schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
20
140
details
stringlengths
56
37.2k
severity
stringlengths
2
92
affected
stringlengths
88
7.07k
references
stringlengths
139
4.72k
database_specific
stringlengths
131
185
1.4.0
GHSA-4rmj-w58m-fvch
2023-03-13T15:36:03Z
2023-03-06T21:30:18Z
null
['CVE-2021-36396']
Moodle vulnerable to Server-Side Request Forgery
In Moodle, insufficient redirect handling made it possible to blindly bypass cURL blocked hosts/allowed ports restrictions, resulting in a blind SSRF risk.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11.0-beta'}, {'fixed': '3.11.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10.0-beta'}, {'fixed': '3.10.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36396'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=424802'}]
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-07T20:56:50Z', 'nvd_published_at': '2023-03-06T21:15:00Z'}
1.4.0
GHSA-cxx3-36qc-m6qm
2023-03-15T19:16:23Z
2023-03-09T06:30:21Z
null
['CVE-2023-26110']
node-bluetooth is vulnerable to Buffer Overflow via the findSerialPortChannel method due to improper user input length validation
All versions of the package node-bluetooth are vulnerable to Buffer Overflow via the findSerialPortChannel method due to improper user input length validation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'node-bluetooth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26110'}, {'type': 'PACKAGE', 'url': 'https://github.com/song940/node-bluetooth'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-NODEBLUETOOTH-3311821'}]
{'cwe_ids': ['CWE-120'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-09T20:16:24Z', 'nvd_published_at': '2023-03-09T05:15:00Z'}
1.4.0
GHSA-j9cw-5cpj-9qj5
2023-03-13T22:06:44Z
2023-03-07T00:30:25Z
null
['CVE-2021-36403']
Moodle has a Hidden Functionality vulnerability
In Moodle, in some circumstances, email notifications of messages could have the link back to the original message hidden by HTML, which may pose a phishing risk.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11.0-beta'}, {'fixed': '3.11.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10.0-beta'}, {'fixed': '3.10.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36403'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=424809'}]
{'cwe_ids': ['CWE-912'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-08T00:16:56Z', 'nvd_published_at': '2023-03-06T23:15:00Z'}
1.4.0
GHSA-jx2x-fg9p-7gc7
2023-03-15T19:16:39Z
2023-03-10T15:30:43Z
null
['CVE-2023-24774']
Funadmin vulnerable to SQL injection
Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the selectFields parameter at \controller\auth\Auth.php.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'funadmin/funadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24774'}, {'type': 'WEB', 'url': 'https://github.com/funadmin/funadmin/issues/12'}, {'type': 'PACKAGE', 'url': 'https://github.com/funadmin/funadmin'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-10T23:48:48Z', 'nvd_published_at': '2023-03-10T13:15:00Z'}
1.4.0
GHSA-6c32-3x46-m9rh
2023-03-13T15:35:03Z
2023-03-07T09:30:29Z
null
['CVE-2023-1245']
Answer vulnerable to Cross-site Scripting
Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1245'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/71a4cdac81112975969129d308899edd155c0e80'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/f8011bb3-8212-4937-aa58-79f4b73be004'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-08T00:28:25Z', 'nvd_published_at': '2023-03-07T08:15:00Z'}
1.4.0
GHSA-f637-vh3r-vfh2
2023-03-27T22:01:33Z
2023-03-24T21:57:18Z
null
['CVE-2023-25666']
TensorFlow has Floating Point Exception in AudioSpectrogram
### Impact version:2.11.0 //core/ops/audio_ops.cc:70 Status SpectrogramShapeFn(InferenceContext* c) { ShapeHandle input; TF_RETURN_IF_ERROR(c->WithRank(c->input(0), 2, &input)); int32_t window_size; TF_RETURN_IF_ERROR(c->GetAttr("window_size", &window_size)); int32_t stride; TF_RETURN_IF_ERROR(c->GetAttr("stride", &stride)); .....[1] DimensionHandle input_length = c->Dim(input, 0); DimensionHandle input_channels = c->Dim(input, 1); DimensionHandle output_length; if (!c->ValueKnown(input_length)) { output_length = c->UnknownDim(); } else { const int64_t input_length_value = c->Value(input_length); const int64_t length_minus_window = (input_length_value - window_size); int64_t output_length_value; if (length_minus_window < 0) { output_length_value = 0; } else { output_length_value = 1 + (length_minus_window / stride); .....[2] } output_length = c->MakeDim(output_length_value); } Get the value of stride at [1], and the used at [2] ```python import tensorflow as tf para = {'input': tf.constant([[14.], [24.]], dtype=tf.float32), 'window_size': 1, 'stride': 0, 'magnitude_squared': False} func = tf.raw_ops.AudioSpectrogram @tf.function(jit_compile=True) def fuzz_jit(): y = func(**para) return y fuzz_jit() ``` ### Patches We have patched the issue in GitHub commit [d0d4e779da0d0f56499c6fa5ba09f0a576cc6b14](https://github.com/tensorflow/tensorflow/commit/d0d4e779da0d0f56499c6fa5ba09f0a576cc6b14). The fix will be included in TensorFlow 2.12.0. We will also cherrypick this commit on TensorFlow 2.11.1 ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by r3pwnx
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f637-vh3r-vfh2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25666'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/d0d4e779da0d0f56499c6fa5ba09f0a576cc6b14'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]
{'cwe_ids': ['CWE-697'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-24T21:57:18Z', 'nvd_published_at': '2023-03-25T00:15:00Z'}
1.4.0
GHSA-frjg-g767-7363
2023-03-27T22:32:09Z
2023-03-23T06:30:15Z
null
['CVE-2023-26114']
code-server vulnerable to Missing Origin Validation in WebSockets
Versions of the package code-server before 4.10.1 are vulnerable to Missing Origin Validation in WebSockets handshakes. Exploiting this vulnerability can allow an adversary in specific scenarios to access data from and connect to the code-server instance.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'code-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.10.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26114'}, {'type': 'WEB', 'url': 'https://github.com/coder/code-server/commit/d477972c68fc8c8e8d610aa7287db87ba90e55c7'}, {'type': 'PACKAGE', 'url': 'https://github.com/coder/code-server'}, {'type': 'WEB', 'url': 'https://github.com/coder/code-server/releases/tag/v4.10.1'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-CODESERVER-3368148'}]
{'cwe_ids': ['CWE-1385', 'CWE-346'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-23T19:58:10Z', 'nvd_published_at': '2023-03-23T05:15:00Z'}
1.4.0
GHSA-jqv5-7xpx-qj74
2023-03-16T21:34:27Z
2023-03-13T20:00:52Z
null
['CVE-2022-43441']
sqlite vulnerable to code execution due to Object coercion
### Impact Due to the underlying implementation of `.ToString()`, it's possible to execute arbitrary JavaScript, or to achieve a denial-of-service, if a binding parameter is a crafted Object. Users of `sqlite3` v5.0.0 - v5.1.4 are affected by this. ### Patches Fixed in v5.1.5. All users are recommended to upgrade to v5.1.5 or later. ### Workarounds * Ensure there is sufficient sanitization in the parent application to protect against invalid values being supplied to binding parameters. ### References * Commit: https://github.com/TryGhost/node-sqlite3/commit/edb1934dd222ae55632e120d8f64552d5191c781 ### For more information If you have any questions or comments about this advisory: * Email us at [security@ghost.org](mailto:security@ghost.org) Credits: Dave McDaniel of Cisco Talos
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'sqlite3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.1.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/TryGhost/node-sqlite3/security/advisories/GHSA-jqv5-7xpx-qj74'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43441'}, {'type': 'WEB', 'url': 'https://github.com/TryGhost/node-sqlite3/commit/edb1934dd222ae55632e120d8f64552d5191c781'}, {'type': 'PACKAGE', 'url': 'https://github.com/TryGhost/node-sqlite3'}, {'type': 'WEB', 'url': 'https://talosintelligence.com/vulnerability_reports/TALOS-2022-1645'}]
{'cwe_ids': ['CWE-913', 'CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-13T20:00:52Z', 'nvd_published_at': '2023-03-16T21:15:00Z'}
1.4.0
GHSA-94mm-g2mv-8p7r
2023-03-30T16:59:14Z
2023-03-24T21:54:55Z
null
['CVE-2023-25672']
TensorFlow has Null Pointer Error in LookupTableImportV2
### Impact The function `tf.raw_ops.LookupTableImportV2` cannot handle scalars in the `values` parameter and gives an NPE. ```python import tensorflow as tf v = tf.Variable(1) @tf.function(jit_compile=True) def test(): func = tf.raw_ops.LookupTableImportV2 para={'table_handle': v.handle,'keys': [62.98910140991211, 94.36528015136719], 'values': -919} y = func(**para) return y print(test()) ``` ### Patches We have patched the issue in GitHub commit [980b22536abcbbe1b4a5642fc940af33d8c19b69](https://github.com/tensorflow/tensorflow/commit/980b22536abcbbe1b4a5642fc940af33d8c19b69). The fix will be included in TensorFlow 2.12. We will also cherrypick this commit on TensorFlow 2.11.1. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by r3pwnx of 360 AIVul Team
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-94mm-g2mv-8p7r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25672'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/980b22536abcbbe1b4a5642fc940af33d8c19b69'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]
{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-24T21:54:55Z', 'nvd_published_at': '2023-03-25T00:15:00Z'}
1.4.0
GHSA-4vq7-882g-wcg4
2023-03-09T21:58:49Z
2023-03-02T23:11:05Z
null
['CVE-2023-26486']
Vega Expression Language `scale` expression function Cross Site Scripting
### Summary The Vega `scale` expression function has the ability to call arbitrary functions with a single controlled argument. This can be exploited to escape the Vega expression sandbox in order to execute arbitrary JavaScript. ### Details The [scale](https://github.dev/vega/vega/blob/72b9b3bbf912212e7879b6acaccc84aff969ef1c/packages/vega-functions/src/functions/scale.js#L36-L37) expression function passes a user supplied argument `group` to [getScale](https://github.dev/vega/vega/blob/72b9b3bbf912212e7879b6acaccc84aff969ef1c/packages/vega-functions/src/scales.js#L6), which is then used as if it were an internal context. The `context.scales[name].value` is accessed from `group` and called as a function back in `scale`. ### PoC The following Vega definition can be used to demonstrate this issue executing the JavaScript code `alert(1);` ```json { "$schema": "https://vega.github.io/schema/vega/v5.json", "data": [ { "name": "XSS PoC", "values": [1], "transform": [ { "type": "formula", "as": "amount", "expr": "scale('func', null, {context: {scales: {func: {value: scale('func', 'eval(atob(\"YWxlcnQoMSk7\"))', {context: {scales: {func: {value: [].constructor.constructor}}}})}}}})" } ] } ] } ``` This can be viewed in the Vega online IDE at https://vega.github.io/editor/#/url/vega/N4IgJAzgxgFgpgWwIYgFwhgF0wBwqgegIDc4BzJAOjIEtMYBXAI0poHsDp5kTykSArJQBWENgDsQAGhAATJJhSoA2qHFIEcNCAAaAZT0ACAApsAwtJDEkAGwZwIaZQEYAujMwAnJOIgAzNk8EJ1BMAE8cLXQAoIYbFBkkR3QNNgZxTEs4AA8cT21oWzgACgByP3SoUqlDcTibGsNgKAlMHMxUJsKbB07gCvEoPus7OE7ukvLK6sNSuBHihTYmYoAdEABNAHVsmyhxAEU2AFk9AGsAdnWASmuZ5tb2von8JoGhppH7TuVXShbfF4GFBMIF-hIIECQYEAL5wmHXeEIkAw1yomFAA
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'vega-functions'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.13.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'vega'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.23.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/vega/vega/security/advisories/GHSA-4vq7-882g-wcg4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26486'}, {'type': 'PACKAGE', 'url': 'https://github.com/vega/vega'}, {'type': 'WEB', 'url': 'https://github.com/vega/vega/releases/tag/v5.23.0'}, {'type': 'WEB', 'url': 'https://github.dev/vega/vega/blob/72b9b3bbf912212e7879b6acaccc84aff969ef1c/packages/vega-functions/src/functions/scale.js#L36-L37'}, {'type': 'WEB', 'url': 'https://github.dev/vega/vega/blob/72b9b3bbf912212e7879b6acaccc84aff969ef1c/packages/vega-functions/src/scales.js#L6'}, {'type': 'WEB', 'url': 'https://vega.github.io/editor/#/url/vega/N4IgJAzgxgFgpgWwIYgFwhgF0wBwqgegIDc4BzJAOjIEtMYBXAI0poHsDp5kTykSArJQBWENgDsQAGhAATJJhSoA2qHFIEcNCAAaAZT0ACAApsAwtJDEkAGwZwIaZQEYAujMwAnJOIgAzNk8EJ1BMAE8cLXQAoIYbFBkkR3QNNgZxTEs4AA8cT21oWzgACgByP3SoUqlDcTibGsNgKAlMHMxUJsKbB07gCvEoPus7OE7ukvLK6sNSuBHihTYmYoAdEABNAHVsmyhxAEU2AFk9AGsAdnWASmuZ5tb2von8JoGhppH7TuVXShbfF4GFBMIF-hIIECQYEAL5wmHXeEIkAw1yomFAA'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-02T23:11:05Z', 'nvd_published_at': '2023-03-04T00:15:00Z'}
1.4.0
GHSA-h384-ph77-3699
2023-03-24T22:19:53Z
2023-03-21T18:30:19Z
null
['CVE-2018-25082']
weixin-python XML External Entity vulnerability
A vulnerability was found in zwczou WeChat SDK Python 0.3.0 and classified as critical. This issue affects the function validate/to_xml. The manipulation leads to xml external entity reference. The attack may be initiated remotely. Upgrading to version 0.5.5 is able to address this issue. The name of the patch is e54abadc777715b6dcb545c13214d1dea63df6c9. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-223403.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'weixin-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25082'}, {'type': 'WEB', 'url': 'https://github.com/zwczou/weixin-python/pull/30'}, {'type': 'WEB', 'url': 'https://github.com/zwczou/weixin-python/commit/e54abadc777715b6dcb545c13214d1dea63df6c9'}, {'type': 'PACKAGE', 'url': 'https://github.com/zwczou/weixin-python'}, {'type': 'WEB', 'url': 'https://github.com/zwczou/weixin-python/releases/tag/v0.5.5'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.223403'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.223403'}]
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-21T22:41:46Z', 'nvd_published_at': '2023-03-21T18:15:00Z'}
1.4.0
GHSA-23xf-5535-62v5
2023-04-07T22:09:37Z
2023-03-31T00:30:18Z
null
['CVE-2023-1741']
jeecg-boot vulnerable to SQL injection
jeecg-boot 3.5.0 is vulnerable to SQL injection from functionality of the file `SysDictMapper.java` of the component `Sleep Command Handler`. The attack can be launched remotely and the exploit has been disclosed to the public and may be used.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1741'}, {'type': 'PACKAGE', 'url': 'https://github.com/jeecgboot/jeecg-boot'}, {'type': 'WEB', 'url': 'https://github.com/private-null/report/blob/main/README.md'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.224629'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.224629'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-07T22:09:37Z', 'nvd_published_at': '2023-03-30T22:15:00Z'}
1.4.0
GHSA-6x8f-x6qw-qwx3
2023-03-15T19:17:24Z
2023-03-10T12:30:16Z
null
['CVE-2023-1313']
cockpit-hq/cockpit is vulnerable to unrestricted file uploads
Unrestricted Upload of File with Dangerous Type in GitHub repository cockpit-hq/cockpit prior to 2.4.1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'cockpit-hq/cockpit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1313'}, {'type': 'WEB', 'url': 'https://github.com/cockpit-hq/cockpit/commit/becca806c7071ecc732521bb5ad0bb9c64299592'}, {'type': 'PACKAGE', 'url': 'https://github.com/Cockpit-HQ/Cockpit'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/f73eef49-004f-4b3b-9717-90525e65ba61'}]
{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-10T21:53:57Z', 'nvd_published_at': '2023-03-10T12:15:00Z'}
1.4.0
GHSA-ff27-hrmr-ggpj
2023-03-13T15:32:43Z
2023-03-07T09:30:30Z
null
['CVE-2023-1241']
Answer vulnerable to Cross-site Scripting
Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1241'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/90bfa0dcc7b49482f1d1e31aee3ab073f3c13dd9'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/e0e9b1bb-3025-4b9f-acb4-16a5da28aa3c'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-08T17:09:59Z', 'nvd_published_at': '2023-03-07T08:15:00Z'}
1.4.0
GHSA-qq2j-9pf8-g58c
2023-03-16T21:40:51Z
2023-03-12T06:30:21Z
null
['CVE-2022-48365']
Company admin role gives excessive privileges in eZ Platform Ibexa
