schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
stringlengths 20
20
⌀ | aliases
stringlengths 2
20
| summary
stringlengths 20
140
| details
stringlengths 56
37.2k
| severity
stringlengths 2
92
| affected
stringlengths 88
7.07k
| references
stringlengths 139
4.72k
| database_specific
stringlengths 131
185
|
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0
|
GHSA-p267-jjfq-pphf
|
2023-08-16T12:56:34Z
|
2023-08-11T09:30:36Z
| null |
['CVE-2023-4106']
|
Mattermost fails to check if user is a guest before performing actions on public playbooks
|
Mattermost fails to check if the requesting user is a guest before performing different actions to public playbooks, resulting a guest being able to view, join, edit, export and archive public playbooks.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.9.0'}, {'fixed': '7.9.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.9.5'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.10.0'}, {'fixed': '7.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.10.3'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.8.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.8.7'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4106'}, {'type': 'PACKAGE', 'url': 'https://github.com/mattermost/mattermost'}, {'type': 'WEB', 'url': 'https://mattermost.com/security-updates'}]
|
{'cwe_ids': ['CWE-284', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T21:49:05Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-rvjp-j5j4-c9j5
|
2023-08-16T19:25:37Z
|
2023-08-11T15:30:45Z
| null |
['CVE-2020-20523']
|
Gila CMS Cross-site Scripting Vulnerability
|
Cross Site Scripting (XSS) vulnerability in `adm_user` parameter in Gila CMS version 1.11.3, allows remote attackers to execute arbitrary code during the Gila CMS installation.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'gilacms/gila'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.11.3'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-20523'}, {'type': 'WEB', 'url': 'https://github.com/GilaCMS/gila/issues/41'}, {'type': 'PACKAGE', 'url': 'https://github.com/GilaCMS/gila'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T21:04:04Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-p8rx-fwgq-rh2f
|
2023-08-09T13:15:38Z
|
2023-08-09T13:15:38Z
| null |
['CVE-2023-35390']
|
.NET Remote Code Execution Vulnerability
|
# Microsoft Security Advisory CVE-2023-35390: .NET Remote Code Execution Vulnerability
## <a name="executive-summary"></a>Executive summary
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 7.0 and .NET 6.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.
A vulnerability exists when some dotnet commands are used in directories with weaker permissions which can result in remote code execution.
## Announcement
Announcement for this issue can be found at https://github.com/dotnet/announcements/issues/266
### <a name="mitigation-factors"></a>Mitigation factors
Microsoft has not identified any mitigating factors for this vulnerability.
## <a name="affected-software"></a>Affected software
* Any .NET 7.0.1xx SDK 7.0.109 or earlier.
* Any .NET 7.0.3xx SDK 7.0.306 or earlier.
* Any .NET 6.0.1xx SDK 6.0.120 or earlier.
* Any .NET 6.0.3xx SDK 6.0.315 or earlier.
* Any .NET 6.0.4xx SDK 6.0.412 or earlier.
If your application uses the following package versions, ensure you update to the latest version of .NET.
### <a name=".NET 7"></a>.NET 7
Package name | Affected version | Patched version
------------ | ---------------- | -------------------------
[ Microsoft.NET.Build.Containers](https://www.nuget.org/packages/Microsoft.NET.Build.Containers) | <= 7.0.306 | 7.0.307, 7.0.400
### <a name=".NET 6"></a>.NET 6
Package name | Affected version | Patched version
------------ | ---------------- | -------------------------
## Advisory FAQ
### <a name="how-affected"></a>How do I know if I am affected?
If you have a runtime or SDK with a version listed, or an affected package listed in [affected software](#affected-software), you're exposed to the vulnerability.
### <a name="how-fix"></a>How do I fix the issue?
* To fix the issue please install the latest version of .NET 6.0 or .NET 7.0. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs.
* If you are using one of the affected packages, please update to the patched version listed above.
* If you have .NET 6.0 or greater installed, you can list the versions you have installed by running the `dotnet --info` command. You will see output like the following;
```
.NET Core SDK (reflecting any global.json):
Version: 6.0.300
Commit: 8473146e7d
Runtime Environment:
OS Name: Windows
OS Version: 10.0.18363
OS Platform: Windows
RID: win10-x64
Base Path: C:\Program Files\dotnet\sdk\6.0.300\
Host (useful for support):
Version: 6.0.5
Commit: 8473146e7d
.NET Core SDKs installed:
6.0.300 [C:\Program Files\dotnet\sdk]
.NET Core runtimes installed:
Microsoft.AspNetCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App]
Microsoft.NETCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App]
Microsoft.WindowsDesktop.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App]
To install additional .NET Core runtimes or SDKs:
https://aka.ms/dotnet-download
```
* If you're using .NET 7.0, you should download and install Runtime 7.0.10 or SDK 7.0.110 (for Visual Studio 2022 v17.4) from https://dotnet.microsoft.com/download/dotnet-core/7.0.
* If you're using .NET 6.0, you should download and install Runtime 6.0.21 or SDK 6.0.316 (for Visual Studio 2022 v17.2) from https://dotnet.microsoft.com/download/dotnet-core/6.0.
.NET 6.0 and and .NET 7.0 updates are also available from Microsoft Update. To access this either type "Check for updates" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates.
Once you have installed the updated runtime or SDK, restart your apps for the update to take effect.
Additionally, if you've deployed [self-contained applications](https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd) targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed.
## Other Information
### Reporting Security Issues
If you have found a potential security issue in .NET 6.0 or .NET 7.0, please email details to secure@microsoft.com. Reports may qualify for the Microsoft .NET Core & .NET 5 Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at <https://aka.ms/corebounty>.
### Support
You can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime and https://github.com/dotnet/aspnet/. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue.
### Disclaimer
The information provided in this advisory is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
### External Links
[CVE-2023-35390]( https://www.cve.org/CVERecord?id=CVE-2023-35390)
### Revisions
V1.0 (August 08, 2023): Advisory published.
_Version 1.0_
_Last Updated 2023-08-08_
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NET.Build.Containers'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.307'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.306'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/dotnet/sdk/security/advisories/GHSA-p8rx-fwgq-rh2f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35390'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/266'}, {'type': 'PACKAGE', 'url': 'https://github.com/dotnet/sdk'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CL2L4WE5QRT7WEXANYXSKSU43APC5N2V/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWVZFKTLNMNKPZ755EMRYIA6GHFOWGKY/'}, {'type': 'WEB', 'url': 'https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35390'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T13:15:38Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-5r33-mgjf-6656
|
2023-08-16T21:10:56Z
|
2023-08-16T15:30:18Z
| null |
['CVE-2023-40343']
|
Jenkins Tuleap Authentication Plugin non-constant time token comparison
|
Jenkins Tuleap Authentication Plugin 1.1.20 and earlier does not use a constant-time comparison when checking whether two authentication tokens are equal.
This could potentially allow attackers to use statistical methods to obtain a valid authentication token.
Tuleap Authentication Plugin 1.1.21 uses a constant-time comparison when validating authentication tokens.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:tuleap-oauth'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.21'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40343'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3229'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/16/3'}]
|
{'cwe_ids': ['CWE-203'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:10:56Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-5p42-m6f3-hpmj
|
2023-08-24T22:28:41Z
|
2023-08-17T00:30:26Z
| null |
['CVE-2023-38894']
|
tree-kit Prototype Pollution vulnerability
|
A Prototype Pollution issue in Cronvel Tree-kit v.0.7.4 and before allows a remote attacker to execute arbitrary code via the extend function.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'tree-kit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.5'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38894'}, {'type': 'WEB', 'url': 'https://github.com/cronvel/tree-kit/commit/61bf10cf0dbddaeea3f198cfe7cb469f360d82bc'}, {'type': 'PACKAGE', 'url': 'https://github.com/cronvel/tree-kit'}, {'type': 'WEB', 'url': 'https://www.code-intelligence.com/blog/treekit-prototype-pollution-cve-2023-38894'}, {'type': 'WEB', 'url': 'http://tree-kit.com'}]
|
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-17T19:06:27Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-vc7j-h8xg-fv5x
|
2023-08-04T17:26:32Z
|
2023-08-04T17:26:32Z
| null |
['CVE-2023-38691']
|
matrix-appservice-bridge doesn't verify the sub parameter of an openId token exhange, allowing unauthorized access to provisioning APIs
|
### Impact
A malicious Matrix server can use a foreign user's MXID in an OpenID exchange, allowing a bad actor to impersonate users when using the provisioning API.
### Details
The library does not check that the servername part of the `sub` parameter (containing the user's *claimed* MXID) is the same as the servername we are talking to. A malicious actor could spin up a server on any given domain, respond with a `sub` parameter according to the user they want to act as and use the resulting token to perform provisioning requests.
### Workarounds
Disable the provisioning API. If the bridge does not use the provisioning API, you are not vulnerable.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'matrix-appservice-bridge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '8.1.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'matrix-appservice-bridge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.1'}]}], 'versions': ['9.0.0']}]
|
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-appservice-bridge/security/advisories/GHSA-vc7j-h8xg-fv5x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38691'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-appservice-bridge/commit/4c6723a5e7beda65cdf1ae5dbb882e8beaac8552'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/matrix-appservice-bridge'}]
|
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-04T17:26:32Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-8rj5-2857-877j
|
2023-08-25T21:43:35Z
|
2023-08-23T13:19:55Z
| null |
['CVE-2022-25024']
|
json2xml Uncaught Exception vulnerability
|
The json2xml package for Python allows an error in typecode decoding enabling a remote attack that can lead to an exception, causing a denial of service.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'json2xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.14.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25024'}, {'type': 'WEB', 'url': 'https://github.com/vinitkumar/json2xml/issues/106'}, {'type': 'WEB', 'url': 'https://github.com/vinitkumar/json2xml/pull/107'}, {'type': 'WEB', 'url': 'https://github.com/vinitkumar/json2xml/pull/107/files'}, {'type': 'WEB', 'url': 'https://github.com/vinitkumar/json2xml/commit/a9cd75b61329801b47a8fba7473bce6c85a38b9b'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/json2xml/PYSEC-2023-149.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/vinitkumar/json2xml'}, {'type': 'WEB', 'url': 'https://packaging.python.org/en/latest/guides/analyzing-pypi-package-downloads/'}]
|
{'cwe_ids': ['CWE-248', 'CWE-754'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-23T13:19:55Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-95rp-6gqp-6622
|
2023-08-30T20:08:58Z
|
2023-08-30T20:08:58Z
| null |
['CVE-2023-40582']
|
Command Injection Vulnerability in find-exec
|
Older versions of the package are vulnerable to Command Injection as an attacker controlled parameter. As a result, attackers may run malicious commands.
For example:
```
const find = require("find-exec");
find("mplayer; touch hacked")
```
This creates a file named "hacked" on the filesystem.
You should never allow users to control commands to find, since this package attempts to run every command provided.
Thanks to @miguelafmonteiro for reporting.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'find-exec'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/shime/find-exec/security/advisories/GHSA-95rp-6gqp-6622'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40582'}, {'type': 'WEB', 'url': 'https://github.com/shime/find-exec/commit/74fb108097c229b03d6dba4cce81e36aa364b51c'}, {'type': 'PACKAGE', 'url': 'https://github.com/shime/find-exec'}]
|
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-30T20:08:58Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-x2mh-8fmc-rqgh
|
2023-08-29T22:27:51Z
|
2023-08-23T18:30:34Z
| null |
['CVE-2023-37379']
|
Apache Airflow denial of service vulnerability
|
Apache Airflow, in versions prior to 2.7.0, contains a security vulnerability that can be exploited by an authenticated user possessing Connection edit privileges. This vulnerability allows the user to access connection information and exploit the test connection feature by sending many requests, leading to a denial of service (DoS) condition on the server. Furthermore, malicious actors can leverage this vulnerability to establish harmful connections with the server.
Users of Apache Airflow are strongly advised to upgrade to version 2.7.0 or newer to mitigate the risk associated with this vulnerability. Additionally, administrators are encouraged to review and adjust user permissions to restrict access to sensitive functionalities, reducing the attack surface.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37379'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/32052'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/apache-airflow/PYSEC-2023-152.yaml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/g5c9vcn27lr14go48thrjpo6f4vw571r'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/23/4'}]
|
{'cwe_ids': ['CWE-200', 'CWE-400', 'CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-24T12:52:17Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-wfm5-v35h-vwf4
|
2023-08-29T23:33:53Z
|
2023-08-29T23:33:53Z
| null |
['CVE-2023-40590']
|
GitPython untrusted search path on Windows systems leading to arbitrary code execution
|
### Summary
When resolving a program, Python/Windows look for the current working directory, and after that the PATH environment (see big warning in https://docs.python.org/3/library/subprocess.html#popen-constructor). GitPython defaults to use the `git` command, if a user runs GitPython from a repo has a `git.exe` or `git` executable, that program will be run instead of the one in the user's `PATH`.
### Details
This is more of a problem on how Python interacts with Windows systems, Linux and any other OS aren't affected by this. But probably people using GitPython usually run it from the CWD of a repo.
The execution of the `git` command happens in
https://github.com/gitpython-developers/GitPython/blob/1c8310d7cae144f74a671cbe17e51f63a830adbf/git/cmd.py#L277
https://github.com/gitpython-developers/GitPython/blob/1c8310d7cae144f74a671cbe17e51f63a830adbf/git/cmd.py#L983-L996
And there are other commands executed that should probably be aware of this problem.
### PoC
On a Windows system, create a `git.exe` or `git` executable in any directory, and import or run GitPython from that directory
```
python -c "import git"
```
The git executable from the current directory will be run.
### Impact
An attacker can trick a user to download a repository with a malicious `git` executable, if the user runs/imports GitPython from that directory, it allows the attacker to run any arbitrary commands.
### Possible solutions
- Default to an absolute path for the git program on Windows, like `C:\\Program Files\\Git\\cmd\\git.EXE` (default git path installation).
- Require users to set the `GIT_PYTHON_GIT_EXECUTABLE` environment variable on Windows systems.
- Make this problem prominent in the documentation and advise users to never run GitPython from an untrusted repo, or set the `GIT_PYTHON_GIT_EXECUTABLE` env var to an absolute path.
- Resolve the executable manually by only looking into the `PATH` environment variable (suggested by @Byron)
---
> [!NOTE]
> This vulnerability was reported via email, and it was decided to publish it here and make it public, so the community is aware of it, and a fix can be provided.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'gitpython'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.33'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.1.32'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/gitpython-developers/GitPython/security/advisories/GHSA-wfm5-v35h-vwf4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40590'}, {'type': 'WEB', 'url': 'https://github.com/gitpython-developers/GitPython/issues/1635'}, {'type': 'WEB', 'url': 'https://github.com/gitpython-developers/GitPython/pull/1636'}, {'type': 'WEB', 'url': 'https://github.com/gitpython-developers/GitPython/commit/8b75434e2c8a082cdeb4971cc6f0ee2bafec45bc'}, {'type': 'WEB', 'url': 'https://docs.python.org/3/library/subprocess.html#popen-constructor'}, {'type': 'PACKAGE', 'url': 'https://github.com/gitpython-developers/GitPython'}, {'type': 'WEB', 'url': 'https://github.com/gitpython-developers/GitPython/releases/tag/3.1.33'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/gitpython/PYSEC-2023-161.yaml'}]
|
{'cwe_ids': ['CWE-426'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T23:33:53Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-5r27-rw8r-7967
|
2023-08-14T13:14:54Z
|
2023-08-08T19:26:40Z
| null |
['CVE-2023-38704']
|
import-in-the-middle has unsanitized user controlled input in module generation
|
### Impact
The `import-in-the-middle` loader works by generating a wrapper module on the fly. The wrapper uses the module specifier to load the original module and add some wrapping code. It allows for remote code execution in cases where an application passes user-supplied input directly to an import() function.
### Patches
This vulnerability has been patched in `import-in-the-middle` version 1.4.2
### Workarounds
* Do not pass any user-supplied input to `import()`. Instead, verify it against a set of allowed values.
