schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
stringlengths 20
20
⌀ | aliases
stringlengths 2
20
| summary
stringlengths 20
140
| details
stringlengths 56
37.2k
| severity
stringlengths 2
92
| affected
stringlengths 88
7.07k
| references
stringlengths 139
4.72k
| database_specific
stringlengths 131
185
|
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0
|
GHSA-pj98-2xf6-cff5
|
2023-09-25T21:39:56Z
|
2023-09-20T15:30:51Z
| null |
['CVE-2019-19450']
|
ReportLab vulnerable to remote code execution via paraparser
|
paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with '<unichar code="' followed by arbitrary Python code, a similar issue to CVE-2019-17626.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'reportlab'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.31'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19450'}, {'type': 'WEB', 'url': 'https://github.com/MrBitBucket/reportlab-mirror/blob/master/CHANGES.md'}, {'type': 'WEB', 'url': 'https://github.com/MrBitBucket/reportlab-mirror/blob/master/CHANGES.md#release-353115102019'}, {'type': 'PACKAGE', 'url': 'https://hg.reportlab.com/hg-public/reportlab'}, {'type': 'WEB', 'url': 'https://pastebin.com/5MicRrr4'}]
|
{'cwe_ids': ['CWE-91'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-09-21T16:57:08Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-r5hm-mp3j-285g
|
2023-09-26T19:35:39Z
|
2023-09-26T19:35:39Z
| null |
['CVE-2023-43644']
|
sing-box vulnerable to improper authentication in the SOCKS inbound
|
### Impact
This vulnerability allows specially crafted requests to bypass authentication, affecting all SOCKS inbounds with user authentication.
### Patches
Update to sing-box 1.4.5 or 1.5.0-rc.5 and later versions.
### Workarounds
Don't expose the SOCKS5 inbound to insecure environments.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/sagernet/sing-box'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.5'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/sagernet/sing-box'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0-beta.1'}, {'fixed': '1.5.0-rc.5'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/SagerNet/sing-box/security/advisories/GHSA-r5hm-mp3j-285g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-43644'}, {'type': 'WEB', 'url': 'https://github.com/SagerNet/sing-box/commit/9891fd672f5da9f20f59a1693271a946727f49e2'}, {'type': 'PACKAGE', 'url': 'https://github.com/SagerNet/sing-box'}, {'type': 'WEB', 'url': 'https://github.com/SagerNet/sing-box/releases/tag/v1.4.5'}]
|
{'cwe_ids': ['CWE-306'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-09-26T19:35:39Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-66m2-493m-crh2
|
2023-09-25T18:37:51Z
|
2023-09-25T18:37:51Z
| null |
['CVE-2023-43364']
|
Searchor CLI's Search vulnerable to Arbitrary Code using Eval
|
An issue in Arjun Sharda's Searchor before version v.2.4.2 allows an attacker to
execute arbitrary code via a crafted script to the eval() function in Searchor's src/searchor/main.py file, affecting the search feature in Searchor's CLI (Command Line Interface).
### Impact
Versions equal to, or below 2.4.1 are affected.
### Patches
Versions above, or equal to 2.4.2 have patched the vulnerability.
### References
https://github.com/nikn0laty/Exploit-for-Searchor-2.4.0-Arbitrary-CMD-Injection
https://github.com/nexis-nexis/Searchor-2.4.0-POC-Exploit-
https://github.com/jonnyzar/POC-Searchor-2.4.2
https://github.com/ArjunSharda/Searchor/pull/130
|
[]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'searchor'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.4.1'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/ArjunSharda/Searchor/security/advisories/GHSA-66m2-493m-crh2'}, {'type': 'WEB', 'url': 'https://github.com/ArjunSharda/Searchor/pull/130'}, {'type': 'WEB', 'url': 'https://github.com/ArjunSharda/Searchor/commit/16016506f7bf92b0f21f51841d599126d6fcd15b'}, {'type': 'PACKAGE', 'url': 'https://github.com/ArjunSharda/Searchor'}, {'type': 'WEB', 'url': 'https://github.com/nexis-nexis/Searchor-2.4.0-POC-Exploit-'}, {'type': 'WEB', 'url': 'https://github.com/nikn0laty/Exploit-for-Searchor-2.4.0-Arbitrary-CMD-Injection'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-25T18:37:51Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-gc95-5mmp-mp6j
|
2023-09-28T16:50:03Z
|
2023-09-28T06:30:20Z
| null |
['CVE-2023-38873']
|
Economizzer vulnerable to Clickjacking
|
The commit 3730880 (April 2023) and v.0.9-beta1 of gugoan Economizzer is vulnerable to Clickjacking. Clickjacking, also known as a "UI redress attack", is when an attacker uses multiple transparent or opaque layers to trick a user into clicking on a button or link on another page when they were intending to click on the top-level page. Thus, the attacker is "hijacking" clicks meant for their page and routing them to another page, most likely owned by another application, domain, or both.
|
[]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'gugoan/economizzer'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9-beta1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38873'}, {'type': 'WEB', 'url': 'https://github.com/gugoan/economizzer/commit/37308802dfe00d43df396a8afaa2096ece8b7b57'}, {'type': 'WEB', 'url': 'https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38873'}, {'type': 'PACKAGE', 'url': 'https://github.com/gugoan/economizzer'}, {'type': 'WEB', 'url': 'https://www.economizzer.org'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-28T16:50:03Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-2wwh-qgh8-w9xw
|
2023-09-21T21:37:37Z
|
2023-09-20T18:30:21Z
| null |
['CVE-2023-43502']
|
Jenkins Build Failure Analyzer Plugin Cross-Site Request Forgery vulnerability
|
Jenkins Build Failure Analyzer Plugin 2.4.1 and earlier does not require POST requests for an HTTP endpoint, resulting in cross-site request forgery (CSRF) vulnerabilities.
This vulnerability allows attackers to delete Failure Causes.
Build Failure Analyzer Plugin 2.4.2 requires POST requests for the affected HTTP endpoint.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.sonyericsson.jenkins.plugins.bfa:build-failure-analyzer'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-43502'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3239'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/09/20/5'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-21T21:37:37Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-5836-grcc-8j89
|
2023-09-25T18:32:42Z
|
2023-09-24T03:30:20Z
| null |
['CVE-2023-1625']
|
OpenStack Heat information leak vulnerability
|
An information leak was discovered in OpenStack heat. This issue could allow a remote, authenticated attacker to use the 'stack show' command to reveal parameters which are supposed to remain hidden. This has a low impact to the confidentiality, integrity, and availability of the system.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'openstack-heat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20.0.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1625'}, {'type': 'WEB', 'url': 'https://github.com/openstack/heat/commit/a49526c278e52823080c7f3fcb72785b93fd4dcb'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2023-1625'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2181621'}, {'type': 'PACKAGE', 'url': 'https://github.com/openstack/heat'}, {'type': 'WEB', 'url': 'https://launchpad.net/bugs/1999665'}]
|
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-25T18:32:42Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-g8h7-mcp6-pf47
|
2023-09-22T19:46:51Z
|
2023-09-20T03:30:17Z
| null |
['CVE-2023-38887']
|
File Upload vulnerability in Dolibarr ERP CRM
|
File Upload vulnerability in Dolibarr ERP CRM v.17.0.1 and before allows a remote attacker to execute arbitrary code and obtain sensitive information via the extension filtering and renaming functions.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '17.0.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38887'}, {'type': 'WEB', 'url': 'https://akerva.com/wp-content/uploads/2023/09/AKERVA_Security-Advisory_CVE-2023-38887_Dolibarr_AFU.pdf'}, {'type': 'PACKAGE', 'url': 'https://github.com/Dolibarr/dolibarr'}, {'type': 'WEB', 'url': 'http://dolibarr.com'}]
|
{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-21T17:03:51Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-q832-2275-rfqh
|
2023-09-29T18:17:33Z
|
2023-09-27T15:30:38Z
| null |
['CVE-2023-43830']
|
Subrion CMS XSS in /panel/configuration/financial/
|
A Cross-site scripting (XSS) vulnerability in /panel/configuration/financial/ of Subrion v4.2.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into several fields: 'Minimum deposit', 'Maximum deposit' and/or 'Maximum balance'.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'intelliants/subrion'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.2.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-43830'}, {'type': 'WEB', 'url': 'https://github.com/al3zx/xss_financial_subrion_4.2.1'}, {'type': 'PACKAGE', 'url': 'https://github.com/intelliants/subrion'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-27T20:17:46Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-jgw5-rp4p-qhp6
|
2023-09-28T16:42:32Z
|
2023-09-28T06:30:20Z
| null |
['CVE-2023-26149']
|
quill-mention Cross-site Scripting vulnerability
|
Versions of the package quill-mention before 4.0.0 are vulnerable to Cross-site Scripting (XSS) due to improper user-input sanitization, via the renderList function.
**Note:**
If the mentions list is sourced from unsafe (user-sourced) data, this might allow an injection attack when a Quill user hits @.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'quill-mention'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26149'}, {'type': 'WEB', 'url': 'https://github.com/quill-mention/quill-mention/issues/255'}, {'type': 'WEB', 'url': 'https://github.com/quill-mention/quill-mention/pull/341'}, {'type': 'WEB', 'url': 'https://github.com/quill-mention/quill-mention/commit/e85262ddced0a7f0b6fc8350d236a68bd1e28385'}, {'type': 'WEB', 'url': 'https://codepen.io/ALiangLiang/pen/mdQMJXK'}, {'type': 'PACKAGE', 'url': 'https://github.com/quill-mention/quill-mention'}, {'type': 'WEB', 'url': 'https://github.com/quill-mention/quill-mention/blob/0aa9847719257496b14ac5401872c4e2ffcbc3d1/src/quill.mention.js%23L391'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-QUILLMENTION-5921549'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-28T16:42:32Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-qxrq-376q-p39h
|
2023-09-20T22:23:07Z
|
2023-09-15T03:30:19Z
| null |
['CVE-2023-4980']
|
LibreNMS Cross-site Scripting vulnerability
|
Cross-site Scripting (XSS) - Generic in GitHub repository librenms/librenms prior to 23.9.0.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '23.9.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4980'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/cfd642be6a1e988453bd63069d17db3664e7de97'}, {'type': 'PACKAGE', 'url': 'https://github.com/librenms/librenms'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/470b9b13-b7fe-4b3f-a186-fdc5dc193976'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-15T19:30:13Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-9mcr-873m-xcxp
|
2023-09-25T18:55:36Z
|
2023-09-21T06:30:25Z
| null |
['CVE-2023-43669']
|
Tungstenite allows remote attackers to cause a denial of service
|
The Tungstenite crate through 0.20.0 for Rust allows remote attackers to cause a denial of service (minutes of CPU consumption) via an excessive length of an HTTP header in a client handshake. The length affects both how many times a parse is attempted (e.g., thousands of times) and the average amount of data for each parse attempt (e.g., millions of bytes).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'tungstenite'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.20.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.20.0'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-43669'}, {'type': 'WEB', 'url': 'https://github.com/snapview/tungstenite-rs/issues/376'}, {'type': 'WEB', 'url': 'https://github.com/github/advisory-database/pull/2752'}, {'type': 'WEB', 'url': 'https://github.com/snapview/tungstenite-rs/pull/379'}, {'type': 'WEB', 'url': 'https://github.com/snapview/tungstenite-rs/commit/8b3ecd3cc0008145ab4bc8d0657c39d09db8c7e2'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2240110'}, {'type': 'WEB', 'url': 'https://bugzilla.suse.com/show_bug.cgi?id=1215563'}, {'type': 'WEB', 'url': 'https://crates.io/crates/tungstenite/versions'}, {'type': 'WEB', 'url': 'https://cwe.mitre.org/data/definitions/407.html'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9mcr-873m-xcxp'}, {'type': 'PACKAGE', 'url': 'https://github.com/snapview/tungstenite-rs'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/THK6G6CD4VW6RCROWUV2C4HSINKK3XAK/'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0065.html'}, {'type': 'WEB', 'url': 'https://security-tracker.debian.org/tracker/CVE-2023-43669'}]
|
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-21T17:18:59Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-5j46-5hwq-gwh7
|
2023-09-21T17:21:08Z
|
2023-09-20T18:30:21Z
| null |
['CVE-2023-43495']
|
Jenkins Cross-site Scripting vulnerability
|
`ExpandableDetailsNote` allows annotating build log content with additional information that can be revealed when interacted with.
Jenkins 2.423 and earlier, LTS 2.414.1 and earlier does not escape the value of the `caption` constructor parameter of `ExpandableDetailsNote`.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide `caption` parameter values.
As of publication, the related API is not used within Jenkins (core), and the Jenkins security team is not aware of any affected plugins.
Jenkins 2.424, LTS 2.414.2 escapes `caption` constructor parameter values.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.50'}, {'fixed': '2.414.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.415'}, {'fixed': '2.424'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-43495'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3245'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/09/20/5'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-21T17:21:08Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-rrjw-j4m2-mf34
|
2023-09-25T20:21:16Z
|
2023-09-25T20:21:16Z
| null |
[]
|
gix-transport code execution vulnerability
|
The `gix-transport` crate prior to the patched version 0.36.1 would allow attackers to use malicious ssh clone URLs to pass arbitrary arguments to the `ssh` program, leading to arbitrary code execution.
PoC: `gix clone 'ssh://-oProxyCommand=open$IFS-aCalculator/foo'`
This will launch a calculator on OSX.
See https://secure.phabricator.com/T12961 for more details on similar vulnerabilities in `git`.
|
[]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'gix-transport'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.36.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/Byron/gitoxide/pull/1032'}, {'type': 'PACKAGE', 'url': 'https://github.com/Byron/gitoxide'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0064.html'}, {'type': 'WEB', 'url': 'https://secure.phabricator.com/T12961'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-25T20:21:16Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-c647-pxm2-c52w
|
2023-09-22T18:26:05Z
|
2023-09-20T23:05:35Z
| null |
['CVE-2023-42443']
|
Vyper vulnerable to memory corruption in certain builtins utilizing `msize`
|
### Impact
In certain conditions, the memory used by the builtins `raw_call`, `create_from_blueprint` and `create_copy_of` can be corrupted.
- For `raw_call`, the argument buffer of the call can be corrupted, leading to incorrect `calldata` in the sub-context.
- For `create_from_blueprint` and `create_copy_of`, the buffer for the to-be-deployed bytecode can be corrupted, leading to deploying incorrect bytecode.
Below are the conditions that must be fulfilled for the corruption to happen for each builtin:
#### `raw_call`
- memory is not fully initialized, ex. all parameters to an external function live in calldata
and
- The `data` argument of the builtin is `msg.data`.
and
- The `to`, `value` or `gas` passed to the builtin is some complex expression that results in writing to uninitialized memory (e.g. calling an internal function)
#### `create_copy_of`
- memory is not fully initialized, ex. all parameters to an external function live in calldata
and
- The `value` or `salt` passed to the builtin is some complex expression that results in writing to uninitialized memory (e.g. calling an internal function)
#### `create_from_blueprint`
- memory is not fully initialized, ex. all parameters to an external function live in calldata
and
- Either no constructor parameters are passed to the builtin or `raw_args` is set to True.
and
- The `value` or `salt` passed to the builtin is some complex expression that results in writing to uninitialized memory (e.g. calling an internal function)
Note: When the builtin is being called from an `internal` function `f` from a function `g`, the issue is not present provided that `g` has written to memory before calling `f`.
#### Examples
##### `raw_call`
In the following contract, calling `bar(1,1)` will return:
``` Python
ae42e95100000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff00000001
```
instead of:
``` Python
ae42e95100000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000001
```
```Python
identity: constant(address) = 0x0000000000000000000000000000000000000004
@external
def foo():
pass
@internal
@view
def get_address()->address:
a:uint256 = max_value(uint256) # 0xfff...fff
return identity
@external
def bar(f:uint256, u:uint256) -> Bytes[100]:
a: Bytes[100] = raw_call(self.get_address(), msg.data, max_outsize=100)
return a
```
##### `create_copy_of`
In the following contract, after calling `test()`, the code deployed at `self.created_address` does not match the bytecode at `target`.
``` Vyper
created_address: public(address)
@external
def test(target: address) -> address:
# The expression in salt= is complex and will require to store to memory
self.created_address = create_copy_of(target, salt = keccak256(_abi_encode(target)))
return self.created_address
```
##### `create_from_blueprint`
In the following contract, after calling `test()`, the init bytecode used to create the contract deployed at the address `self.created_address` will not match the blueprint bytecode stored at `target`.