Users with the Company admin role (introduced by the company account feature in v4) can assign any role to any user. This also applies to any other user that has the role / assign policy. Any subtree limitation in place does not have any effect. The role / assign policy is typically only given to administrators, which limits the scope in most cases, but please verify who has this policy in your installaton. The fix ensures that subtree limitations are working as intended.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezpublish-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.5.0'}, {'fixed': '7.5.30'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezplatform-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.26'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezplatform-kernel/security/advisories/GHSA-8h83-chh2-fchp'}, {'type': 'WEB', 'url': 'https://github.com/ezsystems/ezpublish-kernel/security/advisories/GHSA-99r3-xmmq-7q7g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-48365'}, {'type': 'WEB', 'url': 'https://github.com/ezsystems/ezpublish-kernel/commit/957e67a08af2b3265753f9763943e8225ed779ab'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-009-critical-vulnerabilities-in-graphql-role-assignment-ct-editing-and-drafts-tooltips'}, {'type': 'PACKAGE', 'url': 'https://github.com/ezsystems/ezpublish-kernel'}]
{'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-13T20:57:31Z', 'nvd_published_at': '2023-03-12T05:15:00Z'}
1.4.0
GHSA-9v4v-9fj5-p982
2023-03-13T15:32:32Z
2023-03-07T09:30:30Z
null
['CVE-2023-1237']
Answer vulnerable to Cross-site Scripting
Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1237'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/0566894a2c0e13cf07d877f41467e2e21529fee8'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/cc2aa618-05da-495d-a5cd-51c40557d481'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-08T17:11:57Z', 'nvd_published_at': '2023-03-07T08:15:00Z'}
1.4.0
GHSA-v829-x6hh-cqfq
2023-03-10T23:47:53Z
2023-03-10T23:47:53Z
null
['CVE-2023-27484']
Crossplane-runtime contains Improper Input Validation via Compositions
### Summary Fuzz testing, by Ada Logics and sponsored by the CNCF, identified a [vulnerability](https://github.com/crossplane/crossplane-runtime/security/advisories/GHSA-vfvj-3m3g-m532) in the `fieldpath` package from `crossplane/crossplane-runtime` that an already highly privileged Crossplane user able to create or update Compositions could leverage to cause an out of memory panic in Crossplane. ### Details Compositions allow users to specify patches inserting elements into arrays at an arbitrary index. When a Composition is selected for a Composite Resource, patches are evaluated and if a specified index is greater than the current size of the target slice, that slice's size will be increased to the specified index, which could lead to an excessive amount of memory usage and therefore the Pod being OOM-Killed. The index is already capped to the maximum value for a uint32 (4294967295) when parsed, but that is still an unnecessarily large value. ### Workaround Users can restrict write privileges on Compositions to only admin users as a workaround.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/crossplane/crossplane'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.2'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/crossplane/crossplane'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.10.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/crossplane/crossplane'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/crossplane/crossplane/security/advisories/GHSA-v829-x6hh-cqfq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27484'}, {'type': 'PACKAGE', 'url': 'https://github.com/crossplane/crossplane'}]
{'cwe_ids': ['CWE-20', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-10T23:47:53Z', 'nvd_published_at': '2023-03-09T21:15:00Z'}
1.4.0
GHSA-5x5q-8cgm-2hjq
2023-03-31T22:44:09Z
2023-03-31T22:44:09Z
null
[]
Karate has vulnerable dependency on json-smart package (CVE-2023-1370)
### Summary Karate has vulnerable dependency on the package [net.minidev:json-smart](https://github.com/netplex/json-smart-v1). More information is available at https://github.com/oswaldobapvicjr/jsonmerge/security/advisories/GHSA-493p-pfq6-5258. ![image](https://user-images.githubusercontent.com/2663049/229081854-1155c041-56fa-48ca-a7ff-f2f085b845fd.png) ### How to fix it Very simple, just upgrade json-path package to 2.8.0 (from 2.7.0) inside karate-core pom.xml ;)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.intuit.karate:karate-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.1'}, {'fixed': '1.4.0'}]}], 'versions': ['1.3.1']}]
[{'type': 'WEB', 'url': 'https://github.com/karatelabs/karate/security/advisories/GHSA-5x5q-8cgm-2hjq'}, {'type': 'WEB', 'url': 'https://github.com/oswaldobapvicjr/jsonmerge/security/advisories/GHSA-493p-pfq6-5258'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1370'}, {'type': 'PACKAGE', 'url': 'https://github.com/karatelabs/karate'}]
{'cwe_ids': ['CWE-674'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-31T22:44:09Z', 'nvd_published_at': None}
1.4.0
GHSA-3wq5-3f56-v5xc
2023-04-07T21:02:25Z
2023-03-31T12:30:16Z
null
['CVE-2023-1777']
Mattermost vulnerable to information disclosure
Mattermost allows an attacker to request a preview of an existing message when creating a new message via the createPost API call, disclosing the contents of the linked message.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.3.0'}, {'fixed': '7.1.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.7.2'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.8.0'}, {'fixed': '7.8.1'}]}], 'versions': ['7.8.0']}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.7.0'}, {'fixed': '7.7.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.7.1'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.1.0'}, {'fixed': '7.1.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.1.5'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1777'}, {'type': 'WEB', 'url': 'https://mattermost.com/security-updates/'}, {'type': 'PACKAGE', 'url': 'github.com/mattermost/mattermost-server'}]
{'cwe_ids': ['CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-07T21:02:25Z', 'nvd_published_at': '2023-03-31T12:15:00Z'}
1.4.0
GHSA-fx2v-qfhr-4chv
2023-03-07T20:37:09Z
2023-03-07T20:37:09Z
null
['CVE-2023-27475']
Goutil vulnerable to path traversal when unzipping files
### Impact ZipSlip issue when use fsutil package to unzip files. When users use fsutil.Unzip to unzip zip files from a malicious attacker, they may be vulnerable to path traversal. ### Patches It has been fixed in v0.6.0, Please upgrade version to v0.6.0 or above. ### Workarounds No, users have to upgrade version.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/gookit/goutil'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/gookit/goutil/security/advisories/GHSA-fx2v-qfhr-4chv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27475'}, {'type': 'WEB', 'url': 'https://github.com/gookit/goutil/commit/d7b94fede71f018f129f7d21feb58c895d28dadc'}, {'type': 'PACKAGE', 'url': 'https://github.com/gookit/goutil'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1611'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230427-0003/'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-07T20:37:09Z', 'nvd_published_at': '2023-03-07T18:15:00Z'}
1.4.0
GHSA-gmph-wf7j-9gcm
2023-04-11T21:32:54Z
2023-04-04T15:30:27Z
null
['CVE-2021-28235']
Etcd-io Improper Authentication vulnerability
Authentication vulnerability found in Etcd-io v.3.4.10 allows remote attackers to escalate privileges via the debug function. This has been fixed in v.[3.5.8](https://github.com/etcd-io/etcd/blob/main/CHANGELOG/CHANGELOG-3.5.md#etcd-server) and was also backported to [3.4](https://github.com/etcd-io/etcd/pull/15655) and [3.5](https://github.com/etcd-io/etcd/pull/15653).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'go.etcd.io/etcd/v3'}, 'versions': ['3.4.10']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28235'}, {'type': 'WEB', 'url': 'https://github.com/etcd-io/etcd/pull/15648'}, {'type': 'PACKAGE', 'url': 'https://github.com/etcd-io/etcd'}, {'type': 'WEB', 'url': 'https://github.com/lucyxss/etcd-3.4.10-test/blob/master/temp4cj.png'}, {'type': 'WEB', 'url': 'https://github.com/lucyxss/etcd-3.4.10-test/blob/master/temp4cj_2.png'}, {'type': 'WEB', 'url': 'http://etcd.com'}]
{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-11T21:32:54Z', 'nvd_published_at': '2023-04-04T15:15:00Z'}
1.4.0
GHSA-cqf3-vpx7-rxhw
2023-04-20T21:28:48Z
2023-04-20T21:28:48Z
null
['CVE-2023-30614']
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in Pay
### Impact A payments info page of Pay is susceptible to reflected Cross-site scripting. An attacker could create a working URL that renders a javascript link to a user on a Rails application that integrates Pay. This URL could be distributed via email to specifically target certain individuals. If the targeted application contains a functionality to submit user-generated content (such as comments) the attacker could even distribute the URL using that functionality. ### Patches This has been patched in version 6.3.2 and above. Pay will now sanitize the `back` parameter and only permit relative paths.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'pay'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pay-rails/pay/security/advisories/GHSA-cqf3-vpx7-rxhw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30614'}, {'type': 'WEB', 'url': 'https://github.com/pay-rails/pay/commit/5d6283a24062bd272a524ec48415f536a67ad57f'}, {'type': 'WEB', 'url': 'https://github.com/pay-rails/pay/commit/c067771d8c7514acde4b948b474caf054bb0e25d'}, {'type': 'PACKAGE', 'url': 'https://github.com/pay-rails/pay'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/pay/CVE-2023-30614.yml'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-20T21:28:48Z', 'nvd_published_at': None}
1.4.0
GHSA-fp2w-g92g-fgq4
2023-04-21T20:26:07Z
2023-04-18T03:30:42Z
null
['CVE-2023-2138']
@nuxtlabs/github-module made Use of Hard-coded Credentials
https://nuxt.com had a hardcoded GitHub token in the source code of the page. This token had access to multiple repositories under `nuxt`, `nuxtlabs` and `nuxt-themes` GitHub organizations. A patch in version 1.6.2 fixed the issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': '@nuxtlabs/github-module'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2138'}, {'type': 'WEB', 'url': 'https://github.com/nuxtlabs/github-module/commit/5490c43f729eee60f07920bf88c0aabdc1398b6e'}, {'type': 'PACKAGE', 'url': 'https://github.com/nuxtlabs/github-module'}, {'type': 'WEB', 'url': 'https://github.com/nuxtlabs/github-module/releases/tag/v1.6.2'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/65096ef9-eafc-49da-b49a-5b88c0203ca6'}]
{'cwe_ids': ['CWE-798'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-21T20:26:07Z', 'nvd_published_at': None}
1.4.0
GHSA-f4g6-c47x-qhww
2023-04-21T18:50:18Z
2023-04-13T03:30:16Z
null
['CVE-2023-2014']
Microweber vulnerable to cross-site scripting (XSS)
microweber/microweber prior to 1.3.3 is vulnerable to cross-site scripting (XSS) in the template selection while changing a group template.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2014'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/1a9b904722b35b00653c6ae72dca2969149159b3'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a77bf7ed-6b61-452e-b5ee-e20017e28d1a'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-14T16:13:33Z', 'nvd_published_at': '2023-04-13T02:15:00Z'}
1.4.0
GHSA-6fvf-x8c6-2f6j
2023-05-04T21:40:13Z
2023-04-27T23:09:21Z
null
['CVE-2023-2339']
Cross-site Scripting (XSS) in DataObject Any Getter grid operator
### Impact Stored cross site scripting vulnerability in operator any getter in dataobject grid configuration. ### Patches Update to version 10.5.21 or apply this patch manually https://github.com/pimcore/pimcore/commit/6946f8a5a0a93b516c49f17a5b45044eebd73480.patch ### Workarounds Apply patch https://github.com/pimcore/pimcore/commit/6946f8a5a0a93b516c49f17a5b45044eebd73480.patch manually. ### References https://huntr.dev/bounties/bb1537a5-fe7b-4c77-a582-10a82435fbc2/
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.21'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-6fvf-x8c6-2f6j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2339'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/6946f8a5a0a93b516c49f17a5b45044eebd73480'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/bb1537a5-fe7b-4c77-a582-10a82435fbc2'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-27T23:09:21Z', 'nvd_published_at': None}
1.4.0
GHSA-q2fc-9ww2-ggfj
2023-04-12T22:19:21Z
2023-04-12T18:30:37Z
null
['CVE-2023-30519']
Jenkins Quay.io trigger Plugin webhook endpoint can be accessed without authentication
Jenkins Quay.io trigger Plugin provides a webhook endpoint at `/quayio-webhook/` that can be used to trigger builds of jobs configured to use a specified repository. In Quay.io trigger Plugin 0.1 and earlier, this endpoint can be accessed without authentication. This allows unauthenticated attackers to trigger builds of jobs corresponding to the attacker-specified repository.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:quayio-trigger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30519'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-04-12/#SECURITY-2849'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/04/13/3'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-12T22:19:21Z', 'nvd_published_at': '2023-04-12T18:15:00Z'}
1.4.0
GHSA-mhmp-m6g7-7c24
2023-04-26T16:00:28Z
2023-04-15T15:30:14Z
null
['CVE-2023-2106']
Weak Password Requirements in calibreweb
Weak Password Requirements in GitHub repository janeczku/calibre-web prior to 0.6.20.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'calibreweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.20'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2106'}, {'type': 'WEB', 'url': 'https://github.com/janeczku/calibre-web/commit/49e4f540c9b204c7e39b3c27ceadecd83ed60e7e'}, {'type': 'PACKAGE', 'url': 'https://github.com/janeczku/calibre-web'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c3d5c647-7557-40a9-aee4-24dc14882781'}]
{'cwe_ids': ['CWE-521'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-26T16:00:28Z', 'nvd_published_at': '2023-04-15T14:15:00Z'}
1.4.0
GHSA-hx8p-9m48-g76r
2023-04-07T22:33:31Z
2023-04-04T15:30:27Z
null
['CVE-2020-20913']
Ming-Soft MCMS vulnerable to SQL injection
SQL Injection vulnerability found in Ming-Soft MCMS v.4.7.2 allows a remote attacker to execute arbitrary code via `basic_title` parameter. This issue is resolved in v5.1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-20913'}, {'type': 'WEB', 'url': 'https://github.com/ming-soft/MCMS/issues/27'}, {'type': 'PACKAGE', 'url': 'https://github.com/ming-soft/MCMS'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-04T21:23:19Z', 'nvd_published_at': '2023-04-04T15:15:00Z'}
1.4.0
GHSA-x764-ff8r-9hpx
2023-04-20T22:16:45Z
2023-04-20T22:16:45Z
null
['CVE-2023-29523']
XWiki Platform vulnerable to code injection in display method used in user profiles
### Impact Any user who can edit their own user profile can execute arbitrary script macros including Groovy and Python macros that allow remote code execution including unrestricted read and write access to all wiki contents. The following syntax, to be put, e.g., in the about section of the user profile, demonstrates a proof of concept: ``` {{html wiki="true"}}~{~{~/~h~t~m~l~}~}~ ~{~{~c~a~c~h~e~}~}~{~{~g~r~o~o~v~y~}~}~p~r~i~n~t~l~n~(~1~)~{~{~/~g~r~o~o~v~y~}~}~{~{~/~c~a~c~h~e~}~}~{{/html}} ``` While it would be expected that the above code is displayed just without the `~`, in fact just "1" is displayed, followed by a lot of raw HTML code. The same vulnerability can also be exploited in other contexts where the `display` method on a document is used to display a field with wiki syntax, for example in applications created using [App Within Minutes](https://extensions.xwiki.org/xwiki/bin/view/Extension/App%20Within%20Minutes%20Application). ### Patches This has been patched in XWiki 13.10.11, 14.4.8, 14.10.2 and 15.0RC1. ### Workarounds There is no workaround apart from upgrading. ### References * https://jira.xwiki.org/browse/XWIKI-20327 * https://github.com/xwiki/xwiki-platform/commit/0d547181389f7941e53291af940966413823f61c ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3-milestone-1'}, {'fixed': '13.10.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0-rc-1'}, {'fixed': '14.4.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.10.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-x764-ff8r-9hpx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29523'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/0d547181389f7941e53291af940966413823f61c'}, {'type': 'WEB', 'url': 'https://extensions.xwiki.org/xwiki/bin/view/Extension/App%20Within%20Minutes%20Application'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20327'}]
{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-20T22:16:45Z', 'nvd_published_at': None}
1.4.0
GHSA-c885-89fw-55qr
2023-04-25T21:47:35Z
2023-04-12T20:38:37Z
null
['CVE-2023-29202']
org.xwiki.platform:xwiki-platform-rendering-macro-rss Cross-site Scripting vulnerability