* If using `import-in-the-middle` and support for EcmaScript Modules is not needed, ensure that none of the following options are set (either via command-line or the `NODE_OPTIONS` environment variable):
```
--loader=import-in-the-middle/hook.mjs
--loader import-in-the-middle/hook.mjs
```
### References
If you have any questions or comments about this advisory, email us at [security@datadoghq.com](mailto:security@datadoghq.com)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'import-in-the-middle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.1'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/DataDog/import-in-the-middle/security/advisories/GHSA-5r27-rw8r-7967'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38704'}, {'type': 'WEB', 'url': 'https://github.com/DataDog/import-in-the-middle/commit/2531cdd9d1d73f9eaa87c16967f60cb276c1971b'}, {'type': 'PACKAGE', 'url': 'https://github.com/DataDog/import-in-the-middle'}]
|
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-08T19:26:40Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-3vf5-xm2p-6mh5
|
2023-08-14T21:08:38Z
|
2023-08-14T12:30:22Z
| null |
['CVE-2023-4321']
|
Cockpit Cross-site Scripting vulnerability
|
Cross-site Scripting (XSS) - Stored in GitHub repository cockpit-hq/cockpit 2.6.2 and prior. A patch is available at commit 34ab31ee9362da51b9709e178469dbffd7717249.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'cockpit-hq/cockpit'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4321'}, {'type': 'WEB', 'url': 'https://github.com/cockpit-hq/cockpit/commit/34ab31ee9362da51b9709e178469dbffd7717249'}, {'type': 'PACKAGE', 'url': 'https://github.com/cockpit-hq/cockpit'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/fce38751-bfd6-484c-b6e1-935e0aa8ffdc'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-14T21:08:38Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-xqcq-j8w9-3pxv
|
2023-08-01T19:53:16Z
|
2023-08-01T19:53:16Z
| null |
[]
|
Jettison parser crash by stackoverflow
|
Those using Jettison to parse untrusted XML or JSON data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.
### References
- https://nvd.nist.gov/vuln/detail/CVE-2022-40149
- https://github.com/jettison-json/jettison/issues/45
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=46538
- https://github.com/jettison-json/jettison/pull/49/files
- https://github.com/jettison-json/jettison/releases/tag/jettison-1.5.1
- https://lists.debian.org/debian-lts-announce/2022/11/msg00011.html
- https://www.debian.org/security/2023/dsa-5312
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.tencyle.fixes:org.codehaus.jettison--jettison'}, 'versions': ['1.1-tencyle-2.1.0']}]
|
[{'type': 'WEB', 'url': 'https://github.com/tencyle-fixes/jettison/security/advisories/GHSA-xqcq-j8w9-3pxv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40149'}, {'type': 'WEB', 'url': 'https://github.com/jettison-json/jettison/issues/45'}, {'type': 'WEB', 'url': 'https://github.com/jettison-json/jettison/pull/49'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=46538'}, {'type': 'WEB', 'url': 'https://github.com/jettison-json/jettison/releases/tag/jettison-1.5.1'}, {'type': 'PACKAGE', 'url': 'https://github.com/tencyle-fixes/jettison'}, {'type': 'WEB', 'url': 'https://github.com/tencyle-fixes/jettison#jettison-backports-repository-by-tencyle'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/11/msg00011.html'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5312'}]
|
{'cwe_ids': ['CWE-121', 'CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T19:53:16Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-wwww-xvm2-62w7
|
2023-08-16T21:08:34Z
|
2023-08-16T15:30:18Z
| null |
['CVE-2023-40345']
|
Jenkins Delphix Plugin vulnerable to exposure of system-scoped credentials
|
Jenkins Delphix Plugin 3.0.2 and earlier does not set the appropriate context for credentials lookup, allowing the use of System-scoped credentials otherwise reserved for the global configuration.
This allows attackers with Overall/Read permission to access and capture credentials they are not entitled to.
Delphix Plugin 3.0.3 defines the appropriate context for credentials lookup.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:delphix'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40345'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3214%20(2)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/16/3'}]
|
{'cwe_ids': ['CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:08:34Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-g3mv-64h3-h482
|
2023-08-24T22:33:10Z
|
2023-08-20T15:30:36Z
| null |
['CVE-2023-4451']
|
Cockpit Cross-site Scripting vulnerability
|
Cross-site Scripting (XSS) - Reflected in GitHub repository cockpit-hq/cockpit version 2.6.3 and prior. A patch is available at commit 30609466c817e39f9de1871559603e93cd4d0d0c and anticipated to be part of version 2.6.4.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'cockpit-hq/cockpit'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4451'}, {'type': 'WEB', 'url': 'https://github.com/cockpit-hq/cockpit/commit/30609466c817e39f9de1871559603e93cd4d0d0c'}, {'type': 'PACKAGE', 'url': 'https://github.com/cockpit-hq/cockpit'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/4e111c3e-6cf3-4b4c-b3c1-a540bf30f8fa'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-21T20:25:43Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-w7vm-4v3j-vgpw
|
2023-08-09T20:36:37Z
|
2023-08-04T15:30:15Z
| null |
['CVE-2023-29689']
|
PyroCMS remote code execution vulnerability
|
PyroCMS 3.9 contains a remote code execution (RCE) vulnerability that can be exploited through a server-side template injection (SSTI) flaw. This vulnerability allows a malicious attacker to send customized commands to the server and execute arbitrary code on the affected system.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pyrocms/pyrocms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.9'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29689'}, {'type': 'WEB', 'url': 'https://cupc4k3.lol/ssti-leads-to-rce-on-pyrocms-7515be27c811'}, {'type': 'PACKAGE', 'url': 'https://github.com/pyrocms/pyrocms'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/174088/Pyro-CMS-3.9-Server-Side-Template-Injection.html'}]
|
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-04T17:27:09Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-8qv2-5vq6-g2g7
|
2023-09-06T17:36:28Z
|
2023-08-25T00:12:39Z
| null |
[]
|
webpki: CPU denial of service in certificate path building
|
When this crate is given a pathological certificate chain to validate, it will spend CPU time exponential with the number of candidate certificates at each step of path building.
Both TLS clients and TLS servers that accept client certificate are affected.
This was previously reported in https://github.com/briansmith/webpki/issues/69.
`rustls-webpki` is a fork of this crate which contains a fix for this issue and is actively maintained.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'webpki'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.22.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.22.0'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/briansmith/webpki/issues/69'}, {'type': 'WEB', 'url': 'https://github.com/briansmith/webpki/issues/69#issuecomment-1699894848'}, {'type': 'WEB', 'url': 'https://github.com/briansmith/webpki/commit/30a108e0802fd09585e0d071013f24b8272d139b'}, {'type': 'PACKAGE', 'url': 'https://github.com/briansmith/webpki'}, {'type': 'WEB', 'url': 'https://github.com/crypto-com/sgx-vendor'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0052.html'}]
|
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-25T00:12:39Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-8m65-qq6g-43rr
|
2023-08-18T22:46:01Z
|
2023-08-18T21:30:24Z
| null |
['CVE-2023-4422']
|
Cockpit Cross-site Scripting vulnerability
|
Cross-site Scripting (XSS) - Stored in GitHub repository cockpit-hq/cockpit prior to 2.6.3.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'cockpit-hq/cockpit'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4422'}, {'type': 'WEB', 'url': 'https://github.com/cockpit-hq/cockpit/commit/b8dad5e070608bb5e4ec58fabbee101b5af737cf'}, {'type': 'PACKAGE', 'url': 'https://github.com/cockpit-hq/cockpit'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/2e12b773-b6a2-48da-a4bb-55d5d1307d2e'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-18T22:46:01Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-hpx4-r86g-5jrg
|
2023-08-29T23:33:26Z
|
2023-08-29T23:33:26Z
| null |
['CVE-2023-26364']
|
@adobe/css-tools Regular Expression Denial of Service (ReDOS) while Parsing CSS
|
### Impact
@adobe/css-tools version 4.3.0 and earlier are affected by an Improper Input Validation vulnerability that could result in a denial of service while attempting to parse CSS.
### Patches
The issue has been resolved in 4.3.1.
### Workarounds
None
### References
N/A
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@adobe/css-tools'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/adobe/css-tools/security/advisories/GHSA-hpx4-r86g-5jrg'}, {'type': 'WEB', 'url': 'https://github.com/adobe/css-tools/commit/2b09a25d1dbdbb16fe80065e4c9beb5623ee5793'}, {'type': 'PACKAGE', 'url': 'https://github.com/adobe/css-tools'}]
|
{'cwe_ids': ['CWE-1333'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T23:33:26Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-cr5q-6q9f-rq6q
|
2023-08-23T20:36:24Z
|
2023-08-23T20:36:24Z
| null |
['CVE-2023-38037']
|
Active Support Possibly Discloses Locally Encrypted Files
|
There is a possible file disclosure of locally encrypted files in Active Support. This vulnerability has been assigned the CVE identifier CVE-2023-38037.
Versions Affected: >= 5.2.0 Not affected: < 5.2.0 Fixed Versions: 7.0.7.1, 6.1.7.5
# Impact
ActiveSupport::EncryptedFile writes contents that will be encrypted to a temporary file. The temporary file’s permissions are defaulted to the user’s current umask settings, meaning that it’s possible for other users on the same system to read the contents of the temporary file.
Attackers that have access to the file system could possibly read the contents of this temporary file while a user is editing it.
All users running an affected release should either upgrade or use one of the workarounds immediately.
# Releases
The fixed releases are available at the normal locations.
# Workarounds
To work around this issue, you can set your umask to be more restrictive like this:
```ruby
$ umask 0077
```
|
[]
|
[{'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.0'}, {'fixed': '6.1.7.5'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/a21d6edf35a60383dfa6c4da49e4b1aef5f00731'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/releases/tag/v7.0.7.1'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activesupport/CVE-2023-38037.yml'}]
|
{'cwe_ids': ['CWE-377'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-23T20:36:24Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-r2f6-6928-fh8f
|
2023-08-24T20:22:29Z
|
2023-08-17T15:30:23Z
| null |
['CVE-2023-40272']
|
Apache Airflow Spark Provider Improper Input Validation vulnerability
|
Apache Airflow Spark Provider, versions before 4.1.3, is affected by a vulnerability that allows an attacker to pass in malicious parameters when establishing a connection giving an opportunity to read files on the Airflow server.
It is recommended to upgrade to a version that is not affected.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow-providers-apache-spark'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40272'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/t03gktyzyor20rh06okd91jtqmw6k1l7'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/17/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/18/1'}]
|
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-17T19:06:45Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-jfrf-vv54-j2jg
|
2023-08-18T14:25:24Z
|
2023-08-11T15:30:46Z
| null |
['CVE-2021-27524']
|
Margox Braft-Editor Cross-site Scripting Vulnerability
|
Cross Site Scripting (XSS) vulnerability in margox braft-editor version 2.3.8, allows remote attackers to execute arbitrary code via the embed media feature.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'braft-editor'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.8'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27524'}, {'type': 'WEB', 'url': 'https://github.com/margox/braft-editor/issues/880'}, {'type': 'PACKAGE', 'url': 'https://github.com/margox/braft-editor'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T22:06:56Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-vj49-j7rc-h54f
|
2023-09-01T17:35:22Z
|
2023-08-25T21:30:48Z
| null |
['CVE-2023-24620']
|
Esoteric YamlBeans XML Entity Expansion vulnerability
|
An issue was discovered in Esoteric YamlBeans through 1.15. A crafted YAML document is able perform am XML Entity Expansion attack against YamlBeans YamlReader. By exploiting the Anchor feature in YAML, it is possible to generate a small YAML document that, when read, is expanded to a large size, causing CPU and memory consumption, such as a Java Out-of-Memory exception.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.esotericsoftware.yamlbeans:yamlbeans'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.15'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24620'}, {'type': 'WEB', 'url': 'https://contrastsecurity.com'}, {'type': 'WEB', 'url': 'https://github.com/Contrast-Security-OSS/yamlbeans/blob/main/SECURITY.md'}, {'type': 'WEB', 'url': 'https://github.com/EsotericSoftware'}, {'type': 'PACKAGE', 'url': 'https://github.com/EsotericSoftware/yamlbeans'}]
|
{'cwe_ids': ['CWE-400', 'CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-25T22:04:01Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-9cvc-v7wm-992c
|
2023-08-15T20:04:14Z
|
2023-08-15T20:04:14Z
| null |
['CVE-2023-40027']
|
When `ui.isAccessAllowed` is `undefined`, the `adminMeta` GraphQL query is publicly accessible
|
### Summary
When `ui.isAccessAllowed` is `undefined`, the `adminMeta` GraphQL query is publicly accessible, that is to say, no session is required for the query.
This is different to the behaviour of the default AdminUI middleware, which by default will only be publicly accessible if a `session` strategy is not defined.
### Impact
This vulnerability does not affect developers using the `@keystone-6/auth` package, or any users that have written their own `ui.isAccessAllowed` (that is to say, you are unaffected if `ui.isAccessAllowed` is defined).
This vulnerability does affect developers who thought that their `session` strategy will, by default, enforce that `adminMeta` is inaccessible by the public in accordance with that strategy; akin to the behaviour of the AdminUI middleware.
### Patches
This vulnerability has been patched in `@keystone-6/core` version `5.5.1`.
### Workarounds
You can opt to write your own `isAccessAllowed` to work-around this vulnerability.
### References
Pull request https://github.com/keystonejs/keystone/pull/8771
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@keystone-6/core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.5.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/security/advisories/GHSA-9cvc-v7wm-992c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40027'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/pull/8771'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/commit/650e27e6e9b42abfb94c340c8470faf61f0ff284'}, {'type': 'PACKAGE', 'url': 'https://github.com/keystonejs/keystone'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/releases/tag/2023-08-15'}]
|
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-15T20:04:14Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-r726-vmfq-j9j3
|
2023-09-01T17:44:16Z
|
2023-08-29T23:34:22Z
| null |
['CVE-2023-39968']
|
Open Redirect Vulnerability in jupyter-server
|
### Impact
Open Redirect Vulnerability. Maliciously crafted login links to known Jupyter Servers can cause successful login or an already logged-in session to be redirected to arbitrary sites, which should be restricted to Jupyter Server-served URLs.
### Patches
Upgrade to Jupyter Server 2.7.2
### Workarounds
None.
### References
Vulnerability reported by user davwwwx via the [bug bounty program](https://app.intigriti.com/programs/jupyter/jupyter/detail) [sponsored by the European Commission](https://commission.europa.eu/news/european-commissions-open-source-programme-office-starts-bug-bounties-2022-01-19_en) and hosted on the [Intigriti platform](https://www.intigriti.com/).
- https://blog.xss.am/2023/08/CVE-2023-39968-jupyter-token-leak/
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'jupyter-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/jupyter-server/jupyter_server/security/advisories/GHSA-r726-vmfq-j9j3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39968'}, {'type': 'WEB', 'url': 'https://github.com/jupyter-server/jupyter_server/commit/290362593b2ffb23c59f8114d76f77875de4b925'}, {'type': 'PACKAGE', 'url': 'https://github.com/jupyter-server/jupyter_server'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/jupyter-server/PYSEC-2023-155.yaml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NRP7DNZYVOIA4ZB3U3ZWKTFZEPYWNGCQ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XDKQAWQN6SQTOVACZNXYKEHWQXGG4DOF/'}]
|
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T23:34:22Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-7954-6m9q-gpvf
|
2023-08-18T21:50:33Z
|
2023-08-18T21:50:33Z
| null |
['CVE-2023-37914']
|
XWiki Platform privilege escalation (PR)/RCE from account through Invitation subject/message
|
### Impact
Any user who can view `Invitation.WebHome` can execute arbitrary script macros including Groovy and Python macros that allow remote code execution including unrestricted read and write access to all wiki contents. This can be reproduced with the following steps:
1. Open the invitation application (Invitation.WebHome).
1. Set the subject to `{{cache}}{{groovy}}new File("/tmp/exploit.txt").withWriter { out -> out.println("Attacked from invitation!"); }{{/groovy}}{{/cache}}`
1. Click "Preview"
### Patches
The vulnerability has been patched on XWiki 14.4.8, 15.2-rc-1, and 14.10.6.
### Workarounds
The vulnerability can be patched manually by applying the [patch](https://github.com/xwiki/xwiki-platform/commit/ff1d8a1790c6ee534c6a4478360a06efeb2d3591) on `Invitation.InvitationCommon` and `Invitation.InvitationConfig`.
