8'}, {'fixed': '32.0.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40312'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/pull/6356'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/commit/1365ba9129f1762707fdbf1edd1f3e460bfb31e0'}, {'type': 'WEB', 'url': 'https://docs.opennms.com/horizon/32/releasenotes/changelog.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenNMS/opennms'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-14T21:12:22Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-vmf9-6pcv-xr87
|
2023-08-29T23:34:51Z
|
2023-08-29T23:34:51Z
| null |
['CVE-2023-39522']
|
Username enumeration attack in goauthentik
|
## Summary
Using a recovery flow with an identification stage an attacker is able to determine if a username exists.
## Impact
Only setups configured with a recovery flow are impacted by this. Anyone with a user account on a system with the recovery flow described above is susceptible to having their username/email revealed as existing.
## Details
An attacker can easily enumerate and check users' existence using the recovery flow, as a clear message is shown when a user doesn't exist. Depending on configuration this can either be done by username, email, or both.
The invalid and valid usernames should both show the same message and always send an email. Article for reference here: https://postmarkapp.com/guides/password-reset-email-best-practices#how-to-make-sure-your-password-reset-emails-are-secure
### For more information
If you have any questions or comments about this advisory:
- Email us at [security@goauthentik.io](mailto:security@goauthentik.io)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@goauthentik/api'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2023.6.0'}, {'fixed': '2023.6.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@goauthentik/api'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2023.5.6'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/goauthentik/authentik/security/advisories/GHSA-vmf9-6pcv-xr87'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39522'}, {'type': 'WEB', 'url': 'https://github.com/goauthentik/authentik/commit/aa874dd92a770d5f8cd8f265b7cdd31cd73a4599'}, {'type': 'PACKAGE', 'url': 'https://github.com/goauthentik/authentik'}]
|
{'cwe_ids': ['CWE-203'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T23:34:51Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-rmgx-3w4r-xcfp
|
2023-08-21T20:17:38Z
|
2023-08-19T03:32:19Z
| null |
['CVE-2023-4432']
|
Cockpit Cross-site Scripting vulnerability
|
Cross-site Scripting (XSS) - Reflected in GitHub repository cockpit-hq/cockpit version 2.6.3 and prior. A patch is available at commit 2a93d391fbd2dd9e730f65d43b29beb65903d195 and anticipated to be part of version 2.6.4.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'cockpit-hq/cockpit'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4432'}, {'type': 'WEB', 'url': 'https://github.com/cockpit-hq/cockpit/commit/2a93d391fbd2dd9e730f65d43b29beb65903d195'}, {'type': 'PACKAGE', 'url': 'https://github.com/cockpit-hq/cockpit'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/69684663-6822-41ff-aa05-afbdb8f5268f'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-21T20:17:18Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-2474-2566-3qxp
|
2023-09-01T02:21:07Z
|
2023-08-22T21:30:26Z
| null |
['CVE-2022-44730']
|
Apache Batik information disclosure vulnerability
|
Server-Side Request Forgery (SSRF) vulnerability in Apache Software Foundation Apache XML Graphics Batik.This issue affects Apache XML Graphics Batik: 1.16.
A malicious SVG can probe user profile / data and send it directly as parameter to a URL.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.xmlgraphics:batik-script'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0'}, {'fixed': '1.17'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-44730'}, {'type': 'WEB', 'url': 'https://github.com/apache/xmlgraphics-batik/commit/64658ccda90deaf6bf5f5b4d4a2ec365fe648bfa'}, {'type': 'WEB', 'url': 'https://github.com/apache/xmlgraphics-batik/commit/f9ae69233eadfbd392a4a08a55618f97343b467c'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/xmlgraphics-batik'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/BATIK-1347'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/58m5817jr059f4v1zogh0fngj9pwjyj0'}, {'type': 'WEB', 'url': 'https://xmlgraphics.apache.org/security.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/22/3'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/22/5'}]
|
{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-23T17:51:53Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-92j5-3459-qgp4
|
2023-08-22T16:41:04Z
|
2023-08-15T18:31:32Z
| null |
['CVE-2023-38896']
|
LangChain vulnerable to arbitrary code execution
|
An issue in Harrison Chase langchain before version 0.0.236 and before allows a remote attacker to execute arbitrary code via the `from_math_prompt` and `from_colored_object_prompt` functions.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'langchain'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.236'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38896'}, {'type': 'WEB', 'url': 'https://github.com/hwchase17/langchain/issues/5872'}, {'type': 'WEB', 'url': 'https://github.com/hwchase17/langchain/pull/6003'}, {'type': 'WEB', 'url': 'https://github.com/langchain-ai/langchain/commit/8ba9835b925473655914f63822775679e03ea137'}, {'type': 'WEB', 'url': 'https://github.com/langchain-ai/langchain/commit/e294ba475a355feb95003ed8f1a2b99942509a9e'}, {'type': 'PACKAGE', 'url': 'https://github.com/langchain-ai/langchain'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2023-146.yaml'}, {'type': 'WEB', 'url': 'https://twitter.com/llm_sec/status/1668711587287375876'}]
|
{'cwe_ids': ['CWE-74', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-15T21:18:47Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-2xx4-jj5v-6mff
|
2023-08-04T17:27:00Z
|
2023-08-04T17:27:00Z
| null |
['CVE-2023-37896']
|
Nuclei Path Traversal vulnerability
|
## Overview
We have identified and addressed a security issue in the Nuclei project that affected users utilizing Nuclei as **Go code (SDK)** running **custom templates**. This issue did not affect CLI users. The problem was related to sanitization issues with payloads loading in `sandbox` mode.
## Details
In the previous versions, there was a potential risk with payloads loading in sandbox mode. The issue occurred due to relative paths not being converted to absolute paths before doing the check for `sandbox` flag allowing arbitrary files to be read on the filesystem in certain cases when using Nuclei from `Go` SDK implementation.
This issue has been fixed in the latest release, v2.9.9. We have also enabled sandbox by default for filesystem loading. This can be optionally disabled if required.
The `-sandbox` option has been **deprecated** and is now divided into two new options: `-lfa` (allow local file access) which is enabled by default and `-lna` (restrict local network access) which can be enabled by users optionally. The `-lfa` allows file (payload) access anywhere on the system (disabling sandbox effectively), and `-lna` blocks connections to the local/private network.
## Affected Versions
This issue affected all versions of Nuclei prior to v2.9.9.
## Patches
We recommend all users upgrade to the latest version, [v2.9.9](https://github.com/projectdiscovery/nuclei/releases/tag/v2.9.9), which includes the security fix.
