schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
stringlengths 20
20
⌀ | aliases
stringlengths 2
20
| summary
stringlengths 20
140
| details
stringlengths 56
37.2k
| severity
stringlengths 2
92
| affected
stringlengths 88
7.07k
| references
stringlengths 139
4.72k
| database_specific
stringlengths 131
185
|
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0
|
GHSA-vqxf-r9ph-cc9c
|
2023-05-22T20:36:06Z
|
2023-05-22T20:36:06Z
| null |
['CVE-2023-32679']
|
Craft CMS vulnerable to Remote Code Execution via unrestricted file extension
|
### Summary
Unrestricted file extension lead to a potential Remote Code Execution
(Authenticated, ALLOW_ADMIN_CHANGES=true)
### Details
#### Vulnerability Cause :
If the name parameter value is not empty string('') in the View.php's doesTemplateExist() -> resolveTemplate() -> _resolveTemplateInternal() -> _resolveTemplate() function, it returns directly without extension verification, so that arbitrary extension files are rendered as twig templates (even if they are not extensions set in defaultTemplateExtensions = ['html', 'twig'])
```php
/**
* Searches for a template files, and returns the first match if there is one.
*
* @param string $basePath The base path to be looking in.
* @param string $name The name of the template to be looking for.
* @param bool $publicOnly Whether to only look for public templates (template paths that don’t start with the private template trigger).
* @return string|null The matching file path, or `null`.
*/
private function _resolveTemplate(string $basePath, string $name, bool $publicOnly): ?string
{
// Normalize the path and name
$basePath = FileHelper::normalizePath($basePath);
$name = trim(FileHelper::normalizePath($name), '/');
// $name could be an empty string (e.g. to load the homepage template)
if ($name !== '') {
if ($publicOnly && preg_match(sprintf('/(^|\/)%s/', preg_quote($this->_privateTemplateTrigger, '/')), $name)) {
return null;
}
// Maybe $name is already the full file path
$testPath = $basePath . DIRECTORY_SEPARATOR . $name;
if (is_file($testPath)) {
return $testPath;
}
foreach ($this->_defaultTemplateExtensions as $extension) {
$testPath = $basePath . DIRECTORY_SEPARATOR . $name . '.' . $extension;
if (is_file($testPath)) {
return $testPath;
}
}
}
foreach ($this->_indexTemplateFilenames as $filename) {
foreach ($this->_defaultTemplateExtensions as $extension) {
$testPath = $basePath . ($name !== '' ? DIRECTORY_SEPARATOR . $name : '') . DIRECTORY_SEPARATOR . $filename . '.' . $extension;
if (is_file($testPath)) {
return $testPath;
}
}
}
return null;
}
```
When attacker with admin privileges on the DEV or Misconfigured STG, PROD, they can exploit this vulnerability to remote code execution **(ALLOW_ADMIN_CHANGES=true)**
### PoC
**Step 1)** Create a new filesystem. **Base Path: /var/www/html/templates**

**Step 2)** Create a new asset volume. **Asset Filesystem: template**

**Step 3)** Upload poc file( .txt , .js , .json , etc ) with twig template rce payload
```twig
{{'<pre>'}}
{{1337*1337}}
{{['cat /etc/passwd']|map('passthru')|join}}
{{['id;pwd;ls -altr /']|map('passthru')|join}}
```


**Step 4)** Create a new global set with template layout. The template filename is poc.js

**Step 5)** When access global menu or /admin/global/test, poc.js is rendered as a template file and RCE confirmed

**Step 6)** RCE can be confirmed on other menus(Entries, Categories) where the template file is loaded.


**Poc Environment)** ALLOW_ADMIN_CHANGES=true, defaultTemplateExtensions=['html','twig']



### Impact
Take control of vulnerable systems, Data exfiltrations, Malware execution, Pivoting, etc.
Additionally, there are 371 domains using CraftCMS exposed on Shodan, and among them, 33 servers have "stage" or "dev" included in their hostnames.
although the vulnerability is exploitable only in the authenticated users, configuration with ALLOW_ADMIN_CHANGES=true, there is still a potential security threat (Remote Code Execution)

### Remediation
Recommend taking measures by referring to https://github.com/craftcms/cms-ghsa-9f84-5wpf-3vcf/pull/1
```php
// Maybe $name is already the full file path
$testPath = $basePath . DIRECTORY_SEPARATOR . $name;
if (is_file($testPath)) {
// Remedation: Verify template file extension, before return
$fileExt = pathinfo($testPath, PATHINFO_EXTENSION);
$isDisallowed = false;
if (isset($fileExt)) {
$isDisallowed = !in_array($fileExt, $this->_defaultTemplateExtensions);
if($isDisallowed) {
return null;
} else {
return $testPath;
}
}
}
```

|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.4.6'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/craftcms/cms/security/advisories/GHSA-vqxf-r9ph-cc9c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32679'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftcms/cms'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/releases/tag/4.4.6'}]
|
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-22T20:36:06Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-qvq8-cw7f-m7m4
|
2023-06-03T00:39:55Z
|
2023-05-25T09:30:25Z
| null |
['CVE-2022-46907']
|
Apache JSPWiki vulnerable to cross-site scripting on several plugins
|
A carefully crafted request on several JSPWiki plugins could trigger an XSS vulnerability on Apache JSPWiki, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.12.0 or later.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jspwiki:jspwiki-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.12.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.jspwiki:jspwiki-war'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.12.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46907'}, {'type': 'WEB', 'url': 'https://github.com/apache/jspwiki/commit/0b9a0149032170063f22d65e335dfd317db815ea'}, {'type': 'WEB', 'url': 'https://github.com/apache/jspwiki/commit/46e1ef7a595ca5cabf5ef184139910413f2024fc'}, {'type': 'WEB', 'url': 'https://github.com/apache/jspwiki/commit/484c6a133e397693991b7c9a9b62ef3ca48ce707'}, {'type': 'WEB', 'url': 'https://github.com/apache/jspwiki/commit/75019d337f1d0033b1f65428e75f43baeffd99dd'}, {'type': 'WEB', 'url': 'https://github.com/apache/jspwiki/commit/82be08904a6d8bd22fa2d4e5a7e85f43408724d3'}, {'type': 'WEB', 'url': 'https://github.com/apache/jspwiki/commit/9d6dbf911d52d724297e4e46c4b80649fb028ff9'}, {'type': 'WEB', 'url': 'https://github.com/apache/jspwiki/commit/df20770f251a8d7431047e556b144ef24ee6a3a7'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/jspwiki'}, {'type': 'WEB', 'url': 'https://github.com/apache/jspwiki/blob/37bf55373ed5a739a388a720163cf51d1104537f/ChangeLog.md?plain=1#L112'}, {'type': 'WEB', 'url': 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2022-46907'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/1m0mkq2nttx8tn94m11mytn4f0tv1504'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/05/25/1'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-25T17:38:08Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-mhpj-7m7h-8p6x
|
2023-05-11T20:29:01Z
|
2023-05-11T20:29:01Z
| null |
['CVE-2023-2616']
|
Pimcore Cross-site Scripting (XSS) in Static Routes name field
|
### Impact
This vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites.
### Patches
Update to version 10.5.21 or apply this patch manually:
https://github.com/pimcore/pimcore/commit/07a2c95be524c7e20105cef58c5767d4ebb06091.patch
### Workarounds
Apply patches manually:
https://github.com/pimcore/pimcore/commit/07a2c95be524c7e20105cef58c5767d4ebb06091.patch
### References
https://huntr.dev/bounties/564cb512-2bcc-4458-8c20-88110ab45801/
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.21'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-mhpj-7m7h-8p6x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2616'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/07a2c95be524c7e20105cef58c5767d4ebb06091'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/564cb512-2bcc-4458-8c20-88110ab45801'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-11T20:29:01Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-wmfc-g86p-fjvr
|
2023-05-31T18:26:12Z
|
2023-05-30T15:30:27Z
| null |
['CVE-2023-2981']
|
go package pydio cells vulnerable to cross-site scripting
|
A vulnerability, which was classified as problematic, has been found in Abstrium Pydio Cells 4.2.0. This issue affects some unknown processing of the component Chat. The manipulation leads to basic cross site scripting. The attack may be initiated remotely. Upgrading to version 4.2.1 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-230213 was assigned to this vulnerability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/pydio/cells'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2981'}, {'type': 'PACKAGE', 'url': 'https://github.com/pydio/cells'}, {'type': 'WEB', 'url': 'https://pydio.com/en/community/releases/pydio-cells/pydio-cells-enterprise-421'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.230213'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.230213'}]
|
{'cwe_ids': ['CWE-80'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-05-31T18:26:12Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-p5gc-c584-jj6v
|
2023-05-17T03:49:37Z
|
2023-05-17T03:49:37Z
| null |
['CVE-2023-32313']
|
vm2 vulnerable to Inspect Manipulation
|
In versions 3.9.17 and lower of vm2 it was possible to get a read-write reference to the node `inspect` method and edit options for `console.log`.
### Impact
A threat actor can edit options for `console.log`.
### Patches
This vulnerability was patched in the release of version `3.9.18` of `vm2`.
### Workarounds
After creating a vm make the `inspect` method readonly with `vm.readonly(inspect)`.
### References
PoC - https://gist.github.com/arkark/c1c57eaf3e0a649af1a70c2b93b17550
### For more information
If you have any questions or comments about this advisory:
- Open an issue in [VM2](https://github.com/patriksimek/vm2)
Thanks to @arkark (Takeshi Kaneko) of GMO Cybersecurity by Ierae, Inc. for disclosing this vulnerability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'vm2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.18'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/security/advisories/GHSA-p5gc-c584-jj6v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32313'}, {'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/commit/5206ba25afd86ef547a2c9d48d46ca7a9e6ec238'}, {'type': 'WEB', 'url': 'https://gist.github.com/arkark/c1c57eaf3e0a649af1a70c2b93b17550'}, {'type': 'PACKAGE', 'url': 'https://github.com/patriksimek/vm2'}, {'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/releases/tag/3.9.18'}]
|
{'cwe_ids': ['CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T03:49:37Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-h79m-5cm2-278c
|
2023-05-30T06:48:22Z
|
2023-05-22T18:30:27Z
| null |
['CVE-2023-31101']
|
User data exposure in Apache InLong
|
Insecure Default Initialization of Resource Vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.5.0 through 1.6.0. Users registered in InLong who joined later can see deleted users' data. Users are advised to upgrade to Apache InLong's 1.7.0 or cherry-pick https://github.com/apache/inlong/pull/7836 to solve it.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.inlong:manager-dao'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.7.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.inlong:manager-pojo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.7.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.inlong:manager-service'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.7.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.inlong:manager-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.7.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31101'}, {'type': 'WEB', 'url': 'https://github.com/apache/inlong/pull/7836'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/inlong'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/shvwwr6toqz5rr39rwh4k03z08sh9jmr'}]
|
{'cwe_ids': ['CWE-1188'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-22T20:01:36Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-g2mc-fqqc-hxg3
|
2023-05-09T16:38:37Z
|
2023-05-02T16:43:08Z
| null |
['CVE-2023-30855']
|
Pimcore Path Traversal Vulnerability in AdminBundle/Controller/Reports/CustomReportController.php
|
### Impact
The impact of this path traversal and arbitrary extension is limited (creation of arbitrary files and appending data to existing files) but when combined with the SQL Injection, the exported data `RESTRICTED DIFFUSION 9 / 9` can be controlled and a webshell can be uploaded. Attackers can use that to execute arbitrary PHP code on the server with the permissions of the webserver.
### Patches
Update to version 10.5.18 or apply this patch manually https://github.com/pimcore/pimcore/commit/7f788fa44bc18bc1c9182c25e26b770a1d30b62f.patch
### Workarounds
Apply patch https://github.com/pimcore/pimcore/commit/7f788fa44bc18bc1c9182c25e26b770a1d30b62f.patch manually.
### References
https://github.com/pimcore/pimcore/pull/14498
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.18'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-g2mc-fqqc-hxg3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30855'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/14498'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/7f788fa44bc18bc1c9182c25e26b770a1d30b62f.patch'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/f1d904094700b513c4756904fa2b1e19d08d890e.patch'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-02T16:43:08Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-3p4g-rcw5-8298
|
2023-05-12T20:19:50Z
|
2023-05-12T20:19:50Z
| null |
['CVE-2023-32082']
|
etcd Key name can be accessed via LeaseTimeToLive API
|
### Impact
LeaseTimeToLive API allows access to key names (not value) associated to a lease when `Keys` parameter is true, even a user doesn't have read permission to the keys. The impact is limited to a cluster which enables auth (RBAC).
### Patches
< v3.4.26 and < v3.5.9 are affected.
### Workarounds
No.
### Reporter
Yoni Rozenshein
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/etcd-io/etcd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.26'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/etcd-io/etcd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5.0'}, {'fixed': '3.5.9'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/etcd-io/etcd/security/advisories/GHSA-3p4g-rcw5-8298'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32082'}, {'type': 'WEB', 'url': 'https://github.com/etcd-io/etcd/pull/15656'}, {'type': 'PACKAGE', 'url': 'https://github.com/etcd-io/etcd'}, {'type': 'WEB', 'url': 'https://github.com/etcd-io/etcd/blob/main/CHANGELOG/CHANGELOG-3.4.md'}, {'type': 'WEB', 'url': 'https://github.com/etcd-io/etcd/blob/main/CHANGELOG/CHANGELOG-3.5.md'}]
|
{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-05-12T20:19:50Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-6qjx-787v-6pxr
|
2023-05-26T21:50:24Z
|
2023-05-26T13:56:26Z
| null |
['CVE-2023-33197']
|
Craft CMS stored XSS in indexedVolumes
|
### Summary
XSS can be triggered via the Update Asset Index utility
### PoC
1. Access setting tab
2. Create new assets
3. In assets name inject payload: "<script>alert(26)</script>
4. Click Utilities tab
5. Choose all volumes, or volume trigger xss
7. Click Update asset indexes.
XSS will be triggered
Json response volumes name makes triggers the payload
"session":{"id":1,"indexedVolumes":{"1":"\"<script>alert(26)</script>"},
It’s run on every POST request in the utility.
Resolved in https://github.com/craftcms/cms/commit/8c2ad0bd313015b8ee42326af2848ee748f1d766
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-RC1'}, {'fixed': '4.4.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.4.5'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/craftcms/cms/security/advisories/GHSA-6qjx-787v-6pxr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33197'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/commit/8c2ad0bd313015b8ee42326af2848ee748f1d766'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftcms/cms'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/releases/tag/4.4.6'}]
|
{'cwe_ids': ['CWE-79', 'CWE-80'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-26T13:56:26Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-36fm-j33w-c25f
|
2023-05-11T20:36:59Z
|
2023-05-11T20:36:59Z
| null |
['CVE-2023-32069']
|
Privilege escalation (PR)/RCE from account through class sheet
|
### Impact
It's possible for a user to execute anything with the right of the author of the XWiki.ClassSheet document.
**Steps to Reproduce:**
1. Edit your user profile with the object editor and add an object of type `DocumentSheetBinding` with value `Default Class Sheet`
1. Edit your user profile with the wiki editor and add the syntax `{{async}}{{groovy}}println("Hello " + "from groovy!"){{/groovy}}{{/async}}`
1. Click "Save & View"
**Expected result:**
An error is displayed as the user doesn't have the right to execute the Groovy macro.
**Actual result:**
The text "Hello from groovy!" is displayed at the top of the document.
### Patches
This has been patched in XWiki 15.0-rc-1 and 14.10.4.
### Workarounds
There are no known workarounds for it.
