schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
20
140
details
stringlengths
56
37.2k
severity
stringlengths
2
92
affected
stringlengths
88
7.07k
references
stringlengths
139
4.72k
database_specific
stringlengths
131
185
1.4.0
GHSA-p267-jjfq-pphf
2023-08-16T12:56:34Z
2023-08-11T09:30:36Z
null
['CVE-2023-4106']
Mattermost fails to check if user is a guest before performing actions on public playbooks
Mattermost fails to check if the requesting user is a guest before performing different actions to public playbooks, resulting a guest being able to view, join, edit, export and archive public playbooks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.9.0'}, {'fixed': '7.9.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.9.5'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.10.0'}, {'fixed': '7.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.10.3'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.8.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.8.7'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4106'}, {'type': 'PACKAGE', 'url': 'https://github.com/mattermost/mattermost'}, {'type': 'WEB', 'url': 'https://mattermost.com/security-updates'}]
{'cwe_ids': ['CWE-284', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T21:49:05Z', 'nvd_published_at': None}
1.4.0
GHSA-rvjp-j5j4-c9j5
2023-08-16T19:25:37Z
2023-08-11T15:30:45Z
null
['CVE-2020-20523']
Gila CMS Cross-site Scripting Vulnerability
Cross Site Scripting (XSS) vulnerability in `adm_user` parameter in Gila CMS version 1.11.3, allows remote attackers to execute arbitrary code during the Gila CMS installation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'gilacms/gila'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.11.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-20523'}, {'type': 'WEB', 'url': 'https://github.com/GilaCMS/gila/issues/41'}, {'type': 'PACKAGE', 'url': 'https://github.com/GilaCMS/gila'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T21:04:04Z', 'nvd_published_at': None}
1.4.0
GHSA-p8rx-fwgq-rh2f
2023-08-09T13:15:38Z
2023-08-09T13:15:38Z
null
['CVE-2023-35390']
.NET Remote Code Execution Vulnerability
# Microsoft Security Advisory CVE-2023-35390: .NET Remote Code Execution Vulnerability ## <a name="executive-summary"></a>Executive summary Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 7.0 and .NET 6.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability. A vulnerability exists when some dotnet commands are used in directories with weaker permissions which can result in remote code execution. ## Announcement Announcement for this issue can be found at https://github.com/dotnet/announcements/issues/266 ### <a name="mitigation-factors"></a>Mitigation factors Microsoft has not identified any mitigating factors for this vulnerability. ## <a name="affected-software"></a>Affected software * Any .NET 7.0.1xx SDK 7.0.109 or earlier. * Any .NET 7.0.3xx SDK 7.0.306 or earlier. * Any .NET 6.0.1xx SDK 6.0.120 or earlier. * Any .NET 6.0.3xx SDK 6.0.315 or earlier. * Any .NET 6.0.4xx SDK 6.0.412 or earlier. If your application uses the following package versions, ensure you update to the latest version of .NET. ### <a name=".NET 7"></a>.NET 7 Package name | Affected version | Patched version ------------ | ---------------- | ------------------------- [ Microsoft.NET.Build.Containers](https://www.nuget.org/packages/Microsoft.NET.Build.Containers) | <= 7.0.306 | 7.0.307, 7.0.400 ### <a name=".NET 6"></a>.NET 6 Package name | Affected version | Patched version ------------ | ---------------- | ------------------------- ## Advisory FAQ ### <a name="how-affected"></a>How do I know if I am affected? If you have a runtime or SDK with a version listed, or an affected package listed in [affected software](#affected-software), you're exposed to the vulnerability. ### <a name="how-fix"></a>How do I fix the issue? * To fix the issue please install the latest version of .NET 6.0 or .NET 7.0. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs. * If you are using one of the affected packages, please update to the patched version listed above. * If you have .NET 6.0 or greater installed, you can list the versions you have installed by running the `dotnet --info` command. You will see output like the following; ``` .NET Core SDK (reflecting any global.json): Version: 6.0.300 Commit: 8473146e7d Runtime Environment: OS Name: Windows OS Version: 10.0.18363 OS Platform: Windows RID: win10-x64 Base Path: C:\Program Files\dotnet\sdk\6.0.300\ Host (useful for support): Version: 6.0.5 Commit: 8473146e7d .NET Core SDKs installed: 6.0.300 [C:\Program Files\dotnet\sdk] .NET Core runtimes installed: Microsoft.AspNetCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App] Microsoft.NETCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App] Microsoft.WindowsDesktop.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App] To install additional .NET Core runtimes or SDKs: https://aka.ms/dotnet-download ``` * If you're using .NET 7.0, you should download and install Runtime 7.0.10 or SDK 7.0.110 (for Visual Studio 2022 v17.4) from https://dotnet.microsoft.com/download/dotnet-core/7.0. * If you're using .NET 6.0, you should download and install Runtime 6.0.21 or SDK 6.0.316 (for Visual Studio 2022 v17.2) from https://dotnet.microsoft.com/download/dotnet-core/6.0. .NET 6.0 and and .NET 7.0 updates are also available from Microsoft Update. To access this either type "Check for updates" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates. Once you have installed the updated runtime or SDK, restart your apps for the update to take effect. Additionally, if you've deployed [self-contained applications](https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd) targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed. ## Other Information ### Reporting Security Issues If you have found a potential security issue in .NET 6.0 or .NET 7.0, please email details to secure@microsoft.com. Reports may qualify for the Microsoft .NET Core & .NET 5 Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at <https://aka.ms/corebounty>. ### Support You can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime and https://github.com/dotnet/aspnet/. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue. ### Disclaimer The information provided in this advisory is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. ### External Links [CVE-2023-35390]( https://www.cve.org/CVERecord?id=CVE-2023-35390) ### Revisions V1.0 (August 08, 2023): Advisory published. _Version 1.0_ _Last Updated 2023-08-08_
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NET.Build.Containers'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.307'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.306'}}]
[{'type': 'WEB', 'url': 'https://github.com/dotnet/sdk/security/advisories/GHSA-p8rx-fwgq-rh2f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35390'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/266'}, {'type': 'PACKAGE', 'url': 'https://github.com/dotnet/sdk'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CL2L4WE5QRT7WEXANYXSKSU43APC5N2V/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWVZFKTLNMNKPZ755EMRYIA6GHFOWGKY/'}, {'type': 'WEB', 'url': 'https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35390'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T13:15:38Z', 'nvd_published_at': None}
1.4.0
GHSA-5r33-mgjf-6656
2023-08-16T21:10:56Z
2023-08-16T15:30:18Z
null
['CVE-2023-40343']
Jenkins Tuleap Authentication Plugin non-constant time token comparison
Jenkins Tuleap Authentication Plugin 1.1.20 and earlier does not use a constant-time comparison when checking whether two authentication tokens are equal. This could potentially allow attackers to use statistical methods to obtain a valid authentication token. Tuleap Authentication Plugin 1.1.21 uses a constant-time comparison when validating authentication tokens.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:tuleap-oauth'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.21'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40343'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3229'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/16/3'}]
{'cwe_ids': ['CWE-203'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:10:56Z', 'nvd_published_at': None}
1.4.0
GHSA-5p42-m6f3-hpmj
2023-08-24T22:28:41Z
2023-08-17T00:30:26Z
null
['CVE-2023-38894']
tree-kit Prototype Pollution vulnerability
A Prototype Pollution issue in Cronvel Tree-kit v.0.7.4 and before allows a remote attacker to execute arbitrary code via the extend function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'tree-kit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38894'}, {'type': 'WEB', 'url': 'https://github.com/cronvel/tree-kit/commit/61bf10cf0dbddaeea3f198cfe7cb469f360d82bc'}, {'type': 'PACKAGE', 'url': 'https://github.com/cronvel/tree-kit'}, {'type': 'WEB', 'url': 'https://www.code-intelligence.com/blog/treekit-prototype-pollution-cve-2023-38894'}, {'type': 'WEB', 'url': 'http://tree-kit.com'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-17T19:06:27Z', 'nvd_published_at': None}
1.4.0
GHSA-vc7j-h8xg-fv5x
2023-08-04T17:26:32Z
2023-08-04T17:26:32Z
null
['CVE-2023-38691']
matrix-appservice-bridge doesn't verify the sub parameter of an openId token exhange, allowing unauthorized access to provisioning APIs
### Impact A malicious Matrix server can use a foreign user's MXID in an OpenID exchange, allowing a bad actor to impersonate users when using the provisioning API. ### Details The library does not check that the servername part of the `sub` parameter (containing the user's *claimed* MXID) is the same as the servername we are talking to. A malicious actor could spin up a server on any given domain, respond with a `sub` parameter according to the user they want to act as and use the resulting token to perform provisioning requests. ### Workarounds Disable the provisioning API. If the bridge does not use the provisioning API, you are not vulnerable.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'matrix-appservice-bridge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '8.1.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'matrix-appservice-bridge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.1'}]}], 'versions': ['9.0.0']}]
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-appservice-bridge/security/advisories/GHSA-vc7j-h8xg-fv5x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38691'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-appservice-bridge/commit/4c6723a5e7beda65cdf1ae5dbb882e8beaac8552'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/matrix-appservice-bridge'}]
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-04T17:26:32Z', 'nvd_published_at': None}
1.4.0
GHSA-8rj5-2857-877j
2023-08-25T21:43:35Z
2023-08-23T13:19:55Z
null
['CVE-2022-25024']
json2xml Uncaught Exception vulnerability
The json2xml package for Python allows an error in typecode decoding enabling a remote attack that can lead to an exception, causing a denial of service.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'json2xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.14.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25024'}, {'type': 'WEB', 'url': 'https://github.com/vinitkumar/json2xml/issues/106'}, {'type': 'WEB', 'url': 'https://github.com/vinitkumar/json2xml/pull/107'}, {'type': 'WEB', 'url': 'https://github.com/vinitkumar/json2xml/pull/107/files'}, {'type': 'WEB', 'url': 'https://github.com/vinitkumar/json2xml/commit/a9cd75b61329801b47a8fba7473bce6c85a38b9b'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/json2xml/PYSEC-2023-149.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/vinitkumar/json2xml'}, {'type': 'WEB', 'url': 'https://packaging.python.org/en/latest/guides/analyzing-pypi-package-downloads/'}]
{'cwe_ids': ['CWE-248', 'CWE-754'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-23T13:19:55Z', 'nvd_published_at': None}
1.4.0
GHSA-95rp-6gqp-6622
2023-08-30T20:08:58Z
2023-08-30T20:08:58Z
null
['CVE-2023-40582']
Command Injection Vulnerability in find-exec
Older versions of the package are vulnerable to Command Injection as an attacker controlled parameter. As a result, attackers may run malicious commands. For example: ``` const find = require("find-exec"); find("mplayer; touch hacked") ``` This creates a file named "hacked" on the filesystem. You should never allow users to control commands to find, since this package attempts to run every command provided. Thanks to @miguelafmonteiro for reporting.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'find-exec'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/shime/find-exec/security/advisories/GHSA-95rp-6gqp-6622'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40582'}, {'type': 'WEB', 'url': 'https://github.com/shime/find-exec/commit/74fb108097c229b03d6dba4cce81e36aa364b51c'}, {'type': 'PACKAGE', 'url': 'https://github.com/shime/find-exec'}]
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-30T20:08:58Z', 'nvd_published_at': None}
1.4.0
GHSA-x2mh-8fmc-rqgh
2023-08-29T22:27:51Z
2023-08-23T18:30:34Z
null
['CVE-2023-37379']
Apache Airflow denial of service vulnerability
Apache Airflow, in versions prior to 2.7.0, contains a security vulnerability that can be exploited by an authenticated user possessing Connection edit privileges. This vulnerability allows the user to access connection information and exploit the test connection feature by sending many requests, leading to a denial of service (DoS) condition on the server. Furthermore, malicious actors can leverage this vulnerability to establish harmful connections with the server. Users of Apache Airflow are strongly advised to upgrade to version 2.7.0 or newer to mitigate the risk associated with this vulnerability. Additionally, administrators are encouraged to review and adjust user permissions to restrict access to sensitive functionalities, reducing the attack surface.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37379'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/32052'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/apache-airflow/PYSEC-2023-152.yaml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/g5c9vcn27lr14go48thrjpo6f4vw571r'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/23/4'}]
{'cwe_ids': ['CWE-200', 'CWE-400', 'CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-24T12:52:17Z', 'nvd_published_at': None}
1.4.0
GHSA-wfm5-v35h-vwf4
2023-08-29T23:33:53Z
2023-08-29T23:33:53Z
null
['CVE-2023-40590']
GitPython untrusted search path on Windows systems leading to arbitrary code execution
### Summary When resolving a program, Python/Windows look for the current working directory, and after that the PATH environment (see big warning in https://docs.python.org/3/library/subprocess.html#popen-constructor). GitPython defaults to use the `git` command, if a user runs GitPython from a repo has a `git.exe` or `git` executable, that program will be run instead of the one in the user's `PATH`. ### Details This is more of a problem on how Python interacts with Windows systems, Linux and any other OS aren't affected by this. But probably people using GitPython usually run it from the CWD of a repo. The execution of the `git` command happens in https://github.com/gitpython-developers/GitPython/blob/1c8310d7cae144f74a671cbe17e51f63a830adbf/git/cmd.py#L277 https://github.com/gitpython-developers/GitPython/blob/1c8310d7cae144f74a671cbe17e51f63a830adbf/git/cmd.py#L983-L996 And there are other commands executed that should probably be aware of this problem. ### PoC On a Windows system, create a `git.exe` or `git` executable in any directory, and import or run GitPython from that directory ``` python -c "import git" ``` The git executable from the current directory will be run. ### Impact An attacker can trick a user to download a repository with a malicious `git` executable, if the user runs/imports GitPython from that directory, it allows the attacker to run any arbitrary commands. ### Possible solutions - Default to an absolute path for the git program on Windows, like `C:\\Program Files\\Git\\cmd\\git.EXE` (default git path installation). - Require users to set the `GIT_PYTHON_GIT_EXECUTABLE` environment variable on Windows systems. - Make this problem prominent in the documentation and advise users to never run GitPython from an untrusted repo, or set the `GIT_PYTHON_GIT_EXECUTABLE` env var to an absolute path. - Resolve the executable manually by only looking into the `PATH` environment variable (suggested by @Byron) --- > [!NOTE] > This vulnerability was reported via email, and it was decided to publish it here and make it public, so the community is aware of it, and a fix can be provided.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'gitpython'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.33'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.1.32'}}]
[{'type': 'WEB', 'url': 'https://github.com/gitpython-developers/GitPython/security/advisories/GHSA-wfm5-v35h-vwf4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40590'}, {'type': 'WEB', 'url': 'https://github.com/gitpython-developers/GitPython/issues/1635'}, {'type': 'WEB', 'url': 'https://github.com/gitpython-developers/GitPython/pull/1636'}, {'type': 'WEB', 'url': 'https://github.com/gitpython-developers/GitPython/commit/8b75434e2c8a082cdeb4971cc6f0ee2bafec45bc'}, {'type': 'WEB', 'url': 'https://docs.python.org/3/library/subprocess.html#popen-constructor'}, {'type': 'PACKAGE', 'url': 'https://github.com/gitpython-developers/GitPython'}, {'type': 'WEB', 'url': 'https://github.com/gitpython-developers/GitPython/releases/tag/3.1.33'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/gitpython/PYSEC-2023-161.yaml'}]