### References
- https://jira.xwiki.org/browse/XWIKI-20421
- https://github.com/xwiki/xwiki-platform/commit/ff1d8a1790c6ee534c6a4478360a06efeb2d3591
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)
* Email us at [Security Mailing List](mailto:security@xwiki.org)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-invitation-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5-m-1'}, {'fixed': '14.4.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-invitation-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.10.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-invitation-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0-rc-1'}, {'fixed': '15.2-rc-1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-7954-6m9q-gpvf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37914'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/ff1d8a1790c6ee534c6a4478360a06efeb2d3591'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20421'}]
|
{'cwe_ids': ['CWE-94', 'CWE-95'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-18T21:50:33Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-269x-pg5c-5xgm
|
2023-08-09T20:38:02Z
|
2023-08-05T09:30:16Z
| null |
['CVE-2023-39508']
|
Apache Airflow Execution with Unnecessary Privileges
|
Execution with Unnecessary Privileges, : Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Software Foundation Apache Airflow.The "Run Task" feature enables authenticated user to bypass some of the restrictions put in place. It allows to execute code in the webserver context as well as allows to bypas limitation of access the user has to certain DAGs. The "Run Task" feature is considered dangerous and it has been removed entirely in Airflow 2.6.0.
This issue affects Apache Airflow: before 2.6.0.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39508'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/29706'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/apache-airflow/PYSEC-2023-134.yaml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/j2nkjd0zqvtqk85s6ywpx3c35pvzyx15'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2023/Jul/43'}]
|
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T14:26:52Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-9jcq-jf57-c62c
|
2023-08-08T20:46:12Z
|
2023-08-08T20:46:12Z
| null |
['CVE-2023-39349']
|
Privilege escalation via ApiTokensEndpoint
|
### Impact
An attacker with access to a token with few or no scopes can query `/api/0/api-tokens/` for a list of all tokens created by a user, including tokens with greater scopes, and use those tokens in other requests.
There is no evidence that the issue was exploited on https://sentry.io. For self-hosted users, it is advised to rotate user auth tokens via `https://your-self-hosted-sentry-installation/settings/account/api/auth-tokens/`.
### Patches
The issue was fixed in https://github.com/getsentry/sentry/pull/53850 and is available in the release 23.7.2 of [sentry](https://github.com/getsentry/sentry/releases/tag/23.7.2) and [self-hosted](https://github.com/getsentry/self-hosted/releases/tag/23.7.2).
### Workarounds
There are no known workarounds.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'sentry'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '22.1.0'}, {'fixed': '23.7.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/getsentry/sentry/security/advisories/GHSA-9jcq-jf57-c62c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39349'}, {'type': 'WEB', 'url': 'https://github.com/getsentry/sentry/pull/53850'}, {'type': 'WEB', 'url': 'https://github.com/getsentry/sentry/commit/fad12c1150d1135edf9666ea72ca11bc110c1083'}, {'type': 'WEB', 'url': 'https://github.com/getsentry/self-hosted/releases/tag/23.7.2'}, {'type': 'PACKAGE', 'url': 'https://github.com/getsentry/sentry'}, {'type': 'WEB', 'url': 'https://github.com/getsentry/sentry/releases/tag/23.7.2'}]
|
{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-08T20:46:12Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-v86x-5fm3-5p7j
|
2023-09-01T17:34:29Z
|
2023-08-23T20:42:43Z
| null |
['CVE-2023-40577']
|
Alertmanager UI is vulnerable to stored XSS via the /api/v1/alerts endpoint
|
### Impact
An attacker with the permission to perform POST requests on the /api/v1/alerts endpoint could be able to execute arbitrary JavaScript code on the users of Prometheus Alertmanager.
### Patches
Users can upgrade to Alertmanager v0.2.51.
### Workarounds
Users can setup a reverse proxy in front of the Alertmanager web server to forbid access to the /api/v1/alerts endpoint.
### References
N/A
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/prometheus/alertmanager'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.25.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.25.0'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/prometheus/alertmanager/security/advisories/GHSA-v86x-5fm3-5p7j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40577'}, {'type': 'PACKAGE', 'url': 'https://github.com/prometheus/alertmanager'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-23T20:42:43Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-p8gp-899c-jvq9
|
2023-08-24T21:48:12Z
|
2023-08-21T20:28:06Z
| null |
['CVE-2023-4454']
|
Wallabag user can reset data unintentionally
|
# Description
wallabag was discovered to contain a Cross-Site Request Forgery (CSRF) which allows attackers to arbitrarily reset annotations, entries and tags, by the GET request to `/reset/annotations`, `/reset/entries`, `/reset/tags`, `/reset/archived`.
This vulnerability has a CVSSv3.1 score of 4.3.
**You should immediately patch your instance to version 2.6.3 or higher if you have more than one user and/or having open registration**.
# Resolution
These actions are now doable only via POST method, which ensures that we can't do them via a 3rd-party website.
# Credits
We would like to thank @zpbrent for reporting this issue through huntr.dev.
Reference: https://huntr.dev/bounties/4ee0ef74-e4d4-46e7-a05c-076bce522299/
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'wallabag/wallabag'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-alpha.1'}, {'fixed': '2.6.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.6.2'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/wallabag/wallabag/security/advisories/GHSA-p8gp-899c-jvq9'}, {'type': 'WEB', 'url': 'https://github.com/wallabag/wallabag/commit/78b0b55c40511e1f22d5bbb4897aa10fca68441c'}, {'type': 'PACKAGE', 'url': 'https://github.com/wallabag/wallabag'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/4ee0ef74-e4d4-46e7-a05c-076bce522299/'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-21T20:28:06Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-rvm8-j2cp-j592
|
2023-08-31T14:48:17Z
|
2023-08-29T00:32:04Z
| null |
['CVE-2023-40827']
|
pf4j vulnerable to remote code execution via loadpluginPath parameter
|
An issue in pf4j pf4j v.3.9.0 and before allows a remote attacker to obtain sensitive information and execute arbitrary code via the loadpluginPath parameter.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.pf4j:pf4j'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.9.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40827'}, {'type': 'WEB', 'url': 'https://github.com/pf4j/pf4j/issues/536'}, {'type': 'WEB', 'url': 'https://github.com/pf4j/pf4j/pull/537'}, {'type': 'WEB', 'url': 'https://github.com/pf4j/pf4j/pull/537/commits/ed9392069fe14c6c30d9f876710e5ad40f7ea8c1'}, {'type': 'PACKAGE', 'url': 'https://github.com/pf4j/pf4j'}]
|
{'cwe_ids': ['CWE-22', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T17:41:24Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-pv2g-vm98-vjxf
|
2023-08-18T14:26:03Z
|
2023-08-16T15:30:18Z
| null |
['CVE-2023-40339']
|
Jenkins Config File Provider Plugin improper credential masking vulnerability
|
Jenkins Config File Provider Plugin 952.va_544a_6234b_46 and earlier does not mask (i.e., replace with asterisks) credentials specified in configuration files when they’re written to the build log.
Config File Provider Plugin 953.v0432a_802e4d2 masks credentials configured in configuration files if they appear in the build log.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:config-file-provider'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '953.v0432a'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40339'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3090'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/16/3'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:13:44Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-9v85-q87q-g4vg
|
2023-09-07T14:31:28Z
|
2023-08-31T00:30:17Z
| null |
['CVE-2023-39139']
|
Path traversal in Archive
|
An issue in Archive v3.3.7 allows attackers to execute a path traversal via extracting a crafted zip file.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Pub', 'name': 'archive'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.7'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39139'}, {'type': 'WEB', 'url': 'https://github.com/brendan-duncan/archive/issues/265'}, {'type': 'WEB', 'url': 'https://github.com/brendan-duncan/archive/commit/6de492385d72af044231c4163dff13a43d991c83'}, {'type': 'WEB', 'url': 'https://github.com/brendan-duncan/archive/commit/edb0d480733a44d28ff3d5e4e2779153ba645ce7'}, {'type': 'WEB', 'url': 'https://blog.ostorlab.co/zip-packages-exploitation.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/brendan-duncan/archive'}, {'type': 'WEB', 'url': 'https://ostorlab.co/vulndb/advisory/OVE-2023-5'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-31T01:42:46Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-pv7q-v9mv-9mh5
|
2023-08-10T20:09:07Z
|
2023-08-10T20:09:07Z
| null |
['CVE-2023-39964']
|
1Panel O&M management panel has a background arbitrary file reading vulnerability
|
### Summary
Arbitrary file reads allow an attacker to read arbitrary important configuration files on the server.
### Details
In the api/v1/file.go file, there is a function called LoadFromFile, which directly reads the file by obtaining the requested path parameter[path]. The request parameters are not filtered, resulting in a background arbitrary file reading vulnerability

### PoC
Request /api/v1/files/loadfile, carry /etc/passwd data to read, as shown below:

### Impact
1Panel v1.4.3
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/1Panel-dev/1Panel'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.3'}, {'fixed': '1.5.0'}]}], 'versions': ['1.4.3']}]
|
[{'type': 'WEB', 'url': 'https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-pv7q-v9mv-9mh5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39964'}, {'type': 'PACKAGE', 'url': 'https://github.com/1Panel-dev/1Panel'}, {'type': 'WEB', 'url': 'https://github.com/1Panel-dev/1Panel/releases/tag/v1.5.0'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-10T20:09:07Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-9c4h-3f7h-322r
|
2023-08-09T14:43:20Z
|
2023-08-09T14:43:20Z
| null |
['CVE-2023-39532']
|
SES's dynamic import and spread operator provides possible path to arbitrary exfiltration and execution
|
### Impact
This is a hole in the confinement of guest applications under SES that may manifest as either the ability to exfiltrate information or execute arbitrary code depending on the configuration and implementation of the surrounding host.
Guest program running inside a Compartment with as few as no endowments can gain access to the surrounding host’s dynamic import by using dynamic import after the spread operator, like `{...import(arbitraryModuleSpecifier)}`.
On the web or in web extensions, a Content-Security-Policy following ordinary best practices likely mitigates both the risk of exfiltration and execution of arbitrary code, at least limiting the modules that the attacker can import to those that are already part of the application. However, without a Content-Security-Policy, dynamic import can be used to issue HTTP requests for either communication through the URL or for the execution of code reachable from that origin.
Within an XS worker, an attacker can use the host’s module system to the extent that the host has been configured. This typically only allows access to module code on the host’s file system and is of limited use to an attacker.
Within Node.js, the attacker gains access to Node.js’s module system. Importing the powerful builtins is not useful except insofar as there are side-effects and tempered because dynamic import returns a promise. Spreading a promise into an object renders the promises useless. However, Node.js allows importing data URLs, so this is a clear path to arbitrary execution.
### Patches
All affected `0.*` version trains have the following patch. Running `npm update` will obtain the patch on all affected projects using `^0.*` style dependency constraints in their `package.json`.
```diff
From 33469e88bfb2bf34a161c265f10f808ce354a700 Mon Sep 17 00:00:00 2001
From: Kris Kowal <kris@agoric.com>
Date: Thu, 27 Jul 2023 13:25:13 -0700
Subject: [PATCH] fix(fix): Censor spread import
---
packages/ses/src/transforms.js | 2 +-
packages/ses/test/test-transforms.js | 22 +++++++++++++++++++++-
2 files changed, 22 insertions(+), 2 deletions(-)
diff --git a/packages/ses/src/transforms.js b/packages/ses/src/transforms.js
index a0fc8d0ef..64a46cb53 100644
--- a/packages/ses/src/transforms.js
+++ b/packages/ses/src/transforms.js
@@ -106,7 +106,7 @@ export const evadeHtmlCommentTest = src => {
// /////////////////////////////////////////////////////////////////////////////
const importPattern = new FERAL_REG_EXP(
- '(^|[^.])\\bimport(\\s*(?:\\(|/[/*]))',
+ '(^|[^.]|\\.\\.\\.)\\bimport(\\s*(?:\\(|/[/*]))',
'g',
);
diff --git a/packages/ses/test/test-transforms.js b/packages/ses/test/test-transforms.js
index cef0c02c1..8f6818b83 100644
--- a/packages/ses/test/test-transforms.js
+++ b/packages/ses/test/test-transforms.js
@@ -6,7 +6,7 @@ import {
} from '../src/transforms.js';
test('no-import-expression regexp', t => {
- t.plan(9);
+ t.plan(13);
// Note: we cannot define these as regular functions (and then stringify)
// because the 'esm' module loader that we use for running the tests (i.e.
@@ -20,6 +20,7 @@ test('no-import-expression regexp', t => {
const safe = 'const a = 1';
const safe2 = "const a = notimport('evil')";
const safe3 = "const a = importnot('evil')";
+ const safe4 = "const a = compartment.import('name')";
const obvious = "const a = import('evil')";
const whitespace = "const a = import ('evil')";
@@ -27,10 +28,14 @@ test('no-import-expression regexp', t => {
const doubleSlashComment = "const a = import // hah\n('evil')";
const newline = "const a = import\n('evil')";
const multiline = "\nimport('a')\nimport('b')";
+ const spread = "{...import('exfil')}";
+ const spread2 = "{\n...\nimport\n('exfil')}";
+ const spread3 = "{\n...\nimport/**/\n('exfil')}";
t.is(rejectImportExpressions(safe), safe, 'safe');
t.is(rejectImportExpressions(safe2), safe2, 'safe2');
t.is(rejectImportExpressions(safe3), safe3, 'safe3');
+ t.is(rejectImportExpressions(safe4), safe4, 'safe4');
t.throws(
() => rejectImportExpressions(obvious),
{ instanceOf: SyntaxError },
@@ -62,6 +67,21 @@ test('no-import-expression regexp', t => {
'possible import expression rejected around line 2',
'multiline',
);
+ t.throws(
+ () => rejectImportExpressions(spread),
+ { instanceOf: SyntaxError },
+ 'spread',
+ );
+ t.throws(
+ () => rejectImportExpressions(spread2),
+ { instanceOf: SyntaxError },
+ 'spread2',
+ );
+ t.throws(
+ () => rejectImportExpressions(spread3),
+ { instanceOf: SyntaxError },
+ 'spread3',
+ );
});
test('no-html-comment-expression regexp', t => {
--
2.40.1
```
### Workarounds
On the web, providing a suitably constrained Content-Security-Policy mitigates most of the threat.
With XS, building a binary that lacks the ability to load modules at runtime mitigates the entirety of the threat. That will look like an implementation of `fxFindModule` in a file like `xsPlatform.c` that calls `fxRejectModuleFile`.
We highly advise applying the above patch for Node.js as there is no known work-around and Node.js’s module specifiers are exceedingly powerful, including support for `data:text/javascript,` style module specifier URLs.
### References
No references at this time.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'ses'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.13.0'}, {'fixed': '0.13.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ses'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.14.0'}, {'fixed': '0.14.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ses'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.15.0'}, {'fixed': '0.15.24'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ses'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.16.0'}, {'fixed': '0.16.1'}]}], 'versions': ['0.16.0']}, {'package': {'ecosystem': 'npm', 'name': 'ses'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.17.0'}, {'fixed': '0.17.1'}]}], 'versions': ['0.17.0']}, {'package': {'ecosystem': 'npm', 'name': 'ses'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.18.0'}, {'fixed': '0.18.7'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/endojs/endo/security/advisories/GHSA-9c4h-3f7h-322r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39532'}, {'type': 'WEB', 'url': 'https://github.com/endojs/endo/commit/fc90c6429604dc79ce8e3355e236ccce2bada041'}, {'type': 'PACKAGE', 'url': 'https://github.com/endojs/endo'}]
|
{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T14:43:20Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-4vqp-pcm3-73xp
|
2023-08-16T21:14:11Z
|
2023-08-16T15:30:17Z
| null |
['CVE-2023-40336']
|
Jenkins Folders Plugin cross-site request forgery vulnerability
|
Jenkins Folders Plugin 6.846.v23698686f0f6 and earlier does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability.
This vulnerability allows attackers to copy an item, which could potentially automatically approve unsandboxed scripts and allow the execution of unsafe scripts.
Folders Plugin 6.848.ve3b_fd7839a_81 requires POST requests for the affected HTTP endpoint.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:cloudbees-folder'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.848.ve3b'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40336'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3106'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/16/3'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:14:11Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-85cf-gj29-f555
|
2023-08-10T20:09:24Z
|
2023-08-10T20:09:24Z
| null |
['CVE-2023-39965']
|
1Panel Arbitrary File Download vulnerability
|
### Summary
Any file downloading vulnerability exists in 1Panel backend.
### Details
Authenticated attackers can download arbitrary files through the API interface. This code has unauthorized access.