### References
https://jira.xwiki.org/browse/XWIKI-20566
https://github.com/xwiki/xwiki-platform/commit/de72760d4a3e1e9be64a10660a0c19e9534e2ec4
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)
* Email us at [Security Mailing List](mailto:security@xwiki.org)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-test-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3-milestone-3'}, {'fixed': '14.10.4'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-36fm-j33w-c25f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32069'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/de72760d4a3e1e9be64a10660a0c19e9534e2ec4'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20566'}]
|
{'cwe_ids': ['CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-05-11T20:36:59Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-xxq2-74hw-vg6m
|
2023-05-17T03:46:29Z
|
2023-05-16T18:30:16Z
| null |
['CVE-2023-33005']
|
Jenkins WSO2 Oauth Plugin Session Fixation vulnerability
|
Jenkins WSO2 Oauth Plugin 1.0 and earlier does not invalidate the existing session on login.
This allows attackers to use social engineering techniques to gain administrator access to Jenkins.
As of publication of this advisory, there is no fix.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:wso2id-oauth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33005'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-2991'}]
|
{'cwe_ids': ['CWE-384', 'CWE-613'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T03:46:29Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-p74v-mwvg-8ghp
|
2023-06-07T13:51:44Z
|
2023-05-31T15:30:18Z
| null |
['CVE-2023-33736']
|
Dcat-Admin vulnerable to Stored Cross-site Scripting
|
A stored cross-site scripting (XSS) vulnerability in Dcat-Admin v2.1.3-beta allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the URL parameter.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'dcat/laravel-admin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.3-beta'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33736'}, {'type': 'WEB', 'url': 'https://github.com/jqhph/dcat-admin/issues/2027'}, {'type': 'PACKAGE', 'url': 'https://github.com/jqhph/dcat-admin'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T01:57:37Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-j657-pjgc-c4h6
|
2023-05-24T17:09:15Z
|
2023-05-17T09:30:16Z
| null |
['CVE-2023-2752']
|
phpMyFAQ vulnerable to stored Cross-site Scripting
|
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.2.0-beta.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.0-beta'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2752'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/e7599d49b0ece7ceef3a4e8d334782cc3df98be8'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpmyfaq'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/efdf5b24-6d30-4d57-a5b0-13b253ba3ea4'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T17:05:01Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-mj6p-3pc9-wf5m
|
2023-06-06T01:52:50Z
|
2023-05-30T18:30:23Z
| null |
['CVE-2023-2968']
|
proxy denial of service vulnerability
|
A remote attacker can trigger a denial of service in the `socket.remoteAddress` variable, by sending a crafted HTTP request. Usage of the undefined variable raises a TypeError exception.
|
[]
|
[{'package': {'ecosystem': 'npm', 'name': 'proxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2968'}, {'type': 'WEB', 'url': 'https://github.com/TooTallNate/proxy-agents/pull/178'}, {'type': 'WEB', 'url': 'https://github.com/TooTallNate/proxy-agents/commit/25e0c931390eb8f41c5ceaca72820de9198ece39'}, {'type': 'PACKAGE', 'url': 'https://github.com/TooTallNate/proxy-agents'}, {'type': 'WEB', 'url': 'https://research.jfrog.com/vulnerabilities/undefined-variable-usage-in-proxy-leads-to-remote-denial-of-service-xray-520917'}]
|
{'cwe_ids': ['CWE-232'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T01:52:50Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-95x4-j7vc-h8mf
|
2023-05-17T17:07:57Z
|
2023-05-17T17:07:57Z
| null |
['CVE-2023-26044']
|
ReactPHP's HTTP server continues parsing unused multipart parts after reaching input field and file upload limits
|
### Summary
Previous versions of ReactPHP's HTTP server component contain a potential DoS vulnerability that can cause high CPU load when processing large HTTP request bodies. This vulnerability has little to no impact on the default configuration, but can be exploited when explicitly using the `RequestBodyBufferMiddleware` with very large settings. This might lead to consuming large amounts of CPU time for processing requests and significantly delay or slow down the processing of legitimate user requests.
### Patches
The supplied patch resolves this vulnerability for ReactPHP.
### Workarounds
- Keeping the request body limit using `RequestBodyBufferMiddleware` sensible will mitigate it.
- Infrastructure or DevOps can place a reverse proxy in front of the ReactPHP HTTP server to filter out any excessive HTTP request bodies.
### References
A similar vulnerability was discovered in PHP recently, see also [PHP's security advisory](https://github.com/php/php-src/security/advisories/GHSA-54hq-v5wp-fqgv) (CVE-2023-0662). The fix is based on the [PHP-FPM fix](https://github.com/php/php-src/commit/716de0cff539f46294ef70fe75d548cd66766370#diff-81d659aa9e83177ac08151f99cebf21ab331d22462c72a1039f59947e66f5a35).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'react/http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8.0'}, {'fixed': '1.9.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/php/php-src/security/advisories/GHSA-54hq-v5wp-fqgv'}, {'type': 'WEB', 'url': 'https://github.com/reactphp/http/security/advisories/GHSA-95x4-j7vc-h8mf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26044'}, {'type': 'WEB', 'url': 'https://github.com/php/php-src/commit/716de0cff539f46294ef70fe75d548cd66766370#diff-81d659aa9e83177ac08151f99cebf21ab331d22462c72a1039f59947e66f5a35'}, {'type': 'WEB', 'url': 'https://github.com/reactphp/http/commit/9681f764b80c45ebfb5fe2ea7da5bd3babfcdcfd'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/react/http/CVE-2023-26044.yaml'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-95x4-j7vc-h8mf'}, {'type': 'PACKAGE', 'url': 'https://github.com/reactphp/http'}, {'type': 'WEB', 'url': 'https://github.com/reactphp/http/releases/tag/v1.9.0'}]
|
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T17:07:57Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-x487-866m-p8hr
|
2023-06-03T00:02:26Z
|
2023-05-26T15:30:21Z
| null |
['CVE-2023-30145']
|
Server-Side Template Injection in Camaleon CMS
|
Camaleon CMS prior to 2.7.4 was discovered to contain a Server-Side Template Injection (SSTI) vulnerability via the `formats` parameter.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'RubyGems', 'name': 'camaleon_cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30145'}, {'type': 'WEB', 'url': 'https://github.com/owen2345/camaleon-cms/issues/1052'}, {'type': 'WEB', 'url': 'https://github.com/owen2345/camaleon-cms/commit/4485788c544eb1aae52ca613bd9626129e3df6ee'}, {'type': 'WEB', 'url': 'https://book.hacktricks.xyz/pentesting-web/ssti-server-side-template-injection'}, {'type': 'WEB', 'url': 'https://drive.google.com/file/d/11MsSYqUnDRFjcwbQKJeL9Q8nWpgVYf2r/view?usp=share_link'}, {'type': 'PACKAGE', 'url': 'https://github.com/owen2345/camaleon-cms'}, {'type': 'WEB', 'url': 'https://github.com/owen2345/camaleon-cms/releases/tag/2.7.4'}, {'type': 'WEB', 'url': 'https://github.com/paragbagul111/CVE-2023-30145'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/camaleon_cms/CVE-2023-30145.yml'}, {'type': 'WEB', 'url': 'https://portswigger.net/research/server-side-template-injection'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/172593/Camaleon-CMS-2.7.0-Server-Side-Template-Injection.html'}]
|
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-05-26T19:44:38Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-c9qp-6556-jwwp
|
2023-05-17T02:56:57Z
|
2023-05-16T18:30:16Z
| null |
['CVE-2023-32978']
|
Jenkins LDAP Plugin vulnerable to Cross-Site Request Forgery
|
Jenkins LDAP Plugin 673.v034ec70ec2b_b_ and earlier does not require POST requests for a form validation method, resulting in a cross-site request forgery (CSRF) vulnerability.
This vulnerability allows attackers to connect to an attacker-specified LDAP server using attacker-specified credentials.
LDAP Plugin 676.vfa_64cf6b_b_002 requires POST requests for the affected form validation method.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ldap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '676.vfa'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32978'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3046'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T02:56:57Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-vjr2-wpfh-5r9p
|
2023-05-11T20:56:09Z
|
2023-05-05T09:30:15Z
| null |
['CVE-2021-40331']
|
Apache Ranger Hive Plugin missing permissions check
|
An Incorrect Permission Assignment for Critical Resource vulnerability was found in the Apache Ranger Hive Plugin. Any user with SELECT privilege on a database can alter the ownership of the table in Hive when Apache Ranger Hive Plugin is enabled
This issue affects Apache Ranger Hive Plugin: from 2.0.0 through 2.3.0. Users are recommended to upgrade to version 2.4.0 or later.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ranger:ranger-hive-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.4.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40331'}, {'type': 'WEB', 'url': 'https://github.com/apache/ranger/commit/7dec3015ec82b69ba8f724410f12dfce2480cccd'}, {'type': 'WEB', 'url': 'https://github.com/apache/ranger/commit/9115a20d524ba9173ce5db3e270c385d58d8aeab'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/ranger'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/RANGER-3357'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/RANGER-3474'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/s68yls6cnkdmzn1k4hqt50vs6wjvt2rn'}]
|
{'cwe_ids': ['CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-05T22:53:57Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-gpc2-f62m-c6h6
|
2023-05-17T03:40:21Z
|
2023-05-16T18:30:16Z
| null |
['CVE-2023-2632']
|
Jenkins Code Dx Plugin stores API keys in plain text
|
Jenkins Code Dx Plugin 3.1.0 and earlier stores Code Dx server API keys unencrypted in job `config.xml` files on the Jenkins controller as part of its configuration.
These API keys can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
Additionally, the job configuration form does not mask these API keys, increasing the potential for attackers to observe and capture them.
Code Dx Plugin 4.0.0 no longer stores the API keys directly, instead accessing them through its newly added Credentials Plugin integration. Affected jobs need to be reconfigured.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:codedx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2632'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3146'}]
|
{'cwe_ids': ['CWE-256', 'CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T03:40:21Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-h5g9-2p35-54c7
|
2023-06-07T13:52:38Z
|
2023-05-31T15:30:18Z
| null |
['CVE-2023-3009']
|
nilsteampassnet/teampass vulnerable to cross-site scripting
|
Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.9. This enables an attacker to inject malicious code into a shared folder, which can then be executed by other users who have access to the folder.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'nilsteampassnet/teampass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.9'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3009'}, {'type': 'WEB', 'url': 'https://github.com/nilsteampassnet/teampass/commit/6ba8cf1f4b89d62a08d122d533ccf4cb4e26a4ee'}, {'type': 'PACKAGE', 'url': 'https://github.com/nilsteampassnet/TeamPass'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/2929faca-5822-4636-8f04-ca5e0001361f'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-01T19:11:20Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-9prm-jqwx-45x9
|
2023-05-31T23:39:15Z
|
2023-05-31T23:39:15Z
| null |
['CVE-2023-32689']
|
Phishing attack vulnerability by uploading malicious HTML file
|
### Impact
Phishing attack vulnerability by uploading malicious files. A malicious user could upload a HTML file to Parse Server via its public API. That HTML file would then be accessible at the internet domain at which Parse Server is hosted. The URL of the the uploaded HTML could be shared for phishing attacks. The HTML page may seem legitimate because it is served under the internet domain where Parse Server is hosted, which may be the same as a company's official website domain.
An additional security issue arises when the Parse JavaScript SDK is used. The SDK stores sessions in the internet browser's local storage, which usually restricts data access depending on the internet domain. A malicious HTML file could contain a script that retrieves the user's session token from local storage and then share it with the attacker.
### Patches
The fix adds a new Parse Server option `fileUpload.fileExtensions` to restrict file upload on Parse Server by file extension. It is recommended to restrict file upload for HTML file extensions, which this fix disables by default. If an app requires upload of files with HTML file extensions, the option can be set to `['.*']` or another custom value to override the default.
### References
- https://github.com/parse-community/parse-server/security/advisories/GHSA-9prm-jqwx-45x9
- https://github.com/parse-community/parse-server/pull/8538 (Parse Server 6)
- https://github.com/parse-community/parse-server/pull/8537 (Parse Server 5)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.4.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.1.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/security/advisories/GHSA-9prm-jqwx-45x9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32689'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/pull/8537'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/pull/8538'}, {'type': 'PACKAGE', 'url': 'https://github.com/parse-community/parse-server'}]
|
{'cwe_ids': ['CWE-434'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-31T23:39:15Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-j8r2-6x86-q33q
|
2023-09-20T19:19:30Z
|
2023-05-22T20:36:32Z
| null |
['CVE-2023-32681']
|
Unintended leak of Proxy-Authorization header in requests
|
### Impact
Since Requests v2.3.0, Requests has been vulnerable to potentially leaking `Proxy-Authorization` headers to destination servers, specifically during redirects to an HTTPS origin. This is a product of how `rebuild_proxies` is used to recompute and [reattach the `Proxy-Authorization` header](https://github.com/psf/requests/blob/f2629e9e3c7ce3c3c8c025bcd8db551101cbc773/requests/sessions.py#L319-L328) to requests when redirected. Note this behavior has _only_ been observed to affect proxied requests when credentials are supplied in the URL user information component (e.g. `https://username:password@proxy:8080`).
**Current vulnerable behavior(s):**
1. HTTP → HTTPS: **leak**
2. HTTPS → HTTP: **no leak**
3. HTTPS → HTTPS: **leak**
4. HTTP → HTTP: **no leak**
For HTTP connections sent through the proxy, the proxy will identify the header in the request itself and remove it prior to forwarding to the destination server. However when sent over HTTPS, the `Proxy-Authorization` header must be sent in the CONNECT request as the proxy has no visibility into further tunneled requests. This results in Requests forwarding the header to the destination server unintentionally, allowing a malicious actor to potentially exfiltrate those credentials.
The reason this currently works for HTTPS connections in Requests is the `Proxy-Authorization` header is also handled by urllib3 with our usage of the ProxyManager in adapters.py with [`proxy_manager_for`](https://github.com/psf/requests/blob/f2629e9e3c7ce3c3c8c025bcd8db551101cbc773/requests/adapters.py#L199-L235). This will compute the required proxy headers in `proxy_headers` and pass them to the Proxy Manager, avoiding attaching them directly to the Request object. This will be our preferred option going forward for default usage.
### Patches
Starting in Requests v2.31.0, Requests will no longer attach this header to redirects with an HTTPS destination. This should have no negative impacts on the default behavior of the library as the proxy credentials are already properly being handled by urllib3's ProxyManager.
For users with custom adapters, this _may_ be potentially breaking if you were already working around this behavior. The previous functionality of `rebuild_proxies` doesn't make sense in any case, so we would encourage any users impacted to migrate any handling of Proxy-Authorization directly into their custom adapter.
### Workarounds
For users who are not able to update Requests immediately, there is one potential workaround.
You may disable redirects by setting `allow_redirects` to `False` on all calls through Requests top-level APIs. Note that if you're currently relying on redirect behaviors, you will need to capture the 3xx response codes and ensure a new request is made to the redirect destination.
```
import requests
r = requests.get('http://github.com/', allow_redirects=False)
```
### Credits
This vulnerability was discovered and disclosed by the following individuals.
