schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
20
140
details
stringlengths
56
37.2k
severity
stringlengths
2
92
affected
stringlengths
88
7.07k
references
stringlengths
139
4.72k
database_specific
stringlengths
131
185
1.4.0
GHSA-wr8h-w969-36m8
2023-03-03T22:56:32Z
2023-02-21T18:30:17Z
null
['CVE-2015-10085']
GoPistolet vulnerable to Improper Resource Shutdown or Release
A vulnerability was found in GoPistolet. It has been declared as problematic. This vulnerability affects unknown code of the component MTA. The manipulation leads to denial of service. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The name of the patch is b91aa4674d460993765884e8463c70e6d886bc90. It is recommended to apply a patch to fix this issue. VDB-221506 is the identifier assigned to this vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/gopistolet/gopistolet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20210418093520-a5395f728f8d'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-10085'}, {'type': 'WEB', 'url': 'https://github.com/gopistolet/gopistolet/pull/27'}, {'type': 'WEB', 'url': 'https://github.com/gopistolet/gopistolet/commit/b91aa4674d460993765884e8463c70e6d886bc90'}, {'type': 'PACKAGE', 'url': 'https://github.com/gopistolet/gopistolet'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.221506'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.221506'}]
{'cwe_ids': ['CWE-404'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T22:56:32Z', 'nvd_published_at': '2023-02-21T18:15:00Z'}
1.4.0
GHSA-x36g-4629-xp9v
2023-03-07T23:53:49Z
2023-02-27T18:32:09Z
null
['CVE-2023-1070']
TeamPass External Control of File Name or Path vulnerability
External Control of File Name or Path in GitHub repository nilsteampassnet/teampass prior to 3.0.0.22.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'nilsteampassnet/teampass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0.23'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1070'}, {'type': 'WEB', 'url': 'https://github.com/nilsteampassnet/teampass/commit/0af3574caba27a61b16dc25c94fa51ae12d2d967'}, {'type': 'PACKAGE', 'url': 'https://github.com/nilsteampassnet/teampass'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/318bfdc4-7782-4979-956f-9ba2cc44889c'}]
{'cwe_ids': ['CWE-73'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-28T23:27:43Z', 'nvd_published_at': '2023-02-27T16:15:00Z'}
1.4.0
GHSA-hc67-v29c-7g78
2023-02-14T21:21:17Z
2023-02-05T21:30:25Z
null
['CVE-2017-20175']
Cross-site Scripting in DaSchTour matomo-mediawiki-extension
A vulnerability classified as problematic has been found in DaSchTour matomo-mediawiki-extension up to 2.4.2. This affects an unknown part of the file Piwik.hooks.php of the component Username Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.4.3 is able to address this issue. The name of the patch is 681324e4f518a8af4bd1f93867074c728eb9923d. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220203.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'mediawiki/matomo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-20175'}, {'type': 'WEB', 'url': 'https://github.com/DaSchTour/matomo-mediawiki-extension/pull/17'}, {'type': 'WEB', 'url': 'https://github.com/DaSchTour/matomo-mediawiki-extension/commit/681324e4f518a8af4bd1f93867074c728eb9923d'}, {'type': 'WEB', 'url': 'https://github.com/DaSchTour/matomo-mediawiki-extension/releases/tag/v2.4.3'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.220203'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.220203'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T21:21:17Z', 'nvd_published_at': '2023-02-05T20:15:00Z'}
1.4.0
GHSA-7j9h-3jxf-3vrf
2023-02-15T18:11:42Z
2023-02-15T18:10:38Z
null
['CVE-2023-25171']
Denial of service vulnerability on Password reset page
### Impact Previous versions of Kiwi TCMS do not impose rate limits which makes it easier to attempt denial-of-service attacks against the Password reset page. An attacker could potentially send a large number of emails if they know the email addresses of users in Kiwi TCMS. Additionally that may strain SMTP resources. ### Patches Users should upgrade to v12.0 or later. ### Workarounds Users may install and configure a rate-limiting proxy in front of Kiwi TCMS such as Nginx and/or configure rate limits on their email server when possible. ### References [Disclosed by Ahmed Rabeaa Mosaa](https://huntr.dev/bounties/3b712cb6-3fa3-4f71-8562-7a7016c6262e)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'kiwitcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/kiwitcms/Kiwi/security/advisories/GHSA-7j9h-3jxf-3vrf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25171'}, {'type': 'WEB', 'url': 'https://github.com/kiwitcms/Kiwi/commit/761305d04f5910ba14cc04d1255a8f1afdbb87f3'}, {'type': 'PACKAGE', 'url': 'https://github.com/kiwitcms/Kiwi'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3b712cb6-3fa3-4f71-8562-7a7016c6262e'}, {'type': 'WEB', 'url': 'https://kiwitcms.org/blog/kiwi-tcms-team/2023/02/15/kiwi-tcms-120/'}]
{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T18:10:38Z', 'nvd_published_at': '2023-02-15T15:15:00Z'}
1.4.0
GHSA-fqp6-fw9g-xpxp
2023-02-10T00:19:53Z
2023-02-03T18:30:26Z
null
['CVE-2021-37306']
Insecure Permissions issue in jeecg-boot
An Insecure Permissions issue in jeecg-boot 2.4.5 and earlier allows remote attackers to gain escalated privilege and view sensitive information via api uri: api uri:/sys/user/checkOnlyUser?username=admin.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-base'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37306'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/issues/2794'}, {'type': 'PACKAGE', 'url': 'https://github.com/jeecgboot/jeecg-boot'}]
{'cwe_ids': ['CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-04T00:30:27Z', 'nvd_published_at': '2023-02-03T18:15:00Z'}
1.4.0
GHSA-3x49-g6rc-c284
2023-03-06T22:00:24Z
2023-02-24T16:22:50Z
null
['CVE-2022-23535']
LiteDB may deserialize bad JSON on object type using _type
