schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
stringlengths 20
20
⌀ | aliases
stringlengths 2
20
| summary
stringlengths 20
140
| details
stringlengths 56
37.2k
| severity
stringlengths 2
92
| affected
stringlengths 88
7.07k
| references
stringlengths 139
4.72k
| database_specific
stringlengths 131
185
|
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0
|
GHSA-m44f-9jhg-59cr
|
2023-05-24T21:33:54Z
|
2023-05-16T21:30:23Z
| null |
['CVE-2023-31544']
|
alkacon-OpenCMS vulnerable to stored Cross-site Scripting
|
A stored cross-site scripting (XSS) vulnerability in alkacon-OpenCMS v11.0.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Title field under the Upload Image module.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.opencms:opencms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.0.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31544'}, {'type': 'WEB', 'url': 'https://github.com/alkacon/opencms-core/issues/652'}, {'type': 'WEB', 'url': 'https://github.com/alkacon/opencms-core/commit/21bfbeaf6b038e2c03bb421ce7f0933dd7a7633e'}, {'type': 'PACKAGE', 'url': 'https://github.com/alkacon/opencms-core'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T17:05:29Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-4xqq-73wg-5mjp
|
2023-06-06T18:45:42Z
|
2023-05-15T06:30:19Z
| null |
['CVE-2023-32758']
|
git-url-parse Regular Expression Denial of Service
|
giturlparse (aka git-url-parse) through 1.2.2, as used in Semgrep 1.5.2 through 1.24.1, is vulnerable to ReDoS (Regular Expression Denial of Service) if parsing untrusted URLs. This might be relevant if Semgrep is analyzing an untrusted package (for example, to check whether it accesses any Git repository at an http:// URL), and that package's author placed a ReDoS attack payload in a URL used by the package.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'git-url-parse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32758'}, {'type': 'WEB', 'url': 'https://github.com/returntocorp/semgrep/pull/7611'}, {'type': 'WEB', 'url': 'https://github.com/returntocorp/semgrep/pull/7943'}, {'type': 'WEB', 'url': 'https://github.com/returntocorp/semgrep/pull/7955'}, {'type': 'PACKAGE', 'url': 'https://github.com/coala/git-url-parse'}, {'type': 'WEB', 'url': 'https://github.com/coala/git-url-parse/blob/master/giturlparse/parser.py#L53'}, {'type': 'WEB', 'url': 'https://pypi.org/project/git-url-parse'}]
|
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-15T20:51:51Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-2ffp-w665-9mgx
|
2023-05-10T15:31:07Z
|
2023-05-05T21:31:11Z
| null |
['CVE-2023-2516']
|
Cross Site Scripting in nilsteampassnet/teampass
|
nilsteampassnet/teampass prior to version 3.0.7 is vulnerable to cross site scripting (XSS) from item names within a folder.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'nilsteampassnet/teampass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.7'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2516'}, {'type': 'WEB', 'url': 'https://github.com/nilsteampassnet/teampass/commit/39b774cba118ca5383b0a51a71b1e7dea2761927'}, {'type': 'PACKAGE', 'url': 'https://github.com/nilsteampassnet/teampass'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/19470f0b-7094-4339-8d4a-4b5570b54716'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-05T23:20:08Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-q7cc-m6jw-m262
|
2023-05-10T21:26:05Z
|
2023-05-10T21:26:05Z
| null |
['CVE-2023-2615']
|
Pimcore Cross-site Scripting (XSS) in Predefined Properties delete
|
### Impact
This vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites.
### Patches
Update to version 10.5.21 or apply this patches manually
https://github.com/pimcore/pimcore/commit/7a799399e6843cd049e85da27ceb75b78505317f.patch
### Workarounds
Apply patches manually:
https://github.com/pimcore/pimcore/commit/7a799399e6843cd049e85da27ceb75b78505317f.patch
### References
https://huntr.dev/bounties/af9c360a-87f8-4e97-a24b-6db675ee942a/
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.21'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-q7cc-m6jw-m262'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2615'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/7a799399e6843cd049e85da27ceb75b78505317f'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/af9c360a-87f8-4e97-a24b-6db675ee942a'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-10T21:26:05Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-qg36-9jxh-fj25
|
2023-05-26T21:50:46Z
|
2023-05-22T19:41:56Z
| null |
['CVE-2023-33185']
|
Incorrect signature verification in django-ses
|
The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests are signed by AWS and are verified by django_ses, however the verification of this signature was found to be flawed as it allowed users to specify arbitrary public certificates.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'django-ses'}, 'ecosystem_specific': {'affected_functions': ['django_ses.utils.EventMessageVerifier._get_cert_url']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/django-ses/django-ses/security/advisories/GHSA-qg36-9jxh-fj25'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33185'}, {'type': 'WEB', 'url': 'https://github.com/django-ses/django-ses/commit/b71b5f413293a13997b6e6314086cb9c22629795'}, {'type': 'PACKAGE', 'url': 'https://github.com/django-ses/django-ses'}, {'type': 'WEB', 'url': 'https://github.com/django-ses/django-ses/blob/3d627067935876487f9938310d5e1fbb249a7778/CVE/001-cert-url-signature-verification.md'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/django-ses/PYSEC-2023-82.yaml'}]
|
{'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-22T19:41:56Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-26j3-4m55-j6r7
|
2023-05-17T03:24:22Z
|
2023-05-16T18:30:16Z
| null |
['CVE-2023-32989']
|
Jenkins Azure VM Agents Plugin Cross-site Request Forgery vulnerability
|
Jenkins Azure VM Agents Plugin 852.v8d35f0960a_43 and earlier does not perform permission checks in several HTTP endpoints.
This allows attackers with Overall/Read permission to connect to an attacker-specified Azure Cloud server using attacker-specified credentials IDs obtained through another method.
Additionally, these HTTP endpoints do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
Azure VM Agents Plugin 853.v4a_1a_dd947520 requires POST requests and the appropriate permissions for the affected HTTP endpoints.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:azure-vm-agents'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '853.v4a'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32989'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-2855%20(2)'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T03:24:22Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-f8hp-grmr-pp7j
|
2023-05-10T00:34:41Z
|
2023-05-02T18:30:20Z
| null |
['CVE-2023-29918']
|
RosarioSIS vulnerable to CSV Injection
|
RosarioSIS 10.8.4 is vulnerable to CSV injection via the Periods Module.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'francoisjacquet/rosariosis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '10.8.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29918'}, {'type': 'WEB', 'url': 'https://docs.google.com/document/d/1JAhJOlfKKD5Y5zEKo0_8a3A-nQ7Dz_GIMmlXmOvXV48/edit?usp=sharing'}, {'type': 'PACKAGE', 'url': 'https://github.com/francoisjacquet/rosariosis'}]
|
{'cwe_ids': ['CWE-1236'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-02T23:13:23Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-x67g-47p3-rc7f
|
2023-06-06T16:48:07Z
|
2023-05-30T06:30:26Z
| null |
['CVE-2023-2970']
|
MindSpore vulnerable to memory corruption
|
A vulnerability classified as problematic was found in MindSpore 2.0.0-alpha/2.0.0-rc1. This vulnerability affects the function `JsonHelper::UpdateArray` of the file `mindspore/ccsrc/minddata/dataset/util/json_helper.cc`. The manipulation leads to memory corruption. The name of the patch is 30f4729ea2c01e1ed437ba92a81e2fc098d608a9. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-230176.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'mindspore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.0-rc1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2970'}, {'type': 'PACKAGE', 'url': 'https://gitee.com/mindspore/mindspore'}, {'type': 'WEB', 'url': 'https://gitee.com/mindspore/mindspore/commit/30f4729ea2c01e1ed437ba92a81e2fc098d608a9'}, {'type': 'WEB', 'url': 'https://gitee.com/mindspore/mindspore/issues/I73DOS'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/mindspore/PYSEC-2023-81.yaml'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.230176'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.230176'}]
|
{'cwe_ids': ['CWE-119'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T16:48:07Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-mv7x-27pc-8c96
|
2023-05-31T18:26:17Z
|
2023-05-30T15:30:27Z
| null |
['CVE-2023-2978']
|
Go package pydio/cells vulnerable to authorization bypass
|
A vulnerability was found in Abstrium Pydio Cells 4.2.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Change Subscription Handler. The manipulation leads to authorization bypass. Upgrading to version 4.2.1 is able to address this issue. It is recommended to upgrade the affected component. VDB-230210 is the identifier assigned to this vulnerability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/pydio/cells'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2978'}, {'type': 'WEB', 'url': 'https://pydio.com/en/community/releases/pydio-cells/pydio-cells-enterprise-421'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.230210'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.230210'}, {'type': 'PACKAGE', 'url': 'github.com/pydio/cells'}]
|
{'cwe_ids': ['CWE-639'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-31T18:26:17Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-jj45-24rw-v6jw
|
2023-05-11T14:07:30Z
|
2023-05-04T21:30:27Z
| null |
['CVE-2023-30094']
|
Cross-site scripting in TotalJS
|
A stored cross-site scripting (XSS) vulnerability in TotalJS allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the platform name field in the settings module.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'total4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.81'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30094'}, {'type': 'WEB', 'url': 'https://github.com/totaljs/flow/issues/100'}, {'type': 'WEB', 'url': 'https://github.com/totaljs/framework4/commit/e2cea690c3fe4453e94da896a69f832511f65179'}, {'type': 'PACKAGE', 'url': 'https://github.com/totaljs/framework4'}, {'type': 'WEB', 'url': 'https://www.edoardoottavianelli.it/CVE-2023-30094/'}, {'type': 'WEB', 'url': 'https://www.youtube.com/watch?v=8VbTm2sIdBE'}, {'type': 'WEB', 'url': 'https://www.youtube.com/watch?v=vOb9Fyg3iVo'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-05T02:17:45Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-p6m6-9j36-vfjx
|
2023-05-25T16:55:03Z
|
2023-05-16T18:30:15Z
| null |
['CVE-2023-31890']
|
glazedlists XML Deserialization vulnerability
|
An XML Deserialization vulnerability in glazedlists v1.11.0 allows an attacker to execute arbitrary code via the BeanXMLByteCoder.decode() parameter.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.glazedlists:glazedlists'}, 'versions': ['1.11.0']}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31890'}, {'type': 'WEB', 'url': 'https://github.com/glazedlists/glazedlists/issues/709'}, {'type': 'PACKAGE', 'url': 'https://github.com/glazedlists/glazedlists'}, {'type': 'WEB', 'url': 'https://github.com/glazedlists/glazedlists/blob/e0593e338246945dab4e83356ef44a59db172a80/extensions/io/src/main/java/ca/odell/glazedlists/impl/io/BeanXMLByteCoder.java'}]
|
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T03:48:55Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-qpgm-gjgf-8c2x
|
2023-06-02T23:52:23Z
|
2023-05-26T13:55:00Z
| null |
['CVE-2023-33195']
|
Craft CMS XSS in RSS widget feed
|
### Summary
A malformed RSS feed can deliver an XSS payload
### PoC
Create an RSS widget and add the domain https://blog.whitebear.vn/file/rss-xss2.rss
The XSS payload will be triggered by the title in tag `<item>`
Resolved in https://github.com/craftcms/cms/commit/b77cb3023bed4f4a37c11294c4d319ff9f598e1f
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.4.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.4.5'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/craftcms/cms/security/advisories/GHSA-qpgm-gjgf-8c2x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33195'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/commit/b77cb3023bed4f4a37c11294c4d319ff9f598e1f'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftcms/cms'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/releases/tag/4.4.6'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-26T13:55:00Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-pp8m-prr7-wr8w
|
2023-05-17T03:23:08Z
|
2023-05-16T18:30:16Z
| null |
['CVE-2023-32985']
|
Jenkins Sidebar Link Plugin vulnerable to Path Traversal
|
Jenkins Sidebar Link Plugin allows specifying files in the `userContent/` directory for use as link icons.
Sidebar Link Plugin 2.2.1 and earlier does not restrict the path of files in a method implementing form validation.
This allows attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.
Sidebar Link Plugin 2.2.2 ensures that only files located within the expected `userContent/` directory can be accessed.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:sidebar-link'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32985'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3125'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T03:23:08Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-6mhc-hqr3-w466
|
2023-06-06T20:28:06Z
|
2023-05-12T00:30:18Z
|
2023-06-06T20:28:06Z
|
['CVE-2023-31508']
|
Duplicate Advisory: PrestaShop Cross-site Scripting vulnerability
|
## Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-95hx-62rh-gg96. This link is maintained to preserve external references.
## Original Description
A cross-site scripting (XSS) vulnerability in PrestaShop v1.7.7.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the message parameter in /contactform/contactform.php.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.7.7.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31508'}, {'type': 'PACKAGE', 'url': 'https://github.com/PrestaShop/PrestaShop'}, {'type': 'WEB', 'url': 'https://github.com/mustgundogdu/Research/blob/main/PrestaShop/ReflectedXSS_1.7.7.4.md'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-12T20:19:08Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-hgv6-w7r3-w4qw
|
2023-05-30T20:07:06Z
|
2023-05-30T20:07:06Z
| null |
[]
|
Kyverno vulnerable due to usage of insecure cipher
|
### Summary
Insecure 3DES ciphers are used which may lead to exploitation of the [Sweet32 vulnerability](https://sweet32.info/). Specifically, the ciphers TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) and TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) are allowed. See CVE-2016-2183. This is fixed in Kyverno v1.9.5 and v1.10.0 and no known users have been affected.
### Details
The ciphers in affected versions can be read using the following command which uses `nmap`:
```sh
$ kubectl exec -it mypod -n kyverno sh
kubectl exec [POD] [COMMAND] is DEPRECATED and will be removed in a future version. Use kubectl exec [POD] -- [COMMAND] instead.
**nmap -sV --script ssl-enum-ciphers -p 443 kyverno-cleanup-controller** or
**nmap -sV --script ssl-enum-ciphers -p 443 kyverno-svc**
Starting Nmap 7.92 ( https://nmap.org ) at 2023-05-26 10:55 UTC
Nmap scan report for kyverno-cleanup-controller (10.103.199.233)
Host is up (0.000058s latency).
rDNS record for 10.103.199.233: kyverno-cleanup-controller.kyverno.svc.cluster.local
PORT STATE SERVICE VERSION
443/tcp open ssl/http Golang net/http server (Go-IPFS json-rpc or InfluxDB API)
| ssl-enum-ciphers:
| TLSv1.2:
| ciphers:
**| TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C**
| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
| TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
| TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
| TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
| TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
**| TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C**
| TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
| TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
| TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
| TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
| compressors:
| NULL
| cipher preference: client
| warnings:
| 64-bit block cipher 3DES vulnerable to SWEET32 attack
| TLSv1.3:
| ciphers:
| TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
| TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
| TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
| cipher preference: server
|_ least strength: C
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 12.72 seconds
```
|
[]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/kyverno/kyverno'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.5'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/kyverno/kyverno/security/advisories/GHSA-hgv6-w7r3-w4qw'}, {'type': 'WEB', 'url': 'https://github.com/kyverno/kyverno/pull/7308'}, {'type': 'PACKAGE', 'url': 'https://github.com/kyverno/kyverno'}, {'type': 'WEB', 'url': 'https://github.com/kyverno/kyverno/releases/tag/v1.9.5'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-30T20:07:06Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-j2wh-wrv3-4x4g
|
2023-02-16T18:41:07Z
|
2023-02-16T18:41:07Z
| null |
[]
|
Unwanted access to the entire file system vulnerability due to a missing check in `staticFiles` HTTP handler
|
### Summary
Missing check vulnerability in the static file handler allows any client to access the files in the server's file system
### Details
When `staticFiles` is set in the `serve` settings in the configuration file, the following handler doesn't check if `absolutePath` is still under the directory provided as `staticFiles`;
```ts
if (staticFiles) {
router.get('/:relativePath+', async request => {
let { relativePath } = request.params;
if (!relativePath) {
relativePath = 'index.html';
}
const absolutePath = path.join(baseDir, staticFiles, relativePath);
if (absolutePath.includes(staticFiles) && (await pathExists(absolutePath))) {
const readStream = fs.createReadStream(absolutePath);
return new Response(readStream as any, {
status: 200,
});
}
return undefined;
});
```
### Example scenario
To reproduce it, set `staticFiles` to the relative path of a directory in `.meshrc.yml`;
```yml
serve:
staticFiles: ./public
```
Then start the server with `mesh dev`, and browse to `/..%2fpackage.json` then you will see the content of `package.json`. You can even go deeper to see sensitive data; `/..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd`
### Impact and solution
If `staticFiles` is set under `serve` in the configuration file. you have two options to fix vulnerability;
- Update `@graphql-mesh/cli` to a version higher than `0.82.21`, and if you use `@graphql-mesh/http`, update it to a version higher than `0.3.18`
- Remove `staticFiles` option from the configuration, and use other solutions to serve static files.
