schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
stringlengths 20
20
⌀ | aliases
stringlengths 2
20
| summary
stringlengths 20
140
| details
stringlengths 56
37.2k
| severity
stringlengths 2
92
| affected
stringlengths 88
7.07k
| references
stringlengths 139
4.72k
| database_specific
stringlengths 131
185
|
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0
|
GHSA-wr8h-w969-36m8
|
2023-03-03T22:56:32Z
|
2023-02-21T18:30:17Z
| null |
['CVE-2015-10085']
|
GoPistolet vulnerable to Improper Resource Shutdown or Release
|
A vulnerability was found in GoPistolet. It has been declared as problematic. This vulnerability affects unknown code of the component MTA. The manipulation leads to denial of service. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The name of the patch is b91aa4674d460993765884e8463c70e6d886bc90. It is recommended to apply a patch to fix this issue. VDB-221506 is the identifier assigned to this vulnerability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/gopistolet/gopistolet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20210418093520-a5395f728f8d'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-10085'}, {'type': 'WEB', 'url': 'https://github.com/gopistolet/gopistolet/pull/27'}, {'type': 'WEB', 'url': 'https://github.com/gopistolet/gopistolet/commit/b91aa4674d460993765884e8463c70e6d886bc90'}, {'type': 'PACKAGE', 'url': 'https://github.com/gopistolet/gopistolet'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.221506'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.221506'}]
|
{'cwe_ids': ['CWE-404'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T22:56:32Z', 'nvd_published_at': '2023-02-21T18:15:00Z'}
|
1.4.0
|
GHSA-x36g-4629-xp9v
|
2023-03-07T23:53:49Z
|
2023-02-27T18:32:09Z
| null |
['CVE-2023-1070']
|
TeamPass External Control of File Name or Path vulnerability
|
External Control of File Name or Path in GitHub repository nilsteampassnet/teampass prior to 3.0.0.22.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'nilsteampassnet/teampass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0.23'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1070'}, {'type': 'WEB', 'url': 'https://github.com/nilsteampassnet/teampass/commit/0af3574caba27a61b16dc25c94fa51ae12d2d967'}, {'type': 'PACKAGE', 'url': 'https://github.com/nilsteampassnet/teampass'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/318bfdc4-7782-4979-956f-9ba2cc44889c'}]
|
{'cwe_ids': ['CWE-73'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-28T23:27:43Z', 'nvd_published_at': '2023-02-27T16:15:00Z'}
|
1.4.0
|
GHSA-hc67-v29c-7g78
|
2023-02-14T21:21:17Z
|
2023-02-05T21:30:25Z
| null |
['CVE-2017-20175']
|
Cross-site Scripting in DaSchTour matomo-mediawiki-extension
|
A vulnerability classified as problematic has been found in DaSchTour matomo-mediawiki-extension up to 2.4.2. This affects an unknown part of the file Piwik.hooks.php of the component Username Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.4.3 is able to address this issue. The name of the patch is 681324e4f518a8af4bd1f93867074c728eb9923d. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220203.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'mediawiki/matomo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-20175'}, {'type': 'WEB', 'url': 'https://github.com/DaSchTour/matomo-mediawiki-extension/pull/17'}, {'type': 'WEB', 'url': 'https://github.com/DaSchTour/matomo-mediawiki-extension/commit/681324e4f518a8af4bd1f93867074c728eb9923d'}, {'type': 'WEB', 'url': 'https://github.com/DaSchTour/matomo-mediawiki-extension/releases/tag/v2.4.3'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.220203'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.220203'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T21:21:17Z', 'nvd_published_at': '2023-02-05T20:15:00Z'}
|
1.4.0
|
GHSA-7j9h-3jxf-3vrf
|
2023-02-15T18:11:42Z
|
2023-02-15T18:10:38Z
| null |
['CVE-2023-25171']
|
Denial of service vulnerability on Password reset page
|
### Impact
Previous versions of Kiwi TCMS do not impose rate limits which makes it easier to attempt denial-of-service attacks against the Password reset page. An attacker could potentially send a large number of emails if they know the email addresses of users in Kiwi TCMS. Additionally that may strain SMTP resources.
### Patches
Users should upgrade to v12.0 or later.
### Workarounds
Users may install and configure a rate-limiting proxy in front of Kiwi TCMS such as Nginx and/or configure rate limits on their email server when possible.
### References
[Disclosed by Ahmed Rabeaa Mosaa](https://huntr.dev/bounties/3b712cb6-3fa3-4f71-8562-7a7016c6262e)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'kiwitcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/kiwitcms/Kiwi/security/advisories/GHSA-7j9h-3jxf-3vrf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25171'}, {'type': 'WEB', 'url': 'https://github.com/kiwitcms/Kiwi/commit/761305d04f5910ba14cc04d1255a8f1afdbb87f3'}, {'type': 'PACKAGE', 'url': 'https://github.com/kiwitcms/Kiwi'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3b712cb6-3fa3-4f71-8562-7a7016c6262e'}, {'type': 'WEB', 'url': 'https://kiwitcms.org/blog/kiwi-tcms-team/2023/02/15/kiwi-tcms-120/'}]
|
{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T18:10:38Z', 'nvd_published_at': '2023-02-15T15:15:00Z'}
|
1.4.0
|
GHSA-fqp6-fw9g-xpxp
|
2023-02-10T00:19:53Z
|
2023-02-03T18:30:26Z
| null |
['CVE-2021-37306']
|
Insecure Permissions issue in jeecg-boot
|
An Insecure Permissions issue in jeecg-boot 2.4.5 and earlier allows remote attackers to gain escalated privilege and view sensitive information via api uri: api uri:/sys/user/checkOnlyUser?username=admin.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-base'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4.5'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37306'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/issues/2794'}, {'type': 'PACKAGE', 'url': 'https://github.com/jeecgboot/jeecg-boot'}]
|
{'cwe_ids': ['CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-04T00:30:27Z', 'nvd_published_at': '2023-02-03T18:15:00Z'}
|
1.4.0
|
GHSA-3x49-g6rc-c284
|
2023-03-06T22:00:24Z
|
2023-02-24T16:22:50Z
| null |
['CVE-2022-23535']
|
LiteDB may deserialize bad JSON on object type using _type
|
### Impact
LiteDB use a special field in JSON documents to cast diferent types from `BsonDocument` do POCO classes. When instance of an object are not the same of class, `BsonMapper` use a special field `_type` string info with full class name with assembly to be loaded and fit in your model.
If your end-user can send to your app a plain JSON string, deserialization can load an unsafe object to fit in your model.
### Patches
Version >= 5.0.13 add some basic fixes to avoid this, but is not 100% guaranteed when using `Object` type
Next major version will contains a allow-list to select what king of Assembly can be loaded
### Workarounds
- Avoid users send to your app a JSON string to be direct insert/update into database
- Avoid use classes with `Object` type - try use an interface when possible
If your app send a plain JSON string to be insert/update into database, prefer this:
```
// Bad
public class Customer {
public int Id { get; set; }
public string Name { get; set; }
public Object AnyData { get; set; } // <= Avoid use `Object` base type
}
// Good
public class Customer {
public int Id { get; set; }
public string Name { get; set; }
public IDictionary<string, string> AnyData { get; set; } // Will accept only key/value strings
}
```
### References
See this workaround fix on this commit:
https://github.com/mbdavid/LiteDB/commit/4382ff4dd0dd8b8b16a4e37dfd29727c5f70f93f
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'NuGet', 'name': 'LiteDB'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.13'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/mbdavid/LiteDB/security/advisories/GHSA-3x49-g6rc-c284'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23535'}, {'type': 'WEB', 'url': 'https://github.com/mbdavid/LiteDB/commit/4382ff4dd0dd8b8b16a4e37dfd29727c5f70f93f'}, {'type': 'WEB', 'url': 'https://github.com/mbdavid/LiteDB/commit/d72c6774e6a13de2cfcd7d477d3575efeb75c8f2'}, {'type': 'PACKAGE', 'url': 'https://github.com/mbdavid/LiteDB'}, {'type': 'WEB', 'url': 'https://github.com/mbdavid/LiteDB/releases/tag/v5.0.13'}]
|
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-24T16:22:50Z', 'nvd_published_at': '2023-02-24T23:15:00Z'}
|
1.4.0
|
GHSA-w7pp-m8wf-vj6r
|
2023-02-16T19:07:57Z
|
2023-02-07T20:54:10Z
| null |
['CVE-2023-23931']
|
Cipher.update_into can corrupt memory if passed an immutable python object as the outbuf
|
Previously, `Cipher.update_into` would accept Python objects which implement the buffer protocol, but provide only immutable buffers:
```pycon
>>> outbuf = b"\x00" * 32
>>> c = ciphers.Cipher(AES(b"\x00" * 32), modes.ECB()).encryptor()
>>> c.update_into(b"\x00" * 16, outbuf)
16
>>> outbuf
b'\xdc\x95\xc0x\xa2@\x89\x89\xadH\xa2\x14\x92\x84 \x87\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'
```
This would allow immutable objects (such as `bytes`) to be mutated, thus violating fundamental rules of Python. This is a soundness bug -- it allows programmers to misuse an API, it cannot be exploited by attacker controlled data alone.
This now correctly raises an exception.
This issue has been present since `update_into` was originally introduced in cryptography 1.8.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'cryptography'}, 'ecosystem_specific': {'affected_functions': ['cryptography.hazmat.primitives.ciphers.Cipher']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8'}, {'fixed': '39.0.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/security/advisories/GHSA-w7pp-m8wf-vj6r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23931'}, {'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/pull/8230/commits/94a50a9731f35405f0357fa5f3b177d46a726ab3'}, {'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/commit/d6951dca25de45abd52da51b608055371fbcde4e'}, {'type': 'PACKAGE', 'url': 'https://github.com/pyca/cryptography'}]
|
{'cwe_ids': ['CWE-754'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-07T20:54:10Z', 'nvd_published_at': '2023-02-07T21:15:00Z'}
|
1.4.0
|
GHSA-2h6c-j3gf-xp9r
|
2023-02-10T19:52:45Z
|
2023-02-10T19:52:45Z
| null |
['CVE-2023-23626']
|
IPFS go-bitfield vulnerable to DoS via malformed size arguments
|
### Impact
When feeding untrusted user input into the size parameter of `NewBitfield` and `FromBytes` functions, an attacker can trigger `panic`s.
This happen when the `size` is a not a multiple of `8` or is negative.
There were already a note in the `NewBitfield` documentation:
> ```
> Panics if size is not a multiple of 8.
> ````
But it incomplete and missing from `FromBytes`'s documentation.
This has been replaced by returning an `(Bitfield, error)` and returning a non nil error if the size is wrong.
### Patches
- https://github.com/ipfs/go-bitfield/commit/5e1d256fe043fc4163343ccca83862c69c52e579
### Workarounds
- Ensure `size%8 == 0 && size >= 0` yourself before calling `NewBitfield` or `FromBytes`
### References
- https://github.com/ipfs/go-unixfs/security/advisories/GHSA-q264-w97q-q778
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ipfs/go-bitfield'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/ipfs/go-bitfield/security/advisories/GHSA-2h6c-j3gf-xp9r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23626'}, {'type': 'WEB', 'url': 'https://github.com/ipfs/go-bitfield/commit/5e1d256fe043fc4163343ccca83862c69c52e579'}, {'type': 'PACKAGE', 'url': 'https://github.com/ipfs/go-bitfield'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1558'}]
|
{'cwe_ids': ['CWE-1284', 'CWE-754'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-10T19:52:45Z', 'nvd_published_at': '2023-02-09T21:15:00Z'}
|
1.4.0
|
GHSA-px2r-cmr2-phw7
|
2023-02-24T16:03:43Z
|
2023-02-15T15:30:40Z
| null |
['CVE-2023-25768']
|
Missing Authorization in Jenkins Azure Credentials Plugin
|
A missing permission check in Jenkins Azure Credentials Plugin 253.v887e0f9e898b and earlier allows attackers with Overall/Read permission to connect to an attacker-specified web server.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:azure-credentials'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '253.v887e0f9e898b'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25768'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/azure-credentials-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-1756'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/02/15/4'}]
|
{'cwe_ids': ['CWE-862', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T18:32:57Z', 'nvd_published_at': '2023-02-15T14:15:00Z'}
|
1.4.0
|
GHSA-gpvj-gp8c-c7p2
|
2023-02-24T16:01:14Z
|
2023-02-12T15:30:24Z
| null |
['CVE-2019-25103']
|
Regular Expression Denial of Service in simple-markdown
|
A vulnerability has been found in simple-markdown 0.5.1 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file simple-markdown.js. The manipulation leads to inefficient regular expression complexity. The attack can be launched remotely. Upgrading to version 0.5.2 is able to address this issue. The name of the patch is 89797fef9abb4cab2fb76a335968266a92588816. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220639.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'simple-markdown'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-25103'}, {'type': 'WEB', 'url': 'https://github.com/ariabuckles/simple-markdown/commit/89797fef9abb4cab2fb76a335968266a92588816'}, {'type': 'PACKAGE', 'url': 'https://github.com/ariabuckles/simple-markdown'}, {'type': 'WEB', 'url': 'https://github.com/ariabuckles/simple-markdown/releases/tag/0.5.2'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.220639'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.220639'}]
|
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T01:02:08Z', 'nvd_published_at': '2023-02-12T15:15:00Z'}
|
1.4.0
|
GHSA-337f-xr2x-6fcf
|
2023-03-02T20:00:00Z
|
2023-02-20T18:30:17Z
| null |
['CVE-2023-25613']
|
Apache Kerby LdapIdentityBackend LDAP Injection vulnerability
|
An LDAP Injection vulnerability exists in the LdapIdentityBackend of Apache Kerby before 2.0.3.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.kerby:ldap-backend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25613'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/directory-kerby'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/ynz3hhbbq6d980fzpncwbh5jd8mkyt5y'}]
|
{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T00:12:20Z', 'nvd_published_at': '2023-02-20T16:15:00Z'}
|
1.4.0
|
GHSA-3x5j-9vwr-8rr5
|
2023-02-24T00:31:13Z
|
2023-02-23T22:10:19Z
| null |
['CVE-2023-25823']
|
Update share links to use FRP instead of SSH tunneling
|
### Impact
This is a vulnerability which affects anyone using Gradio's share links (i.e. creating a Gradio app and then setting `share=True`) with Gradio versions older than 3.13.1. In these older versions of Gradio, a private SSH key is sent to any user that connects to the Gradio machine, which means that a user could access other users' shared Gradio demos. From there, other exploits are possible depending on the level of access/exposure the Gradio app provides.