### Impact The [RSS macro](https://extensions.xwiki.org/xwiki/bin/view/Extension/RSS%20Macro) that is bundled in XWiki included the content of the feed items without any cleaning in the HTML output when the parameter `content` was set to `true`. This allowed arbitrary HTML and in particular also JavaScript injection and thus cross-site scripting (XSS) by specifying an RSS feed with malicious content. With the interaction of a user with programming rights, this could be used to execute arbitrary actions in the wiki, including privilege escalation, remote code execution, information disclosure, modifying or deleting content and sabotaging the wiki. The issue can be reproduced by inserting the following XWiki syntax in any wiki page like the user account: ```javascript {{rss feed="https://xssrss.blogspot.com/feeds/posts/default?alt=rss" content="true" /}} ``` If an alert is displayed when viewing the page, the wiki is vulnerable. ### Patches The issue has been patched in XWiki 14.6 RC1, the content of the feed is now properly cleaned before being displayed. ### Workarounds If the RSS macro isn't used in the wiki, the macro can be uninstalled by deleting `WEB-INF/lib/xwiki-platform-rendering-macro-rss-XX.jar`, where `XX` is XWiki's version, in the web application's directory. ### References * https://github.com/xwiki/xwiki-platform/commit/5c7ebe47c2897e92d8f04fe2e15027e84dc3ec03 * https://jira.xwiki.org/browse/XWIKI-19671 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-core-rendering-macro-rss'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8'}, {'last_affected': '3.0.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-rendering-macro-rss'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '14.6-rc-1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-c885-89fw-55qr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29202'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/5c7ebe47c2897e92d8f04fe2e15027e84dc3ec03'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-19671'}]
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-12T20:38:37Z', 'nvd_published_at': '2023-04-15T15:15:00Z'}
1.4.0
GHSA-4f25-2x2c-vg6v
2023-04-04T15:21:00Z
2023-04-04T15:21:00Z
null
['CVE-2023-1703']
pimcore is vulnerable to cross-site scripting in Composite indices key field
### Impact Pimcore is vulnerable to Cross site scripting vulnerability in classes module. ### Patches Update to version 10.5.20. ### Workarounds Apply the patch https://github.com/pimcore/pimcore/commit/765832f0dc5f6cfb296a82e089b701066f27bcef.patch manually.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.20'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-4f25-2x2c-vg6v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1703'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/765832f0dc5f6cfb296a82e089b701066f27bcef'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d12d105c-18fa-4d08-b591-b0e89e39eec1'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-04T15:21:00Z', 'nvd_published_at': None}
1.4.0
GHSA-c9jf-rhvg-p65r
2023-04-12T22:18:52Z
2023-04-12T18:30:36Z
null
['CVE-2023-30526']
Jenkins Report Portal Plugin missing permissions check
Jenkins Report Portal Plugin 0.5 and earlier does not perform a permission check in a method implementing form validation. This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified bearer token authentication. Additionally, this form validation method does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:reportportal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30526'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-04-12/#SECURITY-2950'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/04/13/3'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-12T22:18:52Z', 'nvd_published_at': '2023-04-12T18:15:00Z'}
1.4.0
GHSA-xgh5-gwq5-rpx8
2023-05-05T20:35:38Z
2023-04-25T09:30:29Z
null
['CVE-2023-22665']
Arbitrary javascript injection in Apache Jena
There is insufficient checking of user queries in Apache Jena versions 4.7.0 and earlier, when invoking custom scripts. It allows a remote user to execute arbitrary javascript via a SPARQL query.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jena:jena'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.8.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22665'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/jena'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/s0dmpsxcwqs57l4qfs415klkgmhdxq7s'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/07/11/11'}]
{'cwe_ids': ['CWE-917'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-25T19:47:40Z', 'nvd_published_at': None}
1.4.0
GHSA-2fch-hv74-fgw9
2023-04-26T19:42:30Z
2023-04-26T19:42:30Z
null
[]
Cross site scripting (XSS) in wwbn/avideo
Description: While making an account in demo.avideo.com I found a parameter "?success=" which did not sanitize any symbol character properly which leads to XSS attack. Impact: Since there's an Admin account on demo.avideo.com attacker can use this attack to Takeover the admin's account Step to Reproduce: 1. Click the link below [https://demo.avideo.com/user?success="><img](https://demo.avideo.com/user?success=%22%3E%3Cimg) src=x onerror=alert(document.cookie)> 2. Then XSS will be executed
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'wwbn/avideo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/WWBN/AVideo/security/advisories/GHSA-2fch-hv74-fgw9'}, {'type': 'PACKAGE', 'url': 'https://github.com/WWBN/AVideo'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-26T19:42:30Z', 'nvd_published_at': None}
1.4.0
GHSA-gh24-c683-79r2
2023-05-03T18:17:25Z
2023-04-28T21:30:19Z
2023-05-03T18:17:25Z
['CVE-2023-26812']
Duplicate Advisory: Arbitrary code execution in jfinal CMS
## Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-8qhm-ch8h-xgjr. This link is maintained to preserve external references. ## Original Description Command execution vulnerability in the ActionEnter Class ins jfinal CMS version 5.1.0 allows attackers to execute arbitrary code via a created json file to the ueditor route.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'com.jflyfox:jflyfox_jfinal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26812'}, {'type': 'WEB', 'url': 'https://github.com/jflyfox/jfinal_cms/issues/54'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-05-01T14:01:21Z', 'nvd_published_at': None}
1.4.0
GHSA-8pf3-6fgr-3g3g
2023-04-18T22:29:53Z
2023-04-18T22:29:53Z
null
['CVE-2023-30543']
`chainId` may be outdated if user changes chains as part of connection in @web3-react
### Impact `chainId` may be outdated if the user changes chains as part of the connection flow. This means that the value of `chainId` returned by `useWeb3React()` may be incorrect. In an application, this means that any data derived from `chainId` could be incorrect. For example, if a swapping application derives a wrapped token contract address from the `chainId` *and* a user has changed chains as part of their connection flow the application could cause the user to send funds to the incorrect address when wrapping. This is a common approach when using other foundational libraries like [`ethers`](https://github.com/ethers-io/ethers.js), and most users of v8 will want to upgrade past the affected versions. ### Patches Patched in https://github.com/Uniswap/web3-react/pull/749. Users of web3-react@8.0.x-beta.0 should upgrade to at least: - @web3-react/coinbase-wallet@^8.0.35-beta.0 - @web3-react/eip1193@^8.0.27-beta.0 - @web3-react/metamask@^8.0.30-beta.0 - @web3-react/walletconnect@^8.0.37-beta.0 ### Workarounds N/A ### References N/A
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': '@web3-react/coinbase-wallet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '8.0.35-beta.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@web3-react/eip1193'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '8.0.27-beta'}]}], 'database_specific': {'last_known_affected_version_range': '< 8.0.27-beta.0'}}, {'package': {'ecosystem': 'npm', 'name': '@web3-react/metamask'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '8.0.30-beta.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@web3-react/walletconnect'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '8.0.37-beta.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Uniswap/web3-react/security/advisories/GHSA-8pf3-6fgr-3g3g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30543'}, {'type': 'WEB', 'url': 'https://github.com/Uniswap/web3-react/pull/749'}, {'type': 'PACKAGE', 'url': 'https://github.com/Uniswap/web3-react'}]
{'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-18T22:29:53Z', 'nvd_published_at': None}
1.4.0
GHSA-65v8-6pvw-jwvq
2023-04-19T17:11:40Z
2023-04-11T12:30:26Z
null
['CVE-2023-1975']
Answer vulnerable to Insertion of Sensitive Information Into Sent Data
answerdev/answer is an open-source knowledge-based community software. Answer prior to 1.0.8 does not strip EXIF geolocation data from user-uploaded logos. As a result, anyone can get sensitive information like a user's device ID, geolocation, system information, system version, etc.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1975'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/ac3f2f047ee00b4edaea7530e570ab67ff87cd6a'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/829cab7a-4ed7-465c-aa96-29f4f73dbfff'}]
{'cwe_ids': ['CWE-201'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-11T21:32:32Z', 'nvd_published_at': '2023-04-11T10:15:00Z'}
1.4.0
GHSA-9mh9-44q3-v79x
2023-04-28T20:07:27Z
2023-04-20T15:30:27Z
null
['CVE-2023-29926']
PowerJob vulnerable to remote code execution
PowerJob V4.3.2 has unauthorized interface that causes remote code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'tech.powerjob:powerjob'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29926'}, {'type': 'PACKAGE', 'url': 'https://github.com/PowerJob/PowerJob'}, {'type': 'WEB', 'url': 'https://iotaa.cn/articles/63'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-20T19:07:20Z', 'nvd_published_at': None}
1.4.0
GHSA-gq63-p39p-jrjf
2023-08-14T20:34:10Z
2023-04-04T15:30:27Z
2023-08-14T20:34:10Z
['CVE-2023-26750']
Withdrawn: SQL injection in Yii 2
## Withdrawn Advisory This advisory has been withdrawn because the issue originates from a product built on Yii2, not the Yii2 Framework itself. This link is maintained to preserve external references. ## Original Description SQL injection vulnerability found in Yii Framework Yii 2 Framework before v.2.0.47 allows the a remote attacker to execute arbitrary code via the runAction function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'yiisoft/yii2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.47'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26750'}, {'type': 'WEB', 'url': 'https://github.com/yiisoft/yii2/issues/19755'}, {'type': 'WEB', 'url': 'https://github.com/yiisoft/yii2/issues/19755#issuecomment-1426155955'}, {'type': 'WEB', 'url': 'https://github.com/yiisoft/yii2/issues/19755#issuecomment-1505390813'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T17:25:59Z', 'nvd_published_at': '2023-04-04T15:15:00Z'}
1.4.0
GHSA-jgvc-jfgh-rjvv
2023-04-27T23:52:54Z
2023-04-27T23:52:54Z
null
[]
Chosen Ciphertext Attack in Jose4j
### Summary RSA1_5 in jose4j is susceptible to chosen ciphertext attacks. The attack allows to decrypt RSA1_5 or RSA_OAEP encrypted ciphertexts. It may be feasible to sign with affected keys. ### Severity Moderate - exploiting this ciphertext attack could result in the ability to decrypt RSA1_5 or RSA_OAEP encrypted ciphertexts. ### Proof of Concept A test case that can reproduce the padding oracle uses the following private key: ``` { "kty": "RSA", "alg": "RSA1_5", "use": "enc", "n": "w2A4cbwOAK4ATnwXkGWereqv9dkEcgAGHc9g-cjo1HFeilYirvfD2Un2vQxW_6g2OKRPmmo46vMZFMYv_V57174j411y-NQlZGb7iFqMQADzo60VZ7vpvAX_NuxNGxYR-N2cBgvgqDiGAoO9ouNdhuHhxipTjGVfrPUpxmJtNPZpxsgxQWSpYCYMl304DD_5wWrnumNNIKOaVsAYmjFPV_wqxFCHbitPd1BG9SwXPk7wAHtXT6rYaUImS_OKaHkTO1OO0PNhd3-wJRNMCh_EGUwAghfWgFyAd20pQLZamamxgHvfL4-0hwuzndhHt0ye-gRVTtXDFEwABB--zwvlCw", "e": "AQAB", "kid": "rsa1_5", "d": "EjMvbuDeyQ9sdeM3arscqgTXuWYq9Netui8sUHh3v_qDnQ1jE7t-4gny0y-IFy67RlGAHNlSTgixSG8h309i5_kNbMuyvx08EntJaS1OLVQpXhDskoo9vscsPBiNIj3PFMjIFQQcPG9vhGJzUu4tMzhtiME-oTB8VidMae-XTryPvozTu4rgfb4U7uauvLqESLz3A5xtzPnwNwqXAIlrdxU-MT_iln08on_QIF8afWUqCbsWWjEck_QDKLVpzh8VV9kkEVWwYfCFhHBwS-fgGJJTE3gK4HwOokydMtH95Dzj47MA2pLe600l7ioyGSPltcv967NtOpxMPM5ro751KQ", "p": "-F1u3NAMWPu1TIuvIywIjh5fuiA3AVKLgS6Fw_hAi3M9c3T7E1zNJZuHgQExJEu06ZPfzye9m7taDzh-Vw4VGDED_MZedsE2jEsWa9EKeq3bZVf5j81FLCHH8BicFqrPjvoVUC35wrl9SGJzaOa7KXxD2jW22umYjJS_kcopvf0", "q": "yWHG7jHqvfqT8gfhIlxpMbeJ02FrWIkgJC-zOJ26wXC6oxPeqhqEO7ulGqZPngNDdSGgWcQ7noGEU8O4MA9V3yhl91TFZy8unox0sGe0jDMwtxm3saXtTsjTE7FBxzcR0PubfyGiS0fJqQcj8oJSWzZPkUshzZ8rF3jTLc8UWac", "dp": "Va9WWhPkzqY4TCo8x_OfF_jeqcYHdAtYWb8FIzD4g6PEZZrMLEft9rWLsDQLEiyUQ6lio4NgZOPkFDA3Vi1jla8DYyfE20-ZVBlrqNK7vMtST8pkLPpyjOEyq2CyKRfQ99DLnZfe_RElad2dV2mS1KMsfZHeffPtT0LaPJ_0erk", "dq": "M8rA1cviun9yg0HBhgvMRiwU91dLu1Zw_L2D02DFgjCS35QhpQ_yyEYHPWZefZ4LQFmoms2cI7TdqolgmoOnKyCBsO2NY29AByjKbgAN8CzOL5kepEKvWJ7PonXpG-ou29eJ81VcHw5Ub_NVLG6V7b13E0AGbpKsC3pYnaRvcGs", "qi": "8zIqISvddJYC93hP0sKkdHuVd-Mes_gsbi8xqSFYGqc-wSU12KjzHnZmBuJl_VTGy9CO9W4K2gejr588a3Ozf9U5hx9qCVkV0_ttxHcTRem5sFPe9z-HkQE5IMW3SdmL1sEcvkzD7z8QhcHRpp5aMptfuwnxBPY8U449_iNgXd4" }, ``` jose4j has distinguishable behvaior for the following test cases: The first ciphertext below contains an invalid PKCS #1 padding. Because of hte invalid padding a random AES key is generated during decryption. This leads to an authentication error. ``` "eyJhbGciOiJSU0ExXzUiLCJlbmMiOiJBMTI4R0NNIn0.ksmeZ6dBbP0UfDEaLXlqPl2XDaAA29kGlKtDb89x-4xN5-A6bx2umI_ToHK2GadzxUOgKROCACYb6rmKsqsQCOZaBsnq_4mDII1W0pja7Lz4zTnr7R3O4kALg4zXqG-gSlcDA7k1NgkpMDS15PjMmADqyqxbxQsXdfjstN324iqdvYGh6NsckkfTSWxDVAqiSR9fW8PsIbo3uSMokNaC-f64CDWIB9AsCxhF-3mnFbxXNxw7JE0upOgG4enQ8kZkwi_v54HBqAau1YNW7gPhFV8ElTQ71J6aHB3dja23lbWdaJmrK6PJE7gEeZmUbFkSYmuyzRUS-NGfXA23fYv5JQ.46AsIpPgnJCLH0Xm.u2rG.LyEHEGCWM8CXDEEHiaqhiQ" ``` The second ciphertext below ontains valid PKCS #1 padding, but the size of the encoded key is incorrect. Because of this, trying to dcrypt the symmetric part of the ciphertext immediately fails with org.jose4j.lang.JoseException: Invalid key for AES/GCM/NoPadding. ``` "eyJhbGciOiJSU0ExXzUiLCJlbmMiOiJBMTI4R0NNIn0.oyVTmkyoChxFtyCtiKhv8OpBJcV6C6s_gMFSSRJBNStpdHPzq2YmroTfXGj1J1plFG4BBQwIZtdt6rIS6YkCvTLGqP1hds9CAO1a_bgRyoAVuOVvH2vmz5U2r74_SRbAzD35M7yZ_tSnnEdMFlHMFbf5uNwmgArrtPgh0V5OLn5i4XIc154FLTiQlvAEhUxiPuYBkm_1GBiYEH4JjP2RKXAUx_TxAVwPsOfIPAVrO0Ev_nvdtVLCE-uOn8WQbxh4wwOztaXOV1HIaPrl7HN-YtDOA840QUHm97ZZLAPRgLzGlkMI0ZS8QkYdb9_FT3KMbNu60nBKEniv2uhBdIhM9g.46AsIpPgnJCLH0Xm.u2rG.LyEHEGCWM8CXDEEHiaqhiQ" ``` A correct implementation would not have distinguishable behavior. A test case for the missing algorithm checks uses the key: ``` { "alg": "RSA-OAEP", "use": "enc", "n": "kqGboBfAWttWPCA-0cGRgsY6SaYoIARt0B_PkaEcIq9HPYNdu9n6UuWHuuTHrjF_ZoQW97r5HaAorNvrMEGTGdxCHZdEtkHvNVVmrtxTBLiQCbCozXhFoIrVcr3qUBrdGnNn_M3jJi7Wg7p_-x62nS5gNG875oyheRkutHsQXikFZwsN3q_TsPNOVlCiHy8mxzaFTUQGm-X8UYexFyAivlDSjgDJLAZSWfxd7k9Gxuwa3AUfQqQcVcegmgKGCaErQ3qQbh1x7WB6iopE3_-GZ8HMAVtR9AmrVscqYsnjhaCehfAI0iKKs8zXr8tISc0ORbaalrkk03H1ZrsEnDKEWQ", "e": "AQAB", "d": "YsfIRYN6rDqSz5KRf1E9q7HK1o6-_UK-j7S-asb0Y1FdVs1GuiRQhMPoOjmhY3Io93EI3_7vj8uzWzAUMsAaTxOY3sJnIbktYuqTcD0xGD8VmdGPBkx963db8B6M2UYfqZARf7dbzP9EuB1N1miMcTsqyGgfHGOk7CXQ1vkIv8Uww38KMtEdJ3iB8r-f3qcu-UJjE7Egw9CxKOMjArOXxZEr4VnoIXrImrcTxBfjdY8GbzXGATiPQLur5GT99ZDW78falsir-b5Ean6HNyOeuaJuceT-yjgCXn57Rd3oIHD94CrjNtjBusoLdjbr489L8K9ksCh1gynzLGkeeWgVGQ", "p": "0xalbl1PJbSBGD4XOjIYJLwMYyHMiM06SBauMGzBfCask5DN5jH68Kw1yPS4wkLpx4ltGLuy0X5mMaZzrSOkBGb27-NizBgB2-L279XotznWeh2jbF05Kqzkoz3VaX_7dRhCHEhOopMQh619hA1bwaJyW1k8aNlLPTl3BotkP4M", "q": "sdQsQVz3tI7hmisAgiIjppOssEnZaZO0ONeRRDxBHGLe3BCo1FJoMMQryOAlglayjQnnWjQ-BpwUpa0r9YQhVLweoNEIig6Beph7iYRZgOHEiiTTgUIGgXAL6xhsby1PueUfT0xsN1Y7qt5f5EwOfu7tnFqNyJXIp9W1NQgU6fM", "dp": "kEpEnuJNfdqa-_VFb1RayJF6bjDmXQTcN_a47wUIZVMSWHR9KkMz41v0D_-oY7HVl73Kw0NagnVCaeH75HgeX5v6ZBQsrpIigynr3hl8T_LLNwIXebVnpFI2n5de0BTZ0DraxfZvOhYJEJV43NE8zWm7fdHLx2fxVFJ5mBGkXv0", "dq": "U_xJCnXF51iz5AP7MXq-K6YDIR8_t0UzEMV-riNm_OkVKAoWMnDZFG8R3sU98djQaxwKT-fsg2KjvbuTz1igBUzzijAvQESpkiUB82i2fNAj6rqJybpNKESq3FWkoL1dsgYsS19knJ31gDWWRFRHZFujjPyXiexz4BBmjK1Mc1E", "qi": "Uvb84tWiJF3fB-U9wZSPi7juGgrzeXS_LYtf5fcdV0fZg_h_5nSVpXyYyQ-PK218qEC5MlDkaHKRD9wBOe_eU_zJTNoXzB2oAcgl2MapBWUMytbiF84ghP_2K9UD63ZVsyrorSZhmsJIBBuqQjrmk0tIdpMdlMxLYhrbYwFxUqc", "kid": "kid-rsa-enc-oaep", "kty": "RSA" } ``` and the cipher text ``` "eyJhbGciOiJSU0ExXzUiLCJlbmMiOiJBMTI4R0NNIn0.CuUuY9PH2wWjuLXd5O9LLFanwyt5-y-NzEpy9rC3A63tFsvdp8GWP1kRt1d3zd0bGqakwls623VQxzxqQ25j5gdHh8dKMl67xTLHt1Qlg36nI9Ukn7syq25VrzfrRRwy0k7isqMncHpzuBQlmfzPrszW7d13z7_ex0Uha869RaP-W2NNBfHYw26xIXcCSVIPg8jTLA7h6QmOetEej-NXXcWrRKQgBRapYy4iWrij9Vr3JzAGSHVtIID74tFOm01FdJj4s1M4IXegDbvAdQb6Vao1Ln5GolnTki4IGvH5FDssDHz6MS2JG5QBcITzfuXU81vDC00xzNEuMat0AngmOw.UjPQbnakkZYUdoDa.vcbS.WQ_bOPiGKjPSq-qyGOIfjA" ``` The header of this ciphertext is: ``` {"alg":"RSA1_5","enc":"A128GCM"}``` Hence the algorithm in the header does not match the algorithm in the key. Such ciphertexts should be rejected. The wrapped key is a valid RSA1_5 encrypted key. jose4j currently decrypts the ciphertext above without an exception. The problem with this behavior is that jose4j also allows chosen ciphertext attacks when the key uses RSA_OAEP. The attacker simply has to modify the header to and replace the algorithm with RSA1_5. Attempts to decrypt modified ciphertexts will then leak whether the decrypted message has valid PKCS #1 padding. ### Further Analysis Fix Commit - https://bitbucket.org/b_c/jose4j/commits/63b86581e7bfcc2d9d04ee15caea4b5bfb911f59 ### Timeline **Date reported**: 01/27/2023 **Date fixed**: 02/09/2023 **Date disclosed**: 04/27/2023
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.bitbucket.b_c:jose4j'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/google/security-research/security/advisories/GHSA-jgvc-jfgh-rjvv'}, {'type': 'WEB', 'url': 'https://bitbucket.org/b_c/jose4j/commits/14e62a8dee9decb4ff6e0625aedc5724601bfdb6'}, {'type': 'WEB', 'url': 'https://bitbucket.org/b_c/jose4j/commits/63b86581e7bfcc2d9d04ee15caea4b5bfb911f59'}, {'type': 'WEB', 'url': 'https://bitbucket.org/b_c/jose4j/commits/tag/jose4j-0.9.3'}, {'type': 'PACKAGE', 'url': 'https://github.com/google/security-research'}]