### Credits
Thanks [alanwillms@gmail.com](mailto:alanwillms@gmail.com) for reporting this vulnerability with details
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@graphql-mesh/cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.78.0'}, {'fixed': '0.82.22'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@graphql-mesh/http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.19'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/Urigo/graphql-mesh/security/advisories/GHSA-j2wh-wrv3-4x4g'}, {'type': 'WEB', 'url': 'https://github.com/Urigo/graphql-mesh/commit/95d93e7c140c2995b37e9d822aa3fe4e24ed2e78'}, {'type': 'PACKAGE', 'url': 'https://github.com/Urigo/graphql-mesh'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-16T18:41:07Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-32jc-9p58-p82x
|
2023-03-02T18:16:20Z
|
2023-02-17T21:30:41Z
| null |
['CVE-2023-23923']
|
Moodle Improper Access Control vulnerability
|
The vulnerability was found Moodle which exists due to insufficient limitations on the "start page" preference. A remote attacker can set that preference for another user. The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.19'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10.0'}, {'fixed': '3.11.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-beta'}, {'fixed': '4.0.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0-beta'}, {'fixed': '4.1.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23923'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2162549'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=443274#p1782023'}, {'type': 'WEB', 'url': 'http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-76862'}]
|
{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-02T18:16:20Z', 'nvd_published_at': '2023-02-17T20:15:00Z'}
|
1.4.0
|
GHSA-3cw5-7cxw-v5qg
|
2023-02-01T01:37:56Z
|
2023-02-01T01:37:56Z
| null |
['CVE-2023-23924']
|
Dompdf vulnerable to URI validation failure on SVG parsing
|
### Summary
The URI validation on dompdf 2.0.1 can be bypassed on SVG parsing by passing `<image>` tags with uppercase letters. This might leads to arbitrary object unserialize on PHP < 8, through the `phar` URL wrapper.
### Details
The bug occurs during SVG parsing of `<image>` tags, in src/Image/Cache.php :
```
if ($type === "svg") {
$parser = xml_parser_create("utf-8");
xml_parser_set_option($parser, XML_OPTION_CASE_FOLDING, false);
xml_set_element_handler(
$parser,
function ($parser, $name, $attributes) use ($options, $parsed_url, $full_url) {
if ($name === "image") {
$attributes = array_change_key_case($attributes, CASE_LOWER);
```
This part will try to detect `<image>` tags in SVG, and will take the href to validate it against the protocolAllowed whitelist. However, the `$name comparison with "image" is case sensitive, which means that such a tag in the SVG will pass :
```
<svg>
<Image xlink:href="phar:///foo"></Image>
</svg>
```
As the tag is named "Image" and not "image", it will not pass the condition to trigger the check.
A correct solution would be to strtolower the `$name` before the check :
```
if (strtolower($name) === "image") {
```
### PoC
Parsing the following SVG file is sufficient to reproduce the vulnerability :
```
<svg>
<Image xlink:href="phar:///foo"></Image>
</svg>
```
### Impact
An attacker might be able to exploit the vulnerability to call arbitrary URL with arbitrary protocols, if they can provide a SVG file to dompdf. In PHP versions before 8.0.0, it leads to arbitrary unserialize, that will leads at the very least to an arbitrary file deletion, and might leads to remote code execution, depending on classes that are available.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'dompdf/dompdf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/dompdf/dompdf/security/advisories/GHSA-3cw5-7cxw-v5qg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23924'}, {'type': 'WEB', 'url': 'https://github.com/dompdf/dompdf/commit/7558f07f693b2ac3266089f21051e6b78c6a0c85'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/dompdf/dompdf/CVE-2023-23924.yaml'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3cw5-7cxw-v5qg'}, {'type': 'PACKAGE', 'url': 'https://github.com/dompdf/dompdf'}, {'type': 'WEB', 'url': 'https://github.com/dompdf/dompdf/releases/tag/v2.0.2'}]
|
{'cwe_ids': ['CWE-551', 'CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-01T01:37:56Z', 'nvd_published_at': '2023-02-01T00:15:00Z'}
|
1.4.0
|
GHSA-86rf-38v8-9c4x
|
2023-02-16T17:39:11Z
|
2023-02-09T15:30:27Z
| null |
['CVE-2023-0759']
|
privilege chaining in cockpit-hq/cockpit
|
Privilege Chaining in GitHub repository cockpit-hq/cockpit prior to 2.3.8.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'cockpit-hq/cockpit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.8'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0759'}, {'type': 'WEB', 'url': 'https://github.com/cockpit-hq/cockpit/commit/78d6ed3bf093ee11356ba66320c628c727068714'}, {'type': 'PACKAGE', 'url': 'https://github.com/Cockpit-HQ/Cockpit'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/49e2cccc-bb56-4633-ba6a-b3803e251347'}]
|
{'cwe_ids': ['CWE-268'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-09T19:30:04Z', 'nvd_published_at': '2023-02-09T14:15:00Z'}
|
1.4.0
|
GHSA-q82h-q47j-f492
|
2023-03-01T01:48:46Z
|
2023-02-18T00:31:59Z
| null |
['CVE-2022-48115']
|
Cross-site Scripting in jspreadsheet
|
The dropdown menu in jspreadsheet before v4.6.0 was discovered to be vulnerable to cross-site scripting (XSS).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'jspreadsheet-ce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-48115'}, {'type': 'WEB', 'url': 'https://github.com/jspreadsheet/ce/issues/1587'}, {'type': 'PACKAGE', 'url': 'https://github.com/jspreadsheet/ce'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-18T02:18:38Z', 'nvd_published_at': '2023-02-17T22:15:00Z'}
|
1.4.0
|
GHSA-pj97-r83v-vj7f
|
2023-02-08T16:14:45Z
|
2023-02-01T06:30:28Z
| null |
['CVE-2023-0608']
|
Microweber contains Cross-site Scripting
|
Cross-site Scripting (XSS) - DOM in GitHub repository microweber/microweber prior to 1.3.2.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0608'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/20df56615e61624f5fff149849753869e4b3b936'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/02a86e0d-dff7-4e27-89d5-2f7dcd4b580c'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-02T16:58:27Z', 'nvd_published_at': '2023-02-01T06:15:00Z'}
|
1.4.0
|
GHSA-rmw8-7823-wp7f
|
2023-02-15T21:59:44Z
|
2023-02-08T09:30:24Z
| null |
['CVE-2023-0742']
|
Answer contains Cross-site Scripting vulnerability
|
Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.4.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0742'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/c3001de52af91f09c96e701facbce0b9fa0c98ad'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d73a2c03-7035-453b-9c04-c733ace65544'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:35:27Z', 'nvd_published_at': '2023-02-08T08:15:00Z'}
|
1.4.0
|
GHSA-76r7-h46w-463r
|
2023-02-15T18:17:22Z
|
2023-02-15T18:17:22Z
| null |
[]
|
Cross Site Scripting (XSS) in Model\DataObject\Data\UrlSlug
|
### Impact
An attacker can use XSS to send a malicious script to an unsuspecting user.
### Patches
Update to version 10.5.17 or apply this patch manually https://github.com/pimcore/pimcore/pull/14301.patch
### Workarounds
Apply https://github.com/pimcore/pimcore/pull/14301.patch manually.
### References
https://huntr.dev/bounties/75bc7d07-46a7-4ed9-a405-af4fc47fb422/
|
[]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.17'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-76r7-h46w-463r'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T18:17:22Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-r3vq-92c6-3mqf
|
2023-04-28T22:06:24Z
|
2023-02-16T15:30:28Z
|
2023-02-23T16:57:49Z
|
[]
|
Duplicate advisory: Sequelize - Unsafe fall-through in getWhereConditions
|
## Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of [GHSA-vqfx-gj96-3w95](https://github.com/advisories/GHSA-vqfx-gj96-3w95). This link is maintained to preserve external references.
## Original Description
Due to improper parameter filtering in the sequalize js library, can a attacker peform injection.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@sequelize/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.0-alpha.20'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22579'}, {'type': 'WEB', 'url': 'https://csirt.divd.nl/CVE-2023-22579'}, {'type': 'WEB', 'url': 'https://csirt.divd.nl/DIVD-2022-00020/'}]
|
{'cwe_ids': ['CWE-843'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-23T16:57:49Z', 'nvd_published_at': '2023-02-16T15:15:00Z'}
|
1.4.0
|
GHSA-3jfq-742w-xg8j
|
2023-02-16T20:47:25Z
|
2023-02-16T20:47:25Z
| null |
['CVE-2023-23947']
|
Users with any cluster secret update access may update out-of-bounds cluster secrets
|
### Impact
All Argo CD versions starting with v2.3.0-rc1 are vulnerable to an improper authorization bug which allows users who have the ability to update at least one cluster secret to update any cluster secret.
The attacker could use this access to escalate privileges (potentially controlling Kubernetes resources) or to break Argo CD functionality (by preventing connections to external clusters).
#### How the Attack Works
Argo CD stores [cluster access configurations](https://argo-cd.readthedocs.io/en/stable/operator-manual/declarative-setup/#clusters) as Kubernetes Secrets. To take advantage of the vulnerability, an attacker must know the server URL for the cluster secret they want to modify.
The attacker must be authenticated with the Argo CD API server, and they must be authorized to update at least one ([non project-scoped](https://argo-cd.readthedocs.io/en/stable/user-guide/projects/#project-scoped-repositories-and-clusters)) cluster. Then they must craft a malicious request to the Argo CD API server.
#### Removing Deployment Restrictions
A cluster Secret's `clusterResources` field determines whether Argo CD users may deploy cluster-scoped resources to that cluster. The `namespaces` field determines the namespaces to which Argo CD users may deploy resources.
You can use this command to determine whether any of your cluster configurations employ these restrictions (replace `argocd` with the namespace of your Argo CD installation):
```shell
kubectl get secret -n argocd -l 'argocd.argoproj.io/secret-type=cluster' -ojson | jq '.items |
map(.data |= with_entries(.value |= @base64d)) | # base64-decode secrets
map(select(.data | (
(.clusterResources != null and .clusterResources == "false") or # we deny cluster-scoped resource management
(.namespaces != null and .namespaces != "") # we are only managing certain clusters
)) | .metadata.name)'
```
The `clusterResources` and `namespaces` fields are one line of defense against unauthorized management of Kubernetes resources. Users should also have AppProject and RBAC restrictions in place.
If `clusterResources: "false"` or `namespaces: "some,namespaces"` are the _only_ mechanisms preventing an attacker from maliciously managing certain resources via Argo CD, then this vulnerability could allow that attacker to manage out-of-bounds resources via Argo CD (create, get, update, delete).
#### Modifying Connection Parameters
Cluster secrets also hold client configuration for connecting to the remote cluster. One option is to skip TLS certificate verification. An attacker could disable certificate verification in an effort to achieve a malicious-in-the-middle (MITM) attack.
Alternatively, an attacker could apply an invalid configuration (for example, by setting an invalid bearer token) and achieve a denial-of-service by preventing Argo CD from managing the target cluster.
#### Changing Unscoped Clusters to be Scoped
The vulnerability also allows an attacker to modify a previously-unscoped cluster and make it [scoped](https://argo-cd.readthedocs.io/en/stable/user-guide/projects/#project-scoped-repositories-and-clusters). This is important if you are using `permitOnlyProjectScopedClusters: true` in a project under which the attacker can deploy. By scoping a previously-unscoped cluster under that project, they can grant themselves the ability to manage resources on the target cluster.
### Patches
A patch for this vulnerability has been released in the following Argo CD versions:
* v2.6.2
* v2.5.11
* v2.4.23
* v2.3.17
### Workarounds
The best way to mitigate the vulnerability is to upgrade. The following two sections explain other ways to mitigate the vulnerability if you are currently unable to upgrade.
#### Limit Users with Cluster Update Access
The only complete mitigation besides upgrading is to modify your RBAC configuration to completely revoke all `clusters, update` access.
To exploit this vulnerability, an attacker must have access to update at least one cluster configuration. Check your [RBAC configuration](https://argo-cd.readthedocs.io/en/stable/operator-manual/rbac/), for lines like this:
```
p, role:developers, clusters, update, *, allow
p, role:developers, clusters, *, *, allow
p, role:developers, *, update, *, allow
```
Revoke `clusters, update` access for any users who do not absolutely need that access.
#### Restrict Resource Management via AppProjects and RBAC
[AppProjects](https://argo-cd.readthedocs.io/en/stable/user-guide/projects/#projects) are a primary tool to restrict what resources may be managed via Argo CD.
You can use the `destinations` and `clusterResourceWhitelist` fields to apply similar restrictions as the `namespaces` and `clusterResources` fields described above.
```yaml
apiVersion: argoproj.io/v1alpha1
kind: AppProject
spec:
destinations:
# Only allow Applications managed by this AppProject to manage to the `allowed-namespace` namespace.
- namespace: 'allowed-namespace'
server: 'https://your-server'
# Do not allow Applications managed by this AppProject to manage any cluster-scoped resources.
clusterResourceWhitelist: []
```
Along with adding AppProject restrictions, make sure that your RBAC restrictions are strict enough.
For example, limit `projects, update` access to Argo CD administrators only. Also use the `{project}` field in `applications, *, {project}/{application}` field to limit users' access to certain, restricted, AppProjects.
AppProject restrictions can only prevent Applications from managing out-of-bounds resources. It cannot prevent an attacker from maliciously changing cluster connection TLS configuration.