### References
- [patch](https://github.com/projectdiscovery/nuclei/pull/3927)
- [releases](https://github.com/projectdiscovery/nuclei/releases/tag/v2.9.9)
## Acknowledgments
We would like to thank **keomutchoiboi** who reported this issue to us via our security email, [security@projectdiscovery.io](mailto:security@projectdiscovery.io). We appreciate the responsible disclosure of this issue.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/projectdiscovery/nuclei/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.9'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/projectdiscovery/nuclei/security/advisories/GHSA-2xx4-jj5v-6mff'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37896'}, {'type': 'WEB', 'url': 'https://github.com/projectdiscovery/nuclei/pull/3927'}, {'type': 'PACKAGE', 'url': 'https://github.com/projectdiscovery/nuclei'}, {'type': 'WEB', 'url': 'https://github.com/projectdiscovery/nuclei/releases/tag/v2.9.9'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-04T17:27:00Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-hw6r-g8gj-2987
|
2023-08-30T20:47:13Z
|
2023-08-30T20:47:13Z
| null |
[]
|
Actions expression injection in `filter-test-configs` (`GHSL-2023-181`)
|
The `pytorch/pytorch` `filter-test-configs` workflow is vulnerable to an expression injection in Actions, allowing an attacker to potentially leak secrets and alter the repository using the workflow.
### Details
The [`filter-test-configs`](https://github.com/pytorch/pytorch/blob/ec26947c586dd323d741da80008403664c533f65/.github/actions/filter-test-configs/action.yml) workflow is using the raw `github.event.workflow_run.head_branch` value inside the `filter` step:
```yaml
- name: Select all requested test configurations
shell: bash
env:
GITHUB_TOKEN: ${{ inputs.github-token }}
JOB_NAME: ${{ steps.get-job-name.outputs.job-name }}
id: filter
run: |
...
python3 "${GITHUB_ACTION_PATH}/../../scripts/filter_test_configs.py" \
...
--branch "${{ github.event.workflow_run.head_branch }}"
```
In the event of a repository using `filter-test-configs` in a `pull_request_target`-triggered workflow, an attacker could use a malicious branch name to gain command execution in the step and potentially leak secrets.
```yml
name: Example
on: pull_request_target
jobs:
example:
runs-on: ubuntu-latest
steps:
- name: Filter
uses: pytorch/pytorch/.github/actions/filter-test-configs@v2
```
#### Impact
This issue may lead to stealing workflow secrets.
#### Remediation
1. Use an intermediate environment variable for potentially attacker-controlled values such as `github.event.workflow_run.head_branch`:
```yaml
- name: Select all requested test configurations
shell: bash
env:
GITHUB_TOKEN: ${{ inputs.github-token }}
JOB_NAME: ${{ steps.get-job-name.outputs.job-name }}
HEAD_BRANCH: ${{ github.event.workflow_run.head_branch }}
id: filter
run: |
...
python3 "${GITHUB_ACTION_PATH}/../../scripts/filter_test_configs.py" \
...
--branch "$HEAD_BRANCH"
```
#### Resources
* [CodeQL for JavaScript - Expression injection in Actions](https://codeql.github.com/codeql-query-help/javascript/js-actions-command-injection/)
* [Keeping your GitHub Actions and workflows secure Part 2: Untrusted input](https://securitylab.github.com/research/github-actions-untrusted-input/)
* [Keeping your GitHub Actions and workflows secure Part 1: Preventing pwn requests](https://securitylab.github.com/research/github-actions-preventing-pwn-requests/)
|
[]
|
[{'package': {'ecosystem': 'GitHub Actions', 'name': 'https://github.com/pytorch/pytorch/.github/actions/filter-test-configs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.0.1'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/pytorch/pytorch/security/advisories/GHSA-hw6r-g8gj-2987'}, {'type': 'PACKAGE', 'url': 'https://github.com/pytorch/pytorch'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-30T20:47:13Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-8hx6-qv6f-xgcw
|
2023-08-10T21:56:51Z
|
2023-08-01T19:55:14Z
| null |
['CVE-2023-38699']
|
MindsDB can be made to not verify SSL certificates
|
### Summary
MindsDB's AI Virtual Database allows developers to connect any AI/ML model to any datasource. Prior to version 23.7.4.0, a call to requests with `verify=False` disables SSL certificate checks. This rule enforces always verifying SSL certificates for methods in the Requests library. In version 23.7.4.0, certificates are validated by default, which is the desired behavior
Encryption in general is typically critical to the security of many applications. Using TLS can significantly increase security by guaranteeing the identity of the party you are communicating with. This is accomplished by one or both parties presenting trusted certificates during the connection initialization phase of TLS.
It is important to note that modules such as httplib within the Python standard library did not verify certificate chains until it was fixed in 2.7.9 release.
### Details
Severity: Critical
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'MindsDB'}, 'ecosystem_specific': {'affected_functions': ['mindsdb.integrations.handlers.dremio_handler.dremio_handler.DremioHandler.connect']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '23.7.4.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/mindsdb/mindsdb/security/advisories/GHSA-8hx6-qv6f-xgcw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38699'}, {'type': 'WEB', 'url': 'https://github.com/mindsdb/mindsdb/commit/083afcf6567cf51aa7d89ea892fd97689919053b'}, {'type': 'PACKAGE', 'url': 'https://github.com/mindsdb/mindsdb'}, {'type': 'WEB', 'url': 'https://github.com/mindsdb/mindsdb/releases/tag/v23.7.4.0'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/mindsdb/PYSEC-2023-140.yaml'}]
|
{'cwe_ids': ['CWE-311'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T19:55:14Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-rrxv-q8m4-wch3
|
2023-08-10T22:10:22Z
|
2023-08-01T19:48:31Z
| null |
['CVE-2023-38698']
|
.eth registrar controller can shorten the duration of registered names
|
### Description
According to the documentation, controllers are allowed to register new domains and extend the expiry of existing domains, but they cannot change the ownership or reduce the expiration time of existing domains. However, a preliminary analysis suggests that an attacker-controlled controller may be able to reduce the expiration time of existing domains due to an integer overflow in the renew function.
The vulnerability resides in the following GitHub repository: https://github.com/ensdomains/ens-contracts/blob/master/contracts/ethregistrar/BaseRegistrarImplementation.sol#L171
The vulnerable line of code is:
```js
require(
expiries[id] + duration + GRACE_PERIOD > duration + GRACE_PERIOD
); // Prevent future overflow
```
In this code snippet, the `duration` variable is user-supplied, making it possible to provide a value that would cause an overflow on both sides of the '>' expression, ultimately rendering the condition true. Specifically, when the duration is set to `2^256 - GRACE_PERIOD`, the subsequent line `expiries[id] += duration;` also experiences an overflow, as `expiries[id]` is greater than `GRACE_PERIOD`. This results in the reduction of `expiries[id]` by `GRACE_PERIOD`. By repeatedly calling the renew function, an attacker could potentially force the expiration of an ENS record.
You can find the PoC included in the attached document. To execute the test, please use the following command:
```
forge test -vvv --match-contract RegistrarExploit --fork-url <alchemy_url>
```
Replace `<alchemy_url>` with your Alchemy API URL. This command will run the Foundry test file and demonstrate the potential vulnerability.
### Impact
If successfully exploited, this vulnerability would enable attackers to force the expiration of any ENS record, ultimately allowing them to claim the affected domains for themselves.
Currently, it would require a malicious DAO to exploit it. Nevertheless, any vulnerability present in the controllers could potentially render this issue exploitable in the future.