### PoC
payload:
POST /api/v1/files/download/bypath HTTP/1.1
Host: ip
Content-Type: application/json
{"path":"/etc/passwd"}

### Impact
Attackers can freely download the file content on the target system. This will be caused a large amount of information leakage.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/1Panel-dev/1Panel'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.3'}, {'fixed': '1.5.0'}]}], 'versions': ['1.4.3']}]
|
[{'type': 'WEB', 'url': 'https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-85cf-gj29-f555'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39965'}, {'type': 'PACKAGE', 'url': 'https://github.com/1Panel-dev/1Panel'}, {'type': 'WEB', 'url': 'https://github.com/1Panel-dev/1Panel/releases/tag/v1.5.0'}]
|
{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-10T20:09:24Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-gjvc-55fw-v6vq
|
2023-08-21T20:47:03Z
|
2023-08-21T20:28:03Z
| null |
['CVE-2023-4455']
|
Wallabag user can delete own API client unintentionally
|
# Description
wallabag was discovered to contain a Cross-Site Request Forgery (CSRF) which allows attackers to arbitrarily delete API key via `/developer/client/delete/{id}`
This vulnerability has a CVSSv3.1 score of 6.5.
**You should immediately patch your instance to version 2.6.3 or higher if you have more than one user and/or having open registration**.
# Resolution
This action is now doable only via POST method, which ensures that we can't do it via a 3rd-party website.
# Credits
We would like to thank @tht1997 for reporting this issue through huntr.dev.
Reference: https://huntr.dev/bounties/5ab1b206-5fe8-4737-b275-d705e76f193a/
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'wallabag/wallabag'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-alpha.1'}, {'fixed': '2.6.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.6.2'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/wallabag/wallabag/security/advisories/GHSA-gjvc-55fw-v6vq'}, {'type': 'WEB', 'url': 'https://github.com/wallabag/wallabag/commit/ffcc5c9062fcc8cd922d7d6d65edbe5efae96806'}, {'type': 'PACKAGE', 'url': 'https://github.com/wallabag/wallabag'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/5ab1b206-5fe8-4737-b275-d705e76f193a/'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-21T20:28:03Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-hpf4-v7v2-95p2
|
2023-09-07T21:28:14Z
|
2023-08-09T14:38:18Z
| null |
['CVE-2023-39528']
|
PrestaShop file access through path traversal
|
### Impact
`displayAjaxEmailHTML` method can be used to read any file on the server, potentially even outside of the project if the server is not correctly configured.
This vulnerability can be exacerbated when coupled with [CWE-502](https://cwe.mitre.org/data/definitions/502.html), which pertains to the Deserialization of Untrusted Data. Such a combination could potentially lead to a Remote Code Execution (RCE) vulnerability
### Patches
8.1.1
### Found by
Aleksey Solovev (Positive Technologies)
### Workarounds
### References
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.1.0'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-hpf4-v7v2-95p2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39528'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/commit/11de3a84322fa4ecd0995ac40d575db61804724c'}, {'type': 'PACKAGE', 'url': 'https://github.com/PrestaShop/PrestaShop'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T14:38:18Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-pg75-v6fp-8q59
|
2023-08-01T20:16:29Z
|
2023-08-01T20:16:29Z
| null |
['CVE-2023-38200']
|
Keylime's registrar vulnerable to Denial-of-service attack via a single open connection
|
### Impact
Keylime `registrar` is prone to a simple denial of service attack in which an adversary opens a connection to the TLS port (by default, port `8891`) blocking further, legitimate connections. As long as the connection is open, the `registrar` is blocked and cannot serve any further clients (`agents` and `tenants`), which prevents normal operation. The problem does not affect the `verifier`.
### Patches
Users should upgrade to release 7.4.0
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'keylime'}, 'ecosystem_specific': {'affected_functions': ['keylime.registrar_common.start', 'keylime.registrar_common.ProtectedHandler']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.4.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/keylime/keylime/security/advisories/GHSA-pg75-v6fp-8q59'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38200'}, {'type': 'WEB', 'url': 'https://github.com/keylime/keylime/pull/1421'}, {'type': 'WEB', 'url': 'https://github.com/keylime/keylime/commit/c68d8f0b7ea549c12b6956ab0f3c28ae0360ae17'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2023-38200'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2222692'}, {'type': 'PACKAGE', 'url': 'https://github.com/keylime/keylime'}, {'type': 'WEB', 'url': 'https://github.com/keylime/keylime/releases/tag/v7.4.0'}]
|
{'cwe_ids': ['CWE-834'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T20:16:29Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-vxjg-hchx-cc4g
|
2023-08-04T18:41:47Z
|
2023-08-01T16:59:40Z
| null |
['CVE-2023-38695']
|
@simonsmith/cypress-image-snapshothas fix for insecure snapshot file names
|
### Impact
It's possible for a user to pass a relative file path for the snapshot name and reach outside of the project directory into the machine running the test. Example:
```js
cy.get('h1').matchImageSnapshot('../../../ignore-relative-dirs')
```
The above will create an `ignore-relative-dirs.png` three levels up
### Patches
Fixed in `8.0.2`
### Workarounds
Validate all the existing uses of `matchImageSnapshot` to ensure correct use of the filename argument. Example:
```js
// snapshot name will be the test title
cy.matchImageSnapshot();
// snapshot name will be the name passed in
cy.matchImageSnapshot('login');
```
### References
https://github.com/simonsmith/cypress-image-snapshot/issues/15
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@simonsmith/cypress-image-snapshot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.0.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.0.1'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/simonsmith/cypress-image-snapshot/security/advisories/GHSA-vxjg-hchx-cc4g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38695'}, {'type': 'WEB', 'url': 'https://github.com/simonsmith/cypress-image-snapshot/issues/15'}, {'type': 'WEB', 'url': 'https://github.com/simonsmith/cypress-image-snapshot/commit/ef49519795daf5183f4fac6f3136e194f20f39f4'}, {'type': 'PACKAGE', 'url': 'https://github.com/simonsmith/cypress-image-snapshot'}, {'type': 'WEB', 'url': 'https://github.com/simonsmith/cypress-image-snapshot/releases/tag/8.0.2'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T16:59:40Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-g3v6-r8p9-wxg9
|
2023-08-11T21:53:22Z
|
2023-08-11T09:30:36Z
| null |
['CVE-2023-4105']
|
Mattermost fails to correctly delete attachments
|
Mattermost fails to delete the attachments when deleting a message in a thread allowing a simple user to still be able to access and download the attachment of a deleted message
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.9.0'}, {'fixed': '7.9.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.9.5'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.10.0'}, {'fixed': '7.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.10.3'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.8.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.8.7'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4105'}, {'type': 'WEB', 'url': 'https://mattermost.com/security-updates'}, {'type': 'PACKAGE', 'url': 'github.com/mattermost/mattermost'}]
|
{'cwe_ids': ['CWE-284', 'CWE-862'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T21:53:22Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-jp5r-4x9q-4vcf
|
2023-08-17T13:52:15Z
|
2023-08-11T15:30:46Z
| null |
['CVE-2020-24922']
|
xuxueli xxl-job Cross-Site Request Forgery Vulnerability
|
Cross Site Request Forgery (CSRF) vulnerability in `xxl-job-admin/user/add` in xuxueli xxl-job version 2.2.0 allows remote attackers to execute arbitrary code and esclate privileges via crafted .html file.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.xuxueli:xxl-job'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24922'}, {'type': 'WEB', 'url': 'https://github.com/xuxueli/xxl-job/issues/1921'}, {'type': 'PACKAGE', 'url': 'https://github.com/xuxueli/xxl-job'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T21:11:20Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-rq5c-hvw6-8pr7
|
2023-08-29T17:35:55Z
|
2023-08-29T17:35:55Z
| null |
['CVE-2023-39348']
|
Improper log output when using GitHub Status Notifications in spinnaker
|
### Impact
ONLY IMPACTS those use GitHub Status Notifications
Log output when updating GitHub status is improperly set to FULL always. It's recommended to apply the patch and rotate the GitHub token used for github status notifications. Given that this would output github tokens to a log system, the risk is slightly higher than a "low" since token exposure could grant elevated access to repositories outside of control. If using READ restricted tokens, the exposure is such that the token itself could be used to access resources otherwise restricted from reads.
### Patches
Patch is in progress. https://github.com/spinnaker/echo/pull/1316
### Workarounds
Disable GH Status Notifications. Filter your logs for Echo log data. Use read-only tokens that are limited in scope.
### References
sig-security in slack: https://spinnakerteam.slack.com/archives/CFN8F5UR2
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/spinnaker/spinnaker'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 1.28.8'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/spinnaker/spinnaker'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.29.0'}]}], 'database_specific': {'last_known_affected_version_range': '< 1.29.6'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/spinnaker/spinnaker'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.30.0'}]}], 'database_specific': {'last_known_affected_version_range': '< 1.30.3'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/spinnaker/spinnaker'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.31.0'}]}], 'database_specific': {'last_known_affected_version_range': '< 1.31.1'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/spinnaker/spinnaker/security/advisories/GHSA-rq5c-hvw6-8pr7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39348'}, {'type': 'WEB', 'url': 'https://github.com/spinnaker/echo/pull/1316'}, {'type': 'PACKAGE', 'url': 'https://github.com/spinnaker/spinnaker'}]
|
{'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T17:35:55Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-q4pp-j36h-3gqg
|
2023-08-24T12:53:06Z
|
2023-08-24T12:53:06Z
| null |
[]
|
Minimal `basti` IAM Policy Allows Shell Access
|
### Summary
The provided Minimal IAM Policy for `bastic connect` does not include `ssm:SessionDocumentAccessCheck`. This results in the ability to get a shell session on the bastion, not just the intended access for Port Forwarding.
### Details
`basti connect` is designed to "securely connect to your RDS/Aurora/Elasticache/EC2 instances", using a bastion instance "with [AWS Session Manager](https://docs.aws.amazon.com/systems-manager/latest/userguide/session-manager.html) port forwarding capability to make the target available on your localhost."
The [Minimal IAM Policy](https://github.com/BohdanPetryshyn/basti#minimal-iam-permissions) allows port forwarding via the following statement:
```
{
"Effect": "Allow",
"Action": "ssm:StartSession",
"Resource": [
"arn:aws:ssm:*:*:document/AWS-StartPortForwardingSessionToRemoteHost",
"arn:aws:ec2:<your-region>:<your-account-id>:instance/<your-basti-instance-id>"
]
}
```
This statement does not include the following condition:
```
"Condition": {
"BoolIfExists": {
"ssm:SessionDocumentAccessCheck": "true"
}
}
```
As a result, the `basti connect` minimal policy is logically identical to:
```
{
"Effect": "Allow",
"Action": "ssm:StartSession",
"Resource": [
"arn:aws:ssm:*:*:document/AWS-StartPortForwardingSessionToRemoteHost",
"arn:aws:ssm:*:*:document/SSM-SessionManagerRunShell",
"arn:aws:ec2:<your-region>:<your-account-id>:instance/<your-basti-instance-id>"
]
}
```
A `basti` admin would expect users under the minimal policy to be able to port forward. However, they could also get a shell on the bastion.
For more details on this footgun, see: https://ramimac.me/ssm-iam
### PoC
_Complete instructions, including specific configuration details, to reproduce the vulnerability._
### Impact
Impact would depend on configuration/hardening of the bastion. I've seen examples where bastions have credentials to downstream systems in configuration or memory that would be exposed.
|
[]
|
[{'package': {'ecosystem': 'npm', 'name': 'basti-cdk'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/BohdanPetryshyn/basti/security/advisories/GHSA-q4pp-j36h-3gqg'}, {'type': 'WEB', 'url': 'https://github.com/BohdanPetryshyn/basti/commit/f6f218e7cd450e29aeb616960b7abbe8dfc87796'}, {'type': 'PACKAGE', 'url': 'https://github.com/BohdanPetryshyn/basti'}]
|
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-24T12:53:06Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-g3m9-pr5m-4cvp
|
2023-09-01T19:43:01Z
|
2023-08-28T09:30:20Z
| null |
['CVE-2023-27604']
|
Airflow Sqoop Provider RCE Vulnerability
|
Apache Airflow Sqoop Provider, versions before 4.0.0, is affected by a vulnerability that allows an attacker pass parameters with the connections, which makes it possible to implement RCE attacks via ‘sqoop import --connect’, obtain airflow server permissions, etc. The attacker needs to be logged in and have authorization (permissions) to create/edit connections.
It is recommended to upgrade to a version that is not affected.
This issue was reported independently by happyhacking-k, And Xie Jianming and LiuHui of Caiji Sec Team also reported it.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow-providers-apache-sqoop'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27604'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/33039'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/lswlxf11do51ob7f6xyyg8qp3n7wdrgd'}]
|
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-30T20:15:43Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-5pv6-rprw-82wv
|
2023-08-31T00:00:29Z
|
2023-08-22T21:30:26Z
| null |
['CVE-2022-45582']
|
Horizon Web Dashboard Open Redirect vulnerability
|
Open Redirect vulnerability in Horizon Web Dashboard 19.4.0 thru 20.1.4 via the success_url parameter.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'horizon'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.4.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45582'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/horizon/+bug/1982676'}, {'type': 'PACKAGE', 'url': 'https://github.com/openstack/horizon'}, {'type': 'WEB', 'url': 'https://github.com/openstack/horizon/blob/master/horizon/workflows/views.py#L96-L102'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/horizon/PYSEC-2023-153.yaml'}, {'type': 'WEB', 'url': 'https://opendev.org/openstack/horizon/commit/79d139594290779b2f74ca894332aa7f2f7e4735'}]
|
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-23T13:21:23Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-ch6w-mc6c-g65g
|
2023-08-22T18:09:10Z
|
2023-08-21T18:31:23Z
|
2023-08-22T18:09:10Z
|
[]
|
Duplicate Advisory: weaviate denial of service vulnerability
|
## Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-8697-479h-5mfp. This link is maintained to preserve external references.
## Original Description
An issue in weaviate v.1.20.0 allows a remote attacker to cause a denial of service via the `handleUnbatchedGraphQLRequest` function.
|
[]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/weaviate/weaviate'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.20.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38976'}, {'type': 'WEB', 'url': 'https://github.com/weaviate/weaviate/issues/3258'}, {'type': 'PACKAGE', 'url': 'https://github.com/weaviate/weaviate'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-21T20:41:45Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-cj8w-v588-p8wx
|
2023-08-31T14:49:19Z
|
2023-08-29T00:32:04Z
| null |
['CVE-2023-40828']
|
pf4j vulnerable to remote code execution via expandIfZip method in the extract function
|
An issue in pf4j pf4j v.3.9.0 and before allows a remote attacker to obtain sensitive information and execute arbitrary code via the expandIfZip method in the extract function.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.pf4j:pf4j'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.9.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40828'}, {'type': 'WEB', 'url': 'https://github.com/pf4j/pf4j/pull/537'}, {'type': 'WEB', 'url': 'https://github.com/pf4j/pf4j/pull/538'}, {'type': 'WEB', 'url': 'https://github.com/pf4j/pf4j/commit/8e0aa198c4e652cfc1eb9e05ca9b64397f67cc72'}, {'type': 'PACKAGE', 'url': 'https://github.com/pf4j/pf4j'}]
|
{'cwe_ids': ['CWE-22', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T17:40:51Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-j55r-787p-m549
|
2023-09-01T19:46:34Z
|
2023-08-22T18:00:04Z
| null |
['CVE-2023-40185']
|
Shescape on Windows escaping may be bypassed in threaded context
|
### Impact
This may impact users that use Shescape on Windows in a threaded context (e.g. using [Worker threads](https://nodejs.org/api/worker_threads.html)). The vulnerability can result in Shescape escaping (or quoting) for the wrong shell, thus allowing attackers to bypass protections depending on the combination of expected and used shell.
This snippet demonstrates a vulnerable use of Shescape:
```javascript
// vulnerable.js
import { exec } from "node:child_process";
import { Worker, isMainThread } from 'node:worker_threads';
import * as shescape from "shescape";
if (isMainThread) {
// 1. Something like a worker thread must be used. The reason being that they
// unexpectedly change environment variable names on Windows.
new Worker("./vulnerable.js");
} else {
// 2. Example configuration that's problematic. In this setup example the
// expected default system shell is CMD. We configure the use of PowerShell.