Dennis Brinkrolf, Haxolot (https://haxolot.com/)
Tobias Funke, (tobiasfunke93@gmail.com)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'requests'}, 'ecosystem_specific': {'affected_functions': ['requests.sessions.SessionRedirectMixin.rebuild_proxies']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.31.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/psf/requests/security/advisories/GHSA-j8r2-6x86-q33q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32681'}, {'type': 'WEB', 'url': 'https://github.com/psf/requests/commit/74ea7cf7a6a27a4eeb2ae24e162bcc942a6706d5'}, {'type': 'PACKAGE', 'url': 'https://github.com/psf/requests'}, {'type': 'WEB', 'url': 'https://github.com/psf/requests/releases/tag/v2.31.0'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/requests/PYSEC-2023-74.yaml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/06/msg00018.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AW7HNFGYP44RT3DUDQXG2QT3OEV2PJ7Y/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KOYASTZDGQG2BWLSNBPL3TQRL2G7QYNZ/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202309-08'}]
|
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-22T20:36:32Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-63c6-w556-3h7q
|
2023-06-05T21:09:47Z
|
2023-05-24T12:30:17Z
| null |
['CVE-2023-2862']
|
SSCMS vulnerable to Cross Site Scripting
|
A vulnerability, which was classified as problematic, was found in SiteServer CMS up to 7.2.1. Affected is an unknown function of the file `/api/stl/actions/search`. The manipulation of the argument ajaxDivId leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. VDB-229818 is the identifier assigned to this vulnerability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'NuGet', 'name': 'SSCMS'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '7.2.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2862'}, {'type': 'PACKAGE', 'url': 'https://gitee.com/siteserver/cms'}, {'type': 'WEB', 'url': 'https://gitee.com/siteserver/cms/issues/I71WJ4'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.229818'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.229818'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-24T17:33:51Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-4m7v-wr6v-2mw5
|
2023-05-11T21:00:20Z
|
2023-05-05T03:30:22Z
| null |
['CVE-2023-2531']
|
AzuraCast missing brute force prevention
|
The request rate limiting feature on the login page of AzuraCast before version 0.18.3 can be bypassed, which could allow an attacker to brute force login credentials.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'azuracast/azuracast'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.18.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2531'}, {'type': 'WEB', 'url': 'https://github.com/azuracast/azuracast/commit/bdb23594ad3e0c47c8568ce028a7c244a406cf9d'}, {'type': 'PACKAGE', 'url': 'https://github.com/azuracast/azuracast'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/20463eb2-0f9d-4ea3-a2c8-93f80e7aca02'}]
|
{'cwe_ids': ['CWE-307'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-05-05T22:33:46Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-jjgp-whrp-gq8m
|
2023-05-11T20:48:15Z
|
2023-05-11T20:48:15Z
| null |
[]
|
in-toto: PGP trust model not (fully) considered
|
### Impact
This security advisory lists multiple concerns about how in-toto uses PGP keys. The findings are aggregated here, because they are all eligible to the same mitigation strategy. Note that the findings are rated with different severities (see inline) and the highest score was chosen for this advisory:
- **PGP Key Creation Time Not Validated** (severity: low)
in-toto does not check, if the validity period of a PGP Key (starting with the key creation time) is in the future, when copying the key from GnuPG to a layout, or when verifying signatures. A validity period in the future is usually a sign of a wrong system clock, meaning it can’t be trusted for verifying the validity period. A MITM attacker who is able to manipulate delivered software products might also be able to control the system time by manipulating NTP. In a scenario where an attacker gained control over two expired subkeys with no overlapping validity period, the attacker could set the system time to a time before the validity period of either key, resulting in both keys being accepted.
- **PGP Key Revocation Not Considered** (severity: medium)
in-toto does not check PGP revocation signatures, when copying the key from GnuPG to a layout, or when verifying signatures. This means that a key may still be accepted in signatures, even if it has been revoked in GnuPG.
- **PGP Key Usage Flags Not Considered** (severity: low)
in-toto does not check PGP usage flags, when copying the key from GnuPG to a layout, or when verifying signatures. This means that at a key may still be accepted in signatures, even if it is not permitted to sign data as per its key usage flags.
Security auditors recommend to verify these properties at signature verification time.
However, this is not planned, as in-toto does not rely on PGP’s trust model, because it should not be required to consult with a separate PKI/web-of-trust at verification time. Instead the project owner establishes ultimate trust by adding a PGP public key to a layout, and thus is responsible for its validity, and also to revoke the layout, if the key is no longer trusted. The same is true for PGP public keys used to verify a layout.
The preferred mitigation strategy is to verify these properties when exporting a public key from GnuPG, and to clarify usage documentation that no verification against the PGP trust model is performed afterwards.
### References
- "Handle GPG revocation signatures" -- https://github.com/secure-systems-lab/securesystemslib/issues/190
- "inconsistent use of GnuPG" -- https://github.com/in-toto/in-toto/issues/569
|
[]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'in-toto'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/in-toto/in-toto/security/advisories/GHSA-jjgp-whrp-gq8m'}, {'type': 'WEB', 'url': 'https://github.com/in-toto/in-toto/issues/569'}, {'type': 'WEB', 'url': 'https://github.com/secure-systems-lab/securesystemslib/issues/190'}, {'type': 'PACKAGE', 'url': 'https://github.com/in-toto/in-toto'}]
|
{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-11T20:48:15Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-h475-7v3c-26q7
|
2023-05-11T14:06:29Z
|
2023-05-03T21:30:18Z
| null |
['CVE-2023-25826']
|
Command injection in OpenTSDB
|
Due to insufficient validation of parameters passed to the legacy HTTP query API, it is possible to inject crafted OS commands into multiple parameters and execute malicious code on the OpenTSDB host system. This exploit exists due to an incomplete fix that was made when this vulnerability was previously disclosed as CVE-2020-35476. Regex validation that was implemented to restrict allowed input to the query API does not work as intended, allowing crafted commands to bypass validation.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'net.opentsdb:opentsdb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25826'}, {'type': 'WEB', 'url': 'https://github.com/OpenTSDB/opentsdb/pull/2275'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenTSDB/opentsdb'}, {'type': 'WEB', 'url': 'https://www.synopsys.com/blogs/software-security/opentsdb/'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/174570/OpenTSDB-2.4.1-Unauthenticated-Command-Injection.html'}]
|
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-05-05T02:23:59Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-rc44-5cmh-879m
|
2023-05-25T17:02:56Z
|
2023-05-25T15:30:17Z
| null |
['CVE-2023-2798']
|
Unrestricted recursion in htmlunit
|
Those using HtmlUnit to browse untrusted webpages may be vulnerable to Denial of service attacks (DoS). If HtmlUnit is running on user supplied web pages, an attacker may supply content that causes HtmlUnit to crash by a stack overflow. This effect may support a denial of service attack. This issue affects HtmlUnit before 2.70.0.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.htmlunit:htmlunit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.70.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2798'}, {'type': 'WEB', 'url': 'https://github.com/HtmlUnit/htmlunit/commit/940dc7fd'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=54613'}, {'type': 'PACKAGE', 'url': 'https://github.com/HtmlUnit/htmlunit'}, {'type': 'WEB', 'url': 'https://github.com/HtmlUnit/htmlunit/releases/tag/2.70.0'}]
|
{'cwe_ids': ['CWE-400', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-25T17:02:56Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-ghpm-mgf5-cv8q
|
2023-05-17T03:34:02Z
|
2023-05-16T18:30:16Z
| null |
['CVE-2023-32995']
|
Jenkins SAML Single Sign On(SSO) Plugin Cross-Site Request Forgery vulnerability
|
Jenkins SAML Single Sign On(SSO) Plugin 2.0.0 and earlier does not perform a permission check in an HTTP endpoint.
This allows attackers with Overall/Read permission to send an HTTP POST request with JSON body containing attacker-specified content, to miniOrange’s API for sending emails.
Additionally, this HTTP endpoint does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
SAML Single Sign On(SSO) Plugin 2.0.1 removes the affected HTTP endpoint.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:miniorange-saml-sp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32995'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-2994'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T03:34:02Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-2h5h-59f5-c5x9
|
2023-05-09T16:40:11Z
|
2023-05-03T21:56:23Z
| null |
['CVE-2023-30551']
|
Rekor's compressed archives can result in OOM conditions
|
## Summary
Two vulnerabilities have been found in Rekor types for archive files JARs and APKs, where Rekor would crash due to out of memory conditions caused by reading archive metadata files into memory without checking their sizes first causing a Denial of Service of Rekor.
These vulnerabilities were found through fuzzing with [OSS-Fuzz](https://google.github.io/oss-fuzz/).
## Vulnerability 1: OOM due to large files in META-INF directory of JAR files.
### Summary
Verification of a JAR file submitted to Rekor can cause an out of memory crash if files within the META-INF directory of the JAR are sufficiently large.
### Details
As part of verifying a JAR file, Rekor uses the [relic library](http://github.com/sassoftware/relic) to check that the JAR is signed, the signature verifies, and that the hashes in the signed manifest are all valid. This library function reads files within META-INF/ into memory without checking their sizes, resulting in an OOM if the uncompressed file is sufficiently large. Rekor is also not performing any such checks prior to passing the JAR to this library function.
### Patches
Users should update to the latest version of Rekor, 1.1.1.
### Workaround
There are no workarounds, users should update.
## Vulnerability 2: OOM due to large .SIGN and .PKGINFO files in APK files.
### Summary
Parsing of an APK file submitted to Rekor can cause an out of memory crash if the .SIGN or .PKGINFO files within the APK are sufficiently large.
### Details
When parsing an APK file, Rekor allocates byte slices to read both the .SIGN and .PKGINFO files into memory in order to verify the signature and hashes in the APK. These byte slices are allocated based on the size included in the tar header for each file, with no checks performed on that size. If the size in the header is sufficiently large, either because the uncompressed file is large or the size in the header has been artificially set to a large value, Rekor will crash due to an out of memory panic.
### Patches
Users should update to the latest version of Rekor, 1.1.1.
### Workaround
There are no workarounds, users should update.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/sigstore/rekor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/sigstore/rekor/security/advisories/GHSA-2h5h-59f5-c5x9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30551'}, {'type': 'WEB', 'url': 'https://github.com/sigstore/rekor/commit/cf42ace82667025fe128f7a50cf6b4cdff51cc48'}, {'type': 'PACKAGE', 'url': 'https://github.com/sigstore/rekor'}, {'type': 'WEB', 'url': 'https://github.com/sigstore/rekor/releases/tag/v1.1.1'}]
|
{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-03T21:56:23Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-pqj7-jx24-wj7w
|
2023-05-11T19:40:49Z
|
2023-05-11T19:40:49Z
| null |
['CVE-2023-29195']
|
VTAdmin users that can create shards can deny access to other functions
|
### Impact
Users can either intentionally or inadvertently create a shard containing `/` characters from VTAdmin such that from that point on, anyone who tries to create a new shard from VTAdmin will receive an error.
Attempting to view the keyspace(s) will also no longer work.
Creating a shard using `vtctldclient` does not have the same problem because the CLI validates the input correctly.
### Patches
v16.0.2, corresponding to [0.16.2 on pkg.go.dev](https://pkg.go.dev/vitess.io/vitess@v0.16.2)
### Workarounds
- Always use `vtctldclient` to create shards, instead of using VTAdmin
- Disable creating shards from VTAdmin using RBAC
- Delete the topology record for the offending shard using the client for your topology server. For example, if you created a shard called `a/b` in keyspace `commerce`, and you are running etcd, it can be deleted by doing something like
```
% etcdctl --endpoints "http://${ETCD_SERVER}" del /vitess/global/keyspaces/commerce/shards/a/b/Shard
```
### References
https://github.com/vitessio/vitess/issues/12842
Found during a security audit sponsored by the [CNCF](https://cncf.io) and facilitated by [OSTIF](https://ostif.org).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'vitess.io/vitess'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.16.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/vitessio/vitess/security/advisories/GHSA-pqj7-jx24-wj7w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29195'}, {'type': 'WEB', 'url': 'https://github.com/vitessio/vitess/issues/12842'}, {'type': 'WEB', 'url': 'https://github.com/vitessio/vitess/pull/12843'}, {'type': 'WEB', 'url': 'https://github.com/vitessio/vitess/commit/9dcbd7de3180f47e94f54989fb5c66daea00c920'}, {'type': 'PACKAGE', 'url': 'https://github.com/vitessio/vitess'}, {'type': 'WEB', 'url': 'https://github.com/vitessio/vitess/releases/tag/v16.0.2'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vitess.io/vitess@v0.16.2'}]
|
{'cwe_ids': ['CWE-20', 'CWE-703'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-11T19:40:49Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-r3fg-3r88-6x3f
|
2023-05-11T20:12:31Z
|
2023-05-10T21:25:28Z
| null |
[]
|
Ibexa User Settings are accessible on the front-end for anonymous user
|
### Impact
This security advisory is about the user settings, which include things like preferred time zone and number of items per page in item listings. These could be accessed by the anonymous user. This impacted only the anonymous users themselves, and had no impact on logged in users. As such the impact is limited, even if custom user settings have been added, but please consider if this matters for your site. The fix ensures that only logged in users can access their user settings.
### References
https://developers.ibexa.co/security-advisories/ibexa-sa-2023-002-user-settings-are-accessible-on-the-front-end-for-the-anonymous-user
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'ibexa/user'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.4.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/ibexa/user/security/advisories/GHSA-r3fg-3r88-6x3f'}, {'type': 'WEB', 'url': 'https://github.com/ibexa/user/commit/77d1a0926d93ca85aa6faeea66bee55e0e067551'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2023-002-user-settings-are-accessible-on-the-front-end-for-the-anonymous-user'}, {'type': 'PACKAGE', 'url': 'https://github.com/ibexa/user'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-10T21:25:28Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-j65r-g7q2-f8v3
|
2023-05-25T16:57:01Z
|
2023-05-25T16:57:01Z
| null |
['CVE-2023-2881']
|
Pimcore customers' list user password hash is disclosed
|
### Impact
The customer view exposes the hashed password along with other deails. An attacker is then able to enum password of a particular id, likewise we can replace id with other user , for example 1015, password hash can be disclosed which can be further cracked with hashcat
### Patches
Update to version 3.3.10 or apply this patch manually https://github.com/pimcore/customer-data-framework/commit/d1d58c10313f080737dc1e71fab3beb12488a1e6.patch
### Workarounds
Apply https://github.com/pimcore/customer-data-framework/commit/d1d58c10313f080737dc1e71fab3beb12488a1e6.patch manually.
### References
https://huntr.dev/bounties/db6c32f4-742e-4262-8fd5-cefd0f133416/
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/customer-management-framework-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.10'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pimcore/customer-data-framework/security/advisories/GHSA-j65r-g7q2-f8v3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2881'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/customer-data-framework/commit/d1d58c10313f080737dc1e71fab3beb12488a1e6'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/customer-data-framework'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/db6c32f4-742e-4262-8fd5-cefd0f133416'}]
|
{'cwe_ids': ['CWE-257', 'CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-25T16:57:01Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-3wxg-w96j-8hq9
|
2023-05-26T21:50:40Z
|
2023-05-26T13:54:11Z
| null |
['CVE-2023-33194']
|
CraftCMS stored XSS in Quick Post widget error message
|
### Summary
The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload.
### Details
Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save.
### PoC
1. Login at admin
2. Go to setting
3. Create a Section
4. On Entry page, click Edit label
5. Inject the XSS payload into the label and save
6. On the admin dashboard choose new widget -> Quick Post
7. In Quick Post, click save with blank slug; The XSS will be executed
"errors":{"title":["<script>alert('nono')</script> cannot be blank."],"slug":["Slug cannot be blank."]
Fixed in https://github.com/craftcms/cms/commit/9d0cd0bda7c8a830a3373f8c0f06943e519ac888
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:L'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-RC1'}, {'fixed': '4.4.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.8.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.8.5'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/craftcms/cms/security/advisories/GHSA-3wxg-w96j-8hq9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33194'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/commit/9d0cd0bda7c8a830a3373f8c0f06943e519ac888'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftcms/cms'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/releases/tag/4.4.6'}]
|
{'cwe_ids': ['CWE-79', 'CWE-80'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-05-26T13:54:11Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-97wp-63wq-hfwh
|
2023-05-17T03:06:37Z
|
2023-05-16T18:30:16Z
| null |
['CVE-2023-32983']
|
Jenkins Ansible Plugin job configuration form does not mask variables
|
Jenkins Ansible Plugin allows the specification of extra variables that can be passed to Ansible. These extra variables are commonly used to pass secrets.