``` Vyper
created_address: public(address)
salt: constant(bytes32) = keccak256("kebab")
@external
@payable
def test(target: address):
# The expression in salt= is complex and will require to store to memory
self.created_address = create_from_blueprint(target, code_offset=0, salt=keccak256(_abi_encode(target)))
```
### Patches
issue tracking in https://github.com/vyperlang/vyper/issues/3609, patched in #3610
### Workarounds
The complex expressions that are being passed as kwargs to the builtin should be cached in memory prior to the call to the builtin. For the last example above, it would be:
``` Vyper
created_address: public(address)
salt: constant(bytes32) = keccak256("kebab")
@external
@payable
def test(target: address):
salt: bytes32 = keccak256(_abi_encode(target))
self.created_address = create_from_blueprint(target, code_offset=0, salt=salt)
```
### References
_Are there any links users can visit to find out more?_
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'vyper'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.4'}, {'fixed': '0.3.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.3.9'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/security/advisories/GHSA-c647-pxm2-c52w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-42443'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/issues/3609'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/pull/3610'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/commit/79303fc4fcba06994ee5c6a7baef57bdb185006c'}, {'type': 'PACKAGE', 'url': 'https://github.com/vyperlang/vyper'}]
|
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-20T23:05:35Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-8c8w-f7wp-2jr2
|
2023-09-21T17:00:17Z
|
2023-09-20T06:30:50Z
| null |
['CVE-2023-43616']
|
Sender can cause a receiver to overwrite files during ZIP extraction in Croc
|
An issue was discovered in Croc through 9.6.5. A sender can cause a receiver to overwrite files during ZIP extraction.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/schollz/croc'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '9.6.5'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-43616'}, {'type': 'WEB', 'url': 'https://github.com/schollz/croc/issues/594'}, {'type': 'PACKAGE', 'url': 'https://github.com/schollz/croc'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2023/09/08/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/09/21/5'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-21T17:00:17Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-57m2-mpc7-gwgx
|
2023-09-20T22:21:45Z
|
2023-09-15T03:30:19Z
| null |
['CVE-2023-4977']
|
LibreNMS Code Injection vulnerability
|
Code Injection in GitHub repository librenms/librenms prior to 23.9.0.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '23.9.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4977'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/1194934d31c795a3f6877a96ffaa34b1f475bdd0'}, {'type': 'PACKAGE', 'url': 'https://github.com/librenms/librenms'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3db8a1a4-ca2d-45df-be18-a959ebf82fbc'}]
|
{'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-15T19:29:52Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-6xv5-86q9-7xr8
|
2023-09-07T12:58:58Z
|
2023-09-07T12:58:58Z
| null |
[]
|
SecureJoin: on windows, paths outside of the rootfs could be inadvertently produced
|
### Impact
For Windows users of `github.com/cyphar/filepath-securejoin`, until v0.2.4 it was possible for certain rootfs and path combinations (in particular, where a malicious Unix-style `/`-separated unsafe path was used with a Windows-style rootfs path) to result in generated paths that were outside of the provided rootfs.
It is unclear to what extent this has a practical impact on real users, but given the possible severity of the issue we have released an emergency patch release that resolves this issue.
Thanks to @pjbgf for discovering, debugging, and fixing this issue (as well as writing some tests for it).
### Patches
c121231e1276e11049547bee5ce68d5a2cfe2d9b is the patch fixing this issue. v0.2.4 contains the fix.
### Workarounds
Users could use `filepath.FromSlash()` on all unsafe paths before passing them to `filepath-securejoin`.
### References
See #9.
|
[]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cyphar/filepath-securejoin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.4'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/cyphar/filepath-securejoin/security/advisories/GHSA-6xv5-86q9-7xr8'}, {'type': 'WEB', 'url': 'https://github.com/cyphar/filepath-securejoin/pull/9'}, {'type': 'WEB', 'url': 'https://github.com/cyphar/filepath-securejoin/commit/c121231e1276e11049547bee5ce68d5a2cfe2d9b'}, {'type': 'PACKAGE', 'url': 'https://github.com/cyphar/filepath-securejoin'}, {'type': 'WEB', 'url': 'https://github.com/cyphar/filepath-securejoin/releases/tag/v0.2.4'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-07T12:58:58Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-7p8c-crfr-q93p
|
2023-09-13T14:09:12Z
|
2023-09-09T00:30:48Z
| null |
['CVE-2023-42277']
|
hutool Buffer Overflow vulnerability
|
hutool v5.8.21 was discovered to contain a buffer overflow via the component `jsonObject.putByPath`.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'cn.hutool:hutool-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.8.21'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'cn.hutool:hutool-json'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.8.21'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-42277'}, {'type': 'WEB', 'url': 'https://github.com/dromara/hutool/issues/3285'}, {'type': 'WEB', 'url': 'https://github.com/dromara/hutool/commit/9ba8f9ca5dd32441f2e0f150cb22fa178bb771d3'}, {'type': 'PACKAGE', 'url': 'https://github.com/dromara/hutool'}]
|
{'cwe_ids': ['CWE-120'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-09-11T18:03:59Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-vpjc-4jcv-jc29
|
2023-09-21T17:09:04Z
|
2023-09-19T03:30:34Z
| null |
['CVE-2022-28357']
|
NATS nats-server allows directory traversal via unintended path to a management action
|
NATS nats-server 2.2.0 through 2.7.4 allows directory traversal because of an unintended path to a management action from a management account.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/nats-io/nats-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.7.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28357'}, {'type': 'WEB', 'url': 'https://advisories.nats.io/CVE/CVE-2022-28357.txt'}, {'type': 'PACKAGE', 'url': 'https://github.com/nats-io/nats-server'}, {'type': 'WEB', 'url': 'https://github.com/nats-io/nats-server/releases/tag/v2.7.4'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-09-21T17:09:04Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-3qc2-v3hp-6cv8
|
2023-09-26T18:09:12Z
|
2023-09-14T06:30:19Z
| null |
['CVE-2023-26141']
|
sidekiq Denial of Service vulnerability
|
Versions of the package sidekiq before 7.1.3 are vulnerable to Denial of Service (DoS) due to insufficient checks in the dashboard-charts.js file. An attacker can exploit this vulnerability by manipulating the localStorage value which will cause excessive polling requests.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'RubyGems', 'name': 'sidekiq'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.1.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26141'}, {'type': 'WEB', 'url': 'https://github.com/sidekiq/sidekiq/commit/62c90d7c5a7d8a378d79909859d87c2e0702bf89'}, {'type': 'WEB', 'url': 'https://gist.github.com/keeganparr1/1dffd3c017339b7ed5371ed3d81e6b2a'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/sidekiq/CVE-2023-26141.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/sidekiq/sidekiq'}, {'type': 'WEB', 'url': 'https://github.com/sidekiq/sidekiq/blob/6-x/web/assets/javascripts/dashboard.js#L6'}, {'type': 'WEB', 'url': 'https://github.com/sidekiq/sidekiq/blob/6-x/web/assets/javascripts/dashboard.js%23L6'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-RUBY-SIDEKIQ-5885107'}]
|
{'cwe_ids': ['CWE-345', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-14T19:34:57Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-w23q-4hw3-2pp6
|
2023-09-06T18:43:13Z
|
2023-09-06T18:43:13Z
| null |
['CVE-2023-28433']
|
Minio vulnerable to Privilege Escalation on Windows via Path separator manipulation
|
### Impact
All users on Windows are impacted. MinIO fails to filter the `\` character, which allows for arbitrary object placement across
buckets. As a result, a user with low privileges, such as an access key, service account, or STS credential, which only has permission to `PutObject` in a specific bucket, can create an admin user.
### Patches
There are two patches that fix this problem comprehensively
```
commit b3c54ec81e0a06392abfb3a1ffcdc80c6fbf6ebc
Author: Harshavardhana <harsha@minio.io>
Date: Mon Mar 20 13:16:00 2023 -0700
reject object names with '\' on windows (#16856)
```
```
commit 8d6558b23649f613414c8527b58973fbdfa4d1b8
Author: Harshavardhana <harsha@minio.io>
Date: Mon Mar 20 00:35:25 2023 -0700
fix: convert '\' to '/' on windows (#16852)
```
### Workarounds
There are no known workarounds
### References
The vulnerable code:
```go
// minio/cmd/generic-handlers.go
// Check if the incoming path has bad path components,
// such as ".." and "."
// SlashSeparator -> /
// dotdotComponent -> ..
// dotComponent -> .
func hasBadPathComponent(path string) bool {
path = strings.TrimSpace(path)
for _, p := range strings.Split(path, SlashSeparator) {
switch strings.TrimSpace(p) {
case dotdotComponent:
return true
case dotComponent:
return true
}
}
return false
}
```
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/minio/minio'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-202303200735'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/minio/minio/security/advisories/GHSA-w23q-4hw3-2pp6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28433'}, {'type': 'WEB', 'url': 'https://github.com/minio/minio/commit/8d6558b23649f613414c8527b58973fbdfa4d1b8'}, {'type': 'WEB', 'url': 'https://github.com/minio/minio/commit/b3c54ec81e0a06392abfb3a1ffcdc80c6fbf6ebc'}, {'type': 'PACKAGE', 'url': 'https://github.com/minio/minio'}, {'type': 'WEB', 'url': 'https://github.com/minio/minio/releases/tag/RELEASE.2023-03-20T20-16-18Z'}]
|
{'cwe_ids': ['CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-06T18:43:13Z', 'nvd_published_at': '2023-03-22T21:15:00Z'}
|
1.4.0
|
GHSA-cgwf-w82q-5jrr
|
2023-09-20T21:28:36Z
|
2023-09-14T09:30:28Z
| null |
['CVE-2023-42503']
|
Apache Commons Compress denial of service vulnerability
|
Improper Input Validation, Uncontrolled Resource Consumption vulnerability in Apache Commons Compress in TAR parsing.This issue affects Apache Commons Compress: from 1.22 before 1.24.0.
Users are recommended to upgrade to version 1.24.0, which fixes the issue.
A third party can create a malformed TAR file by manipulating file modification times headers, which when parsed with Apache Commons Compress, will cause a denial of service issue via CPU consumption.
In version 1.22 of Apache Commons Compress, support was added for file modification times with higher precision (issue # COMPRESS-612 [1]). The format for the PAX extended headers carrying this data consists of two numbers separated by a period [2], indicating seconds and subsecond precision (for example “1647221103.5998539”). The impacted fields are “atime”, “ctime”, “mtime” and “LIBARCHIVE.creationtime”. No input validation is performed prior to the parsing of header values.
Parsing of these numbers uses the BigDecimal [3] class from the JDK which has a publicly known algorithmic complexity issue when doing operations on large numbers, causing denial of service (see issue # JDK-6560193 [4]). A third party can manipulate file time headers in a TAR file by placing a number with a very long fraction (300,000 digits) or a number with exponent notation (such as “9e9999999”) within a file modification time header, and the parsing of files with these headers will take hours instead of seconds, leading to a denial of service via exhaustion of CPU resources. This issue is similar to CVE-2012-2098 [5].
[1]: https://issues.apache.org/jira/browse/COMPRESS-612
[2]: https://pubs.opengroup.org/onlinepubs/9699919799/utilities/pax.html#tag_20_92_13_05
[3]: https://docs.oracle.com/javase/8/docs/api/java/math/BigDecimal.html
[4]: https://bugs.openjdk.org/browse/JDK-6560193
[5]: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2098
Only applications using CompressorStreamFactory class (with auto-detection of file types), TarArchiveInputStream and TarFile classes to parse TAR files are impacted. Since this code was introduced in v1.22, only that version and later versions are impacted.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.commons:commons-compress'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.22'}, {'fixed': '1.24.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-42503'}, {'type': 'WEB', 'url': 'https://github.com/apache/commons-compress/commit/aae38bfb820159ae7a0b792e779571f6a46b3889'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/commons-compress'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/5xwcyr600mn074vgxq92tjssrchmc93c'}]
|
{'cwe_ids': ['CWE-20', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-14T19:35:27Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-2pxw-r47w-4p8c
|
2023-09-05T15:45:10Z
|
2023-09-05T15:45:10Z
| null |
['CVE-2023-28434']
|
Privilege Escalation on Linux/MacOS
|
### Impact
An attacker can use crafted requests to bypass metadata bucket name checking and put an object into any bucket while processing `PostPolicyBucket`. To carry out this attack, the attacker requires credentials with `arn:aws:s3:::*` permission, as well as enabled Console API access.
### Patches
```
commit 67f4ba154a27a1b06e48bfabda38355a010dfca5
Author: Aditya Manthramurthy <donatello@users.noreply.github.com>
Date: Sun Mar 19 21:15:20 2023 -0700
fix: post policy request security bypass (#16849)
```
### Workarounds
Browser API access must be enabled turning off `MINIO_BROWSER=off` allows for this workaround.
### References
The vulnerable code:
```go
// minio/cmd/generic-handlers.go
func setRequestValidityHandler(h http.Handler) http.Handler {
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
// ...
// For all other requests reject access to reserved buckets
bucketName, _ := request2BucketObjectName(r)
if isMinioReservedBucket(bucketName) || isMinioMetaBucket(bucketName) {
if !guessIsRPCReq(r) && !guessIsBrowserReq(r) && !guessIsHealthCheckReq(r) && !guessIsMetricsReq(r) && !isAdminReq(r) && !isKMSReq(r) {
if ok {
tc.FuncName = "handler.ValidRequest"
tc.ResponseRecorder.LogErrBody = true
}
writeErrorResponse(r.Context(), w, errorCodes.ToAPIErr(ErrAllAccessDisabled), r.URL)
return
}
}
// ...
```
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/minio/minio'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-202303200415'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/minio/minio/security/advisories/GHSA-2pxw-r47w-4p8c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28434'}, {'type': 'WEB', 'url': 'https://github.com/minio/minio/pull/16849'}, {'type': 'WEB', 'url': 'https://github.com/minio/minio/commit/67f4ba154a27a1b06e48bfabda38355a010dfca5'}, {'type': 'PACKAGE', 'url': 'https://github.com/minio/minio'}]
|
{'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-05T15:45:10Z', 'nvd_published_at': '2023-03-22T21:15:00Z'}
|
1.4.0
|
GHSA-2q8c-gqf4-mg3v
|
2023-09-21T17:09:16Z
|
2023-09-19T03:30:34Z
| null |
['CVE-2023-5060']
|
Cross site scripting in librenms
|
Cross-site Scripting (XSS) - DOM in GitHub repository librenms/librenms prior to 23.9.1.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '23.9.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-5060'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/8fd8d9b06a11060de5dc69588a1a83594a7e6f72'}, {'type': 'PACKAGE', 'url': 'https://github.com/librenms/librenms'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/01b0917d-f92f-4903-9eca-bcfc46e847e3'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-21T17:09:16Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-vp4f-wxgw-7x8x
|
2023-09-04T16:36:27Z
|
2023-09-04T16:36:27Z
| null |
['CVE-2023-41049']
|
Improper Neutralization of Script in Attributes in @dcl/single-sign-on-client
|
### Impact
Improper input validation in the `init` function allows arbitrary javascript to be executed using the `javascript:` prefix
```ts
SSO.init('javascript:alert("javascript successfully injected")')
```
### Patches
This vulnerability was patched on version `0.1.0`
### Workarounds
This vulnerability can be prevented if user input correctly sanitized or there is no user input pass to the `init` function
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@dcl/single-sign-on-client'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/decentraland/single-sign-on-client/security/advisories/GHSA-vp4f-wxgw-7x8x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-41049'}, {'type': 'WEB', 'url': 'https://github.com/decentraland/single-sign-on-client/pull/2'}, {'type': 'WEB', 'url': 'https://github.com/decentraland/single-sign-on-client/commit/bd20ea9533d0cda30809d929db85b1b76cef855a'}, {'type': 'PACKAGE', 'url': 'https://github.com/decentraland/single-sign-on-client'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-04T16:36:27Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-m5q8-58wh-xxq4
|
2023-09-12T13:53:19Z
|
2023-09-11T21:30:17Z
| null |
['CVE-2022-1415']
|
Drools Core Deserialization of Untrusted Data vulnerability
|
A flaw was found where some utility classes in Drools core did not use proper safeguards when deserializing data. This flaw allows an authenticated attacker to construct malicious serialized objects (usually called gadgets) and achieve code execution on the server.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.drools:drools-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.69.0.Final'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1415'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2022:6813'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2022-1415'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2065505'}]
|
{'cwe_ids': ['CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-12T13:53:19Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-pxg5-h34r-7q8p
|
2023-09-20T23:04:44Z
|
2023-09-20T23:04:44Z
| null |
['CVE-2023-42439']
|
GeoNode vulnerable to SSRF Bypass to return internal host data
|
A SSRF vulnerability exists, bypassing existing controls on the software. This can allow a user to request internal services for a full read SSRF, returning any data from the internal network.
the application is using a whitelist, but the whitelist can be bypassed with @ and encoded value of @ (%40) GET /proxy/?url=http://development.demo.geonode.org%40geoserver:8080/geoserver/web
This will trick the application that the first host is a whitelisted address, but the browser will use @ or %40 as a credential to the host geoserver on port 8080, this will return the data to that host on the response.

|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'GeoNode'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '4.1.3.post1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.2'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/GeoNode/geonode/security/advisories/GHSA-pxg5-h34r-7q8p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-42439'}, {'type': 'WEB', 'url': 'https://github.com/GeoNode/geonode/commit/79ac6e70419c2e0261548bed91c159b54ff35b8d'}, {'type': 'PACKAGE', 'url': 'https://github.com/GeoNode/geonode'}, {'type': 'WEB', 'url': 'https://github.com/GeoNode/geonode/releases/tag/4.1.3'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/geonode/PYSEC-2023-176.yaml'}]
|
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-20T23:04:44Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-hc5c-r8m5-2gfh
|
2023-09-21T17:16:44Z
|
2023-09-21T17:16:44Z
| null |
[]
|
plone.restapi vulnerable to Stored Cross Site Scripting with SVG image in user portrait
|
### Impact
There is a stored cross site scripting vulnerability for SVG images uploaded in user portraits.
Note that a page that uses an image tag with an SVG image as source is never vulnerable, even when the SVG image contains malicious code. To exploit the vulnerability, an attacker would first need to upload an SVG image as user portrait, and then trick a user into following a link to this portrait.
### Patches
A patch will be released in `plone.restapi` 8.43.3. This version is good for Plone 6.0, and for Plone 5.2 on Python 3.
In `plone.restapi` 7 or earlier there was no `@portrait` endpoint yet, so there is nothing to fix in that version. It is still vulnerable to this attack, and needs a [fix in Zope 4](https://github.com/zopefoundation/Zope/security/advisories/GHSA-wm8q-9975-xh5v). These two vulnerabilities share the same CVE: CVE-2023-42458.