### Patches
The problem has been patched. Ideally, users should upgrade to `gradio==3.19.1` or later where the FRP solution has been properly tested.
### Credit
Credit to Greg Sadetsky and Samuel Tremblay-Cossette for alerting the team
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'gradio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.13.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/gradio-app/gradio/security/advisories/GHSA-3x5j-9vwr-8rr5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25823'}, {'type': 'PACKAGE', 'url': 'https://github.com/gradio-app/gradio'}]
|
{'cwe_ids': ['CWE-798'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-23T22:10:19Z', 'nvd_published_at': '2023-02-23T22:15:00Z'}
|
1.4.0
|
GHSA-wrh9-cjv3-2hpw
|
2023-02-22T22:59:09Z
|
2023-02-22T22:59:09Z
| null |
['CVE-2023-25813']
|
Sequelize vulnerable to SQL Injection via replacements
|
### Impact
The SQL injection exploit is related to replacements. Here is such an example:
In the following query, some parameters are passed through replacements, and some are passed directly through the `where` option.
```typescript
User.findAll({
where: or(
literal('soundex("firstName") = soundex(:firstName)'),
{ lastName: lastName },
),
replacements: { firstName },
})
```
This is a very legitimate use case, but this query was vulnerable to SQL injection due to how Sequelize processed the query: Sequelize built a first query using the `where` option, then passed it over to `sequelize.query` which parsed the resulting SQL to inject all `:replacements`.
If the user passed values such as
```json
{
"firstName": "OR true; DROP TABLE users;",
"lastName": ":firstName"
}
```
Sequelize would first generate this query:
```sql
SELECT * FROM users WHERE soundex("firstName") = soundex(:firstName) OR "lastName" = ':firstName'
```
Then would inject replacements in it, which resulted in this:
```sql
SELECT * FROM users WHERE soundex("firstName") = soundex('OR true; DROP TABLE users;') OR "lastName" = ''OR true; DROP TABLE users;''
```
As you can see this resulted in arbitrary user-provided SQL being executed.
### Patches
The issue was fixed in Sequelize 6.19.1
### Workarounds
Do not use the `replacements` and the `where` option in the same query if you are not using Sequelize >= 6.19.1
### References
See this thread for more information: https://github.com/sequelize/sequelize/issues/14519
Snyk: https://security.snyk.io/vuln/SNYK-JS-SEQUELIZE-2932027
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'sequelize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.19.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/security/advisories/GHSA-wrh9-cjv3-2hpw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25813'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/issues/14519'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/commit/ccaa3996047fe00048d5993ab2dd43ebadd4f78b'}, {'type': 'PACKAGE', 'url': 'https://github.com/sequelize/sequelize'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/releases/tag/v6.19.1'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-SEQUELIZE-2932027'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T22:59:09Z', 'nvd_published_at': '2023-02-22T19:15:00Z'}
|
1.4.0
|
GHSA-87x9-7grx-m28v
|
2023-02-22T00:03:49Z
|
2023-02-22T00:03:49Z
| null |
['CVE-2023-25656']
|
notation-go has excessive memory allocation on verification
|
### Impact
`notation-go` users will find their application using excessive memory when verifying signatures and the application will be finally killed, and thus availability is impacted.
### Patches
The problem has been patched in the release [v1.0.0-rc.3](https://github.com/notaryproject/notation-go/releases/tag/v1.0.0-rc.3). Users should upgrade their `notation-go` packages to `v1.0.0-rc.3` or above.
### Workarounds
Users can review their own trust policy file and check if the identity string contains `=#`. Meanwhile, users should only put trusted certificates in their trust stores referenced by their own trust policy files, and make sure the `authenticity` validation is set to `enforce`
### Credits
The `notation-go` project would like to thank Adam Korczynski (@AdamKorcz) for responsibly disclosing this issue during a security fuzzing audit sponsored by CNCF and Shiwei Zhang (@shizhMSFT) for root cause analysis and detailed vulnerability report.
### References
- [Resource exhaustion attacks](https://en.wikipedia.org/wiki/Resource_exhaustion_attack)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/notaryproject/notation-go'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0-rc.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/notaryproject/notation-go/security/advisories/GHSA-87x9-7grx-m28v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25656'}, {'type': 'WEB', 'url': 'https://github.com/notaryproject/notation-go/pull/275'}, {'type': 'PACKAGE', 'url': 'https://github.com/notaryproject/notation-go'}, {'type': 'WEB', 'url': 'https://github.com/notaryproject/notation-go/releases/tag/v1.0.0-rc.3'}]
|
{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T00:03:49Z', 'nvd_published_at': '2023-02-20T16:15:00Z'}
|
1.4.0
|
GHSA-pwcw-6f5g-gxf8
|
2023-02-08T22:36:51Z
|
2023-02-08T22:36:51Z
| null |
['CVE-2023-25165']
|
Helm vulnerable to information disclosure via getHostByName Function
|
A Helm contributor discovered an information disclosure vulnerability using the `getHostByName` template function.
### Impact
`getHostByName` is a Helm template function introduced in Helm v3. The function is able to accept a hostname and return an IP address for that hostname. To get the IP address the function performs a DNS lookup. The DNS lookup happens when used with `helm install|upgrade|template` or when the Helm SDK is used to render a chart.
Information passed into the chart can be disclosed to the DNS servers used to lookup the IP address. For example, a malicious chart could inject `getHostByName` into a chart in order to disclose values to a malicious DNS server.
### Patches
The issue has been fixed in Helm 3.11.1.
### Workarounds
Prior to using a chart with Helm verify the `getHostByName` function is not being used in a template to disclose any information you do not want passed to DNS servers.
### For more information
Helm's security policy is spelled out in detail in our [SECURITY](https://github.com/helm/community/blob/master/SECURITY.md) document.
### Credits
Disclosed by Philipp Stehle at SAP.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'helm.sh/helm/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.11.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/helm/helm/security/advisories/GHSA-pwcw-6f5g-gxf8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25165'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/commit/293b50c65d4d56187cd4e2f390f0ada46b4c4737'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/commit/5abcf74227bfe8e5a3dbf105fe62e7b12deb58d2'}, {'type': 'PACKAGE', 'url': 'https://github.com/helm/helm'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1547'}]
|
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:36:51Z', 'nvd_published_at': '2023-02-08T20:15:00Z'}
|
1.4.0
|
GHSA-f8hv-rx9p-f9r4
|
2023-03-02T19:55:14Z
|
2023-02-20T12:30:18Z
| null |
['CVE-2016-15025']
|
generator-hottowel Cross-site Scripting vulnerability
|
A vulnerability, which was classified as problematic, was found in generator-hottowel 0.0.11. Affected is an unknown function of the file app/templates/src/server/_app.js of the component 404 Error Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The name of the patch is c17092fd4103143a9ddab93c8983ace8bf174396. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-221484.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'generator-hottowel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-15025'}, {'type': 'WEB', 'url': 'https://github.com/johnpapa/generator-hottowel/pull/174'}, {'type': 'WEB', 'url': 'https://github.com/johnpapa/generator-hottowel/commit/c17092fd4103143a9ddab93c8983ace8bf174396'}, {'type': 'PACKAGE', 'url': 'https://github.com/johnpapa/generator-hottowel'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.221484'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.221484'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T00:08:15Z', 'nvd_published_at': '2023-02-20T10:15:00Z'}
|
1.4.0
|
GHSA-h97r-fchm-m23x
|
2023-02-23T21:31:31Z
|
2023-02-15T15:30:41Z
| null |
['CVE-2023-25763']
|
Cross-site Scripting in Jenkins Email Extension Plugin
|
Jenkins Email Extension Plugin 2.93 and earlier does not escape various fields included in bundled email templates, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control affected fields.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:email-ext'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.93'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25763'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/email-ext-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-2931'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/02/15/4'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T18:29:54Z', 'nvd_published_at': '2023-02-15T14:15:00Z'}
|
1.4.0
|
GHSA-84mm-prjg-49xm
|
2023-02-14T16:47:31Z
|
2023-02-06T21:30:30Z
| null |
['CVE-2015-10073']
|
tinymighty WikiSEO is vulnerable to cross-site scripting via modifyHTML function
|
A vulnerability was found in tinymighty WikiSEO 1.2.1. This affects the function modifyHTML of the file WikiSEO.body.php of the component Meta Property Tag Handler. The manipulation of the argument content leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.2.2 is able to address this issue. The name of the patch is 089a5797be612b18a820f9f1e6593ad9a91b1dba. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220215.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'tinymighty/wiki-seo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-10073'}, {'type': 'WEB', 'url': 'https://github.com/tinymighty/wiki-seo/pull/21'}, {'type': 'WEB', 'url': 'https://github.com/tinymighty/wiki-seo/commit/089a5797be612b18a820f9f1e6593ad9a91b1dba'}, {'type': 'PACKAGE', 'url': 'https://github.com/tinymighty/wiki-seo'}, {'type': 'WEB', 'url': 'https://github.com/tinymighty/wiki-seo/releases/tag/1.2.2'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.220215'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.220215'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-07T20:11:12Z', 'nvd_published_at': '2023-02-06T20:15:00Z'}
|
1.4.0
|
GHSA-hf4x-6h87-hm79
|
2023-02-23T19:39:54Z
|
2023-02-23T19:39:54Z
| null |
['CVE-2023-22476']
|
MantisBT may expose private issues' summaries to unauthorized users
|
### Impact
Due to insufficient access-level checks, any logged-in user allowed to perform Group Actions can get access to the _Summary_ field of private Issues (i.e. having Private view status, or belonging to a private Project) via a crafted `bug_arr[]` parameter in *bug_actiongroup_ext.php*.
### Patches
Patch is under development. The vulnerability will be fixed in MantisBT version 2.25.6.
### Workarounds
None
### Credits
Thanks to [d3vpoo1](https://github.com/jrckmcsb) for reporting the issue.
### References
- https://mantisbt.org/bugs/view.php?id=31086
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'mantisbt/mantisbt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.25.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.25.5'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/mantisbt/mantisbt/security/advisories/GHSA-hf4x-6h87-hm79'}, {'type': 'PACKAGE', 'url': 'https://github.com/mantisbt/mantisbt'}, {'type': 'WEB', 'url': 'https://mantisbt.org/bugs/view.php?id=31086'}]
|
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-23T19:39:54Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-368x-wmmg-hq5c
|
2023-02-22T21:58:33Z
|
2023-02-22T21:58:33Z
| null |
['CVE-2023-25570']
|
Apollo has potential access control security issue in eureka
|
### Impact
If users expose the apollo-configservice to the internet (which is not recommended), there are potential security issues since there is no authentication feature enabled for the built-in eureka service. Malicious hackers may access eureka directly to mock apollo-configservice and apollo-adminservice .
### Patches
Login authentication for eureka was added in https://github.com/apolloconfig/apollo/pull/4663 and was released in [v2.1.0](https://github.com/apolloconfig/apollo/releases/tag/v2.1.0).
### Workarounds
To fix the potential issue without upgrading, simply follow the advice that does not expose apollo-configservice to the internet.
### References
[Apollo Security Guidence](https://www.apolloconfig.com/#/en/usage/apollo-user-guide?id=_71-security-related)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [issue](https://github.com/apolloconfig/apollo/issues)
* Email us at [apollo-config@googlegroups.com](mailto:apollo-config@googlegroups.com)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.ctrip.framework.apollo:apollo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/apolloconfig/apollo/security/advisories/GHSA-368x-wmmg-hq5c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25570'}, {'type': 'WEB', 'url': 'https://github.com/apolloconfig/apollo/pull/4663'}, {'type': 'WEB', 'url': 'https://github.com/apolloconfig/apollo/commit/7df79bf8df6960433ed4ff782a54e3dfc74632bd'}, {'type': 'PACKAGE', 'url': 'https://github.com/apolloconfig/apollo'}, {'type': 'WEB', 'url': 'https://github.com/apolloconfig/apollo/releases/tag/v2.1.0'}]
|
{'cwe_ids': ['CWE-306'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T21:58:33Z', 'nvd_published_at': '2023-02-20T16:15:00Z'}
|
1.4.0
|
GHSA-q2jf-h9jm-m7p4
|
2023-02-08T22:40:58Z
|
2023-02-01T21:30:23Z
| null |
['CVE-2023-23969']
|
Django contains Uncontrolled Resource Consumption via cached header
|
In Django 3.2 before 3.2.17, 4.0 before 4.0.9, and 4.1 before 4.1.6, the parsed values of Accept-Language headers are cached in order to avoid repetitive parsing. This leads to a potential denial-of-service vector via excessive memory usage if the raw value of Accept-Language headers is very large.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2a1'}, {'fixed': '3.2.17'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0a1'}, {'fixed': '4.0.9'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1a1'}, {'fixed': '4.1.6'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23969'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/4.1/releases/security/'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!forum/django-announce'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/02/msg00000.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230302-0007/'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2023/feb/01/security-releases/'}]
|
{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-03T21:07:17Z', 'nvd_published_at': '2023-02-01T19:15:00Z'}
|
1.4.0
|
GHSA-f9c6-4j9h-6c5r
|
2023-02-28T14:36:54Z
|
2023-02-17T03:30:25Z
| null |
['CVE-2023-0880']
|
Misinterpretation of Input in thorsten/phpmyfaq
|
Misinterpretation of Input in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.11'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0880'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/a67dca41576834a1ddfee61b9e799b686b75d4fa'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpMyFAQ'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/14fc4841-0f5d-4e12-bf9e-1b60d2ac6a6c'}]
|
{'cwe_ids': ['CWE-115'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-17T20:55:07Z', 'nvd_published_at': '2023-02-17T03:15:00Z'}
|
1.4.0
|
GHSA-8237-3q5g-99fv
|
2023-02-27T14:56:32Z
|
2023-02-25T06:30:21Z
| null |
['CVE-2023-26104']
|
Denial of Service vulnerability in lite-web-server
|
All versions of the package lite-web-server are vulnerable to Denial of Service (DoS) when an attacker sends an HTTP request and includes control characters that the decodeURI() function is unable to parse.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'lite-web-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26104'}, {'type': 'WEB', 'url': 'https://gist.github.com/lirantal/637520812da06fffb91dd86d02ff6bde'}, {'type': 'PACKAGE', 'url': 'https://github.com/chasyumen/lite-web-server'}, {'type': 'WEB', 'url': 'https://github.com/chasyumen/lite-web-server/blob/main/src/WebServer.js#23L274'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-LITEWEBSERVER-3153703'}]
|
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-27T14:56:32Z', 'nvd_published_at': '2023-02-25T05:15:00Z'}
|
1.4.0
|
GHSA-w67w-mw4j-8qrv
|
2023-03-06T21:59:59Z
|
2023-02-08T22:27:42Z
| null |
['CVE-2022-4203']
|
openssl-src contains Read Buffer Overflow in X.509 Name Constraint
|
A read buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs
after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to
continue certificate verification despite failure to construct a path to a trusted issuer.