Ansible Plugin 204.v8191fd551eb_f and earlier stores these extra variables unencrypted in job `config.xml` files on the Jenkins controller as part of its configuration.
These extra variables can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
Additionally, the job configuration form does not mask these extra variables, increasing the potential for attackers to observe and capture them.
Ansible Plugin 205.v4cb_c48657c21 masks extra variables displayed on the configuration form, and stores them encrypted once job configurations are saved again.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '205.v4cb'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32983'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3017'}]
|
{'cwe_ids': ['CWE-312'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T03:06:37Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-g47h-fgcw-g4ph
|
2023-06-07T16:00:36Z
|
2023-05-31T06:30:39Z
| null |
['CVE-2023-26131']
|
Algernon engine and themes vulnerable to Cross-site Scripting
|
All versions of the package github.com/xyproto/algernon/engine; all versions of the package github.com/xyproto/algernon/themes are vulnerable to Cross-site Scripting (XSS) via the `themes.NoPage(filename, theme)` function due to improper user input sanitization. Exploiting this vulnerability is possible when a file/resource is not found.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/xyproto/algernon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.15.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26131'}, {'type': 'PACKAGE', 'url': 'https://github.com/xyproto/algernon'}, {'type': 'WEB', 'url': 'https://github.com/xyproto/algernon/blob/aab484608651852d02a8a93f40baf53ed93e639a/engine/handlers.go#L512'}, {'type': 'WEB', 'url': 'https://github.com/xyproto/algernon/blob/aab484608651852d02a8a93f40baf53ed93e639a/engine/handlers.go#L514'}, {'type': 'WEB', 'url': 'https://github.com/xyproto/algernon/blob/aab484608651852d02a8a93f40baf53ed93e639a/themes/html.go#L145'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMXYPROTOALGERNONENGINE-3312111'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMXYPROTOALGERNONTHEMES-3312112'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T01:56:53Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-xq6j-x8pq-g3gr
|
2023-05-02T19:56:50Z
|
2023-05-02T15:30:34Z
| null |
['CVE-2023-2479']
|
appium-desktop OS Command Injection vulnerability
|
appium-desktop v1.14.1 and prior is vulnerable to OS Command Injection.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'appium-desktop'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.14.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2479'}, {'type': 'WEB', 'url': 'https://github.com/appium/appium-desktop/commit/12a988aa08b9822e97056a09486c9bebb3aad8fe'}, {'type': 'PACKAGE', 'url': 'https://github.com/appium/appium-desktop'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/fbdeec3c-d197-4a68-a547-7f93fb9594b4'}]
|
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-05-02T19:56:50Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-m974-xj4j-7qv5
|
2023-05-11T20:32:18Z
|
2023-05-11T20:32:18Z
| null |
['CVE-2023-25568']
|
Boxo bitswap/server: DOS unbounded persistent memory leak
|
### Impact
An attacker is able allocate arbitrarily many bytes in the Bitswap server by sending many `WANT_BLOCK` and or `WANT_HAVE` requests which are queued in an unbounded queue, with allocations that persist even if the connection is closed.
This affects users accepting untrusted connections with the Bitswap server, this also affects users using the old API stubs at `github.com/ipfs/boxo/bitswap` because it transitively uses `github.com/ipfs/boxo/bitswap/server`.
We have [renamed go-libipfs to boxo](https://github.com/ipfs/boxo/issues/215); this document uses both terms interchangeably. The version numbers for both are applicable, as they share the same historical timeline.
### Remediation
Apply one of:
- Update `boxo` to [`v0.6.0`](https://github.com/ipfs/boxo/releases/tag/v0.6.0) or later
- Update `boxo` to [`v0.4.1`](https://github.com/ipfs/boxo/releases/tag/v0.4.1)
Note that ***`v0.5.0` is NOT safe***, `v0.4.1` is a backport of the `v0.6.0` security fixes on top of `v0.4.0`.
### Mitigations
1. The server now limits how many wantlist entries per peer it knows.
The `MaxQueuedWantlistEntriesPerPeer` option allows configuring how many wantlist entries the server remembers; if a peer sends a wantlist bigger than this (including a sum of multiple delta updates) the server will truncate the wantlist to the match the limit.
This defaults to `1024` entries per peer.
2. The server now properly clears state about peers when they disconnect.
Peer state is more lazily allocated (only when a wantlist is received in the first place) and is properly cleared when the `PeerDisconnected` callback is received.
3. The server now ignores CIDs above some size.
Clients were able to send any CID as long as the total protobuf message were bellow the 4MiB limit. This is allowed to allocate lots of memory with very little entries.
This can be configured using the `MaxCidSize` option and defaults to `168 bytes`.
4. The server now closes the connection if an inline CID is requested (either as `WANT_*` or `CANCEL`).
The attack were more effective if done with CIDs that are present in target's blockstore, this is because this will push longer-lasting jobs on some priority queue.
Since inline CID are literal data (instead of hashes of data), everyone always "has" any inline CID (since instead of loading the data from disk, it can be extracted from the CID). It makes no sense for anyone to ever ask you about an inline CID since they could also just parse it themselves. Thus, as a defensive measure, we kill the connection with peers that ask about an inline CID.
### Vulnerable symbols
- `github.com/ipfs/go-libipfs/bitswap/server/internal/decision.(*Engine).MessageReceived`
- `github.com/ipfs/go-libipfs/bitswap/server/internal/decision.(*Engine).NotifyNewBlocks`
- `github.com/ipfs/go-libipfs/bitswap/server/internal/decision.(*Engine).findOrCreate`
- `github.com/ipfs/go-libipfs/bitswap/server/internal/decision.(*Engine).PeerConnected`
### Patches
- https://github.com/ipfs/boxo/commit/9cb5cb54d40b57084d1221ba83b9e6bb3fcc3197 (mitigations 1 and 2)
- https://github.com/ipfs/boxo/commit/62cbac40b96f49e39cd7fedc77ee6b56adce4916 (mitigations 3 and 4)
- https://github.com/ipfs/boxo/commit/baa748b682fabb21a4c1f7628a8af348d4645974 (tests)
### Workarounds
If you are using the stubs at `github.com/ipfs/go-libipfs/bitswap` and not taking advantage of the features provided by the server, refactoring your code to use the new split API will allow you to run in a client-only mode using: [`github.com/ipfs/boxo/bitswap/client`](https://pkg.go.dev/github.com/ipfs/boxo/bitswap/client).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ipfs/go-libipfs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.5.0'}, {'fixed': '0.6.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/ipfs/go-libipfs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/ipfs/boxo/security/advisories/GHSA-m974-xj4j-7qv5'}, {'type': 'WEB', 'url': 'https://github.com/ipfs/go-libipfs/security/advisories/GHSA-m974-xj4j-7qv5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25568'}, {'type': 'WEB', 'url': 'https://github.com/ipfs/boxo/commit/62cbac40b96f49e39cd7fedc77ee6b56adce4916'}, {'type': 'WEB', 'url': 'https://github.com/ipfs/boxo/commit/9cb5cb54d40b57084d1221ba83b9e6bb3fcc3197'}, {'type': 'WEB', 'url': 'https://github.com/ipfs/boxo/commit/baa748b682fabb21a4c1f7628a8af348d4645974'}, {'type': 'PACKAGE', 'url': 'https://github.com/ipfs/boxo'}]
|
{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-11T20:32:18Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-5wpg-qcmj-48wh
|
2023-05-17T03:48:24Z
|
2023-05-16T18:30:16Z
| null |
['CVE-2023-33002']
|
TestComplete support Plugin vulnerable to stored Cross-site Scripting
|
TestComplete support Plugin 2.8.1 and earlier does not escape the TestComplete project name in its test result page.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
As of publication of this advisory, there is no fix.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:TestComplete'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.8.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33002'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-2892'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T03:48:24Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-25fx-3c2q-cq46
|
2023-05-25T21:32:00Z
|
2023-05-17T15:48:04Z
| null |
['CVE-2023-2756']
|
pimcore/customer-management-framework-bundle has SQL Injection vulnerability in Segment Assignment query
|
### Impact
An administrator user can use the inheritable segments feature to execute his own blind SQL queries.
A user with administrator privileges can run any SQL query on database. This can be used to retrieve sensitive data, change database information or any other malicious activity against the database.
### Patches
Update to version 3.3.10 or apply this patch manually https://github.com/pimcore/customer-data-framework/commit/76df151737b7964ce5169fdf9e27a0ad801757fe.patch
### Workarounds
Apply https://github.com/pimcore/customer-data-framework/commit/76df151737b7964ce5169fdf9e27a0ad801757fe.patch manually.
### References
https://huntr.dev/bounties/cf398528-819f-456e-88e7-c06d268d3f44/
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/customer-management-framework-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.10'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pimcore/customer-data-framework/security/advisories/GHSA-25fx-3c2q-cq46'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2756'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/customer-data-framework/commit/76df151737b7964ce5169fdf9e27a0ad801757fe'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/customer-data-framework'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/cf398528-819f-456e-88e7-c06d268d3f44'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T15:48:04Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-w6f8-mxf5-4vf8
|
2023-06-03T00:10:13Z
|
2023-05-24T18:30:26Z
| null |
['CVE-2023-33948']
|
Missing authorization in Liferay portal
|
The Dynamic Data Mapping module in Liferay Portal 7.4.3.67, and Liferay DXP 7.4 update 67 does not limit Document and Media files which can be downloaded from a Form, which allows remote attackers to download any file from Document and Media via a crafted URL.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.liferay.portal:release.portal.bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.4.3.67'}, {'fixed': '7.4.3.68'}]}], 'versions': ['7.4.3.67']}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33948'}, {'type': 'PACKAGE', 'url': 'https://github.com/liferay/liferay-portal'}, {'type': 'WEB', 'url': 'https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33948'}]
|
{'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-24T21:53:37Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-7x94-jx75-3gh6
|
2023-06-02T22:17:57Z
|
2023-05-26T18:30:21Z
| null |
['CVE-2023-2817']
|
Stored cross site scripting in Craft CMS
|
A post-authentication stored cross-site scripting vulnerability exists in Craft CMS versions <= 4.4.11. HTML, including script tags can be injected into field names which, when the field is added to a category or section, will trigger when users visit the Categories or Entries pages respectively. This issue was patched in version 4.4.12.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-RC1'}, {'fixed': '4.4.12'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2817'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/commit/7655e1009ba6cdbfb230e6bb138b775b69fc7bcb'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftcms/cms'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/research/tra-2023-20'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-26T21:09:08Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-g9mr-9xfc-4gf7
|
2023-05-24T21:53:45Z
|
2023-05-24T18:30:26Z
| null |
['CVE-2023-33949']
|
Insecure Default Initialization In Liferay Portal
|
In Liferay Portal 7.3.0 and earlier, and Liferay DXP 7.2 and earlier the default configuration does not require users to verify their email address, which allows remote attackers to create accounts using fake email addresses or email addresses which they don't control. The portal property `company.security.strangers.verify` should be set to true.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.liferay.portal:release.portal.bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.3.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33949'}, {'type': 'PACKAGE', 'url': 'https://github.com/liferay/liferay-portal'}, {'type': 'WEB', 'url': 'https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33949'}]
|
{'cwe_ids': ['CWE-1188'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-24T21:53:45Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-hjh8-9gxh-cx4x
|
2023-05-17T03:35:52Z
|
2023-05-16T18:30:16Z
| null |
['CVE-2023-32997']
|
Jenkins CAS Plugin Session Fixation vulnerability
|
Jenkins CAS Plugin 1.6.2 and earlier does not invalidate the existing session on login.
This allows attackers to use social engineering techniques to gain administrator access to Jenkins.
CAS Plugin 1.6.3 invalidates the existing session on login.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:cas-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32997'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3000'}]
|
{'cwe_ids': ['CWE-384'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T03:35:52Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-x82q-mr23-27jc
|
2023-05-24T18:04:27Z
|
2023-05-24T15:30:27Z
| null |
['CVE-2023-33940']
|
Cross-site scripting in Liferay Portal
|
Cross-site scripting (XSS) vulnerability in IFrame type Remote Apps in Liferay Portal 7.4.0 through 7.4.3.30, and Liferay DXP 7.4 before update 31 allows remote attackers to inject arbitrary web script or HTML via the Remote App's IFrame URL.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.liferay.portal:release.portal.bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.4.0'}, {'fixed': '7.4.3.31'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33940'}, {'type': 'PACKAGE', 'url': 'https://github.com/liferay/liferay-portal'}, {'type': 'WEB', 'url': 'https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33940'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-24T18:04:27Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-wjq3-7jxx-whj9
|
2023-05-18T02:01:53Z
|
2023-05-17T21:30:22Z
| null |
['CVE-2023-2780']
|
mlflow Path Traversal vulnerability
|
mlflow prior to 2.3.0 is vulnerable to path traversal due to a bypass of the fix for CVE-2023-1177.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'mlflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2780'}, {'type': 'WEB', 'url': 'https://github.com/mlflow/mlflow/commit/fae77a525dd908c56d6204a4cef1c1c75b4e9857'}, {'type': 'PACKAGE', 'url': 'https://github.com/mlflow/mlflow'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/mlflow/PYSEC-2023-69.yaml'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b12b0073-0bb0-4bd1-8fc2-ec7f17fd7689'}]
|
{'cwe_ids': ['CWE-29'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-05-18T02:01:53Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-cpc3-gm2x-mrvp
|
2023-05-17T03:47:34Z
|
2023-05-16T18:30:16Z
| null |
['CVE-2023-33004']
|
Jenkins Tag Profiler Plugin missing permission check
|
Jenkins Tag Profiler Plugin 0.2 and earlier does not perform a permission check in an HTTP endpoint.
This allows attackers with Overall/Read permission to reset profiler statistics.
Additionally, this HTTP endpoint does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
As of publication of this advisory, there is no fix.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:tag-profiler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33004'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3083'}]
|
{'cwe_ids': ['CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T03:47:34Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-wc6j-5g83-xfm6
|
2023-05-22T21:31:35Z
|
2023-05-11T03:30:15Z
| null |
['CVE-2023-30172']
|
mflow vulnerable to directory traversal
|
A directory traversal vulnerability in the /get-artifact API method of the mlflow platform prior to v2.0.0 allows attackers to read arbitrary files on the server via the path parameter.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'mlflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0rc0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30172'}, {'type': 'WEB', 'url': 'https://github.com/mlflow/mlflow/issues/7166'}, {'type': 'WEB', 'url': 'https://github.com/mlflow/mlflow/issues/7166#issuecomment-1541543234'}, {'type': 'WEB', 'url': 'https://github.com/mlflow/mlflow/pull/7170'}, {'type': 'WEB', 'url': 'https://github.com/mlflow/mlflow/commit/ac4b697bb0bb8a331944dca63f4235b4bf602ab8'}, {'type': 'PACKAGE', 'url': 'https://github.com/mlflow/mlflow'}, {'type': 'WEB', 'url': 'https://github.com/mlflow/mlflow/commits/v2.0.0?after=00c3b0a350a28c25b16fbb7feddb8147a919ce18+69&branch=v2.0.0&qualified_name=refs%2Ftags%2Fv2.0.0'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/mlflow/PYSEC-2023-70.yaml'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-11T20:11:04Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-mq3x-qgwx-3rfw
|
2023-05-17T18:48:07Z
|
2023-05-11T20:41:24Z
| null |
['CVE-2023-2629']
|
Embedding untrusted input inside CSV files leads to Formula Injection/CSV Injection
|
### Impact
The pimcore application is vulnerable to Formula Injection/CSV Injection via the Firstname, Lastname, Street, Zip & City input fields. These vulnerabilities allow unauthenticated attackers to execute arbitrary code via a crafted excel file.
Successful exploitation can lead to impacts such as client-sided command injection, code execution, or remote ex-filtration of contained confidential data.