### Impact LiteDB use a special field in JSON documents to cast diferent types from `BsonDocument` do POCO classes. When instance of an object are not the same of class, `BsonMapper` use a special field `_type` string info with full class name with assembly to be loaded and fit in your model. If your end-user can send to your app a plain JSON string, deserialization can load an unsafe object to fit in your model. ### Patches Version >= 5.0.13 add some basic fixes to avoid this, but is not 100% guaranteed when using `Object` type Next major version will contains a allow-list to select what king of Assembly can be loaded ### Workarounds - Avoid users send to your app a JSON string to be direct insert/update into database - Avoid use classes with `Object` type - try use an interface when possible If your app send a plain JSON string to be insert/update into database, prefer this: ``` // Bad public class Customer { public int Id { get; set; } public string Name { get; set; } public Object AnyData { get; set; } // <= Avoid use `Object` base type } // Good public class Customer { public int Id { get; set; } public string Name { get; set; } public IDictionary<string, string> AnyData { get; set; } // Will accept only key/value strings } ``` ### References See this workaround fix on this commit: https://github.com/mbdavid/LiteDB/commit/4382ff4dd0dd8b8b16a4e37dfd29727c5f70f93f
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'LiteDB'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.13'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/mbdavid/LiteDB/security/advisories/GHSA-3x49-g6rc-c284'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23535'}, {'type': 'WEB', 'url': 'https://github.com/mbdavid/LiteDB/commit/4382ff4dd0dd8b8b16a4e37dfd29727c5f70f93f'}, {'type': 'WEB', 'url': 'https://github.com/mbdavid/LiteDB/commit/d72c6774e6a13de2cfcd7d477d3575efeb75c8f2'}, {'type': 'PACKAGE', 'url': 'https://github.com/mbdavid/LiteDB'}, {'type': 'WEB', 'url': 'https://github.com/mbdavid/LiteDB/releases/tag/v5.0.13'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-24T16:22:50Z', 'nvd_published_at': '2023-02-24T23:15:00Z'}
1.4.0
GHSA-w7pp-m8wf-vj6r
2023-02-16T19:07:57Z
2023-02-07T20:54:10Z
null
['CVE-2023-23931']
Cipher.update_into can corrupt memory if passed an immutable python object as the outbuf
Previously, `Cipher.update_into` would accept Python objects which implement the buffer protocol, but provide only immutable buffers: ```pycon >>> outbuf = b"\x00" * 32 >>> c = ciphers.Cipher(AES(b"\x00" * 32), modes.ECB()).encryptor() >>> c.update_into(b"\x00" * 16, outbuf) 16 >>> outbuf b'\xdc\x95\xc0x\xa2@\x89\x89\xadH\xa2\x14\x92\x84 \x87\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00' ``` This would allow immutable objects (such as `bytes`) to be mutated, thus violating fundamental rules of Python. This is a soundness bug -- it allows programmers to misuse an API, it cannot be exploited by attacker controlled data alone. This now correctly raises an exception. This issue has been present since `update_into` was originally introduced in cryptography 1.8.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'cryptography'}, 'ecosystem_specific': {'affected_functions': ['cryptography.hazmat.primitives.ciphers.Cipher']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8'}, {'fixed': '39.0.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/security/advisories/GHSA-w7pp-m8wf-vj6r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23931'}, {'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/pull/8230/commits/94a50a9731f35405f0357fa5f3b177d46a726ab3'}, {'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/commit/d6951dca25de45abd52da51b608055371fbcde4e'}, {'type': 'PACKAGE', 'url': 'https://github.com/pyca/cryptography'}]
{'cwe_ids': ['CWE-754'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-07T20:54:10Z', 'nvd_published_at': '2023-02-07T21:15:00Z'}
1.4.0
GHSA-2h6c-j3gf-xp9r
2023-02-10T19:52:45Z
2023-02-10T19:52:45Z
null
['CVE-2023-23626']
IPFS go-bitfield vulnerable to DoS via malformed size arguments
### Impact When feeding untrusted user input into the size parameter of `NewBitfield` and `FromBytes` functions, an attacker can trigger `panic`s. This happen when the `size` is a not a multiple of `8` or is negative. There were already a note in the `NewBitfield` documentation: > ``` > Panics if size is not a multiple of 8. > ```` But it incomplete and missing from `FromBytes`'s documentation. This has been replaced by returning an `(Bitfield, error)` and returning a non nil error if the size is wrong. ### Patches - https://github.com/ipfs/go-bitfield/commit/5e1d256fe043fc4163343ccca83862c69c52e579 ### Workarounds - Ensure `size%8 == 0 && size >= 0` yourself before calling `NewBitfield` or `FromBytes` ### References - https://github.com/ipfs/go-unixfs/security/advisories/GHSA-q264-w97q-q778
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ipfs/go-bitfield'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ipfs/go-bitfield/security/advisories/GHSA-2h6c-j3gf-xp9r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23626'}, {'type': 'WEB', 'url': 'https://github.com/ipfs/go-bitfield/commit/5e1d256fe043fc4163343ccca83862c69c52e579'}, {'type': 'PACKAGE', 'url': 'https://github.com/ipfs/go-bitfield'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1558'}]
{'cwe_ids': ['CWE-1284', 'CWE-754'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-10T19:52:45Z', 'nvd_published_at': '2023-02-09T21:15:00Z'}
1.4.0
GHSA-px2r-cmr2-phw7
2023-02-24T16:03:43Z
2023-02-15T15:30:40Z
null
['CVE-2023-25768']
Missing Authorization in Jenkins Azure Credentials Plugin
A missing permission check in Jenkins Azure Credentials Plugin 253.v887e0f9e898b and earlier allows attackers with Overall/Read permission to connect to an attacker-specified web server.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:azure-credentials'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '253.v887e0f9e898b'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25768'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/azure-credentials-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-1756'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/02/15/4'}]
{'cwe_ids': ['CWE-862', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T18:32:57Z', 'nvd_published_at': '2023-02-15T14:15:00Z'}
1.4.0
GHSA-gpvj-gp8c-c7p2
2023-02-24T16:01:14Z
2023-02-12T15:30:24Z
null
['CVE-2019-25103']
Regular Expression Denial of Service in simple-markdown
A vulnerability has been found in simple-markdown 0.5.1 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file simple-markdown.js. The manipulation leads to inefficient regular expression complexity. The attack can be launched remotely. Upgrading to version 0.5.2 is able to address this issue. The name of the patch is 89797fef9abb4cab2fb76a335968266a92588816. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220639.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'simple-markdown'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-25103'}, {'type': 'WEB', 'url': 'https://github.com/ariabuckles/simple-markdown/commit/89797fef9abb4cab2fb76a335968266a92588816'}, {'type': 'PACKAGE', 'url': 'https://github.com/ariabuckles/simple-markdown'}, {'type': 'WEB', 'url': 'https://github.com/ariabuckles/simple-markdown/releases/tag/0.5.2'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.220639'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.220639'}]