An additional concern is the possibility of renewal discounts. Should ENS decide to implement a system that offers unlimited .eth domains for a fixed fee in the future, the vulnerability could become exploitable by any user due to the reduced attack cost.
### Patches
A mitigation is being developed.
### Workarounds
As long as registration cost remains linear or superlinear based on registration duration, or limited to a reasonable maximum (eg, 1 million years), this vulnerability could only be exploited by a malicious DAO. The interim workaround is thus to take no action.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@ensdomains/ens-contracts'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.22'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.0.21'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/ensdomains/ens-contracts/security/advisories/GHSA-rrxv-q8m4-wch3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38698'}, {'type': 'WEB', 'url': 'https://github.com/ensdomains/ens-contracts/commit/e6b136e979084de3761c125142620304173990ca'}, {'type': 'PACKAGE', 'url': 'https://github.com/ensdomains/ens-contracts'}, {'type': 'WEB', 'url': 'https://github.com/ensdomains/ens-contracts/blob/master/contracts/ethregistrar/BaseRegistrarImplementation.sol#L171'}]
|
{'cwe_ids': ['CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T19:48:31Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-rcx8-48pc-v9q8
|
2023-08-24T22:20:47Z
|
2023-08-24T22:20:47Z
| null |
[]
|
mail-internals use-after-free vulnerability in `vec_insert_bytes`
|
Incorrect reallocation logic in the function [`vec_insert_bytes`](https://docs.rs/mail-internals/0.2.3/mail_internals/utils/fn.vec_insert_bytes.html) causes a use-after-free.
This function does not have to be called directly to trigger the vulnerability because many methods on [`EncodingWriter`](https://docs.rs/mail-internals/0.2.3/mail_internals/encoder/struct.EncodingWriter.html) call this function internally.
The mail-\* suite is unmaintained and the upstream sources have been actively vandalised.
A fixed `mail-internals-ng` (and `mail-headers-ng` and `mail-core-ng`) crate has been published which fixes this, and a dependency on another unsound crate.
|
[]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'mail-internals'}, 'ecosystem_specific': {'affected_functions': ['mail_internals::utils::vec_insert_bytes']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0'}, {'last_affected': '0.2.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/rustsec/advisory-db/blob/main/crates/mail-internals/RUSTSEC-2023-0054.md'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0054.html'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-24T22:20:47Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-8j3v-68w3-3848
|
2023-08-09T20:38:27Z
|
2023-08-07T15:30:27Z
| null |
['CVE-2022-38795']
|
Gitea erroneous repo clones
|
In Gitea through 1.17.1, repo cloning can occur in the migration function.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'code.gitea.io/gitea'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.17.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38795'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/20869'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/20892'}, {'type': 'WEB', 'url': 'https://blog.gitea.com/release-of-1.17.2/'}, {'type': 'PACKAGE', 'url': 'https://github.com/go-gitea/gitea'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T14:40:15Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-g4pq-p927-7pgg
|
2023-08-16T21:08:50Z
|
2023-08-16T15:30:18Z
| null |
['CVE-2023-40341']
|
Jenkins Blue Ocean Plugin cross-site request forgery vulnerability
|
Jenkins Blue Ocean Plugin 1.27.5 and earlier does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability.
This vulnerability allows attackers to connect to an attacker-specified URL, capturing GitHub credentials associated with an attacker-specified job.
This issue is due to an incomplete fix of SECURITY-2502.
Blue Ocean Plugin 1.27.5.1 uses the configured SCM URL, instead of a user-specified URL provided as a parameter to the HTTP endpoint.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.blueocean:blueocean'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.27.5.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40341'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3116'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/16/3'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:08:50Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-7rvp-xqj7-rxf2
|
2023-08-16T19:25:56Z
|
2023-08-11T15:30:46Z
| null |
['CVE-2020-24950']
|
Daylight Studio FUEL-CMS SQLi Vulnerability
|
SQL Injection vulnerability in file `Base_module_model.php` in Daylight Studio FUEL-CMS version 1.4.9, allows remote attackers to execute arbitrary code via the `col` parameter to function `list_items`.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'codeigniter/framework'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.9'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24950'}, {'type': 'WEB', 'url': 'https://github.com/daylightstudio/FUEL-CMS/issues/562'}, {'type': 'WEB', 'url': 'https://github.com/daylightstudio/FUEL-CMS/commit/c8d9381d39b1c0f5488cf059ea9aa659ee227da4'}, {'type': 'PACKAGE', 'url': 'https://github.com/daylightstudio/FUEL-CMS/'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T21:22:56Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-7ch3-7pp7-7cpq
|
2023-08-25T16:08:10Z
|
2023-08-22T18:06:46Z
| null |
['CVE-2023-40570']
|
Datasette 1.0 alpha series leaks names of databases and tables to unauthenticated users
|
### Impact
This bug affects Datasette instances running a Datasette 1.0 alpha - 1.0a0, 1.0a1, 1.0a2 or 1.0a3 - in an online accessible location but with authentication enabled using a plugin such as [datasette-auth-passwords](https://datasette.io/plugins/datasette-auth-passwords).
The `/-/api` API explorer endpoint could reveal the names of both databases and tables - but not their contents - to an unauthenticated user.
### Patches
Datasette 1.0a4 has a fix for this issue.
### Workarounds
To work around this issue, block all traffic to the `/-/api` endpoint. This can be done with a proxy such as Apache or NGINX, or by installing the [datasette-block](https://datasette.io/plugins/datasette-block) plugin and adding the following configuration to your `metadata.json` or `metadata.yml` file:
```json
{
"plugins": {
"datasette-block": {
"prefixes": ["/-/api"]
}
}
}
```
This will block access to the API explorer but will still allow access to the Datasette read or write JSON APIs, as those use different URL patterns within the Datasette `/database` hierarchy.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'datasette'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0a0'}, {'fixed': '1.0a4'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/simonw/datasette/security/advisories/GHSA-7ch3-7pp7-7cpq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40570'}, {'type': 'WEB', 'url': 'https://github.com/simonw/datasette/commit/01e0558825b8f7ec17d3b691aa072daf122fcc74'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/datasette/PYSEC-2023-154.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/simonw/datasette'}]
|
{'cwe_ids': ['CWE-200', 'CWE-213'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-22T18:06:46Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-36fg-whr2-g999
|
2023-08-16T21:13:10Z
|
2023-08-16T15:30:18Z
| null |
['CVE-2023-40340']
|
Jenkins NodeJS Plugin improper credential masking vulnerability
|
Jenkins NodeJS Plugin integrates with Config File Provider Plugin to specify custom NPM settings, including credentials for authentication, in a Npm config file.
NodeJS Plugin 1.6.0 and earlier does not properly mask (i.e., replace with asterisks) credentials specified in the Npm config file in Pipeline build logs.
NodeJS Plugin 1.6.0.1 masks credentials specified in the Npm config file in Pipeline build logs.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:nodejs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.0.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40340'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3196'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/16/3'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:13:10Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-68xg-gqqm-vgj8
|
2023-08-24T22:34:11Z
|
2023-08-18T21:50:05Z
| null |
['CVE-2023-40175']
|
Puma HTTP Request/Response Smuggling vulnerability
|
### Impact
Prior to version 6.3.1, puma exhibited incorrect behavior when parsing chunked transfer encoding bodies and zero-length Content-Length headers in a way that allowed HTTP request smuggling.