// Shescape will fail to look up PowerShell and default to escaping for CMD
// instead, resulting in the vulnerability.
const options = {
shell: "powershell",
interpolation: true,
};
// 3. Using shescape to protect against attacks, this is correct.
const escaped = shescape.escape("&& ls", options);
// 4. Invoking a command with the escaped user input, this is vulnerable in
// this case.
exec(`echo Hello ${escaped}`, options, (error, stdout) => {
if (error) {
console.error(`An error occurred: ${error}`);
} else {
console.log(stdout);
}
});
}
```
### Patches
This bug has been patched in [v1.7.4](https://github.com/ericcornelissen/shescape/releases/tag/v1.7.4) which you can upgrade to now. No further changes are required.
### Workarounds
If you are impacted there is no workaround possible.
### References
- Shescape Pull Request [#1142](https://github.com/ericcornelissen/shescape/pull/1142)
- Shescape commit [`0b976da`](https://github.com/ericcornelissen/shescape/commit/0b976dab645abf45ffd85e74a8c6e51ee2f42d63)
- Shescape release [v1.7.4](https://github.com/ericcornelissen/shescape/releases/tag/v1.7.4)
### For more information
- Comment on Pull Request [#1142](https://github.com/ericcornelissen/shescape/pull/1142)
- Comment on commit [`0b976da`](https://github.com/ericcornelissen/shescape/commit/0b976dab645abf45ffd85e74a8c6e51ee2f42d63)
- Open an issue at [https://github.com/ericcornelissen/shescape/issues](https://github.com/ericcornelissen/shescape/issues?q=is%3Aissue+is%3Aopen+sort%3Aupdated-desc) (New issue > Question > Get started)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'shescape'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.4'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/ericcornelissen/shescape/security/advisories/GHSA-j55r-787p-m549'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40185'}, {'type': 'WEB', 'url': 'https://github.com/ericcornelissen/shescape/pull/1142'}, {'type': 'WEB', 'url': 'https://github.com/ericcornelissen/shescape/commit/0b976dab645abf45ffd85e74a8c6e51ee2f42d63'}, {'type': 'PACKAGE', 'url': 'https://github.com/ericcornelissen/shescape'}, {'type': 'WEB', 'url': 'https://github.com/ericcornelissen/shescape/releases/tag/v1.7.4'}]
|
{'cwe_ids': ['CWE-150'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-22T18:00:04Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-pr76-5cm5-w9cj
|
2023-08-18T15:48:20Z
|
2023-08-11T09:30:36Z
| null |
['CVE-2023-40267']
|
GitPython vulnerable to remote code execution due to insufficient sanitization of input arguments
|
GitPython before 3.1.32 does not block insecure non-multi options in `clone` and `clone_from`, making it vulnerable to Remote Code Execution (RCE) due to improper user input validation, which makes it possible to inject a maliciously crafted remote URL into the clone command. Exploiting this vulnerability is possible because the library makes external calls to git without sufficient sanitization of input arguments. NOTE: this issue exists because of an incomplete fix for CVE-2022-24439.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'GitPython'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.32'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40267'}, {'type': 'WEB', 'url': 'https://github.com/gitpython-developers/GitPython/pull/1609'}, {'type': 'WEB', 'url': 'https://github.com/gitpython-developers/GitPython/commit/ca965ecc81853bca7675261729143f54e5bf4cdd'}, {'type': 'PACKAGE', 'url': 'https://github.com/gitpython-developers/GitPython'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/gitpython/PYSEC-2023-137.yaml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AV5DV7GBLMOZT7U3Q4TDOJO5R6G3V6GH/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PF6AXUTC5BO7L2SBJMCVKJSPKWY52I5R/'}]
|
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T19:48:27Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-fr9g-2m2h-c27j
|
2023-08-16T21:00:20Z
|
2023-08-16T06:30:24Z
|
2023-08-16T21:00:20Z
|
[]
|
Duplicate Advisory: @excalidraw/excalidraw Cross-site Scripting vulnerability
|
## Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-v7v8-gjv7-ffmr. This link is maintained to preserve external references.
## Original Description
Versions of the package @excalidraw/excalidraw from 0.0.0 are vulnerable to Cross-site Scripting (XSS) via embedded links in whiteboard objects due to improper input sanitization.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@excalidraw/excalidraw'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26140'}, {'type': 'WEB', 'url': 'https://github.com/excalidraw/excalidraw/pull/6728'}, {'type': 'WEB', 'url': 'https://github.com/excalidraw/excalidraw/commit/b33fa6d6f64d27adc3a47b25c0aa55711740d0af'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-EXCALIDRAWEXCALIDRAW-5841658'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:00:20Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-jm77-qphf-c4w8
|
2023-08-01T22:34:41Z
|
2023-08-01T22:34:41Z
| null |
[]
|
pyca/cryptography's wheels include vulnerable OpenSSL
|
pyca/cryptography's wheels include a statically linked copy of OpenSSL. The versions of OpenSSL included in cryptography 0.8-41.0.2 are vulnerable to several security issues. More details about the vulnerabilities themselves can be found in https://www.openssl.org/news/secadv/20230731.txt, https://www.openssl.org/news/secadv/20230719.txt, and https://www.openssl.org/news/secadv/20230714.txt.
If you are building cryptography source ("sdist") then you are responsible for upgrading your copy of OpenSSL. Only users installing from wheels built by the cryptography project (i.e., those distributed on PyPI) need to update their cryptography versions.
|
[]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'cryptography'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8'}, {'fixed': '41.0.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/security/advisories/GHSA-jm77-qphf-c4w8'}, {'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/commit/b22271cf3c3dd8dc8978f8f4b00b5c7060b6538d'}, {'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/commit/bfa4d95f0f356f2d535efd5c775e0fb3efe90ef2'}, {'type': 'PACKAGE', 'url': 'https://github.com/pyca/cryptography'}, {'type': 'WEB', 'url': 'https://www.openssl.org/news/secadv/20230714.txt'}, {'type': 'WEB', 'url': 'https://www.openssl.org/news/secadv/20230719.txt'}, {'type': 'WEB', 'url': 'https://www.openssl.org/news/secadv/20230731.txt'}]
|
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T22:34:41Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-w3qm-93vf-5hrw
|
2023-08-09T14:33:39Z
|
2023-08-06T18:30:25Z
| null |
['CVE-2023-4196']
|
Cockpit Cross-site Scripting vulnerability
|
Cross-site Scripting (XSS) - Stored in GitHub repository cockpit-hq/cockpit prior to 2.6.3. For any role that has permission to execute function assets, an attacker can upload a html file and that leads to XSS.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'cockpit-hq/cockpit'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4196'}, {'type': 'WEB', 'url': 'https://github.com/cockpit-hq/cockpit/commit/039a00cc310bff128ca6e6c1c46c6fbad0385c2c'}, {'type': 'PACKAGE', 'url': 'https://github.com/cockpit-hq/cockpit'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c275a2d4-721f-49f7-8787-b146af2056a0'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T14:33:39Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-c7hh-3v6c-fj4q
|
2023-08-04T17:26:07Z
|
2023-08-04T17:26:07Z
| null |
['CVE-2023-38700']
|
matrix-appservice-irc events can be crafted to leak parts of targeted messages from other bridged rooms
|
### Impact
It was possible to craft an event such that it would leak part of a targeted message event from another bridged room. This required knowing an event ID to target.
### Patches
Please upgrade to 1.0.1.
### Workarounds
You can set the `matrixHandler.eventCacheSize` config value to `0` to workaround this bug. However, this may impact performance.
### Credits
Discovered and reported by [Val Lorentz](https://valentin-lorentz.fr/).
### For more information
If you have any questions or comments about this advisory email us at [security@matrix.org](mailto:security@matrix.org).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'matrix-appservice-irc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.0'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-appservice-irc/security/advisories/GHSA-c7hh-3v6c-fj4q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38700'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-appservice-irc/commit/8bbd2b69a16cbcbeffdd9b5c973fd89d61498d75'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/matrix-appservice-irc'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-appservice-irc/releases/tag/1.0.1'}]
|
{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-04T17:26:07Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-hf5p-f83x-5q2g
|
2023-08-23T22:14:55Z
|
2023-08-17T21:30:54Z
| null |
['CVE-2023-40315']
|
OpenNMS privilege escalation vulnerability
|
In OpenNMS Horizon 31.0.8 and versions earlier than 32.0.2 and related Meridian versions, any user that has the ROLE_FILESYSTEM_EDITOR can easily escalate their privileges to ROLE_ADMIN or any other role. The solution is to upgrade to Meridian 2023.1.5 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanks Erik Wynter for reporting this issue.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:L'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.opennms:opennms-webapp-rest'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '31.0.8'}, {'fixed': '32.0.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40315'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/pull/6250'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/commit/f2caf7d0b9db58b59e98506490aaca37fbf243b6'}, {'type': 'WEB', 'url': 'https://docs.opennms.com/meridian/2023/releasenotes/changelog.html#releasenotes-changelog-Meridian-2023.1.5'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenNMS/opennms'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-18T21:51:28Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-2rf5-3fw8-qm47
|
2023-08-09T14:38:46Z
|
2023-08-09T14:38:46Z
| null |
['CVE-2023-39529']
|
PrestaShop file deletion via attachment API
|
### Impact
It is possible to delete a file from the server by using the Attachments controller and the Attachments API.
### Patches
8.1.1
### Found by
Kto94 (via Yeswehack)
### Workarounds
none
### References
none
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.1.0'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-2rf5-3fw8-qm47'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39529'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/commit/b08c647305dc1e9e6a2445b724d13a9733b6ed82'}, {'type': 'PACKAGE', 'url': 'https://github.com/PrestaShop/PrestaShop'}]
|
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T14:38:46Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-599v-h3q5-g6r9
|
2023-08-24T22:33:24Z
|
2023-08-21T20:41:09Z
| null |
['CVE-2023-4453']
|
Pimcore Cross-site Scripting (XSS) vulnerability in DataObject datetime fields
|
### Impact
This vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites.
### Patches
Update to version 10.6.8 or apply this patch manually https://github.com/pimcore/pimcore/commit/234c0c02ea7502071b00ab673fbe4a6ac253080e.patch
### Workarounds
Apply patch https://github.com/pimcore/pimcore/commit/234c0c02ea7502071b00ab673fbe4a6ac253080e.patch manually.
### References
https://huntr.dev/bounties/245a8785-0fc0-4561-b181-fa20f869d993/
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.6.8'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-599v-h3q5-g6r9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4453'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/234c0c02ea7502071b00ab673fbe4a6ac253080e'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/245a8785-0fc0-4561-b181-fa20f869d993'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-21T20:41:09Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-fj32-q626-pjjc
|
2023-08-22T16:42:24Z
|
2023-08-15T18:31:32Z
| null |
['CVE-2023-38860']
|
LangChain vulnerable to arbitrary code execution
|
An issue in LangChain v.0.0.231 allows a remote attacker to execute arbitrary code via the prompt parameter.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'langchain'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.231'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38860'}, {'type': 'WEB', 'url': 'https://github.com/hwchase17/langchain/issues/7641'}, {'type': 'WEB', 'url': 'https://github.com/langchain-ai/langchain/issues/7641'}, {'type': 'PACKAGE', 'url': 'https://github.com/hwchase17/langchain'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2023-145.yaml'}]
|
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-15T20:01:59Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-wc9j-gc65-3cm7
|
2023-08-31T21:47:28Z
|
2023-08-31T21:47:28Z
| null |
['CVE-2023-41034']
|
DDFFileParser is vulnerable to XXE Attacks
|
### Impact
`DDFFileParser` and `DefaultDDFFileValidator` (and so `ObjectLoader`) are vulnerable to [XXE Attacks](https://owasp.org/www-community/vulnerabilities/XML_External_Entity_(XXE)_Processing).
[DDF file](https://github.com/eclipse-leshan/leshan/wiki/Adding-new-objects#the-lwm2m-model) is a LWM2M format used to store LWM2M object description.
Leshan users are impacted only if they parse untrusted DDF files (e.g. if they let external users provide their own model), in that case they MUST upgrade to fixed version.
If you parse only trusted DDF file and validate only with trusted xml schema, upgrading is not mandatory.
### Patches
This is fixed in **v1.5.0** and **2.0.0-M13**.
### Workarounds
No easy way. Eventually writing your own `DDFFileParser`/`DefaultDDFFileValidator` (and so `ObjectLoader`) creating a `DocumentBuilderFactory` with :
```java
// For DDFFileParser
DocumentBuilderFactory factory = DocumentBuilderFactory.newInstance();
factory.setFeature(XMLConstants.FEATURE_SECURE_PROCESSING, true);
factory.setFeature("http://apache.org/xml/features/disallow-doctype-decl", true); // Disable DTDs
factory.setXIncludeAware(false); // Disable XML Inclusions
factory.setExpandEntityReferences(false); // disable expand entity reference nodes
// For DefaultDDFFileValidator
SchemaFactory factory = SchemaFactory.newInstance(XMLConstants.W3C_XML_SCHEMA_NS_URI);
factory.setFeature(XMLConstants.FEATURE_SECURE_PROCESSING, true);
factory.setProperty(XMLConstants.ACCESS_EXTERNAL_DTD, "");
factory.setProperty(XMLConstants.ACCESS_EXTERNAL_SCHEMA, "");
```
### References
- https://owasp.org/www-community/vulnerabilities/XML_External_Entity_(XXE)_Processing
- https://cheatsheetseries.owasp.org/cheatsheets/XML_External_Entity_Prevention_Cheat_Sheet.html
- https://semgrep.dev/docs/cheat-sheets/java-xxe/
- https://community.veracode.com/s/article/Java-Remediation-Guidance-for-XXE
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.leshan:leshan-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.leshan:leshan-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-M1'}, {'fixed': '2.0.0-M13'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/eclipse-leshan/leshan/security/advisories/GHSA-wc9j-gc65-3cm7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-41034'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-leshan/leshan/commit/29577d2879ba8e7674c3b216a7f01193fc7ae013'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-leshan/leshan/commit/4d3e63ac271a817f81fba3e3229c519af7a3049c'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse-leshan/leshan'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-leshan/leshan/wiki/Adding-new-objects#the-lwm2m-model'}, {'type': 'WEB', 'url': 'https://owasp.org/www-community/vulnerabilities/XML_External_Entity_(XXE)_Processing'}]
|
{'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-31T21:47:28Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-735f-w79p-282x
|
2023-08-03T19:40:12Z
|
2023-08-03T16:32:49Z
| null |
['CVE-2023-4145']
|
pimcore/customer-management-framework-bundle Cross-site Scripting vulnerability in Segment name
|
### Impact
As HTML injection works in email an attacker can trick a victim to click on such hyperlinks to redirect him to any malicious site and also can host a XSS page. All this will surely cause some damage to the victim. This could lead to users being tricked into giving logins away to malicious attackers.
### Patches
Update to version 3.4.2 or apply this patch manually https://github.com/pimcore/customer-data-framework/commit/72f45dd537a706954e7a71c99fbe318640e846a2.patch
### Workarounds
Apply https://github.com/pimcore/customer-data-framework/commit/72f45dd537a706954e7a71c99fbe318640e846a2.patch manually.
### References
https://huntr.dev/bounties/ce852777-2994-40b4-bb4e-c4d10023eeb0/
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/customer-management-framework-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pimcore/customer-data-framework/security/advisories/GHSA-735f-w79p-282x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4145'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/customer-data-framework/commit/72f45dd537a706954e7a71c99fbe318640e846a2'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/customer-data-framework/commit/72f45dd537a706954e7a71c99fbe318640e846a2.patch'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/customer-data-framework'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ce852777-2994-40b4-bb4e-c4d10023eeb0'}]
|
{'cwe_ids': ['CWE-79', 'CWE-87'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T16:32:49Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-hgj4-h2x3-rfx4
|
2023-08-09T20:58:47Z
|
2023-08-09T20:58:47Z
| null |
['CVE-2023-39531']
|
Sentry vulnerable to incorrect credential validation on OAuth token requests
|
### Impact
An attacker with sufficient client-side exploits could retrieve a valid access token for another user during the OAuth token exchange due to incorrect credential validation. The client ID must be known and the API application must have already been authorized on the targeted user account.
### Remediation
- **Sentry SaaS** customers do not need to take any action. Those with the highest risk will be contacted directly by Sentry.
- **Self-hosted installations** should upgrade to version 23.7.2 or higher.