{'cwe_ids': ['CWE-327'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-27T23:52:54Z', 'nvd_published_at': None}
1.4.0
GHSA-q55c-hmpf-6h2g
2023-04-20T20:29:55Z
2023-04-20T03:30:16Z
null
['CVE-2023-2191']
AzuraCast/AzuraCast vulnerable to cross-site scripting
AzuraCast/AzuraCast prior to version 0.18.0 is vulnerable to stored cross-site scripting. An issue was identified where a user who already had an AzuraCast account could update their display name to inject malicious JavaScript into the header menu of the site. In a majority of cases, this menu is only visible to the current logged-in user (pages like the `Administer Users` page are unaffected by this vulnerability), but if a higher-privileged administrator uses the `Log In As` feature to masquerade as a user, then the JavaScript injection could exfiltrate certain data. Anonymous members of the public cannot exploit this vulnerability in an AzuraCast installation, so it is primarily of concern for multi-tenant installations (i.e. resellers).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'azuracast/azuracast'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.18.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2191'}, {'type': 'WEB', 'url': 'https://github.com/azuracast/azuracast/commit/24276cb4166b2057de73569ec33046a80a8bb437'}, {'type': 'PACKAGE', 'url': 'https://github.com/AzuraCast/AzuraCast'}, {'type': 'WEB', 'url': 'https://github.com/AzuraCast/AzuraCast/blob/main/CHANGELOG.md#azuracast-0180-apr-19-2023'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0814f5f9-8b58-40e5-b08c-7c488947cf31'}]
{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-04-20T20:29:55Z', 'nvd_published_at': None}
1.4.0
GHSA-cwf6-xj49-wp83
2023-04-25T16:34:37Z
2023-04-12T20:40:38Z
null
['CVE-2023-29018']
OpenFeature Operator vulnerable to Cluster-level Privilege Escalation
### Impact On a node controlled by an attacker or malicious user, the lax permissions configured on `open-feature-operator-controller-manager` can be used to further escalate the privileges of any service account in the cluster. The increased privileges could be used to modify cluster state, leading to DoS, or read sensitive data, including secrets. ### Patches The patch mitigates this issue by restricting the resources the `open-feature-operator-controller-manager` can modify.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/open-feature/open-feature-operator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.32'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/open-feature/open-feature-operator/security/advisories/GHSA-cwf6-xj49-wp83'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29018'}, {'type': 'PACKAGE', 'url': 'https://github.com/open-feature/open-feature-operator'}, {'type': 'WEB', 'url': 'https://github.com/open-feature/open-feature-operator/releases/tag/v0.2.32'}]
{'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-12T20:40:38Z', 'nvd_published_at': '2023-04-14T19:15:00Z'}
1.4.0
GHSA-wq8f-xmq3-5vq9
2023-05-03T15:50:50Z
2023-04-24T18:30:31Z
null
['CVE-2023-27848']
Remote code execution in broccoli-compass
broccoli-compass v0.2.4 was discovered to contain a remote code execution (RCE) vulnerability via the child_process function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'broccoli-compass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27848'}, {'type': 'WEB', 'url': 'https://github.com/omnitaint/Vulnerability-Reports/blob/9d65add2bca71ed6d6b2e281ee6790a12504ff8e/reports/broccoli-compass/report.md'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/broccoli-compass'}]
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-24T22:45:03Z', 'nvd_published_at': None}
1.4.0
GHSA-mwxw-hxvp-4r2r
2023-04-07T22:50:28Z
2023-04-01T03:30:16Z
null
['CVE-2023-1789']
Firefly III vulnerable to improper input validation
Firefly III versions prior to 6.0.0 are vulnerable to improper input validation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'grumpydictator/firefly-iii'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1789'}, {'type': 'WEB', 'url': 'https://github.com/firefly-iii/firefly-iii/pull/7043'}, {'type': 'WEB', 'url': 'https://github.com/firefly-iii/firefly-iii/commit/6b05c0fbd3e8c40ae9b24dc2698821786fccf0c5'}, {'type': 'PACKAGE', 'url': 'https://github.com/firefly-iii/firefly-iii'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/2c3489f7-6b84-48f8-9368-9cea67cf373d'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-03T20:36:45Z', 'nvd_published_at': '2023-04-01T02:15:00Z'}
1.4.0
GHSA-33pg-m6jh-5237
2023-04-05T23:16:54Z
2023-04-04T21:12:20Z
null
['CVE-2023-28841']
Docker Swarm encrypted overlay network traffic may be unencrypted
[Moby](https://mobyproject.org/) is an open source container framework developed by Docker Inc. that is distributed as Docker, Mirantis Container Runtime, and various other downstream projects/products. The Moby daemon component (`dockerd`), which is developed as [moby/moby](https://github.com/moby/moby) is commonly referred to as *Docker*. Swarm Mode, which is compiled in and delivered by default in `dockerd` and is thus present in most major Moby downstreams, is a simple, built-in container orchestrator that is implemented through a combination of [SwarmKit](https://github.com/moby/swarmkit) and supporting network code. The `overlay` network driver is a core feature of Swarm Mode, providing isolated virtual LANs that allow communication between containers and services across the cluster. This driver is an implementation/user of [VXLAN](https://en.wikipedia.org/wiki/Virtual_Extensible_LAN), which encapsulates link-layer (Ethernet) frames in UDP datagrams that tag the frame with a VXLAN Network ID (VNI) that identifies the originating overlay network. In addition, the overlay network driver supports an optional, off-by-default encrypted mode, which is especially useful when VXLAN packets traverses an untrusted network between nodes. Encrypted overlay networks function by encapsulating the VXLAN datagrams through the use of the [IPsec Encapsulating Security Payload](https://en.wikipedia.org/wiki/IPsec#Encapsulating_Security_Payload) protocol in [Transport mode](https://en.wikipedia.org/wiki/IPsec#Transport_mode). By deploying IPSec encapsulation, encrypted overlay networks gain the additional properties of source authentication through cryptographic proof, data integrity through check-summing, and confidentiality through encryption. When setting an endpoint up on an encrypted overlay network, Moby installs three [iptables](https://www.netfilter.org/projects/iptables/index.html) (Linux kernel firewall) rules that enforce both incoming and outgoing IPSec. These rules rely on the `u32` iptables extension provided by the `xt_u32` kernel module to directly filter on a VXLAN packet's VNI field, so that IPSec guarantees can be enforced on encrypted overlay networks without interfering with other overlay networks or other users of VXLAN. An [iptables rule](https://github.com/moby/libnetwork/blob/d9fae4c73daf76c3b0f77e14b45b8bf612ba764d/drivers/overlay/encryption.go#L205-L207) designates outgoing VXLAN datagrams with a VNI that corresponds to an encrypted overlay network for IPsec encapsulation. On Red Hat Enterprise Linux and derivatives such as CentOS and Rocky, the `xt_u32` module has been: * [moved to the kernel-modules-extra package and no longer installed by default in RHEL 8.3](https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/rhel-8-3-0-release#technology-preview_networking) * [officially deprecated in RHEL 8.6](https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/deprecated_functionality#deprecated-functionality_networking) * [removed completely in RHEL 9](https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/considerations_in_adopting_rhel_9/assembly_networking_considerations-in-adopting-rhel-9#ref_firewall-networking_assembly_networking) This rule is not created when `xt_u32` is unavailable, even though the container is still attached to the network. ## Impact Encrypted overlay networks on affected platforms silently transmit unencrypted data. As a result, `overlay` networks may appear to be functional, passing traffic as expected, but without any of the expected confidentiality or data integrity guarantees. It is possible for an attacker sitting in a trusted position on the network to read all of the application traffic that is moving across the overlay network, resulting in unexpected secrets or user data disclosure. Thus, because many database protocols, internal APIs, etc. are not protected by a second layer of encryption, a user may rely on Swarm encrypted overlay networks to provide confidentiality, which due to this vulnerability is no longer guaranteed. ## Patches Patches are available in Moby releases 23.0.3, and 20.10.24. As Mirantis Container Runtime's 20.10 releases are numbered differently, users of that platform should update to 20.10.16. ## Workarounds * Close the VXLAN port (by default, UDP port 4789) to outgoing traffic at the Internet boundary (see [GHSA-vwm3-crmr-xfxw](https://github.com/moby/moby/security/advisories/GHSA-vwm3-crmr-xfxw)) in order to prevent unintentionally leaking unencrypted traffic over the Internet. * Ensure that the `xt_u32` kernel module is available on all nodes of the Swarm cluster. ## Background * [#43382 ](https://github.com/moby/moby/issues/43382)partially discussed this concern, but did not consider the security implications. * Mirantis FIELD-5788 essentially duplicates [#43382](https://github.com/moby/moby/issues/43382), and was created six months earlier; it similarly overlooked the security implications. * [#45118](https://github.com/moby/moby/pull/45118) is the ancestor of the final patches, and was where the security implications were discovered. ## Related * [CVE-2023-28840: Encrypted overlay network may be unauthenticated](https://github.com/moby/moby/security/advisories/GHSA-232p-vwff-86mp) * [CVE-2023-28842: Encrypted overlay network with a single endpoint is unauthenticated](https://github.com/moby/moby/security/advisories/GHSA-6wrf-mxfj-pf5p) * [GHSA-vwm3-crmr-xfxw: The Swarm VXLAN port may be exposed to attack due to ambiguous documentation](https://github.com/moby/moby/security/advisories/GHSA-vwm3-crmr-xfxw) * [GHSA-gvm4-2qqg-m333: Security issues in encrypted overlay networks](https://github.com/moby/libnetwork/security/advisories/GHSA-gvm4-2qqg-m333) (libnetwork)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/docker/docker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.0'}, {'fixed': '20.10.24'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/docker/docker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '23.0.0'}, {'fixed': '23.0.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/moby/libnetwork/security/advisories/GHSA-gvm4-2qqg-m333'}, {'type': 'WEB', 'url': 'https://github.com/moby/moby/security/advisories/GHSA-232p-vwff-86mp'}, {'type': 'WEB', 'url': 'https://github.com/moby/moby/security/advisories/GHSA-33pg-m6jh-5237'}, {'type': 'WEB', 'url': 'https://github.com/moby/moby/security/advisories/GHSA-6wrf-mxfj-pf5p'}, {'type': 'WEB', 'url': 'https://github.com/moby/moby/security/advisories/GHSA-vwm3-crmr-xfxw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28841'}, {'type': 'WEB', 'url': 'https://github.com/moby/moby/issues/43382'}, {'type': 'WEB', 'url': 'https://github.com/moby/moby/pull/45118'}, {'type': 'WEB', 'url': 'https://github.com/moby/libnetwork/blob/d9fae4c73daf76c3b0f77e14b45b8bf612ba764d/drivers/overlay/encryption.go#L205-L207'}, {'type': 'PACKAGE', 'url': 'https://github.com/moby/moby'}]
{'cwe_ids': ['CWE-311', 'CWE-636'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-04T21:12:20Z', 'nvd_published_at': '2023-04-04T22:15:00Z'}
1.4.0
GHSA-fgxj-g7x3-85cq
2023-05-01T14:00:17Z
2023-04-28T15:30:19Z
null
['CVE-2023-28820']
Stored cross site scripting in RSS displayer
Concrete CMS (previously concrete5) before 9.1 is vulnerable to stored XSS in RSS Displayer via the href attribute because the link element input was not sanitized.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28820'}, {'type': 'PACKAGE', 'url': 'https://github.com/concretecms/concretecms'}, {'type': 'WEB', 'url': 'https://github.com/concretecms/concretecms/releases'}, {'type': 'WEB', 'url': 'https://www.concretecms.org/about/project-news/security/concrete-cms-security-advisory-2023-04-20'}]
{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-05-01T14:00:17Z', 'nvd_published_at': None}
1.4.0
GHSA-px54-3w5j-qjg9
2023-04-28T20:04:36Z
2023-04-20T22:04:00Z
null
['CVE-2023-29518']
XWiki Platform vulnerable to privilege escalation from view right using Invitation.InvitationCommon
### Impact Any user with view rights can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of `Invitation.InvitationCommon`. This page is installed by default. See https://jira.xwiki.org/browse/XWIKI-20283 for the reproduction steps. ### Patches The vulnerability has been patched in XWiki 15.0-rc-1, 14.10.1, 14.4.8, and 13.10.11. ### Workarounds The issue can be fixed by applying this [patch](https://github.com/xwiki/xwiki-platform/commit/3d055a0a5ec42fdebce4d71ee98f94553fdbfebf) on `Invitation.InvitationCommon`. ### References - https://github.com/xwiki/xwiki-platform/commit/3d055a0a5ec42fdebce4d71ee98f94553fdbfebf - https://jira.xwiki.org/browse/XWIKI-20283 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-invitation-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5-m-1'}, {'fixed': '13.10.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-invitation-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0-rc-1'}, {'fixed': '14.4.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-invitation-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.10.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-px54-3w5j-qjg9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29518'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/3d055a0a5ec42fdebce4d71ee98f94553fdbfebf'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20283'}]
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-20T22:04:00Z', 'nvd_published_at': None}
1.4.0
GHSA-4x35-vr82-xvj6
2023-05-04T21:39:57Z
2023-04-27T17:15:18Z
null
['CVE-2023-2338']
SQL Injection in AssetController
### Impact SQL injections in AssetController due to unsanitized concatenating strings in where clause. The attacker can dump database, alter data or perform dos on the backend database. ### Patches Update to version 10.5.21 or apply this patch manually https://github.com/pimcore/pimcore/commit/21e35af721c375ef4676ed50835e30d828e76520.patch ### Workarounds Apply patch https://github.com/pimcore/pimcore/commit/21e35af721c375ef4676ed50835e30d828e76520.patch manually. ### References https://huntr.dev/bounties/bbf59fa7-cf5b-4945-81b0-328adc710462/
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.21'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-4x35-vr82-xvj6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2338'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/21e35af721c375ef4676ed50835e30d828e76520'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/bbf59fa7-cf5b-4945-81b0-328adc710462'}]
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-27T17:15:18Z', 'nvd_published_at': None}
1.4.0
GHSA-583x-23h9-f5w7
2023-04-24T18:43:51Z
2023-04-19T18:33:22Z
null
['CVE-2023-22893']
Strapi does not verify the access or ID tokens issued during the OAuth flow
Strapi 3.2.1 until 4.6.0 does not verify the access or ID tokens issued during the OAuth flow when the AWS Cognito login provider is used for authentication. A remote attacker could forge an ID token that is signed using the 'None' type algorithm to bypass authentication and impersonate any user that use AWS Cognito for authentication.