The read buffer overrun might result in a crash which could lead to a denial of service attack. In theory it could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext) although we are not aware of any working exploit leading to memory contents disclosure as of the time of release of this advisory.
In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '300.0.0'}, {'fixed': '300.0.12'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4203'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=c927a3492698c254637da836762f9b1f86cffabc'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0008.html'}, {'type': 'WEB', 'url': 'https://www.openssl.org/news/secadv/20230207.txt'}]
|
{'cwe_ids': ['CWE-125'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:27:42Z', 'nvd_published_at': '2023-02-24T15:15:00Z'}
|
1.4.0
|
GHSA-4q83-7cq4-p6wg
|
2023-02-04T00:30:37Z
|
2023-02-04T00:30:37Z
| null |
[]
|
`tokio::io::ReadHalf<T>::unsplit` is Unsound
|
`tokio::io::ReadHalf<T>::unsplit` can violate the `Pin` contract
The soundness issue is described in the [tokio/issues#5372](https://github.com/tokio-rs/tokio/issues/5372)
Specific set of conditions needed to trigger an issue (a !Unpin type in ReadHalf)
is unusual, combined with the difficulty of making any arbitrary use-after-free
exploitable in Rust without doing a lot of careful alignment of data types in
the surrounding code.
The `tokio` feature `io-util` is also required to be enabled to trigger this
soundness issue.
Thanks to zachs18 reporting the issue to Tokio team responsibly and taiki-e
and carllerche appropriately responding and fixing the soundness bug.
Tokio before 0.2.0 used `futures` 0.1 that did not have `Pin`, so it is not
affected by this issue.
|
[]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'tokio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.21.0'}, {'fixed': '1.24.2'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'tokio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.19.0'}, {'fixed': '1.20.4'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'tokio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0'}, {'fixed': '1.18.5'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/tokio-rs/tokio/issues/5372'}, {'type': 'PACKAGE', 'url': 'https://github.com/tokio-rs/tokio'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0005.html'}]
|
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-02-04T00:30:37Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-3hjh-5hgx-f5wh
|
2023-02-24T16:02:45Z
|
2023-02-13T06:30:59Z
| null |
['CVE-2022-25937']
|
Path traversal vulnerability in glance
|
Versions of the package glance before 3.0.9 are vulnerable to Directory Traversal that allows users to read files outside the public root directory. This is related to but distinct from the vulnerability reported in [CVE-2018-3715](https://security.snyk.io/vuln/npm:glance:20180129).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'glance'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.9'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25937'}, {'type': 'WEB', 'url': 'https://github.com/jarofghosts/glance/commit/8cecfe90286e0c45a5494067f1b592d0ccfeabac'}, {'type': 'WEB', 'url': 'https://gist.github.com/lirantal/c8cfb0398c78e558b7d4ac02aae67809'}, {'type': 'PACKAGE', 'url': 'https://github.com/jarofghosts/glance'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-GLANCE-3318395'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T16:52:35Z', 'nvd_published_at': '2023-02-13T05:15:00Z'}
|
1.4.0
|
GHSA-8mjg-8c8g-6h85
|
2023-08-30T10:44:16Z
|
2023-02-06T23:27:00Z
| null |
['CVE-2020-8564']
|
Kubernetes Sensitive Information leak via Log File
|
In Kubernetes clusters using a logging level of at least 4, processing a malformed docker config file will result in the contents of the docker config file being leaked, which can include pull secrets or other registry credentials. This affects < v1.19.3, < v1.18.10, < v1.17.13.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/kubernetes/kubernetes'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.19.0'}, {'fixed': '1.19.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/kubernetes/kubernetes'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.18.0'}, {'fixed': '1.18.10'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/kubernetes/kubernetes'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.17.13'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.20.0-alpha.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8564'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/95622'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/pull/94712'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/commit/11793434dac97a49bfed0150b56ac63e5dc34634'}, {'type': 'PACKAGE', 'url': 'https://github.com/kubernetes/kubernetes'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/kubernetes-security-discuss/c/vm-HcrFUOCs/m/36utxAM5CwAJ'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0066'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210122-0006/'}]
|
{'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-06T23:27:00Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-gxxj-x426-xj2w
|
2023-02-23T22:08:38Z
|
2023-02-12T15:30:25Z
| null |
['CVE-2023-0787']
|
Cross-site Scripting in thorsten/phpmyfaq
|
Cross-site Scripting (XSS) - Generic in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.11'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0787'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/b76d58321a7a595eeaf4f7a30403ca6cd8506612'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpMyFAQ'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/87397c71-7b84-4617-a66e-fa6c73be9024'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T01:05:26Z', 'nvd_published_at': '2023-02-12T14:15:00Z'}
|
1.4.0
|
GHSA-hpp2-2cr5-pf6g
|
2023-02-14T21:49:55Z
|
2023-02-14T21:49:55Z
| null |
['CVE-2023-25576']
|
Denial of service due to unlimited number of parts
|
### Impact
* The multipart body parser accepts an unlimited number of file parts.
* The multipart body parser accepts an unlimited number of field parts.
* The multipart body parser accepts an unlimited number of empty parts as field
parts.
### Patches
This is fixed in v7.4.1 (for Fastify v4.x) and v6.0.1 (for Fastify v3.x).
### Workarounds
There are no known workaround.
### References
Reported at https://hackerone.com/reports/1816195.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@fastify/multipart'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@fastify/multipart'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.4.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/fastify/fastify-multipart/security/advisories/GHSA-hpp2-2cr5-pf6g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25576'}, {'type': 'WEB', 'url': 'https://github.com/fastify/fastify-multipart/commit/85be81bedf5b29cfd9fe3efc30fb5a17173c1297'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1816195'}, {'type': 'PACKAGE', 'url': 'https://github.com/fastify/fastify-multipart'}, {'type': 'WEB', 'url': 'https://github.com/fastify/fastify-multipart/releases/tag/v6.0.1'}, {'type': 'WEB', 'url': 'https://github.com/fastify/fastify-multipart/releases/tag/v7.4.1'}]
|
{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T21:49:55Z', 'nvd_published_at': '2023-02-14T16:15:00Z'}
|
1.4.0
|
GHSA-r887-gfxh-m9rr
|
2023-03-06T19:44:37Z
|
2023-02-08T18:07:16Z
| null |
['CVE-2023-25307']
|
mrpack-install vulnerable to path traversal with dependency
|
### Impact
Importing a malicious `.mrpack` file can cause path traversal while downloading files.
This can lead to scripts or config files being placed or replaced at arbitrary locations, without the user noticing.
### Patches
No patches yet.
### Workarounds
Avoid importing `.mrpack` files from untrusted sources.
### References
https://docs.modrinth.com/docs/modpacks/format_definition/#files
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/nothub/mrpack-install'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.16.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.16.2'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/nothub/mrpack-install/security/advisories/GHSA-r887-gfxh-m9rr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25307'}, {'type': 'WEB', 'url': 'https://github.com/nothub/mrpack-install/commit/a1f424b6a616d2de95228781eef3b92b9769f23c'}, {'type': 'PACKAGE', 'url': 'https://github.com/nothub/mrpack-install'}, {'type': 'WEB', 'url': 'https://github.com/nothub/mrpack-install/releases/tag/v0.16.3'}, {'type': 'WEB', 'url': 'https://quiltmc.org/en/blog/2023-02-04-five-installer-vulnerabilities/'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T18:07:16Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-xrw3-wqph-3fxg
|
2023-02-08T16:14:16Z
|
2023-02-01T12:32:41Z
|
2023-02-02T19:26:27Z
|
[]
|
Withdrawn: wallabag subject to Improper Authorization via annotations
|
## Duplicate advisory
This advisory has been withdrawn because it is a duplicate of [GHSA-mrqx-mjc4-vfh3](https://github.com/advisories/GHSA-mrqx-mjc4-vfh3). This link is maintained to preserve external references.
## Original Description
Improper Authorization in GitHub repository wallabag/wallabag prior to 2.5.3.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'wallabag/wallabag'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-beta.1'}, {'fixed': '2.5.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0610'}, {'type': 'WEB', 'url': 'https://github.com/wallabag/wallabag/commit/5ac6b6bff9e2e3a87fd88c2904ff3c6aac40722e'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8fdd9b31-d89b-4bbe-9557-20b960faf926'}]
|
{'cwe_ids': ['CWE-285'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-02T19:26:27Z', 'nvd_published_at': '2023-02-01T12:15:00Z'}
|
1.4.0
|
GHSA-vvpx-j8f3-3w6h
|
2023-03-09T21:20:44Z
|
2023-02-17T14:00:02Z
| null |
['CVE-2022-41723']
|
Uncontrolled Resource Consumption
|
A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'golang.org/x/net'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41723'}, {'type': 'WEB', 'url': 'https://go.dev/cl/468135'}, {'type': 'WEB', 'url': 'https://go.dev/cl/468295'}, {'type': 'WEB', 'url': 'https://go.dev/issue/57855'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MA5XS5DAOJ5PKKNG5TUXKPQOFHT5VBC/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGW7GE2Z32ZT47UFAQFDRQE33B7Q7LMT/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RLBQ3A7ROLEQXQLXFDLNJ7MYPKG5GULE/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XX3IMUTZKRQ73PBZM4E2JP4BKYH4C6XE/'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1571'}, {'type': 'WEB', 'url': 'https://vuln.go.dev/ID/GO-2023-1571.json'}]
|
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-17T14:00:02Z', 'nvd_published_at': '2023-02-28T18:15:00Z'}
|
1.4.0
|
GHSA-6vv4-qq3r-9rv8
|
2023-02-24T16:02:36Z
|
2023-02-12T15:30:25Z
| null |
['CVE-2023-0790']
|
Uncaught Exception in thorsten/phpmyfaq
|
Uncaught Exception in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.11'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0790'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/f34d84dfe551ecdd675916e45cc0606e04a0734e'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpMyFAQ'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/06af150b-b481-4248-9a48-56ded2814156'}]
|
{'cwe_ids': ['CWE-248'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T01:04:31Z', 'nvd_published_at': '2023-02-12T14:15:00Z'}
|
1.4.0
|
GHSA-2g5j-5x95-r6hr
|
2023-02-06T23:16:16Z
|
2023-02-06T23:16:16Z
| null |
['CVE-2020-29529']
|
Unsafe tar unpacking in HashiCorp go-slug
|
HashiCorp go-slug before 0.5.0 does not address attempts at directory traversal involving ../ and symlinks.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/go-slug'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-29529'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/go-slug/pull/12'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/go-slug/commit/28cafc59c8da6126a3ae94dfa84181df4073454f'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/go-slug/commit/764785bc4cbb9e600ad1cf1a6bd21b535c182983'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/go-slug'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/go-slug/compare/v0.4.3...v0.5.0'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/go-slug/releases/tag/v0.5.0'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0094'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2020-262-zipslip-go-slug'}]
|
{'cwe_ids': ['CWE-22', 'CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-06T23:16:16Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-8xv4-jj4h-qww6
|
2023-02-13T16:56:35Z
|
2023-02-02T17:00:19Z
| null |
['CVE-2023-23937']
|
Pimcore contains Unrestricted Upload of File with Dangerous Type
|
### Impact
The upload functionality for updating user profile does not properly validate the file content-type, allowing any authenticated user to bypass this security check by adding a valid signature (p.e. GIF89) and sending any invalid content-type. This could allow an authenticated attacker to upload HTML files with JS content that will be executed in the context of the domain.
### Patches
Update to version 10.5.16 or apply this patch manually https://github.com/pimcore/pimcore/pull/14125.patch
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.16'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-8xv4-jj4h-qww6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23937'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/14125'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/75a448ef8ac74424cf4e723afeb6d05f9eed872f'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/aa7ee076-d729-4fcc-9bcc-48bcbb8eac38/'}]
|
{'cwe_ids': ['CWE-434'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-02T17:00:19Z', 'nvd_published_at': '2023-02-03T20:15:00Z'}
|
1.4.0
|
GHSA-c2jc-4fpr-4vhg
|
2023-02-08T22:38:10Z
|
2023-02-08T22:38:10Z
| null |
['CVE-2023-25166']
|
@sideway/formula contains Regular Expression Denial of Service (ReDoS) Vulnerability
|
### Impact
User-provided strings to formula's parser might lead to polynomial execution time.
### Patches
Users should upgrade to 3.0.1+.
### Workarounds
None.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@sideway/formula'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/hapijs/formula/security/advisories/GHSA-c2jc-4fpr-4vhg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25166'}, {'type': 'WEB', 'url': 'https://github.com/hapijs/formula/commit/9fbc20a02d75ae809c37a610a57802cd1b41b3fe'}, {'type': 'PACKAGE', 'url': 'https://github.com/hapijs/formula'}]
|
{'cwe_ids': ['CWE-1333'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:38:10Z', 'nvd_published_at': '2023-02-08T20:15:00Z'}
|
1.4.0
|
GHSA-grmj-gpwm-98ww
|
2023-03-02T19:29:09Z
|
2023-02-17T21:30:41Z
| null |
['CVE-2023-23922']
|
Moodle Cross-site Scripting vulnerability
|
The vulnerability was found Moodle which exists due to insufficient sanitization of user-supplied data in blog search. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website. This flaw allows a remote attacker to perform cross-site scripting (XSS) attacks.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-beta'}, {'fixed': '4.0.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0-beta'}, {'fixed': '4.1.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23922'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2162547'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=443273#p1782022'}, {'type': 'WEB', 'url': 'http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-76861'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-02T19:29:09Z', 'nvd_published_at': '2023-02-17T20:15:00Z'}
|
1.4.0
|
GHSA-4xgv-j62q-h3rj
|
2023-06-13T23:50:39Z
|
2023-02-07T18:36:47Z
| null |
[]
|
Panic during unmarshal of Hello Verify Request in github.com/pion/dtls/v2
|
### Impact
During the unmarshalling of a hello verify request we could try to unmarshal into too small a buffer. is could result in a panic leading the program to crash.