### Workarounds
There are no direct workarounds, but users should review applications authorized on their account (_User Settings > Authorized Applications_) and remove any that are no longer needed.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'sentry'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '23.7.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/getsentry/sentry/security/advisories/GHSA-hgj4-h2x3-rfx4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39531'}, {'type': 'PACKAGE', 'url': 'https://github.com/getsentry/sentry'}]
|
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T20:58:47Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-99fg-2h75-m92h
|
2023-08-31T14:40:30Z
|
2023-08-28T18:30:53Z
| null |
['CVE-2023-39062']
|
Spipu HTML2PDF vulnerable to cross-site scripting
|
Cross Site Scripting vulnerability in Spipu HTML2PDF before v.5.2.8 allows a remote attacker to execute arbitrary code via a crafted script to the forms.php.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'spipu/html2pdf'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.8'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39062'}, {'type': 'WEB', 'url': 'https://github.com/spipu/html2pdf/commit/92afd81823d62ad95eb9d034858311bb63aeb4ac'}, {'type': 'WEB', 'url': 'https://github.com/afine-com/CVE-2023-39062'}, {'type': 'WEB', 'url': 'https://github.com/sectroyer/CVEs/tree/main/CVE-2023-39062'}, {'type': 'PACKAGE', 'url': 'https://github.com/spipu/html2pdf'}, {'type': 'WEB', 'url': 'https://github.com/spipu/html2pdf/blob/92afd81823d62ad95eb9d034858311bb63aeb4ac/CHANGELOG.md'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T17:38:56Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-3fjv-8r82-6xm9
|
2023-08-22T17:54:44Z
|
2023-08-22T00:31:11Z
| null |
['CVE-2023-4301']
|
Jenkins Fortify Plugin cross-site request forgery vulnerability
|
Jenkins Fortify Plugin 22.1.38 and earlier does not perform permission checks in several HTTP endpoints.
This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Additionally, these HTTP endpoints do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
Fortify Plugin 22.2.39 requires POST requests and the appropriate permissions for the affected HTTP endpoints.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:fortify'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.2.39'}]}], 'database_specific': {'last_known_affected_version_range': '<= 22.1.38'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4301'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/fortify-plugin/commit/357d7bfbcb0ff796ea7d078bee13159f1d000f5d'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/fortify-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3115'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-22T17:54:44Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-2jc4-r94c-rp7h
|
2023-08-31T18:49:44Z
|
2023-08-21T09:30:21Z
| null |
['CVE-2022-46751']
|
Apache Ivy External Entity Reference vulnerability
|
Improper Restriction of XML External Entity Reference, XML Injection (aka Blind XPath Injection) vulnerability in Apache Software Foundation Apache Ivy.This issue affects any version of Apache Ivy prior to 2.5.2.
When Apache Ivy prior to 2.5.2 parses XML files - either its own configuration, Ivy files or Apache Maven POMs - it will allow downloading external document type definitions and expand any entity references contained therein when used.
This can be used to exfiltrate data, access resources only the machine running Ivy has access to or disturb the execution of Ivy in different ways.
Starting with Ivy 2.5.2 DTD processing is disabled by default except when parsing Maven POMs where the default is to allow DTD processing but only to include a DTD snippet shipping with Ivy that is needed to deal with existing Maven POMs that are not valid XML files but are nevertheless accepted by Maven. Access can be be made more lenient via newly introduced system properties where needed.
Users of Ivy prior to version 2.5.2 can use Java system properties to restrict processing of external DTDs, see the section about "JAXP Properties for External Access restrictions" inside Oracle's "Java API for XML Processing (JAXP) Security Guide".
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ivy:ivy'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46751'}, {'type': 'WEB', 'url': 'https://github.com/apache/ant-ivy/commit/2be17bc18b0e1d4123007d579e43ba1a4b6fab3d'}, {'type': 'WEB', 'url': 'https://docs.oracle.com/en/java/javase/13/security/java-api-xml-processing-jaxp-security-guide.html#GUID-94ABC0EE-9DC8-44F0-84AD-47ADD5340477'}, {'type': 'WEB', 'url': 'https://gitbox.apache.org/repos/asf?p=ant-ivy.git;a=commit;h=2be17bc18b0e1d4123007d579e43ba1a4b6fab3d'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/ant-ivy'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/1dj60hg5nr36kjr4p1100dwjrqookps8'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/9gcz4xrsn8c7o9gb377xfzvkb8jltffr'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/09/06/9'}]
|
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-21T20:39:45Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-826j-8wp2-4x6q
|
2023-08-25T18:42:53Z
|
2023-08-25T18:42:53Z
| null |
['CVE-2023-32079']
|
Netmaker Vulnerable to Privilege Escalation From Non Admin To Admin User
|
### Impact
A Mass assignment vulnerability was found allowing a non-admin user to escalate privileges to admin user.
### Patches
Issue is patched in 0.17.1, and fixed in 0.18.6+.
If Users are using 0.17.1, they should run "docker pull gravitl/netmaker:v0.17.1" and "docker-compose up -d". This will switch them to the patched users
If users are using v0.18.0-0.18.5, they should upgrade to v0.18.6 or later.
### Workarounds
If using 0.17.1, can just pull the latest docker image of backend and restart server.
### References
Credit to Project Discovery, and in particular https://github.com/rootxharsh , https://github.com/iamnoooob, and https://github.com/projectdiscovery
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/gravitl/netmaker'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.17.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/gravitl/netmaker'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.18.0'}, {'fixed': '0.18.6'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/gravitl/netmaker/security/advisories/GHSA-826j-8wp2-4x6q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32079'}, {'type': 'PACKAGE', 'url': 'https://github.com/gravitl/netmaker'}]
|
{'cwe_ids': ['CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-25T18:42:53Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-xcq3-7pf3-5jvc
|
2023-08-09T14:32:48Z
|
2023-08-06T18:30:25Z
| null |
['CVE-2023-4195']
|
Cockpit PHP Remote File Inclusion vulnerability
|
PHP Remote File Inclusion in GitHub repository cockpit-hq/cockpit prior to 2.6.3. Users may upload php files through the system file upload utility to obtain remote code execution.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'cockpit-hq/cockpit'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4195'}, {'type': 'WEB', 'url': 'https://github.com/cockpit-hq/cockpit/commit/800c05f1984db291769ffa5fdfb1d3e50968e95b'}, {'type': 'PACKAGE', 'url': 'https://github.com/cockpit-hq/cockpit'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0bd5da2f-0e29-47ce-90f3-06518656bfd6'}]
|
{'cwe_ids': ['CWE-98'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T14:32:48Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-vx8m-6fhw-pccw
|
2023-08-21T20:13:05Z
|
2023-08-21T20:13:05Z
| null |
['CVE-2023-40178']
|
@node-saml/node-saml's validatePostRequestAsync does not include checkTimestampsValidityError
|
### Summary
The lack of checking of current timestamp allows a LogoutRequest XML to be reused multiple times even when the current time is past the NotOnOrAfter.
### Details
It was noticed that in the validatePostRequestAsync() flow in saml.js, the current timestamp is never checked. This could present a vulnerability where a user who has an XML LogoutRequest could validated it if the IssueInstance and the NotOnOrAfter are valid along with valid credentials (signature, certificate etc.).
### PoC
I was able to validate a sample valid LogoutRequest XML multiple times through postman by sending it to my endpoint regardless if the current present time was past the NotOnOrAfter time. After some further testing, it seems that only the IssueInstance is checked against NotOnOrAfter. Not sure if this was the intended behaviour but I believe having a never expiring valid LogoutRequest could be dangerous.
### Impact
This could impact the user where they would be logged out from an expired LogoutRequest. In bigger contexts, if LogoutRequests are sent out in mass to different SPs, this could impact many users on a large scale.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@node-saml/node-saml'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.5'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/node-saml/node-saml/security/advisories/GHSA-vx8m-6fhw-pccw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40178'}, {'type': 'WEB', 'url': 'https://github.com/node-saml/node-saml/commit/045e3b9c54211fdb95f96edf363679845b195cec'}, {'type': 'PACKAGE', 'url': 'https://github.com/node-saml/node-saml'}, {'type': 'WEB', 'url': 'https://github.com/node-saml/node-saml/releases/tag/v4.0.5'}]
|
{'cwe_ids': ['CWE-347', 'CWE-613'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-21T20:13:05Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-vmch-3w2x-vhgq
|
2023-08-09T12:56:43Z
|
2023-08-09T12:56:43Z
| null |
['CVE-2023-38180']
|
.NET Denial of Service Vulnerability
|
# Microsoft Security Advisory CVE-2023-38180: .NET Denial of Service Vulnerability
## <a name="executive-summary"></a>Executive summary
Microsoft is releasing this security advisory to provide information about a vulnerability in ASP.NET Core 2.1, .NET 6.0, and .NET 7.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.
A vulnerability exists in Kestrel where, on detecting a potentially malicious client, Kestrel will sometimes fail to disconnect it, resulting in denial of service.
## Announcement
Announcement for this issue can be found at https://github.com/dotnet/announcements/issues/269
### <a name="mitigation-factors"></a>Mitigation factors
If your application is running behind a reverse proxy, or Web Application Firewall, which has its own mitigations against HTTP based attacks this issue may be mitigated by the proxy or WAF
## <a name="affected-software"></a>Affected software
* Any .NET 7.0 application running on .NET 7.0.8 or earlier.
* Any .NET 6.0 application running on .NET 6.0.19 or earlier.
If your application uses the following package versions, ensure you update to the latest version of .NET.
### <a name=".NET 7"></a>.NET 7
Package name | Affected version | Patched version
------------ | ---------------- | -------------------------
[Microsoft.AspNetCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-arm64) | >= 7.0.0, <= 7.0.9 | 7.0.10
[Microsoft.AspNetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-x64) | >= 7.0.0, <= 7.0.9 | 7.0.10
[Microsoft.AspNetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-x86) | >= 7.0.0, <= 7.0.9 | 7.0.10
### <a name=".NET 6"></a>.NET 6
Package name | Affected version | Patched version
------------ | ---------------- | -------------------------
[Microsoft.AspNetCore.Server.Kestrel.Transport.Libuv](https://www.nuget.org/packages/Microsoft.AspNetCore.Server.Kestrel.Transport.Libuv) | >= 6.0.0, <= 6.0.20 | 6.0.21
[Microsoft.AspNetCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-arm64) | >= 6.0.0, <= 6.0.20 | 6.0.21
[Microsoft.AspNetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-x64) | >= 6.0.0, <= 6.0.20 | 6.0.21
[Microsoft.AspNetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-x86) | >= 6.0.0, <= 6.0.20 | 6.0.21
### <a name="ASP.NET Core 2.1"></a>ASP.NET Core 2.1
Package name | Affected version | Patched version
------------ | ---------------- | -------------------------
[Microsoft.AspNetCore.Server.Kestrel.Transport.Libuv](https://www.nuget.org/packages/Microsoft.AspNetCore.Server.Kestrel.Transport.Libuv) | <= 2.1.39 | 2.1.40
[Microsoft.AspNetCore.Server.Kestrel.Transport.Sockets](https://www.nuget.org/packages/Microsoft.AspNetCore.Server.Kestrel.Transport.Sockets) | <= 2.1.39 | 2.1.40
## Advisory FAQ
### <a name="how-affected"></a>How do I know if I am affected?
If you have a runtime or SDK with a version listed, or an affected package listed in [affected software](#affected-software), you're exposed to the vulnerability.
### <a name="how-fix"></a>How do I fix the issue?
* To fix the issue please install the latest version of .NET 6.0 or .NET 7.0. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs.
* If you are using one of the affected packages, please update to the patched version listed above.
* If you have .NET 6.0 or greater installed, you can list the versions you have installed by running the `dotnet --info` command. You will see output like the following;
```
.NET Core SDK (reflecting any global.json):
Version: 6.0.300
Commit: 8473146e7d
Runtime Environment:
OS Name: Windows
OS Version: 10.0.18363
OS Platform: Windows
RID: win10-x64
Base Path: C:\Program Files\dotnet\sdk\6.0.300\
Host (useful for support):
Version: 6.0.5
Commit: 8473146e7d
.NET Core SDKs installed:
6.0.300 [C:\Program Files\dotnet\sdk]
.NET Core runtimes installed:
Microsoft.AspNetCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App]
Microsoft.NETCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App]
Microsoft.WindowsDesktop.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App]
To install additional .NET Core runtimes or SDKs:
https://aka.ms/dotnet-download
```
* If you're using .NET 7.0, you should download and install Runtime 7.0.10 or SDK 7.0.110 (for Visual Studio 2022 v17.4) from https://dotnet.microsoft.com/download/dotnet-core/7.0.
* If you're using .NET 6.0, you should download and install Runtime 6.0.21 or SDK 6.0.316 (for Visual Studio 2022 v17.2) from https://dotnet.microsoft.com/download/dotnet-core/6.0.
.NET 6.0 and and .NET 7.0 updates are also available from Microsoft Update. To access this either type "Check for updates" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates.
Once you have installed the updated runtime or SDK, restart your apps for the update to take effect.
Additionally, if you've deployed [self-contained applications](https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd) targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed.
## Other Information
### Reporting Security Issues
If you have found a potential security issue in .NET 6.0 or .NET 7.0, please email details to secure@microsoft.com. Reports may qualify for the Microsoft .NET Core & .NET 5 Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at <https://aka.ms/corebounty>.
### Support
You can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime and https://github.com/dotnet/aspnet/. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue.
### Disclaimer
The information provided in this advisory is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
### External Links
[CVE-2023-38180]( https://www.cve.org/CVERecord?id=CVE-2023-38180)
### Revisions
V1.0 (August 08, 2023): Advisory published.
_Version 1.0_
_Last Updated 2023-08-08_
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-arm64'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.9'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-x64'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.9'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-x86'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.9'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Server.Kestrel.Transport.Libuv'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.21'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.20'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-arm64'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.21'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.20'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-x64'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.21'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.20'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-x86'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.21'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.20'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Server.Kestrel.Transport.Libuv'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.40'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.1.39'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Server.Kestrel.Transport.Sockets'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.40'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.1.39'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/dotnet/runtime/security/advisories/GHSA-vmch-3w2x-vhgq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38180'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/runtime/issues/90170'}, {'type': 'PACKAGE', 'url': 'https://github.com/dotnet/runtime'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CL2L4WE5QRT7WEXANYXSKSU43APC5N2V/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWVZFKTLNMNKPZ755EMRYIA6GHFOWGKY/'}, {'type': 'WEB', 'url': 'https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38180'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T12:56:43Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-443m-3fr6-w8wj
|
2023-08-23T20:06:51Z
|
2023-08-17T21:30:53Z
| null |
['CVE-2023-36106']
|
PowerJob incorrect access control vulnerability
|
An incorrect access control vulnerability in powerjob 4.3.2 and earlier allows remote attackers to obtain sensitive information via the interface for querying via `appId` parameter to `/container/list`.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'tech.powerjob:powerjob'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.3.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36106'}, {'type': 'WEB', 'url': 'https://gist.github.com/tztdsb/a653b6db328199ec0f55e54b4e466415#file-gistfile1-txt'}, {'type': 'PACKAGE', 'url': 'https://gitee.com/KFCFans/PowerJob'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-18T21:51:35Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-75p5-jwx4-qw9h
|
2023-08-09T14:34:42Z
|
2023-08-09T14:34:42Z
| null |
['CVE-2023-39524']
|
PrestaShop boolean SQL injection
|
### Impact
SQL injection possible in product search field, in BO's product page
### Patches
8.1.1
### Found by
Aleksey Solovev (Positive Technologies)
### Workarounds
none
### References
none
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.1.0'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-75p5-jwx4-qw9h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39524'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/commit/2047d4c053043102bc46a37d383b392704bf14d7'}, {'type': 'PACKAGE', 'url': 'https://github.com/PrestaShop/PrestaShop'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T14:34:42Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-3fqw-j7x8-g75j
|
2023-08-16T21:11:04Z
|
2023-08-16T15:30:18Z
| null |
['CVE-2023-40344']
|
Jenkins Delphix Plugin missing permission check
|
Jenkins Delphix Plugin 3.0.2 and earlier does not perform a permission check in an HTTP endpoint.
This allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack to capture the credentials using another vulnerability.