{'cwe_ids': ['CWE-426'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T23:33:53Z', 'nvd_published_at': None}
1.4.0
GHSA-5r27-rw8r-7967
2023-08-14T13:14:54Z
2023-08-08T19:26:40Z
null
['CVE-2023-38704']
import-in-the-middle has unsanitized user controlled input in module generation
### Impact The `import-in-the-middle` loader works by generating a wrapper module on the fly. The wrapper uses the module specifier to load the original module and add some wrapping code. It allows for remote code execution in cases where an application passes user-supplied input directly to an import() function. ### Patches This vulnerability has been patched in `import-in-the-middle` version 1.4.2 ### Workarounds * Do not pass any user-supplied input to `import()`. Instead, verify it against a set of allowed values. * If using `import-in-the-middle` and support for EcmaScript Modules is not needed, ensure that none of the following options are set (either via command-line or the `NODE_OPTIONS` environment variable): ``` --loader=import-in-the-middle/hook.mjs --loader import-in-the-middle/hook.mjs ``` ### References If you have any questions or comments about this advisory, email us at [security@datadoghq.com](mailto:security@datadoghq.com)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'import-in-the-middle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.1'}}]
[{'type': 'WEB', 'url': 'https://github.com/DataDog/import-in-the-middle/security/advisories/GHSA-5r27-rw8r-7967'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38704'}, {'type': 'WEB', 'url': 'https://github.com/DataDog/import-in-the-middle/commit/2531cdd9d1d73f9eaa87c16967f60cb276c1971b'}, {'type': 'PACKAGE', 'url': 'https://github.com/DataDog/import-in-the-middle'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-08T19:26:40Z', 'nvd_published_at': None}
1.4.0
GHSA-3vf5-xm2p-6mh5
2023-08-14T21:08:38Z
2023-08-14T12:30:22Z
null
['CVE-2023-4321']
Cockpit Cross-site Scripting vulnerability
Cross-site Scripting (XSS) - Stored in GitHub repository cockpit-hq/cockpit 2.6.2 and prior. A patch is available at commit 34ab31ee9362da51b9709e178469dbffd7717249.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'cockpit-hq/cockpit'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4321'}, {'type': 'WEB', 'url': 'https://github.com/cockpit-hq/cockpit/commit/34ab31ee9362da51b9709e178469dbffd7717249'}, {'type': 'PACKAGE', 'url': 'https://github.com/cockpit-hq/cockpit'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/fce38751-bfd6-484c-b6e1-935e0aa8ffdc'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-14T21:08:38Z', 'nvd_published_at': None}
1.4.0
GHSA-xqcq-j8w9-3pxv
2023-08-01T19:53:16Z
2023-08-01T19:53:16Z
null
[]
Jettison parser crash by stackoverflow
Those using Jettison to parse untrusted XML or JSON data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack. ### References - https://nvd.nist.gov/vuln/detail/CVE-2022-40149 - https://github.com/jettison-json/jettison/issues/45 - https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=46538 - https://github.com/jettison-json/jettison/pull/49/files - https://github.com/jettison-json/jettison/releases/tag/jettison-1.5.1 - https://lists.debian.org/debian-lts-announce/2022/11/msg00011.html - https://www.debian.org/security/2023/dsa-5312
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.tencyle.fixes:org.codehaus.jettison--jettison'}, 'versions': ['1.1-tencyle-2.1.0']}]
[{'type': 'WEB', 'url': 'https://github.com/tencyle-fixes/jettison/security/advisories/GHSA-xqcq-j8w9-3pxv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40149'}, {'type': 'WEB', 'url': 'https://github.com/jettison-json/jettison/issues/45'}, {'type': 'WEB', 'url': 'https://github.com/jettison-json/jettison/pull/49'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=46538'}, {'type': 'WEB', 'url': 'https://github.com/jettison-json/jettison/releases/tag/jettison-1.5.1'}, {'type': 'PACKAGE', 'url': 'https://github.com/tencyle-fixes/jettison'}, {'type': 'WEB', 'url': 'https://github.com/tencyle-fixes/jettison#jettison-backports-repository-by-tencyle'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/11/msg00011.html'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5312'}]
{'cwe_ids': ['CWE-121', 'CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T19:53:16Z', 'nvd_published_at': None}
1.4.0
GHSA-wwww-xvm2-62w7
2023-08-16T21:08:34Z
2023-08-16T15:30:18Z
null
['CVE-2023-40345']
Jenkins Delphix Plugin vulnerable to exposure of system-scoped credentials
Jenkins Delphix Plugin 3.0.2 and earlier does not set the appropriate context for credentials lookup, allowing the use of System-scoped credentials otherwise reserved for the global configuration. This allows attackers with Overall/Read permission to access and capture credentials they are not entitled to. Delphix Plugin 3.0.3 defines the appropriate context for credentials lookup.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:delphix'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40345'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3214%20(2)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/16/3'}]
{'cwe_ids': ['CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:08:34Z', 'nvd_published_at': None}
1.4.0
GHSA-g3mv-64h3-h482
2023-08-24T22:33:10Z
2023-08-20T15:30:36Z
null
['CVE-2023-4451']
Cockpit Cross-site Scripting vulnerability
Cross-site Scripting (XSS) - Reflected in GitHub repository cockpit-hq/cockpit version 2.6.3 and prior. A patch is available at commit 30609466c817e39f9de1871559603e93cd4d0d0c and anticipated to be part of version 2.6.4.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'cockpit-hq/cockpit'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4451'}, {'type': 'WEB', 'url': 'https://github.com/cockpit-hq/cockpit/commit/30609466c817e39f9de1871559603e93cd4d0d0c'}, {'type': 'PACKAGE', 'url': 'https://github.com/cockpit-hq/cockpit'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/4e111c3e-6cf3-4b4c-b3c1-a540bf30f8fa'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-21T20:25:43Z', 'nvd_published_at': None}
1.4.0
GHSA-w7vm-4v3j-vgpw
2023-08-09T20:36:37Z
2023-08-04T15:30:15Z
null
['CVE-2023-29689']
PyroCMS remote code execution vulnerability
PyroCMS 3.9 contains a remote code execution (RCE) vulnerability that can be exploited through a server-side template injection (SSTI) flaw. This vulnerability allows a malicious attacker to send customized commands to the server and execute arbitrary code on the affected system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pyrocms/pyrocms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29689'}, {'type': 'WEB', 'url': 'https://cupc4k3.lol/ssti-leads-to-rce-on-pyrocms-7515be27c811'}, {'type': 'PACKAGE', 'url': 'https://github.com/pyrocms/pyrocms'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/174088/Pyro-CMS-3.9-Server-Side-Template-Injection.html'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-04T17:27:09Z', 'nvd_published_at': None}
1.4.0
GHSA-8qv2-5vq6-g2g7
2023-09-06T17:36:28Z
2023-08-25T00:12:39Z
null
[]
webpki: CPU denial of service in certificate path building
When this crate is given a pathological certificate chain to validate, it will spend CPU time exponential with the number of candidate certificates at each step of path building. Both TLS clients and TLS servers that accept client certificate are affected. This was previously reported in https://github.com/briansmith/webpki/issues/69. `rustls-webpki` is a fork of this crate which contains a fix for this issue and is actively maintained.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'webpki'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.22.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.22.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/briansmith/webpki/issues/69'}, {'type': 'WEB', 'url': 'https://github.com/briansmith/webpki/issues/69#issuecomment-1699894848'}, {'type': 'WEB', 'url': 'https://github.com/briansmith/webpki/commit/30a108e0802fd09585e0d071013f24b8272d139b'}, {'type': 'PACKAGE', 'url': 'https://github.com/briansmith/webpki'}, {'type': 'WEB', 'url': 'https://github.com/crypto-com/sgx-vendor'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0052.html'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-25T00:12:39Z', 'nvd_published_at': None}
1.4.0
GHSA-8m65-qq6g-43rr
2023-08-18T22:46:01Z
2023-08-18T21:30:24Z
null
['CVE-2023-4422']
Cockpit Cross-site Scripting vulnerability
Cross-site Scripting (XSS) - Stored in GitHub repository cockpit-hq/cockpit prior to 2.6.3.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'cockpit-hq/cockpit'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4422'}, {'type': 'WEB', 'url': 'https://github.com/cockpit-hq/cockpit/commit/b8dad5e070608bb5e4ec58fabbee101b5af737cf'}, {'type': 'PACKAGE', 'url': 'https://github.com/cockpit-hq/cockpit'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/2e12b773-b6a2-48da-a4bb-55d5d1307d2e'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-18T22:46:01Z', 'nvd_published_at': None}
1.4.0
GHSA-hpx4-r86g-5jrg
2023-08-29T23:33:26Z
2023-08-29T23:33:26Z
null
['CVE-2023-26364']
@adobe/css-tools Regular Expression Denial of Service (ReDOS) while Parsing CSS
### Impact @adobe/css-tools version 4.3.0 and earlier are affected by an Improper Input Validation vulnerability that could result in a denial of service while attempting to parse CSS. ### Patches The issue has been resolved in 4.3.1. ### Workarounds None ### References N/A
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': '@adobe/css-tools'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/adobe/css-tools/security/advisories/GHSA-hpx4-r86g-5jrg'}, {'type': 'WEB', 'url': 'https://github.com/adobe/css-tools/commit/2b09a25d1dbdbb16fe80065e4c9beb5623ee5793'}, {'type': 'PACKAGE', 'url': 'https://github.com/adobe/css-tools'}]
{'cwe_ids': ['CWE-1333'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T23:33:26Z', 'nvd_published_at': None}
1.4.0
GHSA-cr5q-6q9f-rq6q
2023-08-23T20:36:24Z
2023-08-23T20:36:24Z
null
['CVE-2023-38037']
Active Support Possibly Discloses Locally Encrypted Files
There is a possible file disclosure of locally encrypted files in Active Support. This vulnerability has been assigned the CVE identifier CVE-2023-38037. Versions Affected: >= 5.2.0 Not affected: < 5.2.0 Fixed Versions: 7.0.7.1, 6.1.7.5 # Impact ActiveSupport::EncryptedFile writes contents that will be encrypted to a temporary file. The temporary file’s permissions are defaulted to the user’s current umask settings, meaning that it’s possible for other users on the same system to read the contents of the temporary file. Attackers that have access to the file system could possibly read the contents of this temporary file while a user is editing it. All users running an affected release should either upgrade or use one of the workarounds immediately. # Releases The fixed releases are available at the normal locations. # Workarounds To work around this issue, you can set your umask to be more restrictive like this: ```ruby $ umask 0077 ```
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.0'}, {'fixed': '6.1.7.5'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/a21d6edf35a60383dfa6c4da49e4b1aef5f00731'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/releases/tag/v7.0.7.1'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activesupport/CVE-2023-38037.yml'}]
{'cwe_ids': ['CWE-377'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-23T20:36:24Z', 'nvd_published_at': None}
1.4.0
GHSA-r2f6-6928-fh8f
2023-08-24T20:22:29Z
2023-08-17T15:30:23Z
null
['CVE-2023-40272']
Apache Airflow Spark Provider Improper Input Validation vulnerability
Apache Airflow Spark Provider, versions before 4.1.3, is affected by a vulnerability that allows an attacker to pass in malicious parameters when establishing a connection giving an opportunity to read files on the Airflow server. It is recommended to upgrade to a version that is not affected.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow-providers-apache-spark'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40272'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/t03gktyzyor20rh06okd91jtqmw6k1l7'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/17/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/18/1'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-17T19:06:45Z', 'nvd_published_at': None}
1.4.0
GHSA-jfrf-vv54-j2jg
2023-08-18T14:25:24Z
2023-08-11T15:30:46Z
null
['CVE-2021-27524']
Margox Braft-Editor Cross-site Scripting Vulnerability
Cross Site Scripting (XSS) vulnerability in margox braft-editor version 2.3.8, allows remote attackers to execute arbitrary code via the embed media feature.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'braft-editor'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27524'}, {'type': 'WEB', 'url': 'https://github.com/margox/braft-editor/issues/880'}, {'type': 'PACKAGE', 'url': 'https://github.com/margox/braft-editor'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T22:06:56Z', 'nvd_published_at': None}
1.4.0
GHSA-vj49-j7rc-h54f
2023-09-01T17:35:22Z
2023-08-25T21:30:48Z
null
['CVE-2023-24620']
Esoteric YamlBeans XML Entity Expansion vulnerability
An issue was discovered in Esoteric YamlBeans through 1.15. A crafted YAML document is able perform am XML Entity Expansion attack against YamlBeans YamlReader. By exploiting the Anchor feature in YAML, it is possible to generate a small YAML document that, when read, is expanded to a large size, causing CPU and memory consumption, such as a Java Out-of-Memory exception.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.esotericsoftware.yamlbeans:yamlbeans'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.15'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24620'}, {'type': 'WEB', 'url': 'https://contrastsecurity.com'}, {'type': 'WEB', 'url': 'https://github.com/Contrast-Security-OSS/yamlbeans/blob/main/SECURITY.md'}, {'type': 'WEB', 'url': 'https://github.com/EsotericSoftware'}, {'type': 'PACKAGE', 'url': 'https://github.com/EsotericSoftware/yamlbeans'}]
{'cwe_ids': ['CWE-400', 'CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-25T22:04:01Z', 'nvd_published_at': None}
1.4.0
GHSA-9cvc-v7wm-992c
2023-08-15T20:04:14Z
2023-08-15T20:04:14Z
null
['CVE-2023-40027']
When `ui.isAccessAllowed` is `undefined`, the `adminMeta` GraphQL query is publicly accessible
### Summary When `ui.isAccessAllowed` is `undefined`, the `adminMeta` GraphQL query is publicly accessible, that is to say, no session is required for the query. This is different to the behaviour of the default AdminUI middleware, which by default will only be publicly accessible if a `session` strategy is not defined. ### Impact This vulnerability does not affect developers using the `@keystone-6/auth` package, or any users that have written their own `ui.isAccessAllowed` (that is to say, you are unaffected if `ui.isAccessAllowed` is defined). This vulnerability does affect developers who thought that their `session` strategy will, by default, enforce that `adminMeta` is inaccessible by the public in accordance with that strategy; akin to the behaviour of the AdminUI middleware. ### Patches This vulnerability has been patched in `@keystone-6/core` version `5.5.1`. ### Workarounds You can opt to write your own `isAccessAllowed` to work-around this vulnerability. ### References Pull request https://github.com/keystonejs/keystone/pull/8771
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@keystone-6/core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.5.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/security/advisories/GHSA-9cvc-v7wm-992c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40027'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/pull/8771'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/commit/650e27e6e9b42abfb94c340c8470faf61f0ff284'}, {'type': 'PACKAGE', 'url': 'https://github.com/keystonejs/keystone'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/releases/tag/2023-08-15'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-15T20:04:14Z', 'nvd_published_at': None}
1.4.0
GHSA-r726-vmfq-j9j3
2023-09-01T17:44:16Z
2023-08-29T23:34:22Z
null
['CVE-2023-39968']
Open Redirect Vulnerability in jupyter-server
### Impact Open Redirect Vulnerability. Maliciously crafted login links to known Jupyter Servers can cause successful login or an already logged-in session to be redirected to arbitrary sites, which should be restricted to Jupyter Server-served URLs. ### Patches Upgrade to Jupyter Server 2.7.2 ### Workarounds None. ### References Vulnerability reported by user davwwwx via the [bug bounty program](https://app.intigriti.com/programs/jupyter/jupyter/detail) [sponsored by the European Commission](https://commission.europa.eu/news/european-commissions-open-source-programme-office-starts-bug-bounties-2022-01-19_en) and hosted on the [Intigriti platform](https://www.intigriti.com/). - https://blog.xss.am/2023/08/CVE-2023-39968-jupyter-token-leak/
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'jupyter-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/jupyter-server/jupyter_server/security/advisories/GHSA-r726-vmfq-j9j3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39968'}, {'type': 'WEB', 'url': 'https://github.com/jupyter-server/jupyter_server/commit/290362593b2ffb23c59f8114d76f77875de4b925'}, {'type': 'PACKAGE', 'url': 'https://github.com/jupyter-server/jupyter_server'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/jupyter-server/PYSEC-2023-155.yaml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NRP7DNZYVOIA4ZB3U3ZWKTFZEPYWNGCQ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XDKQAWQN6SQTOVACZNXYKEHWQXGG4DOF/'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T23:34:22Z', 'nvd_published_at': None}