### Patches
Update to version 3.3.9 or apply this patch manually https://github.com/pimcore/customer-data-framework/commit/4e0105c3a78d20686a0c010faef27d2297b98803.patch
### Workarounds
Apply patch https://github.com/pimcore/customer-data-framework/commit/4e0105c3a78d20686a0c010faef27d2297b98803.patch manually.
### References
https://huntr.dev/bounties/821ff465-4754-42d1-9376-813c17f16a01/
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/customer-management-framework-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.9'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pimcore/customer-data-framework/security/advisories/GHSA-mq3x-qgwx-3rfw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2629'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/customer-data-framework/commit/4e0105c3a78d20686a0c010faef27d2297b98803'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/customer-data-framework'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/821ff465-4754-42d1-9376-813c17f16a01'}]
|
{'cwe_ids': ['CWE-1236'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-11T20:41:24Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-j93v-cx26-2xc4
|
2023-05-10T21:19:09Z
|
2023-05-10T06:30:29Z
|
2023-05-10T21:19:09Z
|
[]
|
Duplicate Advisory: Cross-site Scripting (XSS) in Predefined Properties delete
|
## Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-q7cc-m6jw-m262. This link is maintained to preserve external references.
## Original DescriptionCross-site Scripting (XSS) - Reflected in GitHub repository pimcore/pimcore prior to 10.5.21.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.21'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2615'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/7a799399e6843cd049e85da27ceb75b78505317f'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/af9c360a-87f8-4e97-a24b-6db675ee942a'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-10T21:19:09Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-v9rm-7rv9-r3fw
|
2023-05-22T21:30:33Z
|
2023-05-12T09:30:15Z
| null |
['CVE-2023-29032']
|
Apache OpenMeetings Improper Authentication vulnerability
|
An attacker that has gained access to certain private information can use this to act as other user.
Vendor: The Apache Software Foundation
Versions Affected: Apache OpenMeetings from 3.1.3 before 7.1.0
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.openmeetings:openmeetings-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.3'}, {'fixed': '7.1.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29032'}, {'type': 'WEB', 'url': 'https://github.com/apache/openmeetings/commit/4e89e0ca076c83f26562f1146cf3e81ba0b16a7f'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/openmeetings'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/OPENMEETINGS-2764'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/j2d6mg3rzcphfd8vvvk09d8p4o9lvnqp'}]
|
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-12T20:17:54Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-fwj4-72fm-c93g
|
2023-05-05T02:18:26Z
|
2023-05-05T02:18:26Z
| null |
[]
|
Under-validated ComSpec and cmd.exe resolution in Mutagen projects
|
### Impact
Mutagen projects offer shell-based execution functionality. On Windows, the shell is resolved using the standard `%ComSpec%` mechanism, with a fallback to a `%PATH%`-based search for `cmd.exe`. While this is the standard practice on Windows systems, it presents somewhat risky behavior.
Firstly, `%ComSpec%` could, in theory, be set maliciously. Unfortunately, there's not much that can be done to prevent this attack surface, because `%ComSpec%` is the official mechanism for shell specification on Windows. We can, however, validate that it points to an absolute path, which one would expect for a properly set value.
Secondly, a fallback to a relative `cmd.exe` path, resolved via `%PATH%`, could be risky. The risk is largely mitigated by changes in Go 1.19 and later, but prior to that a malicious `cmd.exe` could been resolved in the current working directory. To mitigate this issue, Mutagen now uses the `%SystemRoot%` environment variable (also validated to be an absolute path) to resolve `cmd.exe` in the event that `%ComSpec%` is not set correctly.
### Patches
The problem has been patched in Mutagen v0.16.6 and v0.17.1. Earlier versions of Mutagen are no longer supported and will not be patched. Versions of Mutagen after v0.18.0 will also have the patch merged.
### Workarounds
Maintain control of the environment variable settings on your system, in particular the `ComSpec` environment variable.
### References
More information on `%ComSpec%` can be found [online](https://en.wikipedia.org/wiki/COMSPEC).
More information on Go's `PATH`-based lookup changes can be found [here](https://go.dev/blog/path-security), [here](https://go.dev/doc/go1.19#os-exec-path), and [here](https://github.com/golang/go/issues/43947).
A [similar issue](https://github.com/python/cpython/issues/101283) that was addressed within the Python subprocess module also provides additional discussion.
|
[]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/mutagen-io/mutagen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.16.6'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mutagen-io/mutagen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.17.0'}, {'fixed': '0.17.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/mutagen-io/mutagen/security/advisories/GHSA-fwj4-72fm-c93g'}, {'type': 'PACKAGE', 'url': 'https://github.com/mutagen-io/mutagen'}]
|
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-05-05T02:18:26Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-7g2v-2frm-rg94
|
2023-05-23T22:39:22Z
|
2023-05-12T09:30:15Z
| null |
['CVE-2023-2515']
|
Mattermost Incorrect Authorization vulnerability
|
Mattermost fails to restrict a user with permissions to edit other users and to create personal access tokens from elevating their privileges to system admin
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.1.8'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.2.0'}, {'fixed': '7.7.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.8.0'}, {'fixed': '7.8.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.9.0'}, {'fixed': '7.9.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2515'}, {'type': 'PACKAGE', 'url': 'https://github.com/mattermost/mattermost-server'}, {'type': 'WEB', 'url': 'https://mattermost.com/security-updates'}]
|
{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-12T20:17:25Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-4rhq-vq24-88gw
|
2023-05-22T20:29:44Z
|
2023-05-22T20:29:44Z
| null |
['CVE-2021-36154']
|
Uncontrolled Recursion in HTTP2ToRawGRPCServerCodec
|
### Impact
Affected gRPC Swift servers are vulnerable to uncontrolled recursion and stack consumption when parsing certain payloads. This may lead to a denial of service.
### Patches
The problem has been fixed in 1.2.0.
### Workarounds
No workaround is available. Users must upgrade.
|
[]
|
[{'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/grpc/grpc-swift'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/grpc/grpc-swift/security/advisories/GHSA-4rhq-vq24-88gw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36154'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35274'}, {'type': 'PACKAGE', 'url': 'https://github.com/grpc/grpc-swift'}, {'type': 'WEB', 'url': 'https://github.com/grpc/grpc-swift/releases/tag/1.2.0'}]
|
{'cwe_ids': ['CWE-674'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-22T20:29:44Z', 'nvd_published_at': '2021-07-09T12:15:00Z'}
|
1.4.0
|
GHSA-5xq3-7mw9-wj5p
|
2023-05-11T14:00:53Z
|
2023-05-05T21:31:11Z
| null |
['CVE-2023-2427']
|
Cross Site Scripting in thorsten/phpmyfaq
|
Cross-site Scripting (XSS) - Reflected in GitHub repository thorsten/phpmyfaq prior to version 3.1.13.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.13'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2427'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/514f4df2ad918e69575028d58b2e33aaf536e59b'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpmyfaq'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/89005a6d-d019-4cb7-ae88-486d2d44190d'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-05T23:13:48Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-83fm-w79m-64r5
|
2023-05-01T13:43:58Z
|
2023-05-01T13:43:58Z
| null |
[]
|
Remote file access vulnerability in `mlflow server` and `mlflow ui` CLIs
|
### Impact
Users of the MLflow Open Source Project who are hosting the MLflow Model Registry using the ``mlflow server`` or ``mlflow ui`` commands using an MLflow version older than **MLflow 2.3.1** may be vulnerable to a remote file access exploit if they are not limiting who can query their server (for example, by using a cloud VPC, an IP allowlist for inbound requests, or authentication / authorization middleware).
This issue only affects users and integrations that run the ``mlflow server`` and ``mlflow ui`` commands. Integrations that do not make use of ``mlflow server`` or ``mlflow ui`` are unaffected; for example, the Databricks Managed MLflow product and MLflow on Azure Machine Learning do not make use of these commands and are not impacted by these vulnerabilities in any way.
The vulnerability is very similar to https://nvd.nist.gov/vuln/detail/CVE-2023-1177, and a separate CVE will be published and updated here shortly.
### Patches
This vulnerability has been patched in MLflow 2.3.1, which was released to PyPI on April 27th, 2023. If you are using ``mlflow server`` or ``mlflow ui`` with the MLflow Model Registry, we recommend upgrading to MLflow 2.3.1 as soon as possible.
### Workarounds
If you are using the MLflow open source ``mlflow server`` or ``mlflow ui`` commands, we strongly recommend limiting who can access your MLflow Model Registry and MLflow Tracking servers using a cloud VPC, an IP allowlist for inbound requests, authentication / authorization middleware, or another access restriction mechanism of your choosing.
If you are using the MLflow open source ``mlflow server`` or ``mlflow ui`` commands, we also strongly recommend limiting the remote files to which your MLflow Model Registry and MLflow Tracking servers have access. For example, if your MLflow Model Registry or MLflow Tracking server uses cloud-hosted blob storage for MLflow artifacts, make sure to restrict the scope of your server's cloud credentials such that it can only access files and directories related to MLflow.
### References
|
[]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'mlflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/mlflow/mlflow/security/advisories/GHSA-83fm-w79m-64r5'}, {'type': 'PACKAGE', 'url': 'https://github.com/mlflow/mlflow'}]
|
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-05-01T13:43:58Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-5mf7-p346-7rm8
|
2023-05-10T15:28:51Z
|
2023-05-05T21:31:11Z
| null |
['CVE-2023-2550']
|
Cross Site Scripting in thorsten/phpmyfaq
|
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to version 3.1.13.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.13'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2550'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/20ac51594db11604a4518aacc28a51f67d4f11bf'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpmyfaq'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/840c8d91-c97e-4116-a9f8-4ab1a38d239b'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-05T23:14:13Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-94r7-63g8-c4jw
|
2023-06-06T01:53:15Z
|
2023-05-31T03:30:15Z
| null |
['CVE-2023-2999']
|
thorsten/phpmyfaq vulnerable to cross-site scripting
|
thorsten/phpmyfaq prior to 3.1.14 is vulnerable to a stored cross-site scripting attack perpetuated by an actor logged in as admin.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.14'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2999'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/937913948cab382a38f681e0bd29c152e2f383cd'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpMyFAQ'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/4d89c7cc-fb4c-4b64-9b67-f0189f70a620'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T01:53:15Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-p9xg-9378-cqp7
|
2023-05-24T18:04:46Z
|
2023-05-24T15:30:27Z
| null |
['CVE-2023-33943']
|
Cross-site scripting in Liferay Portal
|
Cross-site scripting (XSS) vulnerability in the Account module in Liferay Portal 7.4.3.21 through 7.4.3.62, and Liferay DXP 7.4 update 21 through 62 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a user's (1) First Name, (2) Middle Name, (3) Last Name, or (4) Job Title text field.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.liferay.portal:release.portal.bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.4.3.21'}, {'fixed': '7.4.3.63'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33943'}, {'type': 'PACKAGE', 'url': 'https://github.com/liferay/liferay-portal'}, {'type': 'WEB', 'url': 'https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33943'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-24T18:04:46Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-6r8q-pfpv-7cgj
|
2023-06-06T17:05:30Z
|
2023-05-12T20:21:35Z
| null |
['CVE-2023-32058']
|
Vyper vulnerable to integer overflow in loop
|
### Impact
Due to missing overflow check for loop variables, by assigning the iterator of a loop to a variable, it is possible to overflow the type of the latter.
In the following example, calling `test` returns `354`, meaning that the variable `a` did store `354` a value out of bound for the type `uint8`.
```Vyper
@external
def test() -> uint16:
x:uint8 = 255
a:uint8 = 0
for i in range(x, x+100):
a = i
return convert(a,uint16)
```
The issue seems to happen only in loops of type `for i in range(a, a + N)` as in loops of type `for i in range(start, stop)` and `for i in range(stop)`, the compiler is able to raise a `TypeMismatch` when trying to overflow the variable.
thanks to @trocher for reporting
### Patches
patched in 3de1415ee77a9244eb04bdb695e249d3ec9ed868
### Workarounds
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'vyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.8'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/security/advisories/GHSA-6r8q-pfpv-7cgj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32058'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/commit/3de1415ee77a9244eb04bdb695e249d3ec9ed868'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/vyper/PYSEC-2023-78.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/vyperlang/vyper'}]
|
{'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-12T20:21:35Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-3p37-3636-q8wv
|
2023-06-06T17:05:03Z
|
2023-05-12T20:21:54Z
| null |
['CVE-2023-31146']
|
Vyper vulnerable to OOB DynArray access when array is on both LHS and RHS of an assignment
|
### Impact
during codegen, the length word of a dynarray is written before the data, which can result in OOB array access in the case where the dynarray is on both the lhs and rhs of an assignment. here is a minimal example producing the issue:
```vyper
a:DynArray[uint256,3]
@external
def test() -> DynArray[uint256,3]:
self.a = [1,2,3]
self.a = empty(DynArray[uint256,3])
self.a = [self.a[0],self.a[1],self.a[2]]
return self.a # return [1,2,3]
```
and here is an example demonstrating the issue can cause data corruption across call frames:
```vyper
@external
def test() -> DynArray[uint256,3]:
self.a()
return self.b() # return [1,2,3]
@internal
def a():
a: uint256 = 0
b: uint256 = 1
c: uint256 = 2
d: uint256 = 3
@internal
def b() -> DynArray[uint256,3]:
a: DynArray[uint256,3] = empty(DynArray[uint256,3])
a = [a[0],a[1],a[2]]
return a
```
examples involving append and pop:
```vyper
@internal
def foo():
c: DynArray[uint256, 1] = []
c.append(c[0])
```
```vyper
@internal
def foo():
c: DynArray[uint256, 1] = [1]
c[0] = c.pop()
```
the expected behavior in all of the above cases is to revert due to oob array access.
### Patches
patched in 4f8289a81206f767df1900ac48f485d90fc87edb
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
### References
_Are there any links users can visit to find out more?_
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'vyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.8'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/security/advisories/GHSA-3p37-3636-q8wv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31146'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/commit/4f8289a81206f767df1900ac48f485d90fc87edb'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/vyper/PYSEC-2023-77.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/vyperlang/vyper'}]
|
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-12T20:21:54Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-m6m8-6gq8-c9fj
|
2023-05-23T16:22:59Z
|
2023-05-22T19:49:11Z
| null |
['CVE-2023-32692']
|
Remote Code Execution Vulnerability in Validation Placeholders in CodeIgniter4
|
### Impact
This vulnerability allows attackers to execute arbitrary code when you use Validation Placeholders.
The vulnerability exists in the Validation library, and validation methods in the controller and in-model validation are also vulnerable because they use the Validation library internally.
### Patches
Upgrade to v4.3.5 or later.
### Workarounds
Setting validation rules with an array.
E.g.:
```php
$validation->setRules([
'email' => ['required', 'valid_email, 'is_unique[users.email,id,{id}]'],
]);
```
### References
- https://codeigniter4.github.io/userguide/libraries/validation.html#validation-placeholders
- https://codeigniter4.github.io/userguide/incoming/controllers.html#validating-data
- https://codeigniter4.github.io/userguide/models/model.html#in-model-validation
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'codeigniter4/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.5'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/codeigniter4/CodeIgniter4/security/advisories/GHSA-m6m8-6gq8-c9fj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32692'}, {'type': 'WEB', 'url': 'https://github.com/codeigniter4/CodeIgniter4/commit/6af677177fa1d9ad62f7a793bc96cba3068632ba'}, {'type': 'PACKAGE', 'url': 'https://github.com/codeigniter4/CodeIgniter4'}, {'type': 'WEB', 'url': 'https://github.com/codeigniter4/CodeIgniter4/blob/develop/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://github.com/codeigniter4/CodeIgniter4/blob/develop/CHANGELOG.md#v435-2023-05-21'}]
|
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-05-22T19:49:11Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-7p6g-gr9g-vfx6
|
2023-05-17T03:43:22Z
|
2023-05-16T18:30:16Z
| null |
['CVE-2023-33007']
|
Jenkins LoadComplete support Plugin Cross-site Scripting vulnerability
|
Jenkins LoadComplete support Plugin 1.0 and earlier does not escape the LoadComplete test name in its test result page.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
As of publication of this advisory, there is no fix.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:loadcomplete'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33007'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-2903'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T03:43:22Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-gx2j-5vc3-3794
|
2023-05-17T17:07:09Z
|
2023-05-16T21:30:22Z
| null |
['CVE-2023-2195']
|
Jenkins Code Dx Plugin cross-site request forgery vulnerability
|
Jenkins Code Dx Plugin 3.1.0 and earlier does not perform permission checks in several HTTP endpoints.