An enumeration of credentials IDs in Delphix Plugin 3.0.3 requires the appropriate permissions.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:delphix'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40344'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3214%20(1)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/16/3'}]
|
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:11:04Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-c8xw-vjgf-94hr
|
2023-08-31T00:03:04Z
|
2023-08-23T17:50:41Z
| null |
['CVE-2023-40025']
|
Argo CD web terminal session doesn't expire
|
### Impact
All versions of Argo CD starting from v2.6.0 have a bug where open web terminal sessions do not expire. This bug allows users to send any websocket messages even if the token has already expired. The most straightforward scenario is when a user opens the terminal view and leaves it open for an extended period. This allows the user to view sensitive information even when they should have been logged out already.
### Patches
A patch for this vulnerability has been released in the following Argo CD version:
* v2.6.14
* v2.7.12
* v2.8.1
### Workarounds
The only way to completely resolve the issue is to upgrade.
#### Mitigations
Disable web-based terminal or define RBAC rules to it
[https://argo-cd.readthedocs.io/en/latest/operator-manual/web_based_terminal/](https://argo-cd.readthedocs.io/en/latest/operator-manual/web_based_terminal/)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the Argo CD issue tracker](https://github.com/argoproj/argo-cd/issues) or [discussions](https://github.com/argoproj/argo-cd/discussions)
* Join us on [Slack](https://argoproj.github.io/community/join-slack) in channel #argo-cd
### Credits
Thank you to bean.zhang (@zhlu32 ) of HIT-IDS ChunkL Team who discovered the issue and reported it confidentially according to our [guidelines](https://github.com/argoproj/argo-cd/blob/master/SECURITY.md#reporting-a-vulnerability).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.14'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.12'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}], 'versions': ['2.8.0']}]
|
[{'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/security/advisories/GHSA-c8xw-vjgf-94hr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40025'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/commit/e047efa8f9518c54d00d2e4493b64bc4dba98478'}, {'type': 'PACKAGE', 'url': 'https://github.com/argoproj/argo-cd'}]
|
{'cwe_ids': ['CWE-613'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-23T17:50:41Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-6r78-m64m-qwcf
|
2023-08-25T18:58:25Z
|
2023-08-10T19:25:23Z
| null |
[]
|
Moq v4.20.0-rc to 4.20.1 share hashed user data
|
Moq v4.20.0-rc to 4.20.1 include support for [SponsorLink](https://github.com/devlooped/SponsorLink), which runs an obfuscated DLL at build time that scans local `git config` data and shares the user's hashed email address with SponsorLink's remote servers. There is no option to disable this.
Moq v4.20.2 has removed this functionality.
|
[]
|
[{'package': {'ecosystem': 'NuGet', 'name': 'moq'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.20.0-rc'}, {'fixed': '4.20.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/moq/moq/issues/1374'}, {'type': 'WEB', 'url': 'https://github.com/moq/moq/pull/1363'}, {'type': 'WEB', 'url': 'https://github.com/moq/moq/pull/1375'}, {'type': 'PACKAGE', 'url': 'https://github.com/moq/moq'}, {'type': 'WEB', 'url': 'https://www.cazzulino.com/sponsorlink.html'}]
|
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-10T19:25:23Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-jrj6-qx48-3cpq
|
2023-08-18T14:29:06Z
|
2023-08-16T15:30:18Z
| null |
['CVE-2023-40351']
|
Jenkins Favorite View Plugin cross-site request forgery vulnerability
|
Jenkins Favorite View Plugin 5.v77a_37f62782d and earlier does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability.
This vulnerability allows attackers to add or remove views from another user’s favorite views tab bar.
As of publication of this advisory, there is no fix.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:favorite-view'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.v77a'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40351'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3201'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/16/3'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:04:29Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-8m9p-3926-gffr
|
2023-08-17T19:08:16Z
|
2023-08-08T18:30:35Z
| null |
['CVE-2023-38758']
|
wger Workout Manager Cross-site Scripting vulnerability
|
Cross Site Scripting vulnerability in wger Project wger Workout Manager v.2.2.0a3 allows a remote attacker to gain privileges via the `license_author `field in the add-ingredient function in the `templates/ingredients/view.html`, `models/ingredients.py`, and `views/ingredients.py` components.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'wger'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.0a3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38758'}, {'type': 'WEB', 'url': 'https://github.com/0x72303074/CVE-Disclosures'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/wger/PYSEC-2023-143.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/wger-project/wger'}, {'type': 'WEB', 'url': 'https://wger.de'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-17T19:08:16Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-5cv4-48h7-7782
|
2023-08-17T19:06:36Z
|
2023-08-17T06:30:13Z
| null |
['CVE-2023-4395']
|
Cockpit Cross-site Scripting vulnerability
|
Cross-site Scripting (XSS) - Stored in GitHub repository cockpit-hq/cockpit 2.6.3 and prior. A patch is available at commit 36d1d4d256cbbab028342ba10cc493e5c119172c and anticipated to be part of version 2.6.4.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'cockpit-hq/cockpit'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4395'}, {'type': 'WEB', 'url': 'https://github.com/cockpit-hq/cockpit/commit/36d1d4d256cbbab028342ba10cc493e5c119172c'}, {'type': 'PACKAGE', 'url': 'https://github.com/cockpit-hq/cockpit'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/60e38563-7ac8-4a13-ac04-2980cc48b0da'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-17T19:06:36Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-v7v8-gjv7-ffmr
|
2023-08-16T21:00:33Z
|
2023-08-16T21:00:33Z
| null |
['CVE-2023-26140']
|
@excalidraw/excalidraw Cross-site Scripting vulnerability
|
### Impact
XSS vulnerability due to improperly sanitizing URLs of links that can be attached on canvas elements. This affects users of the npm package `@excalidraw/excalidraw` provided it was deployed in environments where untrusted user input in drawings that are then shared with third parties is a concern. If you only hosted the editor in trusted environments, or sharing didn't take place, the impact is minimized.
### Patches
Patch is available on version 0.15.3 and up (stable), or latest `@excalidraw/excalidraw@next` (unstable releases).
### Workarounds
No workaround without upgrading unless deployed in environments without untrusted user input.
### References
https://security.snyk.io/vuln/SNYK-JS-EXCALIDRAWEXCALIDRAW-5841658
https://github.com/excalidraw/excalidraw/pull/6728
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@excalidraw/excalidraw'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/excalidraw/excalidraw/security/advisories/GHSA-v7v8-gjv7-ffmr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26140'}, {'type': 'WEB', 'url': 'https://github.com/excalidraw/excalidraw/pull/6728'}, {'type': 'WEB', 'url': 'https://github.com/excalidraw/excalidraw/commit/b33fa6d6f64d27adc3a47b25c0aa55711740d0af'}, {'type': 'PACKAGE', 'url': 'https://github.com/excalidraw/excalidraw'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-EXCALIDRAWEXCALIDRAW-5841658'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:00:33Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-j5g3-5c8r-7qfx
|
2023-08-30T21:24:57Z
|
2023-08-30T21:24:57Z
| null |
[]
|
Prevent logging invalid header values
|
## Impact
### What kind of vulnerability is it?
Apollo Server can log sensitive information (Studio API keys) if they are passed incorrectly (with leading/trailing whitespace) or if they have any characters that are invalid as part of a header value.
### Who is impacted?
Users who (all of the below):
* use either the schema reporting or usage reporting feature
* use an Apollo Studio API key which has invalid header values
* use the default fetcher (`node-fetch`) or configured their own `node-fetch` fetcher
The following node snippet can test whether your API key has invalid header values. This code is taken directly from `node-fetch@2`'s header value validation code.
```js
const invalidHeaderCharRegex = /[^\t\x20-\x7e\x80-\xff]/;
if (invalidHeaderCharRegex.test('<YOUR_API_KEY>')) {
console.log('potentially affected');
}
console.log('unaffected');
```
If the provided API key is not a valid header value, whenever Apollo Server uses that API key in a request (to Studio, for example), `node-fetch` will throw an error _which contains the header value_. This error is logged in various ways depending on the user's configuration, but most likely the console or some configured logging service.
### Patches
This problem is patched in the latest version of Apollo Server as soon as this advisory is published.
### Workarounds
* Try retrieving a new API key from Studio. Note: this may not work if the invalid character is not part of the secret (it may be derived from identifiers like graph name, user name).
* Override the `fetcher`
* Disable schema reporting and/or usage reporting
### Solution
* Apollo Server will now call `.trim()` on incoming API keys in order to eliminate leading/trailing whitespace and log a warning when it does so.
* Apollo Server will now perform the same validation of API keys as `node-fetch@2` performs on header values on startup. Apollo Server will throw an error on startup (i.e., fail to start completely) and notify the user their API key is invalid along with the offending characters.
|
[]
|
[{'package': {'ecosystem': 'npm', 'name': '@apollo/server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.9.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'apollo-server-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.12.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'apollo-server-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.26.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/apollographql/apollo-server/security/advisories/GHSA-j5g3-5c8r-7qfx'}, {'type': 'WEB', 'url': 'https://github.com/apollographql/apollo-server/commit/2c8106c433c4add4b43e2e2b2f5c5c4887b17314'}, {'type': 'WEB', 'url': 'https://github.com/apollographql/apollo-server/commit/d38b43bac88acdef4295759d7dcc3d4c348d9575'}, {'type': 'PACKAGE', 'url': 'https://github.com/apollographql/apollo-server'}]
|
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-30T21:24:57Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-m6pf-cm3f-7876
|
2023-08-15T20:03:24Z
|
2023-08-15T03:31:32Z
| null |
['CVE-2023-4347']
|
LibreNMS Cross-site Scripting vulnerability
|
Cross-site Scripting (XSS) - Reflected in GitHub repository librenms/librenms 23.7.0 and prior. A patch is available at commit 91c57a1ee54631e071b6b0c952d99c8ee892e824 and anticiapted to be part of version 23.8.0.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '23.8.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 23.7.0'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4347'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/91c57a1ee54631e071b6b0c952d99c8ee892e824'}, {'type': 'PACKAGE', 'url': 'https://github.com/librenms/librenms'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1f78c6e1-2923-46c5-9376-4cc5a8f1152f'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-15T20:03:24Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-5m5f-qg8r-p9qf
|
2023-08-18T21:51:39Z
|
2023-08-17T21:30:53Z
| null |
['CVE-2023-40313']
|
OpenNMS vulnerable to remote code execution
|
A BeanShell interpreter in remote server mode runs in OpenNMS Horizon versions earlier than 32.0.2 and in related Meridian versions which could allow arbitrary remote Java code execution. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.opennms:opennms-base-assembly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '32.0.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40313'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/pull/6368'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/commit/2909448b039bd46241efa52c450ffdb4f5a7dee1'}, {'type': 'WEB', 'url': 'https://docs.opennms.com/horizon/32/releasenotes/changelog.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenNMS/opennms'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-18T21:51:39Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-ff45-2jp9-69jc
|
2023-08-21T20:18:07Z
|
2023-08-19T03:32:19Z
| null |
['CVE-2023-4433']
|
Cockpit Cross-site Scripting vulnerability
|
Cross-site Scripting (XSS) - Stored in GitHub repository cockpit-hq/cockpit version 2.6.3 and prior. A patch is available at commit 36d1d4d256cbbab028342ba10cc493e5c119172c and anticipated to be part of version 2.6.4.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'cockpit-hq/cockpit'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4433'}, {'type': 'WEB', 'url': 'https://github.com/cockpit-hq/cockpit/commit/36d1d4d256cbbab028342ba10cc493e5c119172c'}, {'type': 'PACKAGE', 'url': 'https://github.com/cockpit-hq/cockpit'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/64f3253d-6852-4b9f-b870-85e896007b1a'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-21T20:18:07Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-97mg-9jhf-r7rm
|
2023-08-16T21:06:45Z
|
2023-08-16T15:30:18Z
| null |
['CVE-2023-40347']
|
Jenkins Maven Artifact ChoiceListProvider (Nexus) Plugin vulnerable to exposure of system-scoped credentials
|
Jenkins Maven Artifact ChoiceListProvider (Nexus) Plugin 1.14 and earlier does not set the appropriate context for credentials lookup, allowing the use of System-scoped credentials otherwise reserved for the global configuration.
This allows attackers with Item/Configure permission to access and capture credentials they are not entitled to.
As of publication of this advisory, there is no fix.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:maven-artifact-choicelistprovider'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.14'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40347'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3153'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/16/3'}]
|
{'cwe_ids': ['CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:06:45Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-gvvx-fc6p-2h9x
|
2023-08-21T20:46:50Z
|
2023-08-21T12:30:19Z
|
2023-08-21T20:46:50Z
|
[]
|
Duplicate Advisory: Wallabag user can delete own API client unintentionally
|
## Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-gjvc-55fw-v6vq. This link is maintained to preserve external references.
## Original Description
Cross-Site Request Forgery (CSRF) in GitHub repository wallabag/wallabag prior to 2.6.3.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'wallabag/wallabag'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-alpha.1'}, {'fixed': '2.6.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.6.2'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4455'}, {'type': 'WEB', 'url': 'https://github.com/wallabag/wallabag/commit/ffcc5c9062fcc8cd922d7d6d65edbe5efae96806'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/5ab1b206-5fe8-4737-b275-d705e76f193a'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-21T20:46:50Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-cf7p-gm2m-833m
|
2023-08-15T20:39:56Z
|
2023-07-14T21:31:08Z
| null |
['CVE-2023-38325']
|
cryptography mishandles SSH certificates
|
The cryptography package before 41.0.2 for Python mishandles SSH certificates that have critical options.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'cryptography'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '40.0.0'}, {'fixed': '41.0.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38325'}, {'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/issues/9207'}, {'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/pull/7960'}, {'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/pull/9208'}, {'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/commit/1ca7adc97b76a9dfbd3d850628b613eb93b78fc3'}, {'type': 'PACKAGE', 'url': 'https://github.com/pyca/cryptography'}, {'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/compare/41.0.1...41.0.2'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/cryptography/PYSEC-2023-112.yaml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMCCTYY3CSNQBFFYYC5DAV6KATHWCUZK/'}, {'type': 'WEB', 'url': 'https://pypi.org/project/cryptography/#history'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230824-0010/'}]
|
{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T22:14:26Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-wqc8-x2pr-7jqh
|
2023-07-11T19:40:20Z
|
2023-07-10T21:53:22Z
| null |
['CVE-2023-37271']
|
RestrictedPython vulnerable to arbitrary code execution via stack frame sandbox escape
|
### Impact
RestrictedPython does not check access to stack frames and their attributes. Stack frames are accessible within at least generators and generator expressions, which are allowed inside RestrictedPython. An attacker with access to a RestrictedPython environment can write code that gets the current stack frame in a generator and then walk the stack all the way beyond the RestrictedPython invocation boundary, thus breaking out of the restricted scope allowing the call of unrestricted Python code and therefore potentially allowing arbitrary code execution in the Python interpreter.
All RestrictedPython deployments that allow untrusted users to write Python code in the RestrictedPython environment are at risk. In terms of Zope and Plone, this would mean deployments where the administrator allows untrusted users to create and/or edit objects of type `Script (Python)`, `DTML Method`, `DTML Document` or `Zope Page Template`. This is a non-default configuration and likely to be extremely rare.
### Patches
The problem has been fixed in releases 5.3 and 6.1.
### Workarounds
There is no workaround available. If you cannot upgrade to the latest release you should ensure the RestrictedPython environment is only available for trusted users.