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T01:02:08Z', 'nvd_published_at': '2023-02-12T15:15:00Z'}
1.4.0
GHSA-337f-xr2x-6fcf
2023-03-02T20:00:00Z
2023-02-20T18:30:17Z
null
['CVE-2023-25613']
Apache Kerby LdapIdentityBackend LDAP Injection vulnerability
An LDAP Injection vulnerability exists in the LdapIdentityBackend of Apache Kerby before 2.0.3.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.kerby:ldap-backend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25613'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/directory-kerby'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/ynz3hhbbq6d980fzpncwbh5jd8mkyt5y'}]
{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T00:12:20Z', 'nvd_published_at': '2023-02-20T16:15:00Z'}
1.4.0
GHSA-3x5j-9vwr-8rr5
2023-02-24T00:31:13Z
2023-02-23T22:10:19Z
null
['CVE-2023-25823']
Update share links to use FRP instead of SSH tunneling
### Impact This is a vulnerability which affects anyone using Gradio's share links (i.e. creating a Gradio app and then setting `share=True`) with Gradio versions older than 3.13.1. In these older versions of Gradio, a private SSH key is sent to any user that connects to the Gradio machine, which means that a user could access other users' shared Gradio demos. From there, other exploits are possible depending on the level of access/exposure the Gradio app provides. ### Patches The problem has been patched. Ideally, users should upgrade to `gradio==3.19.1` or later where the FRP solution has been properly tested. ### Credit Credit to Greg Sadetsky and Samuel Tremblay-Cossette for alerting the team
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'gradio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.13.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/gradio-app/gradio/security/advisories/GHSA-3x5j-9vwr-8rr5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25823'}, {'type': 'PACKAGE', 'url': 'https://github.com/gradio-app/gradio'}]
{'cwe_ids': ['CWE-798'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-23T22:10:19Z', 'nvd_published_at': '2023-02-23T22:15:00Z'}
1.4.0
GHSA-wrh9-cjv3-2hpw
2023-02-22T22:59:09Z
2023-02-22T22:59:09Z
null
['CVE-2023-25813']
Sequelize vulnerable to SQL Injection via replacements
### Impact The SQL injection exploit is related to replacements. Here is such an example: In the following query, some parameters are passed through replacements, and some are passed directly through the `where` option. ```typescript User.findAll({ where: or( literal('soundex("firstName") = soundex(:firstName)'), { lastName: lastName }, ), replacements: { firstName }, }) ``` This is a very legitimate use case, but this query was vulnerable to SQL injection due to how Sequelize processed the query: Sequelize built a first query using the `where` option, then passed it over to `sequelize.query` which parsed the resulting SQL to inject all `:replacements`. If the user passed values such as ```json { "firstName": "OR true; DROP TABLE users;", "lastName": ":firstName" } ``` Sequelize would first generate this query: ```sql SELECT * FROM users WHERE soundex("firstName") = soundex(:firstName) OR "lastName" = ':firstName' ``` Then would inject replacements in it, which resulted in this: ```sql SELECT * FROM users WHERE soundex("firstName") = soundex('OR true; DROP TABLE users;') OR "lastName" = ''OR true; DROP TABLE users;'' ``` As you can see this resulted in arbitrary user-provided SQL being executed. ### Patches The issue was fixed in Sequelize 6.19.1 ### Workarounds Do not use the `replacements` and the `where` option in the same query if you are not using Sequelize >= 6.19.1 ### References See this thread for more information: https://github.com/sequelize/sequelize/issues/14519 Snyk: https://security.snyk.io/vuln/SNYK-JS-SEQUELIZE-2932027
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'sequelize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.19.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/security/advisories/GHSA-wrh9-cjv3-2hpw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25813'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/issues/14519'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/commit/ccaa3996047fe00048d5993ab2dd43ebadd4f78b'}, {'type': 'PACKAGE', 'url': 'https://github.com/sequelize/sequelize'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/releases/tag/v6.19.1'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-SEQUELIZE-2932027'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T22:59:09Z', 'nvd_published_at': '2023-02-22T19:15:00Z'}
1.4.0
GHSA-87x9-7grx-m28v
2023-02-22T00:03:49Z
2023-02-22T00:03:49Z
null
['CVE-2023-25656']
notation-go has excessive memory allocation on verification
### Impact `notation-go` users will find their application using excessive memory when verifying signatures and the application will be finally killed, and thus availability is impacted. ### Patches The problem has been patched in the release [v1.0.0-rc.3](https://github.com/notaryproject/notation-go/releases/tag/v1.0.0-rc.3). Users should upgrade their `notation-go` packages to `v1.0.0-rc.3` or above. ### Workarounds Users can review their own trust policy file and check if the identity string contains `=#`. Meanwhile, users should only put trusted certificates in their trust stores referenced by their own trust policy files, and make sure the `authenticity` validation is set to `enforce` ### Credits The `notation-go` project would like to thank Adam Korczynski (@AdamKorcz) for responsibly disclosing this issue during a security fuzzing audit sponsored by CNCF and Shiwei Zhang (@shizhMSFT) for root cause analysis and detailed vulnerability report. ### References - [Resource exhaustion attacks](https://en.wikipedia.org/wiki/Resource_exhaustion_attack)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/notaryproject/notation-go'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0-rc.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/notaryproject/notation-go/security/advisories/GHSA-87x9-7grx-m28v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25656'}, {'type': 'WEB', 'url': 'https://github.com/notaryproject/notation-go/pull/275'}, {'type': 'PACKAGE', 'url': 'https://github.com/notaryproject/notation-go'}, {'type': 'WEB', 'url': 'https://github.com/notaryproject/notation-go/releases/tag/v1.0.0-rc.3'}]
{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T00:03:49Z', 'nvd_published_at': '2023-02-20T16:15:00Z'}