This issue could be abused to cause a denial of service.
### Workaround
None, upgrade to 2.2.4
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/pion/dtls'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/pion/dtls/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.4'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pion/dtls/security/advisories/GHSA-4xgv-j62q-h3rj'}, {'type': 'WEB', 'url': 'https://github.com/pion/dtls/commit/a50d26c5e4eed2ca87509494ffef2d2ebd22b1eb'}, {'type': 'PACKAGE', 'url': 'https://github.com/pion/dtls'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1534'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-07T18:36:47Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-jfpg-jggf-rpph
|
2023-02-23T22:08:35Z
|
2023-02-12T15:30:25Z
| null |
['CVE-2023-0786']
|
Cross-site Scripting in thorsten/phpmyfaq
|
Cross-site Scripting (XSS) - Generic in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.11'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0786'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/ce676eb9e9d8cb7864f36ee124e838b1ad15415f'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpMyFAQ'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8c74ccab-0d1d-4c6b-a0fa-803aa65de04f'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T01:06:17Z', 'nvd_published_at': '2023-02-12T14:15:00Z'}
|
1.4.0
|
GHSA-c9c2-wcxh-3w5j
|
2023-02-23T21:31:10Z
|
2023-02-15T15:30:40Z
| null |
['CVE-2023-25765']
|
Sandbox escape in Jenkins Email Extension Plugin
|
In Jenkins Email Extension Plugin 2.93 and earlier, templates defined inside a folder were not subject to Script Security protection, allowing attackers able to define email templates in folders to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:email-ext'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.93'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25765'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/email-ext-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-2939'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/02/15/4'}]
|
{'cwe_ids': ['CWE-693'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T18:29:32Z', 'nvd_published_at': '2023-02-15T14:15:00Z'}
|
1.4.0
|
GHSA-fxqx-xgqq-gf42
|
2023-02-15T15:15:40Z
|
2023-02-06T18:30:30Z
| null |
['CVE-2020-36660']
|
Exposure of Sensitive Information in EVE-SRP
|
A vulnerability was found in paxswill EVE Ship Replacement Program 0.12.11. It has been rated as problematic. This issue affects some unknown processing of the file src/evesrp/views/api.py of the component User Information Handler. The manipulation leads to information disclosure. The attack may be initiated remotely. Upgrading to version 0.12.12 is able to address this issue. The name of the patch is 9e03f68e46e85ca9c9694a6971859b3ee66f0240. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220211.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'EVE-SRP'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.12'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36660'}, {'type': 'WEB', 'url': 'https://github.com/paxswill/evesrp/commit/9e03f68e46e85ca9c9694a6971859b3ee66f0240'}, {'type': 'PACKAGE', 'url': 'https://github.com/paxswill/evesrp'}, {'type': 'WEB', 'url': 'https://github.com/paxswill/evesrp/releases/tag/v0.12.12'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.220211'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.220211'}]
|
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T15:15:40Z', 'nvd_published_at': '2023-02-06T17:15:00Z'}
|
1.4.0
|
GHSA-p7qq-rrvw-x55x
|
2023-03-07T04:02:34Z
|
2023-02-25T03:30:17Z
| null |
['CVE-2023-1033']
|
Froxlor Cross-Site Request Forgery vulnerability
|
Froxlor prior to version 2.0.11 has a Cross-Site Request Forgery vulnerability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'froxlor/froxlor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.11'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1033'}, {'type': 'WEB', 'url': 'https://github.com/froxlor/froxlor/commit/4003a8d2b60728a77476d1d4f5aa5c635f128950'}, {'type': 'PACKAGE', 'url': 'https://github.com/froxlor/froxlor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ba3cd929-8b60-4d8d-b77d-f28409ecf387'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-28T23:26:13Z', 'nvd_published_at': '2023-02-25T01:15:00Z'}
|
1.4.0
|
GHSA-mrpv-5pmr-p92h
|
2023-03-03T23:26:02Z
|
2023-02-23T09:30:17Z
| null |
['CVE-2023-25621']
|
Improper Privilege Management in Apache Sling
|
Privilege Escalation vulnerability in Apache Software Foundation Apache Sling. Any content author is able to create i18n dictionaries in the repository in a location the author has write access to. As these translations are used across the whole product, it allows an author to change any text or dialog in the product. For example an attacker might fool someone by changing the text on a delete button to "Info". This issue affects the i18n module of Apache Sling versions before 2.6.2. Version 2.6.2 and higher limit by default i18m dictionaries to certain paths in the repository (/libs and /apps). Users of the module are advised to update to version 2.6.2 or higher, check the configuration for resource loading and then adjust the access permissions for the configured path accordingly.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.sling:org.apache.sling.i18n'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25621'}, {'type': 'WEB', 'url': 'https://github.com/apache/sling-org-apache-sling-i18n/pull/9'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/SLING-11744'}, {'type': 'WEB', 'url': 'https://seclists.org/oss-sec/2023/q1/112'}, {'type': 'WEB', 'url': 'https://sling.apache.org/news.html'}]
|
{'cwe_ids': ['CWE-269'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-23T21:38:53Z', 'nvd_published_at': '2023-02-23T09:15:00Z'}
|
1.4.0
|
GHSA-824j-wqm8-89mj
|
2023-02-14T22:00:54Z
|
2023-02-14T22:00:54Z
| null |
['CVE-2023-21808']
|
.NET Remote Code Execution Vulnerability
|
# Microsoft Security Advisory CVE-2023-21808: .NET Remote Code Execution Vulnerability
## <a name="executive-summary"></a>Executive summary
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 7.0 and .NET 6.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.
A vulnerability exists in how .NET reads debugging symbols, where reading a malicious symbols file may result in remote code execution.
## Discussion
Discussion for this issue can be found at https://github.com/dotnet/runtime/issues/82112
### <a name="mitigation-factors"></a>Mitigation factors
Microsoft has not identified any mitigating factors for this vulnerability.
## <a name="affected-software"></a>Affected software
* Any .NET 7.0 application running on .NET 7.0.2 or earlier.
* Any .NET 6.0 application running on .NET 6.0.13 or earlier.
If your application uses the following package versions, ensure you update to the latest version of .NET.
### <a name=".NET 7"></a>.NET 7
Package name | Affected version | Patched version
------------ | ---------------- | -------------------------
[Microsoft.NetCore.App.Runtime.win-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm)|>= 7.0.0, <= 7.0.2|7.0.3
[Microsoft.NetCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm64)|>= 7.0.0, <= 7.0.2|7.0.3
[Microsoft.NetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x64)|>= 7.0.0, <= 7.0.2|7.0.3
[Microsoft.NetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x86)|>= 7.0.0, <= 7.0.2|7.0.3
### <a name=".NET 6"></a>.NET 6
Package name | Affected version | Patched version
------------ | ---------------- | -------------------------
[Microsoft.NetCore.App.Runtime.win-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm)|>= 6.0.0, <= 6.0.13|6.0.14
[Microsoft.NetCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm64)|>= 6.0.0, <= 6.0.13|6.0.14
[Microsoft.NetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x64)|>= 6.0.0, <= 6.0.13|6.0.14
[Microsoft.NetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x86)|>= 6.0.0, <= 6.0.13|6.0.14
## Advisory FAQ
### <a name="how-affected"></a>How do I know if I am affected?
If you have a runtime or SDK with a version listed, or an affected package listed in [affected software](#affected-software), you're exposed to the vulnerability.
### <a name="how-fix"></a>How do I fix the issue?
* To fix the issue please install the latest version of .NET 6.0 or .NET 7.0. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs.
* If you have .NET Core 3.1 or greater installed, you can list the versions you have installed by running the `dotnet --info` command. You will see output like the following;
* If you are using one of the affected packages, please update to the patched version listed above.
```
.NET Core SDK (reflecting any global.json):
Version: 6.0.300
Commit: 8473146e7d
Runtime Environment:
OS Name: Windows
OS Version: 10.0.18363
OS Platform: Windows
RID: win10-x64
Base Path: C:\Program Files\dotnet\sdk\6.0.300\
Host (useful for support):
Version: 6.0.5
Commit: 8473146e7d
.NET Core SDKs installed:
6.0.300 [C:\Program Files\dotnet\sdk]
.NET Core runtimes installed:
Microsoft.AspNetCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App]
Microsoft.NETCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App]
Microsoft.WindowsDesktop.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App]
To install additional .NET Core runtimes or SDKs:
https://aka.ms/dotnet-download
```
* If you're using .NET 7.0, you should download and install Runtime 7.0.3 or SDK 7.0.103 (for Visual Studio 2022 v17.4) from https://dotnet.microsoft.com/download/dotnet-core/7.0.
* If you're using .NET 6.0, you should download and install Runtime 6.0.14 or SDK 6.0.114 (for Visual Studio 2022 v17.1) from https://dotnet.microsoft.com/download/dotnet-core/6.0.
.NET 6.0 and and .NET 7.0 updates are also available from Microsoft Update. To access this either type "Check for updates" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates.
Once you have installed the updated runtime or SDK, restart your apps for the update to take effect.
Additionally, if you've deployed [self-contained applications](https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd) targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed.
## Other Information
### Reporting Security Issues
If you have found a potential security issue in .NET 6.0 or .NET 7.0, please email details to secure@microsoft.com. Reports may qualify for the Microsoft .NET Core & .NET 5 Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at <https://aka.ms/corebounty>.
### Support
You can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime and https://github.com/dotnet/aspnet/. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue.
### Disclaimer
The information provided in this advisory is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
### Acknowledgements
[Johan Gorter](https://www.linkedin.com/in/jgorter/) with [AFAS Software](https://www.afas.nl/)
### External Links
[CVE-2023-21808]( https://www.cve.org/CVERecord?id=CVE-2023-21808)
### Revisions
V1.0 (February 14, 2023): Advisory published.
_Version 1.0_
_Last Updated 2023-02-14_
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.2'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.14'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.13'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.2'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.14'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.13'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.2'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.14'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.13'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.2'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.14'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.13'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/dotnet/runtime/security/advisories/GHSA-824j-wqm8-89mj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-21808'}, {'type': 'PACKAGE', 'url': 'https://github.com/dotnet/runtime'}, {'type': 'WEB', 'url': 'https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21808'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T22:00:54Z', 'nvd_published_at': '2023-02-14T21:15:00Z'}
|
1.4.0
|
GHSA-r7jw-wp68-3xch
|
2023-02-21T20:00:42Z
|
2023-02-08T22:28:34Z
| null |
['CVE-2023-0215']
|
openssl-src vulnerable to Use-after-free following `BIO_new_NDEF`
|
The public API function `BIO_new_NDEF` is a helper function used for streaming ASN.1 data via a `BIO`. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications.
The function receives a `BIO` from the caller, prepends a new `BIO_f_asn1` filter `BIO` onto the front of it to form a `BIO` chain, and then returns the new head of the `BIO` chain to the caller. Under certain conditions, for example if a CMS recipient public key is invalid, the new filter `BIO` is freed and the function returns a `NULL` result indicating a failure. However, in this case, the `BIO` chain is not properly cleaned up and the `BIO` passed by the caller still retains internal pointers to the previously freed filter `BIO`. If the caller then goes on to call `BIO_pop()` on the `BIO` then a use-after-free will occur. This will most likely result in a crash.
This scenario occurs directly in the internal function `B64_write_ASN1()` which may cause `BIO_new_NDEF()` to be called and will subsequently call `BIO_pop()` on the `BIO`. This internal function is in turn called by the public API functions `PEM_write_bio_ASN1_stream`, `PEM_write_bio_CMS_stream`, `PEM_write_bio_PKCS7_stream`, `SMIME_write_ASN1`, `SMIME_write_CMS` and `SMIME_write_PKCS7`.
Other public API functions that may be impacted by this include `i2d_ASN1_bio_stream`, `BIO_new_CMS`, `BIO_new_PKCS7`, `i2d_CMS_bio_stream` and `i2d_PKCS7_bio_stream`.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '111.25.0'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '300.0.0'}, {'fixed': '300.0.12'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0215'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8818064ce3c3c0f1b740a5aaba2a987e75bfbafd'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9816136fe31d92ace4037d5da5257f763aeeb4eb'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=c3829dd8825c654652201e16f8a0a0c46ee3f344'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0009.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230427-0007/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230427-0009/'}, {'type': 'WEB', 'url': 'https://www.openssl.org/news/secadv/20230207.txt'}]
|
{'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:28:34Z', 'nvd_published_at': '2023-02-08T20:15:00Z'}
|
1.4.0
|
GHSA-8mwq-mj73-qv68
|
2023-02-24T18:48:34Z
|
2023-02-16T15:30:28Z
|
2023-02-24T18:48:34Z
|
[]
|
Duplicate advisory: Sequelize vulnerable to Improper Filtering of Special Elements
|
## Duplicate advisory
This advisory has been withdrawn because it is a duplicate of [GHSA-f598-mfpv-gmfx](https://github.com/advisories/GHSA-f598-mfpv-gmfx). This link is maintained to preserve external references.