1.4.0
GHSA-7954-6m9q-gpvf
2023-08-18T21:50:33Z
2023-08-18T21:50:33Z
null
['CVE-2023-37914']
XWiki Platform privilege escalation (PR)/RCE from account through Invitation subject/message
### Impact Any user who can view `Invitation.WebHome` can execute arbitrary script macros including Groovy and Python macros that allow remote code execution including unrestricted read and write access to all wiki contents. This can be reproduced with the following steps: 1. Open the invitation application (Invitation.WebHome). 1. Set the subject to `{{cache}}{{groovy}}new File("/tmp/exploit.txt").withWriter { out -> out.println("Attacked from invitation!"); }{{/groovy}}{{/cache}}` 1. Click "Preview" ### Patches The vulnerability has been patched on XWiki 14.4.8, 15.2-rc-1, and 14.10.6. ### Workarounds The vulnerability can be patched manually by applying the [patch](https://github.com/xwiki/xwiki-platform/commit/ff1d8a1790c6ee534c6a4478360a06efeb2d3591) on `Invitation.InvitationCommon` and `Invitation.InvitationConfig`. ### References - https://jira.xwiki.org/browse/XWIKI-20421 - https://github.com/xwiki/xwiki-platform/commit/ff1d8a1790c6ee534c6a4478360a06efeb2d3591 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-invitation-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5-m-1'}, {'fixed': '14.4.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-invitation-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.10.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-invitation-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0-rc-1'}, {'fixed': '15.2-rc-1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-7954-6m9q-gpvf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37914'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/ff1d8a1790c6ee534c6a4478360a06efeb2d3591'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20421'}]
{'cwe_ids': ['CWE-94', 'CWE-95'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-18T21:50:33Z', 'nvd_published_at': None}
1.4.0
GHSA-269x-pg5c-5xgm
2023-08-09T20:38:02Z
2023-08-05T09:30:16Z
null
['CVE-2023-39508']
Apache Airflow Execution with Unnecessary Privileges
Execution with Unnecessary Privileges, : Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Software Foundation Apache Airflow.The "Run Task" feature enables authenticated user to bypass some of the restrictions put in place. It allows to execute code in the webserver context as well as allows to bypas limitation of access the user has to certain DAGs. The "Run Task" feature is considered dangerous and it has been removed entirely in Airflow 2.6.0. This issue affects Apache Airflow: before 2.6.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39508'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/29706'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/apache-airflow/PYSEC-2023-134.yaml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/j2nkjd0zqvtqk85s6ywpx3c35pvzyx15'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2023/Jul/43'}]
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T14:26:52Z', 'nvd_published_at': None}
1.4.0
GHSA-9jcq-jf57-c62c
2023-08-08T20:46:12Z
2023-08-08T20:46:12Z
null
['CVE-2023-39349']
Privilege escalation via ApiTokensEndpoint
### Impact An attacker with access to a token with few or no scopes can query `/api/0/api-tokens/` for a list of all tokens created by a user, including tokens with greater scopes, and use those tokens in other requests. There is no evidence that the issue was exploited on https://sentry.io. For self-hosted users, it is advised to rotate user auth tokens via `https://your-self-hosted-sentry-installation/settings/account/api/auth-tokens/`. ### Patches The issue was fixed in https://github.com/getsentry/sentry/pull/53850 and is available in the release 23.7.2 of [sentry](https://github.com/getsentry/sentry/releases/tag/23.7.2) and [self-hosted](https://github.com/getsentry/self-hosted/releases/tag/23.7.2). ### Workarounds There are no known workarounds.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'sentry'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '22.1.0'}, {'fixed': '23.7.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/getsentry/sentry/security/advisories/GHSA-9jcq-jf57-c62c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39349'}, {'type': 'WEB', 'url': 'https://github.com/getsentry/sentry/pull/53850'}, {'type': 'WEB', 'url': 'https://github.com/getsentry/sentry/commit/fad12c1150d1135edf9666ea72ca11bc110c1083'}, {'type': 'WEB', 'url': 'https://github.com/getsentry/self-hosted/releases/tag/23.7.2'}, {'type': 'PACKAGE', 'url': 'https://github.com/getsentry/sentry'}, {'type': 'WEB', 'url': 'https://github.com/getsentry/sentry/releases/tag/23.7.2'}]
{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-08T20:46:12Z', 'nvd_published_at': None}
1.4.0
GHSA-v86x-5fm3-5p7j
2023-09-01T17:34:29Z
2023-08-23T20:42:43Z
null
['CVE-2023-40577']
Alertmanager UI is vulnerable to stored XSS via the /api/v1/alerts endpoint
### Impact An attacker with the permission to perform POST requests on the /api/v1/alerts endpoint could be able to execute arbitrary JavaScript code on the users of Prometheus Alertmanager. ### Patches Users can upgrade to Alertmanager v0.2.51. ### Workarounds Users can setup a reverse proxy in front of the Alertmanager web server to forbid access to the /api/v1/alerts endpoint. ### References N/A
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/prometheus/alertmanager'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.25.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.25.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/prometheus/alertmanager/security/advisories/GHSA-v86x-5fm3-5p7j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40577'}, {'type': 'PACKAGE', 'url': 'https://github.com/prometheus/alertmanager'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-23T20:42:43Z', 'nvd_published_at': None}
1.4.0
GHSA-p8gp-899c-jvq9
2023-08-24T21:48:12Z
2023-08-21T20:28:06Z
null
['CVE-2023-4454']
Wallabag user can reset data unintentionally
# Description wallabag was discovered to contain a Cross-Site Request Forgery (CSRF) which allows attackers to arbitrarily reset annotations, entries and tags, by the GET request to `/reset/annotations`, `/reset/entries`, `/reset/tags`, `/reset/archived`. This vulnerability has a CVSSv3.1 score of 4.3. **You should immediately patch your instance to version 2.6.3 or higher if you have more than one user and/or having open registration**. # Resolution These actions are now doable only via POST method, which ensures that we can't do them via a 3rd-party website. # Credits We would like to thank @zpbrent for reporting this issue through huntr.dev. Reference: https://huntr.dev/bounties/4ee0ef74-e4d4-46e7-a05c-076bce522299/
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'wallabag/wallabag'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-alpha.1'}, {'fixed': '2.6.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.6.2'}}]
[{'type': 'WEB', 'url': 'https://github.com/wallabag/wallabag/security/advisories/GHSA-p8gp-899c-jvq9'}, {'type': 'WEB', 'url': 'https://github.com/wallabag/wallabag/commit/78b0b55c40511e1f22d5bbb4897aa10fca68441c'}, {'type': 'PACKAGE', 'url': 'https://github.com/wallabag/wallabag'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/4ee0ef74-e4d4-46e7-a05c-076bce522299/'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-21T20:28:06Z', 'nvd_published_at': None}
1.4.0
GHSA-rvm8-j2cp-j592
2023-08-31T14:48:17Z
2023-08-29T00:32:04Z
null
['CVE-2023-40827']
pf4j vulnerable to remote code execution via loadpluginPath parameter
An issue in pf4j pf4j v.3.9.0 and before allows a remote attacker to obtain sensitive information and execute arbitrary code via the loadpluginPath parameter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.pf4j:pf4j'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.9.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40827'}, {'type': 'WEB', 'url': 'https://github.com/pf4j/pf4j/issues/536'}, {'type': 'WEB', 'url': 'https://github.com/pf4j/pf4j/pull/537'}, {'type': 'WEB', 'url': 'https://github.com/pf4j/pf4j/pull/537/commits/ed9392069fe14c6c30d9f876710e5ad40f7ea8c1'}, {'type': 'PACKAGE', 'url': 'https://github.com/pf4j/pf4j'}]
{'cwe_ids': ['CWE-22', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T17:41:24Z', 'nvd_published_at': None}
1.4.0
GHSA-pv2g-vm98-vjxf
2023-08-18T14:26:03Z
2023-08-16T15:30:18Z
null
['CVE-2023-40339']
Jenkins Config File Provider Plugin improper credential masking vulnerability
Jenkins Config File Provider Plugin 952.va_544a_6234b_46 and earlier does not mask (i.e., replace with asterisks) credentials specified in configuration files when they’re written to the build log. Config File Provider Plugin 953.v0432a_802e4d2 masks credentials configured in configuration files if they appear in the build log.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:config-file-provider'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '953.v0432a'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40339'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3090'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/16/3'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:13:44Z', 'nvd_published_at': None}
1.4.0
GHSA-9v85-q87q-g4vg
2023-09-07T14:31:28Z
2023-08-31T00:30:17Z
null
['CVE-2023-39139']
Path traversal in Archive
An issue in Archive v3.3.7 allows attackers to execute a path traversal via extracting a crafted zip file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Pub', 'name': 'archive'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.7'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39139'}, {'type': 'WEB', 'url': 'https://github.com/brendan-duncan/archive/issues/265'}, {'type': 'WEB', 'url': 'https://github.com/brendan-duncan/archive/commit/6de492385d72af044231c4163dff13a43d991c83'}, {'type': 'WEB', 'url': 'https://github.com/brendan-duncan/archive/commit/edb0d480733a44d28ff3d5e4e2779153ba645ce7'}, {'type': 'WEB', 'url': 'https://blog.ostorlab.co/zip-packages-exploitation.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/brendan-duncan/archive'}, {'type': 'WEB', 'url': 'https://ostorlab.co/vulndb/advisory/OVE-2023-5'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-31T01:42:46Z', 'nvd_published_at': None}
1.4.0
GHSA-pv7q-v9mv-9mh5
2023-08-10T20:09:07Z
2023-08-10T20:09:07Z
null
['CVE-2023-39964']
1Panel O&M management panel has a background arbitrary file reading vulnerability
### Summary Arbitrary file reads allow an attacker to read arbitrary important configuration files on the server. ### Details In the api/v1/file.go file, there is a function called LoadFromFile, which directly reads the file by obtaining the requested path parameter[path]. The request parameters are not filtered, resulting in a background arbitrary file reading vulnerability ![picture1](https://user-images.githubusercontent.com/136411443/257109786-1b0af1e7-346f-4e92-9da2-d977f2f7fe6a.jpg) ### PoC Request /api/v1/files/loadfile, carry /etc/passwd data to read, as shown below: ![微信图片_20230731112833](https://user-images.githubusercontent.com/136411443/257109931-108fc16f-e180-4d1e-996c-d9da5f76559f.png) ### Impact 1Panel v1.4.3
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/1Panel-dev/1Panel'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.3'}, {'fixed': '1.5.0'}]}], 'versions': ['1.4.3']}]
[{'type': 'WEB', 'url': 'https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-pv7q-v9mv-9mh5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39964'}, {'type': 'PACKAGE', 'url': 'https://github.com/1Panel-dev/1Panel'}, {'type': 'WEB', 'url': 'https://github.com/1Panel-dev/1Panel/releases/tag/v1.5.0'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-10T20:09:07Z', 'nvd_published_at': None}
1.4.0
GHSA-9c4h-3f7h-322r
2023-08-09T14:43:20Z
2023-08-09T14:43:20Z
null
['CVE-2023-39532']
SES's dynamic import and spread operator provides possible path to arbitrary exfiltration and execution
### Impact This is a hole in the confinement of guest applications under SES that may manifest as either the ability to exfiltrate information or execute arbitrary code depending on the configuration and implementation of the surrounding host. Guest program running inside a Compartment with as few as no endowments can gain access to the surrounding host’s dynamic import by using dynamic import after the spread operator, like `{...import(arbitraryModuleSpecifier)}`. On the web or in web extensions, a Content-Security-Policy following ordinary best practices likely mitigates both the risk of exfiltration and execution of arbitrary code, at least limiting the modules that the attacker can import to those that are already part of the application. However, without a Content-Security-Policy, dynamic import can be used to issue HTTP requests for either communication through the URL or for the execution of code reachable from that origin. Within an XS worker, an attacker can use the host’s module system to the extent that the host has been configured. This typically only allows access to module code on the host’s file system and is of limited use to an attacker. Within Node.js, the attacker gains access to Node.js’s module system. Importing the powerful builtins is not useful except insofar as there are side-effects and tempered because dynamic import returns a promise. Spreading a promise into an object renders the promises useless. However, Node.js allows importing data URLs, so this is a clear path to arbitrary execution. ### Patches All affected `0.*` version trains have the following patch. Running `npm update` will obtain the patch on all affected projects using `^0.*` style dependency constraints in their `package.json`. ```diff From 33469e88bfb2bf34a161c265f10f808ce354a700 Mon Sep 17 00:00:00 2001 From: Kris Kowal <kris@agoric.com> Date: Thu, 27 Jul 2023 13:25:13 -0700 Subject: [PATCH] fix(fix): Censor spread import --- packages/ses/src/transforms.js | 2 +- packages/ses/test/test-transforms.js | 22 +++++++++++++++++++++- 2 files changed, 22 insertions(+), 2 deletions(-) diff --git a/packages/ses/src/transforms.js b/packages/ses/src/transforms.js index a0fc8d0ef..64a46cb53 100644 --- a/packages/ses/src/transforms.js +++ b/packages/ses/src/transforms.js @@ -106,7 +106,7 @@ export const evadeHtmlCommentTest = src => { // ///////////////////////////////////////////////////////////////////////////// const importPattern = new FERAL_REG_EXP( - '(^|[^.])\\bimport(\\s*(?:\\(|/[/*]))', + '(^|[^.]|\\.\\.\\.)\\bimport(\\s*(?:\\(|/[/*]))', 'g', ); diff --git a/packages/ses/test/test-transforms.js b/packages/ses/test/test-transforms.js index cef0c02c1..8f6818b83 100644 --- a/packages/ses/test/test-transforms.js +++ b/packages/ses/test/test-transforms.js @@ -6,7 +6,7 @@ import { } from '../src/transforms.js'; test('no-import-expression regexp', t => { - t.plan(9); + t.plan(13); // Note: we cannot define these as regular functions (and then stringify) // because the 'esm' module loader that we use for running the tests (i.e. @@ -20,6 +20,7 @@ test('no-import-expression regexp', t => { const safe = 'const a = 1'; const safe2 = "const a = notimport('evil')"; const safe3 = "const a = importnot('evil')"; + const safe4 = "const a = compartment.import('name')"; const obvious = "const a = import('evil')"; const whitespace = "const a = import ('evil')"; @@ -27,10 +28,14 @@ test('no-import-expression regexp', t => { const doubleSlashComment = "const a = import // hah\n('evil')"; const newline = "const a = import\n('evil')"; const multiline = "\nimport('a')\nimport('b')"; + const spread = "{...import('exfil')}"; + const spread2 = "{\n...\nimport\n('exfil')}"; + const spread3 = "{\n...\nimport/**/\n('exfil')}"; t.is(rejectImportExpressions(safe), safe, 'safe'); t.is(rejectImportExpressions(safe2), safe2, 'safe2'); t.is(rejectImportExpressions(safe3), safe3, 'safe3'); + t.is(rejectImportExpressions(safe4), safe4, 'safe4'); t.throws( () => rejectImportExpressions(obvious), { instanceOf: SyntaxError }, @@ -62,6 +67,21 @@ test('no-import-expression regexp', t => { 'possible import expression rejected around line 2', 'multiline', ); + t.throws( + () => rejectImportExpressions(spread), + { instanceOf: SyntaxError }, + 'spread', + ); + t.throws( + () => rejectImportExpressions(spread2), + { instanceOf: SyntaxError }, + 'spread2', + ); + t.throws( + () => rejectImportExpressions(spread3), + { instanceOf: SyntaxError }, + 'spread3', + ); }); test('no-html-comment-expression regexp', t => { -- 2.40.1 ``` ### Workarounds On the web, providing a suitably constrained Content-Security-Policy mitigates most of the threat. With XS, building a binary that lacks the ability to load modules at runtime mitigates the entirety of the threat. That will look like an implementation of `fxFindModule` in a file like `xsPlatform.c` that calls `fxRejectModuleFile`. We highly advise applying the above patch for Node.js as there is no known work-around and Node.js’s module specifiers are exceedingly powerful, including support for `data:text/javascript,` style module specifier URLs. ### References No references at this time.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'ses'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.13.0'}, {'fixed': '0.13.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ses'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.14.0'}, {'fixed': '0.14.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ses'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.15.0'}, {'fixed': '0.15.24'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ses'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.16.0'}, {'fixed': '0.16.1'}]}], 'versions': ['0.16.0']}, {'package': {'ecosystem': 'npm', 'name': 'ses'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.17.0'}, {'fixed': '0.17.1'}]}], 'versions': ['0.17.0']}, {'package': {'ecosystem': 'npm', 'name': 'ses'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.18.0'}, {'fixed': '0.18.7'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/endojs/endo/security/advisories/GHSA-9c4h-3f7h-322r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39532'}, {'type': 'WEB', 'url': 'https://github.com/endojs/endo/commit/fc90c6429604dc79ce8e3355e236ccce2bada041'}, {'type': 'PACKAGE', 'url': 'https://github.com/endojs/endo'}]
{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T14:43:20Z', 'nvd_published_at': None}