### For more information
* Open an issue in [the Argo CD issue tracker](https://github.com/argoproj/argo-cd/issues) or [discussions](https://github.com/argoproj/argo-cd/discussions)
* Join us on [Slack](https://argoproj.github.io/community/join-slack) in channel #argo-cd
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.17'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.23'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.11'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/security/advisories/GHSA-3jfq-742w-xg8j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23947'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/commit/fbb0b99b1ac3361b253052bd30259fa43a520945'}, {'type': 'PACKAGE', 'url': 'https://github.com/argoproj/argo-cd'}]
|
{'cwe_ids': ['CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-16T20:47:25Z', 'nvd_published_at': '2023-02-16T18:15:00Z'}
|
1.4.0
|
GHSA-q9p5-w2v9-6wxf
|
2023-02-08T22:42:01Z
|
2023-02-01T12:32:41Z
| null |
['CVE-2023-24977']
|
Apache InLong contains Out-of-bounds Read vulnerability
|
Out-of-bounds Read vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.1.0 through 1.5.0. Users are advised to upgrade to Apache InLong's latest version or cherry-pick https://github.com/apache/inlong/pull/7214 to solve it.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.inlong:inlong'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'last_affected': '1.5.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24977'}, {'type': 'WEB', 'url': 'https://github.com/apache/inlong/pull/7214'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/inlong'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/ggozxorctn3tdll7bgmpwwcbjnd0s6w7'}]
|
{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-02T17:00:28Z', 'nvd_published_at': '2023-02-01T10:15:00Z'}
|
1.4.0
|
GHSA-r77c-qv68-j3pp
|
2023-02-14T21:34:31Z
|
2023-02-04T09:30:21Z
| null |
['CVE-2018-25080']
|
Cross-site Scripting in MobileDetect
|
A vulnerability, which was classified as problematic, has been found in MobileDetect 2.8.31. This issue affects the function initLayoutType of the file examples/session_example.php of the component Example. The manipulation of the argument $_SERVER['PHP_SELF'] leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.8.32 is able to address this issue. The name of the patch is 31818a441b095bdc4838602dbb17b8377d1e5cce. It is recommended to upgrade the affected component. The identifier VDB-220061 was assigned to this vulnerability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'mobiledetect/mobiledetectlib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.32'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25080'}, {'type': 'WEB', 'url': 'https://github.com/serbanghita/Mobile-Detect/pull/741'}, {'type': 'WEB', 'url': 'https://github.com/serbanghita/Mobile-Detect/commit/31818a441b095bdc4838602dbb17b8377d1e5cce'}, {'type': 'PACKAGE', 'url': 'https://github.com/serbanghita/Mobile-Detect'}, {'type': 'WEB', 'url': 'https://github.com/serbanghita/Mobile-Detect/releases/tag/2.8.32'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.220061'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.220061'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T21:34:31Z', 'nvd_published_at': '2023-02-04T08:15:00Z'}
|
1.4.0
|
GHSA-xr9w-x6gw-c9mj
|
2023-04-03T17:18:44Z
|
2023-02-25T06:30:21Z
|
2023-04-03T17:18:44Z
|
[]
|
Duplicate advisory: Deno vulnerable to Regular Expression Denial of Service
|
## Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of [GHSA-jc97-h3h9-7xh6](https://github.com/advisories/GHSA-jc97-h3h9-7xh6). This link is maintained to preserve external references.
## Original Description
Versions of the package deno before 1.31.0 are vulnerable to Regular Expression Denial of Service (ReDoS) due to the upgradeWebSocket function, which contains regexes in the form of /s*,s*/, used for splitting the Connection/Upgrade header. A specially crafted Connection/Upgrade header can be used to significantly slow down a web socket server. This issue has been patched in version 1.31.0.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'deno'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.31.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26103'}, {'type': 'WEB', 'url': 'https://github.com/denoland/deno/pull/17722'}, {'type': 'WEB', 'url': 'https://github.com/denoland/deno/commit/cf06a7c7e672880e1b38598fe445e2c50b4a9d06'}, {'type': 'PACKAGE', 'url': 'https://github.com/denoland/deno'}, {'type': 'WEB', 'url': 'https://github.com/denoland/deno/blob/2b247be517d789a37e532849e2e40b724af0918f/ext/http/01_http.js%23L395-L409'}, {'type': 'WEB', 'url': 'https://github.com/denoland/deno/releases/tag/v1.31.0'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-RUST-DENO-3315970'}]
|
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-28T14:00:55Z', 'nvd_published_at': '2023-02-25T05:15:00Z'}
|
1.4.0
|
GHSA-q264-w97q-q778
|
2023-05-10T17:20:51Z
|
2023-02-10T23:08:06Z
| null |
['CVE-2023-23625']
|
Denial of service via HAMT Decoding Panics
|
### Impact
Trying to read malformed HAMT sharded directories can cause panics and virtual memory leaks.
If you are reading untrusted user input, an attacker can then trigger a panic.
This is caused by bogus `fanout` parameter in the HAMT directory nodes.
This include checks returned in [ipfs/go-bitfield GHSA-2h6c-j3gf-xp9r](https://github.com/ipfs/go-bitfield/security/advisories/GHSA-2h6c-j3gf-xp9r), as well as limiting the `fanout` to `<= 1024` (to avoid attempts of arbitrary sized allocations).
### Patches
- https://github.com/ipfs/go-unixfs/commit/dbcc43ec3e2db0d01e8d80c55040bba3cf22cb4b
### Workarounds
Do not feed untrusted user data to the decoding functions.
### References
- https://github.com/ipfs/go-bitfield/security/advisories/GHSA-2h6c-j3gf-xp9r
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ipfs/go-unixfs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/ipfs/go-unixfs/security/advisories/GHSA-q264-w97q-q778'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23625'}, {'type': 'WEB', 'url': 'https://github.com/ipfs/go-unixfs/commit/467d139a640ecee4f2e74643dafcc58bb3b54175'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q264-w97q-q778'}, {'type': 'PACKAGE', 'url': 'https://github.com/ipfs/go-unixfs'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1557'}]
|
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-10T23:08:06Z', 'nvd_published_at': '2023-02-09T21:15:00Z'}
|
1.4.0
|
GHSA-7h4w-6p98-r3wx
|
2023-02-22T00:11:02Z
|
2023-02-21T15:30:23Z
| null |
['CVE-2021-32854']
|
textAngular Cross-site Scripting vulnerability
|
textAngular is a text editor for Angular.js. Version 1.5.16 and prior are vulnerable to copy-paste cross-site scripting (XSS). For this particular type of XSS, the victim needs to be fooled into copying a malicious payload into the text editor. There are no known patches.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'textangular'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.16'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32854'}, {'type': 'PACKAGE', 'url': 'https://github.com/textAngular/textAngular'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2021-1001-textAngular/'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T00:11:02Z', 'nvd_published_at': '2023-02-21T15:15:00Z'}
|
1.4.0
|
GHSA-jrmh-v64j-mjm9
|
2023-03-02T19:56:37Z
|
2023-02-18T00:31:59Z
| null |
['CVE-2023-0482']
|
Insecure Temporary File in RESTEasy
|
In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-undertow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.2.2.Final'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0482'}, {'type': 'WEB', 'url': 'https://github.com/resteasy/resteasy/pull/3409/commits/807d7456f2137cde8ef7c316707211bf4e542d56'}, {'type': 'PACKAGE', 'url': 'https://github.com/resteasy/Resteasy'}, {'type': 'WEB', 'url': 'https://issues.redhat.com/browse/RESTEASY-3286'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230427-0001/'}]
|
{'cwe_ids': ['CWE-378'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-18T02:18:19Z', 'nvd_published_at': '2023-02-17T22:15:00Z'}
|
1.4.0
|
GHSA-5h4j-qrvg-9xhw
|
2023-02-16T21:52:40Z
|
2023-02-16T18:44:47Z
| null |
['CVE-2023-25653']
|
Improper calculations in ECC implementation can trigger a Denial-of-Service (DoS)
|
### Description
When using the non-default "fallback" crypto back-end, ECC operations in `node-jose` can trigger a Denial-of-Service (DoS) condition, due to a possible infinite loop in an internal calculation. For some ECC operations, this condition is triggered randomly; for others, it can be triggered by malicious input.
#### Technical summary
The JOSE logic implemented by `node-jose` usually relies on an external cryptographic library for the underlying cryptographic primitives that JOSE operations require. When WebCrypto or the Node `crypto` module are available, they are used. When neither of these libraries is available, `node-jose` includes its own "fallback" implementations of some algorithms based on `node-forge`, in particular implementations of ECDH and ECDSA.
A various points, these algorithm implementations need to compute to the X coordinate of an elliptic curve point. This is done by calling the `getX()` method of the object representing the point, which is an alias of the function `pointFpGetX()` in `lib/deps/ecc/math.js`.
Computing the X coordinate from the form in which the point is stored requires computing the modular inverse of the Z coordinate, using the `modInverse` function from the `jsbn` library (e.g., `this.z.modInverse(this.curve.p)`). The output of this function call is multiplied by another value before being reduced with the `barrettReduce()` function.
The root cause of this issue is that the `jsbn` `modInverse` function sometimes returns negative results. These results are correct in that they are equivalent mod the relevant modulus, but can be problematic for functions that expect modular operations to always return positive results (in the range `[0, p)`, where `p` is the modulus).
In particular, while the Barrett reduction algorithm in general can handle negative inputs, the implementation in `node-jose` explicitly does not. Therefore, while the negative value that is returned by `modInverse()` is mathematically correct, it leads to an error in `barrettReduce()` causing an infinite loop which may result in a Denial of Service condition.
For a given prime modulus, we estimate that roughly one in every `2^20` inputs produce a negative `modInverse()`. This estimate was validated with exhaustive testing on small primes (<30 bits) and randomized testing with regard to the P-256 prime.
### Impact
This issue is only present in situations where the "fallback" cryptographic implementation is being used, i.e., situations where neither WebCrypto nor the Node `crypto` module is available.
The following elliptic curve algorithms are impacted by this issue (all in `lib/deps/ecc/index.js`):
- Elliptic curve key generation (`exports.generateKeyPair`)
- Converting an elliptic curve private key to a public key (`ECPrivateKey.prototype.toPublicKey`)
- ECDSA signing (`ECPrivateKey.prototype.sign`)
- ECDSA verification (`ECPublicKey.prototype.verify`)
- ECDH key agreement (`ECPrivateKey.prototype.computeSecret`)
In the first three cases, the points being evaluated are generated randomly, so an attack could only arise due to a bad value being randomly selected (as noted above, with probability roughly `2^{-20}`). In the latter two cases, the points being evaluated are provided from outside the library, and thus potentially by attackers.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
### Workarounds
Since this issue is only present in the "fallback" crypto implementation, it can be avoided by ensuring that either WebCrypto or the Node `crypto` module is available in the JS environment where `node-jose` is being run.
### References
- [Barrett reduction on Wikipedia](https://en.wikipedia.org/wiki/Barrett_reduction)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [cisco/node-jose](https://github.com/cisco/node-jose/issues)
* Email [Cisco open source security](mailto:oss-security@cisco.com)
### Credits
- Research and disclosure: BlackBerry
- Fix implementation: [Richard Barnes (@bifurcation)](https://github.com/bifurcation)
- Release engineering: [Stephen Augustus (@justaugustus)](https://github.com/justaugustus)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'node-jose'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/cisco/node-jose/security/advisories/GHSA-5h4j-qrvg-9xhw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25653'}, {'type': 'WEB', 'url': 'https://github.com/cisco/node-jose/commit/901d91508a70e3b9bdfc45688ea07bb4e1b8210d'}, {'type': 'PACKAGE', 'url': 'https://github.com/cisco/node-jose'}]
|
{'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-16T18:44:47Z', 'nvd_published_at': '2023-02-16T19:15:00Z'}
|
1.4.0
|
GHSA-53jx-vvf9-4x38
|
2023-02-10T03:27:58Z
|
2023-02-10T03:27:58Z
| null |
['CVE-2023-24815']
|
StaticHandler disclosure of classpath resources on Windows when mounted on a wildcard route
|
### Summary
When running vertx web applications that serve files using `StaticHandler` on Windows Operating Systems and Windows File Systems, if the mount point is a wildcard (`*`) then an attacker can exfiltrate any class path resource.
### Details
When computing the relative path to locate the resource, in case of wildcards, the code:
https://github.com/vert-x3/vertx-web/blob/62c0d66fa1c179ae6a4d57344631679a2b97e60f/vertx-web/src/main/java/io/vertx/ext/web/impl/Utils.java#L83
returns the user input (without validation) as the segment to lookup. Even though checks are performed to avoid escaping the sandbox, given that the input was not sanitized `\` are not properly handled and an attacker can build a path that is valid within the classpath.
### PoC
https://github.com/adrien-aubert-drovio/vertx-statichandler-windows-traversal-path-vulnerability
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'io.vertx:vertx-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.8'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/vert-x3/vertx-web/security/advisories/GHSA-53jx-vvf9-4x38'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24815'}, {'type': 'WEB', 'url': 'https://github.com/vert-x3/vertx-web/commit/9e3a783b1d1a731055e9049078b1b1494ece9c15'}, {'type': 'PACKAGE', 'url': 'https://github.com/vert-x3/vertx-web'}, {'type': 'WEB', 'url': 'https://github.com/vert-x3/vertx-web/blob/62c0d66fa1c179ae6a4d57344631679a2b97e60f/vertx-web/src/main/java/io/vertx/ext/web/impl/Utils.java#L83'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-10T03:27:58Z', 'nvd_published_at': '2023-02-09T18:15:00Z'}
|
1.4.0
|
GHSA-8h3g-hcwp-6hxq
|
2023-02-13T20:51:29Z
|
2023-02-06T06:30:25Z
| null |
['CVE-2022-25853']
|
semver-tags is vulnerable to Command Injection via the getGitTagsRemote function
|
All versions of the package semver-tags are vulnerable to Command Injection via the getGitTagsRemote function due to improper input sanitization.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'semver-tags'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.4.10'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25853'}, {'type': 'PACKAGE', 'url': 'https://github.com/jtrussell/semver-tags'}, {'type': 'WEB', 'url': 'https://github.com/jtrussell/semver-tags/blob/db1ba680bafed0d51e1bb36bd38f2c5439fe8b00/lib/get-tags.js#L21'}, {'type': 'WEB', 'url': 'https://github.com/jtrussell/semver-tags/blob/db1ba680bafed0d51e1bb36bd38f2c5439fe8b00/lib/get-tags.js%23L21'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-SEMVERTAGS-3175612'}]
|
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-07T20:08:41Z', 'nvd_published_at': '2023-02-06T05:15:00Z'}
|
1.4.0
|
GHSA-r6ch-mqf9-qc9w
|
2023-02-16T20:46:10Z
|
2023-02-16T20:46:10Z
| null |
['CVE-2023-24807']
|
Regular Expression Denial of Service in Headers
|
### Impact
The `Headers.set()` and `Headers.append()` methods are vulnerable to Regular Expression Denial of Service (ReDoS) attacks when untrusted values are passed into the functions. This is due to the inefficient regular expression used to normalize the values in the `headerValueNormalize()` utility function.
### Patches
This vulnerability was patched in v5.19.1.
### Workarounds
There is no workaround. Please update to an unaffected version.