The following vulnerabilities are addressed by this advisory:
* Incorrect parsing of trailing fields in chunked transfer encoding bodies
* Parsing of blank/zero-length Content-Length headers
### Patches
The vulnerability has been fixed in 6.3.1 and 5.6.7.
### Workarounds
No known workarounds.
### References
[HTTP Request Smuggling](https://portswigger.net/web-security/request-smuggling)
### For more information
If you have any questions or comments about this advisory:
Open an issue in [Puma](https://github.com/puma/puma)
See our [security policy](https://github.com/puma/puma/security/policy)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'RubyGems', 'name': 'puma'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.7'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puma'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.3.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/puma/puma/security/advisories/GHSA-68xg-gqqm-vgj8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40175'}, {'type': 'WEB', 'url': 'https://github.com/puma/puma/commit/690155e7d644b80eeef0a6094f9826ee41f1080a'}, {'type': 'WEB', 'url': 'https://github.com/puma/puma/commit/7405a219801dcebc0ad6e0aa108d4319ca23f662'}, {'type': 'WEB', 'url': 'https://github.com/puma/puma/commit/ed0f2f94b56982c687452504b95d5f1fbbe3eed1'}, {'type': 'PACKAGE', 'url': 'https://github.com/puma/puma'}, {'type': 'WEB', 'url': 'https://github.com/puma/puma/releases/tag/v5.6.7'}, {'type': 'WEB', 'url': 'https://github.com/puma/puma/releases/tag/v6.3.1'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puma/CVE-2023-40175.yml'}]
|
{'cwe_ids': ['CWE-444'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-18T21:50:05Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-v9rw-hjr3-426h
|
2023-08-16T21:05:21Z
|
2023-08-16T15:30:18Z
| null |
['CVE-2023-40350']
|
Jenkins Docker Swarm Plugin stored cross-site scripting vulnerability
|
Jenkins Docker Swarm Plugin processes Docker responses to generate the Docker Swarm Dashboard view.
Docker Swarm Plugin 1.11 and earlier does not escape values returned from Docker before inserting them into the Docker Swarm Dashboard view. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control responses from Docker.
As of publication of this advisory, there is no fix.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:docker-swarm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.11'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40350'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-2811'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/16/3'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:05:21Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-8q28-pw9g-w82c
|
2023-09-06T19:15:14Z
|
2023-08-28T09:30:20Z
| null |
['CVE-2023-40195']
|
Apache Airflow vulnerable arbitrary code execution via Spark server
|
Deserialization of Untrusted Data, Inclusion of Functionality from Untrusted Control Sphere vulnerability in Apache Software Foundation Apache Airflow Spark Provider.
When the Apache Spark provider is installed on an Airflow deployment, an Airflow user that is authorized to configure Spark hooks can effectively run arbitrary code on the Airflow node by pointing it at a malicious Spark server. Prior to version 4.1.3, this was not called out in the documentation explicitly, so it is possible that administrators provided authorizations to configure Spark hooks without taking this into account. We recommend administrators to review their configurations to make sure the authorization to configure Spark hooks is only provided to fully trusted users.
To view the warning in the docs please visit https://airflow.apache.org/docs/apache-airflow-providers-apache-spark/4.1.3/connections/spark.html
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow-providers-apache-spark'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 4.1.3'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40195'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/33233'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/commit/6850b5c777fa515e110ad1daa85242209a8ec6c0'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/apache-airflow-providers-apache-spark/PYSEC-2023-156.yaml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/fzy95b1d6zv31j5wrx3znhzcscck2o24'}]
|
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-30T20:13:17Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-xc2r-jf2x-gjr8
|
2023-08-14T21:32:27Z
|
2023-08-14T21:32:27Z
| null |
['CVE-2023-40013']
|
external-svg-loader Cross-site Scripting vulnerability
|
### Summary
According to the [docs](https://github.com/shubhamjain/svg-loader/tree/main#2-enable-javascript), svg-loader will strip all JS code before injecting the SVG file for security reasons but the input sanitization logic is not sufficient and can be trivially bypassed. This allows an attacker to craft a malicious SVG which can result in XSS.
### Details
When trying to sanitize the svg the lib [removes event attributes](https://github.com/shubhamjain/svg-loader/blob/main/svg-loader.js#L125-L128) such as `onmouseover`, `onclick` but the list of events is not exhaustive. Here's a list of events not removed by svg-loader.
`onafterscriptexecute, onbeforecopy, onbeforecut, onbeforescriptexecute, onbeforetoggle, onbegin, onbounce, onend, onfinish, onfocusin, onfocusout, onmousewheel, onpointerrawupdate, onrepeat, onsearch, onshow, onstart, ontoggle(popover), ontouchend, ontouchmove, ontouchstart`
As you can see in the POC we can use `onbegin` in `animate` tag to execute JS code without needing to add `data-js="enabled"`.
### PoC
```html
<svg version="1.1" baseProfile="full" xmlns="http://www.w3.org/2000/svg">
<animate onbegin=alert(1) attributeName=x dur=1s>
</svg>
```
```html
<html>
<head>
<script src="./dist/svg-loader.js" type="text/javascript"></script>
</head>
<body>
<svg data-src="data:image/svg+xml;base64,PHN2ZyB2ZXJzaW9uPSIxLjEiIGJhc2VQcm9maWxlPSJmdWxsIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPgogIDxwb2x5Z29uIGlkPSJ0cmlhbmdsZSIgcG9pbnRzPSIwLDAgMCw1MCA1MCwwIiBmaWxsPSIjMDA5OTAwIiBzdHJva2U9IiMwMDQ0MDAiLz4KICA8YW5pbWF0ZSBvbmJlZ2luPWFsZXJ0KDEpIGF0dHJpYnV0ZU5hbWU9eCBkdXI9MXM+Cjwvc3ZnPgo="></svg>
</body>
</html>
```
### Impact
Any website which uses external-svg-loader and allows its users to provide svg src, upload svg files would be susceptible to stored XSS attack.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'external-svg-loader'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.9'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/shubhamjain/svg-loader/security/advisories/GHSA-xc2r-jf2x-gjr8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40013'}, {'type': 'WEB', 'url': 'https://github.com/shubhamjain/svg-loader/commit/d3562fc08497aec5f33eb82017fa1417b3319e2c'}, {'type': 'PACKAGE', 'url': 'https://github.com/shubhamjain/svg-loader'}, {'type': 'WEB', 'url': 'https://github.com/shubhamjain/svg-loader/blob/main/svg-loader.js#L125-L128'}, {'type': 'WEB', 'url': 'https://github.com/shubhamjain/svg-loader/tree/main#2-enable-javascript'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-14T21:32:27Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-g4vp-m682-qqmp
|
2023-08-11T19:00:48Z
|
2023-08-11T19:00:48Z
| null |
['CVE-2023-40014']
|
OpenZeppelin Contracts vulnerable to Improper Escaping of Output
|
### Impact
OpenZeppelin Contracts is a library for secure smart contract development. Starting in version 4.0.0 and prior to version 4.9.3, contracts using `ERC2771Context` along with a custom trusted forwarder may see `_msgSender` return `address(0)` in calls that originate from the forwarder with calldata shorter than 20 bytes. This combination of circumstances does not appear to be common, in particular it is not the case for `MinimalForwarder` from OpenZeppelin Contracts, or any deployed forwarder the team is aware of, given that the signer address is appended to all calls that originate from these forwarders.