## Original Description
Due to improper attribute filtering in the sequelize js library, an attacker can peform SQL injections. This issue can be mitigated by not accepting untrusted input.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@sequelize/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.0-alpha.20'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'sequelize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.29.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.28.2'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22578'}, {'type': 'WEB', 'url': 'https://csirt.divd.nl/CVE-2023-22578'}, {'type': 'WEB', 'url': 'https://csirt.divd.nl/DIVD-2022-00020/'}, {'type': 'PACKAGE', 'url': 'https://github.com/sequelize/sequelize'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/discussions/15694'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/releases/tag/v7.0.0-alpha.20'}]
|
{'cwe_ids': ['CWE-790'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T23:16:24Z', 'nvd_published_at': '2023-02-16T15:15:00Z'}
|
1.4.0
|
GHSA-gm7m-rqf8-jx4m
|
2023-02-22T16:31:38Z
|
2023-02-11T03:32:49Z
| null |
['CVE-2023-0780']
|
Improper Restriction of Rendered UI Layers or Frames in cockpit-hq/cockpit
|
Improper Restriction of Rendered UI Layers or Frames in GitHub repository cockpit-hq/cockpit prior to 2.3.9.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'cockpit-hq/cockpit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.9'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0780'}, {'type': 'WEB', 'url': 'https://github.com/cockpit-hq/cockpit/commit/8450bdf7e1dc23e9d88adf30a2aa9101c0c41720'}, {'type': 'PACKAGE', 'url': 'https://github.com/cockpit-hq/cockpit'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/801efd0b-404b-4670-961a-12a986252fa4'}]
|
{'cwe_ids': ['CWE-1021'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T01:02:50Z', 'nvd_published_at': '2023-02-11T02:20:00Z'}
|
1.4.0
|
GHSA-gf34-hh5r-f74h
|
2023-02-23T22:08:43Z
|
2023-02-12T15:30:25Z
| null |
['CVE-2023-0794']
|
Cross-site Scripting in thorsten/phpmyfaq
|
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.11'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0794'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/edf0f6f90d4deaf46b4fd97ae92f16c1e10a2635'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpMyFAQ'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/949975f1-271d-46aa-85e5-1a013cdb5efb'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T00:47:02Z', 'nvd_published_at': '2023-02-12T14:15:00Z'}
|
1.4.0
|
GHSA-p2fr-mq9m-6w6p
|
2023-02-23T21:31:22Z
|
2023-02-15T15:30:41Z
| null |
['CVE-2023-25764']
|
Cross-site Scripting in Jenkins Email Extension Plugin
|
Jenkins Email Extension Plugin 2.93 and earlier does not escape, sanitize, or sandbox rendered email template output or log output generated during template rendering, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create or change custom email templates.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:email-ext'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.93'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25764'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/email-ext-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-2934'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/02/15/4'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T18:53:51Z', 'nvd_published_at': '2023-02-15T14:15:00Z'}
|
1.4.0
|
GHSA-vfmp-9999-6wqj
|
2023-02-22T00:10:52Z
|
2023-02-21T15:30:23Z
| null |
['CVE-2021-32855']
|
Vditor Cross-site Scripting vulnerability
|
Vditor is a browser-side Markdown editor. Versions prior to 3.8.7 are vulnerable to copy-paste cross-site scripting (XSS). For this particular type of XSS, the victim needs to be fooled into copying a malicious payload into the text editor. Version 3.8.7 contains a patch for this issue.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'vditor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.7'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32855'}, {'type': 'WEB', 'url': 'https://github.com/Vanessa219/vditor/issues/1085'}, {'type': 'WEB', 'url': 'https://github.com/Vanessa219/vditor/commit/1b2382d7f8a4ee509d9245db4450d926a0b24146'}, {'type': 'PACKAGE', 'url': 'https://github.com/Vanessa219/vditor'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2021-1006-vditor/'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T00:10:52Z', 'nvd_published_at': '2023-02-21T15:15:00Z'}
|
1.4.0
|
GHSA-hfrx-6qgj-fp6c
|
2023-03-02T19:56:24Z
|
2023-02-20T18:30:17Z
| null |
['CVE-2023-24998']
|
Apache Commons FileUpload denial of service vulnerability
|
Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads. Note that, like all of the file upload limits, the new configuration option (FileUploadBase#setFileCountMax) is not enabled by default and must be explicitly configured.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'commons-fileupload:commons-fileupload'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24998'}, {'type': 'WEB', 'url': 'https://github.com/apache/commons-fileupload/commit/e20c04990f7420ca917e96a84cec58b13a1b3d17'}, {'type': 'WEB', 'url': 'https://commons.apache.org/proper/commons-fileupload/security-reports.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/commons-fileupload'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/4xl4l09mhwg4vgsk7dxqogcjrobrrdoy'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202305-37'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/05/22/1'}]
|
{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T00:12:07Z', 'nvd_published_at': '2023-02-20T16:15:00Z'}
|
1.4.0
|
GHSA-29xx-hcv2-c4cp
|
2023-02-21T20:00:22Z
|
2023-02-08T22:23:39Z
| null |
['CVE-2023-0216']
|
openssl-src subject to Invalid pointer dereference in `d2i_PKCS7` functions
|
An invalid pointer dereference on read can be triggered when an application tries to load malformed PKCS7 data with the `d2i_PKCS7()`, `d2i_PKCS7_bio()` or `d2i_PKCS7_fp()` functions.
The result of the dereference is an application crash which could lead to a denial of service attack. The TLS implementation in OpenSSL does not call this function however third party applications might call these functions on untrusted data.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '300.0.0'}, {'fixed': '300.0.12'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0216'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=934a04f0e775309cadbef0aa6b9692e1b12a76c6'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0011.html'}, {'type': 'WEB', 'url': 'https://www.openssl.org/news/secadv/20230207.txt'}]
|
{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:23:39Z', 'nvd_published_at': '2023-02-08T20:15:00Z'}
|
1.4.0
|
GHSA-p52g-cm5j-mjv4
|
2023-02-24T19:03:43Z
|
2023-02-08T22:31:42Z
| null |
['CVE-2022-4304']
|
openssl-src subject to Timing Oracle in RSA Decryption
|
A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE.
For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '111.25.0'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '300.0.0'}, {'fixed': '300.0.12'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4304'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0007.html'}, {'type': 'WEB', 'url': 'https://www.openssl.org/news/secadv/20230207.txt'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:31:42Z', 'nvd_published_at': '2023-02-08T20:15:00Z'}
|
1.4.0
|
GHSA-4w59-c3gc-rrhp
|
2023-03-10T15:32:03Z
|
2023-02-28T23:20:05Z
| null |
['CVE-2023-23929']
|
vantage6 refresh tokens do not expire
|
From issue:
Problem description
Currently, the refresh token is valid indefinitely. This is bad security practice.
Desired solution
The refresh token should get a validity of 24-48 hours.
Additional context
When implementing this, also check that the refresh token returns a new refresh token
When implementing this, also adapt the UI so that it logs out if refresh token is no longer valid.
When implementing this, ensure that nodes refresh their token periodically so that they do not have to be restarted manually.
### Impact
### Patches
None available
### Workarounds
None available
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'vantage6'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/vantage6/vantage6/security/advisories/GHSA-4w59-c3gc-rrhp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23929'}, {'type': 'WEB', 'url': 'https://github.com/vantage6/vantage6/commit/48ebfca42359e9a6743e9598684585e2522cdce8'}, {'type': 'PACKAGE', 'url': 'https://github.com/vantage6/vantage6'}]
|
{'cwe_ids': ['CWE-613'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-28T23:20:05Z', 'nvd_published_at': '2023-03-04T00:15:00Z'}
|
1.4.0
|
GHSA-mv6w-j4xc-qpfw
|
2023-06-13T23:44:12Z
|
2023-02-08T22:37:10Z
| null |
['CVE-2023-25163']
|
Argo CD leaks repository credentials in user-facing error messages and in logs
|
### Impact
All versions of Argo CD starting with v2.6.0-rc1 have an output sanitization bug which leaks repository access credentials in error messages. These error messages are visible to the user, and they are logged. The error message is visible when a user attempts to create or update an Application via the Argo CD API (and therefor the UI or CLI). The user must have `applications, create` or `applications, update` RBAC access to reach the code which may produce the error.
The user is not guaranteed to be able to trigger the error message. They may attempt to spam the API with requests to trigger a rate limit error from the upstream repository.
If the user has `repositories, update` access, they may edit an existing repository to introduce a URL typo or otherwise force an error message. But if they have that level of access, they are probably intended to have access to the credentials anyway.
### Patches
A patch for this vulnerability has been released in the following Argo CD version:
* v2.6.1
### Workarounds
The only way to completely resolve the issue is to upgrade.
#### Mitigations
To mitigate the issue, make sure that your repo credentials have only least necessary privileges. For example, the credentials should not have push access, and they should not have access to more resources than what Argo CD actually needs (for example, a whole GitHub org when only one repo is needed).
To further mitigate the impact of a leaked write-capable repo credential, you could [enable commit signature verification](https://argo-cd.readthedocs.io/en/stable/user-guide/gpg-verification/#enforcing-signature-verification). Even if someone could push a malicious commit, the commit would not by synced.
You should also enforce least privileges in Argo CD RBAC. Make sure users only have `repositories, update`, `applications, update`, or `applications, create` access if they absolutely need it.
### References
* The problem was initially reported in a [GitHub issue](https://github.com/argoproj/argo-cd/issues/12309)
* [Argo CD RBAC configuration documentation](https://argo-cd.readthedocs.io/en/stable/operator-manual/rbac/)
### For more information
* Open an issue in [the Argo CD issue tracker](https://github.com/argoproj/argo-cd/issues) or [discussions](https://github.com/argoproj/argo-cd/discussions)
* Join us on [Slack](https://argoproj.github.io/community/join-slack) in channel #argo-cd
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0-rc1'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0-rc1'}, {'fixed': '2.6.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/security/advisories/GHSA-mv6w-j4xc-qpfw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25163'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/issues/12309'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/pull/12320'}, {'type': 'WEB', 'url': 'https://argo-cd.readthedocs.io/en/stable/operator-manual/rbac/'}, {'type': 'PACKAGE', 'url': 'https://github.com/argoproj/argo-cd'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1548'}]
|
{'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:37:10Z', 'nvd_published_at': '2023-02-08T21:15:00Z'}
|
1.4.0
|
GHSA-w479-w22g-cffh
|
2023-02-28T00:05:48Z
|
2023-02-17T00:30:28Z
| null |
['CVE-2023-0821']
|
Uncontrolled Resource Consumption in Hashicorp Nomad
|
HashiCorp Nomad and Nomad Enterprise 1.2.15 up to 1.3.8, and 1.4.3 jobs using a maliciously compressed artifact stanza source can cause excessive disk usage. Fixed in 1.2.16, 1.3.9, and 1.4.4.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.15'}, {'fixed': '1.2.16'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.9'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0821'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2023-05-nomad-client-vulnerable-to-decompression-bombs-in-artifact-block/50292'}]
|
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-17T14:00:26Z', 'nvd_published_at': '2023-02-16T22:15:00Z'}
|
1.4.0
|
GHSA-626q-v9j4-mcp4
|
2023-02-13T16:56:47Z
|
2023-02-02T16:59:46Z
| null |
['CVE-2023-23940']
|
OpenZeppelin Contracts contains Improper Verification of Cryptographic Signature
|
### Cause
`is_valid_eth_signature` is missing a call to `finalize_keccak` after calling `verify_eth_signature`.
### Impact
As a result, any contract using `is_valid_eth_signature` from the account library (such as the `EthAccount` preset) is vulnerable to a malicious sequencer. Specifically, the malicious sequencer would be able to bypass signature validation to impersonate an instance of these accounts.
### Risk
In order to exploit this vulnerability, it is required to control a sequencer or prover since they're the ones executing the hints, being able to inject incorrect keccak results.
Today StarkWare is the only party running both a prover or a sequencer, greatly reducing the risk of exploit.
### Patches
The issue has been patched in 0.6.1.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the Contracts for Cairo repository](https://github.com/OpenZeppelin/cairo-contracts/issues/new/choose)
* Email us at [security@openzeppelin.com](mailto:security@openzeppelin.com)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'openzeppelin-cairo-contracts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0'}, {'fixed': '0.6.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/cairo-contracts/security/advisories/GHSA-626q-v9j4-mcp4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23940'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/cairo-contracts/pull/542/commits/6d4cb750478fca2fd916f73297632f899aca9299'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenZeppelin/cairo-contracts'}]
|
{'cwe_ids': ['CWE-345', 'CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-02T16:59:46Z', 'nvd_published_at': '2023-02-03T20:15:00Z'}
|
1.4.0
|
GHSA-26f8-x7cc-wqpc
|
2023-07-21T18:01:38Z
|
2023-02-07T21:30:23Z
| null |
['CVE-2023-25194']
|
Apache Kafka Connect vulnerable to Deserialization of Untrusted Data
|
A possible security vulnerability has been identified in Apache Kafka Connect API. This requires access to a Kafka Connect worker, and the ability to create/modify connectors on it with an arbitrary Kafka client SASL JAAS config and a SASL-based security protocol, which has been possible on Kafka Connect clusters since Apache Kafka Connect 2.3.0. When configuring the connector via the Kafka Connect REST API, an authenticated operator can set the `sasl.jaas.config` property for any of the connector's Kafka clients to "com.sun.security.auth.module.JndiLoginModule", which can be done via the `producer.override.sasl.jaas.config`, `consumer.override.sasl.jaas.config`, or `admin.override.sasl.jaas.config` properties. This will allow the server to connect to the attacker's LDAP server and deserialize the LDAP response, which the attacker can use to execute java deserialization gadget chains on the Kafka connect server. Attacker can cause unrestricted deserialization of untrusted data (or) RCE vulnerability when there are gadgets in the classpath. Since Apache Kafka 3.0.0, users are allowed to specify these properties in connector configurations for Kafka Connect clusters running with out-of-the-box configurations. Before Apache Kafka 3.0.0, users may not specify these properties unless the Kafka Connect cluster has been reconfigured with a connector client override policy that permits them. Since Apache Kafka 3.4.0, we have added a system property ("-Dorg.apache.kafka.disallowed.login.modules") to disable the problematic login modules usage in SASL JAAS configuration. Also by default "com.sun.security.auth.module.JndiLoginModule" is disabled in Apache Kafka Connect 3.4.0. We advise the Kafka Connect users to validate connector configurations and only allow trusted JNDI configurations. Also examine connector dependencies for vulnerable versions and either upgrade their connectors, upgrading that specific dependency, or removing the connectors as options for remediation. Finally, in addition to leveraging the "org.apache.kafka.disallowed.login.modules" system property, Kafka Connect users can also implement their own connector client config override policy, which can be used to control which Kafka client properties can be overridden directly in a connector config and which cannot.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.kafka:connect'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '3.4.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25194'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1529790'}, {'type': 'WEB', 'url': 'https://kafka.apache.org/cve-list'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/vy1c7fqcdqvq5grcqp6q5jyyb302khyz'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/173151/Apache-Druid-JNDI-Injection-Remote-Code-Execution.html'}]
|
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:18:02Z', 'nvd_published_at': '2023-02-07T20:15:00Z'}
|
1.4.0
|
GHSA-8x6c-cv3v-vp6g
|
2023-02-14T02:40:00Z
|
2023-02-11T00:13:31Z
|
2023-02-14T02:40:00Z
|
[]
|
Withdrawn: cacheable-request depends on http-cache-semantics, which is vulnerable to Regular Expression Denial of Service
|
## This advisory is withdawn.
cacheable-request depends on http-cache-semanttics, which contains an Inefficient Regular Expression Complexity in versions prior to 4.1.1 of that package. cacheable-request has been updated to rely on the fixed version in 10.2.7.