1.4.0
GHSA-4vqp-pcm3-73xp
2023-08-16T21:14:11Z
2023-08-16T15:30:17Z
null
['CVE-2023-40336']
Jenkins Folders Plugin cross-site request forgery vulnerability
Jenkins Folders Plugin 6.846.v23698686f0f6 and earlier does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability. This vulnerability allows attackers to copy an item, which could potentially automatically approve unsandboxed scripts and allow the execution of unsafe scripts. Folders Plugin 6.848.ve3b_fd7839a_81 requires POST requests for the affected HTTP endpoint.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:cloudbees-folder'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.848.ve3b'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40336'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3106'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/16/3'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:14:11Z', 'nvd_published_at': None}
1.4.0
GHSA-85cf-gj29-f555
2023-08-10T20:09:24Z
2023-08-10T20:09:24Z
null
['CVE-2023-39965']
1Panel Arbitrary File Download vulnerability
### Summary Any file downloading vulnerability exists in 1Panel backend. ### Details Authenticated attackers can download arbitrary files through the API interface. This code has unauthorized access. ![image](https://user-images.githubusercontent.com/116613486/257246024-d0e35800-5fd8-4907-8b1b-504afaad859e.png) ### PoC payload: POST /api/v1/files/download/bypath HTTP/1.1 Host: ip Content-Type: application/json {"path":"/etc/passwd"} ![f77959349e96543436eea18283fa75c](https://user-images.githubusercontent.com/116613486/257245459-13f2f31b-fcfe-4a27-ba52-e2f1e5d4d749.png) ### Impact Attackers can freely download the file content on the target system. This will be caused a large amount of information leakage.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/1Panel-dev/1Panel'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.3'}, {'fixed': '1.5.0'}]}], 'versions': ['1.4.3']}]
[{'type': 'WEB', 'url': 'https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-85cf-gj29-f555'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39965'}, {'type': 'PACKAGE', 'url': 'https://github.com/1Panel-dev/1Panel'}, {'type': 'WEB', 'url': 'https://github.com/1Panel-dev/1Panel/releases/tag/v1.5.0'}]
{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-10T20:09:24Z', 'nvd_published_at': None}
1.4.0
GHSA-gjvc-55fw-v6vq
2023-08-21T20:47:03Z
2023-08-21T20:28:03Z
null
['CVE-2023-4455']
Wallabag user can delete own API client unintentionally
# Description wallabag was discovered to contain a Cross-Site Request Forgery (CSRF) which allows attackers to arbitrarily delete API key via `/developer/client/delete/{id}` This vulnerability has a CVSSv3.1 score of 6.5. **You should immediately patch your instance to version 2.6.3 or higher if you have more than one user and/or having open registration**. # Resolution This action is now doable only via POST method, which ensures that we can't do it via a 3rd-party website. # Credits We would like to thank @tht1997 for reporting this issue through huntr.dev. Reference: https://huntr.dev/bounties/5ab1b206-5fe8-4737-b275-d705e76f193a/
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'wallabag/wallabag'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-alpha.1'}, {'fixed': '2.6.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.6.2'}}]
[{'type': 'WEB', 'url': 'https://github.com/wallabag/wallabag/security/advisories/GHSA-gjvc-55fw-v6vq'}, {'type': 'WEB', 'url': 'https://github.com/wallabag/wallabag/commit/ffcc5c9062fcc8cd922d7d6d65edbe5efae96806'}, {'type': 'PACKAGE', 'url': 'https://github.com/wallabag/wallabag'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/5ab1b206-5fe8-4737-b275-d705e76f193a/'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-21T20:28:03Z', 'nvd_published_at': None}
1.4.0
GHSA-hpf4-v7v2-95p2
2023-09-07T21:28:14Z
2023-08-09T14:38:18Z
null
['CVE-2023-39528']
PrestaShop file access through path traversal
### Impact `displayAjaxEmailHTML` method can be used to read any file on the server, potentially even outside of the project if the server is not correctly configured. This vulnerability can be exacerbated when coupled with [CWE-502](https://cwe.mitre.org/data/definitions/502.html), which pertains to the Deserialization of Untrusted Data. Such a combination could potentially lead to a Remote Code Execution (RCE) vulnerability ### Patches 8.1.1 ### Found by Aleksey Solovev (Positive Technologies) ### Workarounds ### References
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.1.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-hpf4-v7v2-95p2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39528'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/commit/11de3a84322fa4ecd0995ac40d575db61804724c'}, {'type': 'PACKAGE', 'url': 'https://github.com/PrestaShop/PrestaShop'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T14:38:18Z', 'nvd_published_at': None}
1.4.0
GHSA-pg75-v6fp-8q59
2023-08-01T20:16:29Z
2023-08-01T20:16:29Z
null
['CVE-2023-38200']
Keylime's registrar vulnerable to Denial-of-service attack via a single open connection
### Impact Keylime `registrar` is prone to a simple denial of service attack in which an adversary opens a connection to the TLS port (by default, port `8891`) blocking further, legitimate connections. As long as the connection is open, the `registrar` is blocked and cannot serve any further clients (`agents` and `tenants`), which prevents normal operation. The problem does not affect the `verifier`. ### Patches Users should upgrade to release 7.4.0
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'keylime'}, 'ecosystem_specific': {'affected_functions': ['keylime.registrar_common.start', 'keylime.registrar_common.ProtectedHandler']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.4.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/keylime/keylime/security/advisories/GHSA-pg75-v6fp-8q59'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38200'}, {'type': 'WEB', 'url': 'https://github.com/keylime/keylime/pull/1421'}, {'type': 'WEB', 'url': 'https://github.com/keylime/keylime/commit/c68d8f0b7ea549c12b6956ab0f3c28ae0360ae17'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2023-38200'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2222692'}, {'type': 'PACKAGE', 'url': 'https://github.com/keylime/keylime'}, {'type': 'WEB', 'url': 'https://github.com/keylime/keylime/releases/tag/v7.4.0'}]
{'cwe_ids': ['CWE-834'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T20:16:29Z', 'nvd_published_at': None}
1.4.0
GHSA-vxjg-hchx-cc4g
2023-08-04T18:41:47Z
2023-08-01T16:59:40Z
null
['CVE-2023-38695']
@simonsmith/cypress-image-snapshothas fix for insecure snapshot file names
### Impact It's possible for a user to pass a relative file path for the snapshot name and reach outside of the project directory into the machine running the test. Example: ```js cy.get('h1').matchImageSnapshot('../../../ignore-relative-dirs') ``` The above will create an `ignore-relative-dirs.png` three levels up ### Patches Fixed in `8.0.2` ### Workarounds Validate all the existing uses of `matchImageSnapshot` to ensure correct use of the filename argument. Example: ```js // snapshot name will be the test title cy.matchImageSnapshot(); // snapshot name will be the name passed in cy.matchImageSnapshot('login'); ``` ### References https://github.com/simonsmith/cypress-image-snapshot/issues/15
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@simonsmith/cypress-image-snapshot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.0.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.0.1'}}]
[{'type': 'WEB', 'url': 'https://github.com/simonsmith/cypress-image-snapshot/security/advisories/GHSA-vxjg-hchx-cc4g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38695'}, {'type': 'WEB', 'url': 'https://github.com/simonsmith/cypress-image-snapshot/issues/15'}, {'type': 'WEB', 'url': 'https://github.com/simonsmith/cypress-image-snapshot/commit/ef49519795daf5183f4fac6f3136e194f20f39f4'}, {'type': 'PACKAGE', 'url': 'https://github.com/simonsmith/cypress-image-snapshot'}, {'type': 'WEB', 'url': 'https://github.com/simonsmith/cypress-image-snapshot/releases/tag/8.0.2'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T16:59:40Z', 'nvd_published_at': None}
1.4.0
GHSA-g3v6-r8p9-wxg9
2023-08-11T21:53:22Z
2023-08-11T09:30:36Z
null
['CVE-2023-4105']
Mattermost fails to correctly delete attachments
Mattermost fails to delete the attachments when deleting a message in a thread allowing a simple user to still be able to access and download the attachment of a deleted message
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.9.0'}, {'fixed': '7.9.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.9.5'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.10.0'}, {'fixed': '7.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.10.3'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.8.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.8.7'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4105'}, {'type': 'WEB', 'url': 'https://mattermost.com/security-updates'}, {'type': 'PACKAGE', 'url': 'github.com/mattermost/mattermost'}]
{'cwe_ids': ['CWE-284', 'CWE-862'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T21:53:22Z', 'nvd_published_at': None}
1.4.0
GHSA-jp5r-4x9q-4vcf
2023-08-17T13:52:15Z
2023-08-11T15:30:46Z
null
['CVE-2020-24922']
xuxueli xxl-job Cross-Site Request Forgery Vulnerability
Cross Site Request Forgery (CSRF) vulnerability in `xxl-job-admin/user/add` in xuxueli xxl-job version 2.2.0 allows remote attackers to execute arbitrary code and esclate privileges via crafted .html file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.xuxueli:xxl-job'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24922'}, {'type': 'WEB', 'url': 'https://github.com/xuxueli/xxl-job/issues/1921'}, {'type': 'PACKAGE', 'url': 'https://github.com/xuxueli/xxl-job'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T21:11:20Z', 'nvd_published_at': None}
1.4.0
GHSA-rq5c-hvw6-8pr7
2023-08-29T17:35:55Z
2023-08-29T17:35:55Z
null
['CVE-2023-39348']
Improper log output when using GitHub Status Notifications in spinnaker
### Impact ONLY IMPACTS those use GitHub Status Notifications Log output when updating GitHub status is improperly set to FULL always. It's recommended to apply the patch and rotate the GitHub token used for github status notifications. Given that this would output github tokens to a log system, the risk is slightly higher than a "low" since token exposure could grant elevated access to repositories outside of control. If using READ restricted tokens, the exposure is such that the token itself could be used to access resources otherwise restricted from reads. ### Patches Patch is in progress. https://github.com/spinnaker/echo/pull/1316 ### Workarounds Disable GH Status Notifications. Filter your logs for Echo log data. Use read-only tokens that are limited in scope. ### References sig-security in slack: https://spinnakerteam.slack.com/archives/CFN8F5UR2
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/spinnaker/spinnaker'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 1.28.8'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/spinnaker/spinnaker'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.29.0'}]}], 'database_specific': {'last_known_affected_version_range': '< 1.29.6'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/spinnaker/spinnaker'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.30.0'}]}], 'database_specific': {'last_known_affected_version_range': '< 1.30.3'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/spinnaker/spinnaker'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.31.0'}]}], 'database_specific': {'last_known_affected_version_range': '< 1.31.1'}}]
[{'type': 'WEB', 'url': 'https://github.com/spinnaker/spinnaker/security/advisories/GHSA-rq5c-hvw6-8pr7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39348'}, {'type': 'WEB', 'url': 'https://github.com/spinnaker/echo/pull/1316'}, {'type': 'PACKAGE', 'url': 'https://github.com/spinnaker/spinnaker'}]
{'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T17:35:55Z', 'nvd_published_at': None}
1.4.0
GHSA-q4pp-j36h-3gqg
2023-08-24T12:53:06Z
2023-08-24T12:53:06Z
null
[]
Minimal `basti` IAM Policy Allows Shell Access
### Summary The provided Minimal IAM Policy for `bastic connect` does not include `ssm:SessionDocumentAccessCheck`. This results in the ability to get a shell session on the bastion, not just the intended access for Port Forwarding. ### Details `basti connect` is designed to "securely connect to your RDS/Aurora/Elasticache/EC2 instances", using a bastion instance "with [AWS Session Manager](https://docs.aws.amazon.com/systems-manager/latest/userguide/session-manager.html) port forwarding capability to make the target available on your localhost." The [Minimal IAM Policy](https://github.com/BohdanPetryshyn/basti#minimal-iam-permissions) allows port forwarding via the following statement: ``` { "Effect": "Allow", "Action": "ssm:StartSession", "Resource": [ "arn:aws:ssm:*:*:document/AWS-StartPortForwardingSessionToRemoteHost", "arn:aws:ec2:<your-region>:<your-account-id>:instance/<your-basti-instance-id>" ] } ``` This statement does not include the following condition: ``` "Condition": { "BoolIfExists": { "ssm:SessionDocumentAccessCheck": "true" } } ``` As a result, the `basti connect` minimal policy is logically identical to: ``` { "Effect": "Allow", "Action": "ssm:StartSession", "Resource": [ "arn:aws:ssm:*:*:document/AWS-StartPortForwardingSessionToRemoteHost", "arn:aws:ssm:*:*:document/SSM-SessionManagerRunShell", "arn:aws:ec2:<your-region>:<your-account-id>:instance/<your-basti-instance-id>" ] } ``` A `basti` admin would expect users under the minimal policy to be able to port forward. However, they could also get a shell on the bastion. For more details on this footgun, see: https://ramimac.me/ssm-iam ### PoC _Complete instructions, including specific configuration details, to reproduce the vulnerability._ ### Impact Impact would depend on configuration/hardening of the bastion. I've seen examples where bastions have credentials to downstream systems in configuration or memory that would be exposed.
[]
[{'package': {'ecosystem': 'npm', 'name': 'basti-cdk'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/BohdanPetryshyn/basti/security/advisories/GHSA-q4pp-j36h-3gqg'}, {'type': 'WEB', 'url': 'https://github.com/BohdanPetryshyn/basti/commit/f6f218e7cd450e29aeb616960b7abbe8dfc87796'}, {'type': 'PACKAGE', 'url': 'https://github.com/BohdanPetryshyn/basti'}]
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-24T12:53:06Z', 'nvd_published_at': None}
1.4.0
GHSA-g3m9-pr5m-4cvp
2023-09-01T19:43:01Z
2023-08-28T09:30:20Z
null
['CVE-2023-27604']
Airflow Sqoop Provider RCE Vulnerability
Apache Airflow Sqoop Provider, versions before 4.0.0, is affected by a vulnerability that allows an attacker pass parameters with the connections, which makes it possible to implement RCE attacks via ‘sqoop import --connect’, obtain airflow server permissions, etc. The attacker needs to be logged in and have authorization (permissions) to create/edit connections. It is recommended to upgrade to a version that is not affected. This issue was reported independently by happyhacking-k, And Xie Jianming and LiuHui of Caiji Sec Team also reported it.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow-providers-apache-sqoop'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27604'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/33039'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/lswlxf11do51ob7f6xyyg8qp3n7wdrgd'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-30T20:15:43Z', 'nvd_published_at': None}
1.4.0
GHSA-5pv6-rprw-82wv
2023-08-31T00:00:29Z
2023-08-22T21:30:26Z
null
['CVE-2022-45582']
Horizon Web Dashboard Open Redirect vulnerability
Open Redirect vulnerability in Horizon Web Dashboard 19.4.0 thru 20.1.4 via the success_url parameter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'horizon'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45582'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/horizon/+bug/1982676'}, {'type': 'PACKAGE', 'url': 'https://github.com/openstack/horizon'}, {'type': 'WEB', 'url': 'https://github.com/openstack/horizon/blob/master/horizon/workflows/views.py#L96-L102'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/horizon/PYSEC-2023-153.yaml'}, {'type': 'WEB', 'url': 'https://opendev.org/openstack/horizon/commit/79d139594290779b2f74ca894332aa7f2f7e4735'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-23T13:21:23Z', 'nvd_published_at': None}
1.4.0
GHSA-ch6w-mc6c-g65g
2023-08-22T18:09:10Z
2023-08-21T18:31:23Z
2023-08-22T18:09:10Z
[]
Duplicate Advisory: weaviate denial of service vulnerability
## Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-8697-479h-5mfp. This link is maintained to preserve external references. ## Original Description An issue in weaviate v.1.20.0 allows a remote attacker to cause a denial of service via the `handleUnbatchedGraphQLRequest` function.