1.4.0
GHSA-pwcw-6f5g-gxf8
2023-02-08T22:36:51Z
2023-02-08T22:36:51Z
null
['CVE-2023-25165']
Helm vulnerable to information disclosure via getHostByName Function
A Helm contributor discovered an information disclosure vulnerability using the `getHostByName` template function. ### Impact `getHostByName` is a Helm template function introduced in Helm v3. The function is able to accept a hostname and return an IP address for that hostname. To get the IP address the function performs a DNS lookup. The DNS lookup happens when used with `helm install|upgrade|template` or when the Helm SDK is used to render a chart. Information passed into the chart can be disclosed to the DNS servers used to lookup the IP address. For example, a malicious chart could inject `getHostByName` into a chart in order to disclose values to a malicious DNS server. ### Patches The issue has been fixed in Helm 3.11.1. ### Workarounds Prior to using a chart with Helm verify the `getHostByName` function is not being used in a template to disclose any information you do not want passed to DNS servers. ### For more information Helm's security policy is spelled out in detail in our [SECURITY](https://github.com/helm/community/blob/master/SECURITY.md) document. ### Credits Disclosed by Philipp Stehle at SAP.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'helm.sh/helm/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.11.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/helm/helm/security/advisories/GHSA-pwcw-6f5g-gxf8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25165'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/commit/293b50c65d4d56187cd4e2f390f0ada46b4c4737'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/commit/5abcf74227bfe8e5a3dbf105fe62e7b12deb58d2'}, {'type': 'PACKAGE', 'url': 'https://github.com/helm/helm'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1547'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:36:51Z', 'nvd_published_at': '2023-02-08T20:15:00Z'}
1.4.0
GHSA-f8hv-rx9p-f9r4
2023-03-02T19:55:14Z
2023-02-20T12:30:18Z
null
['CVE-2016-15025']
generator-hottowel Cross-site Scripting vulnerability
A vulnerability, which was classified as problematic, was found in generator-hottowel 0.0.11. Affected is an unknown function of the file app/templates/src/server/_app.js of the component 404 Error Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The name of the patch is c17092fd4103143a9ddab93c8983ace8bf174396. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-221484.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'generator-hottowel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-15025'}, {'type': 'WEB', 'url': 'https://github.com/johnpapa/generator-hottowel/pull/174'}, {'type': 'WEB', 'url': 'https://github.com/johnpapa/generator-hottowel/commit/c17092fd4103143a9ddab93c8983ace8bf174396'}, {'type': 'PACKAGE', 'url': 'https://github.com/johnpapa/generator-hottowel'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.221484'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.221484'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T00:08:15Z', 'nvd_published_at': '2023-02-20T10:15:00Z'}
1.4.0
GHSA-h97r-fchm-m23x
2023-02-23T21:31:31Z
2023-02-15T15:30:41Z
null
['CVE-2023-25763']
Cross-site Scripting in Jenkins Email Extension Plugin
Jenkins Email Extension Plugin 2.93 and earlier does not escape various fields included in bundled email templates, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control affected fields.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:email-ext'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.93'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25763'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/email-ext-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-2931'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/02/15/4'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T18:29:54Z', 'nvd_published_at': '2023-02-15T14:15:00Z'}
1.4.0
GHSA-84mm-prjg-49xm
2023-02-14T16:47:31Z
2023-02-06T21:30:30Z
null
['CVE-2015-10073']
tinymighty WikiSEO is vulnerable to cross-site scripting via modifyHTML function
A vulnerability was found in tinymighty WikiSEO 1.2.1. This affects the function modifyHTML of the file WikiSEO.body.php of the component Meta Property Tag Handler. The manipulation of the argument content leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.2.2 is able to address this issue. The name of the patch is 089a5797be612b18a820f9f1e6593ad9a91b1dba. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220215.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'tinymighty/wiki-seo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-10073'}, {'type': 'WEB', 'url': 'https://github.com/tinymighty/wiki-seo/pull/21'}, {'type': 'WEB', 'url': 'https://github.com/tinymighty/wiki-seo/commit/089a5797be612b18a820f9f1e6593ad9a91b1dba'}, {'type': 'PACKAGE', 'url': 'https://github.com/tinymighty/wiki-seo'}, {'type': 'WEB', 'url': 'https://github.com/tinymighty/wiki-seo/releases/tag/1.2.2'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.220215'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.220215'}]
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-07T20:11:12Z', 'nvd_published_at': '2023-02-06T20:15:00Z'}
1.4.0
GHSA-hf4x-6h87-hm79
2023-02-23T19:39:54Z
2023-02-23T19:39:54Z
null
['CVE-2023-22476']
MantisBT may expose private issues' summaries to unauthorized users
### Impact Due to insufficient access-level checks, any logged-in user allowed to perform Group Actions can get access to the _Summary_ field of private Issues (i.e. having Private view status, or belonging to a private Project) via a crafted `bug_arr[]` parameter in *bug_actiongroup_ext.php*. ### Patches Patch is under development. The vulnerability will be fixed in MantisBT version 2.25.6. ### Workarounds None ### Credits Thanks to [d3vpoo1](https://github.com/jrckmcsb) for reporting the issue. ### References - https://mantisbt.org/bugs/view.php?id=31086
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'mantisbt/mantisbt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.25.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.25.5'}}]
[{'type': 'WEB', 'url': 'https://github.com/mantisbt/mantisbt/security/advisories/GHSA-hf4x-6h87-hm79'}, {'type': 'PACKAGE', 'url': 'https://github.com/mantisbt/mantisbt'}, {'type': 'WEB', 'url': 'https://mantisbt.org/bugs/view.php?id=31086'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-23T19:39:54Z', 'nvd_published_at': None}