This allows attackers with Overall/Read permission to connect to an attacker-specified URL.
Additionally, these HTTP endpoints do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
Code Dx Plugin 4.0.0 requires POST requests and the appropriate permissions for the affected HTTP endpoints.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:codedx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2195'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3118'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T17:07:09Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-vpf7-r2fv-75m9
|
2023-05-05T02:19:39Z
|
2023-05-05T02:19:39Z
| null |
['CVE-2023-27321']
|
Uncontrolled Resource Consumption in OPC UA .NET Standard Reference Server
|
This security update resolves a vulnerability in the OPC UA .NET Standard Reference Server that allows
remote attackers to send malicious requests that consume all memory available to the server.
https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2023-27321.pdf
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'NuGet', 'name': 'OPCFoundation.NetStandard.Opc.Ua.Server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.371.86'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-vpf7-r2fv-75m9'}, {'type': 'PACKAGE', 'url': 'https://github.com/OPCFoundation/UA-.NETStandard'}]
|
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-05T02:19:39Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-94q4-v5g6-qp7x
|
2023-05-23T22:39:34Z
|
2023-05-12T12:30:18Z
| null |
['CVE-2023-27237']
|
LavaLite CMS vulnerable to host header injection attack
|
LavaLite CMS v 9.0.0 was discovered to be vulnerable to a host header injection attack.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'lavalite/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '9.0.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27237'}, {'type': 'PACKAGE', 'url': 'https://github.com/LavaLite/cms'}, {'type': 'WEB', 'url': 'https://github.com/M19O/Security-Advisories/tree/main/CVE-2023-27237'}, {'type': 'WEB', 'url': 'https://i.ibb.co/34DSW7B/1.png'}, {'type': 'WEB', 'url': 'https://i.ibb.co/kSkqPhQ/3.png'}, {'type': 'WEB', 'url': 'https://i.ibb.co/mJq9CH8/2.png'}, {'type': 'WEB', 'url': 'http://lavalite.com'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-12T20:16:19Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-wc64-c5rv-32pf
|
2023-05-11T20:47:56Z
|
2023-05-11T20:47:56Z
| null |
['CVE-2023-32076']
|
in-toto vulnerable to Configuration Read From Local Directory
|
### Impact
The in-toto configuration is read from various directories and allows users to configure the behavior of the framework. The files are from directories following the XDG base directory specification [1]. Among the files read is `.in_totorc` which is a hidden file in the directory in which in-toto is run. If an attacker controls the inputs to a supply chain step, they can mask their activities by also passing in an `.in_totorc` file that includes the necessary exclude patterns and settings.
RC files are widely used in other systems [2] and security issues have been discovered in their implementations as well [3]. We found in our conversations with in-toto adopters that `in_totorc` is not their preferred way to configure in-toto. As none of the options supported in `in_totorc` is unique, and can be set elsewhere using API parameters or CLI arguments, we decided to drop support for `in_totorc`.
### Other Recommendations
Sandbox functionary code as recommended in https://github.com/in-toto/docs/security/advisories/GHSA-p86f-xmg6-9q4x.
### References
[1] https://specifications.freedesktop.org/basedir-spec/basedir-spec-latest.html
[2] https://spec.editorconfig.org/
[3] https://github.blog/2022-04-12-git-security-vulnerability-announced/
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'in-toto'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.0'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/in-toto/docs/security/advisories/GHSA-p86f-xmg6-9q4x'}, {'type': 'WEB', 'url': 'https://github.com/in-toto/in-toto/security/advisories/GHSA-wc64-c5rv-32pf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32076'}, {'type': 'WEB', 'url': 'https://github.com/in-toto/in-toto/commit/3a21d84f40811b7d191fa7bd17265c1f99599afd'}, {'type': 'PACKAGE', 'url': 'https://github.com/in-toto/in-toto'}, {'type': 'WEB', 'url': 'https://github.com/in-toto/in-toto/releases/tag/v2.0.0'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/in-toto/PYSEC-2023-63.yaml'}, {'type': 'WEB', 'url': 'https://specifications.freedesktop.org/basedir-spec/basedir-spec-latest.html'}]
|
{'cwe_ids': ['CWE-15', 'CWE-610'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-11T20:47:56Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-jchm-fm4q-c2fp
|
2023-06-06T17:46:53Z
|
2023-05-08T12:30:29Z
| null |
['CVE-2023-25754']
|
Apache Airflow vulnerable to Privilege Context Switching Error
|
Privilege Context Switching Error vulnerability in Apache Software Foundation Apache Airflow. This issue affects Apache Airflow: before 2.6.0.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25754'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/29506'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/releases/tag/2.6.0'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/apache-airflow/PYSEC-2023-59.yaml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/3y83gr0qb8t49ppfk4fb2yk7md8ltq4v'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/05/08/2'}]
|
{'cwe_ids': ['CWE-270'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-05-11T20:32:46Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-vcf6-3wv2-5vcr
|
2023-05-12T15:24:34Z
|
2023-05-08T12:30:28Z
| null |
['CVE-2023-29247']
|
Apache Airflow vulnerable to stored Cross-site Scripting
|
Task instance details page in the UI is vulnerable to stored cross-site scripting. This issue affects Apache Airflow before 2.6.0.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29247'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/30447'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/30779'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/apache-airflow/PYSEC-2023-60.yaml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/kqf5lxmko133780clsp827xfsh4xd3fl'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-08T20:25:06Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-2f89-66v2-9p53
|
2023-05-17T03:04:45Z
|
2023-05-16T18:30:16Z
| null |
['CVE-2023-32980']
|
Jenkins Email Extension Plugin Cross-Site Request Forgery vulnerability
|
Jenkins Email Extension Plugin 2.96 and earlier does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability.
This allows attackers to make another user stop watching an attacker-specified job.
Email Extension Plugin 2.96.1 requires POST requests for the affected HTTP endpoint.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:email-ext'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.96.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32980'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3088%20(2)'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T03:04:45Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-6phf-6h5g-97j2
|
2023-06-02T22:05:04Z
|
2023-05-23T20:07:58Z
| null |
['CVE-2023-32697']
|
Sqlite-jdbc vulnerable to remote code execution when JDBC url is attacker controlled
|
## Summary
Sqlite-jdbc addresses a remote code execution vulnerability via JDBC URL.
## Impacted versions :
3.6.14.1-3.41.2.1
## References
https://github.com/xerial/sqlite-jdbc/releases/tag/3.41.2.2
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xerial:sqlite-jdbc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.6.14.1'}, {'fixed': '3.41.2.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xerial/sqlite-jdbc/security/advisories/GHSA-6phf-6h5g-97j2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32697'}, {'type': 'PACKAGE', 'url': 'https://github.com/xerial/sqlite-jdbc'}, {'type': 'WEB', 'url': 'https://github.com/xerial/sqlite-jdbc/releases/tag/3.41.2.2'}]
|
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-23T20:07:58Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-v6m2-j92j-2h78
|
2023-05-31T15:56:41Z
|
2023-05-24T15:30:27Z
| null |
['CVE-2023-33937']
|
Cross-site scripting in Liferay Portal
|
Stored cross-site scripting (XSS) vulnerability in Form widget configuration in Liferay Portal 7.1.0 through 7.3.0, and Liferay DXP 7.1 before fix pack 18, and 7.2 before fix pack 5 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a form's `name` field.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.liferay.portal:release.portal.bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.1.0'}, {'fixed': '7.3.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33937'}, {'type': 'PACKAGE', 'url': 'https://github.com/liferay/liferay-portal'}, {'type': 'WEB', 'url': 'https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33937'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-24T18:04:15Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-cjmm-x9x9-m2w5
|
2023-05-26T21:50:36Z
|
2023-05-26T13:55:42Z
| null |
['CVE-2023-33196']
|
Craft CMS stored XSS in review volume
|
### Summary
XSS can be triggered by review volumes
### PoC
1. Access setting tab
2. Create new assets
3. In assets name inject payload: "<script>alert(1337)</script>
4. Click Utilities tab
5. Choose all volumes, or volume trigger xss
6. Click Update asset indexes.
7. Wait to assets update success.
8. Progress complete.
9. Click on review button will trigger XSS
### Root cause
Function: index.php?p=admin/actions/asset-indexes/process-indexing-session&v=1680710595770
After loading completed, progess will load:
"skippedEntries"
and
"missingEntries"
These parameters is not yet filtered, I just tried "skippedEntries" but I think it will be work with "missingEntries"
### My reponse:
{
"session": {
"id": 10,
"indexedVolumes": {
"6": "\"<script>alert(1337)</script>"
},
"totalEntries": 2235,
"processedEntries": 2235,
"cacheRemoteImages": true,
"listEmptyFolders": false,
"isCli": false,
"actionRequired": true,
"dateCreated": "Apr 5, 2023, 9:03:16 AM",
"skippedEntries": [
"\"<script>alert(1337)</script>/assetpreviews/Image.php",
"\"<script>alert(1337)</script>/assetpreviews/Pdf.php"
],
"missingEntries": {
"folders": [],
"files": []
},
"processIfRootEmpty": false
},
"skipDialog": false
}
Resolved in https://github.com/craftcms/cms/commit/053d7119697e480ff81c5723bb9a33eaa49e0fc7
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-RC1'}, {'fixed': '4.4.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.4.6'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/craftcms/cms/security/advisories/GHSA-cjmm-x9x9-m2w5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33196'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/commit/053d7119697e480ff81c5723bb9a33eaa49e0fc7'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftcms/cms'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/releases/tag/4.4.7'}]
|
{'cwe_ids': ['CWE-79', 'CWE-80'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-26T13:55:42Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-r364-2pj4-pf7f
|
2023-06-08T14:01:20Z
|
2023-05-27T21:30:15Z
| null |
['CVE-2015-20108']
|
ruby-saml vulnerable to XPath injection
|
`xml_security.rb` in the ruby-saml gem before 1.0.0 for Ruby allows XPath injection and code execution because prepared statements are not used.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'RubyGems', 'name': 'ruby-saml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-20108'}, {'type': 'WEB', 'url': 'https://github.com/SAML-Toolkits/ruby-saml/pull/225'}, {'type': 'WEB', 'url': 'https://github.com/SAML-Toolkits/ruby-saml/commit/9853651b96b99653ea8627d757d46bfe62ab6448'}, {'type': 'PACKAGE', 'url': 'https://github.com/SAML-Toolkits/ruby-saml'}, {'type': 'WEB', 'url': 'https://github.com/SAML-Toolkits/ruby-saml/compare/v0.9.2...v1.0.0'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/ruby-saml/CVE-2015-20108.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/ruby-saml/OSVDB-124991.yml'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230703-0003/'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-RUBY-RUBYSAML-20217'}]
|
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T00:24:25Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-j9h5-vcgv-2jfm
|
2023-05-09T18:44:13Z
|
2023-05-09T17:46:22Z
| null |
['CVE-2023-32071']
|
XWiki Platform vulnerable to RXSS via editor parameter - importinline template
|
### Impact
It's possible to execute javascript with the right of any user by leading him to a special URL on the wiki targeting a page which contains an attachment.
To reproduce:
* add an attachment to a page (for example, your user profile)
* add `?xpage=importinline&editor=%22%3E%3Cimg%20src%20onerror=alert(document.domain)%3E` to the page view URL as in `https://myhost/xwiki/bin/view/XWiki/MyUser?xpage=importinline&editor=%22%3E%3Cimg%20src%20onerror=alert(document.domain)%3E`
### Patches
This has been patched in XWiki 15.0-rc-1, 14.10.4 and 14.4.8.
### Workarounds
The easiest is to edit file `<xwiki app>/templates/importinline.vm` and apply the modification described on https://github.com/xwiki/xwiki-platform/commit/28905f7f518cc6f21ea61fe37e9e1ed97ef36f01
### References
https://jira.xwiki.org/browse/XWIKI-20340
https://app.intigriti.com/company/submissions/e95a7ad5-7029-4627-abf0-3e3e3ea0b4ce/XWIKI-E93DFEYK
### Attribution
This vulnerability has been reported on Intigriti by René de Sain @renniepak.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-distribution-war'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2-milestone-1'}, {'fixed': '14.4.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-distribution-war'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.10.4'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-j9h5-vcgv-2jfm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32071'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/28905f7f518cc6f21ea61fe37e9e1ed97ef36f01'}, {'type': 'WEB', 'url': 'https://app.intigriti.com/company/submissions/e95a7ad5-7029-4627-abf0-3e3e3ea0b4ce/XWIKI-E93DFEYK'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20340'}]
|
{'cwe_ids': ['CWE-116', 'CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-05-09T17:46:22Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-pfwc-4frf-4gf8
|
2023-06-06T17:11:06Z
|
2023-05-24T18:30:26Z
| null |
['CVE-2023-33944']
|
Cross-site scripting in Liferay Portal
|
Cross-site scripting (XSS) vulnerability in Layout module in Liferay Portal 7.3.4 through 7.4.3.68, and Liferay DXP 7.3 before update 24, and 7.4 before update 69 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a container type layout fragment's `URL` text field.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.liferay.portal:release.portal.bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.3.4'}, {'fixed': '7.4.3.69'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33944'}, {'type': 'PACKAGE', 'url': 'https://github.com/liferay/liferay-portal'}, {'type': 'WEB', 'url': 'https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33944'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-24T21:52:24Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-v5gw-mw7f-84px
|
2023-06-12T16:47:36Z
|
2023-05-17T03:49:14Z
| null |
['CVE-2023-29159']
|
Starlette has Path Traversal vulnerability in StaticFiles
|
### Summary
When using `StaticFiles`, if there's a file or directory that starts with the same name as the `StaticFiles` directory, that file or directory is also exposed via `StaticFiles` which is a path traversal vulnerability.
### Details
The root cause of this issue is the usage of `os.path.commonprefix()`:
https://github.com/encode/starlette/blob/4bab981d9e870f6cee1bd4cd59b87ddaf355b2dc/starlette/staticfiles.py#L172-L174
As stated in the Python documentation (https://docs.python.org/3/library/os.path.html#os.path.commonprefix) this function returns the longest prefix common to paths.
When passing a path like `/static/../static1.txt`, `os.path.commonprefix([full_path, directory])` returns `./static` which is the common part of `./static1.txt` and `./static`, It refers to `/static/../static1.txt` because it is considered in the staticfiles directory. As a result, it becomes possible to view files that should not be open to the public.
The solution is to use `os.path.commonpath` as the Python documentation explains that `os.path.commonprefix` works a character at a time, it does not treat the arguments as paths.
### PoC
In order to reproduce the issue, you need to create the following structure:
```
├── static
│ ├── index.html
├── static_disallow
│ ├── index.html
└── static1.txt
```
And run the `Starlette` app with:
```py
import uvicorn
from starlette.applications import Starlette
from starlette.routing import Mount
from starlette.staticfiles import StaticFiles
routes = [
Mount("/static", app=StaticFiles(directory="static", html=True), name="static"),
]
app = Starlette(routes=routes)
if __name__ == "__main__":
uvicorn.run(app, host="0.0.0.0", port=8000)
```
And running the commands:
```shell
curl --path-as-is 'localhost:8000/static/../static_disallow/'
curl --path-as-is 'localhost:8000/static/../static1.txt'
```
The `static1.txt` and the directory `static_disallow` are exposed.