### Patches
The problem has been patched in v4.9.3.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.9.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts-upgradeable'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.9.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-g4vp-m682-qqmp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40014'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/pull/4481'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/pull/4484'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/commit/9445f96223041abf2bf08daa56f8da50b674cbcd'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/commit/e4435eed757d4309436b1e06608e97b6d6e2fdb5'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/blob/v4.9.3/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/releases/tag/v4.9.3'}]
|
{'cwe_ids': ['CWE-116'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T19:00:48Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-wrw3-qmqw-4x9w
|
2023-08-17T19:08:14Z
|
2023-08-08T18:30:35Z
| null |
['CVE-2023-38759']
|
wger Workout Manager Cross-Site Request Forgery vulnerability
|
Cross Site Request Forgery (CSRF) vulnerability in wger Project wger Workout Manager 2.2.0a3 allows a remote attacker to gain privileges via the `user-management` feature in the `gym/views/gym.py`, `templates/gym/reset_user_password.html`, `templates/user/overview.html`, `core/views/user.py`, and `templates/user/preferences.html`, `core/forms.py` components.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'wger'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.0a3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38759'}, {'type': 'WEB', 'url': 'https://github.com/0x72303074/CVE-Disclosures'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/wger/PYSEC-2023-144.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/wger-project/wger'}, {'type': 'WEB', 'url': 'https://wger.de'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-17T19:08:14Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-jcf2-mxr2-gmqp
|
2023-08-25T21:35:52Z
|
2023-08-25T19:45:57Z
| null |
['CVE-2023-40579']
|
OpenFGA Authorization Bypass
|
## Overview
Some end users of OpenFGA v1.3.0 or earlier are vulnerable to authorization bypass when calling the ListObjects API. UPDATE: This means that the API sometimes returns more objects than it should.
## Am I Affected?
The vulnerability affects customers using `ListObjects` with specific models. The affected models contain expressions of type `rel1 from type1`.
## Fix
Update to v1.3.1.
## Backward Compatibility
This update is backward compatible.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/openfga/openfga'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/openfga/openfga/security/advisories/GHSA-jcf2-mxr2-gmqp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40579'}, {'type': 'PACKAGE', 'url': 'https://github.com/openfga/openfga'}, {'type': 'WEB', 'url': 'https://github.com/openfga/openfga/releases/tag/v1.3.1'}]
|
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-25T19:45:57Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-5f35-pq34-c87q
|
2023-08-29T22:37:25Z
|
2023-08-23T18:30:34Z
| null |
['CVE-2023-39441']
|
Apache Airflow missing Certificate Validation
|
Apache Airflow SMTP Provider before 1.3.0, Apache Airflow IMAP Provider before 3.3.0, and Apache Airflow before 2.7.0 are affected by the Validation of OpenSSL Certificate vulnerability.
The default SSL context with SSL library did not check a server's X.509 certificate. Instead, the code accepted any certificate, which could result in the disclosure of mail server credentials or mail contents when the client connects to an attacker in a MITM position.
Users are strongly advised to upgrade to Apache Airflow version 2.7.0 or newer, Apache Airflow IMAP Provider version 3.3.0 or newer, and Apache Airflow SMTP Provider version 1.3.0 or newer to mitigate the risk associated with this vulnerability
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow-providers-smtp'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow-providers-imap'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39441'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/33070'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/33075'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/33108'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/xzp4wgjg2b1o6ylk2595df8bstlbo1lb'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/23/2'}]
|
{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-24T12:52:22Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-34hj-v8fm-x887
|
2023-08-04T13:31:13Z
|
2023-08-03T16:33:32Z
| null |
['CVE-2023-38708']
|
Pimcore Path Traversal Vulnerability in AssetController:importServerFilesAction
|
### Impact
A path traversal vulnerability exists in the `AssetController::importServerFilesAction`, which allows an attacker to overwrite or modify sensitive files by manipulating the pimcore_log parameter.This can lead to potential denial of service---key file overwrite.
The impact of this vulnerability allows attackers to:
Overwrite or modify sensitive files, potentially leading to unauthorized access, privilege escalation, or disclosure of confidential information.
Tamper with system settings by modifying key files, such as the hosts file in Windows or configuration files for other services.
Cause a denial of service (DoS) if critical system files are overwritten or deleted.
The consequences of exploiting this vulnerability can be detrimental to the confidentiality, integrity, and availability of the affected system. It's crucial to address this vulnerability to protect sensitive data and ensure the proper functioning of the system.
### Patches
Update to version 10.6.7 or apply this patch manually https://github.com/pimcore/pimcore/commit/58012d0e3b8b926fb54eccbd64ec5c993b30c22c.patch
### Workarounds
Apply patch https://github.com/pimcore/pimcore/commit/58012d0e3b8b926fb54eccbd64ec5c993b30c22c.patch manually.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.6.7'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-34hj-v8fm-x887'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38708'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/58012d0e3b8b926fb54eccbd64ec5c993b30c22c'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T16:33:32Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-gpvc-mx6g-cchv
|
2023-08-01T19:47:09Z
|
2023-08-01T06:30:15Z
| null |
['CVE-2023-26139']
|
underscore-keypath vulnerable to Prototype Pollution
|
Versions of the package underscore-keypath from 0.0.11 are vulnerable to Prototype Pollution via the name argument of the `setProperty()` function. Exploiting this vulnerability is possible due to improper input sanitization which allows the usage of arguments like `__proto__`.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'underscore-keypath'}, 'ecosystem_specific': {'affected_functions': ['underscore-keypath.setValueForKeyPath']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.11'}, {'last_affected': '0.9.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26139'}, {'type': 'WEB', 'url': 'https://gist.github.com/lelecolacola123/cc0d1e73780127aea9482c05f2ff3252'}, {'type': 'PACKAGE', 'url': 'https://github.com/jeeeyul/underscore-keypath'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-UNDERSCOREKEYPATH-5416714'}]
|
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T19:47:09Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-4847-gqxx-v9xp
|
2023-08-16T19:26:04Z
|
2023-08-11T15:30:46Z
| null |
['CVE-2020-25915']
|
ThinkCMF Cross-site Scripting Vulnerability
|
Cross Site Scripting (XSS) vulnerability in `UserController.php` in ThinkCMF version 5.1.5, allows attackers to execute arbitrary code via crafted `user_login`.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'thinkcmf/thinkcmf'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.7'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25915'}, {'type': 'WEB', 'url': 'https://github.com/thinkcmf/thinkcmf/issues/675'}, {'type': 'WEB', 'url': 'https://github.com/thinkcmf/thinkcmf/commit/27e1fbea5aed5619d15c1257614df45298f04436'}, {'type': 'PACKAGE', 'url': 'https://github.com/thinkcmf/thinkcmf'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T21:27:19Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-xvhg-w6qc-m3qq
|
2023-08-21T19:32:51Z
|
2023-08-15T20:08:17Z
| null |
['CVE-2023-40023']
|
Yaklang Plugin's Fuzztag Component Allows Unauthorized Local File Reading
|
### Impact
The Yak Engine has been found to contain a local file inclusion (LFI) vulnerability. This vulnerability allows attackers to include files from the server's local file system through the web application. When exploited, this can lead to the unintended exposure of sensitive data, potential remote code execution, or other security breaches. Users utilizing versions of the Yak Engine prior to 1.2.4-sp1 are impacted.