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/weaviate/weaviate'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.20.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38976'}, {'type': 'WEB', 'url': 'https://github.com/weaviate/weaviate/issues/3258'}, {'type': 'PACKAGE', 'url': 'https://github.com/weaviate/weaviate'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-21T20:41:45Z', 'nvd_published_at': None}
1.4.0
GHSA-cj8w-v588-p8wx
2023-08-31T14:49:19Z
2023-08-29T00:32:04Z
null
['CVE-2023-40828']
pf4j vulnerable to remote code execution via expandIfZip method in the extract function
An issue in pf4j pf4j v.3.9.0 and before allows a remote attacker to obtain sensitive information and execute arbitrary code via the expandIfZip method in the extract function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.pf4j:pf4j'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.9.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40828'}, {'type': 'WEB', 'url': 'https://github.com/pf4j/pf4j/pull/537'}, {'type': 'WEB', 'url': 'https://github.com/pf4j/pf4j/pull/538'}, {'type': 'WEB', 'url': 'https://github.com/pf4j/pf4j/commit/8e0aa198c4e652cfc1eb9e05ca9b64397f67cc72'}, {'type': 'PACKAGE', 'url': 'https://github.com/pf4j/pf4j'}]
{'cwe_ids': ['CWE-22', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T17:40:51Z', 'nvd_published_at': None}
1.4.0
GHSA-j55r-787p-m549
2023-09-01T19:46:34Z
2023-08-22T18:00:04Z
null
['CVE-2023-40185']
Shescape on Windows escaping may be bypassed in threaded context
### Impact This may impact users that use Shescape on Windows in a threaded context (e.g. using [Worker threads](https://nodejs.org/api/worker_threads.html)). The vulnerability can result in Shescape escaping (or quoting) for the wrong shell, thus allowing attackers to bypass protections depending on the combination of expected and used shell. This snippet demonstrates a vulnerable use of Shescape: ```javascript // vulnerable.js import { exec } from "node:child_process"; import { Worker, isMainThread } from 'node:worker_threads'; import * as shescape from "shescape"; if (isMainThread) { // 1. Something like a worker thread must be used. The reason being that they // unexpectedly change environment variable names on Windows. new Worker("./vulnerable.js"); } else { // 2. Example configuration that's problematic. In this setup example the // expected default system shell is CMD. We configure the use of PowerShell. // Shescape will fail to look up PowerShell and default to escaping for CMD // instead, resulting in the vulnerability. const options = { shell: "powershell", interpolation: true, }; // 3. Using shescape to protect against attacks, this is correct. const escaped = shescape.escape("&& ls", options); // 4. Invoking a command with the escaped user input, this is vulnerable in // this case. exec(`echo Hello ${escaped}`, options, (error, stdout) => { if (error) { console.error(`An error occurred: ${error}`); } else { console.log(stdout); } }); } ``` ### Patches This bug has been patched in [v1.7.4](https://github.com/ericcornelissen/shescape/releases/tag/v1.7.4) which you can upgrade to now. No further changes are required. ### Workarounds If you are impacted there is no workaround possible. ### References - Shescape Pull Request [#1142](https://github.com/ericcornelissen/shescape/pull/1142) - Shescape commit [`0b976da`](https://github.com/ericcornelissen/shescape/commit/0b976dab645abf45ffd85e74a8c6e51ee2f42d63) - Shescape release [v1.7.4](https://github.com/ericcornelissen/shescape/releases/tag/v1.7.4) ### For more information - Comment on Pull Request [#1142](https://github.com/ericcornelissen/shescape/pull/1142) - Comment on commit [`0b976da`](https://github.com/ericcornelissen/shescape/commit/0b976dab645abf45ffd85e74a8c6e51ee2f42d63) - Open an issue at [https://github.com/ericcornelissen/shescape/issues](https://github.com/ericcornelissen/shescape/issues?q=is%3Aissue+is%3Aopen+sort%3Aupdated-desc) (New issue > Question > Get started)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'shescape'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ericcornelissen/shescape/security/advisories/GHSA-j55r-787p-m549'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40185'}, {'type': 'WEB', 'url': 'https://github.com/ericcornelissen/shescape/pull/1142'}, {'type': 'WEB', 'url': 'https://github.com/ericcornelissen/shescape/commit/0b976dab645abf45ffd85e74a8c6e51ee2f42d63'}, {'type': 'PACKAGE', 'url': 'https://github.com/ericcornelissen/shescape'}, {'type': 'WEB', 'url': 'https://github.com/ericcornelissen/shescape/releases/tag/v1.7.4'}]
{'cwe_ids': ['CWE-150'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-22T18:00:04Z', 'nvd_published_at': None}
1.4.0
GHSA-pr76-5cm5-w9cj
2023-08-18T15:48:20Z
2023-08-11T09:30:36Z
null
['CVE-2023-40267']
GitPython vulnerable to remote code execution due to insufficient sanitization of input arguments
GitPython before 3.1.32 does not block insecure non-multi options in `clone` and `clone_from`, making it vulnerable to Remote Code Execution (RCE) due to improper user input validation, which makes it possible to inject a maliciously crafted remote URL into the clone command. Exploiting this vulnerability is possible because the library makes external calls to git without sufficient sanitization of input arguments. NOTE: this issue exists because of an incomplete fix for CVE-2022-24439.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'GitPython'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.32'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40267'}, {'type': 'WEB', 'url': 'https://github.com/gitpython-developers/GitPython/pull/1609'}, {'type': 'WEB', 'url': 'https://github.com/gitpython-developers/GitPython/commit/ca965ecc81853bca7675261729143f54e5bf4cdd'}, {'type': 'PACKAGE', 'url': 'https://github.com/gitpython-developers/GitPython'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/gitpython/PYSEC-2023-137.yaml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AV5DV7GBLMOZT7U3Q4TDOJO5R6G3V6GH/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PF6AXUTC5BO7L2SBJMCVKJSPKWY52I5R/'}]
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T19:48:27Z', 'nvd_published_at': None}
1.4.0
GHSA-fr9g-2m2h-c27j
2023-08-16T21:00:20Z
2023-08-16T06:30:24Z
2023-08-16T21:00:20Z
[]
Duplicate Advisory: @excalidraw/excalidraw Cross-site Scripting vulnerability
## Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-v7v8-gjv7-ffmr. This link is maintained to preserve external references. ## Original Description Versions of the package @excalidraw/excalidraw from 0.0.0 are vulnerable to Cross-site Scripting (XSS) via embedded links in whiteboard objects due to improper input sanitization.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@excalidraw/excalidraw'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26140'}, {'type': 'WEB', 'url': 'https://github.com/excalidraw/excalidraw/pull/6728'}, {'type': 'WEB', 'url': 'https://github.com/excalidraw/excalidraw/commit/b33fa6d6f64d27adc3a47b25c0aa55711740d0af'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-EXCALIDRAWEXCALIDRAW-5841658'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:00:20Z', 'nvd_published_at': None}
1.4.0
GHSA-jm77-qphf-c4w8
2023-08-01T22:34:41Z
2023-08-01T22:34:41Z
null
[]
pyca/cryptography's wheels include vulnerable OpenSSL
pyca/cryptography's wheels include a statically linked copy of OpenSSL. The versions of OpenSSL included in cryptography 0.8-41.0.2 are vulnerable to several security issues. More details about the vulnerabilities themselves can be found in https://www.openssl.org/news/secadv/20230731.txt, https://www.openssl.org/news/secadv/20230719.txt, and https://www.openssl.org/news/secadv/20230714.txt. If you are building cryptography source ("sdist") then you are responsible for upgrading your copy of OpenSSL. Only users installing from wheels built by the cryptography project (i.e., those distributed on PyPI) need to update their cryptography versions.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'cryptography'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8'}, {'fixed': '41.0.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/security/advisories/GHSA-jm77-qphf-c4w8'}, {'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/commit/b22271cf3c3dd8dc8978f8f4b00b5c7060b6538d'}, {'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/commit/bfa4d95f0f356f2d535efd5c775e0fb3efe90ef2'}, {'type': 'PACKAGE', 'url': 'https://github.com/pyca/cryptography'}, {'type': 'WEB', 'url': 'https://www.openssl.org/news/secadv/20230714.txt'}, {'type': 'WEB', 'url': 'https://www.openssl.org/news/secadv/20230719.txt'}, {'type': 'WEB', 'url': 'https://www.openssl.org/news/secadv/20230731.txt'}]
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T22:34:41Z', 'nvd_published_at': None}
1.4.0
GHSA-w3qm-93vf-5hrw
2023-08-09T14:33:39Z
2023-08-06T18:30:25Z
null
['CVE-2023-4196']
Cockpit Cross-site Scripting vulnerability
Cross-site Scripting (XSS) - Stored in GitHub repository cockpit-hq/cockpit prior to 2.6.3. For any role that has permission to execute function assets, an attacker can upload a html file and that leads to XSS.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'cockpit-hq/cockpit'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4196'}, {'type': 'WEB', 'url': 'https://github.com/cockpit-hq/cockpit/commit/039a00cc310bff128ca6e6c1c46c6fbad0385c2c'}, {'type': 'PACKAGE', 'url': 'https://github.com/cockpit-hq/cockpit'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c275a2d4-721f-49f7-8787-b146af2056a0'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T14:33:39Z', 'nvd_published_at': None}
1.4.0
GHSA-c7hh-3v6c-fj4q
2023-08-04T17:26:07Z
2023-08-04T17:26:07Z
null
['CVE-2023-38700']
matrix-appservice-irc events can be crafted to leak parts of targeted messages from other bridged rooms
### Impact It was possible to craft an event such that it would leak part of a targeted message event from another bridged room. This required knowing an event ID to target. ### Patches Please upgrade to 1.0.1. ### Workarounds You can set the `matrixHandler.eventCacheSize` config value to `0` to workaround this bug. However, this may impact performance. ### Credits Discovered and reported by [Val Lorentz](https://valentin-lorentz.fr/). ### For more information If you have any questions or comments about this advisory email us at [security@matrix.org](mailto:security@matrix.org).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'matrix-appservice-irc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-appservice-irc/security/advisories/GHSA-c7hh-3v6c-fj4q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38700'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-appservice-irc/commit/8bbd2b69a16cbcbeffdd9b5c973fd89d61498d75'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/matrix-appservice-irc'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-appservice-irc/releases/tag/1.0.1'}]
{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-04T17:26:07Z', 'nvd_published_at': None}
1.4.0
GHSA-hf5p-f83x-5q2g
2023-08-23T22:14:55Z
2023-08-17T21:30:54Z
null
['CVE-2023-40315']
OpenNMS privilege escalation vulnerability
In OpenNMS Horizon 31.0.8 and versions earlier than 32.0.2 and related Meridian versions, any user that has the ROLE_FILESYSTEM_EDITOR can easily escalate their privileges to ROLE_ADMIN or any other role. The solution is to upgrade to Meridian 2023.1.5 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanks Erik Wynter for reporting this issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.opennms:opennms-webapp-rest'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '31.0.8'}, {'fixed': '32.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40315'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/pull/6250'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/commit/f2caf7d0b9db58b59e98506490aaca37fbf243b6'}, {'type': 'WEB', 'url': 'https://docs.opennms.com/meridian/2023/releasenotes/changelog.html#releasenotes-changelog-Meridian-2023.1.5'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenNMS/opennms'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-18T21:51:28Z', 'nvd_published_at': None}
1.4.0
GHSA-2rf5-3fw8-qm47
2023-08-09T14:38:46Z
2023-08-09T14:38:46Z
null
['CVE-2023-39529']
PrestaShop file deletion via attachment API
### Impact It is possible to delete a file from the server by using the Attachments controller and the Attachments API. ### Patches 8.1.1 ### Found by Kto94 (via Yeswehack) ### Workarounds none ### References none
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.1.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-2rf5-3fw8-qm47'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39529'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/commit/b08c647305dc1e9e6a2445b724d13a9733b6ed82'}, {'type': 'PACKAGE', 'url': 'https://github.com/PrestaShop/PrestaShop'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T14:38:46Z', 'nvd_published_at': None}
1.4.0
GHSA-599v-h3q5-g6r9
2023-08-24T22:33:24Z
2023-08-21T20:41:09Z
null
['CVE-2023-4453']
Pimcore Cross-site Scripting (XSS) vulnerability in DataObject datetime fields
### Impact This vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites. ### Patches Update to version 10.6.8 or apply this patch manually https://github.com/pimcore/pimcore/commit/234c0c02ea7502071b00ab673fbe4a6ac253080e.patch ### Workarounds Apply patch https://github.com/pimcore/pimcore/commit/234c0c02ea7502071b00ab673fbe4a6ac253080e.patch manually. ### References https://huntr.dev/bounties/245a8785-0fc0-4561-b181-fa20f869d993/
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.6.8'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-599v-h3q5-g6r9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4453'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/234c0c02ea7502071b00ab673fbe4a6ac253080e'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/245a8785-0fc0-4561-b181-fa20f869d993'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-21T20:41:09Z', 'nvd_published_at': None}
1.4.0
GHSA-fj32-q626-pjjc
2023-08-22T16:42:24Z
2023-08-15T18:31:32Z
null
['CVE-2023-38860']
LangChain vulnerable to arbitrary code execution
An issue in LangChain v.0.0.231 allows a remote attacker to execute arbitrary code via the prompt parameter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'langchain'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.231'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38860'}, {'type': 'WEB', 'url': 'https://github.com/hwchase17/langchain/issues/7641'}, {'type': 'WEB', 'url': 'https://github.com/langchain-ai/langchain/issues/7641'}, {'type': 'PACKAGE', 'url': 'https://github.com/hwchase17/langchain'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2023-145.yaml'}]
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-15T20:01:59Z', 'nvd_published_at': None}
1.4.0
GHSA-wc9j-gc65-3cm7
2023-08-31T21:47:28Z
2023-08-31T21:47:28Z
null
['CVE-2023-41034']
DDFFileParser is vulnerable to XXE Attacks
### Impact `DDFFileParser` and `DefaultDDFFileValidator` (and so `ObjectLoader`) are vulnerable to [XXE Attacks](https://owasp.org/www-community/vulnerabilities/XML_External_Entity_(XXE)_Processing). [DDF file](https://github.com/eclipse-leshan/leshan/wiki/Adding-new-objects#the-lwm2m-model) is a LWM2M format used to store LWM2M object description. Leshan users are impacted only if they parse untrusted DDF files (e.g. if they let external users provide their own model), in that case they MUST upgrade to fixed version. If you parse only trusted DDF file and validate only with trusted xml schema, upgrading is not mandatory. ### Patches This is fixed in **v1.5.0** and **2.0.0-M13**. ### Workarounds No easy way. Eventually writing your own `DDFFileParser`/`DefaultDDFFileValidator` (and so `ObjectLoader`) creating a `DocumentBuilderFactory` with : ```java // For DDFFileParser DocumentBuilderFactory factory = DocumentBuilderFactory.newInstance(); factory.setFeature(XMLConstants.FEATURE_SECURE_PROCESSING, true); factory.setFeature("http://apache.org/xml/features/disallow-doctype-decl", true); // Disable DTDs factory.setXIncludeAware(false); // Disable XML Inclusions factory.setExpandEntityReferences(false); // disable expand entity reference nodes // For DefaultDDFFileValidator SchemaFactory factory = SchemaFactory.newInstance(XMLConstants.W3C_XML_SCHEMA_NS_URI); factory.setFeature(XMLConstants.FEATURE_SECURE_PROCESSING, true); factory.setProperty(XMLConstants.ACCESS_EXTERNAL_DTD, ""); factory.setProperty(XMLConstants.ACCESS_EXTERNAL_SCHEMA, ""); ``` ### References - https://owasp.org/www-community/vulnerabilities/XML_External_Entity_(XXE)_Processing - https://cheatsheetseries.owasp.org/cheatsheets/XML_External_Entity_Prevention_Cheat_Sheet.html - https://semgrep.dev/docs/cheat-sheets/java-xxe/ - https://community.veracode.com/s/article/Java-Remediation-Guidance-for-XXE
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.leshan:leshan-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.leshan:leshan-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-M1'}, {'fixed': '2.0.0-M13'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/eclipse-leshan/leshan/security/advisories/GHSA-wc9j-gc65-3cm7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-41034'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-leshan/leshan/commit/29577d2879ba8e7674c3b216a7f01193fc7ae013'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-leshan/leshan/commit/4d3e63ac271a817f81fba3e3229c519af7a3049c'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse-leshan/leshan'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-leshan/leshan/wiki/Adding-new-objects#the-lwm2m-model'}, {'type': 'WEB', 'url': 'https://owasp.org/www-community/vulnerabilities/XML_External_Entity_(XXE)_Processing'}]
{'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-31T21:47:28Z', 'nvd_published_at': None}
1.4.0
GHSA-735f-w79p-282x
2023-08-03T19:40:12Z
2023-08-03T16:32:49Z
null
['CVE-2023-4145']
pimcore/customer-management-framework-bundle Cross-site Scripting vulnerability in Segment name
### Impact As HTML injection works in email an attacker can trick a victim to click on such hyperlinks to redirect him to any malicious site and also can host a XSS page. All this will surely cause some damage to the victim. This could lead to users being tricked into giving logins away to malicious attackers. ### Patches Update to version 3.4.2 or apply this patch manually https://github.com/pimcore/customer-data-framework/commit/72f45dd537a706954e7a71c99fbe318640e846a2.patch ### Workarounds Apply https://github.com/pimcore/customer-data-framework/commit/72f45dd537a706954e7a71c99fbe318640e846a2.patch manually. ### References https://huntr.dev/bounties/ce852777-2994-40b4-bb4e-c4d10023eeb0/
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/customer-management-framework-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pimcore/customer-data-framework/security/advisories/GHSA-735f-w79p-282x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4145'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/customer-data-framework/commit/72f45dd537a706954e7a71c99fbe318640e846a2'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/customer-data-framework/commit/72f45dd537a706954e7a71c99fbe318640e846a2.patch'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/customer-data-framework'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ce852777-2994-40b4-bb4e-c4d10023eeb0'}]
{'cwe_ids': ['CWE-79', 'CWE-87'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T16:32:49Z', 'nvd_published_at': None}
1.4.0
GHSA-hgj4-h2x3-rfx4
2023-08-09T20:58:47Z
2023-08-09T20:58:47Z
null
['CVE-2023-39531']
Sentry vulnerable to incorrect credential validation on OAuth token requests
### Impact An attacker with sufficient client-side exploits could retrieve a valid access token for another user during the OAuth token exchange due to incorrect credential validation. The client ID must be known and the API application must have already been authorized on the targeted user account. ### Remediation - **Sentry SaaS** customers do not need to take any action. Those with the highest risk will be contacted directly by Sentry. - **Self-hosted installations** should upgrade to version 23.7.2 or higher. ### Workarounds There are no direct workarounds, but users should review applications authorized on their account (_User Settings > Authorized Applications_) and remove any that are no longer needed.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'sentry'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '23.7.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/getsentry/sentry/security/advisories/GHSA-hgj4-h2x3-rfx4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39531'}, {'type': 'PACKAGE', 'url': 'https://github.com/getsentry/sentry'}]
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T20:58:47Z', 'nvd_published_at': None}
1.4.0
GHSA-99fg-2h75-m92h
2023-08-31T14:40:30Z
2023-08-28T18:30:53Z
null
['CVE-2023-39062']
Spipu HTML2PDF vulnerable to cross-site scripting
Cross Site Scripting vulnerability in Spipu HTML2PDF before v.5.2.8 allows a remote attacker to execute arbitrary code via a crafted script to the forms.php.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'spipu/html2pdf'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39062'}, {'type': 'WEB', 'url': 'https://github.com/spipu/html2pdf/commit/92afd81823d62ad95eb9d034858311bb63aeb4ac'}, {'type': 'WEB', 'url': 'https://github.com/afine-com/CVE-2023-39062'}, {'type': 'WEB', 'url': 'https://github.com/sectroyer/CVEs/tree/main/CVE-2023-39062'}, {'type': 'PACKAGE', 'url': 'https://github.com/spipu/html2pdf'}, {'type': 'WEB', 'url': 'https://github.com/spipu/html2pdf/blob/92afd81823d62ad95eb9d034858311bb63aeb4ac/CHANGELOG.md'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T17:38:56Z', 'nvd_published_at': None}
1.4.0
GHSA-3fjv-8r82-6xm9
2023-08-22T17:54:44Z
2023-08-22T00:31:11Z
null
['CVE-2023-4301']
Jenkins Fortify Plugin cross-site request forgery vulnerability
Jenkins Fortify Plugin 22.1.38 and earlier does not perform permission checks in several HTTP endpoints. This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. Additionally, these HTTP endpoints do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability. Fortify Plugin 22.2.39 requires POST requests and the appropriate permissions for the affected HTTP endpoints.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:fortify'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.2.39'}]}], 'database_specific': {'last_known_affected_version_range': '<= 22.1.38'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4301'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/fortify-plugin/commit/357d7bfbcb0ff796ea7d078bee13159f1d000f5d'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/fortify-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3115'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-22T17:54:44Z', 'nvd_published_at': None}
1.4.0
GHSA-2jc4-r94c-rp7h
2023-08-31T18:49:44Z
2023-08-21T09:30:21Z
null
['CVE-2022-46751']
Apache Ivy External Entity Reference vulnerability
Improper Restriction of XML External Entity Reference, XML Injection (aka Blind XPath Injection) vulnerability in Apache Software Foundation Apache Ivy.This issue affects any version of Apache Ivy prior to 2.5.2. When Apache Ivy prior to 2.5.2 parses XML files - either its own configuration, Ivy files or Apache Maven POMs - it will allow downloading external document type definitions and expand any entity references contained therein when used. This can be used to exfiltrate data, access resources only the machine running Ivy has access to or disturb the execution of Ivy in different ways. Starting with Ivy 2.5.2 DTD processing is disabled by default except when parsing Maven POMs where the default is to allow DTD processing but only to include a DTD snippet shipping with Ivy that is needed to deal with existing Maven POMs that are not valid XML files but are nevertheless accepted by Maven. Access can be be made more lenient via newly introduced system properties where needed. Users of Ivy prior to version 2.5.2 can use Java system properties to restrict processing of external DTDs, see the section about "JAXP Properties for External Access restrictions" inside Oracle's "Java API for XML Processing (JAXP) Security Guide".