1.4.0
GHSA-368x-wmmg-hq5c
2023-02-22T21:58:33Z
2023-02-22T21:58:33Z
null
['CVE-2023-25570']
Apollo has potential access control security issue in eureka
### Impact If users expose the apollo-configservice to the internet (which is not recommended), there are potential security issues since there is no authentication feature enabled for the built-in eureka service. Malicious hackers may access eureka directly to mock apollo-configservice and apollo-adminservice . ### Patches Login authentication for eureka was added in https://github.com/apolloconfig/apollo/pull/4663 and was released in [v2.1.0](https://github.com/apolloconfig/apollo/releases/tag/v2.1.0). ### Workarounds To fix the potential issue without upgrading, simply follow the advice that does not expose apollo-configservice to the internet. ### References [Apollo Security Guidence](https://www.apolloconfig.com/#/en/usage/apollo-user-guide?id=_71-security-related) ### For more information If you have any questions or comments about this advisory: * Open an issue in [issue](https://github.com/apolloconfig/apollo/issues) * Email us at [apollo-config@googlegroups.com](mailto:apollo-config@googlegroups.com)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.ctrip.framework.apollo:apollo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/apolloconfig/apollo/security/advisories/GHSA-368x-wmmg-hq5c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25570'}, {'type': 'WEB', 'url': 'https://github.com/apolloconfig/apollo/pull/4663'}, {'type': 'WEB', 'url': 'https://github.com/apolloconfig/apollo/commit/7df79bf8df6960433ed4ff782a54e3dfc74632bd'}, {'type': 'PACKAGE', 'url': 'https://github.com/apolloconfig/apollo'}, {'type': 'WEB', 'url': 'https://github.com/apolloconfig/apollo/releases/tag/v2.1.0'}]
{'cwe_ids': ['CWE-306'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T21:58:33Z', 'nvd_published_at': '2023-02-20T16:15:00Z'}
1.4.0
GHSA-q2jf-h9jm-m7p4
2023-02-08T22:40:58Z
2023-02-01T21:30:23Z
null
['CVE-2023-23969']
Django contains Uncontrolled Resource Consumption via cached header
In Django 3.2 before 3.2.17, 4.0 before 4.0.9, and 4.1 before 4.1.6, the parsed values of Accept-Language headers are cached in order to avoid repetitive parsing. This leads to a potential denial-of-service vector via excessive memory usage if the raw value of Accept-Language headers is very large.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2a1'}, {'fixed': '3.2.17'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0a1'}, {'fixed': '4.0.9'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1a1'}, {'fixed': '4.1.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23969'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/4.1/releases/security/'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!forum/django-announce'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/02/msg00000.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230302-0007/'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2023/feb/01/security-releases/'}]
{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-03T21:07:17Z', 'nvd_published_at': '2023-02-01T19:15:00Z'}
1.4.0
GHSA-f9c6-4j9h-6c5r
2023-02-28T14:36:54Z
2023-02-17T03:30:25Z
null
['CVE-2023-0880']
Misinterpretation of Input in thorsten/phpmyfaq
Misinterpretation of Input in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0880'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/a67dca41576834a1ddfee61b9e799b686b75d4fa'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpMyFAQ'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/14fc4841-0f5d-4e12-bf9e-1b60d2ac6a6c'}]
{'cwe_ids': ['CWE-115'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-17T20:55:07Z', 'nvd_published_at': '2023-02-17T03:15:00Z'}
1.4.0
GHSA-8237-3q5g-99fv
2023-02-27T14:56:32Z
2023-02-25T06:30:21Z
null
['CVE-2023-26104']
Denial of Service vulnerability in lite-web-server
All versions of the package lite-web-server are vulnerable to Denial of Service (DoS) when an attacker sends an HTTP request and includes control characters that the decodeURI() function is unable to parse.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'lite-web-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26104'}, {'type': 'WEB', 'url': 'https://gist.github.com/lirantal/637520812da06fffb91dd86d02ff6bde'}, {'type': 'PACKAGE', 'url': 'https://github.com/chasyumen/lite-web-server'}, {'type': 'WEB', 'url': 'https://github.com/chasyumen/lite-web-server/blob/main/src/WebServer.js#23L274'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-LITEWEBSERVER-3153703'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-27T14:56:32Z', 'nvd_published_at': '2023-02-25T05:15:00Z'}
1.4.0
GHSA-w67w-mw4j-8qrv
2023-03-06T21:59:59Z
2023-02-08T22:27:42Z
null
['CVE-2022-4203']
openssl-src contains Read Buffer Overflow in X.509 Name Constraint
A read buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer. The read buffer overrun might result in a crash which could lead to a denial of service attack. In theory it could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext) although we are not aware of any working exploit leading to memory contents disclosure as of the time of release of this advisory. In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '300.0.0'}, {'fixed': '300.0.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4203'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=c927a3492698c254637da836762f9b1f86cffabc'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0008.html'}, {'type': 'WEB', 'url': 'https://www.openssl.org/news/secadv/20230207.txt'}]
{'cwe_ids': ['CWE-125'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:27:42Z', 'nvd_published_at': '2023-02-24T15:15:00Z'}
1.4.0
GHSA-4q83-7cq4-p6wg
2023-02-04T00:30:37Z
2023-02-04T00:30:37Z
null
[]
`tokio::io::ReadHalf<T>::unsplit` is Unsound
`tokio::io::ReadHalf<T>::unsplit` can violate the `Pin` contract The soundness issue is described in the [tokio/issues#5372](https://github.com/tokio-rs/tokio/issues/5372) Specific set of conditions needed to trigger an issue (a !Unpin type in ReadHalf) is unusual, combined with the difficulty of making any arbitrary use-after-free exploitable in Rust without doing a lot of careful alignment of data types in the surrounding code. The `tokio` feature `io-util` is also required to be enabled to trigger this soundness issue. Thanks to zachs18 reporting the issue to Tokio team responsibly and taiki-e and carllerche appropriately responding and fixing the soundness bug. Tokio before 0.2.0 used `futures` 0.1 that did not have `Pin`, so it is not affected by this issue.