### Patches
The vulnerability has been addressed and patched. Users are advised to upgrade to Yak Engine version 1.2.4-sp1 immediately. The patch can be viewed and reviewed at this PR: [https://github.com/yaklang/yaklang/pull/295](https://github.com/yaklang/yaklang/pull/295),[https://github.com/yaklang/yaklang/pull/296](https://github.com/yaklang/yaklang/pull/296)
### Workarounds
Currently, the most effective solution is to upgrade to the patched version of Yak Engine (1.2.4-sp1). Users are also advised to avoid exposing vulnerable versions to untrusted input and to closely monitor any unexpected server behavior until they can upgrade.
### References
For more details on the vulnerability and the corresponding patch, please visit the following link:
- [PR addressing the LFI vulnerability in Yak Engine](https://github.com/yaklang/yaklang/pull/295)
- [disable default file fuzztag in fuzz.Pool](https://github.com/yaklang/yaklang/pull/296)
- [利用yakit功能特性溯源攻击者](https://mp.weixin.qq.com/s?__biz=Mzg5ODE3NTU1OQ==&mid=2247484236&idx=1&sn=ef0c14a89721800b2311d0e487388399)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/yaklang/yaklang'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.4-sp2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/yaklang/yaklang/security/advisories/GHSA-xvhg-w6qc-m3qq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40023'}, {'type': 'WEB', 'url': 'https://github.com/yaklang/yaklang/pull/295'}, {'type': 'WEB', 'url': 'https://github.com/yaklang/yaklang/pull/296'}, {'type': 'PACKAGE', 'url': 'https://github.com/yaklang/yaklang'}, {'type': 'WEB', 'url': 'https://mp.weixin.qq.com/s?__biz=Mzg5ODE3NTU1OQ==&mid=2247484236&idx=1&sn=ef0c14a89721800b2311d0e487388399'}]
|
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-15T20:08:17Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-c3x7-354f-4p2x
|
2023-08-09T13:17:53Z
|
2023-08-09T13:17:53Z
| null |
['CVE-2023-4241']
|
lol-html panics on certain HTML inputs
|
### Impact
lol-html can cause panics on certain HTML inputs. Anyone processing arbitrary 3rd party HTML with the library is affected.
### Patches
The problem has been patched and released as v1.1.1
### Workarounds
No workarounds exist.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'lol-html'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/cloudflare/lol-html/security/advisories/GHSA-c3x7-354f-4p2x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4241'}, {'type': 'PACKAGE', 'url': 'https://github.com/cloudflare/lol-html'}]
|
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T13:17:53Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-j6mp-hx4g-p3gm
|
2023-08-30T20:39:09Z
|
2023-08-29T00:32:04Z
| null |
['CVE-2023-41005']
|
Command injection in pagekit
|
An issue in Pagekit pagekit v.1.0.18 alows a remote attacker to execute arbitrary code via thedownloadAction and updateAction functions in UpdateController.php
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pagekit/pagekit'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.18'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-41005'}, {'type': 'WEB', 'url': 'https://github.com/pagekit/pagekit/issues/977'}]
|
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-30T20:39:09Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-5824-cm3x-3c38
|
2023-08-09T14:27:57Z
|
2023-08-09T14:27:57Z
| null |
['CVE-2023-39363']
|
Vyper has incorrectly allocated named re-entrancy locks
|
### Impact
In versions 0.2.15, 0.2.16 and 0.3.0, named re-entrancy locks are allocated incorrectly. Each function using a named re-entrancy lock gets a unique lock regardless of the key, allowing cross-function re-entrancy in contracts compiled with the susceptible versions. A specific set of conditions is required to result in misbehavior of affected contracts, specifically:
- A `.vy` contract compiled with either of the following `vyper` versions: `0.2.15`, `0.2.16`, `0.3.0`
- A primary function that utilizes the `@nonreentrant` decorator with a specific `key` and does not strictly follow the check-effects-interaction pattern (i.e. contains an external call to an untrusted party before storage updates)
- A secondary function that utilizes the same `key` and would be affected by the improper state caused by the primary function
### Patches
https://github.com/vyperlang/vyper/pull/2439, https://github.com/vyperlang/vyper/pull/2514
### Workarounds
Upgrade to 0.3.1 or higher
### References
Technical post-mortem report: https://hackmd.io/@vyperlang/HJUgNMhs2
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'vyper'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.15'}, {'fixed': '0.3.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/security/advisories/GHSA-5824-cm3x-3c38'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39363'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/pull/2439'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/pull/2514'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/vyper/PYSEC-2023-142.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/vyperlang/vyper'}, {'type': 'WEB', 'url': 'https://hackmd.io/@LlamaRisk/BJzSKHNjn'}, {'type': 'WEB', 'url': 'https://hackmd.io/@vyperlang/HJUgNMhs2'}]
|
{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T14:27:57Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-9phh-r37v-34wh
|
2023-08-14T21:10:17Z
|
2023-08-14T21:10:17Z
| null |
[]
|
lakeFS vulnerable to Arbitrary JavaScript Injection via Direct Link to HTML Files
|
### Impact
The browser renders the resulting HTML when opening a direct link to an HTML file via lakeFS. Any JavaScript within that page is executed within the context of the domain lakeFS is running in.
An attacker can inject a malicious script inline, download resources from another domain, or make arbitrary HTTP requests. This would allow the attacker to send information to a random domain or carry out lakeFS operations while impersonating the victim.
Note that to carry out this attack, an attacker must already have access to upload the malicious HTML file to one or more repositories. It also depends on the victim receiving and opening the link to the malicious HTML file.
### Patches
This is fixed in lakeFS version 0.106.0
### Workarounds
There are no known workarounds at this time.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/treeverse/lakefs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.106.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/treeverse/lakeFS/security/advisories/GHSA-9phh-r37v-34wh'}, {'type': 'WEB', 'url': 'https://github.com/treeverse/lakeFS/commit/2b2a9fa156ad80b0aac043e17533b546b1800603'}, {'type': 'PACKAGE', 'url': 'https://github.com/treeverse/lakeFS'}, {'type': 'WEB', 'url': 'https://github.com/treeverse/lakeFS/releases/tag/v0.106.0'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-14T21:10:17Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-xjw2-6jm9-rf67
|
2023-08-30T20:47:58Z
|
2023-08-30T20:47:58Z
| null |
['CVE-2023-41039']
|
Sandbox escape via various forms of "format".
|
### Impact
Python's "format" functionality allows someone controlling the format string to "read" all objects accessible through recursive attribute lookup and subscription from objects he can access. This can lead to critical information disclosure.