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ivy:ivy'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46751'}, {'type': 'WEB', 'url': 'https://github.com/apache/ant-ivy/commit/2be17bc18b0e1d4123007d579e43ba1a4b6fab3d'}, {'type': 'WEB', 'url': 'https://docs.oracle.com/en/java/javase/13/security/java-api-xml-processing-jaxp-security-guide.html#GUID-94ABC0EE-9DC8-44F0-84AD-47ADD5340477'}, {'type': 'WEB', 'url': 'https://gitbox.apache.org/repos/asf?p=ant-ivy.git;a=commit;h=2be17bc18b0e1d4123007d579e43ba1a4b6fab3d'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/ant-ivy'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/1dj60hg5nr36kjr4p1100dwjrqookps8'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/9gcz4xrsn8c7o9gb377xfzvkb8jltffr'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/09/06/9'}]
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-21T20:39:45Z', 'nvd_published_at': None}
1.4.0
GHSA-826j-8wp2-4x6q
2023-08-25T18:42:53Z
2023-08-25T18:42:53Z
null
['CVE-2023-32079']
Netmaker Vulnerable to Privilege Escalation From Non Admin To Admin User
### Impact A Mass assignment vulnerability was found allowing a non-admin user to escalate privileges to admin user. ### Patches Issue is patched in 0.17.1, and fixed in 0.18.6+. If Users are using 0.17.1, they should run "docker pull gravitl/netmaker:v0.17.1" and "docker-compose up -d". This will switch them to the patched users If users are using v0.18.0-0.18.5, they should upgrade to v0.18.6 or later. ### Workarounds If using 0.17.1, can just pull the latest docker image of backend and restart server. ### References Credit to Project Discovery, and in particular https://github.com/rootxharsh , https://github.com/iamnoooob, and https://github.com/projectdiscovery
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/gravitl/netmaker'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.17.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/gravitl/netmaker'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.18.0'}, {'fixed': '0.18.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/gravitl/netmaker/security/advisories/GHSA-826j-8wp2-4x6q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32079'}, {'type': 'PACKAGE', 'url': 'https://github.com/gravitl/netmaker'}]
{'cwe_ids': ['CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-25T18:42:53Z', 'nvd_published_at': None}
1.4.0
GHSA-xcq3-7pf3-5jvc
2023-08-09T14:32:48Z
2023-08-06T18:30:25Z
null
['CVE-2023-4195']
Cockpit PHP Remote File Inclusion vulnerability
PHP Remote File Inclusion in GitHub repository cockpit-hq/cockpit prior to 2.6.3. Users may upload php files through the system file upload utility to obtain remote code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'cockpit-hq/cockpit'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4195'}, {'type': 'WEB', 'url': 'https://github.com/cockpit-hq/cockpit/commit/800c05f1984db291769ffa5fdfb1d3e50968e95b'}, {'type': 'PACKAGE', 'url': 'https://github.com/cockpit-hq/cockpit'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0bd5da2f-0e29-47ce-90f3-06518656bfd6'}]
{'cwe_ids': ['CWE-98'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T14:32:48Z', 'nvd_published_at': None}
1.4.0
GHSA-vx8m-6fhw-pccw
2023-08-21T20:13:05Z
2023-08-21T20:13:05Z
null
['CVE-2023-40178']
@node-saml/node-saml's validatePostRequestAsync does not include checkTimestampsValidityError
### Summary The lack of checking of current timestamp allows a LogoutRequest XML to be reused multiple times even when the current time is past the NotOnOrAfter. ### Details It was noticed that in the validatePostRequestAsync() flow in saml.js, the current timestamp is never checked. This could present a vulnerability where a user who has an XML LogoutRequest could validated it if the IssueInstance and the NotOnOrAfter are valid along with valid credentials (signature, certificate etc.). ### PoC I was able to validate a sample valid LogoutRequest XML multiple times through postman by sending it to my endpoint regardless if the current present time was past the NotOnOrAfter time. After some further testing, it seems that only the IssueInstance is checked against NotOnOrAfter. Not sure if this was the intended behaviour but I believe having a never expiring valid LogoutRequest could be dangerous. ### Impact This could impact the user where they would be logged out from an expired LogoutRequest. In bigger contexts, if LogoutRequests are sent out in mass to different SPs, this could impact many users on a large scale.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': '@node-saml/node-saml'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/node-saml/node-saml/security/advisories/GHSA-vx8m-6fhw-pccw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40178'}, {'type': 'WEB', 'url': 'https://github.com/node-saml/node-saml/commit/045e3b9c54211fdb95f96edf363679845b195cec'}, {'type': 'PACKAGE', 'url': 'https://github.com/node-saml/node-saml'}, {'type': 'WEB', 'url': 'https://github.com/node-saml/node-saml/releases/tag/v4.0.5'}]
{'cwe_ids': ['CWE-347', 'CWE-613'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-21T20:13:05Z', 'nvd_published_at': None}
1.4.0
GHSA-vmch-3w2x-vhgq
2023-08-09T12:56:43Z
2023-08-09T12:56:43Z
null
['CVE-2023-38180']
.NET Denial of Service Vulnerability
# Microsoft Security Advisory CVE-2023-38180: .NET Denial of Service Vulnerability ## <a name="executive-summary"></a>Executive summary Microsoft is releasing this security advisory to provide information about a vulnerability in ASP.NET Core 2.1, .NET 6.0, and .NET 7.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability. A vulnerability exists in Kestrel where, on detecting a potentially malicious client, Kestrel will sometimes fail to disconnect it, resulting in denial of service. ## Announcement Announcement for this issue can be found at https://github.com/dotnet/announcements/issues/269 ### <a name="mitigation-factors"></a>Mitigation factors If your application is running behind a reverse proxy, or Web Application Firewall, which has its own mitigations against HTTP based attacks this issue may be mitigated by the proxy or WAF ## <a name="affected-software"></a>Affected software * Any .NET 7.0 application running on .NET 7.0.8 or earlier. * Any .NET 6.0 application running on .NET 6.0.19 or earlier. If your application uses the following package versions, ensure you update to the latest version of .NET. ### <a name=".NET 7"></a>.NET 7 Package name | Affected version | Patched version ------------ | ---------------- | ------------------------- [Microsoft.AspNetCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-arm64) | >= 7.0.0, <= 7.0.9 | 7.0.10 [Microsoft.AspNetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-x64) | >= 7.0.0, <= 7.0.9 | 7.0.10 [Microsoft.AspNetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-x86) | >= 7.0.0, <= 7.0.9 | 7.0.10 ### <a name=".NET 6"></a>.NET 6 Package name | Affected version | Patched version ------------ | ---------------- | ------------------------- [Microsoft.AspNetCore.Server.Kestrel.Transport.Libuv](https://www.nuget.org/packages/Microsoft.AspNetCore.Server.Kestrel.Transport.Libuv) | >= 6.0.0, <= 6.0.20 | 6.0.21 [Microsoft.AspNetCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-arm64) | >= 6.0.0, <= 6.0.20 | 6.0.21 [Microsoft.AspNetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-x64) | >= 6.0.0, <= 6.0.20 | 6.0.21 [Microsoft.AspNetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-x86) | >= 6.0.0, <= 6.0.20 | 6.0.21 ### <a name="ASP.NET Core 2.1"></a>ASP.NET Core 2.1 Package name | Affected version | Patched version ------------ | ---------------- | ------------------------- [Microsoft.AspNetCore.Server.Kestrel.Transport.Libuv](https://www.nuget.org/packages/Microsoft.AspNetCore.Server.Kestrel.Transport.Libuv) | <= 2.1.39 | 2.1.40 [Microsoft.AspNetCore.Server.Kestrel.Transport.Sockets](https://www.nuget.org/packages/Microsoft.AspNetCore.Server.Kestrel.Transport.Sockets) | <= 2.1.39 | 2.1.40 ## Advisory FAQ ### <a name="how-affected"></a>How do I know if I am affected? If you have a runtime or SDK with a version listed, or an affected package listed in [affected software](#affected-software), you're exposed to the vulnerability. ### <a name="how-fix"></a>How do I fix the issue? * To fix the issue please install the latest version of .NET 6.0 or .NET 7.0. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs. * If you are using one of the affected packages, please update to the patched version listed above. * If you have .NET 6.0 or greater installed, you can list the versions you have installed by running the `dotnet --info` command. You will see output like the following; ``` .NET Core SDK (reflecting any global.json): Version: 6.0.300 Commit: 8473146e7d Runtime Environment: OS Name: Windows OS Version: 10.0.18363 OS Platform: Windows RID: win10-x64 Base Path: C:\Program Files\dotnet\sdk\6.0.300\ Host (useful for support): Version: 6.0.5 Commit: 8473146e7d .NET Core SDKs installed: 6.0.300 [C:\Program Files\dotnet\sdk] .NET Core runtimes installed: Microsoft.AspNetCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App] Microsoft.NETCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App] Microsoft.WindowsDesktop.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App] To install additional .NET Core runtimes or SDKs: https://aka.ms/dotnet-download ``` * If you're using .NET 7.0, you should download and install Runtime 7.0.10 or SDK 7.0.110 (for Visual Studio 2022 v17.4) from https://dotnet.microsoft.com/download/dotnet-core/7.0. * If you're using .NET 6.0, you should download and install Runtime 6.0.21 or SDK 6.0.316 (for Visual Studio 2022 v17.2) from https://dotnet.microsoft.com/download/dotnet-core/6.0. .NET 6.0 and and .NET 7.0 updates are also available from Microsoft Update. To access this either type "Check for updates" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates. Once you have installed the updated runtime or SDK, restart your apps for the update to take effect. Additionally, if you've deployed [self-contained applications](https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd) targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed. ## Other Information ### Reporting Security Issues If you have found a potential security issue in .NET 6.0 or .NET 7.0, please email details to secure@microsoft.com. Reports may qualify for the Microsoft .NET Core & .NET 5 Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at <https://aka.ms/corebounty>. ### Support You can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime and https://github.com/dotnet/aspnet/. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue. ### Disclaimer The information provided in this advisory is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. ### External Links [CVE-2023-38180]( https://www.cve.org/CVERecord?id=CVE-2023-38180) ### Revisions V1.0 (August 08, 2023): Advisory published. _Version 1.0_ _Last Updated 2023-08-08_
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-arm64'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.9'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-x64'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.9'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-x86'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.9'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Server.Kestrel.Transport.Libuv'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.21'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.20'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-arm64'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.21'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.20'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-x64'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.21'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.20'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-x86'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.21'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.20'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Server.Kestrel.Transport.Libuv'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.40'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.1.39'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Server.Kestrel.Transport.Sockets'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.40'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.1.39'}}]
[{'type': 'WEB', 'url': 'https://github.com/dotnet/runtime/security/advisories/GHSA-vmch-3w2x-vhgq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38180'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/runtime/issues/90170'}, {'type': 'PACKAGE', 'url': 'https://github.com/dotnet/runtime'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CL2L4WE5QRT7WEXANYXSKSU43APC5N2V/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWVZFKTLNMNKPZ755EMRYIA6GHFOWGKY/'}, {'type': 'WEB', 'url': 'https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38180'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T12:56:43Z', 'nvd_published_at': None}
1.4.0
GHSA-443m-3fr6-w8wj
2023-08-23T20:06:51Z
2023-08-17T21:30:53Z
null
['CVE-2023-36106']
PowerJob incorrect access control vulnerability
An incorrect access control vulnerability in powerjob 4.3.2 and earlier allows remote attackers to obtain sensitive information via the interface for querying via `appId` parameter to `/container/list`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'tech.powerjob:powerjob'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36106'}, {'type': 'WEB', 'url': 'https://gist.github.com/tztdsb/a653b6db328199ec0f55e54b4e466415#file-gistfile1-txt'}, {'type': 'PACKAGE', 'url': 'https://gitee.com/KFCFans/PowerJob'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-18T21:51:35Z', 'nvd_published_at': None}
1.4.0
GHSA-75p5-jwx4-qw9h
2023-08-09T14:34:42Z
2023-08-09T14:34:42Z
null
['CVE-2023-39524']
PrestaShop boolean SQL injection
### Impact SQL injection possible in product search field, in BO's product page ### Patches 8.1.1 ### Found by Aleksey Solovev (Positive Technologies) ### Workarounds none ### References none
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.1.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-75p5-jwx4-qw9h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39524'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/commit/2047d4c053043102bc46a37d383b392704bf14d7'}, {'type': 'PACKAGE', 'url': 'https://github.com/PrestaShop/PrestaShop'}]
{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T14:34:42Z', 'nvd_published_at': None}
1.4.0
GHSA-3fqw-j7x8-g75j
2023-08-16T21:11:04Z
2023-08-16T15:30:18Z
null
['CVE-2023-40344']
Jenkins Delphix Plugin missing permission check
Jenkins Delphix Plugin 3.0.2 and earlier does not perform a permission check in an HTTP endpoint. This allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack to capture the credentials using another vulnerability. An enumeration of credentials IDs in Delphix Plugin 3.0.3 requires the appropriate permissions.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:delphix'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40344'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3214%20(1)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/16/3'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:11:04Z', 'nvd_published_at': None}
1.4.0
GHSA-c8xw-vjgf-94hr
2023-08-31T00:03:04Z
2023-08-23T17:50:41Z
null
['CVE-2023-40025']
Argo CD web terminal session doesn't expire
### Impact All versions of Argo CD starting from v2.6.0 have a bug where open web terminal sessions do not expire. This bug allows users to send any websocket messages even if the token has already expired. The most straightforward scenario is when a user opens the terminal view and leaves it open for an extended period. This allows the user to view sensitive information even when they should have been logged out already. ### Patches A patch for this vulnerability has been released in the following Argo CD version: * v2.6.14 * v2.7.12 * v2.8.1 ### Workarounds The only way to completely resolve the issue is to upgrade. #### Mitigations Disable web-based terminal or define RBAC rules to it [https://argo-cd.readthedocs.io/en/latest/operator-manual/web_based_terminal/](https://argo-cd.readthedocs.io/en/latest/operator-manual/web_based_terminal/) ### For more information If you have any questions or comments about this advisory: * Open an issue in [the Argo CD issue tracker](https://github.com/argoproj/argo-cd/issues) or [discussions](https://github.com/argoproj/argo-cd/discussions) * Join us on [Slack](https://argoproj.github.io/community/join-slack) in channel #argo-cd ### Credits Thank you to bean.zhang (@zhlu32 ) of HIT-IDS ChunkL Team who discovered the issue and reported it confidentially according to our [guidelines](https://github.com/argoproj/argo-cd/blob/master/SECURITY.md#reporting-a-vulnerability).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.14'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.12'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}], 'versions': ['2.8.0']}]
[{'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/security/advisories/GHSA-c8xw-vjgf-94hr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40025'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/commit/e047efa8f9518c54d00d2e4493b64bc4dba98478'}, {'type': 'PACKAGE', 'url': 'https://github.com/argoproj/argo-cd'}]
{'cwe_ids': ['CWE-613'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-23T17:50:41Z', 'nvd_published_at': None}
1.4.0
GHSA-6r78-m64m-qwcf
2023-08-25T18:58:25Z
2023-08-10T19:25:23Z
null
[]
Moq v4.20.0-rc to 4.20.1 share hashed user data
Moq v4.20.0-rc to 4.20.1 include support for [SponsorLink](https://github.com/devlooped/SponsorLink), which runs an obfuscated DLL at build time that scans local `git config` data and shares the user's hashed email address with SponsorLink's remote servers. There is no option to disable this. Moq v4.20.2 has removed this functionality.