### References
* https://hackerone.com/bugs?report_id=1784449
### Credits
Carter Snook reported this vulnerability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'undici'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.19.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/nodejs/undici/security/advisories/GHSA-r6ch-mqf9-qc9w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24807'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/undici/commit/f2324e549943f0b0937b09fb1c0c16cc7c93abdf'}, {'type': 'PACKAGE', 'url': 'https://github.com/nodejs/undici'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/undici/releases/tag/v5.19.1'}, {'type': 'WEB', 'url': 'https://hackerone.com/bugs?report_id=1784449'}]
|
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-16T20:46:10Z', 'nvd_published_at': '2023-02-16T18:15:00Z'}
|
1.4.0
|
GHSA-6cvf-m58q-h9wf
|
2023-03-06T19:36:19Z
|
2023-02-21T15:30:23Z
| null |
['CVE-2023-0934']
|
Answer vulnerable to Cross-site Scripting
|
Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.5.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.5'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0934'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/edc06942d51fa8e56a134c5c7e5c8826d9260da0'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/cd213098-5bab-487f-82c7-13698ad43b51'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T00:09:37Z', 'nvd_published_at': '2023-02-21T15:15:00Z'}
|
1.4.0
|
GHSA-4f48-qpch-4ppx
|
2023-02-10T00:04:36Z
|
2023-02-03T18:30:27Z
| null |
['CVE-2021-37305']
|
Insecure Permissions issue in jeecg-boot
|
An Insecure Permissions issue in jeecg-boot 2.4.5 and earlier allows remote attackers to gain escalated privilege and view sensitive information via api uri: /sys/user/querySysUser?username=admin.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-base'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4.5'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37305'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/issues/2794'}, {'type': 'PACKAGE', 'url': 'https://github.com/jeecgboot/jeecg-boot'}]
|
{'cwe_ids': ['CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-04T00:30:23Z', 'nvd_published_at': '2023-02-03T18:15:00Z'}
|
1.4.0
|
GHSA-vrjv-mxr7-vjf8
|
2023-03-03T23:17:35Z
|
2023-02-23T00:30:39Z
| null |
['CVE-2023-26303']
|
markdown-it-py Denial of Service vulnerability
|
Denial of service could be caused to markdown-it-py, before v2.2.0, if an attacker was allowed to force null assertions with specially crafted input.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'markdown-it-py'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26303'}, {'type': 'WEB', 'url': 'https://github.com/executablebooks/markdown-it-py/pull/246'}, {'type': 'WEB', 'url': 'https://github.com/executablebooks/markdown-it-py/commit/53ca3e9c2b9e9b295f6abf7f4ad2730a9b70f68c'}, {'type': 'WEB', 'url': 'https://github.com/executablebooks/markdown-it-py/commit/ae03c6107dfa18e648f6fdd1280f5b89092d5d49'}, {'type': 'PACKAGE', 'url': 'https://github.com/executablebooks/markdown-it-py'}]
|
{'cwe_ids': ['CWE-173'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-23T19:40:55Z', 'nvd_published_at': '2023-02-23T00:15:00Z'}
|
1.4.0
|
GHSA-7j55-28qq-676g
|
2023-02-23T21:30:58Z
|
2023-02-15T15:30:40Z
| null |
['CVE-2023-25766']
|
Missing Authorization in Jenkins Azure Credentials Plugin
|
A missing permission check in Jenkins Azure Credentials Plugin 253.v887e0f9e898b and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:azure-credentials'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '253.v887e0f9e898b'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25766'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/azure-credentials-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-1757'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/02/15/4'}]
|
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T18:33:44Z', 'nvd_published_at': '2023-02-15T14:15:00Z'}
|
1.4.0
|
GHSA-q3c8-65q7-9v78
|
2023-02-10T00:21:34Z
|
2023-02-03T18:30:26Z
| null |
['CVE-2021-37502']
|
Cross site scripting in automad/automad
|
Cross Site Scripting (XSS) vulnerability in automad 1.7.5 allows remote attackers to run arbitrary code via the user name field when adding a user.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'automad/automad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37502'}, {'type': 'WEB', 'url': 'https://github.com/marcantondahmen/automad/issues/29'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-04T00:30:20Z', 'nvd_published_at': '2023-02-03T18:15:00Z'}
|
1.4.0
|
GHSA-g857-47pm-3r32
|
2023-03-08T17:22:00Z
|
2023-02-27T21:30:30Z
| null |
['CVE-2023-24249']
|
laravel-admin has Arbitrary File Upload vulnerability
|
An arbitrary file upload vulnerability in laravel-admin v1.8.19 allows attackers to execute arbitrary code via a crafted PHP file.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'encore/laravel-admin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.8.19'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24249'}, {'type': 'WEB', 'url': 'https://github.com/z-song/laravel-admin/issues/5726'}, {'type': 'WEB', 'url': 'https://flyd.uk/post/cve-2023-24249/'}, {'type': 'PACKAGE', 'url': 'https://github.com/z-song/laravel-admin'}, {'type': 'WEB', 'url': 'https://laravel-admin.org/'}]
|
{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-08T17:22:00Z', 'nvd_published_at': '2023-02-27T19:15:00Z'}
|
1.4.0
|
GHSA-7968-h4m4-ghm9
|
2023-02-15T18:11:23Z
|
2023-02-15T18:10:54Z
| null |
['CVE-2023-25156']
|
No protection against brute-force attacks on login page
|
### Impact
Previous versions of Kiwi TCMS do not impose rate limits which makes it easier to attempt brute-force attacks against the login page.
### Patches
Users should upgrade to v12.0 or later.
### Workarounds
Users may install and configure a rate-limiting proxy in front of Kiwi TCMS. For example nginx.
### References
[Disclosed by spyata](https://huntr.dev/bounties/2b1a9be9-45e9-490b-8de0-26a492e79795/)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'kiwitcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/kiwitcms/Kiwi/security/advisories/GHSA-7968-h4m4-ghm9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25156'}, {'type': 'WEB', 'url': 'https://github.com/kiwitcms/Kiwi/commit/0ed213fa0ddb7a6dc77e3c3b99e8fc90ccdaf46f'}, {'type': 'PACKAGE', 'url': 'https://github.com/kiwitcms/Kiwi'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/2b1a9be9-45e9-490b-8de0-26a492e79795/'}, {'type': 'WEB', 'url': 'https://kiwitcms.org/blog/kiwi-tcms-team/2023/02/15/kiwi-tcms-120/'}]
|
{'cwe_ids': ['CWE-307'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T18:10:54Z', 'nvd_published_at': '2023-02-15T15:15:00Z'}
|
1.4.0
|
GHSA-hxjp-q6c3-38fx
|
2023-02-17T21:32:15Z
|
2023-02-10T09:30:23Z
| null |
['CVE-2023-22832']
|
XML External Entity Reference in Apache NiFi
|
The ExtractCCDAAttributes Processor in Apache NiFi 1.2.0 through 1.19.1 does not restrict XML External Entity references. Flow configurations that include the ExtractCCDAAttributes Processor are vulnerable to malicious XML documents that contain Document Type Declarations with XML External Entity references. The resolution disables Document Type Declarations and disallows XML External Entity resolution in the ExtractCCDAAttributes Processor.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.20.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22832'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi/commit/e966336e8966cf0cbbd12a2c4f2d73a7ceb75cd8'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/b51qs6y7b7r58vovddkv6wc16g2xbl3w'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security.html#CVE-2023-22832'}]
|
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-10T22:41:43Z', 'nvd_published_at': '2023-02-10T08:15:00Z'}
|
1.4.0
|
GHSA-5jcr-82fh-339v
|
2023-02-14T00:32:21Z
|
2023-02-14T00:32:21Z
| null |
['CVE-2023-25572']
|
Cross-Site-Scripting attack on `<RichTextField>`
|
### Impact
All React applications built with react-admin and using the `<RichTextField>` are affected.
`<RichTextField>` outputs the field value using `dangerouslySetInnerHTML` without client-side sanitization. If the data isn't sanitized server-side, this opens a possible Cross-Site-Scripting (XSS) attack.
Proof of concept:
```jsx
import { RichTextField } from 'react-admin';
const record = {
id: 1,
body: `
<p>
<strong>War and Peace</strong> is a novel by the Russian author
<a href="https://en.wikipedia.org/wiki/Leo_Tolstoy" onclick="document.getElementById('stolendata').value='credentials';">Leo Tolstoy</a>,
published serially, then in its entirety in 1869.
</p>
<p onmouseover="document.getElementById('stolendata').value='credentials';">
It is regarded as one of Tolstoy's finest literary achievements and remains a classic of world literature.
</p>
<img src="x" onerror="document.getElementById('stolendata').value='credentials';" />
`,
};
const VulnerableRichTextField = () => (
<>
<RichTextField record={record} source="body" />
<hr />
<h4>Stolen data:</h4>
<input id="stolendata" defaultValue="none" />
</>
);
```
### Patches
Versions 3.19.12 and 4.7.6 now use `DOMPurify` to escape the HTML before outputting it with React and `dangerouslySetInnerHTML`
### Workarounds
You don't need to upgrade if you already sanitize HTML data server-side.
Otherwise, you'll have to replace the `<RichTextField>` by a custom field doing sanitization by hand:
```tsx
// react-admin v4
import * as React from 'react';
import { memo } from 'react';
import PropTypes from 'prop-types';
import get from 'lodash/get';
import Typography from '@material-ui/core/Typography';
import { useRecordContext, sanitizeFieldRestProps, fieldPropTypes } from 'react-admin';
import purify from 'dompurify';
export const removeTags = (input) =>
input ? input.replace(/<[^>]+>/gm, '') : '';
const RichTextField = memo(
props => {
const { className, emptyText, source, stripTags, ...rest } = props;
const record = useRecordContext(props);
const value = get(record, source);
return (
<Typography
className={className}
variant="body2"
component="span"
{...sanitizeFieldRestProps(rest)}
>
{value == null && emptyText ? (
emptyText
) : stripTags ? (
removeTags(value)
) : (
<span
dangerouslySetInnerHTML={{
__html: purify.sanitize(value),
}}
/>
)}
</Typography>
);
}
);
RichTextField.defaultProps = {
addLabel: true,
stripTags: false,
};
RichTextField.propTypes = {
// @ts-ignore
...Typography.propTypes,
...fieldPropTypes,
stripTags: PropTypes.bool,
};
RichTextField.displayName = 'RichTextField';
export default RichTextField;
```
### References
https://github.com/marmelab/react-admin/pull/8644, https://github.com/marmelab/react-admin/pull/8645
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'react-admin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.19.12'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'react-admin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.7.6'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ra-ui-materialui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.7.6'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ra-ui-materialui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.19.12'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/marmelab/react-admin/security/advisories/GHSA-5jcr-82fh-339v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25572'}, {'type': 'WEB', 'url': 'https://github.com/marmelab/react-admin/pull/8644'}, {'type': 'WEB', 'url': 'https://github.com/marmelab/react-admin/pull/8645'}, {'type': 'PACKAGE', 'url': 'https://github.com/marmelab/react-admin'}, {'type': 'WEB', 'url': 'https://github.com/marmelab/react-admin/releases/tag/v3.19.12'}, {'type': 'WEB', 'url': 'https://github.com/marmelab/react-admin/releases/tag/v4.7.6'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T00:32:21Z', 'nvd_published_at': '2023-02-13T21:15:00Z'}
|
1.4.0
|
GHSA-259w-8hf6-59c2
|
2023-02-24T19:11:47Z
|
2023-02-16T14:12:36Z
| null |
['CVE-2023-25153']
|
OCI image importer memory exhaustion in github.com/containerd/containerd
|
### Impact
When importing an OCI image, there was no limit on the number of bytes read for certain files. A maliciously crafted image with a large file where a limit was not applied could cause a denial of service.
### Patches
This bug has been fixed in containerd 1.6.18 and 1.5.18. Users should update to these versions to resolve the issue.
### Workarounds
Ensure that only trusted images are used and that only trusted users have permissions to import images.
### Credits
The containerd project would like to thank [David Korczynski](https://github.com/DavidKorczynski) and [Adam Korczynski](https://github.com/AdamKorcz) of ADA Logics for responsibly disclosing this issue in accordance with the [containerd security policy](https://github.com/containerd/project/blob/main/SECURITY.md) during a security fuzzing audit sponsored by CNCF.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [containerd](https://github.com/containerd/containerd/issues/new/choose)
* Email us at [security@containerd.io](mailto:security@containerd.io)
To report a security issue in containerd:
* [Report a new vulnerability](https://github.com/containerd/containerd/security/advisories/new)
* Email us at [security@containerd.io](mailto:security@containerd.io)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/containerd/containerd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.18'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/containerd/containerd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.6.18'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/containerd/containerd/security/advisories/GHSA-259w-8hf6-59c2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25153'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/commit/0c314901076a74a7b797a545d2f462285fdbb8c4'}, {'type': 'PACKAGE', 'url': 'https://github.com/containerd/containerd'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/releases/tag/v1.5.18'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/releases/tag/v1.6.18'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1573'}]
|
{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-16T14:12:36Z', 'nvd_published_at': '2023-02-16T15:15:00Z'}
|
1.4.0
|
GHSA-xhjq-w7xm-p8qj
|
2023-08-30T11:33:45Z
|
2023-02-07T22:39:34Z
| null |
['CVE-2017-3204']
|
golang.org/x/crypto/ssh Man-in-the-Middle attack
|
The Go SSH library (x/crypto/ssh) by default does not verify host keys, facilitating man-in-the-middle attacks if ClientConfig.HostKeyCallback is not set. Default behavior changed in commit e4e2799 to require explicitly registering a hostkey verification mechanism.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'golang.org/x/crypto/ssh'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20170330155735-e4e2799dd7aa'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'golang.org/x/crypto'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20170330155735-e4e2799dd7aa'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-3204'}, {'type': 'WEB', 'url': 'https://github.com/golang/go/issues/19767'}, {'type': 'WEB', 'url': 'https://github.com/golang/crypto/commit/e4e2799dd7aab89f583e1d898300d96367750991'}, {'type': 'WEB', 'url': 'https://bridge.grumpy-troll.org/2017/04/golang-ssh-security/'}, {'type': 'WEB', 'url': 'https://go.dev/cl/340830'}, {'type': 'WEB', 'url': 'https://go.dev/issue/19767'}, {'type': 'WEB', 'url': 'https://go.googlesource.com/crypto/+/e4e2799dd7aab89f583e1d898300d96367750991'}, {'type': 'WEB', 'url': 'https://godoc.org/golang.org/x/crypto/ssh'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0013'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20170423080311/https://www.securityfocus.com/bid/97481'}, {'type': 'WEB', 'url': 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-3204'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-07T22:39:34Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-fmxq-v8mg-qh25
|
2023-02-22T21:58:27Z
|
2023-02-22T21:58:27Z
| null |
['CVE-2023-25569']
|
apollo-portal has potential CSRF issue
|
### Impact
A low-privileged user can create a special web page. If an authenticated portal admin visits this page, the page can silently send a request to assign new roles for that user without any confirmation from the Portal admin.
### Patches
Cookie SameSite strategy was set to Lax in #4664 and was released in [v2.1.0](https://github.com/apolloconfig/apollo/releases/tag/v2.1.0).
### Workarounds
To fix the potential issue without upgrading, simply follow the advice that does not visit unknown source pages.