### Impact
Confidentiality is breached: An attacker may obtain files that should not be open to the public.
### Credits
Security researcher **Masashi Yamane of LAC Co., Ltd** reported this vulnerability to **JPCERT/CC Vulnerability Coordination Group** and they contacted us to coordinate a patch for the security issue.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'starlette'}, 'ecosystem_specific': {'affected_functions': ['starlette.staticfiles.StaticFiles.lookup_path']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.13.5'}, {'fixed': '0.27.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/encode/starlette/security/advisories/GHSA-v5gw-mw7f-84px'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29159'}, {'type': 'WEB', 'url': 'https://github.com/encode/starlette/commit/1797de464124b090f10cf570441e8292936d63e3'}, {'type': 'PACKAGE', 'url': 'https://github.com/encode/starlette'}, {'type': 'WEB', 'url': 'https://github.com/encode/starlette/blob/4bab981d9e870f6cee1bd4cd59b87ddaf355b2dc/starlette/staticfiles.py#L172-L174'}, {'type': 'WEB', 'url': 'https://github.com/encode/starlette/releases/tag/0.27.0'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/starlette/PYSEC-2023-83.yaml'}, {'type': 'WEB', 'url': 'https://jvn.jp/en/jp/JVN95981715/'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T03:49:14Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-wf7x-fh6w-34r6
|
2023-05-11T20:55:34Z
|
2023-05-05T06:30:32Z
| null |
['CVE-2023-32235']
|
Path Traversal in Ghost
|
Ghost before 5.42.1 allows remote attackers to read arbitrary files within the active theme's folder via /assets/built%2F..%2F..%2F/ directory traversal. This occurs in frontend/web/middleware/static-theme.js.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'ghost'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.42.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32235'}, {'type': 'WEB', 'url': 'https://github.com/TryGhost/Ghost/commit/378dd913aa8d0fd0da29b0ffced8884579598b0f'}, {'type': 'PACKAGE', 'url': 'https://github.com/TryGhost/Ghost'}, {'type': 'WEB', 'url': 'https://github.com/TryGhost/Ghost/compare/v5.42.0...v5.42.1'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-05T22:37:11Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-r97q-ghch-82j9
|
2023-05-03T21:57:10Z
|
2023-05-03T21:57:10Z
| null |
['CVE-2023-31133']
|
Ghost vulnerable to information disclosure of private API fields
|
### Impact
Due to a lack of validation when filtering on the public API endpoints, it is possible to reveal private fields via a brute force attack.
Ghost(Pro) has already been patched. We can find no evidence that the issue was exploited on Ghost(Pro) prior to the patch being added.
Self-hosters are impacted if running Ghost a version below v5.46.1. Immediate action should be taken to secure your site - see patches and workarounds below.
### Patches
v5.46.1 contains a fix for this issue.
### Workarounds
Add a block for requests to `/ghost/api/content/*` where the `filter` query parameter contains `password` or `email`.
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@ghost.org](mailto:security@ghost.org)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'ghost'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.46.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/TryGhost/Ghost/security/advisories/GHSA-r97q-ghch-82j9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31133'}, {'type': 'WEB', 'url': 'https://github.com/TryGhost/Ghost/commit/b3caf16005289cc9909488391b4a26f3f4a66a90'}, {'type': 'PACKAGE', 'url': 'https://github.com/TryGhost/Ghost'}, {'type': 'WEB', 'url': 'https://github.com/TryGhost/Ghost/releases/tag/v5.46.1'}]
|
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-03T21:57:10Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-f3wc-3vxv-xmvr
|
2023-05-24T17:28:26Z
|
2023-05-24T17:28:26Z
| null |
['CVE-2023-32323']
|
Synapse Outgoing federation to specific hosts can be disabled by sending malicious invites
|
### Impact
A malicious user on a Synapse homeserver X with permission to create certain state events can disable outbound federation from X to an arbitrary homeserver Y.
Synapse instances with federation disabled are not affected.
#### Details
The Matrix protocol allows homeservers to provide an `invite_room_state` field on a [room invite](https://spec.matrix.org/v1.5/client-server-api/#mroommember) containing a [summary of room state](https://spec.matrix.org/v1.5/client-server-api/#stripped-state). In versions of Synapse up to and including v1.73.0, Synapse did not limit the size of `invite_room_state`, meaning that it was possible to create an arbitrarily large invite event.
An attacker with an account on a vulnerable Synapse homeserver X could exploit this by having X create an over-sized invite event in a room with a user from another homeserver Y. Once acknowledged by the invitee's homeserver, the invite event would be sent in a batch of events to Y. If the malicious invite is so large that the entire batch is rejected as too large, X's outgoing traffic to Y would become "stuck", meaning that messages and state events created by X would remain unseen by Y.
### Patches
Synapse 1.74 refuses to create oversized `invite_room_state` fields. Server operators should upgrade to Synapse 1.74 or newer urgently.
### Workarounds
There are no robust workarounds.
This attack needs an account on Synapse homeserver X to deny federation from X to another homeserver Y. As a partial mitigation, Synapse operators can disable open registration to limit the ability of attackers to create new accounts on homeserver X.
If homeserver X has been attacked in this way, restarting it will resume outgoing federation by entering "catchup mode". For catchup mode to ignore the oversized invites, every attacked room must have a correctly-sized event sent by X which is newer than any oversized invite. This is difficult to arrange, and does not prevent the attacker from repeating their attack.
### References
- https://github.com/matrix-org/synapse/issues/14492 was caused by this issue.
- https://github.com/matrix-org/synapse/issues/14642 includes the patch described above.
### For more information
If you have any questions or comments about this advisory, e-mail us at [security@matrix.org](mailto:security@matrix.org).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.74.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/security/advisories/GHSA-f3wc-3vxv-xmvr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32323'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/issues/14492'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/14642'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/synapse'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/matrix-synapse/PYSEC-2023-67.yaml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJIJRP5ZH6B3KGFLHCAKR2IX2Y4Z25QD/'}]
|
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-24T17:28:26Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-6vcf-cfjp-qxcw
|
2023-05-22T21:30:24Z
|
2023-05-12T12:30:18Z
| null |
['CVE-2023-27238']
|
LavaLite vulnerable to web cache poisoning
|
LavaLite CMS v 9.0.0 was discovered to be vulnerable to web cache poisoning.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'lavalite/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '9.0.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27238'}, {'type': 'PACKAGE', 'url': 'https://github.com/LavaLite/cms'}, {'type': 'WEB', 'url': 'https://github.com/LavaLite/cms/blob/c0a36dd748c8f7ff53eb16eb572bdeebe72eb420/app/Http/Controllers/ResourceController.php#L8'}, {'type': 'WEB', 'url': 'https://github.com/M19O/Security-Advisories/tree/main/CVE-2023-27238'}]
|
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-05-12T15:21:06Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-mphm-gqh9-q59x
|
2023-05-09T18:48:39Z
|
2023-05-04T03:30:22Z
| null |
['CVE-2023-27075']
|
Stored cross site scripting in Microbin
|
A cross-site scripting vulnerability (XSS) in the component microbin/src/pasta.rs of Microbin v1.2.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'microbin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27075'}, {'type': 'WEB', 'url': 'https://github.com/szabodanika/microbin/issues/142'}, {'type': 'WEB', 'url': 'https://github.com/szabodanika/microbin/pull/143'}, {'type': 'WEB', 'url': 'https://github.com/szabodanika/microbin/pull/143/commits/6907bb4f13faf13e45d4a2cd0f9a8c562086e6ca'}, {'type': 'PACKAGE', 'url': 'https://github.com/szabodanika/microbin'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-05T02:22:40Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-pvrc-wvj2-f59p
|
2023-05-26T22:00:39Z
|
2023-05-26T22:00:39Z
| null |
['CVE-2023-33189']
|
Pomerium vulnerable to Incorrect Authorization with specially crafted requests
|
### Impact
With specially crafted requests, incorrect authorization decisions may be made by Pomerium.
### Patches
We are releasing patch fixes to address this vulnerability going back to `v0.17.X`. Please upgrade to:
- v0.22.2
- v0.21.4
- v0.20.1
- v0.19.2
- v0.18.1
- v0.17.4
### For more information
If you have any questions or comments about this advisory:
- Open an issue in [pomerium/pomerium](https://github.com/pomerium/pomerium/issues)
- Email us at [security@pomerium.com](mailto:security@pomerium.com)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/pomerium/pomerium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.22.0'}, {'fixed': '0.22.2'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/pomerium/pomerium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.21.0'}, {'fixed': '0.21.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/pomerium/pomerium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.20.0'}, {'fixed': '0.20.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/pomerium/pomerium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.19.0'}, {'fixed': '0.19.2'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/pomerium/pomerium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.18.0'}, {'fixed': '0.18.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/pomerium/pomerium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.17.4'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pomerium/pomerium/security/advisories/GHSA-pvrc-wvj2-f59p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33189'}, {'type': 'WEB', 'url': 'https://github.com/pomerium/pomerium/commit/d315e683357a9b587ba9ef399a8813bcc52fdebb'}, {'type': 'PACKAGE', 'url': 'https://github.com/pomerium/pomerium'}, {'type': 'WEB', 'url': 'https://github.com/pomerium/pomerium/releases/tag/v0.17.4'}, {'type': 'WEB', 'url': 'https://github.com/pomerium/pomerium/releases/tag/v0.18.1'}, {'type': 'WEB', 'url': 'https://github.com/pomerium/pomerium/releases/tag/v0.19.2'}, {'type': 'WEB', 'url': 'https://github.com/pomerium/pomerium/releases/tag/v0.20.1'}, {'type': 'WEB', 'url': 'https://github.com/pomerium/pomerium/releases/tag/v0.21.4'}, {'type': 'WEB', 'url': 'https://github.com/pomerium/pomerium/releases/tag/v0.22.2'}]
|
{'cwe_ids': ['CWE-285'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-05-26T22:00:39Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-hj3f-6gcp-jg8j
|
2023-05-26T21:16:59Z
|
2023-05-25T12:30:16Z
| null |
['CVE-2023-28370']
|
Open redirect in Tornado
|
Open redirect vulnerability in Tornado versions 6.3.1 and earlier allows a remote unauthenticated attacker to redirect a user to an arbitrary web site and conduct a phishing attack by having user access a specially crafted URL.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'tornado'}, 'ecosystem_specific': {'affected_functions': ['tornado.web.StaticFileHandler.validate_absolute_path']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28370'}, {'type': 'WEB', 'url': 'https://github.com/tornadoweb/tornado/commit/32ad07c54e607839273b4e1819c347f5c8976b2f'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/tornado/PYSEC-2023-75.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/tornadoweb/tornado'}, {'type': 'WEB', 'url': 'https://github.com/tornadoweb/tornado/releases/tag/v6.3.2'}, {'type': 'WEB', 'url': 'https://jvn.jp/en/jp/JVN45127776/'}]
|
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-25T17:00:25Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-j5fj-rfh6-qj85
|
2023-05-26T19:10:03Z
|
2023-05-12T20:55:36Z
| null |
['CVE-2023-32303']
|
Planet's secret file is created with excessive permissions
|
### Impact
The secret file stores the user's Planet API authentication information. It should only be accessible by the user, but its permissions allowed the user's group and non-group to read the file as well.
### Validation
Check the permissions on the secret file with `ls -l ~/.planet.json` and ensure that they read as `-rw-------`
### Patches
[d71415a8](https://github.com/planetlabs/planet-client-python/commit/d71415a83119c5e89d7b80d5f940d162376ee3b7)
### Workarounds
Set the secret file permissions to only user read/write by hand:
```
chmod 600 ~/.planet.json
```
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'planet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/planetlabs/planet-client-python/security/advisories/GHSA-j5fj-rfh6-qj85'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32303'}, {'type': 'WEB', 'url': 'https://github.com/planetlabs/planet-client-python/commit/d71415a83119c5e89d7b80d5f940d162376ee3b7'}, {'type': 'PACKAGE', 'url': 'https://github.com/planetlabs/planet-client-python'}, {'type': 'WEB', 'url': 'https://github.com/planetlabs/planet-client-python/releases/tag/2.0.1'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/planet/PYSEC-2023-71.yaml'}]
|
{'cwe_ids': ['CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-12T20:55:36Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-847g-34c5-vvm8
|
2023-05-09T16:51:21Z
|
2023-05-01T18:30:23Z
| null |
['CVE-2023-29641']
|
editor.md vulnerable to Cross-site Scripting
|
Cross Site Scripting (XSS) vulnerability in pandao editor.md thru 1.5.0 allows attackers to inject arbitrary web script or HTML via crafted markdown text.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'editor.md'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29641'}, {'type': 'WEB', 'url': 'https://github.com/pandao/editor.md/issues/985'}, {'type': 'PACKAGE', 'url': 'https://github.com/pandao/editor.md'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-01T22:32:24Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-59hw-j9g6-mfg3
|
2023-05-02T16:51:05Z
|
2023-05-02T09:30:17Z
| null |
['CVE-2023-32007']
|
Apache Spark UI vulnerable to Command Injection
|
The Apache Spark UI offers the possibility to enable ACLs via the configuration option spark.acls.enable. With an authentication filter, this checks whether a user has access permissions to view or modify the application. If ACLs are enabled, a code path in HttpSecurityFilter can allow someone to perform impersonation by providing an arbitrary user name. A malicious user might then be able to reach a permission check function that will ultimately build a Unix shell command based on their input, and execute it. This will result in arbitrary shell command execution as the user Spark is currently running as. This issue was disclosed earlier as CVE-2022-33891, but incorrectly claimed version 3.1.3 (which has since gone EOL) would not be affected.
NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
Users are recommended to upgrade to a supported version of Apache Spark, such as version 3.4.0.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-parent_2.12'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.1'}, {'fixed': '3.2.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'pyspark'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.1'}, {'fixed': '3.2.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32007'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/spark'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/pyspark/PYSEC-2023-72.yaml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/poxgnxhhnzz735kr1wos366l5vdbb0nv'}, {'type': 'WEB', 'url': 'https://spark.apache.org/security.html'}, {'type': 'WEB', 'url': 'https://www.cve.org/CVERecord?id=CVE-2022-33891'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/05/02/1'}]
|
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-02T16:51:05Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-ccw9-q5h2-8c2w
|
2023-06-19T17:01:31Z
|
2023-05-18T17:30:44Z
| null |
['CVE-2022-24666']
|
swift-nio-http2 vulnerable to denial of service via invalid HTTP/2 HEADERS frame length
|
A program using swift-nio-http2 is vulnerable to a denial of service attack, caused by a network peer sending a specially crafted HTTP/2 frame. This attack affects all swift-nio-http2 versions from 1.0.0 to 1.19.1. It is fixed in 1.19.2 and later releases.
This vulnerability is caused by a logical error when parsing a HTTP/2 HEADERS frame where the frame contains priority information without any other data. This logical error caused confusion about the size of the frame, leading to a parsing error. This parsing error immediately crashes the entire process.
Sending a HEADERS frame with HTTP/2 priority information does not require any special permission, so any HTTP/2 connection peer may send such a frame. For clients, this means any server to which they connect may launch this attack. For servers, anyone they allow to connect to them may launch such an attack.
The attack is low-effort: it takes very little resources to send an appropriately crafted frame. The impact on availability is high: receiving the frame immediately crashes the server, dropping all in-flight connections and causing the service to need to restart. It is straightforward for an attacker to repeatedly send appropriately crafted frames, so attackers require very few resources to achieve a substantial denial of service.