[]
[{'package': {'ecosystem': 'NuGet', 'name': 'moq'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.20.0-rc'}, {'fixed': '4.20.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/moq/moq/issues/1374'}, {'type': 'WEB', 'url': 'https://github.com/moq/moq/pull/1363'}, {'type': 'WEB', 'url': 'https://github.com/moq/moq/pull/1375'}, {'type': 'PACKAGE', 'url': 'https://github.com/moq/moq'}, {'type': 'WEB', 'url': 'https://www.cazzulino.com/sponsorlink.html'}]
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-10T19:25:23Z', 'nvd_published_at': None}
1.4.0
GHSA-jrj6-qx48-3cpq
2023-08-18T14:29:06Z
2023-08-16T15:30:18Z
null
['CVE-2023-40351']
Jenkins Favorite View Plugin cross-site request forgery vulnerability
Jenkins Favorite View Plugin 5.v77a_37f62782d and earlier does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability. This vulnerability allows attackers to add or remove views from another user’s favorite views tab bar. As of publication of this advisory, there is no fix.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:favorite-view'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.v77a'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40351'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3201'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/16/3'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:04:29Z', 'nvd_published_at': None}
1.4.0
GHSA-8m9p-3926-gffr
2023-08-17T19:08:16Z
2023-08-08T18:30:35Z
null
['CVE-2023-38758']
wger Workout Manager Cross-site Scripting vulnerability
Cross Site Scripting vulnerability in wger Project wger Workout Manager v.2.2.0a3 allows a remote attacker to gain privileges via the `license_author `field in the add-ingredient function in the `templates/ingredients/view.html`, `models/ingredients.py`, and `views/ingredients.py` components.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'wger'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.0a3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38758'}, {'type': 'WEB', 'url': 'https://github.com/0x72303074/CVE-Disclosures'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/wger/PYSEC-2023-143.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/wger-project/wger'}, {'type': 'WEB', 'url': 'https://wger.de'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-17T19:08:16Z', 'nvd_published_at': None}
1.4.0
GHSA-5cv4-48h7-7782
2023-08-17T19:06:36Z
2023-08-17T06:30:13Z
null
['CVE-2023-4395']
Cockpit Cross-site Scripting vulnerability
Cross-site Scripting (XSS) - Stored in GitHub repository cockpit-hq/cockpit 2.6.3 and prior. A patch is available at commit 36d1d4d256cbbab028342ba10cc493e5c119172c and anticipated to be part of version 2.6.4.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'cockpit-hq/cockpit'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4395'}, {'type': 'WEB', 'url': 'https://github.com/cockpit-hq/cockpit/commit/36d1d4d256cbbab028342ba10cc493e5c119172c'}, {'type': 'PACKAGE', 'url': 'https://github.com/cockpit-hq/cockpit'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/60e38563-7ac8-4a13-ac04-2980cc48b0da'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-17T19:06:36Z', 'nvd_published_at': None}
1.4.0
GHSA-v7v8-gjv7-ffmr
2023-08-16T21:00:33Z
2023-08-16T21:00:33Z
null
['CVE-2023-26140']
@excalidraw/excalidraw Cross-site Scripting vulnerability
### Impact XSS vulnerability due to improperly sanitizing URLs of links that can be attached on canvas elements. This affects users of the npm package `@excalidraw/excalidraw` provided it was deployed in environments where untrusted user input in drawings that are then shared with third parties is a concern. If you only hosted the editor in trusted environments, or sharing didn't take place, the impact is minimized. ### Patches Patch is available on version 0.15.3 and up (stable), or latest `@excalidraw/excalidraw@next` (unstable releases). ### Workarounds No workaround without upgrading unless deployed in environments without untrusted user input. ### References https://security.snyk.io/vuln/SNYK-JS-EXCALIDRAWEXCALIDRAW-5841658 https://github.com/excalidraw/excalidraw/pull/6728
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@excalidraw/excalidraw'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/excalidraw/excalidraw/security/advisories/GHSA-v7v8-gjv7-ffmr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26140'}, {'type': 'WEB', 'url': 'https://github.com/excalidraw/excalidraw/pull/6728'}, {'type': 'WEB', 'url': 'https://github.com/excalidraw/excalidraw/commit/b33fa6d6f64d27adc3a47b25c0aa55711740d0af'}, {'type': 'PACKAGE', 'url': 'https://github.com/excalidraw/excalidraw'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-EXCALIDRAWEXCALIDRAW-5841658'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:00:33Z', 'nvd_published_at': None}
1.4.0
GHSA-j5g3-5c8r-7qfx
2023-08-30T21:24:57Z
2023-08-30T21:24:57Z
null
[]
Prevent logging invalid header values
## Impact ### What kind of vulnerability is it? Apollo Server can log sensitive information (Studio API keys) if they are passed incorrectly (with leading/trailing whitespace) or if they have any characters that are invalid as part of a header value. ### Who is impacted? Users who (all of the below): * use either the schema reporting or usage reporting feature * use an Apollo Studio API key which has invalid header values * use the default fetcher (`node-fetch`) or configured their own `node-fetch` fetcher The following node snippet can test whether your API key has invalid header values. This code is taken directly from `node-fetch@2`'s header value validation code. ```js const invalidHeaderCharRegex = /[^\t\x20-\x7e\x80-\xff]/; if (invalidHeaderCharRegex.test('<YOUR_API_KEY>')) { console.log('potentially affected'); } console.log('unaffected'); ``` If the provided API key is not a valid header value, whenever Apollo Server uses that API key in a request (to Studio, for example), `node-fetch` will throw an error _which contains the header value_. This error is logged in various ways depending on the user's configuration, but most likely the console or some configured logging service. ### Patches This problem is patched in the latest version of Apollo Server as soon as this advisory is published. ### Workarounds * Try retrieving a new API key from Studio. Note: this may not work if the invalid character is not part of the secret (it may be derived from identifiers like graph name, user name). * Override the `fetcher` * Disable schema reporting and/or usage reporting ### Solution * Apollo Server will now call `.trim()` on incoming API keys in order to eliminate leading/trailing whitespace and log a warning when it does so. * Apollo Server will now perform the same validation of API keys as `node-fetch@2` performs on header values on startup. Apollo Server will throw an error on startup (i.e., fail to start completely) and notify the user their API key is invalid along with the offending characters.
[]
[{'package': {'ecosystem': 'npm', 'name': '@apollo/server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.9.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'apollo-server-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.12.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'apollo-server-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.26.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/apollographql/apollo-server/security/advisories/GHSA-j5g3-5c8r-7qfx'}, {'type': 'WEB', 'url': 'https://github.com/apollographql/apollo-server/commit/2c8106c433c4add4b43e2e2b2f5c5c4887b17314'}, {'type': 'WEB', 'url': 'https://github.com/apollographql/apollo-server/commit/d38b43bac88acdef4295759d7dcc3d4c348d9575'}, {'type': 'PACKAGE', 'url': 'https://github.com/apollographql/apollo-server'}]
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-30T21:24:57Z', 'nvd_published_at': None}
1.4.0
GHSA-m6pf-cm3f-7876
2023-08-15T20:03:24Z
2023-08-15T03:31:32Z
null
['CVE-2023-4347']
LibreNMS Cross-site Scripting vulnerability
Cross-site Scripting (XSS) - Reflected in GitHub repository librenms/librenms 23.7.0 and prior. A patch is available at commit 91c57a1ee54631e071b6b0c952d99c8ee892e824 and anticiapted to be part of version 23.8.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '23.8.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 23.7.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4347'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/91c57a1ee54631e071b6b0c952d99c8ee892e824'}, {'type': 'PACKAGE', 'url': 'https://github.com/librenms/librenms'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1f78c6e1-2923-46c5-9376-4cc5a8f1152f'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-15T20:03:24Z', 'nvd_published_at': None}
1.4.0
GHSA-5m5f-qg8r-p9qf
2023-08-18T21:51:39Z
2023-08-17T21:30:53Z
null
['CVE-2023-40313']
OpenNMS vulnerable to remote code execution
A BeanShell interpreter in remote server mode runs in OpenNMS Horizon versions earlier than 32.0.2 and in related Meridian versions which could allow arbitrary remote Java code execution. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.opennms:opennms-base-assembly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '32.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40313'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/pull/6368'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/commit/2909448b039bd46241efa52c450ffdb4f5a7dee1'}, {'type': 'WEB', 'url': 'https://docs.opennms.com/horizon/32/releasenotes/changelog.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenNMS/opennms'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-18T21:51:39Z', 'nvd_published_at': None}
1.4.0
GHSA-ff45-2jp9-69jc
2023-08-21T20:18:07Z
2023-08-19T03:32:19Z
null
['CVE-2023-4433']
Cockpit Cross-site Scripting vulnerability
Cross-site Scripting (XSS) - Stored in GitHub repository cockpit-hq/cockpit version 2.6.3 and prior. A patch is available at commit 36d1d4d256cbbab028342ba10cc493e5c119172c and anticipated to be part of version 2.6.4.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'cockpit-hq/cockpit'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4433'}, {'type': 'WEB', 'url': 'https://github.com/cockpit-hq/cockpit/commit/36d1d4d256cbbab028342ba10cc493e5c119172c'}, {'type': 'PACKAGE', 'url': 'https://github.com/cockpit-hq/cockpit'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/64f3253d-6852-4b9f-b870-85e896007b1a'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-21T20:18:07Z', 'nvd_published_at': None}
1.4.0
GHSA-97mg-9jhf-r7rm
2023-08-16T21:06:45Z
2023-08-16T15:30:18Z
null
['CVE-2023-40347']
Jenkins Maven Artifact ChoiceListProvider (Nexus) Plugin vulnerable to exposure of system-scoped credentials
Jenkins Maven Artifact ChoiceListProvider (Nexus) Plugin 1.14 and earlier does not set the appropriate context for credentials lookup, allowing the use of System-scoped credentials otherwise reserved for the global configuration. This allows attackers with Item/Configure permission to access and capture credentials they are not entitled to. As of publication of this advisory, there is no fix.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:maven-artifact-choicelistprovider'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.14'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40347'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3153'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/16/3'}]
{'cwe_ids': ['CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:06:45Z', 'nvd_published_at': None}
1.4.0
GHSA-gvvx-fc6p-2h9x
2023-08-21T20:46:50Z
2023-08-21T12:30:19Z
2023-08-21T20:46:50Z
[]
Duplicate Advisory: Wallabag user can delete own API client unintentionally
## Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-gjvc-55fw-v6vq. This link is maintained to preserve external references. ## Original Description Cross-Site Request Forgery (CSRF) in GitHub repository wallabag/wallabag prior to 2.6.3.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'wallabag/wallabag'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-alpha.1'}, {'fixed': '2.6.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.6.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4455'}, {'type': 'WEB', 'url': 'https://github.com/wallabag/wallabag/commit/ffcc5c9062fcc8cd922d7d6d65edbe5efae96806'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/5ab1b206-5fe8-4737-b275-d705e76f193a'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-21T20:46:50Z', 'nvd_published_at': None}
1.4.0
GHSA-cf7p-gm2m-833m
2023-08-15T20:39:56Z
2023-07-14T21:31:08Z
null
['CVE-2023-38325']
cryptography mishandles SSH certificates
The cryptography package before 41.0.2 for Python mishandles SSH certificates that have critical options.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'cryptography'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '40.0.0'}, {'fixed': '41.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38325'}, {'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/issues/9207'}, {'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/pull/7960'}, {'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/pull/9208'}, {'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/commit/1ca7adc97b76a9dfbd3d850628b613eb93b78fc3'}, {'type': 'PACKAGE', 'url': 'https://github.com/pyca/cryptography'}, {'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/compare/41.0.1...41.0.2'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/cryptography/PYSEC-2023-112.yaml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMCCTYY3CSNQBFFYYC5DAV6KATHWCUZK/'}, {'type': 'WEB', 'url': 'https://pypi.org/project/cryptography/#history'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230824-0010/'}]
{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T22:14:26Z', 'nvd_published_at': None}
1.4.0
GHSA-wqc8-x2pr-7jqh
2023-07-11T19:40:20Z
2023-07-10T21:53:22Z
null
['CVE-2023-37271']
RestrictedPython vulnerable to arbitrary code execution via stack frame sandbox escape
### Impact RestrictedPython does not check access to stack frames and their attributes. Stack frames are accessible within at least generators and generator expressions, which are allowed inside RestrictedPython. An attacker with access to a RestrictedPython environment can write code that gets the current stack frame in a generator and then walk the stack all the way beyond the RestrictedPython invocation boundary, thus breaking out of the restricted scope allowing the call of unrestricted Python code and therefore potentially allowing arbitrary code execution in the Python interpreter. All RestrictedPython deployments that allow untrusted users to write Python code in the RestrictedPython environment are at risk. In terms of Zope and Plone, this would mean deployments where the administrator allows untrusted users to create and/or edit objects of type `Script (Python)`, `DTML Method`, `DTML Document` or `Zope Page Template`. This is a non-default configuration and likely to be extremely rare. ### Patches The problem has been fixed in releases 5.3 and 6.1. ### Workarounds There is no workaround available. If you cannot upgrade to the latest release you should ensure the RestrictedPython environment is only available for trusted users. ### References - [RestrictedPython security advisory GHSA-wqc8-x2pr-7jqh](https://github.com/zopefoundation/RestrictedPython/security/advisories/GHSA-wqc8-x2pr-7jqh) ## For more information If you have any questions or comments about this advisory: - Open an issue in the [RestrictedPython issue tracker](https://github.com/zopefoundation/RestrictedPython/issues) - Email us at [security@plone.org](mailto:security@plone.org) ## Credits Thanks for analysing and reporting the go to: - Nakul Choudhary (Quasar0147 on GitHub) - despawningbone on GitHub - Robert Xiao (nneonneo on GitHub)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'RestrictedPython'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'RestrictedPython'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0a1.dev0'}, {'fixed': '6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'restrictedpython'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/zopefoundation/RestrictedPython/security/advisories/GHSA-wqc8-x2pr-7jqh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37271'}, {'type': 'WEB', 'url': 'https://github.com/zopefoundation/RestrictedPython/commit/c8eca66ae49081f0016d2e1f094c3d72095ef531'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/restrictedpython/PYSEC-2023-118.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/zopefoundation/RestrictedPython'}]
{'cwe_ids': ['CWE-913'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-10T21:53:22Z', 'nvd_published_at': None}
1.4.0
GHSA-ppxx-m926-g569
2023-08-08T21:28:39Z
2023-07-06T19:24:01Z
null
['CVE-2022-24697']
Apache Kylin vulnerable to remote code execution
Kylin's cube designer function has a command injection vulnerability when overwriting system parameters in the configuration overwrites menu. RCE can be implemented by closing the single quotation marks around the parameter value of “-- conf=” to inject any operating system command into the command line parameters. This vulnerability affects Kylin 2 version 2.6.5 and earlier, Kylin 3 version 3.1.2 and earlier, and Kylin 4 version 4.0.1 and earlier.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin-core-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin-spark-project'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin-server-base'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24697'}, {'type': 'WEB', 'url': 'https://github.com/apache/kylin/pull/1811'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/kylin'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/07mnn9c7o314wrhrwjr10w9j5s82voj4'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/12/30/1'}]