[]
[{'package': {'ecosystem': 'npm', 'name': '@strapi/plugin-users-permissions'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.1'}, {'fixed': '4.6.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22893'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/commit/46f8f98378338f18b5c6139d0157a8f71bf4de83'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/commit/8bbbd7383a20bb7cb163c8b462baffee559e994f'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/commit/eeab43b57707d7ef275076d27be6eabc72bd71a7'}, {'type': 'PACKAGE', 'url': 'https://github.com/strapi/strapi'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/blob/v4.5.6/packages/plugins/users-permissions/server/services/providers-registry.js'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/releases'}, {'type': 'WEB', 'url': 'https://strapi.io/blog/security-disclosure-of-vulnerabilities-cve'}, {'type': 'WEB', 'url': 'https://www.ghostccamm.com/blog/multi_strapi_vulns/'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-24T18:43:51Z', 'nvd_published_at': None}
1.4.0
GHSA-xv3h-4844-9h36
2023-04-28T20:07:40Z
2023-04-24T22:42:39Z
null
['CVE-2023-29530']
HTTP Multiline Header Termination
### Impact Affected versions of Laminas Diactoros accepted a single line feed (LF / `\n` ) character at the end of a header name. When serializing such a header name containing a line-feed into the on-the-wire representation of a HTTP/1.x message, the resulting message would be syntactically invalid, due to the header line being terminated too early. An attacker that is able to control the header names that are passed to Laminas Diactoros would be able to intentionally craft invalid messages, possibly causing application errors or invalid HTTP requests being sent out with an PSR-18 HTTP client. The latter might present a denial of service vector if a remote service’s web application firewall bans the application due to the receipt of malformed requests. ### Patches The problem has been patched in the following versions: - 2.18.1 - 2.19.1 - 2.20.1 - 2.21.1 - 2.22.1 - 2.23.1 - 2.24.2 - 2.25.2 ### Workarounds Validate HTTP header keys and/or values, and if using user-supplied values, filter them to strip off leading or trailing newline characters before calling `withHeader()`. ### References - CVE-2023-29197 - GHSA-wxmh-65f7-jcvw
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'laminas/laminas-diactoros'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.18.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'laminas/laminas-diactoros'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.19.0'}, {'fixed': '2.19.1'}]}], 'versions': ['2.19.0']}, {'package': {'ecosystem': 'Packagist', 'name': 'laminas/laminas-diactoros'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.20.0'}, {'fixed': '2.20.1'}]}], 'versions': ['2.20.0']}, {'package': {'ecosystem': 'Packagist', 'name': 'laminas/laminas-diactoros'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.21.0'}, {'fixed': '2.21.1'}]}], 'versions': ['2.21.0']}, {'package': {'ecosystem': 'Packagist', 'name': 'laminas/laminas-diactoros'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.22.0'}, {'fixed': '2.22.1'}]}], 'versions': ['2.22.0']}, {'package': {'ecosystem': 'Packagist', 'name': 'laminas/laminas-diactoros'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.23.0'}, {'fixed': '2.23.1'}]}], 'versions': ['2.23.0']}, {'package': {'ecosystem': 'Packagist', 'name': 'laminas/laminas-diactoros'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.24.0'}, {'fixed': '2.24.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'laminas/laminas-diactoros'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.25.0'}, {'fixed': '2.25.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/laminas/laminas-diactoros/security/advisories/GHSA-xv3h-4844-9h36'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29530'}, {'type': 'WEB', 'url': 'https://github.com/laminas/laminas-diactoros/commit/7e721a60a09c5119c98694c2d23fc031094e1f1c'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wxmh-65f7-jcvw'}, {'type': 'PACKAGE', 'url': 'https://github.com/laminas/laminas-diactoros'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPW54QK7ISDALPLP2CKODU4ZIVRYS336/'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-24T22:42:39Z', 'nvd_published_at': None}
1.4.0
GHSA-qw69-rqj8-6qw8
2023-04-19T18:15:45Z
2023-04-19T18:15:45Z
null
['CVE-2023-26048']
OutOfMemoryError for large multipart without filename in Eclipse Jetty
### Impact Servlets with multipart support (e.g. annotated with `@MultipartConfig`) that call `HttpServletRequest.getParameter()` or `HttpServletRequest.getParts()` may cause `OutOfMemoryError` when the client sends a multipart request with a part that has a name but no filename and a very large content. This happens even with the default settings of `fileSizeThreshold=0` which should stream the whole part content to disk. An attacker client may send a large multipart request and cause the server to throw `OutOfMemoryError`. However, the server may be able to recover after the `OutOfMemoryError` and continue its service -- although it may take some time. A very large number of parts may cause the same problem. ### Patches Patched in Jetty versions * 9.4.51.v20230217 - via PR #9345 * 10.0.14 - via PR #9344 * 11.0.14 - via PR #9344 ### Workarounds Multipart parameter `maxRequestSize` must be set to a non-negative value, so the whole multipart content is limited (although still read into memory). Limiting multipart parameter `maxFileSize` won't be enough because an attacker can send a large number of parts that summed up will cause memory issues. ### References * https://github.com/eclipse/jetty.project/issues/9076 * https://github.com/jakartaee/servlet/blob/6.0.0/spec/src/main/asciidoc/servlet-spec-body.adoc#32-file-upload
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.4.51.v20230217'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.0.14'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.0.14'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-qw69-rqj8-6qw8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26048'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/issues/9076'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/pull/9344'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/pull/9345'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/jetty.project'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/releases/tag/jetty-9.4.51.v20230217'}, {'type': 'WEB', 'url': 'https://github.com/jakartaee/servlet/blob/6.0.0/spec/src/main/asciidoc/servlet-spec-body.adoc#32-file-upload'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230526-0001/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5507'}]
{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-19T18:15:45Z', 'nvd_published_at': None}
1.4.0
GHSA-wxqc-pxw9-g2p8
2023-04-17T17:34:37Z
2023-04-13T21:30:27Z
null
['CVE-2023-20863']
Spring Framework vulnerable to denial of service
In Spring Framework versions prior to 5.2.24.release+ , 5.3.27+ and 6.0.8+ , it is possible for a user to provide a specially crafted Spring Expression Language (SpEL) expression that may cause a denial-of-service (DoS) condition.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3.0'}, {'fixed': '5.3.27'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.24.RELEASE'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-20863'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-framework/commit/b73f5fcac22555f844cf27a7eeb876cb9d7f7f7e'}, {'type': 'PACKAGE', 'url': 'https://github.com/spring-projects/spring-framework'}, {'type': 'WEB', 'url': 'https://spring.io/security/cve-2023-20863'}]
{'cwe_ids': ['CWE-400', 'CWE-770', 'CWE-917'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-17T17:19:53Z', 'nvd_published_at': '2023-04-13T20:15:00Z'}
1.4.0
GHSA-38h6-gmr2-j4wx
2023-04-12T22:31:46Z
2023-04-03T21:06:31Z
null
['CVE-2023-28851']
Silverstripe Form Capture vulnerable to stored cross-site-scripting
### Impact Improper escaping when presenting stored form submissions allowed for an attacker to perform a Cross-Site Scripting attack ### Patches The vulnerability was initially patched in version 1.0.2, and version 1.1.0 includes this patch. The bug was then accidentally re-introduced during a merge error, and has been re-patched in versions 2.2.5 and 3.1.1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'bigfork/silverstripe-form-capture'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'andrewhaine/silverstripe-form-capture'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0'}, {'fixed': '1.0.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.2.3'}}, {'package': {'ecosystem': 'Packagist', 'name': 'andrewhaine/silverstripe-form-capture'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'andrewhaine/silverstripe-form-capture'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/bigfork/silverstripe-form-capture/security/advisories/GHSA-38h6-gmr2-j4wx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28851'}, {'type': 'WEB', 'url': 'https://github.com/bigfork/silverstripe-form-capture/commit/3a7a3c480e3fccddce9c5f359796d45a8302a622'}, {'type': 'WEB', 'url': 'https://github.com/bigfork/silverstripe-form-capture/commit/5b3aa39dd1eef042f173167b0fa4d3f717971772'}, {'type': 'PACKAGE', 'url': 'https://github.com/bigfork/silverstripe-form-capture'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-03T21:06:31Z', 'nvd_published_at': '2023-04-03T18:15:00Z'}
1.4.0
GHSA-gx43-fqrx-6fcw
2023-06-12T22:17:01Z
2023-04-05T18:30:18Z
null
['CVE-2023-1887']
thorsten/phpmyfaq vulnerable to business logic errors
thorsten/phpmyfaq prior to 3.1.12 allows users with edit-only permissions to add and delete categories and add FAQs. This has been fixed in 3.1.12.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1887'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/400d9cd988d3287515c56b2ad6343026966f1a89'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpMyFAQ'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/e4a58835-96b5-412c-a17e-3ceed30231e1'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-06T16:55:35Z', 'nvd_published_at': '2023-04-05T17:15:00Z'}
1.4.0
GHSA-c6mx-3fj9-9j7q
2023-04-28T20:07:09Z
2023-04-21T21:30:19Z
null
['CVE-2023-29924']
PowerJob vulnerable to incorrect access control
PowerJob V4.3.1 is vulnerable to Incorrect Access Control that allows for remote code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'tech.powerjob:powerjob'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29924'}, {'type': 'WEB', 'url': 'https://github.com/PowerJob/PowerJob/issues/588'}, {'type': 'PACKAGE', 'url': 'https://github.com/PowerJob/PowerJob'}, {'type': 'WEB', 'url': 'https://iotaa.cn/articles/62'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-24T20:30:55Z', 'nvd_published_at': None}
1.4.0
GHSA-j55j-28wc-v338
2023-04-21T17:53:58Z
2023-04-12T18:30:36Z
null
['CVE-2023-30524']
Jenkins Report Portal Plugin configuration form does not mask tokens
Jenkins Report Portal Plugin 0.5 and earlier stores ReportPortal access tokens unencrypted in job `config.xml` files on the Jenkins controller as part of its configuration. These tokens can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system. Additionally, the configuration form does not mask these tokens, increasing the potential for attackers to observe and capture them.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:reportportal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30524'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-04-12/#SECURITY-2945'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/04/13/3'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-12T22:17:27Z', 'nvd_published_at': '2023-04-12T18:15:00Z'}
1.4.0
GHSA-jph3-3j24-pg3j
2023-04-06T15:07:25Z
2023-04-05T18:30:18Z
null
['CVE-2023-1882']
thorsten/phpmyfaq vulnerable to DOM cross-site scripting (XSS) via configuration privacy note URL parameter
thorsten/phpmyfaq prior to 3.1.12 is vulnerable to DOM cross-site scripting (XSS) because it fails to sanitize user input in the configuration privacy note URL parameter. This has been fixed in 3.1.12.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1882'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/49db615c300ae0f87795f20570f6f5bdccb1d2f2'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpMyFAQ'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8ab09a1c-cfd5-4ce0-aae3-d33c93318957'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-06T15:07:25Z', 'nvd_published_at': '2023-04-05T17:15:00Z'}
1.4.0
GHSA-582p-2fpg-x226
2023-04-06T16:37:32Z
2023-04-05T18:30:18Z
null
['CVE-2023-1877']
Microweber vulnerable to command injection
microweber/microweber prior to 1.3.3 is vulnerable to command injection in the "first name" field. This allows for server-side template injection, which can lead to arbitrary code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1877'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/93a906d0bf096c3ab1674012a90c88d101e76c8d'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/71fe4b3b-20ac-448c-8191-7b99d7ffaf55'}]
{'cwe_ids': ['CWE-77'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-06T16:37:32Z', 'nvd_published_at': '2023-04-05T17:15:00Z'}
1.4.0
GHSA-2hp9-3xfr-r9w2
2023-05-05T20:35:51Z
2023-04-27T03:30:23Z
null
['CVE-2023-31287']
Insufficient token expiration in Serenity
An issue was discovered in Serenity Serene (and StartSharp) before 6.7.0. Password reset links are sent by email. A link contains a token that is used to reset the password. This token remains valid even after the password reset and can be used a second time to change the password of the corresponding user. The token expires only 3 hours after issuance and is sent as a query parameter when resetting. An attacker with access to the browser history can thus use the token again to change the password in order to take over the account.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Serenity.Net.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.7.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Serenity.Net.Web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.7.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31287'}, {'type': 'WEB', 'url': 'https://github.com/serenity-is/Serenity/commit/11b9d267f840513d04b4f4d4876de7823a6e48d2'}, {'type': 'PACKAGE', 'url': 'https://github.com/serenity-is/Serenity'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/172648/Serenity-StartSharp-Software-File-Upload-XSS-User-Enumeration-Reusable-Tokens.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2023/May/14'}]
{'cwe_ids': ['CWE-640'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-27T17:09:21Z', 'nvd_published_at': None}
1.4.0
GHSA-fq8q-55v3-2986
2023-04-03T18:58:01Z
2023-04-03T18:58:01Z
null
['CVE-2023-28850']
Pimcore Perspective Editor vulnerable to stored cross-site scripting (XSS) in perspective name
### Impact This vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites. ### Patches Update to version 1.5.1. ### Workarounds Apply the patch https://github.com/pimcore/perspective-editor/pull/121.patch manually.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/perspective-editor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pimcore/perspective-editor/security/advisories/GHSA-fq8q-55v3-2986'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28850'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/perspective-editor/pull/121.patch'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/perspective-editor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/5529f51e-e40f-46f1-887b-c9dbebab4f06/'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-03T18:58:01Z', 'nvd_published_at': '2023-04-03T18:15:00Z'}
1.4.0
GHSA-3jxw-cv35-2mmv
2023-05-02T11:42:32Z
2023-04-20T18:30:50Z
null
['CVE-2023-25601']
Apache DolphinScheduler's python gateway suffered from improper authentication
On version 3.0.0 through 3.1.1, Apache DolphinScheduler's python gateway suffered from improper authentication: an attacker could use a socket bytes attack without authentication. This issue has been fixed from version 3.1.2 onwards. For users who use version 3.0.0 to 3.1.1, you can turn off the python-gateway function by changing the value `python-gateway.enabled=false` in configuration file `application.yaml`. If you are using the python gateway, please upgrade to version 3.1.2 or above.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dolphinscheduler:dolphinscheduler-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25601'}, {'type': 'WEB', 'url': 'https://github.com/apache/dolphinscheduler/pull/12893'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/dolphinscheduler'}, {'type': 'WEB', 'url': 'https://github.com/apache/dolphinscheduler/releases/tag/3.1.2'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/25g77jqczp3t8cz56hk1p65q7m6c64rf'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/04/20/10'}]
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-20T20:26:06Z', 'nvd_published_at': None}
1.4.0
GHSA-qwvp-g9j7-28f6
2023-04-22T00:05:12Z
2023-04-14T03:30:29Z
null
['CVE-2023-2034']
froxlor/froxlor vulnerable to unrestricted upload of file with dangerous type
Image files uploaded in froxlor/froxlor prior to 2.0.14 were not properly validated which could result in remote code execution via path manipulation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'froxlor/froxlor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.14'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2034'}, {'type': 'WEB', 'url': 'https://github.com/froxlor/froxlor/commit/f36bc61fc74c85a21c8d31448198b11f96eb3bc6'}, {'type': 'PACKAGE', 'url': 'https://github.com/Froxlor/Froxlor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/aba6beaa-570e-4523-8128-da4d8e374ef6'}]
{'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-17T17:44:07Z', 'nvd_published_at': '2023-04-14T01:15:00Z'}
1.4.0
GHSA-9h33-5fxw-r2xv
2023-05-04T21:45:02Z
2023-04-28T15:30:18Z
null
['CVE-2023-28471']
Stored cross site scripting via container name
Concrete CMS (previously concrete5) before 9.2 is vulnerable to Stored XSS via a container name.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28471'}, {'type': 'WEB', 'url': 'https://concretecms.com'}, {'type': 'WEB', 'url': 'https://www.concretecms.org/about/project-news/security/concrete-cms-security-advisory-2023-04-20'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-01T13:44:21Z', 'nvd_published_at': None}
1.4.0
GHSA-96c7-fqxv-rmv7
2023-04-12T22:19:14Z
2023-04-12T18:30:36Z
null
['CVE-2023-30530']
Jenkins Consul KV Builder Plugin stores HashiCorp Consul ACL Token unencrypted
Jenkins Consul KV Builder Plugin 2.0.13 and earlier stores the HashiCorp Consul ACL Token unencrypted in its global configuration file `org.jenkinsci.plugins.consulkv.GlobalConsulConfig.xml` on the Jenkins controller as part of its configuration. This token can be viewed by users with access to the Jenkins controller file system. Additionally, the global configuration form does not mask the token, increasing the potential for attackers to observe and capture it.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:consul-kv-builder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30530'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-04-12/#SECURITY-2944'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/04/13/3'}]
{'cwe_ids': ['CWE-312'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-12T22:19:14Z', 'nvd_published_at': '2023-04-12T18:15:00Z'}
1.4.0
GHSA-gmjj-g2rm-xwm7
2023-04-06T15:07:44Z
2023-04-05T18:30:18Z
null
['CVE-2023-1884']
thorsten/phpmyfaq vulnerable to cross-site scripting (XSS) via stopword parameter
thorsten/phpmyfaq prior to 3.1.12 is vulnerable to cross-site scripting (XSS) because it fails to sanitize user input in the `stopword` parameter. This has been fixed in 3.1.12.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1884'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/7f0f921de74c88038826c46bbd2a123518d9d611'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpMyFAQ'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/dda73cb6-9344-4822-97a1-2e31efb6a73e'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-06T15:07:44Z', 'nvd_published_at': '2023-04-05T17:15:00Z'}
1.4.0
GHSA-j5c3-r84f-9596
2023-05-09T18:52:32Z
2023-04-27T23:10:03Z
null
['CVE-2023-30852']
Arbitrary File Read in Admin JS CSS files
### Impact It was observed that the `/admin/misc/script-proxy` API endpoint accessible by an authenticated administrator user and is vulnerable arbitrary JavaScript, CSS file read via the "scriptPath" and "scripts" parameters. The "scriptPath" parameter is not sanitized properly and is vulnerable to path traversal attack. Any JavaScript/CSS file from the application server can be read by specifying sufficient number of "../" patterns to go out from the application webroot followed by path of the folder where the file is located in the "scriptPath" parameter and the file name in the "scripts" parameter. The JavaScript file is successfully read only if the web application has read access to it. ### Patches Update to version 10.5.21 or apply this patch manually https://github.com/pimcore/pimcore/commit/1d128404eddf4beb560d434437347da7aea059eb.patch ### Workarounds Apply patch https://github.com/pimcore/pimcore/commit/1d128404eddf4beb560d434437347da7aea059eb.patch manually. ### References https://github.com/pimcore/pimcore/pull/14959
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.21'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-j5c3-r84f-9596'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30852'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/14959'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/498cadec2292f7842fb10612068ac78496e884b4.patch'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-27T23:10:03Z', 'nvd_published_at': None}