### Workarounds
You could remove the portrait field from the member data schema, and possibly remove all portraits that are already in the database, but this seems a bit drastic.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'plone.restapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.43.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/plone/plone.restapi/security/advisories/GHSA-hc5c-r8m5-2gfh'}, {'type': 'WEB', 'url': 'https://github.com/zopefoundation/Zope/security/advisories/GHSA-wm8q-9975-xh5v'}, {'type': 'WEB', 'url': 'https://github.com/plone/plone.restapi/commit/5f44c23ac69db7d6d933d77f177e07603cf05f8b'}, {'type': 'PACKAGE', 'url': 'https://github.com/plone/plone.restapi'}]
|
{'cwe_ids': ['CWE-79', 'CWE-80'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-09-21T17:16:44Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-v84f-6r39-cpfc
|
2023-09-15T19:03:05Z
|
2023-09-15T00:30:29Z
| null |
['CVE-2023-4680']
|
HashiCorp Vault Improper Input Validation vulnerability
|
HashiCorp Vault and Vault Enterprise transit secrets engine allowed authorized users to specify arbitrary nonces, even with convergent encryption disabled. The encrypt endpoint, in combination with an offline attack, could be used to decrypt arbitrary ciphertext and potentially derive the authentication subkey when using transit secrets engine without convergent encryption. Introduced in 1.6.0 and fixed in 1.14.3, 1.13.7, and 1.12.11.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.12.11'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.0'}, {'fixed': '1.13.7'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.14.0'}, {'fixed': '1.14.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4680'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2023-28-vault-s-transit-secrets-engine-allowed-nonce-specified-without-convergent-encryption/58249'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/vault'}]
|
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-15T19:03:05Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-4hg4-9mf5-wxxq
|
2023-09-08T21:05:27Z
|
2023-09-04T16:39:49Z
| null |
['CVE-2023-41052']
|
incorrect order of evaluation of side effects for some builtins
|
### Impact
The order of evaluation of the arguments of the builtin functions `uint256_addmod`, `uint256_mulmod`, `ecadd` and `ecmul` does not follow source order.
• For `uint256_addmod(a,b,c)` and `uint256_mulmod(a,b,c)`, the order is `c,a,b`.
• For `ecadd(a,b)` and `ecmul(a,b)`, the order is `b,a`.
Note that this behaviour is problematic when the evaluation of one of the arguments produces side effects that other arguments depend on.
### Patches
https://github.com/vyperlang/vyper/pull/3583
### Workarounds
When using builtins from the list above, make sure that the arguments of the expression do not produce side effects or, if one does, that no other argument is dependent on those side effects.
### References
_Are there any links users can visit to find out more?_
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'vyper'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.3.9'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/security/advisories/GHSA-4hg4-9mf5-wxxq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-41052'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/pull/3583'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/vyper/PYSEC-2023-168.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/vyperlang/vyper'}]
|
{'cwe_ids': ['CWE-670'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-04T16:39:49Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-rgf9-j7gv-rq22
|
2023-09-29T20:15:56Z
|
2023-09-28T03:30:19Z
| null |
['CVE-2023-5244']
|
Microweber Cross-site Scripting vulnerability
|
Cross-site Scripting (XSS) - Reflected in GitHub repository microweber/microweber 1.3.4 and prior. A patch is available and anticipated to be part of the 2.x branch.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-5244'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/1cb846f8f54ff6f5c668f3ae64dd81740a7e8968'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a3bd58ba-ca59-4cba-85d1-799f73a76470'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-28T16:53:36Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-rhrv-645h-fjfh
|
2023-09-29T22:06:14Z
|
2023-09-29T18:30:22Z
| null |
['CVE-2023-39410']
|
Apache Avro Java SDK vulnerable to Improper Input Validation
|
When deserializing untrusted or corrupted data, it is possible for a reader to consume memory beyond the allowed constraints and thus lead to out of memory on the system.
This issue affects Java applications using Apache Avro Java SDK up to and including 1.11.2. Users should update to apache-avro version 1.11.3 which addresses this issue.
|
[]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.avro:avro'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39410'}, {'type': 'WEB', 'url': 'https://github.com/apache/avro/commit/a12a7e44ddbe060c3dc731863cad5c15f9267828'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/avro'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/q142wj99cwdd0jo5lvdoxzoymlqyjdds'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/09/29/6'}]
|
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-29T22:06:14Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-6qqp-4vm3-359v
|
2023-09-25T18:33:09Z
|
2023-09-24T03:30:20Z
| null |
['CVE-2023-1633']
|
OpenStack Barbican credential leak flaw
|
A credentials leak flaw was found in OpenStack Barbican. This flaw allows a local authenticated attacker to read the configuration file, gaining access to sensitive credentials.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'barbican'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '16.0.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1633'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2023-1633'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2181761'}, {'type': 'PACKAGE', 'url': 'https://github.com/openstack/barbican'}]
|
{'cwe_ids': ['CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-25T18:33:09Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-p76j-h4m8-hx5c
|
2023-09-29T20:14:00Z
|
2023-09-27T15:30:40Z
| null |
['CVE-2023-5192']
|
Pimcore Demo Allows GraphQL Introspection
|
Introspection is enabled on `demo.pimcore.fun`. The demo site has graphql as a feature for users, but allows users to run instropection queries, which presents a potential schema information disclosure vulnerability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/demo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.3.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-5192'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/demo/pull/437'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/demo/commit/a2a7ff3b565882aefb759804aac4a51afb458f1f'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/demo'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/65c954f2-79c3-4672-8846-a3035e7a1db7'}]
|
{'cwe_ids': ['CWE-1049', 'CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-27T20:24:29Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-896v-ph5w-379h
|
2023-09-28T16:49:40Z
|
2023-09-28T06:30:20Z
| null |
['CVE-2023-38872']
|
Economizzer Insecure Direct Object Reference vulnerability
|
An Insecure Direct Object Reference (IDOR) vulnerability in gugoan Economizzer commit 3730880 (April 2023) and v.0.9-beta1 allows any unauthenticated attacker to access cash book entry attachments of any other user, if they know the Id of the attachment.
|
[]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'gugoan/economizzer'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9-beta1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38872'}, {'type': 'WEB', 'url': 'https://github.com/gugoan/economizzer/commit/37308802dfe00d43df396a8afaa2096ece8b7b57'}, {'type': 'WEB', 'url': 'https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38872'}, {'type': 'PACKAGE', 'url': 'https://github.com/gugoan/economizzer'}, {'type': 'WEB', 'url': 'https://www.economizzer.org'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-28T16:49:40Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-5j6p-59cj-j6cp
|
2023-09-01T21:48:39Z
|
2023-09-01T03:30:14Z
| null |
['CVE-2023-4697']
|
usememos/memos vulnerable to privilege escalation
|
Improper Privilege Management in GitHub repository usememos/memos prior to 0.13.2.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4697'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/c9aa2eeb9852047e4f41915eb30726bd25f07ecd'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3ff3325a-1dcb-4da7-894d-81a9cf726d81'}]
|
{'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-01T21:48:39Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-4cpv-669c-r79x
|
2023-09-11T14:43:05Z
|
2023-09-11T14:43:05Z
| null |
['CVE-2023-41336']
|
Prevent injection of invalid entity ids for "autocomplete" fields
|
### Impact
Under certain circumstances, an attacker could successfully submit an entity id for an `EntityType` that is *not* part of the valid choices.
Affected applications are any that use:
* A custom `query_builder` option to limit the valid results;
AND
* An `EntityType` with `'autocomplete' => true` or a custom [AsEntityAutocompleteField](https://symfony.com/bundles/ux-autocomplete/current/index.html#usage-in-a-form-with-ajax).
Under this circumstance, if an id is submitted, it is accepted even if the matching record would not be returned by the custom query built with `query_builder`.
### Patches
The problem has been fixed in `symfony/ux-autocomplete` version 2.11.2.
### Workarounds
Upgrade to version 2.11.2 or greater of `symfony/ux-autocomplete` or perform extra validation after submit to verify the selected option is valid.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/ux-autocomplete'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/symfony/ux-autocomplete/security/advisories/GHSA-4cpv-669c-r79x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-41336'}, {'type': 'WEB', 'url': 'https://github.com/symfony/ux-autocomplete/commit/fabcb2eee14b9e84a45b276711853a560b5d770c'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/ux-autocomplete/CVE-2023-41336.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/symfony/ux-autocomplete'}, {'type': 'WEB', 'url': 'https://symfony.com/bundles/ux-autocomplete/current/index.html#usage-in-a-form-with-ajax'}]
|
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-11T14:43:05Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-9358-cpvx-c2qp
|
2023-09-12T13:34:48Z
|
2023-09-11T20:45:02Z
| null |
['CVE-2023-41879']
|
Magento LTS's guest order "protect code" can be brute-forced too easily
|
# Impact
Guest orders may be viewed without authentication using a "guest-view" cookie which contains the order's "protect_code". This code is 6 hexadecimal characters which is arguably not enough to prevent a brute-force attack. Exposing each order would require a separate brute force attack.
# Patches
None.
# Workarounds
Implementing rate-limiting at the web server would help mitigate the issue. In particular, a very strict rate limit (e.g. 1 per minute per IP) for the specific route (`sales/guest/view/`) would effectively mitigate the issue.
# References
Email from Frank Rochlitzer (f.rochlitzer@b3-it.de) to security@openmage.org:
## Summary
The German Federal Office for Information Security (BSI) found the following flaw in OpenMage through a commissioned pen test:
The web application was found to accept certain requests even without prior strong authentication if the person making the request has data that is non-public but also not secret, such as easily
easily guessed transaction numbers or names.
Attacking entities could possibly exploit this to retrieve sensitive information using this easier-to-obtain data and by trying random numbers.
## Details
Customers who place an order without an account can subsequently retrieve the order data or invoice data by specifying individual information.
Technically, the access is realized by specifying the cookie guest-view. The value of the cookie is Base64 encoded and contains a random value and the order number. The random value consists of six characters, where these are taken from the alphabet [0-9a-f]. In the best case, i.e. when using a cryptographically secure random number generator, this corresponds to an entropy of 24 bits. Furthermore, the order numbers are assigned incrementally, so that the number range can be narrowed down or an upper limit determined by placing an order.
Specifically, this results in the risk that an attacking entity can iterate over all possible values of the cookie's random value. If successful, the billing address, shipping address, payment details and the ordered items can be viewed. The attack only works for orders made as a guest.
## PoC
The request/response pair shows the retrieval of an order. It should be noted in particular, that the cookie is not bound to a session. The response has been formatted for formatted for readability.
Request:
```
1 GET /magento19/index.php/default/sales/guest/view/ HTTP/1.1
2 Host: localhost.local
3 Cookie: guest-view=MzYyYzI4OjEwMDAwMDQzMQ%3D%3D;
4 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Firefox/102.0
5 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
6 Accept-Language: en-US,en;q=0.5
7 Accept-Encoding: gzip, deflate
8 Referer: https://localhost.local/magento19/index.php/default/egovs_checkout/multipage/successview/
9 Upgrade-Insecure-Requests: 1
10 Sec-Fetch-Dest: document
11 Sec-Fetch-Mode: navigate
12 Sec-Fetch-Site: same-origin
13 Sec-Fetch-User: ?1
14 Te: trailers
15 Connection: close
```
Response:
```
1 HTTP/1.1 200 OK
2 Date: Tue, 13 Dec 2022 14:06:13 GMT
3 Server: Apache
4 Strict-Transport-Security: max-age=31536000; includeSubDomains
5 X-Powered-By: PHP/7.4.6
6 Set-Cookie: om_frontend=id7v84a05u8mm1j32t2kj5rbjl; expires=Tue, 13-Dec-2022 15:06:13 GMT; Max-Age=3600; path=/magento19/; domain=localhost.local; secure; HttpOnly
7 Expires: Thu, 19 Nov 1981 08:52:00 GMT
8 Cache-Control: no-store, no-cache, must-revalidate
9 Pragma: no-cache
10 Set-Cookie: om_frontend=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; Max-Age=0; path=/magento19/; domain=localhost.local; secure; HttpOnly; SameSite=None
11 Set-Cookie: om_frontend=o42vttknheaj0sr3q0381jipdp; expires=Tue, 13-Dec-2022 15:06:13 GMT; Max-Age=3600; path=/magento19/; domain=localhost.local; secure; HttpOnly
12 Set-Cookie: guest-view=MzYyYzI4OjEwMDAwMDQzMQ%3D%3D; expires=Tue, 13-Dec-2022 14:16:13 GMT; Max-Age=600; path=/; domain=localhost.local; secure; HttpOnly; SameSite=None
13 X-Frame-Options: SAMEORIGIN
14 X-Content-Type-Options: nosniff
15 X-XSS-Protection: 1; mode=block
16 Referrer-Policy: same-origin
17 Feature-Policy: geolocation 'self'; vibrate 'none'
18 Content-Security-Policy: default-src 'self';script-src 'self' 'unsafe-inline' 'unsafeeval';
style-src 'self' 'unsafe-inline';
19 Connection: close
20 Content-Type: text/html; charset=UTF-8
21 Content-Length: 47876
22
23 <!DOCTYPE html>
24 <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="de" lang="de">
25 […]
26 <div class="page-title">
27 <h1>Bestellung #100000431 - Ausstehende Überweisung</h1>
28 </div>
29 […]
30 <h2 class="feature-headline">Versandadresse</h2>
31 <div class="feature-content">
32 <address>
33 Herr Vorname Nachname<br>
34 Straße<br>
35 Dresden, Brandenburg, 01067<br>
36 Deutschland<br>
37 </address>
38 </div>
39 […]
40 <h2 class="feature-headline">Rechnungsadresse</h2>
41 <div class="feature-content">
42 <address>
43 [color]Herr Vorname Nachname<br>
44 Straße<br>
45 Dresden, Brandenburg, 01067<br>
46 Deutschland<br>[/color]
47 </address>
48 </div>
49 […]
50 <h2 class="feature-headline">Zahlungsart</h2>
51 <div class="feature-content">
52 <div class="block-content">
53 Vorkasse<br>
54 <div id="bankpayment_account_info" style="font-style: italic;">Bankverbindung</div>
55 <table class="data-table fieldset">
56 […]
57 <h2 class="sub-title">
58 <span>Kassenzeichen: WS1712000349</span>
59 </h2>
60 <h2 class="sub-title">Bestellte Artikel</h2>
61 […]
62 <td class="order-item-product">
63 <h3 class="product-name ellipsis-multi-line">Testprodukt Kreditkarte</h3>
64 […]
65 <span class="price">100,23 €</span>
66 […]
67 </html>
```
## Impact
Information disclosure.
Read as well as write access to sensitive information of persons or accounts and the execution of actions on their behalf must always be secured by strong authentication. This can be ensured, for example, by enforcing strong passwords or MFA.
For temporary accesses to sensitive information, temporary passwords or
authentication tokens or comparable data that an attacking entity cannot easily guess or determine should be used. Random values should have sufficient entropy so that searching the number space is impractical for attacking entities.
Furthermore, such queries should be limited by rate limiting.
The exact attack effort cannot be determined, since this requires the proportion of
the proportion of orders that were placed without an account and since the performance of the
performance of the production system is likely to differ from that of the test system.
In a test run, 1000 requests could be made within 36 seconds. Part of the execution is shown in the screenshot. The complete search of the number space for the random value would take 6 days 23 hours 46 minutes. Accordingly, the expected value is about 3.5 days. If every third order is executed without an account, the effort must be multiplied by a factor of 3.
Mit freundlichen Grüßen
Frank Rochlitzer (github: theroch)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 19.5.0'}}, {'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '20.0.0'}, {'fixed': '20.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 20.1.0'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/security/advisories/GHSA-9358-cpvx-c2qp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-41879'}, {'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/commit/2a2a2fb504247e8966f8ffc2e17d614be5d43128'}, {'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/commit/31e74ac5d670b10001f88f038046b62367f15877'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenMage/magento-lts'}, {'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/releases/tag/v19.5.1'}, {'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/releases/tag/v20.1.1'}]
|
{'cwe_ids': ['CWE-330'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-11T20:45:02Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-38fq-h5hc-gwv8
|
2023-09-12T20:26:05Z
|
2023-09-12T20:26:05Z
| null |
['CVE-2023-36794']
|
Microsoft Security Advisory CVE-2023-36794: .NET Remote Code Execution Vulnerability
|
# Microsoft Security Advisory CVE-2023-36794: .NET Remote Code Execution Vulnerability
## <a name="executive-summary"></a>Executive summary
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 7.0 and .NET 6.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.
A vulnerability exists in Microsoft.DiaSymReader.Native.amd64.dll when reading a corrupted PDB file which may lead to remote code execution. This issue only affects Windows systems.
**Note:** The vulnerabilities [CVE-2023-36792]( https://www.cve.org/CVERecord?id=CVE-2023-36792), [CVE-2023-36793]( https://www.cve.org/CVERecord?id=CVE-2023-36793), [CVE-2023-36792]( https://www.cve.org/CVERecord?id=CVE-2023-36794), [CVE-2023-36796]( https://www.cve.org/CVERecord?id=CVE-2023-36796) are all resolved by a single patch. Get [affected software](#affected-software) to resolve all of them.
## Discussion
Discussion for this issue can be found at https://github.com/dotnet/runtime/issues/91946
### <a name="mitigation-factors"></a>Mitigation factors
Microsoft has not identified any mitigating factors for this vulnerability.
## <a name="affected-software"></a>Affected software
* Any .NET 7.0 application running on .NET 7.0.10 or earlier.
* Any .NET 6.0 application running on .NET 6.0.21 or earlier.
If your application uses the following package versions, ensure you update to the latest version of .NET.