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'tokio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.21.0'}, {'fixed': '1.24.2'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'tokio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.19.0'}, {'fixed': '1.20.4'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'tokio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0'}, {'fixed': '1.18.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/tokio-rs/tokio/issues/5372'}, {'type': 'PACKAGE', 'url': 'https://github.com/tokio-rs/tokio'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0005.html'}]
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-02-04T00:30:37Z', 'nvd_published_at': None}
1.4.0
GHSA-3hjh-5hgx-f5wh
2023-02-24T16:02:45Z
2023-02-13T06:30:59Z
null
['CVE-2022-25937']
Path traversal vulnerability in glance
Versions of the package glance before 3.0.9 are vulnerable to Directory Traversal that allows users to read files outside the public root directory. This is related to but distinct from the vulnerability reported in [CVE-2018-3715](https://security.snyk.io/vuln/npm:glance:20180129).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'glance'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25937'}, {'type': 'WEB', 'url': 'https://github.com/jarofghosts/glance/commit/8cecfe90286e0c45a5494067f1b592d0ccfeabac'}, {'type': 'WEB', 'url': 'https://gist.github.com/lirantal/c8cfb0398c78e558b7d4ac02aae67809'}, {'type': 'PACKAGE', 'url': 'https://github.com/jarofghosts/glance'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-GLANCE-3318395'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T16:52:35Z', 'nvd_published_at': '2023-02-13T05:15:00Z'}
1.4.0
GHSA-8mjg-8c8g-6h85
2023-08-30T10:44:16Z
2023-02-06T23:27:00Z
null
['CVE-2020-8564']
Kubernetes Sensitive Information leak via Log File
In Kubernetes clusters using a logging level of at least 4, processing a malformed docker config file will result in the contents of the docker config file being leaked, which can include pull secrets or other registry credentials. This affects < v1.19.3, < v1.18.10, < v1.17.13.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/kubernetes/kubernetes'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.19.0'}, {'fixed': '1.19.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/kubernetes/kubernetes'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.18.0'}, {'fixed': '1.18.10'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/kubernetes/kubernetes'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.17.13'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.20.0-alpha.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8564'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/95622'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/pull/94712'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/commit/11793434dac97a49bfed0150b56ac63e5dc34634'}, {'type': 'PACKAGE', 'url': 'https://github.com/kubernetes/kubernetes'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/kubernetes-security-discuss/c/vm-HcrFUOCs/m/36utxAM5CwAJ'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0066'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210122-0006/'}]
{'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-06T23:27:00Z', 'nvd_published_at': None}
1.4.0
GHSA-gxxj-x426-xj2w
2023-02-23T22:08:38Z
2023-02-12T15:30:25Z
null
['CVE-2023-0787']
Cross-site Scripting in thorsten/phpmyfaq
Cross-site Scripting (XSS) - Generic in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0787'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/b76d58321a7a595eeaf4f7a30403ca6cd8506612'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpMyFAQ'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/87397c71-7b84-4617-a66e-fa6c73be9024'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T01:05:26Z', 'nvd_published_at': '2023-02-12T14:15:00Z'}
1.4.0
GHSA-hpp2-2cr5-pf6g
2023-02-14T21:49:55Z
2023-02-14T21:49:55Z
null
['CVE-2023-25576']
Denial of service due to unlimited number of parts
### Impact * The multipart body parser accepts an unlimited number of file parts. * The multipart body parser accepts an unlimited number of field parts. * The multipart body parser accepts an unlimited number of empty parts as field parts. ### Patches This is fixed in v7.4.1 (for Fastify v4.x) and v6.0.1 (for Fastify v3.x). ### Workarounds There are no known workaround. ### References Reported at https://hackerone.com/reports/1816195.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': '@fastify/multipart'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@fastify/multipart'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.4.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/fastify/fastify-multipart/security/advisories/GHSA-hpp2-2cr5-pf6g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25576'}, {'type': 'WEB', 'url': 'https://github.com/fastify/fastify-multipart/commit/85be81bedf5b29cfd9fe3efc30fb5a17173c1297'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1816195'}, {'type': 'PACKAGE', 'url': 'https://github.com/fastify/fastify-multipart'}, {'type': 'WEB', 'url': 'https://github.com/fastify/fastify-multipart/releases/tag/v6.0.1'}, {'type': 'WEB', 'url': 'https://github.com/fastify/fastify-multipart/releases/tag/v7.4.1'}]
{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T21:49:55Z', 'nvd_published_at': '2023-02-14T16:15:00Z'}
1.4.0
GHSA-r887-gfxh-m9rr
2023-03-06T19:44:37Z
2023-02-08T18:07:16Z
null
['CVE-2023-25307']
mrpack-install vulnerable to path traversal with dependency
### Impact Importing a malicious `.mrpack` file can cause path traversal while downloading files. This can lead to scripts or config files being placed or replaced at arbitrary locations, without the user noticing. ### Patches No patches yet. ### Workarounds Avoid importing `.mrpack` files from untrusted sources. ### References https://docs.modrinth.com/docs/modpacks/format_definition/#files
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/nothub/mrpack-install'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.16.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.16.2'}}]
[{'type': 'WEB', 'url': 'https://github.com/nothub/mrpack-install/security/advisories/GHSA-r887-gfxh-m9rr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25307'}, {'type': 'WEB', 'url': 'https://github.com/nothub/mrpack-install/commit/a1f424b6a616d2de95228781eef3b92b9769f23c'}, {'type': 'PACKAGE', 'url': 'https://github.com/nothub/mrpack-install'}, {'type': 'WEB', 'url': 'https://github.com/nothub/mrpack-install/releases/tag/v0.16.3'}, {'type': 'WEB', 'url': 'https://quiltmc.org/en/blog/2023-02-04-five-installer-vulnerabilities/'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T18:07:16Z', 'nvd_published_at': None}
1.4.0
GHSA-xrw3-wqph-3fxg
2023-02-08T16:14:16Z
2023-02-01T12:32:41Z
2023-02-02T19:26:27Z
[]
Withdrawn: wallabag subject to Improper Authorization via annotations