### Summary of http-cache-semantics vulnerability
http-cache semantics contains an Inefficient Regular Expression Complexity , leading to Denial of Service. This affects versions of the package http-cache-semantics before 4.1.1. The issue can be exploited via malicious request header values sent to a server, when that server reads the cache policy from the request using this library.
### Details
https://github.com/advisories/GHSA-rc47-6667-2j5j
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'cacheable-request'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.2.7'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/jaredwray/cacheable-request/security/advisories/GHSA-8x6c-cv3v-vp6g'}, {'type': 'WEB', 'url': 'https://github.com/jaredwray/cacheable-request/commit/8a47777e4eb61960469873cf4b3a2823742fc15e'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rc47-6667-2j5j'}, {'type': 'PACKAGE', 'url': 'https://github.com/jaredwray/cacheable-request'}]
|
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-11T00:13:31Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-8c25-f3mj-v6h8
|
2023-02-22T23:15:10Z
|
2023-02-16T15:30:28Z
| null |
['CVE-2023-22580']
|
Sequelize information disclosure vulnerability
|
Due to improper input filtering in the sequelize js library, can malicious queries lead to sensitive information disclosure.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'sequelize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.28.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@sequelize/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.0-alpha.20'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22580'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/pull/15375'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/pull/15699'}, {'type': 'WEB', 'url': 'https://csirt.divd.nl/CVE-2023-22580'}, {'type': 'WEB', 'url': 'https://csirt.divd.nl/DIVD-2022-00020/'}, {'type': 'PACKAGE', 'url': 'https://github.com/sequelize/sequelize'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/releases/tag/v6.28.1'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/releases/tag/v7.0.0-alpha.20'}]
|
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T23:15:10Z', 'nvd_published_at': '2023-02-16T15:15:00Z'}
|
1.4.0
|
GHSA-qx34-47fc-vv79
|
2023-02-16T21:53:07Z
|
2023-02-08T06:30:33Z
| null |
['CVE-2023-0739']
|
Answer vulnerable to Race Condition
|
Race Condition in Switch in GitHub repository answerdev/answer prior to 1.0.4.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0739'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/1ee34b884b905d14d4db457563176b77a974b992'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/93d7fac9-50be-4624-9096-45b89fbfd4ae'}]
|
{'cwe_ids': ['CWE-362', 'CWE-365'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:33:00Z', 'nvd_published_at': '2023-02-08T05:15:00Z'}
|
1.4.0
|
GHSA-rwhw-6c6r-2823
|
2023-02-10T00:19:14Z
|
2023-02-03T18:30:26Z
| null |
['CVE-2021-37304']
|
Insecure Permissions issue in jeecg-boot
|
An Insecure Permissions issue in jeecg-boot 2.4.5 allows unauthenticated remote attackers to gain escalated privilege and view sensitive information via the httptrace interface.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-base'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4.5'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37304'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/issues/2793'}, {'type': 'PACKAGE', 'url': 'https://github.com/jeecgboot/jeecg-boot'}]
|
{'cwe_ids': ['CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-04T00:30:25Z', 'nvd_published_at': '2023-02-03T18:15:00Z'}
|
1.4.0
|
GHSA-9w8x-5hv5-r6gw
|
2023-04-04T21:45:28Z
|
2023-02-15T06:30:26Z
| null |
['CVE-2022-25978']
|
Cross Site Scripting in usememos/memos
|
All versions of the package github.com/usememos/memos/server prior to 0.11.0 are vulnerable to Cross-site Scripting (XSS) due to insufficient checks on external resources, which allows malicious actors to introduce links starting with a javascript: scheme.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.10.3'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25978'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/issues/1026'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/b11d2130a084385eb65c3761a3c841ebe9f81ae8'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1566'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUSEMEMOSMEMOSSERVER-3319070'}, {'type': 'PACKAGE', 'url': 'github.com/usememos/memos'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T18:16:31Z', 'nvd_published_at': '2023-02-15T05:15:00Z'}
|
1.4.0
|
GHSA-pgvh-p3g4-86jw
|
2023-04-27T19:55:01Z
|
2023-02-02T01:32:42Z
| null |
['CVE-2023-25313']
|
AVideo contains Command injection when embedding a video link
|
Impact:
An attacker could execute remote code on a system running wwbn/avideo
Step to Reproduce:
1. Go to the `My Videos` tab
https://demo.avideo.com/mvideos
2. Click "Embed a video link"
Append a command to the url as a query string. eg. `?whoami`
then click Save
This issue has been resolved in commit `236228f15`
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'wwbn/avideo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.4'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/WWBN/AVideo/security/advisories/GHSA-pgvh-p3g4-86jw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30842'}, {'type': 'WEB', 'url': 'https://github.com/WWBN/AVideo/commit/236228f15a9a31be5a0e60f05dac043682e49a5e'}, {'type': 'PACKAGE', 'url': 'https://github.com/WWBN/AVideo'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-02T01:32:42Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-prjg-28jg-m3p5
|
2023-03-03T23:25:32Z
|
2023-02-24T03:30:14Z
| null |
['CVE-2023-0994']
|
RosarioSIS Improper Access Control vulnerability
|
Improper Access Control in GitHub repository francoisjacquet/rosariosis prior to 10.8.2.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'francoisjacquet/rosariosis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.8.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0994'}, {'type': 'WEB', 'url': 'https://github.com/francoisjacquet/rosariosis/commit/630d3e3d78270db8dbcbfe87db265bc3e70c5a76'}, {'type': 'PACKAGE', 'url': 'https://github.com/francoisjacquet/rosariosis'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a281c586-9b97-4d17-88ff-ca91bb4c45ad'}]
|
{'cwe_ids': ['CWE-200', 'CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-24T16:23:00Z', 'nvd_published_at': '2023-02-24T02:15:00Z'}
|
1.4.0
|
GHSA-vqfx-gj96-3w95
|
2023-02-23T16:58:56Z
|
2023-02-23T16:58:56Z
| null |
['CVE-2023-22579']
|
Unsafe fall-through in getWhereConditions
|
### Impact
Providing an invalid value to the `where` option of a query caused Sequelize to ignore that option instead of throwing an error.
A finder call like the following did not throw an error:
```ts
User.findAll({
where: new Date(),
});
```
As this option is typically used with plain javascript objects, be aware that this only happens at the top level of this option.
### Patches
This issue has been patched in [`sequelize@6.28.1`](https://github.com/sequelize/sequelize/pull/15699) & [`@sequelize/core@7.0.0.alpha-20`](https://github.com/sequelize/sequelize/pull/15375)
### References
A discussion thread about this issue is open at https://github.com/sequelize/sequelize/discussions/15698
CVE: CVE-2023-22579
Snyk: https://security.snyk.io/vuln/SNYK-JS-SEQUELIZE-3324090
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'sequelize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.28.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@sequelize/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.0-alpha.20'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/security/advisories/GHSA-vqfx-gj96-3w95'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22579'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/pull/15375'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/pull/15699'}, {'type': 'WEB', 'url': 'https://csirt.divd.nl/CVE-2023-22579'}, {'type': 'WEB', 'url': 'https://csirt.divd.nl/DIVD-2022-00020/'}, {'type': 'PACKAGE', 'url': 'https://github.com/sequelize/sequelize'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/discussions/15698'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/releases/tag/v6.28.1'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/releases/tag/v7.0.0-alpha.20'}]
|
{'cwe_ids': ['CWE-843'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-23T16:58:56Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-jwr6-75xh-jh5j
|
2023-02-23T22:14:18Z
|
2023-02-15T21:30:30Z
| null |
['CVE-2023-23850']
|
Synopsys Jenkins Coverity Plugin has Incorrect Default Permissions
|
Synopsys Coverity Plugin 3.0.2 and earlier does not perform permission checks in several HTTP endpoints.
This allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack to capture the credentials using another vulnerability.
An enumeration of credentials IDs in Synopsys Coverity Plugin 3.0.3 requires the appropriate permissions.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:synopsys-coverity'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23850'}, {'type': 'WEB', 'url': 'https://community.synopsys.com/s/article/SIG-Product-Security-Advisory-Multiple-CVEs-affecting-Coverity-Jenkins-Plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-2793%20(1)'}]
|
{'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-23T22:14:18Z', 'nvd_published_at': '2023-02-15T19:15:00Z'}
|
1.4.0
|
GHSA-wjrj-jc3w-ppfw
|
2023-02-24T16:01:53Z
|
2023-02-12T15:30:25Z
| null |
['CVE-2023-0792']
|
Code Injection in thorsten/phpmyfaq
|
Code Injection in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.11'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0792'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/d8964568d69488de02f0a0a58acc822eeb5c3cb1'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpMyFAQ'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/9e21156b-ab1d-4c60-88ef-8c9f3e2feb7f'}]
|
{'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T01:03:49Z', 'nvd_published_at': '2023-02-12T14:15:00Z'}
|
1.4.0
|
GHSA-3vrc-rrpw-r5pw
|
2023-03-01T20:46:06Z
|
2023-02-19T18:30:21Z
| null |
['CVE-2014-125087']
|
java-xmlbuilder vulnerable to XML External Entity Reference
|
A vulnerability was found in java-xmlbuilder up to 1.1. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to xml external entity reference. Upgrading to version 1.2 is able to address this issue. The name of the patch is e6fddca201790abab4f2c274341c0bb8835c3e73. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-221480.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.jamesmurty.utils:java-xmlbuilder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-125087'}, {'type': 'WEB', 'url': 'https://github.com/jmurty/java-xmlbuilder/issues/6'}, {'type': 'WEB', 'url': 'https://github.com/jmurty/java-xmlbuilder/commit/e6fddca201790abab4f2c274341c0bb8835c3e73'}, {'type': 'PACKAGE', 'url': 'https://github.com/jmurty/java-xmlbuilder'}, {'type': 'WEB', 'url': 'https://github.com/jmurty/java-xmlbuilder/releases/tag/v1.2'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.221480'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.221480'}]
|
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-01T20:46:06Z', 'nvd_published_at': '2023-02-19T17:15:00Z'}
|
1.4.0
|
GHSA-22j4-qc48-j8f8
|
2023-02-08T22:42:21Z
|
2023-02-01T15:30:20Z
| null |
['CVE-2023-24997']
|
Apache InLong vulnerable to Deserialization of Untrusted Data vulnerability
|
Deserialization of Untrusted Data vulnerability in Apache Software Foundation Apache InLong. This issue affects Apache InLong: from 1.1.0 through 1.5.0. Users are advised to upgrade to Apache InLong's latest version or cherry-pick https://github.com/apache/inlong/pull/7223 to solve it.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.inlong:inlong'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'last_affected': '1.5.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24997'}, {'type': 'WEB', 'url': 'https://github.com/apache/inlong/pull/7223'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/inlong'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/nxvtxq7oxhwyzo9ty2hqz8rvh5r7ngd8'}]
|
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-02T17:00:10Z', 'nvd_published_at': '2023-02-01T15:15:00Z'}
|
1.4.0
|
GHSA-3w96-p6vh-c298
|
2023-02-14T21:25:17Z
|
2023-02-14T15:30:27Z
| null |
['CVE-2023-0827']
|
Cross-site Scripting in pimcore
|
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 1.5.17.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.17'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0827'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/f4050586136cb4c44e3d6042111a1b87b340df95'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/75bc7d07-46a7-4ed9-a405-af4fc47fb422'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T21:25:17Z', 'nvd_published_at': '2023-02-14T13:15:00Z'}
|
1.4.0
|
GHSA-hjmr-xm25-36mh
|
2023-02-16T21:52:55Z
|
2023-02-08T09:30:24Z
| null |
['CVE-2023-0743']
|
Answer subject to Cross-site Scripting vulnerability
|
Cross-site Scripting (XSS) - Generic in GitHub repository answerdev/answer prior to 1.0.4.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0743'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/860b1a3bd8cfaa8827e6e6f50ab1d98fa4c2c816'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/366cf8bb-19f6-4388-b089-d0a260efd863'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:39:02Z', 'nvd_published_at': '2023-02-08T08:15:00Z'}
|
1.4.0
|
GHSA-pc2q-jcxq-rjrr
|
2023-02-08T22:40:18Z
|
2023-02-08T18:18:05Z
| null |
['CVE-2023-25164']
|
Sensitive Information leak via Script File in TinaCMS
|
### Impact
Sensitive Information leaked via script File in TinaCMS. Sites building with @tinacms/cli >= 1.0.0 && < 1.0.9 that store sensitive values in process.env var are impacted. If you're on a version prior to 1.0.0 this vulnerability does not affect you.
If your Tina-enabled website has sensitive credentials stored as environment variables (eg. Algolia API keys) you should rotate those keys immediately.
### Patches
This issue has been patched in @tinacms/cli@1.0.9
### Workarounds
Upgrading, and rotating secure & exposed keys is required for the proper fix.