### References
- [RestrictedPython security advisory GHSA-wqc8-x2pr-7jqh](https://github.com/zopefoundation/RestrictedPython/security/advisories/GHSA-wqc8-x2pr-7jqh)
## For more information
If you have any questions or comments about this advisory:
- Open an issue in the [RestrictedPython issue tracker](https://github.com/zopefoundation/RestrictedPython/issues)
- Email us at [security@plone.org](mailto:security@plone.org)
## Credits
Thanks for analysing and reporting the go to:
- Nakul Choudhary (Quasar0147 on GitHub)
- despawningbone on GitHub
- Robert Xiao (nneonneo on GitHub)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:L'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'RestrictedPython'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'RestrictedPython'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0a1.dev0'}, {'fixed': '6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'restrictedpython'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/zopefoundation/RestrictedPython/security/advisories/GHSA-wqc8-x2pr-7jqh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37271'}, {'type': 'WEB', 'url': 'https://github.com/zopefoundation/RestrictedPython/commit/c8eca66ae49081f0016d2e1f094c3d72095ef531'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/restrictedpython/PYSEC-2023-118.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/zopefoundation/RestrictedPython'}]
|
{'cwe_ids': ['CWE-913'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-10T21:53:22Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-ppxx-m926-g569
|
2023-08-08T21:28:39Z
|
2023-07-06T19:24:01Z
| null |
['CVE-2022-24697']
|
Apache Kylin vulnerable to remote code execution
|
Kylin's cube designer function has a command injection vulnerability when overwriting system parameters in the configuration overwrites menu. RCE can be implemented by closing the single quotation marks around the parameter value of “-- conf=” to inject any operating system command into the command line parameters. This vulnerability affects Kylin 2 version 2.6.5 and earlier, Kylin 3 version 3.1.2 and earlier, and Kylin 4 version 4.0.1 and earlier.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin-core-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin-spark-project'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin-server-base'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24697'}, {'type': 'WEB', 'url': 'https://github.com/apache/kylin/pull/1811'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/kylin'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/07mnn9c7o314wrhrwjr10w9j5s82voj4'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/12/30/1'}]
|
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T21:23:09Z', 'nvd_published_at': '2022-10-13T13:15:00Z'}
|
1.4.0
|
GHSA-wxf3-4fvj-vqqx
|
2023-09-06T19:20:43Z
|
2023-07-27T19:28:02Z
| null |
[]
|
Unsafe plugins can be installed via pack import by tenant admins
|
### Summary
Unsafe plugins (for instance `sql-list`) can be installed in subdomain tenants via pack import even if unsafe plugin installation for tenants is disables
### Details
I have an example
https://bot20230704.saltcorn.com/view/all_plugins
It's publicly accessible (but has not so secure values except list of tenants).
But using this mech one can read **any** data from other tenants.
### Impact
All tenants of installation (i.e. `saltcorn.com`), can be compromised from tenant user has admin access. If an untrusted user has admin rights to a tenant instance, they will be able to install a plug-in that can access information from other tenants
### Revived after 0.8.7
After patch in 0.8.7 this is not fixed completely.
Here are steps to reproduce:
1. Publish to NPM plugin that was not approved by admin (in case of saltcorn.com) by @glutamate. I've just published this one: https://www.npmjs.com/package/saltcorn-qrcode
2. Publish somewhere plugin store that includes plugin from previous step: https://gist.github.com/pyhedgehog/f1fd7cb13f4d0a7ccf6a965748d19bd2
3. Add plugin store link to tenant store.
4. Install plugin.
5. Use it in tenant: https://bot20230704.saltcorn.com/view/testqr_show/1
Here are logic:
Unsafe plugins checked against this list:
https://github.com/saltcorn/saltcorn/blob/99fe277e497fd193bb070acd8c663aa254a9907c/packages/server/load_plugins.js#L191
But it's under control of tenant admin, not server admin.
Proposed login:
```javascript
const safes = getRootState().getConfig("available_plugins",[]).filter(p=>!p.unsafe).map(p=>p.location);
```
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@saltcorn/cli'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/saltcorn/saltcorn/security/advisories/GHSA-wxf3-4fvj-vqqx'}, {'type': 'WEB', 'url': 'https://github.com/saltcorn/saltcorn/pull/1973'}, {'type': 'WEB', 'url': 'https://github.com/saltcorn/saltcorn/commit/0f32a51277a635c814a634bda9b6d358fb8c04ab'}, {'type': 'PACKAGE', 'url': 'https://github.com/saltcorn/saltcorn'}, {'type': 'WEB', 'url': 'https://github.com/saltcorn/saltcorn/blob/99fe277e497fd193bb070acd8c663aa254a9907c/packages/server/load_plugins.js#L191'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-27T19:28:02Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-ggwr-4vr8-g7wv
|
2023-07-21T18:14:14Z
|
2023-07-12T12:31:36Z
| null |
['CVE-2023-22887']
|
Apache Airflow Path Traversal vulnerability
|
Apache Airflow, versions before 2.6.3, is affected by a vulnerability that allows an attacker to perform unauthorized file access outside the intended directory structure by manipulating the run_id parameter. This vulnerability is considered low since it requires an authenticated user to exploit it. It is recommended to upgrade to a version that is not affected
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22887'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/32293'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/commit/05bd90f563649f2e9c8f0c85cf5838315a665a02'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/apache-airflow/PYSEC-2023-104.yaml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/rxddqs76r6rkxsg1n24d029zys67qwwo'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T17:30:42Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-9xg4-3qfm-9w8f
|
2023-07-25T17:17:37Z
|
2023-07-25T17:17:37Z
| null |
['CVE-2023-34235']
|
Leaking sensitive user information still possible by filtering on private with prefix fields
|
### Summary
Still able to leak private fields if using the t(number) prefix
### Details
Knex query allows you to change there default prefix
```SqliteError: select distinct `t0`.* from `pages` as `t0` left join `admin_users` as `t1` on `t0`.`updated_by_id` = `t1`.`id` where (`t1`.`password` = 1)```
so if you change the prefix to the same as it was before or to an other table you want to query you query changes from password to t1.password password is protected by filtering protections but t1.password is not protected
### PoC
1 Create a contentType
2 add to its options "populateCreatorFields"
3 create 1 entity in your new content type
4 in settings enable the find route in settings for the content type you created for public
5 /api/(Your contenttype)?filters%5BupdatedBy%5D%5Bt1.password%5D%5B%24startsWith%5D=a%24
And now the api returns noting if you were to do
/api/(Your contenttype)?filters%5BupdatedBy%5D%5Bt1.password%5D%5B%24startsWith%5D=%24 it would return your entity
### Impact
You can do filtering attacks on everything related to the object again including admin passwords and reset-tokens.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@strapi/database'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.10.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.10.7'}}, {'package': {'ecosystem': 'npm', 'name': '@strapi/utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.10.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.10.7'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/strapi/strapi/security/advisories/GHSA-9xg4-3qfm-9w8f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34235'}, {'type': 'PACKAGE', 'url': 'https://github.com/strapi/strapi'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/releases/tag/v4.10.8'}]
|
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T17:17:37Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-4hm4-94g6-f23f
|
2023-07-12T22:31:25Z
|
2023-07-12T18:30:38Z
| null |
['CVE-2023-37949']
|
Jenkins Orka by MacStadium Plugin missing permission check
|
Jenkins Orka by MacStadium Plugin 1.33 and earlier does not perform a permission check in an HTTP endpoint.
This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Orka by MacStadium Plugin 1.34 requires Overall/Administer permission to access the affected HTTP endpoint.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:macstadium-orka'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.34'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37949'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-07-12/#SECURITY-3128'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/07/12/2'}]
|
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T22:31:25Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-h4vp-69r8-gvjg
|
2023-07-14T21:53:52Z
|
2023-07-14T21:53:52Z
| null |
['CVE-2023-37462']
|
org.xwiki.platform:xwiki-platform-skin-ui Eval Injection vulnerability
|
### Impact
Improper escaping in the document `SkinsCode.XWikiSkinsSheet` leads to a possible privilege escalation from view right on that document to programming rights, or in other words, it is possible to execute arbitrary script macros including Groovy and Python macros that allow remote code execution including unrestricted read and write access to all wiki contents.
The attack works by opening a non-existing page with a name crafted to contain a dangerous payload.
It is possible to check if an existing installation is vulnerable by opening `<xwiki-host>/xwiki/bin/view/%22%5D%5D%20%7B%7Basync%20async%3D%22true%22%20cached%3D%22false%22%20context%3D%22doc.reference%22%7D%7D%7B%7Bgroovy%7D%7Dprintln(%22Hello%20%22%20%2B%20%22from%20groovy!%22)%7B%7B%2Fgroovy%7D%7D%7B%7B%2Fasync%7D%7D?sheet=SkinsCode.XWikiSkinsSheet&xpage=view` where <xwiki-host is the URL of the XWiki installation. The expected result are two list items with "Edit this skin" and "Test this skin" without any further text. If the installation is vulnerable, the second list item is "Test this skin Hello from groovy!.WebHome"]]". This shows that the Groovy macro has been executed.
### Patches
This has been patched in XWiki 14.4.8, 14.10.4 and 15.0-rc-1.
### Workarounds
The [fix](https://github.com/xwiki/xwiki-platform/commit/d9c88ddc4c0c78fa534bd33237e95dea66003d29) can also be applied manually to the impacted document `SkinsCode.XWikiSkinsSheet`.
### References
* https://jira.xwiki.org/browse/XWIKI-20457
* https://github.com/xwiki/xwiki-platform/commit/d9c88ddc4c0c78fa534bd33237e95dea66003d29
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)
* Email us at [Security Mailing List](mailto:security@xwiki.org)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-skin-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0-rc-1'}, {'fixed': '14.4.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-skin-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.10.4'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-h4vp-69r8-gvjg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37462'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/d9c88ddc4c0c78fa534bd33237e95dea66003d29'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20457'}]
|
{'cwe_ids': ['CWE-74', 'CWE-95'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T21:53:52Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-r5pv-7g89-cxmc
|
2023-08-03T16:25:00Z
|
2023-07-25T09:30:18Z
| null |
['CVE-2023-35088']
|
SQL injection in audit endpoint
|
Improper Neutralization of Special Elements Used in an SQL Command ('SQL Injection') vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.7.0.
In the toAuditCkSql method, the groupId, streamId, auditId, and dt are directly concatenated into the SQL query statement, which may lead to SQL injection attacks.
Users are advised to upgrade to Apache InLong's 1.8.0 or cherry-pick [1] to solve it.
[1] https://github.com/apache/inlong/pull/8198
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.inlong:manager-service'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.8.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35088'}, {'type': 'WEB', 'url': 'https://github.com/apache/inlong/pull/8198'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/inlong'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/os7b66x4n8dbtrdpb7c6x37bb1vjb0tk'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2023/Jul/43'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/07/25/4'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T19:24:11Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-9gjg-834p-5gvv
|
2023-08-01T20:09:43Z
|
2023-07-24T18:30:44Z
|
2023-08-01T20:09:43Z
|
[]
|
Duplicate Advisory: Keylime's registrar vulnerable to Denial-of-service attack via a single open connection
|
## Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-pg75-v6fp-8q59. This link is maintained to preserve external references.
## Original Description
A flaw was found in Keylime. Due to their blocking nature, the Keylime registrar is subject to a remote denial of service against its SSL connections. This flaw allows an attacker to exhaust all available connections.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'keylime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.4.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38200'}, {'type': 'WEB', 'url': 'https://github.com/keylime/keylime/pull/1421'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2023-38200'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2222692'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T20:09:43Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-pwrw-g29q-3mp8
|
2023-07-06T23:57:40Z
|
2023-07-06T21:30:28Z
| null |
['CVE-2023-3531']
|
TeamPass Cross-site Scripting vulnerability
|
Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.10.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'nilsteampassnet/teampass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.10'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3531'}, {'type': 'WEB', 'url': 'https://github.com/nilsteampassnet/teampass/commit/cb8ea5ccca61653895bb6881547e463baa50293d'}, {'type': 'PACKAGE', 'url': 'https://github.com/nilsteampassnet/teampass'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c9f0b3ff-bbc4-4ea1-a59e-8594b48bb414'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T23:57:40Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-4qcv-qf38-5j3j
|
2023-07-25T18:04:28Z
|
2023-07-25T18:04:28Z
| null |
['CVE-2023-2850']
|
Unintentional leakage of private information via cross-origin websocket session hijacking
|
### Impact
Private messages or posts might be leaked to third parties if victim opens the attackers site while browsing nodebb.
### Patches
* Patched in v3.1.3
* Backported to v2.x line via v2.8.13
### Workarounds
Users can cherry-pick https://github.com/NodeBB/NodeBB/commit/51096ad2345fb1d1380bec0a447113489ef6c359 if they are on v3.x
If you are running v2.x of NodeBB, you can cherry-pick a5d92da9ddac5607ab7f737520a66eaed6d3ddee followed by 62e162cf1e735e42462be1db9b4954b5a69accdf
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'nodebb'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'nodebb'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.13'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/security/advisories/GHSA-4qcv-qf38-5j3j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2850'}, {'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/commit/51096ad2345fb1d1380bec0a447113489ef6c359'}, {'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/commit/62e162cf1e735e42462be1db9b4954b5a69accdf'}, {'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/commit/a5d92da9ddac5607ab7f737520a66eaed6d3ddee'}, {'type': 'PACKAGE', 'url': 'https://github.com/NodeBB/NodeBB'}, {'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/releases/tag/v3.1.3'}]
|
{'cwe_ids': ['CWE-1385', 'CWE-346'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T18:04:28Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-rxvj-5mv6-j5mc
|
2023-07-28T20:44:06Z
|
2023-07-28T09:30:29Z
| null |
['CVE-2023-3990']
|
Cross-site Scripting in Mingsoft MCMS
|
A Cross-site Scripting vulnerability has been found in Mingsoft MCMS up to 5.3.1. This affects an unknown part of the file search.do of the component HTTP POST Request Handler. The manipulation of the argument style leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-235611.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.3.1'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3990'}, {'type': 'WEB', 'url': 'https://gitee.com/mingSoft/MCMS/issues/I7K4DQ'}, {'type': 'PACKAGE', 'url': 'https://github.com/ming-soft/MCMS'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.235611'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.235611'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T20:44:06Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-2h84-3crq-vgfj
|
2023-07-21T18:00:02Z
|
2023-07-12T12:31:36Z
| null |
['CVE-2023-35908']
|
Apache Airflow Incorrect Authorization vulnerability
|
Apache Airflow, versions before 2.6.3, is affected by a vulnerability that allows unauthorized read access to a DAG through the URL. It is recommended to upgrade to a version that is not affected
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ecosystem_specific': {'affected_functions': ['airflow.www.auth.has_access']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35908'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/32014'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/commit/ac65b82eeeeaa670e09a83c7da65cbac7e89f8db'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/apache-airflow/PYSEC-2023-119.yaml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/vsflptk5dt30vrfggn96nx87d7zr6yvw'}]
|
{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T17:30:21Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-5v46-54vj-4mjq
|
2023-07-20T13:58:04Z
|
2023-07-12T18:30:39Z
| null |
['CVE-2023-37964']
|
Jenkins ElasticBox CI Plugin vulnerable to cross-site request forgery
|
Jenkins ElasticBox CI Plugin 5.0.1 and earlier does not perform permission checks in several HTTP endpoints.
This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Additionally, these HTTP endpoints do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:elasticbox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.0.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37964'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-07-12/#SECURITY-3131'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/07/12/2'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T22:29:58Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-4mh8-9wq6-rjxg
|
2023-07-20T18:54:13Z
|
2023-07-20T18:54:13Z
| null |
['CVE-2023-37471']
|
OpenAM vulnerable to user impersonation using SAMLv1.x SSO process
|
### Impact
OpenAM up to version 14.7.2 does not properly validate the signature of SAML responses received as part of the SAMLv1.x Single Sign-On process. Attackers can use this fact to impersonate any OpenAM user, including the administrator, by sending a specially crafted SAML response to the SAMLPOSTProfileServlet servlet.
### Patches
This problem has been patched in OpenAM 14.7.3-SNAPSHOT and later
### Workarounds
One should comment servlet `SAMLPOSTProfileServlet` in web.xml or disable SAML in OpenAM
```xml
<servlet>
<description>SAMLPOSTProfileServlet</description>
<servlet-name>SAMLPOSTProfileServlet</servlet-name>
<servlet-class>com.sun.identity.saml.servlet.SAMLPOSTProfileServlet</servlet-class>
</servlet>
...
<servlet-mapping>
<servlet-name>SAMLSOAPReceiver</servlet-name>
<url-pattern>/SAMLSOAPReceiver</url-pattern>
</servlet-mapping>
```
### References
#624
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.openidentityplatform.openam:openam-federation-library'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '14.7.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/OpenIdentityPlatform/OpenAM/security/advisories/GHSA-4mh8-9wq6-rjxg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37471'}, {'type': 'WEB', 'url': 'https://github.com/OpenIdentityPlatform/OpenAM/pull/624'}, {'type': 'WEB', 'url': 'https://github.com/OpenIdentityPlatform/OpenAM/commit/7c18543d126e8a567b83bb4535631825aaa9d742'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenIdentityPlatform/OpenAM'}]
|
{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T18:54:13Z', 'nvd_published_at': None}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.