### References
[Apollo Security Guidence](https://www.apolloconfig.com/#/en/usage/apollo-user-guide?id=_71-security-related)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [issue](https://github.com/apolloconfig/apollo/issues)
* Email us at [apollo-config@googlegroups.com](mailto:apollo-config@googlegroups.com)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.ctrip.framework.apollo:apollo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/apolloconfig/apollo/security/advisories/GHSA-fmxq-v8mg-qh25'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25569'}, {'type': 'WEB', 'url': 'https://github.com/apolloconfig/apollo/pull/4664'}, {'type': 'WEB', 'url': 'https://github.com/apolloconfig/apollo/commit/00d968a7229f809b0d8ed0532e8c01a6c2b7c750'}, {'type': 'PACKAGE', 'url': 'https://github.com/apolloconfig/apollo'}, {'type': 'WEB', 'url': 'https://github.com/apolloconfig/apollo/releases/tag/v2.1.0'}, {'type': 'WEB', 'url': 'https://www.apolloconfig.com/#/en/usage/apollo-user-guide?id=_71-security-related'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T21:58:27Z', 'nvd_published_at': '2023-02-20T16:15:00Z'}
|
1.4.0
|
GHSA-5x36-7567-3cw6
|
2023-02-28T20:31:05Z
|
2023-02-28T20:31:05Z
| null |
[]
|
partial_sort contains Out-of-bounds Read in release mode
|
Affected versions of this crate were using a debug assertion to validate the `last` parameter of `partial_sort()`. This would allow invalid inputs to cause an out-of-bounds read instead of immediately panicking, when compiled without debug assertions.
All writes are bounds-checked, so the out-of-bounds memory access is read-only. This also means that the first attempted out-of-bounds write will panic, limiting the possible reads.
The accessible region is further limited by an initial bounds-checked read at `(last / 2) - 1`, i.e., it is proportional to the size of the vector.
This bug has been fixed in v0.2.0.
|
[]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'partial_sort'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/sundy-li/partial_sort/issues/7'}, {'type': 'PACKAGE', 'url': 'https://github.com/sundy-li/partial_sort'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0016.html'}]
|
{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-28T20:31:05Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-6vp5-vv9p-7q62
|
2023-02-23T22:08:20Z
|
2023-02-12T15:30:25Z
| null |
['CVE-2023-0789']
|
Command Injection in thorsten/phpmyfaq
|
Command Injection in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.11'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0789'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/40515c74815ace394ab23c6c19cbb33fd49059cb'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpMyFAQ'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d9375178-2f23-4f5d-88bd-bba3d6ba7cc5'}]
|
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T01:05:59Z', 'nvd_published_at': '2023-02-12T14:15:00Z'}
|
1.4.0
|
GHSA-465f-mxxh-grc4
|
2023-02-22T00:10:21Z
|
2023-02-21T15:30:23Z
| null |
['CVE-2021-32859']
|
Baremetrics date range picker vulnerable to Cross-site Scripting
|
The Baremetrics date range picker is a solution for selecting both date ranges and single dates from a single calender view. Versions 1.0.14 and prior are prone to cross-site scripting (XSS) when handling untrusted `placeholder` entries. An attacker who is able to influence the field `placeholder` when creating a `Calendar` instance is able to supply arbitrary `html` or `javascript` that will be rendered in the context of a user leading to XSS. There are no known patches for this issue.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'baremetrics-calendar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.14'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32859'}, {'type': 'PACKAGE', 'url': 'https://github.com/Baremetrics/calendar'}, {'type': 'WEB', 'url': 'https://github.com/Baremetrics/calendar/blob/240c20134ffbf0f0f246a50feff2be1ff19cf349/public/js/Calendar.js#L724'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2021-1042_Baremetrics_Date_Range_Picker/'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T00:10:21Z', 'nvd_published_at': '2023-02-21T15:15:00Z'}
|
1.4.0
|
GHSA-54q4-74p3-mgcw
|
2023-02-23T22:31:36Z
|
2023-02-16T00:30:27Z
| null |
['CVE-2022-38867']
|
rttys SQL Injection vulnerability
|
SQL Injection vulnerability in rttys versions 4.0.0, 4.0.1, and 4.0.2 in api.go, allows attackers to execute arbitrary code.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/zhaojh329/rttys'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'last_affected': '4.0.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38867'}, {'type': 'WEB', 'url': 'https://github.com/zhaojh329/rttys/issues/117'}, {'type': 'PACKAGE', 'url': 'https://github.com/zhaojh329/rttys'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-23T22:31:36Z', 'nvd_published_at': '2023-02-15T22:15:00Z'}
|
1.4.0
|
GHSA-g57g-rvpg-2f2c
|
2023-03-08T17:22:58Z
|
2023-02-23T15:33:05Z
| null |
['CVE-2023-0868']
|
OpenNMS Meridian and Horizon vulnerable to Cross-site Scripting
|
Reflected cross-site scripting in graph results in multiple versions of OpenNMS Meridian and Horizon could allow an attacker access to steal session cookies.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.opennms:opennms-webapp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '31.0.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0868'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/pull/5740'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/commit/a47e193f820c222b309763b508009e54b2f0e7f5'}, {'type': 'WEB', 'url': 'https://docs.opennms.com/meridian/2022/releasenotes/changelog.html#releasenotes-changelog-Meridian-2022.1.13'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenNMS/opennms'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-08T17:22:58Z', 'nvd_published_at': '2023-02-23T15:15:00Z'}
|
1.4.0
|
GHSA-7v39-jjj6-j4j4
|
2023-03-03T23:26:36Z
|
2023-02-23T15:33:05Z
| null |
['CVE-2023-0869']
|
Cross Site Scripting in OpenNMS
|
Cross-site scripting in outage/list.htm in multiple versions of OpenNMS Meridian and Horizon allows an attacker access to confidential session information.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.opennms:opennms-web-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '31.0.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0869'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/pull/5734'}, {'type': 'WEB', 'url': 'https://docs.opennms.com/meridian/2023/releasenotes/changelog.html#releasenotes-changelog-Meridian-2023.1.0'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-23T21:44:32Z', 'nvd_published_at': '2023-02-23T15:15:00Z'}
|
1.4.0
|
GHSA-v5w6-wcm8-jm4q
|
2023-02-21T19:59:57Z
|
2023-02-08T22:22:58Z
| null |
['CVE-2022-4450']
|
openssl-src contains Double free after calling `PEM_read_bio_ex`
|
The function `PEM_read_bio_ex()` reads a PEM file from a BIO and parses and decodes the "name" (e.g. "CERTIFICATE"), any header data and the payload data. If the function succeeds then the "name_out", "header" and "data" arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results in 0 bytes of payload data. In this case `PEM_read_bio_ex()` will return a failure code but will populate the header argument with a pointer to a buffer that has already been freed. If the caller also frees this buffer then a double free will occur. This will most likely lead to a crash. This could be exploited by an attacker who has the ability to supply malicious PEM files for parsing to achieve a denial of service attack.
The functions `PEM_read_bio()` and `PEM_read()` are simple wrappers around `PEM_read_bio_ex()` and therefore these functions are also directly affected.
These functions are also called indirectly by a number of other OpenSSL functions including `PEM_X509_INFO_read_bio_ex()` and
`SSL_CTX_use_serverinfo_file()` which are also vulnerable. Some OpenSSL internal uses of these functions are not vulnerable because the caller does not free the header argument if `PEM_read_bio_ex()` returns a failure code. These locations include the `PEM_read_bio_TYPE()` functions as well as the decoders introduced in OpenSSL 3.0.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '111.25.0'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '300.0.0'}, {'fixed': '300.0.12'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4450'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=63bcf189be73a9cc1264059bed6f57974be74a83'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=bbcf509bd046b34cca19c766bbddc31683d0858b'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0010.html'}, {'type': 'WEB', 'url': 'https://www.openssl.org/news/secadv/20230207.txt'}]
|
{'cwe_ids': ['CWE-415'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:22:58Z', 'nvd_published_at': '2023-02-08T20:15:00Z'}
|
1.4.0
|
GHSA-36gx-9q6h-g429
|
2023-03-09T04:24:16Z
|
2023-02-28T23:18:37Z
| null |
['CVE-2022-39228']
|
vantage6 vulnerable to Observable Response Discrepancy
|
### Impact
We are incorporating the password policies listed in https://github.com/vantage6/vantage6/issues/59. One measure is that we don't let the user know in case of wrong username/password combination if the username actually exists, to prevent that bots can guess usernames. However, if a wrong password is entered a number of times, the user account is blocked temporarily. This way you could still find out which usernames exist.
### Patches
Update to 3.8.0+
### Workarounds
No
### References
https://github.com/vantage6/vantage6/issues/59
### For more information
If you have any questions or comments about this advisory:
* Email us at [vantage6@iknl.nl](mailto:vantage6@iknl.nl)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'vantage6'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/vantage6/vantage6/security/advisories/GHSA-36gx-9q6h-g429'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39228'}, {'type': 'WEB', 'url': 'https://github.com/vantage6/vantage6/issues/59'}, {'type': 'WEB', 'url': 'https://github.com/vantage6/vantage6/pull/281'}, {'type': 'WEB', 'url': 'https://github.com/vantage6/vantage6/commit/ab4381c35d24add06f75d5a8a284321f7a340bd2'}, {'type': 'PACKAGE', 'url': 'https://github.com/vantage6/vantage6'}]
|
{'cwe_ids': ['CWE-203', 'CWE-204'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-28T23:18:37Z', 'nvd_published_at': '2023-03-01T17:15:00Z'}
|
1.4.0
|
GHSA-74fp-r6jw-h4mp
|
2023-09-29T15:14:38Z
|
2023-02-08T00:35:27Z
| null |
[]
|
Kubernetes apimachinery packages vulnerable to unbounded recursion in JSON or YAML parsing
|
CVE-2019-11253 is a denial of service vulnerability in the kube-apiserver, allowing authorized users sending malicious YAML or JSON payloads to cause kube-apiserver to consume excessive CPU or memory, potentially crashing and becoming unavailable.
When creating a ConfigMap object which has recursive references contained in it, excessive CPU usage can occur. This appears to be an instance of a "Billion Laughs" attack which is quite well known as an XML parsing issue.
Applying this manifest to a cluster causes the client to hang for some time with considerable CPU usage.
```yaml
apiVersion: v1
data:
a: &a ["web","web","web","web","web","web","web","web","web"]
b: &b [*a,*a,*a,*a,*a,*a,*a,*a,*a]
c: &c [*b,*b,*b,*b,*b,*b,*b,*b,*b]
d: &d [*c,*c,*c,*c,*c,*c,*c,*c,*c]
e: &e [*d,*d,*d,*d,*d,*d,*d,*d,*d]
f: &f [*e,*e,*e,*e,*e,*e,*e,*e,*e]
g: &g [*f,*f,*f,*f,*f,*f,*f,*f,*f]
h: &h [*g,*g,*g,*g,*g,*g,*g,*g,*g]
i: &i [*h,*h,*h,*h,*h,*h,*h,*h,*h]
kind: ConfigMap
metadata:
name: yaml-bomb
namespace: default
```
### Specific Go Packages Affected
- k8s.io/apimachinery/pkg/runtime/serializer/json
- k8s.io/apimachinery/pkg/util/json
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'k8s.io/apimachinery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20190927203648-9ce6eca90e73'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11253'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/83253'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/pull/83261'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pmqp-h87c-mr78'}, {'type': 'PACKAGE', 'url': 'https://github.com/kubernetes/kubernetes'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/kubernetes-security-announce/c/jk8polzSUxs'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0965'}, {'type': 'WEB', 'url': 'https://stackoverflow.com/questions/58129150/security-yaml-bomb-user-can-restart-kube-api-by-sending-configmap/'}]
|
{'cwe_ids': ['CWE-20', 'CWE-776'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T00:35:27Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-w55j-f7vx-6q37
|
2023-02-06T23:49:46Z
|
2023-02-06T23:49:46Z
| null |
['CVE-2018-1103']
|
Openshift Enterprise source-to-image vulnerable to Arbitrary File Write via Archive Extraction (Zip Slip)
|
Openshift Enterprise source-to-image before version 1.1.10 is vulnerable to an improper validation of user input. An attacker who could trick a user into using the command to copy files locally, from a pod, could override files outside of the target directory of the command.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/openshift/source-to-image/pkg/tar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.10'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/openshift/source-to-image'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.10-0.20180427153919-f5cbcbc5cc6f'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1103'}, {'type': 'WEB', 'url': 'https://github.com/openshift/source-to-image/pull/870'}, {'type': 'WEB', 'url': 'https://github.com/openshift/source-to-image/commit/f5cbcbc5cc6f8cc2f479a7302443bea407a700cb'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1103'}, {'type': 'PACKAGE', 'url': 'https://github.com/openshift/source-to-image'}, {'type': 'WEB', 'url': 'https://github.com/snyk/zip-slip-vulnerability'}, {'type': 'WEB', 'url': 'https://hansmi.ch/articles/2018-04-openshift-s2i-security'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0026'}, {'type': 'WEB', 'url': 'https://snyk.io/research/zip-slip-vulnerability'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-06T23:49:46Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-hxp2-xqf3-v83h
|
2023-06-13T23:50:59Z
|
2023-02-07T18:24:39Z
| null |
[]
|
Panic during unmarshal of Hello Verify Request in github.com/pion/dtls/v2
|
### Impact
When attempting to unmarshal a Server Hello request we could attempt to unmarshal into a buffer that was too small. This could result in a panic leading the program to crash.
This issue could be abused to cause a denial of service.
### Workaround
None
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/pion/dtls'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/pion/dtls/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.4'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pion/dtls/security/advisories/GHSA-hxp2-xqf3-v83h'}, {'type': 'WEB', 'url': 'https://github.com/pion/dtls/commit/7a14903448b70069fd9e02adf210ca23083c56d2'}, {'type': 'PACKAGE', 'url': 'https://github.com/pion/dtls'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1535'}]
|
{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-07T18:24:39Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-j69x-v4wc-3fpf
|
2023-03-06T21:58:20Z
|
2023-02-24T12:31:20Z
| null |
['CVE-2023-25693']
|
Apache Airflow Sqoop Provider Improper Input Validation vulnerability
|
Improper Input Validation vulnerability in the Apache Airflow Sqoop Provider. This issue affects Apache Airflow Sqoop Provider versions before 3.1.1.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow-providers-apache-sqoop'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25693'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/29500'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/79qn8g5xbq036f8crb115obvr22l52q4'}]
|
{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-24T16:25:17Z', 'nvd_published_at': '2023-02-24T12:15:00Z'}
|
1.4.0
|
GHSA-vp4r-h765-5mwp
|
2023-02-28T14:37:17Z
|
2023-02-17T03:30:25Z
| null |
['CVE-2023-0877']
|
Code Injection in froxlor/froxlor
|
Code Injection in GitHub repository froxlor/froxlor prior to 2.0.11.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'froxlor/froxlor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.11'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0877'}, {'type': 'WEB', 'url': 'https://github.com/froxlor/froxlor/commit/aa48ffca2bcaf7ae57be3b8147bb3138abdab984'}, {'type': 'PACKAGE', 'url': 'https://github.com/Froxlor/Froxlor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b29cf038-06f1-4fb0-9437-08f2991f92a8'}]
|
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-17T20:54:40Z', 'nvd_published_at': '2023-02-17T01:15:00Z'}
|
1.4.0
|
GHSA-9xpj-mvp2-3943
|
2023-03-08T15:29:24Z
|
2023-02-23T15:33:05Z
| null |
['CVE-2023-0815']
|
OpenNMS has potential Insertion of Sensitive Information into Log File vulnerability
|
Potential Insertion of Sensitive Information into Jetty Log Files in multiple versions of OpenNMS Meridian and Horizon could allow disclosure of usernames and passwords if the logging level is set to debug.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.opennms:opennms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '31.0.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0815'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/pull/5741/files'}, {'type': 'WEB', 'url': 'https://docs.opennms.com/meridian/2022/releasenotes/changelog.html#releasenotes-changelog-Meridian-2022.1.13'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenNMS/opennms'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/releases/tag/opennms-31.0.4-1'}]
|
{'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-28T23:28:09Z', 'nvd_published_at': '2023-02-23T15:15:00Z'}
|
1.4.0
|
GHSA-vrh7-x64v-7vxq
|
2023-02-21T19:48:07Z
|
2023-02-08T22:21:22Z
| null |
['CVE-2023-0401']
|
openssl-src contains `NULL` dereference during PKCS7 data verification
|
A `NULL` pointer can be dereferenced when signatures are being verified on PKCS7 `signed` or `signedAndEnveloped` data. In case the hash algorithm used for the signature is known to the OpenSSL library but the implementation of the hash algorithm is not available the digest initialization will fail. There is a missing check for the return value from the initialization function which later leads to invalid usage of the digest API most likely leading to a crash. The unavailability of an algorithm can be caused by using FIPS enabled configuration of providers or more commonly by not loading the legacy provider.