### <a name=".NET 7"></a>.NET 7
Package name | Affected version | Patched version
------------ | ---------------- | -------------------------
[Microsoft.NETCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.win-arm64) | >= 7.0.0, <= 7.0.10 | 7.0.11
[Microsoft.NETCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.win-x64) | >= 7.0.0, <= 7.0.10 | 7.0.11
[Microsoft.NETCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.win-x86) | >= 7.0.0, <= 7.0.10 | 7.0.11
### <a name=".NET 6"></a>.NET 6
Package name | Affected version | Patched version
------------ | ---------------- | -------------------------
[Microsoft.NETCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.win-arm64) | >= 6.0.0, <= 6.0.21 | 6.0.22
[Microsoft.NETCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.win-x64) | >= 6.0.0, <= 6.0.21 | 6.0.22
[Microsoft.NETCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.win-x86) | >= 6.0.0, <= 6.0.21 | 6.0.22
## Advisory FAQ
### <a name="how-affected"></a>How do I know if I am affected?
If you have a runtime or SDK with a version listed, or an affected package listed in [affected software](#affected-software), you're exposed to the vulnerability.
### <a name="how-fix"></a>How do I fix the issue?
* To fix the issue please install the latest version of .NET 6.0 or .NET 7.0. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs.
* If you are using one of the affected packages, please update to the patched version listed above.
* If you have .NET 6.0 or greater installed, you can list the versions you have installed by running the `dotnet --info` command. You will see output like the following;
```
.NET Core SDK (reflecting any global.json):
Version: 6.0.300
Commit: 8473146e7d
Runtime Environment:
OS Name: Windows
OS Version: 10.0.18363
OS Platform: Windows
RID: win10-x64
Base Path: C:\Program Files\dotnet\sdk\6.0.300\
Host (useful for support):
Version: 6.0.5
Commit: 8473146e7d
.NET Core SDKs installed:
6.0.300 [C:\Program Files\dotnet\sdk]
.NET Core runtimes installed:
Microsoft.AspNetCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App]
Microsoft.NETCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App]
Microsoft.WindowsDesktop.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App]
To install additional .NET Core runtimes or SDKs:
https://aka.ms/dotnet-download
```
* If you're using .NET 7.0, you should download and install Runtime 7.0.11 or SDK 7.0.111 (for Visual Studio 2022 v17.4) from https://dotnet.microsoft.com/download/dotnet-core/7.0.
* If you're using .NET 6.0, you should download and install Runtime 6.0.22 or SDK 6.0.317 (for Visual Studio 2022 v17.2) from https://dotnet.microsoft.com/download/dotnet-core/6.0.
.NET 6.0 and and .NET 7.0 updates are also available from Microsoft Update. To access this either type "Check for updates" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates.
Once you have installed the updated runtime or SDK, restart your apps for the update to take effect.
Additionally, if you've deployed [self-contained applications](https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd) targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed.
## Other Information
### Reporting Security Issues
If you have found a potential security issue in .NET 6.0 or .NET 7.0, please email details to secure@microsoft.com. Reports may qualify for the Microsoft .NET Core & .NET 5 Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at <https://aka.ms/corebounty>.
### Support
You can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime and https://github.com/dotnet/aspnet/. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue.
### Disclaimer
The information provided in this advisory is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
### External Links
[CVE-2023-36794]( https://www.cve.org/CVERecord?id=CVE-2023-36794)
### Revisions
V1.0 (September 12, 2023): Advisory published.
_Version 1.0_
_Last Updated 2023-09-12_
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.win-arm64'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.10'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.win-arm64'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.22'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.21'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.win-x64'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.10'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.win-x64'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.22'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.21'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.win-x86'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.22'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.21'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.win-x86'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.10'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/dotnet/runtime/security/advisories/GHSA-38fq-h5hc-gwv8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36794'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/runtime/issues/91946'}, {'type': 'PACKAGE', 'url': 'https://github.com/dotnet/runtime'}, {'type': 'WEB', 'url': 'https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36794'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-12T20:26:05Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-rp65-jpc7-8h8p
|
2023-09-29T20:41:31Z
|
2023-09-29T12:30:16Z
| null |
['CVE-2023-5159']
|
Mattermost Incorrect Authorization vulnerability
|
Mattermost fails to properly verify the permissions when managing/updating a bot allowing a User Manager role with user edit permissions to manage/update bots.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost/server/v8'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.1.0'}, {'fixed': '8.1.1'}]}], 'versions': ['8.1.0']}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost/server/v8'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.0.2'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.8.10'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-5159'}, {'type': 'PACKAGE', 'url': 'https://github.com/mattermost/mattermost'}, {'type': 'WEB', 'url': 'https://mattermost.com/security-updates'}]
|
{'cwe_ids': ['CWE-863'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-09-29T20:41:31Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-7g3v-4ggr-xvjf
|
2023-09-22T19:42:20Z
|
2023-09-20T06:30:50Z
| null |
['CVE-2023-43621']
|
Croc may expose secret to local users
|
An issue was discovered in Croc through 9.6.5. The shared secret, located on a command line, can be read by local users who list all processes and their arguments.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/schollz/croc/v9'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '9.6.5'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-43621'}, {'type': 'WEB', 'url': 'https://github.com/schollz/croc/issues/598'}, {'type': 'PACKAGE', 'url': 'https://github.com/schollz/croc'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2023/09/08/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/09/21/5'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-21T16:59:51Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-vfw5-hrgq-h5wf
|
2023-09-25T17:33:10Z
|
2023-09-25T17:33:10Z
| null |
['CVE-2018-17846']
|
x/net/html Vulnerable to DoS During HTML Parsing
|
The html package (aka x/net/html) through 2018-09-25 in Go mishandles `<table><math><select><mi><select></table>`, leading to an infinite loop during an `html.Parse` call because `inSelectIM` and `inSelectInTableIM` do not comply with a specification.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'golang.org/x/net'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20190125091013-d26f9f9a57f3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17846'}, {'type': 'WEB', 'url': 'https://github.com/golang/go/issues/27842'}, {'type': 'WEB', 'url': 'https://go-review.googlesource.com/c/137275'}, {'type': 'WEB', 'url': 'https://go.dev/issue/27842'}, {'type': 'WEB', 'url': 'https://go.googlesource.com/net/+/d26f9f9a57f3fab6a695bec0d84433c2c50f8bbf'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LREEWY6KNLHRWFZ7OT4HVLMVVCGGUHON/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKRCI7WIOCOCD3H7NXWRGIRABTQOZOBK/'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0014'}]
|
{'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-25T17:33:10Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-55wp-3pq4-w8p9
|
2023-09-25T13:56:28Z
|
2023-09-20T18:30:21Z
| null |
['CVE-2023-43496']
|
Jenkins temporary plugin file created with insecure permissions
|
Jenkins creates a temporary file when a plugin is deployed directly from a URL.
Jenkins 2.423 and earlier, LTS 2.414.1 and earlier creates this temporary file in the system temporary directory with the default permissions for newly created files.
If these permissions are overly permissive, they may allow attackers with access to the Jenkins controller file system to read and write the file before it is installed in Jenkins, potentially resulting in arbitrary code execution.
This vulnerability only affects operating systems using a shared temporary directory for all users (typically Linux). Additionally, the default permissions for newly created files generally only allow attackers to read the temporary file, but not write to it.
This issue complements SECURITY-2823, which affected plugins uploaded from an administrator’s computer.
Jenkins 2.424, LTS 2.414.2 creates the temporary file in a subdirectory with more restrictive permissions.
As a workaround, you can change your default temporary-file directory using the Java system property java.io.tmpdir, if you’re concerned about this issue but unable to immediately update Jenkins.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.50'}, {'fixed': '2.414.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.415'}, {'fixed': '2.424'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-43496'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3072'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/09/20/5'}]
|
{'cwe_ids': ['CWE-276'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-21T17:21:21Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-f73w-4m7g-ch9x
|
2023-09-06T21:21:55Z
|
2023-09-01T18:30:41Z
| null |
['CVE-2023-39631']
|
Langchain vulnerable to arbitrary code execution via the evaluate function in the numexpr library
|
An issue in LanChain-ai Langchain v.0.0.245 allows a remote attacker to execute arbitrary code via the evaluate function in the numexpr library.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'langchain'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.245'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39631'}, {'type': 'WEB', 'url': 'https://github.com/langchain-ai/langchain/issues/8363'}, {'type': 'WEB', 'url': 'https://github.com/pydata/numexpr/issues/442'}, {'type': 'PACKAGE', 'url': 'https://github.com/langchain-ai/langchain'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2023-162.yaml'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/numexpr/PYSEC-2023-163.yaml'}]
|
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-09-01T21:57:43Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-p3r5-x3hr-gpg5
|
2023-09-20T19:15:39Z
|
2023-09-12T13:52:54Z
| null |
['CVE-2023-41887']
|
OpenRefine Remote Code execution in project import with mysql jdbc url attack
|
### Summary
An remote Code exec vulnerability allows any unauthenticated user to exec code on the server.
### Details
Hi,Team,
i find openrefine support to import data from database,When use mysql jdbc to connect to database,It is vulnerable to jdbc url attacks,for example,unauthenticated attacker can get rce on the server through the mysql userializable If the mysql-connector-java version used on the server side is less than 8.20.
In order for the server to enable deserialization we need to set the `autoDeserialize` and `queryInterceptors` parameters in the connection string,As same with https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-qqh2-wvmv-h72m, since the concatenation string is a direct concatenation, it is possible to inject the required parameters after the other parameters.

And there is a commons-beanutils dependency library on the server side, which contains an RCE-capable deserialization exploit chain
### PoC
env:
centos 7
openrefine 3.7.4
jdk11
mysql-connector-java version 8.14.0
you can use the tool https://github.com/4ra1n/mysql-fake-server to running a malicious mysql server.
for example use the CB 1.9 Gadget to exec command `touch /tmp/hacked`.

set the `user` to `base64ZGVzZXJfQ0JfdG91Y2ggL3RtcC9oYWNrZWQ=`(`touch /tmp/hacked` base64 encode),`dataBaseName` to `test?autoDeserialize=true&queryInterceptors=com.mysql.cj.jdbc.interceptors.ServerStatusDiffInterceptor#`.


command `touch /tmp/hacked` is executed.

### Impact
An remote Code exec vulnerability allows any unauthenticated user to exec code on the server.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.openrefine:database'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.7.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.7.4'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-p3r5-x3hr-gpg5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-41887'}, {'type': 'WEB', 'url': 'https://github.com/OpenRefine/OpenRefine/commit/693fde606d4b5b78b16391c29d110389eb605511'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenRefine/OpenRefine'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-09-12T13:52:54Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-p9q8-7x22-5x77
|
2023-09-14T16:29:58Z
|
2023-09-12T15:30:20Z
| null |
['CVE-2023-4913']
|
Cecil Cross-site Scripting vulnerability
|
Cross-site Scripting (XSS) - Reflected in GitHub repository cecilapp/cecil prior to 7.47.1.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'cecil/cecil'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.47.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4913'}, {'type': 'WEB', 'url': 'https://github.com/cecilapp/cecil/commit/00dc79f10ce723034b7140d79f4ac731d1d902eb'}, {'type': 'PACKAGE', 'url': 'https://github.com/cecilapp/cecil'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d2a9ec4d-1b4b-470b-87da-ec069f5925ae'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-12T19:30:19Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-pwh8-58vv-vw48
|
2023-09-15T13:36:10Z
|
2023-09-15T13:36:10Z
| null |
['CVE-2023-41900']
|
Jetty's OpenId Revoked authentication allows one request
|
If a Jetty `OpenIdAuthenticator` uses the optional nested `LoginService`, and that `LoginService` decides to revoke an already authenticated user, then the current request will still treat the user as authenticated. The authentication is then cleared from the session and subsequent requests will not be treated as authenticated.
So a request on a previously authenticated session could be allowed to bypass authentication after it had been rejected by the `LoginService`.
### Impact
This impacts usages of the jetty-openid which have configured a nested `LoginService` and where that `LoginService` will is capable of rejecting previously authenticated users.
### Original Report
> working on a custom OpenIdAuthenticator, I discovered the following:
>
> https://github.com/eclipse/jetty.project/blob/jetty-10.0.14/jetty-openid/src/main/java/org/eclipse/jetty/security/openid/OpenIdAuthenticator.java#L505
>
> In the case where the LoginService does return that the authentication has been revoked (from the validate() call on line 463), the OpenIdAuthenticator removes the authentication from the session; however the current request still proceeds as if authenticated, since it falls through to "return authentication" on line 505.
>
> This is fixed by moving the line 505 (and associated debug log) inside the else block that ends on line 502, instead of outside it. Then the revocation case will run through to line 517 and will trigger a new OpenId authentication which I think is correct.
>
> I think this revocation can only occur if you do attach a separate LoginService to the OpenIdLoginService, but in that case the revoked authentication will still let the next request through (and possibly more than one if they are very close to simultaneous).
>
> Technically I think this is a security vulnerability, if a very minor one, so I'm sending this off-list.
### Patched Versions
Fixed in Jetty Versions:
* 9.4.52 - fixed in PR https://github.com/eclipse/jetty.project/pull/9660
* 10.0.16 - fixed in PR https://github.com/eclipse/jetty.project/pull/9528
* 11.0.16 - fixed in PR https://github.com/eclipse/jetty.project/pull/9528
* 12.0.0 - not impacted (already has fix)
### Workaround
Upgrade your version of Jetty.
### References
* https://github.com/eclipse/jetty.project/pull/9528
* https://github.com/eclipse/jetty.project/pull/9660
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-openid'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4.21'}, {'fixed': '9.4.52'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.4.51'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-openid'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.0.16'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.0.15'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-openid'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.0.16'}]}], 'database_specific': {'last_known_affected_version_range': '<= 11.0.15'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-pwh8-58vv-vw48'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-41900'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/pull/9528'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/pull/9660'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/jetty.project'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5507'}]
|
{'cwe_ids': ['CWE-1390'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-09-15T13:36:10Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-h7jm-g87p-5935
|
2023-09-12T20:05:18Z
|
2023-09-12T20:05:18Z
| null |
['CVE-2023-36796']
|
Microsoft Security Advisory CVE-2023-36796: .NET Remote Code Execution Vulnerability
|
# Microsoft Security Advisory CVE-2023-36796: .NET Remote Code Execution Vulnerability
## <a name="executive-summary"></a>Executive summary
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 7.0 and .NET 6.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.
A vulnerability exists in Microsoft.DiaSymReader.Native.amd64.dll when reading a corrupted PDB file which may lead to remote code execution. This issue only affects Windows systems.
**Note:** The vulnerabilities [CVE-2023-36792]( https://www.cve.org/CVERecord?id=CVE-2023-36792), [CVE-2023-36793]( https://www.cve.org/CVERecord?id=CVE-2023-36793), [CVE-2023-36792]( https://www.cve.org/CVERecord?id=CVE-2023-36794), [CVE-2023-36796]( https://www.cve.org/CVERecord?id=CVE-2023-36796) are all resolved by a single patch. Get [affected software](#affected-software) to resolve all of them.
## Discussion
Discussion for this issue can be found at https://github.com/dotnet/runtime/issues/91948
### <a name="mitigation-factors"></a>Mitigation factors
Microsoft has not identified any mitigating factors for this vulnerability.
## <a name="affected-software"></a>Affected software
* Any .NET 7.0 application running on .NET 7.0.10 or earlier.
* Any .NET 6.0 application running on .NET 6.0.21 or earlier.
If your application uses the following package versions, ensure you update to the latest version of .NET.
### <a name=".NET 7"></a>.NET 7
Package name | Affected version | Patched version
------------ | ---------------- | -------------------------
[Microsoft.NETCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.win-arm64) | >= 7.0.0, <= 7.0.10 | 7.0.11
[Microsoft.NETCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.win-x64) | >= 7.0.0, <= 7.0.10 | 7.0.11
[Microsoft.NETCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.win-x86) | >= 7.0.0, <= 7.0.10 | 7.0.11
### <a name=".NET 6"></a>.NET 6
Package name | Affected version | Patched version
------------ | ---------------- | -------------------------
[Microsoft.NETCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.win-arm64) | >= 6.0.0, <= 6.0.21 | 6.0.22
[Microsoft.NETCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.win-x64) | >= 6.0.0, <= 6.0.21 | 6.0.22
[Microsoft.NETCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.win-x86) | >= 6.0.0, <= 6.0.21 | 6.0.22
## Advisory FAQ
### <a name="how-affected"></a>How do I know if I am affected?
If you have a runtime or SDK with a version listed, or an affected package listed in [affected software](#affected-software), you're exposed to the vulnerability.
### <a name="how-fix"></a>How do I fix the issue?
* To fix the issue please install the latest version of .NET 6.0 or .NET 7.0. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs.
* If you are using one of the affected packages, please update to the patched version listed above.
* If you have .NET 6.0 or greater installed, you can list the versions you have installed by running the `dotnet --info` command. You will see output like the following;
```
.NET Core SDK (reflecting any global.json):
Version: 6.0.300
Commit: 8473146e7d
Runtime Environment:
OS Name: Windows
OS Version: 10.0.18363
OS Platform: Windows
RID: win10-x64
Base Path: C:\Program Files\dotnet\sdk\6.0.300\
Host (useful for support):
Version: 6.0.5
Commit: 8473146e7d
.NET Core SDKs installed:
6.0.300 [C:\Program Files\dotnet\sdk]
.NET Core runtimes installed:
Microsoft.AspNetCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App]
Microsoft.NETCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App]
Microsoft.WindowsDesktop.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App]
To install additional .NET Core runtimes or SDKs:
https://aka.ms/dotnet-download
```
* If you're using .NET 7.0, you should download and install Runtime 7.0.11 or SDK 7.0.111 (for Visual Studio 2022 v17.4) from https://dotnet.microsoft.com/download/dotnet-core/7.0.