### References
https://github.com/tinacms/tinacms/pull/3584
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@tinacms/cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.9'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/tinacms/tinacms/security/advisories/GHSA-pc2q-jcxq-rjrr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25164'}, {'type': 'WEB', 'url': 'https://github.com/tinacms/tinacms/pull/3584'}, {'type': 'PACKAGE', 'url': 'https://github.com/tinacms/tinacms'}]
|
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T18:18:05Z', 'nvd_published_at': '2023-02-08T20:15:00Z'}
|
1.4.0
|
GHSA-r58m-v5pr-jhhq
|
2023-02-23T22:05:42Z
|
2023-02-16T00:30:28Z
| null |
['CVE-2020-19825']
|
Cross-site Scripting in kimai/kimai
|
Cross Site Scripting (XSS) vulnerability in kevinpapst kimai2 in /src/Twig/Runtime/MarkdownExtension.php, allows attackers to gain escalated privileges.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'kimai/kimai'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-19825'}, {'type': 'WEB', 'url': 'https://github.com/kevinpapst/kimai2/pull/962/files'}, {'type': 'WEB', 'url': 'https://github.com/kimai/kimai/pull/962'}, {'type': 'WEB', 'url': 'https://github.com/kevinpapst/kimai2'}, {'type': 'WEB', 'url': 'https://github.com/kimai/kimai/releases/tag/1.1'}, {'type': 'PACKAGE', 'url': 'https://github.com/kimai/kimai1'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-16T14:10:11Z', 'nvd_published_at': '2023-02-15T22:15:00Z'}
|
1.4.0
|
GHSA-c57v-hc7m-8px2
|
2023-03-03T23:26:50Z
|
2023-02-23T21:30:16Z
| null |
['CVE-2023-0044']
|
Cross-site Scripting in Quarkus
|
If the Quarkus Form Authentication session cookie Path attribute is set to `/` then a cross-site attack may be initiated which might lead to the Information Disclosure. This attack can be prevented with the Quarkus CSRF Prevention feature.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'io.quarkus:quarkus-vertx-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.13.7.Final'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0044'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2023-0044'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2158081'}, {'type': 'PACKAGE', 'url': 'https://github.com/quarkusio/quarkus'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-23T22:15:09Z', 'nvd_published_at': '2023-02-23T20:15:00Z'}
|
1.4.0
|
GHSA-p2gm-ffr3-w2xw
|
2023-02-08T18:17:06Z
|
2023-02-08T18:17:06Z
| null |
[]
|
Nervos CKB vulnerable to low-resource flood DDoS attacks through network message
|
### Workarounds
* forbid request genesis through network request
* forbid requesting duplicate data through network request
|
[]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'ckb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.101.4'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/nervosnetwork/ckb/security/advisories/GHSA-p2gm-ffr3-w2xw'}, {'type': 'PACKAGE', 'url': 'https://github.com/nervosnetwork/ckb'}]
|
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T18:17:06Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-fjj4-2q73-jvgc
|
2023-02-08T18:15:28Z
|
2023-02-08T18:15:28Z
| null |
[]
|
Nervos CKB calculation of program load cycles may be missed when executing in resume mode
|
### Impact
The calculation of program load cycles may be missed when executing in resume mode. Since the script execution order is now determined, this issue does not cause network splitting.
|
[]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'ckb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.100.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/nervosnetwork/ckb/security/advisories/GHSA-fjj4-2q73-jvgc'}, {'type': 'PACKAGE', 'url': 'https://github.com/nervosnetwork/ckb'}]
|
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T18:15:28Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-2275-rpf5-xv8h
|
2023-02-08T22:40:04Z
|
2023-02-01T06:30:30Z
| null |
['CVE-2022-25906']
|
is-http2 vulnerable to Improper Input Validation
|
All versions of the package is-http2 are vulnerable to Command Injection due to missing input sanitization or other checks, and sandboxes being employed to the isH2 function.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'is-http2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25906'}, {'type': 'PACKAGE', 'url': 'https://github.com/stefanjudis/is-http2'}, {'type': 'WEB', 'url': 'https://github.com/stefanjudis/is-http2/blob/master/index.js#L23'}, {'type': 'WEB', 'url': 'https://github.com/stefanjudis/is-http2/blob/master/index.js%23L23'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-ISHTTP2-3153878'}]
|
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-02T17:13:07Z', 'nvd_published_at': '2023-02-01T05:15:00Z'}
|
1.4.0
|
GHSA-r6cw-356h-mvwg
|
2023-02-23T22:08:30Z
|
2023-02-12T15:30:25Z
| null |
['CVE-2023-0788']
|
Code Injection in thorsten/phpmyfaq
|
Code Injection in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.11'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0788'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/77b42b9d0be3990ee7389207a71528b304b03039'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpMyFAQ'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/808d5452-607c-4af1-812f-26c49faf3e61'}]
|
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T01:03:33Z', 'nvd_published_at': '2023-02-12T14:15:00Z'}
|
1.4.0
|
GHSA-rj7m-2p3g-fjxg
|
2023-02-13T20:51:27Z
|
2023-02-06T06:30:25Z
| null |
['CVE-2022-25855']
|
create-choo-app3 is vulnerable to Command Injection via the devInstall function
|
All versions of the package create-choo-app3 are vulnerable to Command Injection via the devInstall function due to improper user-input sanitization.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'create-choo-app3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.12.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25855'}, {'type': 'PACKAGE', 'url': 'https://github.com/choojs/create-choo-app'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-CREATECHOOAPP3-3157951'}]
|
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-07T20:06:02Z', 'nvd_published_at': '2023-02-06T05:15:00Z'}
|
1.4.0
|
GHSA-x4qr-2fvf-3mr5
|
2023-03-01T01:47:38Z
|
2023-02-08T22:17:06Z
| null |
['CVE-2023-0286']
|
Vulnerable OpenSSL included in cryptography wheels
|
pyca/cryptography's wheels include a statically linked copy of OpenSSL. The versions of OpenSSL included in cryptography 0.8.1-39.0.0 are vulnerable to a security issue. More details about the vulnerabilities themselves can be found in https://www.openssl.org/news/secadv/20221213.txt and https://www.openssl.org/news/secadv/20230207.txt.
If you are building cryptography source ("sdist") then you are responsible for upgrading your copy of OpenSSL. Only users installing from wheels built by the cryptography project (i.e., those distributed on PyPI) need to update their cryptography versions.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'cryptography'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8.1'}, {'fixed': '39.0.1'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '111.25.0'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '300.0.0'}, {'fixed': '300.0.12'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/security/advisories/GHSA-x4qr-2fvf-3mr5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0286'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2023-0286'}, {'type': 'WEB', 'url': 'https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.6.2-relnotes.txt'}, {'type': 'WEB', 'url': 'https://ftp.openbsd.org/pub/OpenBSD/patches/7.2/common/018_x509.patch.sig'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c6c9d439b484e1ba9830d8454a34fa4f80fdfe9'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2f7530077e0ef79d98718138716bc51ca0cad658'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fd2af07dc083a350c959147097003a14a5e8ac4d'}, {'type': 'PACKAGE', 'url': 'https://github.com/pyca/cryptography'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0006.html'}, {'type': 'WEB', 'url': 'https://www.openssl.org/news/secadv/20230207.txt'}]
|
{'cwe_ids': ['CWE-843'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:17:06Z', 'nvd_published_at': '2023-02-08T20:15:00Z'}
|
1.4.0
|
GHSA-p8r3-83r8-jwj5
|
2023-02-08T22:40:37Z
|
2023-02-08T18:19:56Z
| null |
['CVE-2023-25152']
|
Pterodactyl Wings contains UNIX Symbolic Link (Symlink) Following
|
### Impact
This vulnerability impacts anyone running the affected versions of Wings. The vulnerability can be used to create new files and on the host system that previously did not exist, potentially allowing attackers to change their resource allocations, promote their containers to privileged mode, or potentially add ssh authorized keys to allow the attacker access to a remote shell on the target machine.
In order to use this exploit, an attacker must have an existing "server" allocated and controlled by Wings. Information on how the exploitation of this vulnerability works will be released on February 24th, 2023 in North America.
### Patches
This vulnerability has been resolved in version `v1.11.3` of Wings, and has been back-ported to the 1.7 release series in `v1.7.3`.
Anyone running `v1.11.x` should upgrade to `v1.11.3` and anyone running `v1.7.x` should upgrade to `v1.7.3`.
### Workarounds
None at this time.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/pterodactyl/wings'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/pterodactyl/wings'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pterodactyl/wings/security/advisories/GHSA-p8r3-83r8-jwj5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25152'}, {'type': 'WEB', 'url': 'https://github.com/pterodactyl/wings/commit/dac9685298c3c1c49b3109fa4241aa88272b9f14'}, {'type': 'PACKAGE', 'url': 'https://github.com/pterodactyl/wings'}, {'type': 'WEB', 'url': 'https://github.com/pterodactyl/wings/releases/tag/v1.11.3'}, {'type': 'WEB', 'url': 'https://github.com/pterodactyl/wings/releases/tag/v1.7.3'}]
|
{'cwe_ids': ['CWE-59', 'CWE-61'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T18:19:56Z', 'nvd_published_at': '2023-02-08T19:15:00Z'}
|
1.4.0
|
GHSA-5r9g-qh6m-jxff
|
2023-02-16T20:46:30Z
|
2023-02-16T20:46:30Z
| null |
['CVE-2023-23936']
|
CRLF Injection in Nodejs ‘undici’ via host
|
### Impact
undici library does not protect `host` HTTP header from CRLF injection vulnerabilities.
### Patches
This issue was patched in Undici v5.19.1.
### Workarounds
Sanitize the `headers.host` string before passing to undici.
### References
Reported at https://hackerone.com/reports/1820955.
### Credits
Thank you to Zhipeng Zhang ([@timon8](https://hackerone.com/timon8)) for reporting this vulnerability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'undici'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '5.19.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/nodejs/undici/security/advisories/GHSA-5r9g-qh6m-jxff'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23936'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/undici/commit/a2eff05401358f6595138df963837c24348f2034'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1820955'}, {'type': 'PACKAGE', 'url': 'https://github.com/nodejs/undici'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/undici/releases/tag/v5.19.1'}]
|
{'cwe_ids': ['CWE-74', 'CWE-93'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-16T20:46:30Z', 'nvd_published_at': '2023-02-16T18:15:00Z'}
|
1.4.0
|
GHSA-5h8c-8ccp-8gmh
|
2023-02-08T21:48:39Z
|
2023-02-01T06:30:30Z
| null |
['CVE-2022-25916']
|
mt7688-wiscan is vulnerable to Command Injection due to improper input sanitization
|
Versions of the package mt7688-wiscan before 0.8.3 are vulnerable to Command Injection due to improper input sanitization in the 'wiscan.scan' function.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'mt7688-wiscan'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25916'}, {'type': 'WEB', 'url': 'https://github.com/simenkid/mt7688-wiscan/commit/ff6d6567c65b4e972916a8fbc4533212f20a2fa5'}, {'type': 'PACKAGE', 'url': 'https://github.com/simenkid/mt7688-wiscan'}, {'type': 'WEB', 'url': 'https://github.com/simenkid/mt7688-wiscan/blob/master/index.js%23L22'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-MT7688WISCAN-3177394'}]
|
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T21:48:39Z', 'nvd_published_at': '2023-02-01T05:15:00Z'}
|
1.4.0
|
GHSA-6wxg-wh7f-rqpr
|
2023-04-14T21:35:17Z
|
2023-02-16T20:46:49Z
| null |
['CVE-2023-23926']
|
XML External Entity (XXE) vulnerability in apoc.import.graphml
|
### Impact
A XML External Entity (XXE) vulnerability found in the apoc.import.graphml procedure of APOC core plugin in Neo4j graph database. XML External Entity (XXE) injection occurs when the XML parser allows external entities to be resolved. The XML parser used by the apoc.import.graphml procedure was not configured in a secure way and therefore allowed this.
External entities can be used to read local files, send HTTP requests, and perform denial-of-service attacks on the application.
Abusing the XXE vulnerability enabled assessors to read local files remotely. Although with the level of privileges assessors had this was limited to one-line files. With the ability to write to the database, any file could have been read. Additionally, assessors noted, with local testing, the server could be crashed by passing in improperly formatted XML.
### Patches
The users should aim to use the latest released version compatible with their Neo4j version. The minimum versions containing patch for this vulnerability is 5.5.0.
### Workarounds
If you cannot upgrade the library, you can control the [allowlist](https://neo4j.com/docs/operations-manual/current/reference/configuration-settings/#config_dbms.security.procedures.allowlist) of the procedures that can be used in your system.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [neo4j-apoc](https://github.com/neo4j/apoc)
* Email us at [security@neo4j.com](mailto:security@neo4j.com)
### Credits
We want to publicly recognise the contribution of Christopher Schneider – State Farm.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.neo4j.procedure:apoc-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.5.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.neo4j.procedure:apoc-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.0.14'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/neo4j/apoc/security/advisories/GHSA-6wxg-wh7f-rqpr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23926'}, {'type': 'WEB', 'url': 'https://github.com/neo4j/apoc/pull/310'}, {'type': 'WEB', 'url': 'https://github.com/neo4j/apoc/commit/f175f1f1f663d29fc151c297b56d154255eb7016'}, {'type': 'PACKAGE', 'url': 'https://github.com/neo4j/apoc'}, {'type': 'WEB', 'url': 'https://github.com/neo4j/apoc/releases/tag/5.5.0'}, {'type': 'WEB', 'url': 'https://neo4j.com/docs/operations-manual/current/reference/configuration-settings/#config_dbms.security.procedures.allowlist'}]
|
{'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-16T20:46:49Z', 'nvd_published_at': '2023-02-16T16:15:00Z'}
|
1.4.0
|
GHSA-2q79-56rq-8v3c
|
2023-03-03T22:55:46Z
|
2023-02-21T18:30:17Z
| null |
['CVE-2017-20178']
|
Codiad information disclosure vulnerability
|
A vulnerability was found in Codiad 2.8.0. It has been rated as problematic. Affected by this issue is the function saveJSON of the file components/install/process.php. The manipulation of the argument data leads to information disclosure. The attack may be launched remotely. Upgrading to version 2.8.1 is able to address this issue. The name of the patch is 517119de673e62547ee472a730be0604f44342b5. It is recommended to upgrade the affected component. VDB-221498 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'codiad/codiad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-20178'}, {'type': 'WEB', 'url': 'https://github.com/Codiad/Codiad/pull/974'}, {'type': 'WEB', 'url': 'https://github.com/Codiad/Codiad/commit/517119de673e62547ee472a730be0604f44342b5'}, {'type': 'PACKAGE', 'url': 'https://github.com/Codiad/Codiad'}, {'type': 'WEB', 'url': 'https://github.com/Codiad/Codiad/releases/tag/v.2.8.1'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.221498'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.221498'}]
|
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T22:55:46Z', 'nvd_published_at': '2023-02-21T18:15:00Z'}
|
1.4.0
|
GHSA-3gv2-29qc-v67m
|
2023-02-15T17:39:12Z
|
2023-02-01T18:48:06Z
| null |
['CVE-2022-24895']
|
Symfony vulnerable to Session Fixation of CSRF tokens
|
Description
-----------
When authenticating users Symfony by default regenerates the session ID upon login, but preserves the rest of session attributes. Because this does not clear CSRF tokens upon login, this might enables [same-site attackers](https://canitakeyoursubdomain.name/) to bypass the CSRF protection mechanism by performing an attack similar to a session-fixation.
Resolution
----------
Symfony removes all CSRF tokens from the session on successful login.
The patch for this issue is available [here](https://github.com/symfony/symfony/commit/5909d74ecee359ea4982fcf4331aaf2e489a1fd4) for branch 4.4.