The attack does not have any confidentiality or integrity risks in and of itself: swift-nio-http2 is parsing the frame in memory-safe code, so the crash is safe. However, sudden process crashes can lead to violations of invariants in services, so it is possible that this attack can be used to trigger an error condition that has confidentiality or integrity risks.
The risk can be mitigated if untrusted peers can be prevented from communicating with the service. This mitigation is not available to many services.
The issue is fixed by rewriting the parsing code to correctly handle the condition. The issue was found by automated fuzzing by oss-fuzz.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/apple/swift-nio-http2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.19.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/apple/swift-nio-http2/security/advisories/GHSA-ccw9-q5h2-8c2w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24666'}, {'type': 'WEB', 'url': 'https://github.com/apple/swift-nio-http2/commit/93215774aa7d223a5ad5aa0b80453375d669fa8f'}, {'type': 'PACKAGE', 'url': 'https://github.com/apple/swift-nio-http2'}, {'type': 'WEB', 'url': 'https://github.com/apple/swift-nio-http2/releases/tag/1.19.2'}]
|
{'cwe_ids': ['CWE-130'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-18T17:30:44Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-9x7h-ggc3-xg47
|
2023-05-17T12:57:59Z
|
2023-05-08T15:30:20Z
| null |
['CVE-2023-30019']
|
imgproxy is vulnerable to Server-Side Request Forgery
|
imgproxy prior to version 3.15.0 is vulnerable to Server-Side Request Forgery (SSRF) due to a lack of sanitization of the imageURL parameter.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/imgproxy/imgproxy/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.15.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30019'}, {'type': 'WEB', 'url': 'https://github.com/imgproxy/imgproxy/commit/1a9768a2c682e88820064aa3d9a05ea234ff3cc4'}, {'type': 'WEB', 'url': 'https://breakandpray.com/cve-2023-30019-ssrf-in-imgproxy/'}, {'type': 'PACKAGE', 'url': 'https://github.com/imgproxy/imgproxy'}, {'type': 'WEB', 'url': 'https://github.com/imgproxy/imgproxy/blob/ee9e8f0cb101ec22318caffd552a23cc0548d5ce/imagedata/download.go#L142'}]
|
{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-11T20:34:50Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-2q89-485c-9j2x
|
2023-05-24T18:31:42Z
|
2023-05-11T20:40:54Z
| null |
['CVE-2023-1732']
|
Improper random reading in CIRCL
|
### Impact
When sampling randomness for a shared secret, the implementation of Kyber and FrodoKEM, did not check whether `crypto/rand.Read()` returns an error. In rare deployment cases (error thrown by the `Read()` function), this could lead to a predictable shared secret.
The tkn20 and blindrsa components did not check whether enough randomness was returned from the user provided randomness source. Typically the user provides `crypto/rand.Reader`, which in the vast majority of cases will always return the right number random bytes. In the cases where it does not, or the user provides a source that does not, the blinding for blindrsa is weak and integrity of the plaintext is not ensured in tkn20.
### Patches
The fix was introduced in CIRCL v. 1.3.3
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cloudflare/circl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/cloudflare/circl/security/advisories/GHSA-2q89-485c-9j2x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1732'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/circl/commit/ff8d91225f8954b4970b6d6382d2e4c78f4a4cf8'}, {'type': 'PACKAGE', 'url': 'https://github.com/cloudflare/circl'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/circl/releases/tag/v1.3.3'}]
|
{'cwe_ids': ['CWE-20', 'CWE-755'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-11T20:40:54Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-w88f-j9rc-h7v3
|
2023-06-01T04:14:20Z
|
2023-05-16T18:30:16Z
| null |
['CVE-2023-32996']
|
Jenkins SAML Single Sign On(SSO) Plugin missing permission checks
|
Jenkins SAML Single Sign On(SSO) Plugin 2.0.0 and earlier does not perform a permission check in an HTTP endpoint.
This allows attackers with Overall/Read permission to send an HTTP POST request with JSON body containing attacker-specified content, to miniOrange’s API for sending emails.
Additionally, this HTTP endpoint does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
SAML Single Sign On(SSO) Plugin 2.0.1 removes the affected HTTP endpoint.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:miniorange-saml-sp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32996'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-2994'}]
|
{'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T03:36:15Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-3vp4-m3rf-835h
|
2023-05-11T14:03:52Z
|
2023-05-04T06:30:12Z
| null |
['CVE-2023-26125']
|
Improper input validation in github.com/gin-gonic/gin
|
Versions of the package github.com/gin-gonic/gin before version 1.9.0 are vulnerable to Improper Input Validation by allowing an attacker to use a specially crafted request via the X-Forwarded-Prefix header, potentially leading to cache poisoning.
**Note:** Although this issue does not pose a significant threat on its own it can serve as an input vector for other more impactful vulnerabilities. However, successful exploitation may depend on the server configuration and whether the header is used in the application logic.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/gin-gonic/gin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26125'}, {'type': 'WEB', 'url': 'https://github.com/gin-gonic/gin/pull/3500'}, {'type': 'WEB', 'url': 'https://github.com/gin-gonic/gin/pull/3503'}, {'type': 'WEB', 'url': 'https://github.com/t0rchwo0d/gin/commit/fd9f98e70fb4107ee68c783482d231d35e60507b'}, {'type': 'PACKAGE', 'url': 'https://github.com/gin-gonic/gin'}, {'type': 'WEB', 'url': 'https://github.com/gin-gonic/gin/releases/tag/v1.9.0'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGINGONICGIN-3324285'}]
|
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-05T02:20:00Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-r3xc-prgr-mg9p
|
2023-05-15T21:42:53Z
|
2023-05-07T03:30:17Z
| null |
['CVE-2023-31047']
|
Django bypasses validation when using one form field to upload multiple files
|
In Django 3.2 before 3.2.19, 4.x before 4.1.9, and 4.2 before 4.2.1, it was possible to bypass validation when using one form field to upload multiple files. This multiple upload has never been supported by forms.FileField or forms.ImageField (only the last uploaded file was validated). However, Django's "Uploading multiple files" documentation suggested otherwise.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ecosystem_specific': {'affected_functions': ['django.forms.widgets.FileInput']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.19'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ecosystem_specific': {'affected_functions': ['django.forms.widgets.FileInput']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.9'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ecosystem_specific': {'affected_functions': ['django.forms.widgets.FileInput']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31047'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/21b1b1fc03e5f9e9f8c977ee6e35618dd3b353dd'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/e7c3a2ccc3a562328600be05068ed9149e12ce64'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/eed53d0011622e70b936e203005f0e6f4ac48965'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/4.2/releases/security/'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2023-61.yaml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!forum/django-announce'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A45VKTUVQ2BN6D5ZLZGCM774R6QGFOHW/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DNEHD6N435OE2XUFGDAAVAXSYWLCUBFD/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230609-0008/'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2023/may/03/security-releases/'}]
|
{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-05-09T21:35:46Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-6gp6-xj27-g89q
|
2023-05-10T21:18:54Z
|
2023-05-10T06:30:29Z
|
2023-05-10T21:18:54Z
|
[]
|
Duplicate Advisory: Cross-site Scripting (XSS) in name field of Custom Reports
|
## Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-m6m9-gr85-79vm. This link is maintained to preserve external references.
## Original Description
Cross-site Scripting (XSS) - DOM in GitHub repository pimcore/pimcore prior to 10.5.21.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.21'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2614'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/c36ef54ce33f7b5e74b7b0ab9eabfed47c018fc7'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1a5e6c65-2c5e-4617-9411-5b47a7e743a6'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-10T21:18:54Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-9xg6-75mh-7x3f
|
2023-05-10T00:40:39Z
|
2023-05-01T13:43:38Z
| null |
['CVE-2023-2361']
|
Cross-site Scripting (XSS) in pimcore
|
### Impact
An attacker can use XSS to send a malicious script to any user.
### Patches
Update to version 10.5.21 or apply this patch manually https://github.com/pimcore/pimcore/commit/6970649f5d3790a1db9ef4324bece0d4cb95366a.patch
### Workarounds
Apply patch https://github.com/pimcore/pimcore/commit/6970649f5d3790a1db9ef4324bece0d4cb95366a.patch manually.
### References
https://huntr.dev/bounties/24d91b83-c3df-48f5-a713-9def733f2de7/
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.21'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-9xg6-75mh-7x3f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2361'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/6970649f5d3790a1db9ef4324bece0d4cb95366a'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/24d91b83-c3df-48f5-a713-9def733f2de7'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-01T13:43:38Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-974q-4vvr-vg9c
|
2023-06-06T17:22:36Z
|
2023-05-31T03:30:15Z
| null |
['CVE-2023-2998']
|
thorsten/phpmyfaq vulnerable to cross-site scripting
|
In thorsten/phpmyfaq prior to 3.1.14, when admins create a FAQ News, they can pass xss to the "text of the record" section.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.14'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2998'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/c120070a66e6c497c328d3b6b067eebcd8ea8493'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpMyFAQ'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8282d78e-f399-4bf4-8403-f39103a31e78'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-02T17:13:29Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-8vx6-69vg-c46f
|
2023-05-12T20:16:38Z
|
2023-05-12T20:16:38Z
| null |
['CVE-2023-2512']
|
Buffer under-read in workerd
|
### Impact
Prior to version v1.20230419.0, the FormData API implementation was subject to an integer overflow. If a FormData instance contained more than 2^31 elements, the `forEach()` method could end up reading from the wrong location in memory while iterating over elements. This would most likely lead to a segmentation fault, but could theoretically allow arbitrary undefined behavior.
In order for the bug to be exploitable, the process would need to be able to allocate 160GB of RAM. Due to this, the bug was never exploitable on the Cloudflare Workers platform, but could theoretically be exploitable on deployments of workerd running on machines with a huge amount of memory. Moreover, in order to be remotely exploited, an attacker would have to upload a single form-encoded HTTP request of at least tens of gigabytes in size. The application code would then have to use `request.formData()` to parse the request and `formData.forEach()` to iterate over this data. Due to these limitations, the exploitation likelihood was considered Low.
### Patches
A fix that addresses this vulnerability has been released in version v1.20230419.0 and users are encouraged to update to the latest version available.
### References
Release - https://github.com/cloudflare/workerd/releases/tag/v1.20230419.0
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'workerd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.20230419.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/cloudflare/workerd/security/advisories/GHSA-8vx6-69vg-c46f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2512'}, {'type': 'PACKAGE', 'url': 'https://github.com/cloudflare/workerd'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/workerd/releases/tag/v1.20230419.0'}]
|
{'cwe_ids': ['CWE-125', 'CWE-127', 'CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-12T20:16:38Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-c6mm-2g84-v4m7
|
2023-05-09T16:20:41Z
|
2023-05-05T23:10:44Z
| null |
['CVE-2023-31143']
|
Mage-ai missing user authentication
|
### Impact
You may be impacted if you're using Mage with user authentication enabled. The terminal could be accessed by users who are not signed in or do not have editor permissions.
### Patches
The vulnerability has been resolved in Mage version 0.8.72.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'mage-ai'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8.34'}, {'fixed': '0.8.72'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/mage-ai/mage-ai/security/advisories/GHSA-c6mm-2g84-v4m7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31143'}, {'type': 'WEB', 'url': 'https://github.com/mage-ai/mage-ai/commit/f63cd00f6a3be372397d37a4c9a49bfaf50d7650'}, {'type': 'PACKAGE', 'url': 'https://github.com/mage-ai/mage-ai'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/mage-ai/PYSEC-2023-64.yaml'}]
|
{'cwe_ids': ['CWE-306'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-05T23:10:44Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-pv7v-ph6g-3gxv
|
2023-05-09T19:59:31Z
|
2023-05-09T19:59:31Z
| null |
['CVE-2023-31126']
|
Improper Neutralization of Invalid Characters in Data Attribute Names in org.xwiki.commons:xwiki-commons-xml
|
### Impact
The HTML sanitizer, introduced in version 14.6-rc-1, allowed the injection of arbitrary HTML code and thus cross-site scripting via invalid data attributes. This can be exploited, e.g., via the link syntax in any content that supports XWiki syntax like comments in XWiki:
```
[[Link1>>https://XWiki.example.com||data-x/onmouseover="alert('XSS1')"]].
```
When a user moves the mouse over this link, the malicious JavaScript code is executed in the context of the user session. When this user is a privileged user who has programming rights, this allows server-side code execution with programming rights, impacting the confidentiality, integrity and availability of the XWiki instance.
Note that this vulnerability does not affect restricted cleaning in HTMLCleaner as there attributes are cleaned and thus characters like `/` and `>` are removed in all attribute names.
### Patches
This problem has been patched in XWiki 14.10.4 and 15.0 RC1 by making sure that data attributes only contain allowed characters.
### Workarounds
There are no known workarounds apart from upgrading to a version including the fix.
### References
* https://jira.xwiki.org/browse/XCOMMONS-2606
* https://github.com/xwiki/xwiki-commons/commit/0b8e9c45b7e7457043938f35265b2aa5adc76a68
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki](https://jira.xwiki.org/)
* Email us at [XWiki Security mailing-list](mailto:security@xwiki.org)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.commons:xwiki-commons-xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.6-rc-1'}, {'fixed': '14.10.4'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-pv7v-ph6g-3gxv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31126'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-commons/commit/0b8e9c45b7e7457043938f35265b2aa5adc76a68'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-commons'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XCOMMONS-2606'}]
|
{'cwe_ids': ['CWE-79', 'CWE-86'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-05-09T19:59:31Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-g35x-j6jj-8g7j
|
2023-05-02T16:51:25Z
|
2023-05-02T16:51:25Z
| null |
[]
|
@mittwald/kubernetes's secret contents leaked via debug logging
|
### Impact
When debug logging is enabled (via `DEBUG` environment variable), the Kubernetes client may log all response bodies into the debug log -- including sensitive data from `Secret` resources.
When running in a Kubernetes cluster, this might expose sensitive information to users who are _not_ authorised to access secrets, but have access to Pod logs (either directly using kubectl, or by Pod logs being shipped elsewhere).
### Patches
Upgrade to 3.5.0 or newer.
### Workarounds
Disable debug logging entirely, or exclude the `kubernetes:client` debug item (for example, using `DEBUG=*,-kubernetes:client`).
### References
- https://cwe.mitre.org/data/definitions/532.html
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@mittwald/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/mittwald/node-kubernetes/security/advisories/GHSA-g35x-j6jj-8g7j'}, {'type': 'WEB', 'url': 'https://github.com/mittwald/node-kubernetes/commit/04f6809fd438417c343d541e57f76f0040e069cd'}, {'type': 'PACKAGE', 'url': 'https://github.com/mittwald/node-kubernetes'}, {'type': 'WEB', 'url': 'https://github.com/mittwald/node-kubernetes/releases/tag/v3.5.0'}]
|
{'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-02T16:51:25Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-h6jh-cf83-qcq5
|
2023-05-31T15:57:56Z
|
2023-05-24T09:30:25Z
| null |
['CVE-2023-2859']
|
Code injection in nilsteampassnet/teampass
|
nilsteampassnet/teampass prior to 3.0.9 is vulnerable to code injection. A malicious user could potentially rename a folder with a payload containing malicious code. This could result in an attack on an admin who edits the folder, as the payload could execute upon the admin's interaction with the folder. This attack could potentially allow the attacker to gain unauthorized access to the admin's system or steal sensitive information, or it could force admin to get redirected to a website controlled by the attacker.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'nilsteampassnet/teampass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.9'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2859'}, {'type': 'WEB', 'url': 'https://github.com/nilsteampassnet/teampass/commit/1f51482a0c4d152ca876844212b0f8f3cb9387af'}, {'type': 'PACKAGE', 'url': 'https://github.com/nilsteampassnet/teampass'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d7b8ea75-c74a-4721-89bb-12e5c80fb0ba'}]
|
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-24T17:32:25Z', 'nvd_published_at': None}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.