## Duplicate advisory This advisory has been withdrawn because it is a duplicate of [GHSA-mrqx-mjc4-vfh3](https://github.com/advisories/GHSA-mrqx-mjc4-vfh3). This link is maintained to preserve external references. ## Original Description Improper Authorization in GitHub repository wallabag/wallabag prior to 2.5.3.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'wallabag/wallabag'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-beta.1'}, {'fixed': '2.5.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0610'}, {'type': 'WEB', 'url': 'https://github.com/wallabag/wallabag/commit/5ac6b6bff9e2e3a87fd88c2904ff3c6aac40722e'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8fdd9b31-d89b-4bbe-9557-20b960faf926'}]
{'cwe_ids': ['CWE-285'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-02T19:26:27Z', 'nvd_published_at': '2023-02-01T12:15:00Z'}
1.4.0
GHSA-vvpx-j8f3-3w6h
2023-03-09T21:20:44Z
2023-02-17T14:00:02Z
null
['CVE-2022-41723']
Uncontrolled Resource Consumption
A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'golang.org/x/net'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41723'}, {'type': 'WEB', 'url': 'https://go.dev/cl/468135'}, {'type': 'WEB', 'url': 'https://go.dev/cl/468295'}, {'type': 'WEB', 'url': 'https://go.dev/issue/57855'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MA5XS5DAOJ5PKKNG5TUXKPQOFHT5VBC/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGW7GE2Z32ZT47UFAQFDRQE33B7Q7LMT/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RLBQ3A7ROLEQXQLXFDLNJ7MYPKG5GULE/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XX3IMUTZKRQ73PBZM4E2JP4BKYH4C6XE/'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1571'}, {'type': 'WEB', 'url': 'https://vuln.go.dev/ID/GO-2023-1571.json'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-17T14:00:02Z', 'nvd_published_at': '2023-02-28T18:15:00Z'}
1.4.0
GHSA-6vv4-qq3r-9rv8
2023-02-24T16:02:36Z
2023-02-12T15:30:25Z
null
['CVE-2023-0790']
Uncaught Exception in thorsten/phpmyfaq
Uncaught Exception in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0790'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/f34d84dfe551ecdd675916e45cc0606e04a0734e'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpMyFAQ'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/06af150b-b481-4248-9a48-56ded2814156'}]
{'cwe_ids': ['CWE-248'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T01:04:31Z', 'nvd_published_at': '2023-02-12T14:15:00Z'}
1.4.0
GHSA-2g5j-5x95-r6hr
2023-02-06T23:16:16Z
2023-02-06T23:16:16Z
null
['CVE-2020-29529']
Unsafe tar unpacking in HashiCorp go-slug
HashiCorp go-slug before 0.5.0 does not address attempts at directory traversal involving ../ and symlinks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/go-slug'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-29529'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/go-slug/pull/12'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/go-slug/commit/28cafc59c8da6126a3ae94dfa84181df4073454f'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/go-slug/commit/764785bc4cbb9e600ad1cf1a6bd21b535c182983'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/go-slug'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/go-slug/compare/v0.4.3...v0.5.0'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/go-slug/releases/tag/v0.5.0'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0094'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2020-262-zipslip-go-slug'}]
{'cwe_ids': ['CWE-22', 'CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-06T23:16:16Z', 'nvd_published_at': None}
1.4.0
GHSA-8xv4-jj4h-qww6
2023-02-13T16:56:35Z
2023-02-02T17:00:19Z
null
['CVE-2023-23937']
Pimcore contains Unrestricted Upload of File with Dangerous Type
### Impact The upload functionality for updating user profile does not properly validate the file content-type, allowing any authenticated user to bypass this security check by adding a valid signature (p.e. GIF89) and sending any invalid content-type. This could allow an authenticated attacker to upload HTML files with JS content that will be executed in the context of the domain. ### Patches Update to version 10.5.16 or apply this patch manually https://github.com/pimcore/pimcore/pull/14125.patch
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.16'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-8xv4-jj4h-qww6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23937'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/14125'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/75a448ef8ac74424cf4e723afeb6d05f9eed872f'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/aa7ee076-d729-4fcc-9bcc-48bcbb8eac38/'}]
{'cwe_ids': ['CWE-434'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-02T17:00:19Z', 'nvd_published_at': '2023-02-03T20:15:00Z'}
1.4.0
GHSA-c2jc-4fpr-4vhg
2023-02-08T22:38:10Z
2023-02-08T22:38:10Z
null
['CVE-2023-25166']
@sideway/formula contains Regular Expression Denial of Service (ReDoS) Vulnerability
### Impact User-provided strings to formula's parser might lead to polynomial execution time. ### Patches Users should upgrade to 3.0.1+. ### Workarounds None.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': '@sideway/formula'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/hapijs/formula/security/advisories/GHSA-c2jc-4fpr-4vhg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25166'}, {'type': 'WEB', 'url': 'https://github.com/hapijs/formula/commit/9fbc20a02d75ae809c37a610a57802cd1b41b3fe'}, {'type': 'PACKAGE', 'url': 'https://github.com/hapijs/formula'}]
{'cwe_ids': ['CWE-1333'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:38:10Z', 'nvd_published_at': '2023-02-08T20:15:00Z'}
1.4.0
GHSA-grmj-gpwm-98ww
2023-03-02T19:29:09Z
2023-02-17T21:30:41Z
null
['CVE-2023-23922']
Moodle Cross-site Scripting vulnerability
The vulnerability was found Moodle which exists due to insufficient sanitization of user-supplied data in blog search. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website. This flaw allows a remote attacker to perform cross-site scripting (XSS) attacks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-beta'}, {'fixed': '4.0.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0-beta'}, {'fixed': '4.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23922'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2162547'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=443273#p1782022'}, {'type': 'WEB', 'url': 'http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-76861'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-02T19:29:09Z', 'nvd_published_at': '2023-02-17T20:15:00Z'}
1.4.0
GHSA-4xgv-j62q-h3rj
2023-06-13T23:50:39Z
2023-02-07T18:36:47Z
null
[]
Panic during unmarshal of Hello Verify Request in github.com/pion/dtls/v2
### Impact During the unmarshalling of a hello verify request we could try to unmarshal into too small a buffer. is could result in a panic leading the program to crash. This issue could be abused to cause a denial of service. ### Workaround None, upgrade to 2.2.4
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/pion/dtls'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/pion/dtls/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pion/dtls/security/advisories/GHSA-4xgv-j62q-h3rj'}, {'type': 'WEB', 'url': 'https://github.com/pion/dtls/commit/a50d26c5e4eed2ca87509494ffef2d2ebd22b1eb'}, {'type': 'PACKAGE', 'url': 'https://github.com/pion/dtls'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1534'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-07T18:36:47Z', 'nvd_published_at': None}