PKCS7 data is processed by the SMIME library calls and also by the time stamp (TS) library calls. The TLS implementation in OpenSSL does not call these functions however third party applications would be affected if they call these functions to verify signatures on untrusted data.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '300.0.0'}, {'fixed': '300.0.12'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0401'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=d3b6dfd70db844c4499bec6ad6601623a565e674'}, {'type': 'PACKAGE', 'url': 'https://github.com/alexcrichton/openssl-src-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0013.html'}, {'type': 'WEB', 'url': 'https://www.openssl.org/news/secadv/20230207.txt'}]
|
{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:21:22Z', 'nvd_published_at': '2023-02-08T20:15:00Z'}
|
1.4.0
|
GHSA-pfcc-3g6r-8rg8
|
2023-03-03T23:12:22Z
|
2023-02-23T21:30:16Z
| null |
['CVE-2022-4492']
|
Undertow client not checking server identity presented by server certificate in https connections
|
The undertow client is not checking the server identity presented by the server certificate in https connections. This should be performed by default in https and in http/2.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.5.Final'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.24.Final'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4492'}, {'type': 'WEB', 'url': 'https://github.com/undertow-io/undertow/pull/1447'}, {'type': 'WEB', 'url': 'https://github.com/undertow-io/undertow/pull/1447/commits/e5071e52b72529a14d3ec436ae7102cea5d918c4'}, {'type': 'WEB', 'url': 'https://github.com/undertow-io/undertow/pull/1457'}, {'type': 'WEB', 'url': 'https://github.com/undertow-io/undertow/pull/1457/commits/a4d3b167126a803cc4f7fb740dd9a6ecabf59342'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2022-4492'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2153260'}, {'type': 'WEB', 'url': 'https://github.com/undertow-io/undertow/blob/master/core/src/main/java/io/undertow/security/impl/ClientCertAuthenticationMechanism.java'}, {'type': 'WEB', 'url': 'https://issues.redhat.com/browse/MTA-93'}, {'type': 'WEB', 'url': 'https://issues.redhat.com/browse/UNDERTOW-2212'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230324-0002/'}]
|
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T23:12:22Z', 'nvd_published_at': '2023-02-23T20:15:00Z'}
|
1.4.0
|
GHSA-wqxw-8h5g-hq56
|
2023-02-15T17:35:36Z
|
2023-02-02T01:33:06Z
| null |
['CVE-2023-23925']
|
Switcher Client contains Regular Expression Denial of Service (ReDoS)
|
### Impact
Unsanitized input flows into Strategy match operation (EXIST), where it is used to build a regular expression. This may result in a Regular expression Denial of Service attack (reDOS).
### Patches
Patched in 3.1.4
### Workarounds
Avoid using Strategy settings that use REGEX in conjunction with EXIST and NOT_EXIST operations.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'switcher-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.4'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/switcherapi/switcher-client-master/security/advisories/GHSA-wqxw-8h5g-hq56'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23925'}, {'type': 'WEB', 'url': 'https://github.com/switcherapi/switcher-client-master/commit/374752563d6ce9353ee592b40c809c8136f24930'}, {'type': 'PACKAGE', 'url': 'https://github.com/switcherapi/switcher-client-master'}, {'type': 'WEB', 'url': 'https://github.com/switcherapi/switcher-client-master/releases/tag/v3.1.4'}]
|
{'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-02T01:33:06Z', 'nvd_published_at': '2023-02-03T20:15:00Z'}
|
1.4.0
|
GHSA-3x2c-87cq-qx49
|
2023-02-15T22:00:33Z
|
2023-02-08T00:30:33Z
| null |
['CVE-2023-0736']
|
Cross-site Scripting (XSS) in wallabag/wallabag
|
Cross-site Scripting (XSS) - Stored in GitHub repository wallabag/wallabag prior to 2.5.4.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'wallabag/wallabag'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0736'}, {'type': 'WEB', 'url': 'https://github.com/wallabag/wallabag/commit/4e023bddc3622ba5e901cc14a261fcb98d955cd7'}, {'type': 'PACKAGE', 'url': 'https://github.com/wallabag/wallabag'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/7e6f9614-6a96-4295-83f0-06a240be844e'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T18:13:44Z', 'nvd_published_at': '2023-02-07T23:15:00Z'}
|
1.4.0
|
GHSA-65px-4cpf-697r
|
2023-02-15T22:00:10Z
|
2023-02-08T09:30:24Z
| null |
['CVE-2023-0740']
|
Cross-site scripting vulnerability found in answerdev/answer
|
Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.4.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0740'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/c3001de52af91f09c96e701facbce0b9fa0c98ad'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/802ee76d-fe01-482b-a9a4-34699a7c9110'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T18:17:25Z', 'nvd_published_at': '2023-02-08T08:15:00Z'}
|
1.4.0
|
GHSA-29gw-9793-fvw7
|
2023-02-10T22:08:04Z
|
2023-02-10T19:55:53Z
| null |
['CVE-2023-24816']
|
IPython vulnerable to command injection via set_term_title
|
IPython provides an interactive Python shell and Jupyter kernel to use Python interactively. Versions prior to 8.10.0 are vulnerable to command injection in the `set_term_title` [function](https://github.com/ipython/ipython/blob/3f0bf05f072a91b2a3042d23ce250e5e906183fd/IPython/utils/terminal.py#L103-L117) under specific conditions. This has been patched in version 8.10.0.
### Impact
Users are only vulnerable when calling this function in Windows in a Python environment where [ctypes](https://docs.python.org/3/library/ctypes.html) is not available. The dependency on ctypes in `IPython.utils._process_win32` prevents the vulnerable code from ever being reached (making it effectively dead code). However, as a library that could be used by another tool, `set_term_title` could introduce a vulnerability for dependencies. Currently `set_term_title` is only called with (semi-)trusted input that contain the current working directory of the current IPython session. If an attacker can control directory names, and manage to get a user to `cd` into this directory, then the attacker can execute arbitrary commands contained in the folder names.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'IPython'}, 'ecosystem_specific': {'affected_functions': ['IPython.utils.terminal.set_term_title']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.10'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/ipython/ipython/security/advisories/GHSA-29gw-9793-fvw7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24816'}, {'type': 'WEB', 'url': 'https://github.com/ipython/ipython/commit/385d69325319a5972ee9b5983638e3617f21cb1f'}, {'type': 'WEB', 'url': 'https://github.com/ipython/ipython/commit/991849c247fc208628879e7ca2923b3c218a5a75'}, {'type': 'WEB', 'url': 'https://github.com/Carreau/ipython/blob/7557ade0ed927475d5ab5b573d0ea4febfb22683/docs/source/whatsnew/version8.rst#ipython-810'}, {'type': 'PACKAGE', 'url': 'https://github.com/ipython/ipython'}, {'type': 'WEB', 'url': 'https://github.com/ipython/ipython/blob/3f0bf05f072a91b2a3042d23ce250e5e906183fd/IPython/utils/terminal.py#L103-L117'}, {'type': 'WEB', 'url': 'https://github.com/ipython/ipython/blob/56e6925dfa50e2c7f4a6471547b8176275db7c25/IPython/utils/_process_win32.py#L20'}]
|
{'cwe_ids': ['CWE-20', 'CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-10T19:55:53Z', 'nvd_published_at': '2023-02-10T20:15:00Z'}
|
1.4.0
|
GHSA-3p9x-xxx6-2w4p
|
2023-02-08T00:23:30Z
|
2023-02-02T03:30:23Z
| null |
['CVE-2023-25014']
|
Broken Access Control in 3rd party TYPO3 extension "femanager"
|
A missing access check in the `InvitationController` allows an unauthenticated user to delete all frontend users.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'in2code/femanager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.5.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'in2code/femanager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.3.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'in2code/femanager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.1.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25014'}, {'type': 'PACKAGE', 'url': 'https://github.com/in2code-de/femanager'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2023-001'}]
|
{'cwe_ids': ['CWE-306'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T00:23:30Z', 'nvd_published_at': '2023-02-02T01:15:00Z'}
|
1.4.0
|
GHSA-65rp-mhqf-8gj3
|
2023-03-03T00:12:19Z
|
2023-02-24T06:30:16Z
| null |
['CVE-2023-26102']
|
rangy vulnerable to Prototype Pollution
|
All versions of the package rangy are vulnerable to Prototype Pollution when using the `extend()` function in file `rangy-core.js`.The function uses recursive merge which can lead an attacker to modify properties of the Object.prototype.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'rangy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26102'}, {'type': 'WEB', 'url': 'https://github.com/timdown/rangy/issues/478'}, {'type': 'PACKAGE', 'url': 'https://github.com/timdown/rangy'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-RANGY-3175702'}]
|
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-24T16:23:36Z', 'nvd_published_at': '2023-02-24T05:15:00Z'}
|
1.4.0
|
GHSA-c38p-vw6j-qjpr
|
2023-02-23T22:08:41Z
|
2023-02-12T15:30:25Z
| null |
['CVE-2023-0791']
|
Cross-site Scripting in thorsten/phpmyfaq
|
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.11'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0791'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/26663efcb0b67e421e4ecccad8f19e7106bb03ce'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpMyFAQ'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/7152b340-c6f3-4ac8-9f62-f764a267488d'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T00:56:51Z', 'nvd_published_at': '2023-02-12T14:15:00Z'}
|
1.4.0
|
GHSA-j75r-vf64-6rrh
|
2023-03-07T04:03:37Z
|
2023-02-24T18:30:25Z
| null |
['CVE-2023-0481']
|
RestEasy Reactive implementation of Quarkus allows Creation of Temporary File With Insecure Permissions
|
In RestEasy Reactive implementation of Quarkus the insecure `File.createTempFile()` is used in the `FileBodyHandler` class which creates temp files with insecure permissions that could be read by a local user.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'io.quarkus.resteasy.reactive:resteasy-reactive-common-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0.Alpha4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0481'}, {'type': 'WEB', 'url': 'https://github.com/quarkusio/quarkus/pull/30694'}, {'type': 'WEB', 'url': 'https://github.com/quarkusio/quarkus/commit/95d5904f7cf18c8165b97d8ca03b203d7f69c17e'}, {'type': 'PACKAGE', 'url': 'https://github.com/quarkusio/quarkus'}]
|
{'cwe_ids': ['CWE-378', 'CWE-668'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-02-24T19:55:15Z', 'nvd_published_at': '2023-02-24T18:15:00Z'}
|
1.4.0
|
GHSA-4cwh-8w4g-jxxh
|
2023-02-21T19:00:20Z
|
2023-02-08T09:30:24Z
| null |
['CVE-2023-0744']
|
Answer contains Improper Access Control vulnerability
|
Improper Access Control in GitHub repository answerdev/answer prior to 1.0.4.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0744'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/c1fa2b13f6b547b96da60b23350bbe2b29de542d'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/35a0e12f-1d54-4fc0-8779-6a4949b7c434'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/171733/Answerdev-1.0.3-Account-Takeover.html'}]
|
{'cwe_ids': ['CWE-284'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:34:33Z', 'nvd_published_at': '2023-02-08T08:15:00Z'}
|
1.4.0
|
GHSA-6hr3-44gx-g6wh
|
2023-02-23T21:32:13Z
|
2023-02-13T06:30:59Z
| null |
['CVE-2023-25727']
|
XSS vulnerability in drag-and-drop upload of phpMyAdmin
|
In phpMyAdmin before 4.9.11 and 5.x before 5.2.1, an authenticated user can trigger XSS by uploading a crafted .sql file through the drag-and-drop interface. By disabling the configuration directive `$cfg['enable_drag_drop_import']`, users will be unable to use the drag and drop upload which would protect against the vulnerability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.9.11'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0'}, {'fixed': '5.2.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25727'}, {'type': 'PACKAGE', 'url': 'https://github.com/phpmyadmin/composer'}, {'type': 'WEB', 'url': 'https://www.phpmyadmin.net/security/PMASA-2023-1/'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T00:43:33Z', 'nvd_published_at': '2023-02-13T06:15:00Z'}
|
1.4.0
|
GHSA-fhj6-gr87-g4cj
|
2023-02-22T18:35:42Z
|
2023-02-14T03:30:20Z
| null |
['CVE-2023-24187']
|
XML External Entity Reference in ureport
|
An XML External Entity (XXE) vulnerability in ureport v2.2.9 allows attackers to execute arbitrary code via uploading a crafted XML file to /ureport/designer/saveReportFile.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.bstek.ureport:ureport2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.9'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24187'}, {'type': 'WEB', 'url': 'https://github.com/Venus-WQLab/bug_report/blob/main/ureport/ureport-cve-2023-24187.md'}, {'type': 'WEB', 'url': 'https://github.com/cgddgc/vulns/blob/main/ureport2-vuln-des.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/youseries/ureport'}, {'type': 'WEB', 'url': 'http://ureport.com'}]
|
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T21:56:11Z', 'nvd_published_at': '2023-02-14T02:15:00Z'}
|
1.4.0
|
GHSA-7g5f-wrx8-5ccf
|
2023-02-22T19:15:56Z
|
2023-02-22T19:15:56Z
| null |
['CVE-2023-25157']
|
GeoServer OGC Filter SQL Injection Vulnerabilities
|
### Impact
GeoServer includes support for the OGC Filter expression language and the OGC Common Query Language (CQL) as part of the Web Feature Service (WFS) and Web Map Service (WMS) protocols. CQL is also supported through the Web Coverage Service (WCS) protocol for ImageMosaic coverages.