Credits
-------
We would like to thank Marco Squarcina for reporting the issue and Nicolas Grekas for fixing it.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '4.4.50'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.4.20'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.20'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.0'}, {'fixed': '6.1.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.2.0'}, {'fixed': '6.2.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '4.4.50'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.4.20'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.20'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.0'}, {'fixed': '6.1.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.2.0'}, {'fixed': '6.2.6'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/symfony/symfony/security/advisories/GHSA-3gv2-29qc-v67m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24895'}, {'type': 'WEB', 'url': 'https://github.com/symfony/security-bundle/commit/076fd2088ada33d760758d98ff07ddedbf567946'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/commit/5909d74ecee359ea4982fcf4331aaf2e489a1fd4'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/security-bundle/CVE-2022-24895.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2022-24895.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/symfony/symfony'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/07/msg00014.html'}, {'type': 'WEB', 'url': 'https://symfony.com/cve-2022-24895'}]
|
{'cwe_ids': ['CWE-384', 'CWE-613'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-01T18:48:06Z', 'nvd_published_at': '2023-02-03T22:15:00Z'}
|
1.4.0
|
GHSA-wxfj-84xf-7gxv
|
2023-03-08T23:14:00Z
|
2023-02-28T06:30:25Z
| null |
['CVE-2023-26105']
|
mde utilities contains Prototype Pollution
|
All versions of the package utilities are vulnerable to Prototype Pollution via the _mix function.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'utilities'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.6'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26105'}, {'type': 'WEB', 'url': 'https://github.com/mde/utilities/issues/29'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-UTILITIES-3184491'}]
|
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-06T21:55:12Z', 'nvd_published_at': '2023-02-28T05:15:00Z'}
|
1.4.0
|
GHSA-79jr-8fhm-8wv3
|
2023-03-03T23:19:18Z
|
2023-02-22T21:30:39Z
| null |
['CVE-2023-0846']
|
OpenNMS Horizon and Meridian vulnerable to Cross-site Scripting
|
Unauthenticated, stored cross-site scripting in the display of alarm reduction keys in multiple versions of OpenNMS Horizon and Meridian could allow an attacker access to confidential session information.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.opennms:opennms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '31.0.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0846'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/pull/5506/files'}, {'type': 'WEB', 'url': 'https://docs.opennms.com/meridian/2022/releasenotes/changelog.html#releasenotes-changelog-Meridian-2022.1.13'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenNMS/opennms'}, {'type': 'WEB', 'url': 'https://issues.opennms.org/browse/NMS-14877'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T22:59:29Z', 'nvd_published_at': '2023-02-22T19:15:00Z'}
|
1.4.0
|
GHSA-vxrh-cpg7-8vjr
|
2023-02-21T19:59:13Z
|
2023-02-08T22:22:12Z
| null |
['CVE-2023-0217']
|
openssl-src subject to NULL dereference validating DSA public key
|
An invalid pointer dereference on read can be triggered when an application tries to check a malformed DSA public key by the `EVP_PKEY_public_check()` function. This will most likely lead to an application crash. This function can be called on public keys supplied from untrusted sources which could allow an attacker to cause a denial of service attack.
The TLS implementation in OpenSSL does not call this function but applications might call the function if there are additional security requirements imposed by standards such as FIPS 140-3.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '300.0.0'}, {'fixed': '300.0.12'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0217'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=23985bac83fd50c8e29431009302b5442f985096'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0012.html'}, {'type': 'WEB', 'url': 'https://www.openssl.org/news/secadv/20230207.txt'}]
|
{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:22:12Z', 'nvd_published_at': '2023-02-08T20:15:00Z'}
|
1.4.0
|
GHSA-jrwr-5x3p-hvc3
|
2023-03-06T19:44:07Z
|
2023-02-23T00:30:40Z
| null |
['CVE-2023-26302']
|
markdown-it-py Denial of Service vulnerability in the command line interface
|
Denial of service could be caused to the command line interface of markdown-it-py, before v2.2.0, if an attacker was allowed to use invalid UTF-8 characters as input.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'markdown-it-py'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26302'}, {'type': 'WEB', 'url': 'https://github.com/executablebooks/markdown-it-py/pull/247'}, {'type': 'WEB', 'url': 'https://github.com/executablebooks/markdown-it-py/commit/53ca3e9c2b9e9b295f6abf7f4ad2730a9b70f68c'}, {'type': 'PACKAGE', 'url': 'https://github.com/executablebooks/markdown-it-py'}, {'type': 'WEB', 'url': 'https://github.com/executablebooks/markdown-it-py/releases/tag/v2.2.0'}]
|
{'cwe_ids': ['CWE-173'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-23T19:40:54Z', 'nvd_published_at': '2023-02-22T23:15:00Z'}
|
1.4.0
|
GHSA-h685-83w4-3ph3
|
2023-02-22T00:10:03Z
|
2023-02-21T15:30:23Z
| null |
['CVE-2021-32860']
|
iziModal Cross-site Scripting vulnerability
|
iziModal is a modal plugin with jQuery. Versions prior to 1.6.1 are vulnerable to cross-site scripting (XSS) when handling untrusted modal titles. An attacker who is able to influence the field `title` when creating a `iziModal` instance is able to supply arbitrary `html` or `javascript` code that will be rendered in the context of a user, potentially leading to `XSS`. Version 1.6.1 contains a patch for this issue
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'izimodal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32860'}, {'type': 'WEB', 'url': 'https://github.com/marcelodolza/iziModal/issues/249'}, {'type': 'WEB', 'url': 'https://github.com/marcelodolza/iziModal/commit/01728ac52bac5c1b4512087dafe0ad8b091fdc9e'}, {'type': 'PACKAGE', 'url': 'https://github.com/marcelodolza/iziModal'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2021-1044_iziModal/'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T00:10:03Z', 'nvd_published_at': '2023-02-21T15:15:00Z'}
|
1.4.0
|
GHSA-h8p2-8g72-qpgh
|
2023-03-06T21:58:46Z
|
2023-02-24T12:31:20Z
| null |
['CVE-2023-25692']
|
Apache Airflow Google Provider Improper Input Validation vulnerability
|
Improper Input Validation vulnerability in the Apache Airflow Google Provider. This issue affects Apache Airflow Google Provider versions before 8.10.0.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow-providers-google'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.10.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25692'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/29499'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/ks4l78l5rwdpmvfn7y7yhs179nyxtlsh'}]
|
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-24T16:25:37Z', 'nvd_published_at': '2023-02-24T12:15:00Z'}
|
1.4.0
|
GHSA-fj78-2vc5-f6cm
|
2023-02-22T00:05:05Z
|
2023-02-22T00:05:05Z
| null |
['CVE-2023-25805']
|
Versionn Command Injection Vulnerability
|
### Impact
Command Injection Vulnerability. All versions <1.1.0 are affected.
### Patches
Please upgrade to versionn@1.1.0
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'versionn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/commenthol/versionn/security/advisories/GHSA-fj78-2vc5-f6cm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25805'}, {'type': 'WEB', 'url': 'https://github.com/commenthol/versionn/commit/2ca128823efe962b37f2698f0eb530c2b124842d'}, {'type': 'PACKAGE', 'url': 'https://github.com/commenthol/versionn'}]
|
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T00:05:05Z', 'nvd_published_at': '2023-02-20T16:15:00Z'}
|
1.4.0
|
GHSA-5r5m-65gx-7vrh
|
2023-06-13T23:47:42Z
|
2023-02-08T22:32:16Z
| null |
['CVE-2023-25151']
|
otelhttp and otelbeego have DoS vulnerability for high cardinality metrics
|
### Impact
The [v0.38.0](https://github.com/open-telemetry/opentelemetry-go-contrib/releases/tag/v1.13.0) release of [`go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp`](https://github.com/open-telemetry/opentelemetry-go-contrib/blob/463c2e7cd69d25f40b0a595b05394eeb26c68ae2/instrumentation/net/http/otelhttp/handler.go#L218) uses the [`httpconv.ServerRequest`](https://github.com/open-telemetry/opentelemetry-go/blob/v1.12.0/semconv/internal/v2/http.go#L159) function to annotate metric measurements for the `http.server.request_content_length`, `http.server.response_content_length`, and `http.server.duration` instruments.
The `ServerRequest` function sets the `http.target` attribute value to be the whole request URI (including the query string)[^1]. The metric instruments do not "forget" previous measurement attributes when `cumulative` temporality is used, this means the cardinality of the measurements allocated is directly correlated with the unique URIs handled. If the query string is constantly random, this will result in a constant increase in memory allocation that can be used in a denial-of-service attack.
Pseudo-attack:
```
for infinite loop {
r := generate_random_string()
do_http_request("/some/path?random="+r)
}
```
### Patches
- `go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp` - v0.39.0
- `go.opentelemetry.io/contrib/instrumentation/github.com/astaxie/beego/otelbeego` - v0.39.0
[^1]: https://github.com/open-telemetry/opentelemetry-go/blob/6cb5718eaaed5c408c3bf4ad1aecee5c20ccdaa9/semconv/internal/v2/http.go#L202-L208
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.38.0'}, {'fixed': '0.39.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'go.opentelemetry.io/contrib/instrumentation/github.com/astaxie/beego/otelbeego'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.38.0'}, {'fixed': '0.39.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/open-telemetry/opentelemetry-go-contrib/security/advisories/GHSA-5r5m-65gx-7vrh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25151'}, {'type': 'PACKAGE', 'url': 'https://github.com/open-telemetry/opentelemetry-go-contrib'}, {'type': 'WEB', 'url': 'https://github.com/open-telemetry/opentelemetry-go/blob/v1.12.0/semconv/internal/v2/http.go#L159'}]
|
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:32:16Z', 'nvd_published_at': '2023-02-08T20:15:00Z'}
|
1.4.0
|
GHSA-mrrw-grhq-86gf
|
2023-02-28T20:30:10Z
|
2023-02-28T20:30:10Z
| null |
[]
|
Ascii (crate) allows out-of-bounds array indexing in safe code
|
Affected version of this crate had implementation of `From<&mut AsciiStr>` for `&mut [u8]` and `&mut str`. This can result in out-of-bounds array indexing in safe code.
The flaw was corrected in commit [8a6c779](https://github.com/tomprogrammer/rust-ascii/pull/63/commits/8a6c7798c202766bd57d70fb8d12739dd68fb9dc) by removing those impls.
|
[]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'ascii'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.6.0'}, {'fixed': '0.9.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/tomprogrammer/rust-ascii/issues/64'}, {'type': 'WEB', 'url': 'https://github.com/tomprogrammer/rust-ascii/pull/63/commits/8a6c7798c202766bd57d70fb8d12739dd68fb9dc'}, {'type': 'PACKAGE', 'url': 'https://github.com/tomprogrammer/rust-ascii'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0015.html'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-28T20:30:10Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-h45f-rjvw-2rv2
|
2023-02-08T20:54:38Z
|
2023-02-01T12:32:41Z
|
2023-02-02T19:26:25Z
|
[]
|
Withdrawn: wallabag subject to Improper Authorization
|
## Duplicate advisory
This advisory has been withdrawn because it is a duplicate of [GHSA-qwx8-mxxx-mg96](https://github.com/advisories/GHSA-qwx8-mxxx-mg96). This link is maintained to preserve external references.
## Original Description
Improper Authorization in GitHub repository wallabag/wallabag prior to 2.5.3.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'wallabag/wallabag'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-alpha.1'}, {'fixed': '2.5.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0609'}, {'type': 'WEB', 'url': 'https://github.com/wallabag/wallabag/commit/0f7460dbab9e29f4f7d2944aca20210f828b6abb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3adef66f-fc86-4e6d-a540-2ffa59342ff0'}]
|
{'cwe_ids': ['CWE-285'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-02T19:26:25Z', 'nvd_published_at': '2023-02-01T12:15:00Z'}
|
1.4.0
|
GHSA-p2hp-3wv3-4w74
|
2023-03-08T17:22:31Z
|
2023-02-24T21:30:18Z
| null |
['CVE-2022-44310']
|
ecdh vulnerable to Exposure of Resource to Wrong Sphere
|
In Development IL ecdh before 0.2.0, an attacker can send an invalid point (not on the curve) as the public key, and obtain the derived shared secret.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'ecdh'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-44310'}, {'type': 'WEB', 'url': 'https://github.com/developmentil/ecdh/issues/3'}, {'type': 'WEB', 'url': 'https://github.com/developmentil/ecdh/pull/4'}, {'type': 'WEB', 'url': 'https://github.com/developmentil/ecdh/commit/ef4560e7233f4e8107a17a77bc540121599c78fa'}, {'type': 'PACKAGE', 'url': 'https://github.com/developmentil/ecdh'}]
|
{'cwe_ids': ['CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-08T17:22:31Z', 'nvd_published_at': '2023-02-24T20:15:00Z'}
|
1.4.0
|
GHSA-q3r2-23r8-wqr9
|
2023-03-08T17:21:27Z
|
2023-02-26T06:30:15Z
| null |
['CVE-2023-26091']
|
frp_form_answers allows Cross-site Scripting
|
The frp_form_answers (aka Forms Export) extension before 3.1.2, and 4.x before 4.0.2, for TYPO3 allows XSS via saved emails.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'frappant/frp-form-answers'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'frappant/frp-form-answers'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26091'}, {'type': 'WEB', 'url': 'https://github.com/frappant/frp_form_answers/commit/39fa16c8c792abdfc33e38bae17847364ff6a71d'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/frappant/frp-form-answers/CVE-2023-26091.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/frappant/frp_form_answers'}, {'type': 'WEB', 'url': 'https://typo3.org/help/security-advisories'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2023-002'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-08T17:21:27Z', 'nvd_published_at': '2023-02-26T05:15:00Z'}
|
1.4.0
|
GHSA-mv37-xrmc-hf64
|
2023-02-22T00:10:33Z
|
2023-02-21T15:30:23Z
| null |
['CVE-2021-32856']
|
Microweber Cross-site Scripting vulnerability
|
Microweber is a drag and drop website builder and content management system. Versions 1.2.12 and prior are vulnerable to copy-paste cross-site scripting (XSS). For this particular type of XSS, the victim needs to be fooled into copying a malicious payload into the text editor. A fix was attempted in versions 1.2.9 and 1.2.12, but it is incomplete.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.12'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32856'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/f3b86d59ab674dbf514f9f9948ddfa091739ab75'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2021-1005-Microweber/'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T00:10:33Z', 'nvd_published_at': '2023-02-21T15:15:00Z'}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.