1.4.0
GHSA-xv83-x443-7rmw
2023-09-22T19:51:24Z
2023-04-25T19:48:11Z
null
['CVE-2023-30609']
HTML injection in search results via plaintext message highlighting
### Impact Plain text messages containing HTML tags are rendered as HTML in the search results. To exploit this, an attacker needs to trick a user into searching for a specific message containing an HTML injection payload. Cross-site scripting is possible by including resources from `recaptcha.net` and `gstatic.com` which are included in the default CSP. Thanks to [Cadence Ember](https://cadence.moe/) for finding the injection and to [S1m](https://github.com/p1gp1g/) for finding possible XSS vectors. ### Patches Version 3.71.0 of the SDK fixes the issue. ### Workarounds Restarting the client will clear the injection.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'matrix-react-sdk'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.71.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-react-sdk/security/advisories/GHSA-xv83-x443-7rmw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30609'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-react-sdk/commit/bf182bc94556849d7acdfa0e5fdea2aa129ea826'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/matrix-react-sdk'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-react-sdk/releases/tag/v3.71.0'}]
{'cwe_ids': ['CWE-74', 'CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-25T19:48:11Z', 'nvd_published_at': None}
1.4.0
GHSA-q2qj-628g-vhfw
2023-05-22T14:38:30Z
2023-04-18T22:20:42Z
null
['CVE-2023-30536']
Insecure header validation in slim/psr7
### Impact An attacker could sneak in a newline (`\n`) into both the header names and values. While the specification states that `\r\n\r\n` is used to terminate the header list, many servers in the wild will also accept `\n\n`. An attacker that is able to control the header names that are passed to Slilm-Psr7 would be able to intentionally craft invalid messages, possibly causing application errors or invalid HTTP requests being sent out with an PSR-18 HTTP client. The latter might present a denial of service vector if a remote service’s web application firewall bans the application due to the receipt of malformed requests. ### Patches The issue is patched in 1.6.1, 1.5.1, and 1.4.1. ### Workarounds In Slim-Psr7 prior to 1.6.1, 1.5.1, and 1.4.1, validate HTTP header keys and/or values, and if using user-supplied values, filter them to strip off leading or trailing newline characters before calling withHeader(). ### Acknowledgments We are very grateful to and thank <a href="https://gjcampbell.co.uk/">Graham Campbell</a> for reporting and working with us on this issue. ### References * Guzzle: CVE-2023-29197, with advisory GHSA-wxmh-65f7-jcvw * Laminas Diactoros: CVE-2023-29530, with advisory GHSA-xv3h-4844-9h36 * https://www.rfc-editor.org/rfc/rfc7230#section-3.2.4
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'slim/psr7'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6'}, {'fixed': '1.6.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'slim/psr7'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5'}, {'fixed': '1.5.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'slim/psr7'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/slimphp/Slim-Psr7/security/advisories/GHSA-q2qj-628g-vhfw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30536'}, {'type': 'WEB', 'url': 'https://github.com/slimphp/Slim-Psr7/issues/284#issuecomment-1541328898'}, {'type': 'WEB', 'url': 'https://github.com/slimphp/Slim-Psr7/commit/ed1d553225dd190875d8814c47460daed4b550bb'}, {'type': 'PACKAGE', 'url': 'https://github.com/slimphp/Slim-Psr7'}, {'type': 'WEB', 'url': 'https://github.com/slimphp/Slim-Psr7/releases/tag/1.4.1'}, {'type': 'WEB', 'url': 'https://github.com/slimphp/Slim-Psr7/releases/tag/1.5.1'}, {'type': 'WEB', 'url': 'https://github.com/slimphp/Slim-Psr7/releases/tag/1.6.1'}, {'type': 'WEB', 'url': 'https://www.rfc-editor.org/rfc/rfc7230#section-3.2.4'}]
{'cwe_ids': ['CWE-436'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-18T22:20:42Z', 'nvd_published_at': None}
1.4.0
GHSA-232p-vwff-86mp
2023-04-05T23:16:22Z
2023-04-04T21:13:06Z
null
['CVE-2023-28840']
Docker Swarm encrypted overlay network may be unauthenticated
[Moby](https://mobyproject.org/) is an open source container framework developed by Docker Inc. that is distributed as Docker, Mirantis Container Runtime, and various other downstream projects/products. The Moby daemon component (`dockerd`), which is developed as [moby/moby](https://github.com/moby/moby) is commonly referred to as *Docker*. Swarm Mode, which is compiled in and delivered by default in `dockerd` and is thus present in most major Moby downstreams, is a simple, built-in container orchestrator that is implemented through a combination of [SwarmKit](https://github.com/moby/swarmkit) and supporting network code. The `overlay` network driver is a core feature of Swarm Mode, providing isolated virtual LANs that allow communication between containers and services across the cluster. This driver is an implementation/user of [VXLAN](https://en.wikipedia.org/wiki/Virtual_Extensible_LAN), which encapsulates link-layer (Ethernet) frames in UDP datagrams that tag the frame with a VXLAN Network ID (VNI) that identifies the originating overlay network. In addition, the overlay network driver supports an optional, off-by-default encrypted mode, which is especially useful when VXLAN packets traverses an untrusted network between nodes. Encrypted overlay networks function by encapsulating the VXLAN datagrams through the use of the [IPsec Encapsulating Security Payload](https://en.wikipedia.org/wiki/IPsec#Encapsulating_Security_Payload) protocol in [Transport mode](https://en.wikipedia.org/wiki/IPsec#Transport_mode). By deploying IPSec encapsulation, encrypted overlay networks gain the additional properties of source authentication through cryptographic proof, data integrity through check-summing, and confidentiality through encryption. When setting an endpoint up on an encrypted overlay network, Moby installs three [iptables](https://www.netfilter.org/projects/iptables/index.html) (Linux kernel firewall) rules that enforce both incoming and outgoing IPSec. These rules rely on the `u32` iptables extension provided by the `xt_u32` kernel module to directly filter on a VXLAN packet's VNI field, so that IPSec guarantees can be enforced on encrypted overlay networks without interfering with other overlay networks or other users of VXLAN. [Two iptables rules](https://github.com/moby/libnetwork/blob/d9fae4c73daf76c3b0f77e14b45b8bf612ba764d/drivers/overlay/encryption.go#L230-L234) serve to filter incoming VXLAN datagrams with a VNI that corresponds to an encrypted network and discards unencrypted datagrams. The rules are appended to the end of the `INPUT` filter chain, following any rules that have been previously set by the system administrator. Administrator-set rules take precedence over the rules Moby sets to discard unencrypted VXLAN datagrams, which can potentially admit unencrypted datagrams that should have been discarded. On Red Hat Enterprise Linux and derivatives such as CentOS and Rocky, the `xt_u32` module has been: * [moved to the kernel-modules-extra package and no longer installed by default in RHEL 8.3](https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/rhel-8-3-0-release#technology-preview_networking) * [officially deprecated in RHEL 8.6](https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/deprecated_functionality#deprecated-functionality_networking) * [removed completely in RHEL 9](https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/considerations_in_adopting_rhel_9/assembly_networking_considerations-in-adopting-rhel-9#ref_firewall-networking_assembly_networking) These rules are not created when `xt_u32` is unavailable, even though the container is still attached to the network. ## Impact Encrypted overlay networks on affected configurations silently accept cleartext VXLAN datagrams that are tagged with the VNI of an encrypted overlay network. As a result, it is possible to inject arbitrary Ethernet frames into the encrypted overlay network by encapsulating them in VXLAN datagrams. The injection of arbitrary Ethernet frames can enable a Denial of Service attack. A sophisticated attacker may be able to establish a UDP or TCP connection by way of the container’s outbound gateway that would otherwise be blocked by a stateful firewall, or carry out other escalations beyond simple injection by smuggling packets into the overlay network. ## Patches Patches are available in Moby releases 23.0.3, and 20.10.24. As Mirantis Container Runtime's 20.10 releases are numbered differently, users of that platform should update to 20.10.16. ## Workarounds * Close the VXLAN port (by default, UDP port 4789) to incoming traffic at the Internet boundary (see [GHSA-vwm3-crmr-xfxw](https://github.com/moby/moby/security/advisories/GHSA-vwm3-crmr-xfxw)) to prevent all VXLAN packet injection. * Ensure that the `xt_u32` kernel module is available on all nodes of the Swarm cluster. ## Background * [#43382](https://github.com/moby/moby/issues/43382) partially discussed this concern, but did not consider the security implications. * Mirantis FIELD-5788 essentially duplicates [#43382](https://github.com/moby/moby/issues/43382), and was created six months earlier; it similarly overlooked the security implications. * [#45118](https://github.com/moby/moby/pull/45118) is the ancestor of the final patches, and was where the security implications were discovered. ## Related * [CVE-2023-28841: Encrypted overlay network traffic may be unencrypted](https://github.com/moby/moby/security/advisories/GHSA-33pg-m6jh-5237) * [CVE-2023-28842: Encrypted overlay network with a single endpoint is unauthenticated](https://github.com/moby/moby/security/advisories/GHSA-6wrf-mxfj-pf5p) * [GHSA-vwm3-crmr-xfxw: The Swarm VXLAN port may be exposed to attack due to ambiguous documentation](https://github.com/moby/moby/security/advisories/GHSA-vwm3-crmr-xfxw) * [GHSA-gvm4-2qqg-m333: Security issues in encrypted overlay networks](https://github.com/moby/libnetwork/security/advisories/GHSA-gvm4-2qqg-m333) (libnetwork)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/docker/docker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.0'}, {'fixed': '20.10.24'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/docker/docker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '23.0.0'}, {'fixed': '23.0.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/moby/libnetwork/security/advisories/GHSA-gvm4-2qqg-m333'}, {'type': 'WEB', 'url': 'https://github.com/moby/moby/security/advisories/GHSA-232p-vwff-86mp'}, {'type': 'WEB', 'url': 'https://github.com/moby/moby/security/advisories/GHSA-33pg-m6jh-5237'}, {'type': 'WEB', 'url': 'https://github.com/moby/moby/security/advisories/GHSA-6wrf-mxfj-pf5p'}, {'type': 'WEB', 'url': 'https://github.com/moby/moby/security/advisories/GHSA-vwm3-crmr-xfxw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28840'}, {'type': 'WEB', 'url': 'https://github.com/moby/moby/issues/43382'}, {'type': 'WEB', 'url': 'https://github.com/moby/moby/pull/45118'}, {'type': 'PACKAGE', 'url': 'https://github.com/moby/moby'}]
{'cwe_ids': ['CWE-420', 'CWE-636'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-04T21:13:06Z', 'nvd_published_at': '2023-04-04T22:15:00Z'}
1.4.0
GHSA-wq3w-3rxh-vcxx
2023-04-07T22:59:12Z
2023-04-02T21:30:17Z
null
['CVE-2023-28671']
Jenkins OctoPerf Load Testing Plugin vulnerable to Cross-site Request Forgery
OctoPerf Load Testing Plugin Plugin 4.5.0 and earlier does not require POST requests for a connection test HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability. This vulnerability allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. OctoPerf Load Testing Plugin Plugin 4.5.1 requires POST requests for the affected connection test HTTP endpoint.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkinsci.plugins:octoperf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28671'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-03-21/#SECURITY-3067%20(1)'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-03T22:54:37Z', 'nvd_published_at': '2023-04-02T21:15:00Z'}
1.4.0
GHSA-ch3r-j5x3-6q2m
2023-04-20T14:37:53Z
2023-04-20T14:37:53Z
null
['CVE-2023-30547']
vm2 Sandbox Escape vulnerability
There exists a vulnerability in exception sanitization of vm2 for versions up to 3.9.16, allowing attackers to raise an unsanitized host exception inside `handleException()` which can be used to escape the sandbox and run arbitrary code in host context. ### Impact A threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. ### Patches This vulnerability was patched in the release of version `3.9.17` of `vm2`. ### Workarounds None. ### References PoC - https://gist.github.com/leesh3288/381b230b04936dd4d74aaf90cc8bb244 ### For more information If you have any questions or comments about this advisory: - Open an issue in [VM2](https://github.com/patriksimek/vm2) Thanks to [Xion](https://twitter.com/0x10n) (SeungHyun Lee) of [KAIST Hacking Lab](https://kaist-hacking.github.io/) for disclosing this vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'vm2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.17'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/security/advisories/GHSA-ch3r-j5x3-6q2m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30547'}, {'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/commit/4b22e87b102d97d45d112a0931dba1aef7eea049'}, {'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/commit/f3db4dee4d76b19869df05ba7880d638a880edd5'}, {'type': 'WEB', 'url': 'https://gist.github.com/leesh3288/381b230b04936dd4d74aaf90cc8bb244'}, {'type': 'PACKAGE', 'url': 'https://github.com/patriksimek/vm2'}, {'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/releases/tag/3.9.17'}]
{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-20T14:37:53Z', 'nvd_published_at': None}
1.4.0
GHSA-4xr4-89m5-46c7
2023-04-20T20:34:40Z
2023-04-20T06:30:17Z
null
['CVE-2022-4942']
eslint-detailed-reporter vulnerable to cross-site scripting
A vulnerability was found in mportuga eslint-detailed-reporter up to 0.9.0 and classified as problematic. Affected by this issue is the function renderIssue in the library lib/template-generator.js. The manipulation of the argument message leads to cross site scripting. The attack may be launched remotely. The name of the patch is 505c190efd4905990db6207863bdcbd9b1d7e1bd. It is recommended to apply a patch to fix this issue. VDB-226310 is the identifier assigned to this vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'eslint-detailed-reporter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4942'}, {'type': 'WEB', 'url': 'https://github.com/mportuga/eslint-detailed-reporter/pull/46'}, {'type': 'WEB', 'url': 'https://github.com/mportuga/eslint-detailed-reporter/commit/505c190efd4905990db6207863bdcbd9b1d7e1bd'}, {'type': 'PACKAGE', 'url': 'https://github.com/mportuga/eslint-detailed-reporter'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.226310'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.226310'}]
{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-04-20T20:34:40Z', 'nvd_published_at': None}
1.4.0
GHSA-c8ff-j5gm-6492
2023-04-21T17:53:28Z
2023-04-12T18:30:36Z
null
['CVE-2023-30525']
Jenkins Report Portal Plugin Cross-Site Request Forgery vulnerability
Jenkins Report Portal Plugin 0.5 and earlier does not perform a permission check in a method implementing form validation. This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified bearer token authentication. Additionally, this form validation method does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:reportportal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30525'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-04-12/#SECURITY-2950'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/04/13/3'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-12T22:18:35Z', 'nvd_published_at': '2023-04-12T18:15:00Z'}
1.4.0
GHSA-f737-3fh6-jf6w
2023-07-07T22:20:18Z
2023-04-26T21:30:37Z
null
['CVE-2023-30363']
Prototype Pollution in vConsole
vConsole was discovered to contain a prototype pollution due to incorrect key and value resolution in setOptions in core.ts.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'vconsole'}, 'ecosystem_specific': {'affected_functions': ['vConsole.setOption']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.15.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30363'}, {'type': 'WEB', 'url': 'https://github.com/Tencent/vConsole/issues/616'}, {'type': 'WEB', 'url': 'https://github.com/Tencent/vConsole/commit/b91591703490e032451f7734212f6458bde9be6a'}, {'type': 'WEB', 'url': 'https://cwe.mitre.org/data/definitions/1321.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/Tencent/vConsole'}, {'type': 'WEB', 'url': 'https://github.com/Tencent/vConsole/releases/tag/v3.15.1'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-27T13:58:23Z', 'nvd_published_at': None}
1.4.0
GHSA-5286-f2rf-35c2
2023-04-03T20:21:28Z
2023-04-03T17:25:27Z
null
['CVE-2023-28836']
Wagtail vulnerable to stored Cross-site Scripting attack via ModelAdmin views
### Impact A stored cross-site scripting (XSS) vulnerability exists on ModelAdmin views within the Wagtail admin interface. A user with a limited-permission editor account for the Wagtail admin could potentially craft pages and documents that, when viewed by a user with higher privileges, could perform actions with that user's credentials. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin, and only affects sites with ModelAdmin enabled. - For page, the vulnerability is in the "Choose a parent page" ModelAdmin view ([`ChooseParentView`](https://docs.wagtail.org/en/stable/reference/contrib/modeladmin/chooseparentview.html#customising-chooseparentview)), available when managing pages via ModelAdmin. - For documents, the vulnerability is in the ModelAdmin Inspect view ([`InspectView`](https://docs.wagtail.org/en/stable/reference/contrib/modeladmin/inspectview.html#enabling-customising-inspectview)) when displaying document fields. ### Patches Patched versions have been released as Wagtail 4.1.4 (for the LTS 4.1 branch) and Wagtail 4.2.2 (for the current 4.2 branch). ### Workarounds Site owners who are unable to upgrade to the new versions can disable or override the corresponding functionality. #### `ChooseParentView` For [`ChooseParentView`](https://docs.wagtail.org/en/stable/reference/contrib/modeladmin/chooseparentview.html#modeladmin-choose-parent-view-class): - Disable ModelAdmin for all page models. - Or provide a custom view via [`choose_parent_view_class`](https://docs.wagtail.org/en/stable/reference/contrib/modeladmin/chooseparentview.html#id4), with the custom view overriding the `get_form` method. One of those steps need to be applied for every `ModelAdmin` class hooked into Wagtail where the model is a Wagtail `Page` or sub-class. Here is an example of implementing the custom `ChooseParentView` with patched HTML escaping: ```python from django import forms from django.utils.translation import gettext as _ from wagtail.contrib.modeladmin.views import ChooseParentView from wagtail.contrib.modeladmin.forms import ParentChooserForm class PatchedPageChoiceField(forms.ModelChoiceField): """PageChoiceField with plain-text breadcrumbs to patch stored XSS.""" def label_from_instance(self, obj): bits = [] for ancestor in ( obj.get_ancestors(inclusive=True).exclude(depth=1).specific(defer=True) ): bits.append(ancestor.get_admin_display_title()) return ' | '.join(bits) class PatchedParentChooserForm(ParentChooserForm): """ParentChooserForm with custom parent_page to patch stored XSS.""" parent_page = PatchedPageChoiceField( label=_("Parent page"), required=True, empty_label=None, queryset=Page.objects.none(), widget=forms.RadioSelect(), ) class PatchedChooseParentView(ChooseParentView): """ChooseParentView with custom get_form patch stored XSS.""" def get_form(self, request): parents = self.permission_helper.get_valid_parent_pages(request.user) return PatchedParentChooserForm(parents, request.POST or None) ``` #### `InspectView` For [`InspectView`](https://docs.wagtail.org/en/stable/reference/contrib/modeladmin/inspectview.html#enabling-customising-inspectview): - Remove `inspect_view_enabled=True` or set it to False to disable the view. - Or use [`inspect_view_fields`](https://docs.wagtail.org/en/stable/reference/contrib/modeladmin/inspectview.html#modeladmin-inspect-view-fields) or [`inspect_view_fields_exclude`](https://docs.wagtail.org/en/stable/reference/contrib/modeladmin/inspectview.html#modeladmin-inspect-view-fields-exclude) to prevent displaying document fields in the views. - Or provide a custom view via [`inspect_view_class`](https://docs.wagtail.org/en/stable/reference/contrib/modeladmin/inspectview.html#id12), with the custom view overriding the `get_document_field_display` method. One of those steps need to be applied for every `ModelAdmin` class hooked into Wagtail where `inspect_view_enabled=True`. Here is an example of implementing the custom `InspectView` with patched HTML escaping: ```python from django.template.defaultfilters import filesizeformat from django.utils.html import format_html from wagtail.contrib.modeladmin.views import InspectView class PatchedInspectView(InspectView): """InspectView with override to patch stored XSS vulnerability.""" def get_document_field_display(self, field_name, field): """Render a link to a document""" document = getattr(self.instance, field_name) if document: return format_html( '<a href="{}">{} <span class="meta">({}, {})</span></a>', document.url, document.title, document.file_extension.upper(), filesizeformat(document.file.size), ) return self.model_admin.get_empty_value_display(field_name) ```
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'wagtail'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5'}, {'fixed': '4.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'wagtail'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2'}, {'fixed': '4.2.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/security/advisories/GHSA-5286-f2rf-35c2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28836'}, {'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/commit/5be2b1ed55fd7259dfdf2c82e7701dba407b8b62'}, {'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/commit/bc84bf9815610cfbf8db3b6050c7ddcbaa4b9713'}, {'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/commit/eefc3381d37b476791610e5d30594fae443f33af'}, {'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/commit/ff806ab173a504395fdfb3139eb0a29444ab4b91'}, {'type': 'WEB', 'url': 'https://docs.wagtail.org/en/stable/reference/contrib/modeladmin/chooseparentview.html#customising-chooseparentview'}, {'type': 'WEB', 'url': 'https://docs.wagtail.org/en/stable/reference/contrib/modeladmin/inspectview.html#enabling-customising-inspectview'}, {'type': 'PACKAGE', 'url': 'https://github.com/wagtail/wagtail'}, {'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/releases/tag/v4.1.4'}, {'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/releases/tag/v4.2.2'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-03T17:25:27Z', 'nvd_published_at': '2023-04-03T17:15:00Z'}