With `RestrictedPython`, the format functionality is available via the `format` and `format_map` methods of `str` (and `unicode`) (accessed either via the class or its instances) and via `string.Formatter`.
All known versions of `RestrictedPython` are vulnerable.
### Patches
The issue will be fixed in 5.4 and 6.2.
### Workarounds
There are no workarounds to fix the issue without upgrading.
### References
* https://docs.python.org/3/library/stdtypes.html#str.format_map
* http://lucumr.pocoo.org/2016/12/29/careful-with-str-format/
* https://www.exploit-db.com/exploits/51580
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [RestrictedPython issue tracker](https://github.com/zopefoundation/RestrictedPython/issues)
* Email us at [security@plone.org](mailto:security@plone.org)
### Credits
Thanks for analysing and reporting the go to:
* Abhishek Govindarasu
* Ankush Menat
* Ward Theunisse
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:L'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'RestrictedPython'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.3'}}, {'package': {'ecosystem': 'PyPI', 'name': 'RestrictedPython'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0'}, {'fixed': '6.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.1'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/zopefoundation/RestrictedPython/security/advisories/GHSA-xjw2-6jm9-rf67'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-41039'}, {'type': 'WEB', 'url': 'https://github.com/zopefoundation/RestrictedPython/commit/4134aedcff17c977da7717693ed89ce56d54c120'}, {'type': 'PACKAGE', 'url': 'https://github.com/zopefoundation/RestrictedPython'}]
|
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-30T20:47:58Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-64x5-55rw-9974
|
2023-08-29T23:34:09Z
|
2023-08-29T23:34:09Z
| null |
['CVE-2023-40170']
|
cross-site inclusion (XSSI) of files in jupyter-server
|
### Impact
Improper cross-site credential checks on `/files/` URLs could allow exposure of certain file contents, or accessing files when opening untrusted files via "Open image in new tab".
### Patches
Jupyter Server 2.7.2
### Workarounds
Use lower performance `--ContentsManager.files_handler_class=jupyter_server.files.handlers.FilesHandler`, which implements the correct checks.
### References
Upstream patch for CVE-2019-9644 was not applied completely, leaving part of the vulnerability open.
Vulnerability reported by Tim Coen via the [bug bounty program](https://app.intigriti.com/programs/jupyter/jupyter/detail) [sponsored by the European Commission](https://commission.europa.eu/news/european-commissions-open-source-programme-office-starts-bug-bounties-2022-01-19_en) and hosted on the [Intigriti platform](https://www.intigriti.com/).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'jupyter-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/jupyter-server/jupyter_server/security/advisories/GHSA-64x5-55rw-9974'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40170'}, {'type': 'WEB', 'url': 'https://github.com/jupyter-server/jupyter_server/commit/87a4927272819f0b1cae1afa4c8c86ee2da002fd'}, {'type': 'PACKAGE', 'url': 'https://github.com/jupyter-server/jupyter_server'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/jupyter-server/PYSEC-2023-157.yaml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NRP7DNZYVOIA4ZB3U3ZWKTFZEPYWNGCQ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XDKQAWQN6SQTOVACZNXYKEHWQXGG4DOF/'}]
|
{'cwe_ids': ['CWE-284', 'CWE-306', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T23:34:09Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-f8pq-3926-8gx5
|
2023-08-09T20:59:14Z
|
2023-08-09T20:59:14Z
| null |
[]
|
Unsanitized user controlled input in module generation
|
## Impact
The `import-in-the-middle` loader used by `@opentelemetry/instrumentation` works by generating a wrapper module on the fly. The wrapper uses the module specifier to load the original module and add some wrapping code. It allows for remote code execution in cases where an application passes user-supplied input directly to an `import()` function.
## Patches
This vulnerability has been patched in `@opentelemetry/instrumentation` version `0.41.2`
## Workarounds
- Do not pass any user-supplied input to `import()`. Instead, verify it against a set of allowed values.
- If using `@opentelemetry/instrumentation` with support for EcmaScript Modules is not needed, ensure that none of the following options are set (either via command-line or the `NODE_OPTIONS` environment variable):
```
--experimental-loader=@opentelemetry/instrumentation/hook.mjs
--experimental-loader @opentelemetry/instrumentation/hook.mjs
--loader=import-in-the-middle/hook.mjs
--loader import-in-the-middle/hook.mjs
```
## References
- https://github.com/DataDog/import-in-the-middle/security/advisories/GHSA-5r27-rw8r-7967
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@opentelemetry/instrumentation'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.40.0'}, {'fixed': '0.41.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/open-telemetry/opentelemetry-js/security/advisories/GHSA-f8pq-3926-8gx5'}, {'type': 'WEB', 'url': 'https://github.com/open-telemetry/opentelemetry-js/commit/ffe641c08c69f41ca8d292221dc1804d511efb28'}, {'type': 'PACKAGE', 'url': 'https://github.com/open-telemetry/opentelemetry-js'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T20:59:14Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-gf46-prm4-56pc
|
2023-08-09T14:36:16Z
|
2023-08-09T14:36:16Z
| null |
['CVE-2023-39526']
|
PrestaShop SQL manager vulnerability
|
### Impact
Remote code execution through SQL injection and arbitrary file write in back office
### Patches
1.7.8.10
8.0.5
8.1.1
### Found by
Truff (via yeswehack)
### Workarounds
none
### References
none
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.1.0'}, {'fixed': '8.1.1'}]}], 'versions': ['8.1.0']}, {'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.0.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.8.10'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-gf46-prm4-56pc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39526'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/commit/817847e2347844a9b6add017581f1932bcd28c09'}, {'type': 'PACKAGE', 'url': 'https://github.com/PrestaShop/PrestaShop'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T14:36:16Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-hf7j-xj3w-87g4
|
2023-08-10T20:09:47Z
|
2023-08-10T20:09:47Z
| null |
['CVE-2023-39966']
|
1Panel arbitrary file write vulnerability
|
# Summary
An arbitrary file write vulnerability could lead to direct control of the server
# Details
## Arbitrary file creation
In the api/v1/file.go file, there is a function called SaveContentthat,It recieves JSON data sent by users in the form of a POST request. And the lack of parameter filtering allows for arbitrary file write operations.It looks like this:
- Vulnerable Code

# PoC
- We can write the SSH public key into the /etc/.root/authorized_keys configuration file on the server.

- The server was successfully written to the public key

- Successfully connected to the target server using an SSH private key.