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T21:23:09Z', 'nvd_published_at': '2022-10-13T13:15:00Z'}
1.4.0
GHSA-wxf3-4fvj-vqqx
2023-09-06T19:20:43Z
2023-07-27T19:28:02Z
null
[]
Unsafe plugins can be installed via pack import by tenant admins
### Summary Unsafe plugins (for instance `sql-list`) can be installed in subdomain tenants via pack import even if unsafe plugin installation for tenants is disables ### Details I have an example https://bot20230704.saltcorn.com/view/all_plugins It's publicly accessible (but has not so secure values except list of tenants). But using this mech one can read **any** data from other tenants. ### Impact All tenants of installation (i.e. `saltcorn.com`), can be compromised from tenant user has admin access. If an untrusted user has admin rights to a tenant instance, they will be able to install a plug-in that can access information from other tenants ### Revived after 0.8.7 After patch in 0.8.7 this is not fixed completely. Here are steps to reproduce: 1. Publish to NPM plugin that was not approved by admin (in case of saltcorn.com) by @glutamate. I've just published this one: https://www.npmjs.com/package/saltcorn-qrcode 2. Publish somewhere plugin store that includes plugin from previous step: https://gist.github.com/pyhedgehog/f1fd7cb13f4d0a7ccf6a965748d19bd2 3. Add plugin store link to tenant store. 4. Install plugin. 5. Use it in tenant: https://bot20230704.saltcorn.com/view/testqr_show/1 Here are logic: Unsafe plugins checked against this list: https://github.com/saltcorn/saltcorn/blob/99fe277e497fd193bb070acd8c663aa254a9907c/packages/server/load_plugins.js#L191 But it's under control of tenant admin, not server admin. Proposed login: ```javascript const safes = getRootState().getConfig("available_plugins",[]).filter(p=>!p.unsafe).map(p=>p.location); ```
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': '@saltcorn/cli'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/saltcorn/saltcorn/security/advisories/GHSA-wxf3-4fvj-vqqx'}, {'type': 'WEB', 'url': 'https://github.com/saltcorn/saltcorn/pull/1973'}, {'type': 'WEB', 'url': 'https://github.com/saltcorn/saltcorn/commit/0f32a51277a635c814a634bda9b6d358fb8c04ab'}, {'type': 'PACKAGE', 'url': 'https://github.com/saltcorn/saltcorn'}, {'type': 'WEB', 'url': 'https://github.com/saltcorn/saltcorn/blob/99fe277e497fd193bb070acd8c663aa254a9907c/packages/server/load_plugins.js#L191'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-27T19:28:02Z', 'nvd_published_at': None}
1.4.0
GHSA-ggwr-4vr8-g7wv
2023-07-21T18:14:14Z
2023-07-12T12:31:36Z
null
['CVE-2023-22887']
Apache Airflow Path Traversal vulnerability
Apache Airflow, versions before 2.6.3, is affected by a vulnerability that allows an attacker to perform unauthorized file access outside the intended directory structure by manipulating the run_id parameter. This vulnerability is considered low since it requires an authenticated user to exploit it. It is recommended to upgrade to a version that is not affected
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22887'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/32293'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/commit/05bd90f563649f2e9c8f0c85cf5838315a665a02'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/apache-airflow/PYSEC-2023-104.yaml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/rxddqs76r6rkxsg1n24d029zys67qwwo'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T17:30:42Z', 'nvd_published_at': None}
1.4.0
GHSA-9xg4-3qfm-9w8f
2023-07-25T17:17:37Z
2023-07-25T17:17:37Z
null
['CVE-2023-34235']
Leaking sensitive user information still possible by filtering on private with prefix fields
### Summary Still able to leak private fields if using the t(number) prefix ### Details Knex query allows you to change there default prefix ```SqliteError: select distinct `t0`.* from `pages` as `t0` left join `admin_users` as `t1` on `t0`.`updated_by_id` = `t1`.`id` where (`t1`.`password` = 1)``` so if you change the prefix to the same as it was before or to an other table you want to query you query changes from password to t1.password password is protected by filtering protections but t1.password is not protected ### PoC 1 Create a contentType 2 add to its options "populateCreatorFields" 3 create 1 entity in your new content type 4 in settings enable the find route in settings for the content type you created for public 5 /api/(Your contenttype)?filters%5BupdatedBy%5D%5Bt1.password%5D%5B%24startsWith%5D=a%24 And now the api returns noting if you were to do /api/(Your contenttype)?filters%5BupdatedBy%5D%5Bt1.password%5D%5B%24startsWith%5D=%24 it would return your entity ### Impact You can do filtering attacks on everything related to the object again including admin passwords and reset-tokens.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@strapi/database'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.10.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.10.7'}}, {'package': {'ecosystem': 'npm', 'name': '@strapi/utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.10.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.10.7'}}]
[{'type': 'WEB', 'url': 'https://github.com/strapi/strapi/security/advisories/GHSA-9xg4-3qfm-9w8f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34235'}, {'type': 'PACKAGE', 'url': 'https://github.com/strapi/strapi'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/releases/tag/v4.10.8'}]
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T17:17:37Z', 'nvd_published_at': None}
1.4.0
GHSA-4hm4-94g6-f23f
2023-07-12T22:31:25Z
2023-07-12T18:30:38Z
null
['CVE-2023-37949']
Jenkins Orka by MacStadium Plugin missing permission check
Jenkins Orka by MacStadium Plugin 1.33 and earlier does not perform a permission check in an HTTP endpoint. This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. Orka by MacStadium Plugin 1.34 requires Overall/Administer permission to access the affected HTTP endpoint.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:macstadium-orka'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.34'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37949'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-07-12/#SECURITY-3128'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/07/12/2'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T22:31:25Z', 'nvd_published_at': None}
1.4.0
GHSA-h4vp-69r8-gvjg
2023-07-14T21:53:52Z
2023-07-14T21:53:52Z
null
['CVE-2023-37462']
org.xwiki.platform:xwiki-platform-skin-ui Eval Injection vulnerability
### Impact Improper escaping in the document `SkinsCode.XWikiSkinsSheet` leads to a possible privilege escalation from view right on that document to programming rights, or in other words, it is possible to execute arbitrary script macros including Groovy and Python macros that allow remote code execution including unrestricted read and write access to all wiki contents. The attack works by opening a non-existing page with a name crafted to contain a dangerous payload. It is possible to check if an existing installation is vulnerable by opening `<xwiki-host>/xwiki/bin/view/%22%5D%5D%20%7B%7Basync%20async%3D%22true%22%20cached%3D%22false%22%20context%3D%22doc.reference%22%7D%7D%7B%7Bgroovy%7D%7Dprintln(%22Hello%20%22%20%2B%20%22from%20groovy!%22)%7B%7B%2Fgroovy%7D%7D%7B%7B%2Fasync%7D%7D?sheet=SkinsCode.XWikiSkinsSheet&xpage=view` where <xwiki-host is the URL of the XWiki installation. The expected result are two list items with "Edit this skin" and "Test this skin" without any further text. If the installation is vulnerable, the second list item is "Test this skin Hello from groovy!.WebHome"]]". This shows that the Groovy macro has been executed. ### Patches This has been patched in XWiki 14.4.8, 14.10.4 and 15.0-rc-1. ### Workarounds The [fix](https://github.com/xwiki/xwiki-platform/commit/d9c88ddc4c0c78fa534bd33237e95dea66003d29) can also be applied manually to the impacted document `SkinsCode.XWikiSkinsSheet`. ### References * https://jira.xwiki.org/browse/XWIKI-20457 * https://github.com/xwiki/xwiki-platform/commit/d9c88ddc4c0c78fa534bd33237e95dea66003d29 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-skin-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0-rc-1'}, {'fixed': '14.4.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-skin-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.10.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-h4vp-69r8-gvjg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37462'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/d9c88ddc4c0c78fa534bd33237e95dea66003d29'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20457'}]
{'cwe_ids': ['CWE-74', 'CWE-95'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T21:53:52Z', 'nvd_published_at': None}
1.4.0
GHSA-r5pv-7g89-cxmc
2023-08-03T16:25:00Z
2023-07-25T09:30:18Z
null
['CVE-2023-35088']
SQL injection in audit endpoint
Improper Neutralization of Special Elements Used in an SQL Command ('SQL Injection') vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.7.0.  In the toAuditCkSql method, the groupId, streamId, auditId, and dt are directly concatenated into the SQL query statement, which may lead to SQL injection attacks. Users are advised to upgrade to Apache InLong's 1.8.0 or cherry-pick [1] to solve it. [1] https://github.com/apache/inlong/pull/8198
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.inlong:manager-service'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.8.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35088'}, {'type': 'WEB', 'url': 'https://github.com/apache/inlong/pull/8198'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/inlong'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/os7b66x4n8dbtrdpb7c6x37bb1vjb0tk'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2023/Jul/43'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/07/25/4'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T19:24:11Z', 'nvd_published_at': None}
1.4.0
GHSA-9gjg-834p-5gvv
2023-08-01T20:09:43Z
2023-07-24T18:30:44Z
2023-08-01T20:09:43Z
[]
Duplicate Advisory: Keylime's registrar vulnerable to Denial-of-service attack via a single open connection
## Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-pg75-v6fp-8q59. This link is maintained to preserve external references. ## Original Description A flaw was found in Keylime. Due to their blocking nature, the Keylime registrar is subject to a remote denial of service against its SSL connections. This flaw allows an attacker to exhaust all available connections.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'keylime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38200'}, {'type': 'WEB', 'url': 'https://github.com/keylime/keylime/pull/1421'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2023-38200'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2222692'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T20:09:43Z', 'nvd_published_at': None}
1.4.0
GHSA-pwrw-g29q-3mp8
2023-07-06T23:57:40Z
2023-07-06T21:30:28Z
null
['CVE-2023-3531']
TeamPass Cross-site Scripting vulnerability
Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.10.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'nilsteampassnet/teampass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3531'}, {'type': 'WEB', 'url': 'https://github.com/nilsteampassnet/teampass/commit/cb8ea5ccca61653895bb6881547e463baa50293d'}, {'type': 'PACKAGE', 'url': 'https://github.com/nilsteampassnet/teampass'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c9f0b3ff-bbc4-4ea1-a59e-8594b48bb414'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T23:57:40Z', 'nvd_published_at': None}
1.4.0
GHSA-4qcv-qf38-5j3j
2023-07-25T18:04:28Z
2023-07-25T18:04:28Z
null
['CVE-2023-2850']
Unintentional leakage of private information via cross-origin websocket session hijacking
### Impact Private messages or posts might be leaked to third parties if victim opens the attackers site while browsing nodebb. ### Patches * Patched in v3.1.3 * Backported to v2.x line via v2.8.13 ### Workarounds Users can cherry-pick https://github.com/NodeBB/NodeBB/commit/51096ad2345fb1d1380bec0a447113489ef6c359 if they are on v3.x If you are running v2.x of NodeBB, you can cherry-pick a5d92da9ddac5607ab7f737520a66eaed6d3ddee followed by 62e162cf1e735e42462be1db9b4954b5a69accdf
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'nodebb'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'nodebb'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.13'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/security/advisories/GHSA-4qcv-qf38-5j3j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2850'}, {'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/commit/51096ad2345fb1d1380bec0a447113489ef6c359'}, {'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/commit/62e162cf1e735e42462be1db9b4954b5a69accdf'}, {'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/commit/a5d92da9ddac5607ab7f737520a66eaed6d3ddee'}, {'type': 'PACKAGE', 'url': 'https://github.com/NodeBB/NodeBB'}, {'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/releases/tag/v3.1.3'}]
{'cwe_ids': ['CWE-1385', 'CWE-346'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T18:04:28Z', 'nvd_published_at': None}
1.4.0
GHSA-rxvj-5mv6-j5mc
2023-07-28T20:44:06Z
2023-07-28T09:30:29Z
null
['CVE-2023-3990']
Cross-site Scripting in Mingsoft MCMS
A Cross-site Scripting vulnerability has been found in Mingsoft MCMS up to 5.3.1. This affects an unknown part of the file search.do of the component HTTP POST Request Handler. The manipulation of the argument style leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-235611.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.3.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3990'}, {'type': 'WEB', 'url': 'https://gitee.com/mingSoft/MCMS/issues/I7K4DQ'}, {'type': 'PACKAGE', 'url': 'https://github.com/ming-soft/MCMS'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.235611'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.235611'}]
{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T20:44:06Z', 'nvd_published_at': None}
1.4.0
GHSA-2h84-3crq-vgfj
2023-07-21T18:00:02Z
2023-07-12T12:31:36Z
null
['CVE-2023-35908']
Apache Airflow Incorrect Authorization vulnerability
Apache Airflow, versions before 2.6.3, is affected by a vulnerability that allows unauthorized read access to a DAG through the URL. It is recommended to upgrade to a version that is not affected
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ecosystem_specific': {'affected_functions': ['airflow.www.auth.has_access']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35908'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/32014'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/commit/ac65b82eeeeaa670e09a83c7da65cbac7e89f8db'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/apache-airflow/PYSEC-2023-119.yaml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/vsflptk5dt30vrfggn96nx87d7zr6yvw'}]
{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T17:30:21Z', 'nvd_published_at': None}
1.4.0
GHSA-5v46-54vj-4mjq
2023-07-20T13:58:04Z
2023-07-12T18:30:39Z
null
['CVE-2023-37964']
Jenkins ElasticBox CI Plugin vulnerable to cross-site request forgery
Jenkins ElasticBox CI Plugin 5.0.1 and earlier does not perform permission checks in several HTTP endpoints. This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. Additionally, these HTTP endpoints do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:elasticbox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37964'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-07-12/#SECURITY-3131'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/07/12/2'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T22:29:58Z', 'nvd_published_at': None}
1.4.0
GHSA-4mh8-9wq6-rjxg
2023-07-20T18:54:13Z
2023-07-20T18:54:13Z
null
['CVE-2023-37471']
OpenAM vulnerable to user impersonation using SAMLv1.x SSO process
### Impact OpenAM up to version 14.7.2 does not properly validate the signature of SAML responses received as part of the SAMLv1.x Single Sign-On process. Attackers can use this fact to impersonate any OpenAM user, including the administrator, by sending a specially crafted SAML response to the SAMLPOSTProfileServlet servlet. ### Patches This problem has been patched in OpenAM 14.7.3-SNAPSHOT and later ### Workarounds One should comment servlet `SAMLPOSTProfileServlet` in web.xml or disable SAML in OpenAM ```xml <servlet> <description>SAMLPOSTProfileServlet</description> <servlet-name>SAMLPOSTProfileServlet</servlet-name> <servlet-class>com.sun.identity.saml.servlet.SAMLPOSTProfileServlet</servlet-class> </servlet> ... <servlet-mapping> <servlet-name>SAMLSOAPReceiver</servlet-name> <url-pattern>/SAMLSOAPReceiver</url-pattern> </servlet-mapping> ``` ### References #624
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.openidentityplatform.openam:openam-federation-library'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '14.7.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/OpenIdentityPlatform/OpenAM/security/advisories/GHSA-4mh8-9wq6-rjxg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37471'}, {'type': 'WEB', 'url': 'https://github.com/OpenIdentityPlatform/OpenAM/pull/624'}, {'type': 'WEB', 'url': 'https://github.com/OpenIdentityPlatform/OpenAM/commit/7c18543d126e8a567b83bb4535631825aaa9d742'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenIdentityPlatform/OpenAM'}]
{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T18:54:13Z', 'nvd_published_at': None}