SQL Injection Vulnerabilities have been found with:
* ``PropertyIsLike`` filter, when used with a String field and any database DataStore, or with a PostGIS DataStore with encode functions enabled
* ``strEndsWith`` function, when used with a PostGIS DataStore with encode functions enabled
* ``strStartsWith`` function, when used with a PostGIS DataStore with encode functions enabled
* ``FeatureId`` filter, when used with any database table having a String primary key column and when prepared statements are disabled
* ``jsonArrayContains`` function, when used with a String or JSON field and with a PostGIS or Oracle DataStore (GeoServer 2.22.0+ only)
* ``DWithin`` filter, when used with an Oracle DataStore
### Patches
* GeoSever 2.21.4
* GeoServer 2.22.2
* GeoServer 2.20.7
* GeoServer 2.19.7
* GeoServer 2.18.7
### Workarounds
1. Disabling the PostGIS Datastore *encode functions* setting to mitigate ``strEndsWith``, ``strStartsWith`` vulnerabilities (Like filters have no mitigation, if there is a string field in the feature type published).
2. Enabling the PostGIS DataStore *preparedStatements* setting to mitigate the ``FeatureId`` vulnerability.
### References
* [OGC Filter SQL Injection Vulnerabilities](https://github.com/geotools/geotools/security/advisories/GHSA-99c3-qc2q-p94m) (GeoTools)
* [OGC Filter Injection Vulnerability Statement](https://geoserver.org/vulnerability/2023/02/20/ogc-filter-injection.html) (GeoServer Blog)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.geoserver.community:gs-jdbcconfig'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.21.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.geoserver.community:gs-jdbcconfig'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.22.0'}, {'fixed': '2.22.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/geoserver/geoserver/security/advisories/GHSA-7g5f-wrx8-5ccf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25157'}, {'type': 'WEB', 'url': 'https://github.com/geoserver/geoserver/commit/145a8af798590288d270b240235e89c8f0b62e1d'}, {'type': 'PACKAGE', 'url': 'https://github.com/geoserver/geoserver'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T19:15:56Z', 'nvd_published_at': '2023-02-21T22:15:00Z'}
|
1.4.0
|
GHSA-68wj-c2jw-5pp9
|
2023-06-12T23:33:02Z
|
2023-02-18T00:31:59Z
| null |
['CVE-2023-24769']
|
Stored cross site scripting in changedetection.io
|
Changedetection.io before 0.40.2 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the main page. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the URL parameter under the "Add a new change detection watch" function.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'changedetection.io'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.40.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24769'}, {'type': 'WEB', 'url': 'https://github.com/dgtlmoon/changedetection.io/issues/1358'}, {'type': 'WEB', 'url': 'https://github.com/dgtlmoon/changedetection.io/pull/1359'}, {'type': 'PACKAGE', 'url': 'https://github.com/dgtlmoon/changedetection.io'}, {'type': 'WEB', 'url': 'https://www.edoardoottavianelli.it/CVE-2023-24769'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-12T23:33:02Z', 'nvd_published_at': '2023-02-17T22:15:00Z'}
|
1.4.0
|
GHSA-pv4m-h859-jwmq
|
2023-02-14T21:22:07Z
|
2023-02-04T09:30:20Z
| null |
['CVE-2023-0674']
|
Cross-Site Request Forgery in XXL Job
|
A vulnerability, which was classified as problematic, has been found in XXL-JOB 2.3.1. Affected by this issue is some unknown functionality of the file /user/updatePwd of the component New Password Handler. The manipulation leads to cross-site request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-220196.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.xuxueli:xxl-job'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0674'}, {'type': 'WEB', 'url': 'https://github.com/boyi0508/xxl-job-explain/blob/main/README.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/xuxueli/xxl-job'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.220196'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.220196'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T21:22:07Z', 'nvd_published_at': '2023-02-04T08:15:00Z'}
|
1.4.0
|
GHSA-mm8v-wmqx-8h2j
|
2023-02-08T00:23:23Z
|
2023-02-02T03:30:23Z
| null |
['CVE-2023-25013']
|
Broken Access Control in 3rd party TYPO3 extension "femanager"
|
A missing access check in the `InvitationController` allows an unauthenticated user with a valid invitation link to set the password of all frontend users.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'in2code/femanager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.5.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'in2code/femanager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.3.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'in2code/femanager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.1.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25013'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/in2code/femanager/CVE-2023-25013.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/in2code-de/femanager'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2023-001'}]
|
{'cwe_ids': ['CWE-306'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T00:23:23Z', 'nvd_published_at': '2023-02-02T01:15:00Z'}
|
1.4.0
|
GHSA-r2vq-p658-p274
|
2023-02-23T22:07:55Z
|
2023-02-13T21:31:03Z
| null |
['CVE-2023-25240']
|
SameSite Attribute vulnerability in pimCore
|
An improper SameSite Attribute vulnerability in pimCore v10.5.15 allows attackers to execute arbitrary code.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.16'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25240'}, {'type': 'WEB', 'url': 'https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/pimcore/pimCore-10.5.15'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://portswigger.net/web-security/csrf/bypassing-samesite-restrictions'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T00:29:53Z', 'nvd_published_at': '2023-02-13T21:15:00Z'}
|
1.4.0
|
GHSA-9j2p-8qqf-h55c
|
2023-02-23T22:11:03Z
|
2023-02-13T21:31:03Z
| null |
['CVE-2022-4905']
|
Cross-site Scripting in UDX Stateless Media Plugin
|
A vulnerability was found in UDX Stateless Media Plugin 3.1.1. It has been declared as problematic. This vulnerability affects the function setup_wizard_interface of the file lib/classes/class-settings.php. The manipulation of the argument settings leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 3.2.0 is able to address this issue. The name of the patch is 6aee7ae0b0beeb2232ce6e1c82aa7e2041ae151a. It is recommended to upgrade the affected component. VDB-220750 is the identifier assigned to this vulnerability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'wpcloud/wp-stateless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4905'}, {'type': 'WEB', 'url': 'https://github.com/udx/wp-stateless/pull/630'}, {'type': 'WEB', 'url': 'https://github.com/udx/wp-stateless/commit/6aee7ae0b0beeb2232ce6e1c82aa7e2041ae151a'}, {'type': 'WEB', 'url': 'https://github.com/udx/wp-stateless/releases/tag/3.2.0'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.220750'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.220750'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-23T22:11:03Z', 'nvd_published_at': '2023-02-13T21:15:00Z'}
|
1.4.0
|
GHSA-rghh-ghf7-7943
|
2023-02-13T16:48:42Z
|
2023-02-04T21:30:22Z
| null |
['CVE-2023-22849']
|
Sling App CMS Cross-site Scripting vulnerability
|
An improper neutralization of input during web page generation ('Cross-site Scripting') [CWE-79] vulnerability in Sling App CMS version 1.1.4 and prior may allow an authenticated remote attacker to perform a reflected cross-site scripting (XSS) attack in multiple features. Upgrade to Apache Sling App CMS >= 1.1.6
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.sling:org.apache.sling.cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.6'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22849'}, {'type': 'WEB', 'url': 'https://sling.apache.org/news.html'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T21:31:51Z', 'nvd_published_at': '2023-02-04T21:15:00Z'}
|
1.4.0
|
GHSA-q9ww-gjpw-p9g6
|
2023-02-24T18:58:07Z
|
2023-02-16T12:30:22Z
| null |
['CVE-2023-0860']
|
Improper Restriction of Excessive Authentication Attempts in modoboa
|
Improper Restriction of Excessive Authentication Attempts in GitHub repository modoboa/modoboa-installer prior to 2.0.4.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'modoboa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0860'}, {'type': 'WEB', 'url': 'https://github.com/modoboa/modoboa-installer/commit/63d92b73f3da6971ae4e13d033d625773ac91085'}, {'type': 'PACKAGE', 'url': 'https://github.com/modoboa/modoboa'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/64f3ab93-1357-4468-8ff4-52bbcec18cca'}]
|
{'cwe_ids': ['CWE-307'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-16T18:45:14Z', 'nvd_published_at': '2023-02-16T10:15:00Z'}
|
1.4.0
|
GHSA-j2h2-g882-x9j2
|
2023-02-16T23:33:54Z
|
2023-02-08T21:30:18Z
| null |
['CVE-2022-45982']
|
Deserialization of Untrusted Data in thinkphp
|
thinkphp 6.0.0~6.0.13 and 6.1.0~6.1.1 contains a deserialization vulnerability. This vulnerability allows attackers to execute arbitrary code via a crafted payload.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'topthink/think'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.1.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45982'}, {'type': 'WEB', 'url': 'https://gist.github.com/Dar1in9s/aa87df679057db3bbdade360d77f8cca'}, {'type': 'PACKAGE', 'url': 'https://github.com/top-think/think'}]
|
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-16T23:33:54Z', 'nvd_published_at': '2023-02-08T21:15:00Z'}
|
1.4.0
|
GHSA-h7vf-5wrv-9fhv
|
2023-02-14T19:25:20Z
|
2023-02-01T18:48:09Z
| null |
['CVE-2022-24894']
|
Symfony storing cookie headers in HttpCache
|
Description
-----------
The Symfony HTTP cache system acts as a reverse proxy: it caches HTTP responses (including headers) and returns them to clients.
In a recent `AbstractSessionListener` change, the response might now contain a `Set-Cookie` header. If the Symfony HTTP cache system is enabled, this header might be stored and returned to some other clients. An attacker can use this vulnerability to retrieve the victim's session.
Resolution
----------
The `HttpStore` constructor now takes a parameter containing a list of private headers that are removed from the HTTP response headers.
The default value for this parameter is `Set-Cookie`, but it can be overridden or extended by the application.
The patch for this issue is available [here](https://github.com/symfony/symfony/commit/d2f6322af9444ac5cd1ef3ac6f280dbef7f9d1fb) for branch 4.4.
Credits
-------
We would like to thank Soner Sayakci for reporting the issue and Nicolas Grekas for fixing it.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '4.4.50'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.4.20'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.20'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.0'}, {'fixed': '6.1.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.2.0'}, {'fixed': '6.2.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '4.4.50'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.4.20'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.20'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.0'}, {'fixed': '6.1.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.2.0'}, {'fixed': '6.2.6'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/symfony/symfony/security/advisories/GHSA-h7vf-5wrv-9fhv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24894'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/commit/d2f6322af9444ac5cd1ef3ac6f280dbef7f9d1fb'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/http-kernel/CVE-2022-24894.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2022-24894.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/symfony/symfony'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/07/msg00014.html'}, {'type': 'WEB', 'url': 'https://symfony.com/cve-2022-24894'}]
|
{'cwe_ids': ['CWE-285'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-01T18:48:09Z', 'nvd_published_at': '2023-02-03T22:15:00Z'}
|
1.4.0
|
GHSA-rr93-7c6x-8v4v
|
2023-02-24T16:03:58Z
|
2023-02-15T15:30:40Z
| null |
['CVE-2023-25767']
|
Cross-Site Request Forgery in Jenkins Azure Credentials Plugin
|
A cross-site request forgery (CSRF) vulnerability in Jenkins Azure Credentials Plugin 253.v887e0f9e898b and earlier allows attackers to connect to an attacker-specified web server.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:azure-credentials'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '253.v887e0f9e898b'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25767'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/azure-credentials-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-1756'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/02/15/4'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T18:33:24Z', 'nvd_published_at': '2023-02-15T14:15:00Z'}
|
1.4.0
|
GHSA-p24m-863f-fm6q
|
2023-02-15T17:42:42Z
|
2023-02-15T17:42:42Z
| null |
['CVE-2023-25578']
|
Denial of service vulnerability when parsing multipart request body
|
### Summary
The request body parsing in `starlite` allows a potentially unauthenticated
attacker to consume a large amount of CPU time and RAM.
### Details
The multipart body parser processes an unlimited number of file parts.
The multipart body parser processes an unlimited number of field parts.
### Impact
This is a remote, potentially unauthenticated Denial of Service vulnerability.
This vulnerability affects applications with a request handler that accepts
a `Body(media_type=RequestEncodingType.MULTI_PART)`.
The large amount of CPU time required for processing requests can block all
available worker processes and significantly delay or slow down the processing
of legitimate user requests.
The large amount of RAM accumulated while processing requests can lead to
Out-Of-Memory kills.
Complete DoS is achievable by sending many concurrent multipart requests in a
loop.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'starlite'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.51.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/starlite-api/starlite/security/advisories/GHSA-p24m-863f-fm6q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25578'}, {'type': 'WEB', 'url': 'https://github.com/starlite-api/starlite/commit/9674fe803628f986c03fe60769048cbc55b5bf83'}, {'type': 'PACKAGE', 'url': 'https://github.com/starlite-api/starlite'}, {'type': 'WEB', 'url': 'https://github.com/starlite-api/starlite/releases/tag/v1.51.2'}]
|
{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T17:42:42Z', 'nvd_published_at': '2023-02-15T15:15:00Z'}
|
1.4.0
|
GHSA-74m5-2c7w-9w3x
|
2023-02-14T21:31:28Z
|
2023-02-14T21:31:28Z
| null |
[]
|
MultipartParser denial of service with too many fields or files
|
### Impact
The `MultipartParser` using the package `python-multipart` accepts an unlimited number of multipart parts (form fields or files).
Processing too many parts results in high CPU usage and high memory usage, eventually leading to an <abbr title="out of memory">OOM</abbr> process kill.
This can be triggered by sending too many small form fields with no content, or too many empty files.
For this to take effect application code has to:
* Have `python-multipart` installed and
* call `request.form()`
* or via another framework like FastAPI, using form field parameters or `UploadFile` parameters, which in turn calls `request.form()`.
### Patches
The vulnerability is solved in Starlette 0.25.0 by making the maximum fields and files customizable and with a sensible default (1000).
Applications will be secure by just upgrading their Starlette version to 0.25.0 (or FastAPI to 0.92.0).
If application code needs to customize the new max field and file number, there are new `request.form()` parameters (with the default values):
* `max_files=1000`
* `max_fields=1000`
### Workarounds
Applications that don't install `python-multipart` or that don't use form fields are safe.
In older versions, it's also possible to instead of calling `request.form()` call `request.stream()` and parse the form data in internal code.
In most cases, the best solution is to upgrade the Starlette version.
### References
This was reported in private by @das7pad via internal email. He also coordinated the fix across multiple frameworks and parsers.