* If you're using .NET 6.0, you should download and install Runtime 6.0.22 or SDK 6.0.317 (for Visual Studio 2022 v17.2) from https://dotnet.microsoft.com/download/dotnet-core/6.0.
.NET 6.0 and and .NET 7.0 updates are also available from Microsoft Update. To access this either type "Check for updates" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates.
Once you have installed the updated runtime or SDK, restart your apps for the update to take effect.
Additionally, if you've deployed [self-contained applications](https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd) targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed.
## Other Information
### Reporting Security Issues
If you have found a potential security issue in .NET 6.0 or .NET 7.0, please email details to secure@microsoft.com. Reports may qualify for the Microsoft .NET Core & .NET 5 Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at <https://aka.ms/corebounty>.
### Support
You can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime and https://github.com/dotnet/aspnet/. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue.
### Disclaimer
The information provided in this advisory is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
### External Links
[CVE-2023-36796]( https://www.cve.org/CVERecord?id=CVE-2023-36796)
### Revisions
V1.0 (September 12, 2023): Advisory published.
_Version 1.0_
_Last Updated 2023-09-12_
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.win-arm64'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.10'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.win-arm64'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.22'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.21'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.win-x64'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.10'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.win-x64'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.22'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.21'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.win-x86'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.22'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.21'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.win-x86'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.10'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/dotnet/runtime/security/advisories/GHSA-h7jm-g87p-5935'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36796'}, {'type': 'PACKAGE', 'url': 'https://github.com/dotnet/runtime'}, {'type': 'WEB', 'url': 'https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36796'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-12T20:05:18Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-cxvp-82cq-57h2
|
2023-09-21T17:10:22Z
|
2023-09-21T17:10:22Z
| null |
['CVE-2023-42447']
|
blurhash panics on parsing crafted inputs
|
### Impact
The blurhash parsing code may panic due to multiple panic-guarded out-of-bounds accesses on untrusted input.
In a typical deployment, this may get triggered by feeding a maliciously crafted blurhashes over the network. These may include:
- UTF-8 compliant strings containing multi-byte UTF-8 characters
### Patches
The patches will be released under version 0.2.0, which requires user intervention because of slight API churn.
### Workarounds
n.a.
### References
n.a.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'blurhash'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.1'}, {'fixed': '0.2.0'}]}], 'versions': ['0.1.1']}]
|
[{'type': 'WEB', 'url': 'https://github.com/whisperfish/blurhash-rs/security/advisories/GHSA-cxvp-82cq-57h2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-42447'}, {'type': 'PACKAGE', 'url': 'https://github.com/whisperfish/blurhash-rs'}, {'type': 'WEB', 'url': 'https://github.com/whisperfish/blurhash-rs/releases/tag/v0.2.0'}]
|
{'cwe_ids': ['CWE-1284', 'CWE-392'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-21T17:10:22Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-p46g-8c3q-89p2
|
2023-09-25T21:42:11Z
|
2023-09-22T00:30:29Z
| null |
['CVE-2023-31719']
|
FUXA SQL Injection vulnerability
|
FUXA <= 1.1.12 is vulnerable to SQL Injection via `/api/signin`.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'fuxa-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.12'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31719'}, {'type': 'WEB', 'url': 'https://github.com/MateusTesser/CVE-2023-31719'}, {'type': 'PACKAGE', 'url': 'https://github.com/frangoteam/FUXA'}, {'type': 'WEB', 'url': 'https://youtu.be/cjb2KYpV6dY'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-09-22T20:00:24Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-38vf-35cg-m73w
|
2023-09-14T16:22:53Z
|
2023-09-09T00:30:48Z
| null |
['CVE-2023-41564']
|
Cockpit CMS arbitrary file upload vulnerability
|
An arbitrary file upload vulnerability in the Upload Asset function of Cockpit CMS v2.6.3 allows attackers to execute arbitrary code via uploading a crafted `.shtml` file.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'cockpit-hq/cockpit'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-41564'}, {'type': 'PACKAGE', 'url': 'https://github.com/Cockpit-HQ/Cockpit'}, {'type': 'WEB', 'url': 'https://github.com/LongHair00/Mitre_opensource_report/blob/main/CockpitCMS-StoredXSS.md'}]
|
{'cwe_ids': ['CWE-434'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-11T18:04:48Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-8xv7-89vj-q48c
|
2023-09-07T12:56:39Z
|
2023-09-07T12:56:39Z
| null |
['CVE-2023-41050']
|
Information disclosure in AccessControl
|
### Impact
Python's "format" functionality allows someone controlling the format string to "read" objects accessible (recursively) via attribute access and subscription from accessible objects. Those attribute accesses and subscriptions use Python's full blown `getattr` and `getitem`, not the policy restricted `AccessControl` variants `_getattr_` and `_getitem_`. This can lead to critical information disclosure.
`AccessControl` already provides a safe variant for `str.format` and denies access to `string.Formatter`. However, `str.format_map` is still unsafe.
Affected are all users who allow untrusted users to create `AccessControl` controlled Python code and execute it.
### Patches
A fix will be introduced in the versions 4.4, 5.8 and 6.2.
### Workarounds
There are no workarounds.
### References
https://github.com/zopefoundation/RestrictedPython/security/advisories/GHSA-xjw2-6jm9-rf67 describes the corresponding problem for `RestrictedPython`.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'AccessControl'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Zope'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.8.9'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'AccessControl'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0'}, {'fixed': '5.8'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'AccessControl'}, 'ecosystem_specific': {'affected_functions': ['https://github.com/zopefoundation/AccessControl/commit/6bc32692e0d4b8d5cf64eae3d19de987c7375bc9']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0'}, {'fixed': '6.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Zope'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.8.4'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/zopefoundation/AccessControl/security/advisories/GHSA-8xv7-89vj-q48c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-41050'}, {'type': 'WEB', 'url': 'https://github.com/zopefoundation/AccessControl/commit/6bc32692e0d4b8d5cf64eae3d19de987c7375bc9'}, {'type': 'PACKAGE', 'url': 'https://github.com/zopefoundation/AccessControl'}]
|
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-07T12:56:39Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-36xm-35qq-795w
|
2023-09-11T20:43:41Z
|
2023-09-11T20:43:41Z
| null |
[]
|
Inventory exposes reference to non-Sync data to an arbitrary thread
|
Affected versions do not enforce a `Sync` bound on the type of caller-provided value held in the plugin registry. References to these values are made accessible to arbitrary threads other than the one that constructed them.
A caller could use this flaw to submit thread-unsafe data into inventory, then access it as a reference simultaneously from multiple threads.
The flaw was corrected by enforcing that data submitted by the caller into inventory is `Sync`.
|
[]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'inventory'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/dtolnay/inventory/pull/42'}, {'type': 'WEB', 'url': 'https://github.com/dtolnay/inventory/commit/e1e347d2725b9c9dd4a70b63eb08532ca9687652'}, {'type': 'PACKAGE', 'url': 'https://github.com/dtolnay/inventory'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0058.html'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-11T20:43:41Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-wpg8-mf6h-gm92
|
2023-09-13T14:09:27Z
|
2023-09-12T18:58:34Z
| null |
['CVE-2023-40611']
|
Apache Airflow Incorrect Authorization vulnerability
|
Apache Airflow, versions before 2.7.1, is affected by a vulnerability that allows authenticated and DAG-view authorized Users to modify some DAG run detail values when submitting notes. This could have them alter details such as configuration parameters, start date, etc.
Users should upgrade to version 2.7.1 or later which has removed the vulnerability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40611'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/33413'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/commit/b7a46c970d638028a4a7643ad000dcee951fb9ef'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/apache-airflow/PYSEC-2023-170.yaml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/8y9xk1s3j4qr36yzqn8ogbn9fl7pxrn0'}]
|
{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-12T18:58:34Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-ppjg-v974-84cm
|
2023-09-06T19:49:46Z
|
2023-09-06T19:49:46Z
| null |
['CVE-2023-40591']
|
Go-Ethereum vulnerable to denial of service via malicious p2p message
|
### Impact
A vulnerable node, can be made to consume unbounded amounts of memory when handling specially crafted p2p messages sent from an attacker node.
Details about this bug will be released within 4-8 weeks, as per our official [vulnerability disclosure policy](https://geth.ethereum.org/docs/developers/geth-developer/disclosures).
### Patches
The fix is included in geth version `1.12.1-stable`, i.e, `1.12.2-unstable` and onwards.
### Workarounds
No known workarounds.
### Credits
This bug was reported by Patrick McHardy and reported via [bounty@ethereum.org](mailto:bounty@ethereum.org).
### References
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ethereum/go-ethereum'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.1-stable'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/security/advisories/GHSA-ppjg-v974-84cm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40591'}, {'type': 'WEB', 'url': 'https://geth.ethereum.org/docs/developers/geth-developer/disclosures'}, {'type': 'PACKAGE', 'url': 'https://github.com/ethereum/go-ethereum'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/releases/tag/v1.12.1'}]
|
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-06T19:49:46Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-9qc3-p9jq-2x27
|
2023-09-06T20:53:39Z
|
2023-09-06T15:30:26Z
| null |
['CVE-2023-27526']
|
Apache Superset users may incorrectly create resources using the import charts feature
|
A non Admin authenticated user could incorrectly create resources using the import charts feature, on Apache Superset up to and including 2.1.0.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27526'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/superset'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/ndww89yl2jd98lvn23n9cj722lfdg8dv'}]
|
{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-06T20:53:39Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-qv64-w99c-qcr9
|
2023-09-25T13:56:45Z
|
2023-09-20T18:30:21Z
| null |
['CVE-2023-43497']
|
Jenkins temporary uploaded file created with insecure permissions
|
In Jenkins 2.423 and earlier, LTS 2.414.1 and earlier, uploaded files processed via the Stapler web framework and the Jenkins API `MultipartFormDataParser` create temporary files in the system temporary directory with the default permissions for newly created files.
If these permissions are overly permissive, attackers with access to the system temporary directory may be able to read and write the file before it is used.
This vulnerability only affects operating systems using a shared temporary directory for all users (typically Linux). Additionally, the default permissions for newly created files generally only allow attackers to read the temporary file, but not write to it.
Jenkins 2.424, LTS 2.414.2 creates the temporary files in a subdirectory with more restrictive permissions.
As a workaround, you can change your default temporary-file directory using the Java system property `java.io.tmpdir`, if you’re concerned about this issue but unable to immediately update Jenkins.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.50'}, {'fixed': '2.414.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.415'}, {'fixed': '2.424'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-43497'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3073'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/09/20/5'}]
|
{'cwe_ids': ['CWE-434'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-09-21T21:38:07Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-m9xq-6h2j-65r2
|
2023-09-27T13:55:11Z
|
2023-09-22T19:59:49Z
| null |
['CVE-2023-42821']
|
Markdown vulnerable to Out-of-bounds Read while parsing citations
|
### Summary
Parsing malformed markdown input with parser that uses parser.Mmark extension could result in out-of-bounds read vulnerability.
### Details
To exploit the vulnerability, parser needs to have parser.Mmark extension set. The panic occurs inside the `citation.go` file on the line 69 when the parser tries to access the element past its length.
https://github.com/gomarkdown/markdown/blob/7478c230c7cd3e7328803d89abe591d0b61c41e4/parser/citation.go#L69
### PoC
```go
package main
import (
"github.com/gomarkdown/markdown"
"github.com/gomarkdown/markdown/parser"
)
func main() {
ext := parser.CommonExtensions |
parser.Attributes |
parser.OrderedListStart |
parser.SuperSubscript |
parser.Mmark
p := parser.NewWithExtensions(ext)
inp := []byte("[@]")
markdown.ToHTML(inp, p, nil)
}
```
```bash
$ go run main.go
panic: runtime error: index out of range [1] with length 1
goroutine 1 [running]:
github.com/gomarkdown/markdown/parser.citation(0x10?, {0x1400000e3f0, 0x14000141801?, 0x3}, 0x0?)
/Users/demon/go/pkg/mod/github.com/gomarkdown/markdown@v0.0.0-20230916125811-7478c230c7cd/parser/citation.go:69 +0x544
github.com/gomarkdown/markdown/parser.link(0x14000152000?, {0x1400000e3f0?, 0x3?, 0x3?}, 0x14000141ad8?)
/Users/demon/go/pkg/mod/github.com/gomarkdown/markdown@v0.0.0-20230916125811-7478c230c7cd/parser/inline.go:308 +0x1c0
github.com/gomarkdown/markdown/parser.(*Parser).Inline(0x14000152000, {0x102d87f48, 0x14000076180}, {0x1400000e3f0, 0x3, 0x3})
/Users/demon/go/pkg/mod/github.com/gomarkdown/markdown@v0.0.0-20230916125811-7478c230c7cd/parser/inline.go:38 +0xb8
github.com/gomarkdown/markdown/parser.(*Parser).Parse.func1({0x102d87f48?, 0x14000076180}, 0x0?)
/Users/demon/go/pkg/mod/github.com/gomarkdown/markdown@v0.0.0-20230916125811-7478c230c7cd/parser/parser.go:307 +0x8c
github.com/gomarkdown/markdown/ast.NodeVisitorFunc.Visit(0x140000106e0?, {0x102d87f48?, 0x14000076180?}, 0x68?)
/Users/demon/go/pkg/mod/github.com/gomarkdown/markdown@v0.0.0-20230916125811-7478c230c7cd/ast/node.go:574 +0x38
github.com/gomarkdown/markdown/ast.Walk({0x102d87f48, 0x14000076180}, {0x102d87348, 0x140000106e0})
/Users/demon/go/pkg/mod/github.com/gomarkdown/markdown@v0.0.0-20230916125811-7478c230c7cd/ast/node.go:546 +0x58
github.com/gomarkdown/markdown/ast.Walk({0x102d877b0, 0x14000076120}, {0x102d87348, 0x140000106e0})
/Users/demon/go/pkg/mod/github.com/gomarkdown/markdown@v0.0.0-20230916125811-7478c230c7cd/ast/node.go:557 +0x144
github.com/gomarkdown/markdown/ast.WalkFunc(...)
/Users/demon/go/pkg/mod/github.com/gomarkdown/markdown@v0.0.0-20230916125811-7478c230c7cd/ast/node.go:580
github.com/gomarkdown/markdown/parser.(*Parser).Parse(0x14000152000, {0x1400000e3f0?, 0x0?, 0x0?})
/Users/demon/go/pkg/mod/github.com/gomarkdown/markdown@v0.0.0-20230916125811-7478c230c7cd/parser/parser.go:304 +0x16c
github.com/gomarkdown/markdown.Parse({0x1400000e3f0?, 0x3f?, 0x14000141e38?}, 0x102c6b43c?)
/Users/demon/go/pkg/mod/github.com/gomarkdown/markdown@v0.0.0-20230916125811-7478c230c7cd/markdown.go:53 +0x6c
github.com/gomarkdown/markdown.ToHTML({0x1400000e3f0?, 0x0?, 0x60?}, 0x0?, {0x0, 0x0})
/Users/demon/go/pkg/mod/github.com/gomarkdown/markdown@v0.0.0-20230916125811-7478c230c7cd/markdown.go:77 +0x30
main.main()
/Users/demon/tools/markdown_cve_poc/main.go:17 +0x5c
exit status 2
```
### Impact
Denial of Service / panic
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/gomarkdown/markdown'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20230922105210-14b16010c2ee'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/gomarkdown/markdown/security/advisories/GHSA-m9xq-6h2j-65r2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-42821'}, {'type': 'WEB', 'url': 'https://github.com/gomarkdown/markdown/commit/14b16010c2ee7ff33a940a541d993bd043a88940'}, {'type': 'PACKAGE', 'url': 'https://github.com/gomarkdown/markdown'}, {'type': 'WEB', 'url': 'https://github.com/gomarkdown/markdown/blob/7478c230c7cd3e7328803d89abe591d0b61c41e4/parser/citation.go#L69'}]
|
{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-22T19:59:49Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-g2xh-c426-v8mf
|
2023-09-20T19:21:12Z
|
2023-09-04T16:39:00Z
| null |
['CVE-2023-40015']
|
Vyper: reversed order of side effects for some operations
|
### Impact
For the following (probably non-exhaustive) list of expressions, the compiler evaluates the arguments from right to left instead of left to right.
```
- unsafe_add
- unsafe_sub
- unsafe_mul
- unsafe_div
- pow_mod256
- |, &, ^ (bitwise operators)
- bitwise_or (deprecated)
- bitwise_and (deprecated)
- bitwise_xor (deprecated)
- raw_call
- <, >, <=, >=, ==, !=
- in, not in (when lhs and rhs are enums)
```
This behaviour becomes a problem when the evaluation of one of the arguments produces side effects that other arguments depend on. The following expressions can produce side-effect:
- state modifying external call
- state modifying internal call
- `raw_call`
- `pop()` when used on a Dynamic Array stored in the storage
- `create_minimal_proxy_to`
- `create_copy_of`
- `create_from_blueprint`
For example:
```Vyper
f:uint256
@internal
def side_effect() -> uint256:
self.f = 12
return 1
@external
def foo() -> uint256:
return unsafe_add(self.f,self.side_effect()) # returns 13 instead of 1
```
```Vyper
a:DynArray[uint256, 12]
@external
def bar() -> bool:
self.a = [1,2,3]
return len(self.a) == self.a.pop() # return false instead of true
```
### Patches
not yet patched, will address in a future release. tracking in https://github.com/vyperlang/vyper/issues/3604.
### Workarounds
When using expressions from the list above, make sure that the arguments of the expression do not produce side effects or, if one does, that no other argument is dependent on those side effects.