1.4.0
GHSA-fq95-rx4q-qgg2
2023-05-04T21:43:40Z
2023-04-27T17:12:46Z
null
['CVE-2023-2341']
Cross-site Scripting (XSS) in Admin Login too many attempts notice
### Impact Malicious JavaScript has access to all the same objects as the rest of the web page, including access to cookies and local storage, which are often used to store session tokens. If an attacker can obtain a user's session cookie, they can then impersonate that user. Furthermore, JavaScript can read and make arbitrary modifications to the contents of a page being displayed to a user. Therefore, XSS in conjunction with some clever social engineering opens up a lot of possibilities for an attacker. ### Patches Update to version 10.5.21 or apply this patch manually https://github.com/pimcore/pimcore/commit/66f1089fb1b9bcd575bfce9b1d4abb0f0499df11.patch ### Workarounds Apply patch https://github.com/pimcore/pimcore/commit/66f1089fb1b9bcd575bfce9b1d4abb0f0499df11.patch manually. ### References https://huntr.dev/bounties/cf3901ac-a649-478f-ab08-094ef759c11d/
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.21'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-fq95-rx4q-qgg2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2341'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/66f1089fb1b9bcd575bfce9b1d4abb0f0499df11'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/cf3901ac-a649-478f-ab08-094ef759c11d'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-27T17:12:46Z', 'nvd_published_at': None}
1.4.0
GHSA-33pv-vcgh-jfg9
2023-04-03T19:18:09Z
2023-04-03T19:18:09Z
null
['CVE-2023-28837']
Wagtail vulnerable to denial-of-service via memory exhaustion when uploading large files
### Impact A memory exhaustion bug exists in Wagtail's handling of uploaded images and documents. For both images and documents, files are loaded into memory during upload for additional processing. A user with access to upload images or documents through the Wagtail admin interface could upload a file so large that it results in a crash or denial of service. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin. It can only be exploited by admin users with permission to upload images or documents. Image uploads are [restricted to 10MB by default](https://docs.wagtail.org/en/stable/reference/settings.html#wagtailimages-max-upload-size), however this validation only happens on the frontend and on the backend after the vulnerable code. ### Patches Patched versions have been released as Wagtail 4.1.4 (for the LTS 4.1 branch) and Wagtail 4.2.2 (for the current 4.2 branch). ### Workarounds Site owners who are unable to upgrade to the new versions are encouraged to add extra protections outside of Wagtail to limit the size of uploaded files. Exactly how this is done will vary based on your hosting environment, but here are a few references for common setups: - Nginx: [`client_max_body_size`](https://nginx.org/en/docs/http/ngx_http_core_module.html#client_max_body_size) - Apache: [`LimitRequestBody`](https://httpd.apache.org/docs/2.4/mod/core.html#limitrequestbody) - Cloudflare: Already [imposes a limit of 100MB - 500MB](https://developers.cloudflare.com/cache/about/default-cache-behavior#customization-options-and-limitations) depending on plan - CloudFront: [`SizeConstraint`](https://docs.aws.amazon.com/waf/latest/APIReference/API_SizeConstraintStatement.html) - Traefik: [`traefik.http.middlewares.limit.buffering.maxRequestBodyBytes`](https://doc.traefik.io/traefik/middlewares/http/buffering/#maxrequestbodybytes) The changes themselves are deep inside Wagtail, making patching incredibly difficult.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'wagtail'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2'}, {'fixed': '4.2.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'wagtail'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/security/advisories/GHSA-33pv-vcgh-jfg9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28837'}, {'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/commit/3c0c64642b9e5b8d28b111263c7f4bddad6c3880'}, {'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/commit/c9d2fcd650a88d76ae122646142245e5927a9165'}, {'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/commit/cfa11bbe00dbe7ce8cd4c0bbfe2a898a690df2bf'}, {'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/commit/d4022310cbe497993459c3136311467c7ac6329a'}, {'type': 'WEB', 'url': 'https://docs.wagtail.org/en/stable/reference/settings.html#wagtailimages-max-upload-size'}, {'type': 'PACKAGE', 'url': 'https://github.com/wagtail/wagtail'}, {'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/releases/tag/v4.1.4'}, {'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/releases/tag/v4.2.2'}]
{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-03T19:18:09Z', 'nvd_published_at': '2023-04-03T17:15:00Z'}
1.4.0
GHSA-p3w6-3f7f-pm98
2023-04-04T17:12:59Z
2023-04-02T21:30:17Z
null
['CVE-2023-28675']
Jenkins OctoPerf Load Testing Plugin missing permission check allows for unauthorized server connections
Jenkins OctoPerf Load Testing Plugin Plugin 4.5.2 and earlier does not perform permission checks in several HTTP endpoints. This allows attackers with Overall/Read permission to connect to a previously configured Octoperf server using attacker-specified credentials. Additionally, these endpoints do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability. OctoPerf Load Testing Plugin Plugin 4.5.3 requires POST requests and the appropriate permissions for the affected HTTP endpoints.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkinsci.plugins:octoperf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.5.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28675'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/octoperf-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-03-21/#SECURITY-3067%20(4)'}]
{'cwe_ids': ['CWE-284', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-04T17:12:59Z', 'nvd_published_at': '2023-04-02T21:15:00Z'}
1.4.0
GHSA-23fx-92m6-4f2g
2023-05-04T20:05:12Z
2023-04-20T21:33:27Z
null
['CVE-2023-28458']
pretalx allows path traversal in HTML export
pretalx 2.3.1 before 2.3.2 allows path traversal in HTML export (a non-default feature). Organizers can trigger the overwriting (with the standard pretalx 404 page content) of an arbitrary file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pretalx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28458'}, {'type': 'WEB', 'url': 'https://github.com/pretalx/pretalx/commit/60722c43cf975f319e94102e6bff320723776890'}, {'type': 'PACKAGE', 'url': 'https://github.com/pretalx/pretalx'}, {'type': 'WEB', 'url': 'https://github.com/pretalx/pretalx/releases/tag/v2.3.2'}, {'type': 'WEB', 'url': 'https://pretalx.com/p/news/security-release-232/'}, {'type': 'WEB', 'url': 'https://www.sonarsource.com/blog/pretalx-vulnerabilities-how-to-get-accepted-at-every-conference/'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-21T19:39:52Z', 'nvd_published_at': None}
1.4.0
GHSA-gmxm-pr58-v5jc
2023-04-12T22:19:49Z
2023-04-12T18:30:37Z
null
['CVE-2023-30514']
Jenkins Azure Key Vault Plugin does not properly mask credentials
Multiple Jenkins plugins do not properly mask (i.e., replace with asterisks) credentials printed in the build log from Pipeline steps like sh and bat, when both of the following conditions are met: - The credentials are printed in build steps executing on an agent (typically inside a node block). - Push mode for durable task logging is enabled. This is a hidden option in Pipeline: Nodes and Processes that can be enabled through the Java system property org.jenkinsci.plugins.workflow.steps.durable_task.DurableTaskStep.USE_WATCHING. It is also automatically enabled by some plugins, e.g., OpenTelemetry and Pipeline Logging over CloudWatch. The following plugins are affected by this vulnerability: - Kubernetes 3909.v1f2c633e8590 and earlier (SECURITY-3079 / CVE-2023-30513) - Azure Key Vault 187.va_cd5fecd198a_ and earlier (SECURITY-3051 / CVE-2023-30514) - Thycotic DevOps Secrets Vault 1.0.0 (SECURITY-3078 / CVE-2023-30515) The following plugins have been updated to properly mask credentials in the build log when push mode for durable task logging is enabled: - Kubernetes 3910.ve59cec5e33ea_ (SECURITY-3079 / CVE-2023-30513) - Azure Key Vault 188.vf46b_7fa_846a_1 (SECURITY-3051 / CVE-2023-30514) As of publication of this advisory, there is no fix available for the following plugin: - Thycotic DevOps Secrets Vault 1.0.0 (SECURITY-3078 / CVE-2023-30515)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:azure-keyvault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '188.vf46b'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30514'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-04-12/#SECURITY-3075'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/04/13/3'}]
{'cwe_ids': ['CWE-319'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-12T22:19:49Z', 'nvd_published_at': '2023-04-12T18:15:00Z'}
1.4.0
GHSA-vq5h-qgxm-2m39
2023-04-10T16:23:32Z
2023-04-02T21:30:17Z
null
['CVE-2023-28680']
Jenkins Crap4J Plugin vulnerable to XML external entity (XXE) attacks
Jenkins Crap4J Plugin 0.9 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. This allows attackers able to control Crap Report file contents to have Jenkins parse a crafted XML document that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:crap4j'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28680'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/crap4j-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-03-21/#SECURITY-2925'}]
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-03T22:55:39Z', 'nvd_published_at': '2023-04-02T21:15:00Z'}
1.4.0
GHSA-fp36-mjw5-fmgx
2023-04-20T21:39:56Z
2023-04-20T21:39:56Z
null
['CVE-2023-29513']
xwiki-platform-web-templates allows users to be created even when registration is disabled without validation via template macro
### Impact If a guest has view rights on any document, it's possible to create a new user using the `distribution/firstadminuser.wiki` in the wrong context. To reproduce: * On a wiki with view rights for guests but user registration disabled, open as guest <server>/xwiki/bin/view/Main?sheet=CKEditor.HTMLConverter&language=en&sourceSyntax=xwiki%2F2.1&stripHTMLEnvelope=true&fromHTML=false&toHTML=true&text=%7B%7Btemplate+name%3D%22distribution%2Ffirstadminuser.wiki%22+%2F%7D%7D where <server> is the URL of your XWiki installation. * Enter username and password of your choice. * Click "Register and login" ### Patches The vulnerability has been patched in XWiki 15.0-rc-1 and 14.10.1. ### Workarounds There is no known workaround other than upgrading. ### References https://jira.xwiki.org/browse/XWIKI-19852 https://jira.xwiki.org/browse/XWIKI-20400 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0-rc-1'}, {'fixed': '14.10.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-fp36-mjw5-fmgx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29513'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-19852'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20400'}]
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-20T21:39:56Z', 'nvd_published_at': None}
1.4.0
GHSA-h3r8-h5qw-4r35
2023-05-01T18:35:53Z
2023-04-21T06:30:19Z
null
['CVE-2023-1892']
sidekiq vulnerable to cross-site scripting
sidekiq from 7.0.4 to 7.0.7 is vulnerable to reflected cross-site scripting. A fix was released in version 7.0.8.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'sidekiq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.4'}, {'fixed': '7.0.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1892'}, {'type': 'WEB', 'url': 'https://github.com/sidekiq/sidekiq/commit/458fdf74176a9881478c48dc5cf0269107b22214'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/sidekiq/CVE-2023-1892.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/sidekiq/sidekiq'}, {'type': 'WEB', 'url': 'https://github.com/sidekiq/sidekiq/blob/main/Changes.md#708'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/e35e5653-c429-4fb8-94a3-cbc123ae4777'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-24T20:20:49Z', 'nvd_published_at': None}
1.4.0
GHSA-7c44-m589-36w7
2023-04-10T16:31:08Z
2023-04-02T21:30:17Z
null
['CVE-2023-28677']
Jenkins Convert To Pipeline Plugin vulnerable to command injection
Jenkins Convert To Pipeline Plugin 1.0 and earlier uses basic string concatenation to convert Freestyle projects' Build Environment, Build Steps, and Post-build Actions to the equivalent Pipeline step invocations. This allows attackers able to configure Freestyle projects to prepare a crafted configuration that injects Pipeline script code into the (unsandboxed) Pipeline resulting from a conversion by Convert To Pipeline Plugin. If an administrator converts the Freestyle project to a Pipeline, the script will be pre-approved.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:convert-to-pipeline'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28677'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/convert-to-pipeline-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-03-21/#SECURITY-2966'}]
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-04T17:11:17Z', 'nvd_published_at': '2023-04-02T21:15:00Z'}
1.4.0
GHSA-5cx2-vq3h-x52c
2023-05-24T18:34:30Z
2023-04-24T18:30:30Z
null
['CVE-2023-27524']
Apache superset missing check for default SECRET_KEY
Session Validation attacks in Apache Superset versions up to and including 2.0.1. Installations that have not altered the default configured SECRET_KEY according to installation instructions allow for an attacker to authenticate and access unauthorized resources. This does not affect Superset administrators who have changed the default value for SECRET_KEY config.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27524'}, {'type': 'WEB', 'url': 'https://github.com/apache/superset/commit/b180319bbf08e876ea84963220ebebbfd0699e03'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/superset'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/n0ftx60sllf527j7g11kmt24wvof8xyk'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/172522/Apache-Superset-2.0.0-Authentication-Bypass.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/04/24/2'}]
{'cwe_ids': ['CWE-1188'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-24T22:37:53Z', 'nvd_published_at': None}
1.4.0
GHSA-622w-995c-3c3h
2023-04-07T19:22:38Z
2023-04-07T19:22:38Z
null
['CVE-2023-29015']
Goobi viewer Core has Cross-Site Scripting Vulnerability in User Comments
### Impact A cross-site scripting vulnerability has been identified in the user comment feature of Goobi viewer core. An attacker could create a specially crafted comment, resulting in the execution of malicious script code in the user's browser when displaying the comment. ### Patches The vulnerability has been fixed in version 23.03 If you have any questions or comments about this advisory: * Email us at [support@intranda.com](mailto:support@intranda.com)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.goobi.viewer:viewer-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '23.03'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/intranda/goobi-viewer-core/security/advisories/GHSA-622w-995c-3c3h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29015'}, {'type': 'WEB', 'url': 'https://github.com/intranda/goobi-viewer-core/commit/f0ccde2d469efd9597c3062d00177a63341f2256'}, {'type': 'PACKAGE', 'url': 'https://github.com/intranda/goobi-viewer-core'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-07T19:22:38Z', 'nvd_published_at': '2023-04-06T20:15:00Z'}
1.4.0
GHSA-88qf-5f3v-pm6m
2023-05-04T19:48:35Z
2023-04-24T18:30:31Z
null
['CVE-2023-29566']
Remote code execution in dawnsparks-node-tesseract
dawnsparks-node-tesseract before 0.4.1 was discovered to contain a remote code execution (RCE) vulnerability via the child_process function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'dawnsparks-node-tesseract'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29566'}, {'type': 'WEB', 'url': 'https://github.com/rona-dinihari/dawnsparks-node-tesseract/commit/81d1664f0b9fe521534acfae1d5b9c40127b36c1'}, {'type': 'WEB', 'url': 'https://github.com/omnitaint/Vulnerability-Reports/blob/ec3645003c7f8996459b5b24c722474adc2d599f/reports/dawnsparks-node-tesseract/report.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/rona-dinihari/dawnsparks-node-tesseract'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/dawnsparks-node-tesseract'}]
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-24T22:45:54Z', 'nvd_published_at': None}
1.4.0
GHSA-2295-vh28-pphc
2023-05-10T00:39:55Z
2023-04-27T19:37:45Z
null
['CVE-2023-2328']
Cross-site Scripting (XSS) in DataObjects QuantityValue Unit Definition
### Impact This vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites. ### Patches Update to version 10.5.21 or apply these patches manually https://github.com/pimcore/pimcore/commit/e3562bfe249c557d15474c9a0acd5e06628521fe.patch https://github.com/pimcore/pimcore/commit/b9c9ca2371aa643dbc4caca162ff3400266ff96f.patch ### Workarounds Apply patches: https://github.com/pimcore/pimcore/commit/e3562bfe249c557d15474c9a0acd5e06628521fe.patch https://github.com/pimcore/pimcore/commit/b9c9ca2371aa643dbc4caca162ff3400266ff96f.patch ### References https://huntr.dev/bounties/01a44584-e36b-46f4-ad94-53af488397f6/
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.21'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-2295-vh28-pphc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2328'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/e3562bfe249c557d15474c9a0acd5e06628521fe'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/01a44584-e36b-46f4-ad94-53af488397f6'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-27T19:37:45Z', 'nvd_published_at': None}
1.4.0
GHSA-3989-4c6x-725f
2023-04-20T22:00:14Z
2023-04-20T22:00:14Z
null
['CVE-2023-29516']
XWiki Platform vulnerable to privilege escalation from view right on XWiki.AttachmentSelector
### Impact Any user with view rights on `XWiki.AttachmentSelector` can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping in the "Cancel and return to page" button. This page is installed by default. See https://jira.xwiki.org/browse/XWIKI-20275 for the reproduction steps. ### Patches The vulnerability has been patched in XWiki 15.0-rc-1, 14.10.1, 14.4.8, and 13.10.11. ### Workarounds The issue can be fixed by applying this [patch](https://github.com/xwiki/xwiki-platform/commit/aca1d677c58563bbe6e35c9e1c29fd8b12ebb996) on `XWiki.AttachmentSelector`. ### References - https://github.com/xwiki/xwiki-platform/commit/aca1d677c58563bbe6e35c9e1c29fd8b12ebb996 - https://jira.xwiki.org/browse/XWIKI-20275 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-attachment-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0-rc-2'}, {'fixed': '13.10.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-attachment-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0-rc-1'}, {'fixed': '14.4.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-attachment-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.10.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-3989-4c6x-725f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29516'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/aca1d677c58563bbe6e35c9e1c29fd8b12ebb996'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20275'}]
{'cwe_ids': ['CWE-74', 'CWE-95'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-20T22:00:14Z', 'nvd_published_at': None}