The details about how `multipart/form-data` is structured and parsed are in the [RFC 7578](https://www.rfc-editor.org/rfc/rfc7578).
|
[]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'starlette'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.25.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/encode/starlette/security/advisories/GHSA-74m5-2c7w-9w3x'}, {'type': 'PACKAGE', 'url': 'https://github.com/encode/starlette'}]
|
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T21:31:28Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-j533-2g8v-pmpg
|
2023-02-22T16:31:59Z
|
2023-02-12T15:30:25Z
| null |
['CVE-2019-25102']
|
Regular Expression Denial of Service in simple-markdown
|
A vulnerability, which was classified as problematic, was found in simple-markdown 0.6.0. Affected is an unknown function of the file simple-markdown.js. The manipulation with the input <<<<<<<<<<:/:/:/:/:/:/:/:/:/:/ leads to inefficient regular expression complexity. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.6.1 is able to address this issue. The name of the patch is 015a719bf5cdc561feea05500ecb3274ef609cd2. It is recommended to upgrade the affected component. VDB-220638 is the identifier assigned to this vulnerability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'simple-markdown'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-25102'}, {'type': 'WEB', 'url': 'https://github.com/ariabuckles/simple-markdown/pull/73'}, {'type': 'WEB', 'url': 'https://github.com/ariabuckles/simple-markdown/commit/015a719bf5cdc561feea05500ecb3274ef609cd2'}, {'type': 'PACKAGE', 'url': 'https://github.com/ariabuckles/simple-markdown'}, {'type': 'WEB', 'url': 'https://github.com/ariabuckles/simple-markdown/releases/tag/0.6.1'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.220638'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.220638'}]
|
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T00:57:45Z', 'nvd_published_at': '2023-02-12T14:15:00Z'}
|
1.4.0
|
GHSA-fxrq-xhj9-rf5j
|
2023-02-24T16:01:31Z
|
2023-02-12T15:30:24Z
| null |
['CVE-2023-0793']
|
Weak Password Requirements in thorsten/phpmyfaq
|
Weak Password Requirements in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.11'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0793'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/00c04093c671607ee06cdfd670070809460f9547'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpMyFAQ'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b3881a1f-2f1e-45cb-86f3-735f66e660e9'}]
|
{'cwe_ids': ['CWE-521'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T00:43:59Z', 'nvd_published_at': '2023-02-12T14:15:00Z'}
|
1.4.0
|
GHSA-pfvh-p8qp-9ww9
|
2023-03-09T15:31:59Z
|
2023-02-28T20:12:11Z
| null |
['CVE-2022-2024']
|
Gogs OS Command Injection vulnerability
|
### Impact
The malicious user is able to update a crafted `config` file into repository's `.git` directory in combination with crafted file deletion to gain SSH access to the server on case-insensitive file systems. All installations with [repository upload enabled (default)](https://github.com/gogs/gogs/blob/f36eeedbf89328ee70cc3a2e239f6314f9021f58/conf/app.ini#L127-L129) on case-insensitive file systems (Windows, macOS, etc.) are affected.
### Patches
Make sanitization of upload path to `.git` directory to be case-insensitive. Users should upgrade to 0.12.11 or the latest 0.13.0+dev.
### Workarounds
Disable [repository upload](https://github.com/gogs/gogs/blob/f36eeedbf89328ee70cc3a2e239f6314f9021f58/conf/app.ini#L127-L129).
### References
https://huntr.dev/bounties/18cf9256-23ab-4098-a769-85f8da130f97/
### For more information
If you have any questions or comments about this advisory, please post on https://github.com/gogs/gogs/issues/7030.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'gogs.io/gogs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.11'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/gogs/gogs/security/advisories/GHSA-pfvh-p8qp-9ww9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2024'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/issues/7030'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/commit/15d0d6a94be0098a8227b6b95bdf2daed105ec41'}, {'type': 'PACKAGE', 'url': 'https://github.com/gogs/gogs'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/blob/f36eeedbf89328ee70cc3a2e239f6314f9021f58/conf/app.ini#L127-L129'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/18cf9256-23ab-4098-a769-85f8da130f97'}]
|
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-28T20:12:11Z', 'nvd_published_at': '2023-02-25T08:15:00Z'}
|
1.4.0
|
GHSA-f598-mfpv-gmfx
|
2023-02-24T18:48:49Z
|
2023-02-24T18:48:49Z
| null |
['CVE-2023-22578']
|
Sequelize - Default support for “raw attributes” when using parentheses
|
### Impact
Sequelize 6.28.2 and prior has a dangerous feature where using parentheses in the attribute option would make Sequelize use the string as-is in the SQL
```ts
User.findAll({
attributes: [
['count(id)', 'count']
]
});
```
Produced
```sql
SELECT count(id) AS "count" FROM "users"
```
### Patches
This feature was deprecated in Sequelize 5, and using it prints a deprecation warning.
This issue has been patched in [`@sequelize/core@7.0.0.alpha-20`](https://github.com/sequelize/sequelize/pull/15374) and [`sequelize@6.29.0`](https://github.com/sequelize/sequelize/pull/15710).
In Sequelize 7, it now produces the following:
```sql
SELECT "count(id)" AS "count" FROM "users"
```
In Sequelize 6, it throws an error explaining that we had to introduce a breaking change, and requires the user to explicitly opt-in to either the Sequelize 7 behavior (always escape) or the Sequelize 5 behavior (inline attributes that include `()` without escaping). See https://github.com/sequelize/sequelize/pull/15710 for more information.
### Mitigations
Do not use user-provided content to build your list or attributes. If you do, make sure that attribute in question actually exists on your model by checking that it exists in the `rawAttributes` property of your model first.
---
A discussion thread about this issue is open at https://github.com/sequelize/sequelize/discussions/15694
CVE: CVE-2023-22578
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@sequelize/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.0-alpha.20'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'sequelize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.29.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/security/advisories/GHSA-f598-mfpv-gmfx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22578'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/pull/15710'}, {'type': 'WEB', 'url': 'https://csirt.divd.nl/CVE-2023-22578'}, {'type': 'WEB', 'url': 'https://csirt.divd.nl/DIVD-2022-00020/'}, {'type': 'PACKAGE', 'url': 'https://github.com/sequelize/sequelize'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/discussions/15694'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/releases/tag/v6.29.0'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/releases/tag/v7.0.0-alpha.20'}]
|
{'cwe_ids': ['CWE-790'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-24T18:48:49Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-5vx9-j5cw-47vq
|
2023-03-01T01:35:47Z
|
2023-02-17T18:30:24Z
| null |
['CVE-2021-32163']
|
Privilege escalation in MOSN
|
Authentication vulnerability in MOSN before v.0.23.0 allows attacker to escalate privileges via case-sensitive JWT authorization.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'mosn.io/mosn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.23.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32163'}, {'type': 'WEB', 'url': 'https://github.com/mosn/mosn/issues/1633'}, {'type': 'WEB', 'url': 'https://github.com/mosn/mosn/pull/1637'}, {'type': 'PACKAGE', 'url': 'https://github.com/mosn/mosn'}]
|
{'cwe_ids': ['CWE-178', 'CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-17T20:47:37Z', 'nvd_published_at': '2023-02-17T18:15:00Z'}
|
1.4.0
|
GHSA-2qxp-xmx6-cq4f
|
2023-02-15T22:00:35Z
|
2023-02-08T00:30:34Z
| null |
['CVE-2023-0735']
|
Cross-Site Request Forgery (CSRF) in wallabag/wallabag
|
Cross-Site Request Forgery (CSRF) in GitHub repository wallabag/wallabag prior to 2.5.4.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'wallabag/wallabag'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0735'}, {'type': 'WEB', 'url': 'https://github.com/wallabag/wallabag/commit/268372dbbdd7ef87b84617fdebf95d0a86caf7dc'}, {'type': 'PACKAGE', 'url': 'https://github.com/wallabag/wallabag'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8bc78cb1-b10b-4152-842e-ceb999fc5508'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T18:13:53Z', 'nvd_published_at': '2023-02-07T23:15:00Z'}
|
1.4.0
|
GHSA-97qf-pq7x-964m
|
2023-03-02T18:16:35Z
|
2023-02-17T21:30:41Z
| null |
['CVE-2023-23921']
|
Moodle Cross-site Scripting vulnerability
|
The vulnerability was found Moodle which exists due to insufficient sanitization of user-supplied data in some returnurl parameters. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website. This flaw allows a remote attacker to perform cross-site scripting (XSS) attacks.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.19'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10.0'}, {'fixed': '3.11.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-beta'}, {'fixed': '4.0.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0-beta'}, {'fixed': '4.1.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23921'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2162526'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=443272#p1782021'}, {'type': 'WEB', 'url': 'http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-76810'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-02T18:16:35Z', 'nvd_published_at': '2023-02-17T20:15:00Z'}
|
1.4.0
|
GHSA-xg9f-g7g7-2323
|
2023-02-15T15:36:26Z
|
2023-02-15T15:36:26Z
| null |
['CVE-2023-25577']
|
High resource usage when parsing multipart form data with many fields
|
Werkzeug's multipart form data parser will parse an unlimited number of parts, including file parts. Parts can be a small amount of bytes, but each requires CPU time to parse and may use more memory as Python data. If a request can be made to an endpoint that accesses `request.data`, `request.form`, `request.files`, or `request.get_data(parse_form_data=False)`, it can cause unexpectedly high resource usage.
This allows an attacker to cause a denial of service by sending crafted multipart data to an endpoint that will parse it. The amount of CPU time required can block worker processes from handling legitimate requests. The amount of RAM required can trigger an out of memory kill of the process. Unlimited file parts can use up memory and file handles. If many concurrent requests are sent continuously, this can exhaust or kill all available workers.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'Werkzeug'}, 'ecosystem_specific': {'affected_functions': ['werkzeug.Request.from_values']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pallets/werkzeug/security/advisories/GHSA-xg9f-g7g7-2323'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25577'}, {'type': 'WEB', 'url': 'https://github.com/pallets/werkzeug/commit/517cac5a804e8c4dc4ed038bb20dacd038e7a9f1'}, {'type': 'PACKAGE', 'url': 'https://github.com/pallets/werkzeug'}, {'type': 'WEB', 'url': 'https://github.com/pallets/werkzeug/releases/tag/2.2.3'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230818-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5470'}]
|
{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T15:36:26Z', 'nvd_published_at': '2023-02-14T20:15:00Z'}
|
1.4.0
|
GHSA-9j65-3f2q-8q2r
|
2023-02-23T21:31:36Z
|
2023-02-15T15:30:41Z
| null |
['CVE-2023-25762']
|
Cross-site Scripting in Jenkins Pipeline: Build Step Plugin
|
Jenkins Pipeline: Build Step Plugin 2.18 and earlier does not escape job names in a JavaScript expression used in the Pipeline Snippet Generator, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control job names.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:pipeline-build-step'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.18'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25762'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/pipeline-build-step-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-3019'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/02/15/4'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T18:25:13Z', 'nvd_published_at': '2023-02-15T14:15:00Z'}
|
1.4.0
|
GHSA-8cfg-vx93-jvxw
|
2023-09-18T21:20:19Z
|
2023-02-06T23:27:56Z
| null |
['CVE-2020-8565']
|
Kubernetes client-go vulnerable to Sensitive Information Leak via Log File
|
In Kubernetes, if the logging level is set to at least 9, authorization and bearer tokens will be written to log files. This can occur both in API server logs and client tool output like kubectl. This affects <= v1.19.5, <= v1.18.13, <= v1.17.15, < v1.20.0-alpha2.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'k8s.io/client-go'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.19.0'}, {'fixed': '0.19.6'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/client-go'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.20.0-alpha.0'}, {'fixed': '0.20.0-alpha.2'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/client-go'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.18.0'}, {'fixed': '0.18.14'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/client-go'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.17.16'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8565'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/95623'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/pull/95316'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/client-go/commit/19875a3d5a2e0d4f51c976a9e0662de3c2c011e3'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/client-go/commit/1b8383fc150c9b816b0072032cca75754c2734d0'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/client-go/commit/44e1a07f2d513e375c4b6ee6e890040b47befe86'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/client-go/commit/e8f871a2e5fadf90fc114565abc0963967f1a373'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/commit/e99df0e5a75eb6e86123b56d53e9b7ca0fd00419'}, {'type': 'PACKAGE', 'url': 'https://github.com/kubernetes/client-go'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/kubernetes-security-discuss/c/vm-HcrFUOCs/m/36utxAM5CwAJ'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0064'}]
|
{'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-06T23:27:56Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-f2jh-mf2c-8278
|
2023-03-01T01:53:58Z
|
2023-02-27T15:30:20Z
| null |
['CVE-2023-1067']
|
Pimcore vulnerable to Cross-site Scripting
|
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore 10.5.17 and prior. A patch is available and anticipated to be part of 10.5.18.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '10.5.17'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1067'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/4b5733266d7d6aeb4f221a15e005db83fc198edf'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/31d17b34-f80d-49f2-86e7-97ae715cc045'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-28T23:26:38Z', 'nvd_published_at': '2023-02-27T14:15:00Z'}
|
1.4.0
|
GHSA-7hv8-3fr9-j2hv
|
2023-02-14T21:35:10Z
|
2023-02-14T21:35:10Z
| null |
['CVE-2023-25571']
|
Cross site scripting Vulnerability in backstage Software Catalog
|
### Impact
This vulnerability allows a malicious actor with access to add or modify content in an instance of the Backstage software catalog to inject script URLs in the entities stored in the catalog. If users of the catalog then click on said URLs, that can lead to an XSS attack.
### Patches
This vulnerability has been patched in both the frontend and backend implementations. The default `Link` component from `@backstage/core-components` will now reject `javascript:` URLs, and there is a global override of `window.open` to do the same.
In addition the catalog model as well as the catalog backend now has additional validation built in that prevents `javascript:` URLs in known annotations.
### Workarounds
The general practice of limiting access to modifying catalog content and requiring code reviews greatly helps mitigate this vulnerability.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [Backstage repository](https://github.com/backstage/backstage)
* Visit our chat, linked to in the [Backstage README](https://github.com/backstage/backstage)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@backstage/core-components'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@backstage/catalog-model'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@backstage/plugin-catalog-backend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/backstage/backstage/security/advisories/GHSA-7hv8-3fr9-j2hv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25571'}, {'type': 'WEB', 'url': 'https://github.com/backstage/backstage/commit/3d1371954512f7fa8bd0e2d357e00eada2c3e8a8'}, {'type': 'PACKAGE', 'url': 'https://github.com/backstage/backstage'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T21:35:10Z', 'nvd_published_at': '2023-02-14T18:15:00Z'}
|
1.4.0
|
GHSA-vr2x-7687-h6qv
|
2023-03-01T01:55:31Z
|
2023-02-28T23:25:54Z
| null |
['CVE-2023-25575']
|
api-platform/core's secured properties may be accessible within collections
|
### Impact
Resource properties secured with the `security` option of the `ApiPlatform\Metadata\ApiProperty` attribute can be disclosed to unauthorized users. The problem affects most serialization formats, including raw JSON, which is enabled by default when installing API Platform. Custom serialization formats may also be impacted. Only collection endpoints are affected by the issue, item endpoints are not. The JSON-LD format is not affected by the issue.
The result of the security rule is only executed for the first item of the collection. The result of the rule is then cached and reused for the next items. This bug can leak data to unauthorized users when the rule depends on the value of a property of the item. This bug can also hide properties that should be displayed to authorized users.
### Patches
This issue impacts the 2.7, 3.0 and 3.1 branches. Upgrade to v2.7.10, v3.0.12 or v3.1.3.
### Workarounds
Replace the `cache_key` of the context array of the Serializer inside a custom normalizer that works on objects if the security option of the `ApiPlatform\Metadata\ApiProperty` attribute is used.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'api-platform/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'api-platform/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'api-platform/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.7.10'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/api-platform/core/security/advisories/GHSA-vr2x-7687-h6qv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25575'}, {'type': 'WEB', 'url': 'https://github.com/api-platform/core/commit/5723d68369722feefeb11e42528d9580db5dd0fb'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/api-platform/core/CVE-2023-25575.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/api-platform/core'}, {'type': 'WEB', 'url': 'https://github.com/api-platform/core/releases/tag/v2.7.10'}, {'type': 'WEB', 'url': 'https://github.com/api-platform/core/releases/tag/v3.0.12'}, {'type': 'WEB', 'url': 'https://github.com/api-platform/core/releases/tag/v3.1.3'}]
|
{'cwe_ids': ['CWE-842', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-28T23:25:54Z', 'nvd_published_at': '2023-02-28T23:15:00Z'}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.