### References
_Are there any links users can visit to find out more?_
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'vyper'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.9'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/security/advisories/GHSA-g2xh-c426-v8mf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40015'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/vyper/PYSEC-2023-167.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/vyperlang/vyper'}]
|
{'cwe_ids': ['CWE-670'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-04T16:39:00Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-v92f-jx6p-73rx
|
2023-09-19T20:35:16Z
|
2023-09-19T20:35:16Z
| null |
['CVE-2022-24816']
|
Improper Control of Generation of Code ('Code Injection') in jai-ext
|
### Impact
Programs using jt-jiffle, and allowing Jiffle script to be provided via network request, are susceptible to a Remote Code Execution as the Jiffle script is compiled into Java code via Janino, and executed. In particular, this affects the downstream GeoServer project.
### Patches
Version 1.2.22 will contain a patch that disables the ability to inject malicious code into the resulting script.
### Workarounds
Negate the ability to compile Jiffle scripts from the final application, by removing janino-x.y.z.jar from the classpath.
### References
None.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'it.geosolutions.jaiext.jiffle:jt-jiffle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.22'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'it.geosolutions.jaiext.jiffle:jt-jiffle-language'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.22'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/geosolutions-it/jai-ext/security/advisories/GHSA-v92f-jx6p-73rx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24816'}, {'type': 'WEB', 'url': 'https://github.com/geosolutions-it/jai-ext/commit/cb1d6565d38954676b0a366da4f965fef38da1cb'}, {'type': 'PACKAGE', 'url': 'https://github.com/geosolutions-it/jai-ext'}]
|
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-09-19T20:35:16Z', 'nvd_published_at': '2022-04-13T21:15:00Z'}
|
1.4.0
|
GHSA-jm6m-4632-36hf
|
2023-09-29T21:34:00Z
|
2023-09-29T20:39:21Z
| null |
['CVE-2023-43655']
|
Composer Remote Code Execution vulnerability via web-accessible composer.phar
|
### Impact
Users publishing a composer.phar to a public web-accessible server where the composer.phar can be executed as a php file may be impacted if PHP also has `register_argc_argv` enabled in php.ini.
### Patches
2.6.4, 2.2.22 and 1.10.27 patch this vulnerability.
### Workarounds
Make sure `register_argc_argv` is disabled in php.ini, and avoid publishing composer.phar to the web as this really should not happen.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'composer/composer'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.27'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'composer/composer'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.22'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'composer/composer'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.6.4'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/composer/composer/security/advisories/GHSA-jm6m-4632-36hf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-43655'}, {'type': 'WEB', 'url': 'https://github.com/composer/composer/commit/4fce14795aba98e40b6c4f5047305aba17a6120d'}, {'type': 'WEB', 'url': 'https://github.com/composer/composer/commit/955a48e6319c8962e5cd421b07c00ab3c728968c'}, {'type': 'WEB', 'url': 'https://github.com/composer/composer/commit/95e091c921037b7b6564942845e7b738f6b95c9c'}, {'type': 'PACKAGE', 'url': 'https://github.com/composer/composer'}]
|
{'cwe_ids': ['CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-29T20:39:21Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-vpjg-wmf8-29h9
|
2023-09-06T19:52:59Z
|
2023-09-05T12:30:16Z
| null |
['CVE-2023-20897']
|
Salt vulnerable to denial of service
|
Salt masters prior to 3005.2 or 3006.2 contain a DOS in minion return. After receiving several bad packets on the request server equal to the number of worker threads, the master will become unresponsive to return requests until restarted.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'salt'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3005.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'salt'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3006.0rc1'}, {'fixed': '3006.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-20897'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/salt/PYSEC-2023-166.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/saltstack/salt'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OMWJIHQZXHK6FH2E3IWAZCYIRI7FLVOL/'}, {'type': 'WEB', 'url': 'https://saltproject.io/security-announcements/2023-08-10-advisory/'}]
|
{'cwe_ids': ['CWE-404'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-06T19:52:59Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-p7v2-p9m8-qqg7
|
2023-09-06T19:50:58Z
|
2023-09-06T19:50:58Z
| null |
['CVE-2023-29198']
|
Electron context isolation bypass via nested unserializable return value
|
### Impact
Apps using `contextIsolation` and `contextBridge` are affected.
This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions.
### Workarounds
This issue is exploitable under either of two conditions:
* If an API exposed to the main world via `contextBridge` can return an object or array that contains a JS object which cannot be serialized, for instance, a canvas rendering context. This would normally result in an exception being thrown `Error: object could not be cloned`.
* If an API exposed to the main world via `contextBridge` has a return value that throws a user-generated exception while being sent over the bridge, for instance a dynamic getter property on an object that throws an error when being computed.
The app side workaround is to ensure that such a case is not possible. Ensure all values returned from a function exposed over the context bridge are [supported](https://www.electronjs.org/docs/latest/api/context-bridge#parameter--error--return-type-support) and that any objects returned from functions do not have dynamic getters that can throw exceptions.
Auditing your exposed API is likely to be quite difficult so we strongly recommend you update to a patched version of Electron.
### Fixed Versions
* `25.0.0-alpha.2`
* `24.0.1`
* `23.2.3`
* `22.3.6`
### For more information
If you have any questions or comments about this advisory, email us at [security@electronjs.org](mailto:security@electronjs.org)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.3.6'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '23.0.0-alpha.1'}, {'fixed': '23.2.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '24.0.0-alpha.1'}, {'fixed': '24.0.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '25.0.0-alpha.1'}, {'fixed': '25.0.0-alpha.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/electron/electron/security/advisories/GHSA-p7v2-p9m8-qqg7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29198'}, {'type': 'PACKAGE', 'url': 'https://github.com/electron/electron'}, {'type': 'WEB', 'url': 'https://www.electronjs.org/docs/latest/api/context-bridge#parameter--error--return-type-support'}]
|
{'cwe_ids': ['CWE-754'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-06T19:50:58Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-62wf-h26v-5m57
|
2023-09-22T19:48:29Z
|
2023-09-20T03:30:17Z
| null |
['CVE-2023-38888']
|
Cross Site Scripting vulnerability in Dolibarr ERP CRM
|
Cross Site Scripting vulnerability in Dolibarr ERP CRM v.17.0.1 and before allows a remote attacker to obtain sensitive information and execute arbitrary code via the REST API module, related to analyseVarsForSqlAndScriptsInjection and testSqlAndScriptInject.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '17.0.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38888'}, {'type': 'WEB', 'url': 'https://akerva.com/wp-content/uploads/2023/09/AKERVA_Security-Advisory_CVE-2023-38888_Dolibarr_XSS.pdf'}, {'type': 'PACKAGE', 'url': 'https://github.com/Dolibarr/dolibarr'}, {'type': 'WEB', 'url': 'http://dolibarr.com'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-09-21T17:03:18Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-x7m3-jprg-wc5g
|
2023-09-26T13:58:44Z
|
2023-09-25T12:30:44Z
| null |
['CVE-2023-41419']
|
Gevent allows remote attacker to escalate privileges
|
An issue in Gevent Gevent before version 23.9.1 allows a remote attacker to escalate privileges via a crafted script to the WSGIServer component.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'gevent'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '23.9.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-41419'}, {'type': 'WEB', 'url': 'https://github.com/gevent/gevent/issues/1989'}, {'type': 'WEB', 'url': 'https://github.com/gevent/gevent/commit/2f53c851eaf926767fbac62385615efd4886221c'}, {'type': 'PACKAGE', 'url': 'https://github.com/gevent/gevent'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/gevent/PYSEC-2023-177.yaml'}]
|
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-09-25T18:46:08Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-55g7-9cwv-5qfv
|
2023-09-25T21:43:08Z
|
2023-09-25T18:30:18Z
| null |
['CVE-2023-43642']
|
snappy-java's missing upper bound check on chunk length can lead to Denial of Service (DoS) impact
|
### Summary
snappy-java is a data compression library in Java. Its SnappyInputStream was found to be vulnerable to Denial of Service (DoS) attacks when decompressing data with a too-large chunk size. Due to missing upper bound check on chunk length, an unrecoverable fatal error can occur.
### Scope
All versions of snappy-java including the latest released version 1.1.10.3. A fix is applied in 1.1.10.4
### Details
While performing mitigation efforts related to [CVE-2023-34455](https://nvd.nist.gov/vuln/detail/CVE-2023-34455) in Confluent products, our Application Security team closely analyzed the fix that was accepted and merged into snappy-java version 1.1.10.1 in [this](https://github.com/xerial/snappy-java/commit/3bf67857fcf70d9eea56eed4af7c925671e8eaea) commit. The check on [line 421](https://github.com/xerial/snappy-java/commit/3bf67857fcf70d9eea56eed4af7c925671e8eaea#diff-c3e53610267092989965e8c7dd2d4417d355ff7f560f9e8075b365f32569079fR421) only attempts to check if chunkSize is not a negative value. We believe that this is an inadequate fix as it misses an upper-bounds check for overly positive values such as 0x7FFFFFFF (or (2,147,483,647 in decimal) before actually [attempting to allocate](https://github.com/xerial/snappy-java/commit/3bf67857fcf70d9eea56eed4af7c925671e8eaea#diff-c3e53610267092989965e8c7dd2d4417d355ff7f560f9e8075b365f32569079fR429) the provided unverified number of bytes via the “chunkSize” variable. This missing upper-bounds check can lead to the applications depending upon snappy-java to allocate an inappropriate number of bytes on the heap which can then cause an java.lang.OutOfMemoryError exception. Under some specific conditions and contexts, this can lead to a Denial-of-Service (DoS) attack with a direct impact on the availability of the dependent implementations based on the usage of the snappy-java library for compression/decompression needs.
### PoC
Compile and run the following code:
```
package org.example;
import org.xerial.snappy.SnappyInputStream;
import java.io.*;
public class Main {
public static void main(String[] args) throws IOException {
byte[] data = {-126, 'S', 'N', 'A', 'P', 'P', 'Y', 0, 0, 0, 0, 0, 0, 0, 0, 0,(byte) 0x7f, (byte) 0xff, (byte) 0xff, (byte) 0xff};
SnappyInputStream in = new SnappyInputStream(new ByteArrayInputStream(data));
byte[] out = new byte[50];
try {
in.read(out);
}
catch (Exception ignored) {
}
}
}
```
### Impact
Denial of Service of applications dependent on snappy-java especially if `ExitOnOutOfMemoryError` or `CrashOnOutOfMemoryError` is configured on the JVM.
### Credits
Jan Werner, Mukul Khullar and Bharadwaj Machiraju from Confluent's Application Security team.
We kindly request for a new CVE ID to be assigned once you acknowledge this vulnerability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xerial.snappy:snappy-java'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.1.10.3'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/xerial/snappy-java/security/advisories/GHSA-55g7-9cwv-5qfv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-43642'}, {'type': 'WEB', 'url': 'https://github.com/xerial/snappy-java/commit/9f8c3cf74223ed0a8a834134be9c917b9f10ceb5'}, {'type': 'PACKAGE', 'url': 'https://github.com/xerial/snappy-java'}, {'type': 'WEB', 'url': 'https://github.com/xerial/snappy-java/releases/tag/v1.1.10.4'}]
|
{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-25T18:30:18Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-v4q9-qgqf-7jwp
|
2023-09-21T17:12:02Z
|
2023-09-16T00:30:30Z
| null |
['CVE-2023-41626']
|
Gradio arbitrary file upload vulnerability
|
Gradio v3.27.0 was discovered to contain an arbitrary file upload vulnerability via the `/upload` interface.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'gradio'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.27.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-41626'}, {'type': 'WEB', 'url': 'https://gist.github.com/impose1/590472eb0544ef1ec36c8a5a40122adb'}, {'type': 'PACKAGE', 'url': 'https://github.com/gradio-app/gradio'}]
|
{'cwe_ids': ['CWE-434'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-21T17:12:02Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-2g8p-j2r6-vqpj
|
2023-09-29T21:34:12Z
|
2023-09-28T15:30:17Z
| null |
['CVE-2023-43876']
|
October Cross-site Scripting vulnerability
|
A Cross-Site Scripting (XSS) vulnerability in installation of October v.3.4.16 allows an attacker to execute arbitrary web scripts via a crafted payload injected into the dbhost field.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'october/cms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.4.16'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-43876'}, {'type': 'PACKAGE', 'url': 'https://github.com/octobercms/october'}, {'type': 'WEB', 'url': 'https://github.com/sromanhu/October-CMS-Reflected-XSS---Installation/blob/main/README.md'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-29T20:39:02Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-279f-qwgh-h5mp
|
2023-09-21T16:55:44Z
|
2023-09-20T18:30:21Z
| null |
['CVE-2023-43494']
|
Jenkins does not exclude sensitive build variables from search
|
Jenkins allows filtering builds in the build history widget by specifying an expression that searches for matching builds by name, description, parameter values, etc.
Jenkins 2.50 through 2.423 (both inclusive), LTS 2.60.1 through 2.414.1 (both inclusive) does not exclude sensitive build variables (e.g., password parameter values) from this search.
This allows attackers with Item/Read permission to obtain values of sensitive variables used in builds by iteratively testing different characters until the correct sequence is discovered.
Jenkins 2.424, LTS 2.414.2 excludes sensitive variables from this search.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.50'}, {'fixed': '2.414.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.415'}, {'fixed': '2.424'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-43494'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3261'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/09/20/5'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-21T16:55:44Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-m7vh-pgfq-v4rq
|
2023-09-13T14:05:43Z
|
2023-09-08T21:30:35Z
| null |
['CVE-2023-42268']
|
Jeecg boot SQL Injection vulnerability
|
Jeecg boot up to v3.5.3 was discovered to contain a SQL injection vulnerability via the component `/jeecg-boot/jmreport/show`.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-parent'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.5.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-42268'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/issues/5311'}, {'type': 'PACKAGE', 'url': 'https://github.com/jeecgboot/jeecg-boot'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-09-11T14:43:19Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-65h2-wf7m-q2v8
|
2023-09-27T20:16:42Z
|
2023-09-27T15:30:35Z
| null |
['CVE-2023-3223']
|
Undertow vulnerable to denial of service
|
A flaw was found in undertow. Servlets annotated with @MultipartConfig may cause an OutOfMemoryError due to large multipart content. This may allow unauthorized users to cause remote Denial of Service (DoS) attack. If the server uses fileSizeThreshold to limit the file size, it's possible to bypass the limit by setting the file name in the request to null.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-parent'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.24.Final'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3223'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:4505'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:4506'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:4507'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:4509'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:4918'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:4919'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:4920'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:4921'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:4924'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2023-3223'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2209689'}, {'type': 'PACKAGE', 'url': 'https://github.com/undertow-io/undertow'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-27T20:16:42Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-h3qf-v68r-35jg
|
2023-09-28T16:50:32Z
|
2023-09-28T06:30:20Z
| null |
['CVE-2023-38871']
|
Economizzer user enumeration vulnerability
|
The commit 3730880 (April 2023) and v.0.9-beta1 of gugoan Economizzer has a user enumeration vulnerability in the login and forgot password functionalities. The app reacts differently when a user or email address is valid, and when it's not. This may allow an attacker to determine whether a user or email address is valid, or brute force valid usernames and email addresses.
|
[]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'gugoan/economizzer'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9-beta1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38871'}, {'type': 'WEB', 'url': 'https://github.com/gugoan/economizzer/commit/37308802dfe00d43df396a8afaa2096ece8b7b57'}, {'type': 'WEB', 'url': 'https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38871'}, {'type': 'PACKAGE', 'url': 'https://github.com/gugoan/economizzer'}, {'type': 'WEB', 'url': 'https://www.economizzer.org'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-28T16:50:32Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-fwr2-64vr-xv9m
|
2023-09-11T12:59:30Z
|
2023-09-11T12:59:30Z
| null |
['CVE-2023-40029']
|
Argo CD cluster secret might leak in cluster details page
|
### Impact
Argo CD Cluster secrets might be managed declaratively using Argo CD / kubectl apply. As a result, the full secret body is stored in`kubectl.kubernetes.io/last-applied-configuration` annotation.
https://github.com/argoproj/argo-cd/pull/7139 introduced the ability to manage cluster labels and annotations. Since clusters are stored as secrets it also exposes the `kubectl.kubernetes.io/last-applied-configuration` annotation which includes full secret body. In order to view the cluster annotations via the Argo CD API, the user must have `clusters, get` RBAC access.
**Note:** In many cases, cluster secrets do not contain any actually-secret information. But sometimes, as in bearer-token auth, the contents might be very sensitive.
### Patches
The bug has been patched in the following versions:
* 2.8.3
* 2.7.14
* 2.6.15
### Workarounds
Update/Deploy cluster secret with `server-side-apply` flag which does not use or rely on `kubectl.kubernetes.io/last-applied-configuration` annotation. Note: annotation for existing secrets will require manual removal.