As a result, the server is directly controlled, causing serious **harm**
# Impact
1Panel v1.4.3
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/1Panel-dev/1Panel'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.3'}, {'fixed': '1.5.0'}]}], 'versions': ['1.4.3']}]
|
[{'type': 'WEB', 'url': 'https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-hf7j-xj3w-87g4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39966'}, {'type': 'PACKAGE', 'url': 'https://github.com/1Panel-dev/1Panel'}, {'type': 'WEB', 'url': 'https://github.com/1Panel-dev/1Panel/releases/tag/v1.5.0'}]
|
{'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-10T20:09:47Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-3r32-cp7v-5wq4
|
2023-08-30T20:43:00Z
|
2023-08-29T00:32:03Z
| null |
['CVE-2023-39059']
|
Code injection in ansible semaphore
|
An issue in ansible semaphore v.2.8.90 allows a remote attacker to execute arbitrary code via a crafted payload to the extra variables parameter.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ansible-semaphore/semaphore'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.8.90'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39059'}, {'type': 'WEB', 'url': 'https://gist.github.com/Alevsk/1757da24c5fb8db735d392fd4146ca3a'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible-semaphore/semaphore'}, {'type': 'WEB', 'url': 'https://www.alevsk.com/2023/07/a-quick-story-of-security-pitfalls-with-execcommand-in-software-integrations/'}]
|
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-30T20:43:00Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-62pr-54gv-vg5g
|
2023-08-31T18:33:40Z
|
2023-08-29T15:31:51Z
| null |
['CVE-2023-40787']
|
SpringBlade vulnerable to SQL injection
|
In SpringBlade V3.6.0 when executing SQL query, the parameters submitted by the user are not wrapped in quotation marks, which leads to SQL injection.
|
[]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.springblade:blade-core-tool'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['3.6.0']}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40787'}, {'type': 'WEB', 'url': 'https://gist.github.com/kaliwin/9d6cf58bb6ec06765cdf7b75e13ee460'}, {'type': 'PACKAGE', 'url': 'https://github.com/chillzhuang/blade-tool'}, {'type': 'WEB', 'url': 'https://sword.bladex.cn/'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-31T18:33:40Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-cwvm-v4w8-q58c
|
2023-09-06T17:28:06Z
|
2023-08-30T20:09:36Z
| null |
['CVE-2023-41040']
|
Blind local file inclusion
|
### Summary
In order to resolve some git references, GitPython reads files from the `.git` directory, in some places the name of the file being read is provided by the user, GitPython doesn't check if this file is located outside the `.git` directory. This allows an attacker to make GitPython read any file from the system.
### Details
This vulnerability is present in
https://github.com/gitpython-developers/GitPython/blob/1c8310d7cae144f74a671cbe17e51f63a830adbf/git/refs/symbolic.py#L174-L175
That code joins the base directory with a user given string without checking if the final path is located outside the base directory.
I was able to exploit it from three places, but there may be more code paths that lead to it:
https://github.com/gitpython-developers/GitPython/blob/1c8310d7cae144f74a671cbe17e51f63a830adbf/git/repo/base.py#L605
https://github.com/gitpython-developers/GitPython/blob/1c8310d7cae144f74a671cbe17e51f63a830adbf/git/repo/base.py#L620
https://github.com/gitpython-developers/GitPython/blob/1c8310d7cae144f74a671cbe17e51f63a830adbf/git/index/base.py#L1353
### PoC
Running GitPython within any repo should work, here is an example with the GitPython repo.
```python
import git
r = git.Repo(".")
# This will make GitPython read the README.md file from the root of the repo
r.commit("../README.md")
r.tree("../README.md")
r.index.diff("../README.md")
# Reading /etc/random
# WARNING: this will probably halt your system, run with caution
# r.commit("../../../../../../../../../dev/random")
```
### Impact
I wasn't able to show the contents of the files (that's why "blind" local file inclusion), depending on how GitPython is being used, this can be used by an attacker for something _inoffensive_ as checking if a file exits, or cause a DoS by making GitPython read a big/infinite file (like `/dev/random` on Linux systems).
### Possible solutions
A solution would be to check that the final path isn't located outside the `repodir` path (maybe even after resolving symlinks). Maybe there could be other checks in place to make sure that the reference names are valid.
---
> [!NOTE]
> This vulnerability was reported via email, and it was decided to publish it here and make it public, so the community is aware of it, and a fix can be provided.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'GitPython'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.35'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.1.34'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/gitpython-developers/GitPython/security/advisories/GHSA-cwvm-v4w8-q58c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-41040'}, {'type': 'WEB', 'url': 'https://github.com/gitpython-developers/GitPython/commit/74e55ee4544867e1bd976b7df5a45869ee397b0b'}, {'type': 'PACKAGE', 'url': 'https://github.com/gitpython-developers/GitPython'}, {'type': 'WEB', 'url': 'https://github.com/gitpython-developers/GitPython/blob/1c8310d7cae144f74a671cbe17e51f63a830adbf/git/refs/symbolic.py#L174-L175'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/gitpython/PYSEC-2023-165.yaml'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-30T20:09:36Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-jxcx-3h54-qqxx
|
2023-08-23T19:43:56Z
|
2023-08-23T19:43:56Z
| null |
[]
|
SilverStripe CMS Cross-site Scripting vulnerabilities inherited from TinyMCE
|
TinyMCE 4.x is vulnerable to several XSS vectors, which had been patched in later versions. Two of these have been identified as affecting silverstripe/admin.
Only Silverstripe CMS 4 is affected by these vulnerabilities. It's not possible to upgrade Silverstripe CMS 4 to use a more recent release of TinyMCE without introducing breaking changes. Instead, the security patches that shipped in later releases of TinyMCE have been backported to the TinyMCE version bundled in silverstripe/admin.
Silverstripe CMS 5 is not affected by these vulnerabilities because it uses TinyMCE 6.
|
[]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/admin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.13.6'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/admin/SS-2023-002.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/silverstripe/silverstripe-admin'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/SS-2023-002'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-23T19:43:56Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-3pmj-jqqp-2mj3
|
2023-08-04T17:26:45Z
|
2023-08-04T17:26:45Z
| null |
['CVE-2023-38690']
|
matrix-appservice-irc IRC command injection via admin commands containing newlines
|
### Impact
It is possible to craft a command with newlines which would not be properly parsed. This would mean you could pass a string of commands as a channel name, which would then be run by the IRC bridge bot.
### Patches
Versions 1.0.1 and above are patched.
### Workarounds
There are no robust workarounds to the bug. You can disable dynamic channels in the config to disable the most common execution method but others may exist. It is highly recommended to upgrade the bridge.
### Credits
Discovered and reported by [Val Lorentz](https://valentin-lorentz.fr/).
### For more information
If you have any questions or comments about this advisory email us at [security@matrix.org](mailto:security@matrix.org).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'matrix-appservice-irc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.0'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-appservice-irc/security/advisories/GHSA-3pmj-jqqp-2mj3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38690'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-appservice-irc/commit/0afb064635d37e039067b5b3d6423448b93026d3'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/matrix-appservice-irc'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-appservice-irc/releases/tag/1.0.1'}]
|
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-04T17:26:45Z', 'nvd_published_at': None}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.