1.4.0
GHSA-hmm7-6ph9-8jf2
2023-04-26T17:02:56Z
2023-04-12T20:36:36Z
null
['CVE-2023-29508']
org.xwiki.platform:xwiki-platform-livedata-macro vulnerable to Basic Cross-site Scripting
### Impact A user without script rights can introduce a stored XSS by using the Live Data macro, if the last author of the content of the page has script rights. For instance, by adding the LiveData below in the about section of the profile of a user created by an admin. ```javascript {{liveData id="movies" properties="title,description"}} { "data": { "count": 1, "entries": [ { "title": "Meet John Doe", "url": "https://www.imdb.com/title/tt0033891/", "description": "<img onerror='alert(1)' src='foo' />" } ] }, "meta": { "propertyDescriptors": [ { "id": "title", "name": "Title", "visible": true, "displayer": {"id": "link", "propertyHref": "url"} }, { "id": "description", "name": "Description", "visible": true, "displayer": "html" } ] } } {{/liveData}} ``` ### Patches This has been patched in XWiki 14.10, 14.4.7, and 13.10.11. ### Workarounds No known workaround. ### References - https://jira.xwiki.org/browse/XWIKI-20312 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira](http://jira.xwiki.org/) * Email us at [Security ML](mailto:security@xwiki.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-livedata-macro'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '13.10.10'}, {'fixed': '13.10.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-livedata-macro'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.4'}, {'fixed': '14.4.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-livedata-macro'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.9'}, {'fixed': '14.10'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-hmm7-6ph9-8jf2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29508'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20312'}]
{'cwe_ids': ['CWE-79', 'CWE-80'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-12T20:36:36Z', 'nvd_published_at': '2023-04-16T08:15:00Z'}
1.4.0
GHSA-ch89-5g45-qwc7
2023-05-11T20:54:34Z
2023-04-27T17:08:37Z
null
['CVE-2023-30624']
Undefined Behavior in Rust runtime functions
### Impact Wasmtime's implementation of managing per-instance state, such as tables and memories, contains LLVM-level undefined behavior. This undefined behavior was found to cause runtime-level issues when compiled with LLVM 16 which causes some writes, which are critical for correctness, to be optimized away. Vulnerable versions of Wasmtime compiled with Rust 1.70, which is currently in beta, or later are known to have incorrectly compiled functions. Versions of Wasmtime compiled with the current Rust stable release, 1.69, and prior are not known at this time to have any issues, but can theoretically exhibit potential issues. The underlying problem is that Wasmtime's runtime state for an instance involves a Rust-defined structure called `Instance` which has a trailing `VMContext` structure after it. This `VMContext` structure has a runtime-defined layout that is unique per-module. This representation cannot be expressed with safe code in Rust so `unsafe` code is required to maintain this state. The code doing this, however, has methods which take `&self` as an argument but modify data in the `VMContext` part of the allocation. This means that pointers derived from `&self` are mutated. This is typically not allowed, except in the presence of `UnsafeCell`, in Rust. When compiled to LLVM these functions have `noalias readonly` parameters which means it's UB to write through the pointers. Wasmtime's internal representation and management of `VMContext` has been updated to use `&mut self` methods where appropriate. Additionally verification tools for `unsafe` code in Rust, such as `cargo miri`, are planned to be executed on the `main` branch soon to fix any Rust-level issues that may be exploited in future compiler versions. Precomplied binaries available for Wasmtime from GitHub releases have been compiled with at most LLVM 15 so are not known to be vulnerable. As mentioned above, however, it's still recommended to update. ### Patches Wasmtime version 6.0.2, 7.0.1, and 8.0.1 have been issued which contain the patch necessary to work correctly on LLVM 16 and have no known UB on LLVM 15 and earlier. ### Workarounds If Wasmtime is compiled with Rust 1.69 and prior, which use LLVM 15, then there are no known issues. There is a theoretical possibility for UB to exploited, however, so it's recommended that users upgrade to a patched version of Wasmtime. Users using beta Rust (1.70 at this time) or nightly Rust (1.71 at this time) must update to a patched version to work correctly. ### References * [GitHub Advisory](https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-ch89-5g45-qwc7) * [Mailing list announcement](https://groups.google.com/a/bytecodealliance.org/g/sec-announce/c/ecK-6G2yi90) ### For more information If you have any questions or comments about this advisory: * Reach out to us on [the Bytecode Alliance Zulip chat](https://bytecodealliance.zulipchat.com/#narrow/stream/217126-wasmtime) * Open an issue in [the bytecodealliance/wasmtime repository](https://github.com/bytecodealliance/wasmtime/)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'wasmtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.2'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'wasmtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.1'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'wasmtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.0.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-ch89-5g45-qwc7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30624'}, {'type': 'WEB', 'url': 'https://github.com/bytecodealliance/wasmtime/commit/0977952dcd9d482bff7c288868ccb52769b3a92e'}, {'type': 'PACKAGE', 'url': 'https://github.com/bytecodealliance/wasmtime'}, {'type': 'WEB', 'url': 'https://groups.google.com/a/bytecodealliance.org/g/sec-announce/c/ecK-6G2yi90'}]
{'cwe_ids': ['CWE-758'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-04-27T17:08:37Z', 'nvd_published_at': None}
1.4.0
GHSA-93hq-5wgc-jc82
2023-04-27T15:35:33Z
2023-04-20T14:11:03Z
null
['CVE-2023-30542']
GovernorCompatibilityBravo may trim proposal calldata
### Impact The proposal creation entrypoint (`propose`) in `GovernorCompatibilityBravo` allows the creation of proposals with a `signatures` array shorter than the `calldatas` array. This causes the additional elements of the latter to be ignored, and if the proposal succeeds the corresponding actions would eventually execute without any calldata. The `ProposalCreated` event correctly represents what will eventually execute, but the proposal parameters as queried through `getActions` appear to respect the original intended calldata. ### Patches This issue has been patched in v4.8.3. ### Workarounds Ensure that all proposals that pass through governance have equal length `signatures` and `calldatas` parameters.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.8.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts-upgradeable'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.8.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-93hq-5wgc-jc82'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30542'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/commit/8d633cb7d169f2f8595b273660b00b69e845c2fe'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/releases/tag/v4.8.3'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-20T14:11:03Z', 'nvd_published_at': '2023-04-16T08:15:00Z'}
1.4.0
GHSA-x37v-36wv-6v6h
2023-04-20T20:55:02Z
2023-04-20T20:55:02Z
null
['CVE-2023-29528']
Cross-site Scripting in org.xwiki.commons:xwiki-commons-xml
### Impact The "restricted" mode of the HTML cleaner in XWiki, introduced in version 4.2-milestone-1 and massively improved in version 14.6-rc-1, allowed the injection of arbitrary HTML code and thus cross-site scripting via invalid HTML comments. As a consequence, any code relying on this "restricted" mode for security is vulnerable to JavaScript injection ("cross-site scripting"/XSS). An example are anonymous comments in XWiki where the HTML macro filters HTML using restricted mode: ```html {{html}} <!--> <Details Open OnToggle=confirm("XSS")> {{/html}} ``` When a privileged user with programming rights visits such a comment in XWiki, the malicious JavaScript code is executed in the context of the user session. This allows server-side code execution with programming rights, impacting the confidentiality, integrity and availability of the XWiki instance. Note that while all versions since 4.2-milestone-1 should be vulnerable, only starting with version 14.6-rc-1 the HTML comment is necessary for the attack to succeed due to [another vulnerability](https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-m3jr-cvhj-f35j) that has been patched in version 14.6-rc-1. ### Patches This problem has been patched in XWiki 14.10, HTML comments are now removed in restricted mode and a check has been introduced that ensures that comments don't start with `>`. ### Workarounds There are no known workarounds apart from upgrading to a version including the fix. ### References * https://jira.xwiki.org/browse/XCOMMONS-2568 * https://jira.xwiki.org/browse/XWIKI-20348 * https://github.com/xwiki/xwiki-commons/commit/8ff1a9d7e5d7b45b690134a537d53dc05cae04ab ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki](https://jira.xwiki.org/) * Email us at [XWiki Security mailing-list](mailto:security@xwiki.org) ### Attribution This vulnerability was reported on Intigriti by [ynoof](https://twitter.com/ynoofAssiri) @Ynoof5.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.commons:xwiki-commons-xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2-milestone-1'}, {'fixed': '14.10'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-x37v-36wv-6v6h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29528'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-commons/commit/8ff1a9d7e5d7b45b690134a537d53dc05cae04ab'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-commons'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XCOMMONS-2568'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20348'}]
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-20T20:55:02Z', 'nvd_published_at': None}
1.4.0
GHSA-44h9-xxvx-pg6x
2023-04-28T20:05:14Z
2023-04-20T21:58:10Z
null
['CVE-2023-29515']
XWiki App Within Minutes app grants space admin rights that allows cross-site scripting
### Impact Any user who can create a space can become admin of that space through App Within Minutes. The admin right implies the script right and thus allows JavaScript injection. The vulnerability can be exploited by creating an app in App Within Minutes. If the button should be disabled because the user doesn't have global edit right, the app can also be created by directly opening `/xwiki/bin/view/AppWithinMinutes/CreateApplication?wizard=true` on the XWiki installation. ### Patches This has been patched in XWiki 13.10.11, 14.4.8, 14.10.1 and 15.0 RC1 by not granting the space admin right if the user doesn't have script right on the space where the app is created. Error message are displayed to warn the user that the app will be broken in this case. Users who became space admin through this vulnerability won't loose the space admin right due to the fix, so it is advised to check if all users who created AWM apps should keep their space admin rights. ### Workarounds The patch can be applied by patching the affected wiki documents, the most important one being `AppWithinMinutes.LiveTableEditSheet`. Further, the attack can be prevented by denying view access to `AppWithinMinutes.LiveTableEditSheet`. This only impacts creation and editing of App Within Minutes apps. ### References * https://jira.xwiki.org/browse/XWIKI-20190 * https://github.com/xwiki/xwiki-platform/commit/e73b890623efa604adc484ad82f37e31596fe1a6 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-appwithinminutes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0-milestone-2'}, {'fixed': '4.2-milestone-1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-appwithinminutes-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2-milestone-1'}, {'fixed': '13.10.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-appwithinminutes-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0-rc-1'}, {'fixed': '14.4.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-appwithinminutes-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.10.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-44h9-xxvx-pg6x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29515'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/e73b890623efa604adc484ad82f37e31596fe1a6'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20190'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-20T21:58:10Z', 'nvd_published_at': None}
1.4.0
GHSA-38jc-2rwx-qgxr
2023-04-12T22:19:45Z
2023-04-12T18:30:37Z
null
['CVE-2023-30516']
Jenkins Image Tag Parameter Plugin improperly introduces option to opt out of SSL/TLS certificate validation
Jenkins Image Tag Parameter Plugin 2.0 improperly introduces an option to opt out of SSL/TLS certificate validation when connecting to Docker registries. Job configurations using Image Tag Parameters that were created before 2.0 will have SSL/TLS certificate validation disabled by default.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:image-tag-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30516'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-04-12/#SECURITY-2840'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/04/13/3'}]
{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-12T22:19:45Z', 'nvd_published_at': '2023-04-12T18:15:00Z'}
1.4.0
GHSA-8p48-ghv5-7qq7
2023-04-06T15:05:59Z
2023-04-05T18:30:18Z
null
['CVE-2023-1756']
thorsten/phpmyfaq vulnerable to stored cross-site scripting (XSS) via HTML export
thorsten/phpmyfaq prior to 3.1.12 is vulnerable to stored cross-site scripting (XSS) because it fails to sanitize user input in the FAQ site while generating an HTML Export. This has been fixed in 3.1.12.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1756'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/ca75f4688a8b0f14d5d0697b9f4b6ea66088f726'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpMyFAQ'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/e495b443-b328-42f5-aed5-d68b929b4cb9'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-06T15:05:59Z', 'nvd_published_at': '2023-04-05T16:15:00Z'}
1.4.0
GHSA-4f8g-fq6x-jqrr
2023-04-16T07:16:53Z
2023-04-12T20:34:55Z
null
['CVE-2023-29208']
org.xwiki.platform:xwiki-platform-oldcore vulnerable to data leak through deleted documents
### Impact Rights added to a document are not taken into account for viewing it once it's deleted. Note that this vulnerability only impact deleted documents that where containing view rights: the view rights provided on a space of a deleted document are properly checked. ### Patches The problem has been patched in XWiki 14.10 by checking the rights of current user: only admin and deleter of the document are allowed to view it. ### Workarounds There is no workaround for this vulnerability other than upgrading. ### References * Jira ticket: https://jira.xwiki.org/browse/XWIKI-16285 * Commit: https://github.com/xwiki/xwiki-platform/commit/d9e947559077e947315bf700c5703dfc7dd8a8d7 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira](https://jira.xwiki.org) * Email us at [security ML](mailto:security@xwiki.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2-milestone-1'}, {'fixed': '13.10.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0-rc-1'}, {'fixed': '14.4.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.10'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-4f8g-fq6x-jqrr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29208'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/d9e947559077e947315bf700c5703dfc7dd8a8d7'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-16285'}]
{'cwe_ids': ['CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-12T20:34:55Z', 'nvd_published_at': '2023-04-15T16:15:00Z'}
1.4.0
GHSA-8jg3-rx43-3fv4
2023-04-19T17:11:07Z
2023-04-11T12:30:26Z
null
['CVE-2023-1974']
Answer vulnerable to Exposure of Sensitive Information Through Metadata
answerdev/answer is an open-source knowledge-based community software. Answer prior to 1.0.8 may expose sensitive information, such as EXIF data and GPS coordatinates, via image metadata.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1974'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/ac3f2f047ee00b4edaea7530e570ab67ff87cd6a'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/852781c6-9cc8-4d25-9336-bf3cb8ee3439'}]
{'cwe_ids': ['CWE-1230'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-11T21:31:50Z', 'nvd_published_at': '2023-04-11T10:15:00Z'}
1.4.0
GHSA-jc97-h3h9-7xh6
2023-04-03T17:18:51Z
2023-04-03T17:18:51Z
null
['CVE-2023-26103']
Regular Expression Denial of Service in Deno.upgradeWebSocket API
### Impact Versions of the package deno before 1.31.0 are vulnerable to Regular Expression Denial of Service (ReDoS) due to the upgradeWebSocket function, which contains regexes in the form of /s*,s*/, used for splitting the Connection/Upgrade header. A specially crafted Connection/Upgrade header can be used to significantly slow down a web socket server. ### Patches It is recommended that users upgrade to Deno 1.31.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'deno'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.0'}, {'fixed': '1.31.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/denoland/deno/security/advisories/GHSA-jc97-h3h9-7xh6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26103'}, {'type': 'WEB', 'url': 'https://github.com/denoland/deno/pull/17722'}, {'type': 'WEB', 'url': 'https://github.com/denoland/deno/commit/cf06a7c7e672880e1b38598fe445e2c50b4a9d06'}, {'type': 'PACKAGE', 'url': 'https://github.com/denoland/deno'}, {'type': 'WEB', 'url': 'https://github.com/denoland/deno/blob/2b247be517d789a37e532849e2e40b724af0918f/ext/http/01_http.js#L395-L409'}, {'type': 'WEB', 'url': 'https://github.com/denoland/deno/releases/tag/v1.31.0'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-RUST-DENO-3315970'}]
{'cwe_ids': ['CWE-1333'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-03T17:18:51Z', 'nvd_published_at': None}
1.4.0
GHSA-4v38-964c-xjmw
2023-04-19T18:26:35Z
2023-04-19T18:26:35Z
null
['CVE-2023-29510']
Code injection via unescaped translations in xwiki-platform
### Impact In XWiki, every user can add translations that are only applied to the current user. This also allows overriding existing translations. Such translations are often included in privileged contexts without any escaping which allows remote code execution for any user who has edit access on at least one document which could be the user's own profile where edit access is enabled by default. The following describes a proof of concept exploit to demonstrate this vulnerability: 1. Edit the user profile with the wiki editor and set the content to ``` error={{/html}} {{async async="true" cached="false" context="doc.reference"}}{{groovy}}println("hello from groovy!"){{/groovy}}{{/async}} ``` 2. Use the object editor to add an object of type `XWiki.TranslationDocumentClass` with scope `USER`. 3. Open the document `WikiManager.AdminWikiDescriptorSheet`. The expected result would be that a message with title `{{/html}} {{async async="true" cached="false" context="doc.reference"}}{{groovy}}println("hello from groovy!"){{/groovy}}{{/async}}` is displayed while in fact an error that the HTML macro couldn't be executed is displayed, followed by the text "hello from groovy!" and some raw HTML, showing that the Groovy macro has been executed. ### Patches A mitigation for this vulnerability is part of XWiki 14.10.2 and XWiki 15.0 RC1: translations with user scope now require script right. This means that regular users cannot exploit this anymore as users don't have script right by default anymore starting with XWiki 14.10. ### Workarounds There are no known workarounds apart from upgrading to a patched versions. ### References * https://jira.xwiki.org/browse/XWIKI-19749 * https://github.com/xwiki/xwiki-platform/commit/d06ff8a58480abc7f63eb1d4b8b366024d990643 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-administration-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3-milestone-2'}, {'fixed': '14.10.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-4v38-964c-xjmw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29510'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/d06ff8a58480abc7f63eb1d4b8b366024d990643'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-19749'}]
{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-19T18:26:35Z', 'nvd_published_at': None}