### For more information
* Open an issue in [the Argo CD issue tracker](https://github.com/argoproj/argo-cd/issues) or [discussions](https://github.com/argoproj/argo-cd/discussions)
* Join us on [Slack](https://argoproj.github.io/community/join-slack) in channel #argo-cd
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd/v2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.6.15'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd/v2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.14'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd/v2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/security/advisories/GHSA-fwr2-64vr-xv9m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40029'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/pull/7139'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/commit/44e52c4ae76e6da1343bdd54e57a822d93549f28'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/commit/4b2e5b06bff2ffd8ed1970654ddd8e55fc4a41c4'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/commit/7122b83fc346ec2729227405a2f9c2aa84b0bf80'}, {'type': 'PACKAGE', 'url': 'https://github.com/argoproj/argo-cd'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/releases/tag/v2.6.15'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/releases/tag/v2.7.14'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/releases/tag/v2.8.3'}]
|
{'cwe_ids': ['CWE-200', 'CWE-532'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-09-11T12:59:30Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-94w5-rf69-2h6c
|
2023-09-07T21:20:03Z
|
2023-09-01T12:30:44Z
| null |
['CVE-2023-39685']
|
hson-java vulnerable to denial of service
|
An issue in hjson-java up to v3.0.0 allows attackers to cause a Denial of Service (DoS) via supplying a crafted JSON string to string a `StringIndexOutOfBoundsException`.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.hjson:hjson'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39685'}, {'type': 'WEB', 'url': 'https://github.com/hjson/hjson-java/issues/27'}, {'type': 'WEB', 'url': 'https://github.com/hjson/hjson-java/commit/aff0b607929b4397d93dc0d029a56aeefb242602'}, {'type': 'PACKAGE', 'url': 'https://github.com/hjson/hjson-java'}]
|
{'cwe_ids': ['CWE-125', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-01T21:54:16Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-m6jj-fgmh-3p8r
|
2023-09-20T22:23:28Z
|
2023-09-15T03:30:19Z
| null |
['CVE-2023-4982']
|
LibreNMS Cross-site Scripting vulnerability
|
Cross-site Scripting (XSS) - Stored in GitHub repository librenms/librenms prior to 23.9.0.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '23.9.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4982'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/2c5960631c49f7414f61b6d4dcd305b07da05769'}, {'type': 'PACKAGE', 'url': 'https://github.com/librenms/librenms'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d3c2dd8a-883c-400e-a1a7-326c3fd37b9e'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-15T19:30:40Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-49hh-fprx-m68g
|
2023-09-28T13:40:19Z
|
2023-09-04T16:35:37Z
| null |
['CVE-2023-41051']
|
Default functions in VolatileMemory trait lack bounds checks, potentially leading to out-of-bounds memory accesses
|
### Impact
An issue was discovered in the default implementations of the `VolatileMemory::{get_atomic_ref, aligned_as_ref, aligned_as_mut, get_ref, get_array_ref}` trait functions, which allows out-of-bounds memory access if the `VolatileMemory::get_slice` function returns a `VolatileSlice` whose length is less than the function’s `count` argument. No implementations of `get_slice` provided in `vm_memory` are affected. Users of custom `VolatileMemory` implementations may be impacted if the custom implementation does not adhere to `get_slice`'s documentation.
### Patches
The issue started in version 0.1.0 but was fixed in version 0.12.2 by inserting a check that verifies that the `VolatileSlice` returned by `get_slice` is of the correct length.
### Workarounds
Not Required
### References
https://github.com/rust-vmm/vm-memory/commit/aff1dd4a5259f7deba56692840f7a2d9ca34c9c8
https://crates.io/crates/vm-memory/0.12.2
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L'}]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'vm-memory'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/rust-vmm/vm-memory/security/advisories/GHSA-49hh-fprx-m68g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-41051'}, {'type': 'WEB', 'url': 'https://github.com/rust-vmm/vm-memory/issues/250'}, {'type': 'WEB', 'url': 'https://github.com/rust-vmm/vm-memory/commit/aff1dd4a5259f7deba56692840f7a2d9ca34c9c8'}, {'type': 'WEB', 'url': 'https://crates.io/crates/vm-memory/0.12.2'}, {'type': 'PACKAGE', 'url': 'https://github.com/rust-vmm/vm-memory'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPXRXD5VXBZHBGMUM77B52CJJMG7EJGI/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYM6CYW2DWRHRAVL2HYTQPXC3J2V77J4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XZGJL6BQLU4XCPQLLTW4GSSBTNQXB3TI/'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0056.html'}]
|
{'cwe_ids': ['CWE-125'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-09-04T16:35:37Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-wm8q-9975-xh5v
|
2023-09-21T17:05:38Z
|
2023-09-21T17:04:09Z
| null |
['CVE-2023-42458']
|
Zope vulnerable to Stored Cross Site Scripting with SVG images
|
### Impact
There is a stored cross site scripting vulnerability for SVG images.
Note that an image tag with an SVG image as source is never vulnerable, even when the SVG image contains malicious code. To exploit the vulnerability, an attacker would first need to upload an image, and then trick a user into following a specially crafted link.
All versions of Zope are impacted on sites that allow untrusted users to upload images.
### Patches
Patches will be released in Zope 4.8.10 and 5.8.5.
### Workarounds
Make sure the "Add Documents, Images, and Files" permission is only assigned to trusted roles. By default only the Manager has this permission.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'Zope'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.8.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.8.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'Zope'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.8.0'}, {'fixed': '5.8.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.8.4'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/zopefoundation/Zope/security/advisories/GHSA-wm8q-9975-xh5v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-42458'}, {'type': 'WEB', 'url': 'https://github.com/zopefoundation/Zope/commit/26a55dbc301db417f47cafda6fe0f983b5690088'}, {'type': 'WEB', 'url': 'https://github.com/zopefoundation/Zope/commit/603b0a12881c90a072a7a65e32d47ed898ce37cb'}, {'type': 'PACKAGE', 'url': 'https://github.com/zopefoundation/Zope'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/09/22/2'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-09-21T17:04:09Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-pj2h-85jq-g5vg
|
2023-09-08T12:20:46Z
|
2023-09-07T09:30:15Z
| null |
['CVE-2023-4815']
|
Answer Missing Authentication for Critical Function
|
Missing Authentication for Critical Function in GitHub repository answerdev/answer prior to v1.1.3.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4815'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/e75142a55546e01d8904f59db228422561f51666'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/4cd3eeb4-57c9-4af2-ad19-2166c9e0fd2c'}]
|
{'cwe_ids': ['CWE-306'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-08T12:20:46Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-q8wc-j5m9-27w3
|
2023-09-21T17:16:54Z
|
2023-09-21T17:16:54Z
| null |
['CVE-2023-42805']
|
Denial of Service issue in quinn-proto
|
### Impact
Receiving unknown QUIC frames in a QUIC packet could result in a panic.
### Patches
The problem has been fixed in 0.9.5 and 0.10.5 maintenance releases.
### References
Fixed in https://github.com/quinn-rs/quinn/pull/1667, backported in https://github.com/quinn-rs/quinn/pull/1668 and https://github.com/quinn-rs/quinn/pull/1669.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'quinn-proto'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.5'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/quinn-rs/quinn/security/advisories/GHSA-q8wc-j5m9-27w3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-42805'}, {'type': 'WEB', 'url': 'https://github.com/quinn-rs/quinn/pull/1667'}, {'type': 'WEB', 'url': 'https://github.com/quinn-rs/quinn/pull/1668'}, {'type': 'WEB', 'url': 'https://github.com/quinn-rs/quinn/pull/1669'}, {'type': 'PACKAGE', 'url': 'https://github.com/quinn-rs/quinn'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0063.html'}]
|
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-21T17:16:54Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-v5wf-jg37-r9m5
|
2023-09-21T17:10:06Z
|
2023-09-21T17:10:06Z
| null |
['CVE-2023-42454']
|
SQLpage vulnerable to public exposure of database credentials
|
### Impact
If
- you are using a SQLPage version older than v0.11.1
- your SQLPage instance is exposed publicly
- the database connection string is specified in the `sqlpage/sqlpage.json` configuration file (not in an environment variable)
- the web_root is the current working directory (the default)
- your database is exposed publicly
then an attacker could retrieve the database connection information from SQLPage and use it to connect to your database directly.
### Patches
Upgrade to [v0.11.1](https://github.com/lovasoa/SQLpage/releases/tag/v0.11.1) as soon as possible.
### Workarounds
If you cannot upgrade immediately:
- Using an environment variable instead of the configuration file to specify the database connection string prevents exposing it on vulnerable versions.
- Using a different [web root](https://github.com/lovasoa/SQLpage/blob/main/configuration.md) (that is not a parent of the SQLPage configuration directory) fixes the issue.
- And in any case, you should generally avoid exposing your database publicly
### References
https://github.com/lovasoa/SQLpage/issues/89
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'sqlpage'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/lovasoa/SQLpage/security/advisories/GHSA-v5wf-jg37-r9m5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-42454'}, {'type': 'WEB', 'url': 'https://github.com/lovasoa/SQLpage/issues/89'}, {'type': 'PACKAGE', 'url': 'https://github.com/lovasoa/SQLpage'}, {'type': 'WEB', 'url': 'https://github.com/lovasoa/SQLpage/releases/tag/v0.11.1'}]
|
{'cwe_ids': ['CWE-200'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-09-21T17:10:06Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-hq8w-9w8w-pmx7
|
2023-09-07T21:26:41Z
|
2023-09-06T20:51:42Z
| null |
['CVE-2023-41327']
|
WireMock Controlled Server Side Request Forgery vulnerability through URL
|
### Impact
WireMock can be configured to only permit proxying (and therefore recording) to certain addresses. This is achieved via a list of allowed address rules and a list of denied address rules, where the allowed list is evaluated first. [Documentation](https://wiremock.org/docs/configuration/#preventing-proxying-to-and-recording-from-specific-target-addresses).
Until WireMock Webhooks Extension [3.0.0-beta-15](https://github.com/wiremock/wiremock/releases/tag/3.0.0-beta-15), the filtering of target addresses from the proxy mode DID NOT work for Webhooks, so the users were potentially vulnerable regardless of the `limitProxyTargets` settings.
Via the WireMock webhooks configuration, POST requests from a webhook might be forwarded to an arbitrary service reachable from WireMock’s instance. For example, If someone is running the WireMock docker Container inside a private cluster, they can trigger internal POST requests against unsecured APIs or even against secure ones by passing a token, discovered using another exploit, via authentication headers.
### Affected components
- WireMock Webhooks Extension 2.x versions until 2.35.1 (security patch)
- WireMock 3.x version until 3.0.3 (security patch)
- All versions of WireMock Studio (discontinued). This distribution bundles the WireMock Webhooks Extension and activates it by default
### Patches and Mitigation
- For WireMock 2.x and 3.x - upgrade to the versions with the security patches
- Setup network restrictions similarly to https://wiremock.org/docs/configuration/#preventing-proxying-to-and-recording-from-specific-target-addresses
- For WireMock Studio: Stop using discontinued WireMock Studio, migrate to other distributions. The vendor of WireMock Studio recommends migration to [WireMock Cloud](https://www.wiremock.io/product)
NOTE: It was confirmed that [WireMock Cloud](https://www.wiremock.io/product) does not expose sensitive internal APIs and hence not vulnerable to the issue. No action is needed if you use this SaaS distribution.
### Workarounds
- Use external firewall rules to define the list of permitted destinations
### References
- CVE-2023-39967
- [Preventing proxying to and recording from specific target addresses](https://wiremock.org/docs/configuration/#preventing-proxying-to-and-recording-from-specific-target-addresses)
### Credits
- @W0rty for reporting CVE-2023-39967 in WireMock Studio
- WireMock Inc. team for discovering similar exploits in Webhooks and the risk in the Proxy mode defaults for WireMock
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.wiremock:wiremock-webhooks-extension'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.wiremock:wiremock-webhooks-extension'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.35.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/wiremock/wiremock/security/advisories/GHSA-hq8w-9w8w-pmx7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-41327'}, {'type': 'PACKAGE', 'url': 'https://github.com/wiremock/wiremock'}, {'type': 'WEB', 'url': 'https://github.com/wiremock/wiremock/releases/tag/2.35.1'}, {'type': 'WEB', 'url': 'https://github.com/wiremock/wiremock/releases/tag/3.0.0-beta-15'}, {'type': 'WEB', 'url': 'https://github.com/wiremock/wiremock/releases/tag/3.0.3'}, {'type': 'WEB', 'url': 'https://wiremock.org/docs/configuration/#preventing-proxying-to-and-recording-from-specific-target-addresses'}]
|
{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-06T20:51:42Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-r87q-fq37-pvr6
|
2023-09-20T21:33:03Z
|
2023-09-18T21:30:42Z
| null |
['CVE-2023-33831']
|
A remote command execution (RCE) vulnerability in the /api/runscript endpoint of FUXA
|
A remote command execution (RCE) vulnerability in the /api/runscript endpoint of FUXA 1.1.13 allows attackers to execute arbitrary commands via a crafted POST request.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@frangoteam/fuxa'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.13'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33831'}, {'type': 'PACKAGE', 'url': 'https://github.com/frangoteam/FUXA'}, {'type': 'WEB', 'url': 'https://github.com/rodolfomarianocy/Unauthenticated-RCE-FUXA-CVE-2023-33831'}, {'type': 'WEB', 'url': 'https://youtu.be/Xxa6yRB2Fpw'}]
|
{'cwe_ids': ['CWE-77', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-09-19T15:55:58Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-mjqh-v5f2-g2mw
|
2023-09-13T14:09:30Z
|
2023-09-12T19:25:08Z
| null |
['CVE-2023-40712']
|
Apache Airflow information exposure vulnerability
|
Apache Airflow, versions before 2.7.1, is affected by a vulnerability that allows authenticated users who have access to see the task/dag in the UI, to craft a URL, which could lead to unmasking the secret configuration of the task that otherwise would be masked in the UI.
Users are strongly advised to upgrade to version 2.7.1 or later which has removed the vulnerability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40712'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/33512'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/33516'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/commit/4390524a41fdfd2d57f1d2dc98ad7b4009c8399e'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/commit/d9814eb3a2fc1dbbb885a0a2c1b7a23ce1cfa148'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/apache-airflow/PYSEC-2023-171.yaml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/jw1yv4lt6hpowqbb0x4o3tdp0jhx2bts'}]
|
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-12T19:25:08Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-7cfq-72w2-24q4
|
2023-09-25T13:55:19Z
|
2023-09-21T06:30:25Z
| null |
['CVE-2015-5467']
|
Yii2 allows attackers to execute any local .php file via a relative path in the view parameter
|
web\ViewAction in Yii (aka Yii2) 2.x before 2.0.5 allows attackers to execute any local .php file via a relative path in the view parameeter.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'yiisoft/yii2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.5'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5467'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/yiisoft/yii2-dev/CVE-2015-5467.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/yiisoft/yii2-framework'}, {'type': 'WEB', 'url': 'https://www.yiiframework.com/news/87/yii-2-0-5-is-released-security-fix'}]
|
{'cwe_ids': ['CWE-22', 'CWE-98'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-09-21T16:55:31Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-45c3-c4c3-8rqg
|
2023-09-25T21:41:37Z
|
2023-09-22T00:30:29Z
| null |
['CVE-2023-31716']
|
FUXA vulnerable to Local File Inclusion
|
FUXA <= 1.1.12 has a Local File Inclusion vulnerability via file=fuxa.log
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@frangoteam/fuxa'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.12'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31716'}, {'type': 'WEB', 'url': 'https://github.com/MateusTesser/CVE-2023-31716'}, {'type': 'PACKAGE', 'url': 'https://github.com/frangoteam/FUXA'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-22T17:08:32Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-rr66-qh5m-w6mx
|
2023-09-13T14:07:16Z
|
2023-09-09T00:30:48Z
| null |
['CVE-2023-42278']
|
hutool Buffer Overflow vulnerability
|
hutool v5.8.21 was discovered to contain a buffer overflow via the component `JSONUtil.parse()`.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'cn.hutool:hutool-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.8.21'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'cn.hutool:hutool-json'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.8.21'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-42278'}, {'type': 'WEB', 'url': 'https://github.com/dromara/hutool/issues/3289'}, {'type': 'WEB', 'url': 'https://github.com/dromara/hutool/commit/5c4486b9f58a83f283868135138f6ff3741b8c12'}, {'type': 'PACKAGE', 'url': 'https://github.com/dromara/hutool'}]
|
{'cwe_ids': ['CWE-120'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-11T18:04:22Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-jj7c-jrv4-c65x
|
2023-09-21T17:14:58Z
|
2023-09-21T17:14:58Z
| null |
['CVE-2023-41048']
|
plone.namedfile vulnerable to Stored Cross Site Scripting with SVG images
|
### Impact
There is a stored cross site scripting vulnerability for SVG images. A [security hotfix from 2021](https://github.com/plone/Products.PloneHotfix20210518) already partially fixed this, by making sure SVG images are always downloaded instead of shown inline. But the same problem still exists for scales of SVG images.
Note that an image tag with an SVG image as source is not vulnerable, even when the SVG image contains malicious code. To exploit the vulnerability, an attacker would first need to upload an image, and then trick a user into following a specially crafted link.
All versions of `plone.namedfile` are impacted.
### Patches
Patches will be released in various `plone.namedfile` releases:
* 5.6.1 (for Plone 5.2)
* 6.0.3 (for Plone 6.0.0-6.0.4)
* 6.1.3 (for Plone 6.0.5-6.0.6)
* 6.2.1 (for Plone 6.0.7)
### Workarounds
There is no workaround.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'plone.namedfile'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone.namedfile'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone.namedfile'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.0'}, {'fixed': '6.1.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone.namedfile'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.2.0'}, {'fixed': '6.2.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/plone/plone.namedfile/security/advisories/GHSA-jj7c-jrv4-c65x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-41048'}, {'type': 'WEB', 'url': 'https://github.com/plone/plone.namedfile/commit/188f66a4577021cf8f2bf7c0f5150f9b9573f167'}, {'type': 'WEB', 'url': 'https://github.com/plone/plone.namedfile/commit/217d6ce847b7171bf1b73fcb6c08010eb449216a'}, {'type': 'WEB', 'url': 'https://github.com/plone/plone.namedfile/commit/f0f911f2a72b2e5c923dc2ab9179319cc47788f9'}, {'type': 'WEB', 'url': 'https://github.com/plone/plone.namedfile/commit/ff5269fb4c79f4eb91dd934561b8824a49a03b60'}, {'type': 'WEB', 'url': 'https://github.com/plone/Products.PloneHotfix20210518'}, {'type': 'PACKAGE', 'url': 'https://github.com/plone/plone.namedfile'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/09/22/2'}]
|
{'cwe_ids': ['CWE-79', 'CWE-80'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-09-21T17:14:58Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-5jjm-qp48-qp86
|
2023-09-20T22:23:55Z
|
2023-09-15T03:30:19Z
| null |
['CVE-2023-4981']
|
LibreNMS Cross-site Scripting vulnerability
|
Cross-site Scripting (XSS) - DOM in GitHub repository librenms/librenms prior to 23.9.0.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '23.9.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4981'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/03c4da62c8acde0a82acbb4a445ae866ebfdd3f7'}, {'type': 'PACKAGE', 'url': 'https://github.com/librenms/librenms'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1f014494-49a9-4bf0-8d43-a675498b9609'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-15T19:30:31Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-pm8v-ppx7-8hr4
|
2023-09-13T14:05:15Z
|
2023-09-08T21:30:35Z
| null |
['CVE-2023-41578']
|
Jeecg boot arbitrary file read vulnerability
|
Jeecg boot up to v3.5.3 was discovered to contain an arbitrary file read vulnerability via the interface `/testConnection`.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-parent'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.5.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-41578'}, {'type': 'WEB', 'url': 'https://github.com/Snakinya/Bugs/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/jeecgboot/jeecg-boot'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-11T14:43:30Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-hvpq-7vcc-5hj5
|
2023-09-20T21:32:13Z
|
2023-09-15T00:30:29Z
| null |
['CVE-2023-41592']
|
Froala Editor Cross-site Scripting vulnerability
|
Froala Editor v4.0.1 to v4.1.1 was discovered to contain a cross-site scripting (XSS) vulnerability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'froala/wysiwyg-editor'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.1'}, {'fixed': '4.1.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.1'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-41592'}, {'type': 'WEB', 'url': 'https://github.com/froala/wysiwyg-editor/issues/4612#issuecomment-1729818089'}, {'type': 'PACKAGE', 'url': 'https://github.com/froala/wysiwyg-editor'}, {'type': 'WEB', 'url': 'https://hacker.soarescorp.com/cve/2023-41592/'}, {'type': 'WEB', 'url': 'https://owasp.org/Top10/A03_2021-Injection/'}, {'type': 'WEB', 'url': 'https://owasp.org/www-project-top-ten/'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-15T19:02:52Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-w8vq-3hf9-xppx
|
2023-09-08T21:04:38Z
|
2023-09-07T12:58:29Z
| null |
['CVE-2023-41317']
|
Apollo Router Unnamed "Subscription" operation results in Denial-of-Service
|
### Impact
This is a Denial-of-Service (DoS) type vulnerability which causes the Router to panic and terminate when GraphQL Subscriptions are enabled. It can be triggered when **all of the following conditions are met**:
1. Running Apollo Router v1.28.0, v1.28.1 or v1.29.0 ("impacted versions"); **and**
2. The Supergraph schema provided to the Router (either via Apollo Uplink or explicitly via other configuration) **has a `subscription` type** with root-fields defined; **and**
3. The YAML configuration provided to the Router **has subscriptions enabled** (they are _disabled_ by default), either by setting `enabled: true` _or_ by setting a valid `mode` within the `subscriptions` object (as seen in [subscriptions' documentation](https://www.apollographql.com/docs/router/executing-operations/subscription-support/#router-setup)); **and**
4. An [anonymous](https://spec.graphql.org/draft/#sec-Anonymous-Operation-Definitions) (i.e., un-named) `subscription` operation (e.g., `subscription { ... }`) is received by the Router
If **all four** of these criteria are met, the impacted versions will panic and terminate. There is no data-privacy risk or sensitive-information exposure aspect to this vulnerability.
Depending on the environment in which impacted versions are running and the high-availability characteristics of that environment, a single Router's termination may result in limited or reduced availability or other knock-on effects which are deployment-specific (e.g., depending on if there are multiple instances, auto-restart policies, etc.)
### Discovery
This vulnerability was discovered by an internal Apollo team. We have no reports or evidence to support that that has been exploited outside of our own testing, research and follow-up.
Our public security policy can be reviewed at https://github.com/apollographql/router/security/policy and we consider the security of our projects a top priority. Please review the linked policy for more details.
### Patches
This is fixed in [Apollo Router v1.29.1](https://github.com/apollographql/router/releases/tag/v1.29.1), which is available on:
- [GitHub Releases](https://github.com/apollographql/router/releases) as `v1.29.1`
- [GitHub Packages Container Registry](https://github.com/apollographql/router/pkgs/container/router) as `v1.29.1`
- [Helm Chart Repository](https://github.com/apollographql/router/pkgs/container/helm-charts%2Frouter) as `1.29.1` (without the `v`)
We recommend all users running the impacted configuration above to update to a patched version of the Router immediately. Router v1.29.1 should be a very simple upgrade from any impacted version.
### Workarounds
Updating to v1.29.1 should be a clear and simple upgrade path for those running impacted versions. However, if Subscriptions are **not** necessary for your Graph – but are enabled via configuration — then disabling subscriptions is another option to mitigate the risk.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the `router` repository](https://github.com/apollographql/router)
* Email us at `security` `[at]` `apollographql` `[dot]` `com`
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'apollo-router'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.28.0'}, {'fixed': '1.29.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.29.0'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/apollographql/router/security/advisories/GHSA-w8vq-3hf9-xppx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-41317'}, {'type': 'WEB', 'url': 'https://github.com/apollographql/router/commit/b295c103dd86c57c848397d32e8094edfa8502aa'}, {'type': 'PACKAGE', 'url': 'https://github.com/apollographql/router'}, {'type': 'WEB', 'url': 'https://github.com/apollographql/router/releases/tag/v1.29.1'}]
|
{'cwe_ids': ['CWE-755'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-07T12:58:29Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-4fg9-5w46-xmrj
|
2023-09-08T12:18:25Z
|
2023-09-06T15:30:26Z
| null |
['CVE-2023-36388']
|
Apache Superset Server Side Request Forgery vulnerability
|
Improper REST API permission in Apache Superset up to and including 2.1.0 allows for an authenticated Gamma users to test network connections, possible SSRF.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36388'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/superset'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/ccmjjz4jp17yc2kcd18qshmdtf7qorfs'}]
|
{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-08T12:18:25Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-v9q5-9crp-92f9
|
2023-09-25T21:41:49Z
|
2023-09-22T00:30:29Z
| null |
['CVE-2023-31717']
|
FUXA SQL Injection vulnerability
|
A SQL Injection attack in FUXA <= 1.1.12 allows exfiltration of confidential information from the database.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'fuxa-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.12'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31717'}, {'type': 'WEB', 'url': 'https://github.com/MateusTesser/CVE-2023-31717'}, {'type': 'PACKAGE', 'url': 'https://github.com/frangoteam/FUXA'}, {'type': 'WEB', 'url': 'https://youtu.be/IBMXTEI_5wY'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-22T20:00:27Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-5crw-6j7v-xc72
|
2023-09-08T13:18:23Z
|
2023-09-08T13:18:23Z
| null |
['CVE-2023-41318']
|
matrix-media-repo: Unsafe media served inline on download endpoints
|
### Impact
A malicious user can upload an SVG image containing JavaScript to their server. When matrix-media-repo is asked to serve that media via the `/_matrix/media/(r0|v3)/download` endpoint, it would be served with a `Content-Disposition` of `inline`. This can allow JavaScript to run in the browser if a client links to the `/download` endpoint directly.
Server operators which do not share a domain between matrix-media-repo and other services are not affected, but are encouraged to upgrade regardless.
### Patches
https://github.com/turt2live/matrix-media-repo/commit/77ec2354e8f46d5ef149d1dcaf25f51c04149137 and https://github.com/turt2live/matrix-media-repo/commit/bf8abdd7a5371118e280c65a8e0ec2b2e9bdaf59 fix the issue. Operators should upgrade to v1.3.0 as soon as possible.
### Workarounds
The `Content-Disposition` header can be overridden by the reverse proxy in front of matrix-media-repo to always use `attachment`, defeating this issue at the cost of "worse" user experience when clicking download links.
### References
https://developer.mozilla.org/en-US/docs/Web/SVG/Element/script
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/turt2live/matrix-media-repo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/turt2live/matrix-media-repo/security/advisories/GHSA-5crw-6j7v-xc72'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-41318'}, {'type': 'WEB', 'url': 'https://github.com/turt2live/matrix-media-repo/commit/77ec2354e8f46d5ef149d1dcaf25f51c04149137'}, {'type': 'WEB', 'url': 'https://github.com/turt2live/matrix-media-repo/commit/bf8abdd7a5371118e280c65a8e0ec2b2e9bdaf59'}, {'type': 'WEB', 'url': 'https://developer.mozilla.org/en-US/docs/Web/SVG/Element/script'}, {'type': 'PACKAGE', 'url': 'https://github.com/turt2live/matrix-media-repo'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-08T13:18:23Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-55q6-r3hm-7ff4
|
2023-09-21T21:37:30Z
|
2023-09-20T18:30:21Z
| null |
['CVE-2023-43501']
|
Jenkins Build Failure Analyzer Plugin missing permission check
|
Jenkins Build Failure Analyzer Plugin 2.4.1 and earlier does not perform a permission check in a connection test HTTP endpoint.
This allows attackers with Overall/Read permission to connect to an attacker-specified hostname and port using attacker-specified username and password.
Additionally, this HTTP endpoint does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
Build Failure Analyzer Plugin 2.4.2 requires POST requests and Overall/Administer permission for the affected HTTP endpoint.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.sonyericsson.jenkins.plugins.bfa:build-failure-analyzer'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-43501'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3226'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/09/20/5'}]
|
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-21T21:37:30Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-v4j2-cwmm-xg89
|
2023-09-27T20:16:23Z
|
2023-09-27T15:30:34Z
| null |
['CVE-2023-2315']
|
OpenCart Path Traversal vulnerability
|
Path Traversal in OpenCart versions 4.0.0.0 to 4.0.2.2 allows an authenticated user with access/modify privilege on the Log component to empty out arbitrary files on the server
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'opencart/opencart'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0.0'}, {'fixed': '4.0.2.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2315'}, {'type': 'WEB', 'url': 'https://github.com/opencart/opencart/commit/0a8dd91e385f70e42795380009fd644224c1bc97'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencart/opencart'}, {'type': 'WEB', 'url': 'https://github.com/opencart/opencart/releases/tag/4.0.2.3'}, {'type': 'WEB', 'url': 'https://starlabs.sg/advisories/23/23-2315/'}]
|
{'cwe_ids': ['CWE-20', 'CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-27T20:16:23Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-pmxq-pj47-j8j4
|
2023-09-08T12:19:49Z
|
2023-09-08T12:19:49Z
| null |
['CVE-2023-41329']
|
Domain restrictions bypass via DNS Rebinding in WireMock and WireMock Studio webhooks, proxy and recorder modes
|
### Impact
The proxy mode of WireMock, can be protected by the network restrictions configuration, as documented in [Preventing proxying to and recording from specific target addresses](https://wiremock.org/docs/configuration/#preventing-proxying-to-and-recording-from-specific-target-addresses). These restrictions can be configured using the domain names, and in such a case the configuration is vulnerable to the DNS rebinding attacks. A similar patch was applied in WireMock 3.0.0-beta-15 for the WireMock Webhook Extensions.
The root cause of the attack is a defect in the logic which allows for a race condition triggered by a DNS server whose address expires in between the initial validation and the outbound network request that might go to a domain that was supposed to be prohibited. Control over a DNS service is required to exploit this attack, so it has high execution complexity and limited impact.
### Affected versions
- WireMock 3,x until 3.0.3 (security patch), on default settings in environments with access to the network
- WireMock 2.x until 2.35.1 (security patch), on default settings in environments with access to the network
- Python WireMock until 2.6.1
- WireMock Studio - all versions, this proprietary product was discontinued in 2022
### Patches
- WireMock 3.0.3 + the 3.0.3-1 Docker image
- WireMock 2.35.1 + the 2.35.1-1 Docker image - backport to WireMock 2.x
- Python WireMock 2.6.1
### Workarounds
For WireMock:
- Option 1: Configure WireMock to use IP addresses instead of the domain names in the outbound URLs subject to DNS rebinding
- Option 2: Use external firewall rules to define the list of permitted destinations
For WireMock Studio: N/A. Switch to another distribution, there will be no fix provided. The vendor of former WireMock Studio recommends migration to [WireMock Cloud](https://www.wiremock.io/product)
### References
- CVE-2023-41327 - Related issue in the WireMock Webhooks Extension
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.wiremock:wiremock-standalone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.wiremock:wiremock'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.github.tomakehurst:wiremock-jre8'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.35.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.github.tomakehurst:wiremock-jre8-standalone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.35.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'wiremock'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/wiremock/wiremock/security/advisories/GHSA-pmxq-pj47-j8j4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-41329'}, {'type': 'PACKAGE', 'url': 'https://github.com/wiremock/wiremock'}, {'type': 'WEB', 'url': 'https://wiremock.org/docs/configuration/#preventing-proxying-to-and-recording-from-specific-target-addresses'}]
|
{'cwe_ids': ['CWE-290', 'CWE-350'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-09-08T12:19:49Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-p6p2-qq95-vq5h
|
2023-09-07T12:59:34Z
|
2023-09-07T12:59:34Z
| null |
['CVE-2023-41319']
|
Remote Code Execution in Custom Integration Upload
|
### Impact
The Fides webserver API allows custom integrations to be uploaded as a ZIP file. This ZIP file must contain YAML files, but Fides can be configured to also accept the inclusion of custom Python code in it. The custom code is executed in a restricted, sandboxed environment, but the sandbox can be bypassed to execute any arbitrary code.
The vulnerability allows the execution of arbitrary code on the target system within the context of the webserver python process owner on the webserver container, which by default is `root`, and leverage that access to attack underlying infrastructure and integrated systems.
This vulnerability affects Fides versions `2.11.0` through `2.18.0`.
Exploitation is limited to API clients with the `CONNECTOR_TEMPLATE_REGISTER` authorization scope. In the Fides Admin UI this scope is restricted to highly privileged users, specifically root users and users with the owner role.
Exploitation is only possible if the security configuration parameter `allow_custom_connector_functions` is enabled by the user deploying the Fides webserver container, either in `fides.toml` or by setting the env var `FIDES__SECURITY__ALLOW_CUSTOM_CONNECTOR_FUNCTIONS=True`. By default this configuration parameter is disabled.
### Patches
The vulnerability has been patched in Fides version `2.19.0`. Users are advised to upgrade to this version or later to secure their systems against this threat.
### Workarounds
Ensure that `allow_custom_connector_functions` in `fides.toml` and the `FIDES__SECURITY__ALLOW_CUSTOM_CONNECTOR_FUNCTIONS` are both either unset or explicit set to `False`.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'ethyca-fides'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.11.0'}, {'fixed': '2.19.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/ethyca/fides/security/advisories/GHSA-p6p2-qq95-vq5h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-41319'}, {'type': 'WEB', 'url': 'https://github.com/ethyca/fides/commit/5989b5fa744c8d8c340963b895a054883549358a'}, {'type': 'PACKAGE', 'url': 'https://github.com/ethyca/fides'}]
|
{'cwe_ids': ['CWE-693'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-07T12:59:34Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-6qjf-7g3j-qx25
|
2023-09-22T20:40:11Z
|
2023-09-19T00:30:13Z
| null |
['CVE-2023-37611']
|
Neos CMS Cross Site Scripting vulnerability
|
Cross Site Scripting (XSS) vulnerability in Neos CMS 8.3.3 allows a remote authenticated attacker to execute arbitrary code via a crafted SVG file uploaded to the `neos/management/media` component. To make use of this attack vector, the attacker must either be able to upload a maliciously crafted file or coerce someone with the needed access to upload said file to Neos. Even if such a file is uploaded and subsequently delivered, it is possible to use CSP to protect against attacks being executed from such a file.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'neos/neos-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '8.3.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37611'}, {'type': 'WEB', 'url': 'https://cheatsheetseries.owasp.org/cheatsheets/Content_Security_Policy_Cheat_Sheet.html'}, {'type': 'WEB', 'url': 'https://digi.ninja/blog/svg_xss.php'}, {'type': 'PACKAGE', 'url': 'https://github.com/neos/neos-ui'}, {'type': 'WEB', 'url': 'https://github.com/neos/neos-ui/releases/tag/8.3.4'}, {'type': 'WEB', 'url': 'https://rodelllemit.medium.com/stored-xss-in-neo-cms-8-3-3-9bd1cb973c5b'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-21T17:09:45Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-pq98-6hf6-3rj3
|
2023-09-28T16:49:14Z
|
2023-09-28T06:30:20Z
| null |
['CVE-2023-38874']
|
Economizzer remote code execution vulnerability
|
A remote code execution (RCE) vulnerability via an insecure file upload exists in gugoan's Economizzer v.0.9-beta1 and commit 3730880 (April 2023). A malicious attacker can upload a PHP web shell as an attachment when adding a new cash book entry. Afterwards, the attacker may visit the web shell and execute arbitrary commands.
|
[]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'gugoan/economizzer'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9-beta1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38874'}, {'type': 'WEB', 'url': 'https://github.com/gugoan/economizzer/commit/37308802dfe00d43df396a8afaa2096ece8b7b57'}, {'type': 'WEB', 'url': 'https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38874'}, {'type': 'PACKAGE', 'url': 'https://github.com/gugoan/economizzer'}, {'type': 'WEB', 'url': 'https://www.economizzer.org'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-28T16:49:14Z', 'nvd_published_at': None}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.