1.4.0
GHSA-jfpg-jggf-rpph
2023-02-23T22:08:35Z
2023-02-12T15:30:25Z
null
['CVE-2023-0786']
Cross-site Scripting in thorsten/phpmyfaq
Cross-site Scripting (XSS) - Generic in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0786'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/ce676eb9e9d8cb7864f36ee124e838b1ad15415f'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpMyFAQ'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8c74ccab-0d1d-4c6b-a0fa-803aa65de04f'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T01:06:17Z', 'nvd_published_at': '2023-02-12T14:15:00Z'}
1.4.0
GHSA-c9c2-wcxh-3w5j
2023-02-23T21:31:10Z
2023-02-15T15:30:40Z
null
['CVE-2023-25765']
Sandbox escape in Jenkins Email Extension Plugin
In Jenkins Email Extension Plugin 2.93 and earlier, templates defined inside a folder were not subject to Script Security protection, allowing attackers able to define email templates in folders to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:email-ext'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.93'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25765'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/email-ext-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-2939'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/02/15/4'}]
{'cwe_ids': ['CWE-693'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T18:29:32Z', 'nvd_published_at': '2023-02-15T14:15:00Z'}
1.4.0
GHSA-fxqx-xgqq-gf42
2023-02-15T15:15:40Z
2023-02-06T18:30:30Z
null
['CVE-2020-36660']
Exposure of Sensitive Information in EVE-SRP
A vulnerability was found in paxswill EVE Ship Replacement Program 0.12.11. It has been rated as problematic. This issue affects some unknown processing of the file src/evesrp/views/api.py of the component User Information Handler. The manipulation leads to information disclosure. The attack may be initiated remotely. Upgrading to version 0.12.12 is able to address this issue. The name of the patch is 9e03f68e46e85ca9c9694a6971859b3ee66f0240. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220211.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'EVE-SRP'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36660'}, {'type': 'WEB', 'url': 'https://github.com/paxswill/evesrp/commit/9e03f68e46e85ca9c9694a6971859b3ee66f0240'}, {'type': 'PACKAGE', 'url': 'https://github.com/paxswill/evesrp'}, {'type': 'WEB', 'url': 'https://github.com/paxswill/evesrp/releases/tag/v0.12.12'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.220211'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.220211'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T15:15:40Z', 'nvd_published_at': '2023-02-06T17:15:00Z'}
1.4.0
GHSA-p7qq-rrvw-x55x
2023-03-07T04:02:34Z
2023-02-25T03:30:17Z
null
['CVE-2023-1033']
Froxlor Cross-Site Request Forgery vulnerability
Froxlor prior to version 2.0.11 has a Cross-Site Request Forgery vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'froxlor/froxlor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1033'}, {'type': 'WEB', 'url': 'https://github.com/froxlor/froxlor/commit/4003a8d2b60728a77476d1d4f5aa5c635f128950'}, {'type': 'PACKAGE', 'url': 'https://github.com/froxlor/froxlor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ba3cd929-8b60-4d8d-b77d-f28409ecf387'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-28T23:26:13Z', 'nvd_published_at': '2023-02-25T01:15:00Z'}
1.4.0
GHSA-mrpv-5pmr-p92h
2023-03-03T23:26:02Z
2023-02-23T09:30:17Z
null
['CVE-2023-25621']
Improper Privilege Management in Apache Sling
Privilege Escalation vulnerability in Apache Software Foundation Apache Sling. Any content author is able to create i18n dictionaries in the repository in a location the author has write access to. As these translations are used across the whole product, it allows an author to change any text or dialog in the product. For example an attacker might fool someone by changing the text on a delete button to "Info". This issue affects the i18n module of Apache Sling versions before 2.6.2. Version 2.6.2 and higher limit by default i18m dictionaries to certain paths in the repository (/libs and /apps). Users of the module are advised to update to version 2.6.2 or higher, check the configuration for resource loading and then adjust the access permissions for the configured path accordingly.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.sling:org.apache.sling.i18n'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25621'}, {'type': 'WEB', 'url': 'https://github.com/apache/sling-org-apache-sling-i18n/pull/9'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/SLING-11744'}, {'type': 'WEB', 'url': 'https://seclists.org/oss-sec/2023/q1/112'}, {'type': 'WEB', 'url': 'https://sling.apache.org/news.html'}]
{'cwe_ids': ['CWE-269'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-23T21:38:53Z', 'nvd_published_at': '2023-02-23T09:15:00Z'}
1.4.0
GHSA-824j-wqm8-89mj
2023-02-14T22:00:54Z
2023-02-14T22:00:54Z
null
['CVE-2023-21808']
.NET Remote Code Execution Vulnerability
# Microsoft Security Advisory CVE-2023-21808: .NET Remote Code Execution Vulnerability ## <a name="executive-summary"></a>Executive summary Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 7.0 and .NET 6.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability. A vulnerability exists in how .NET reads debugging symbols, where reading a malicious symbols file may result in remote code execution. ## Discussion Discussion for this issue can be found at https://github.com/dotnet/runtime/issues/82112 ### <a name="mitigation-factors"></a>Mitigation factors Microsoft has not identified any mitigating factors for this vulnerability. ## <a name="affected-software"></a>Affected software * Any .NET 7.0 application running on .NET 7.0.2 or earlier. * Any .NET 6.0 application running on .NET 6.0.13 or earlier. If your application uses the following package versions, ensure you update to the latest version of .NET. ### <a name=".NET 7"></a>.NET 7 Package name | Affected version | Patched version ------------ | ---------------- | ------------------------- [Microsoft.NetCore.App.Runtime.win-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm)|>= 7.0.0, <= 7.0.2|7.0.3 [Microsoft.NetCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm64)|>= 7.0.0, <= 7.0.2|7.0.3 [Microsoft.NetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x64)|>= 7.0.0, <= 7.0.2|7.0.3 [Microsoft.NetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x86)|>= 7.0.0, <= 7.0.2|7.0.3 ### <a name=".NET 6"></a>.NET 6 Package name | Affected version | Patched version ------------ | ---------------- | ------------------------- [Microsoft.NetCore.App.Runtime.win-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm)|>= 6.0.0, <= 6.0.13|6.0.14 [Microsoft.NetCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm64)|>= 6.0.0, <= 6.0.13|6.0.14 [Microsoft.NetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x64)|>= 6.0.0, <= 6.0.13|6.0.14 [Microsoft.NetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x86)|>= 6.0.0, <= 6.0.13|6.0.14 ## Advisory FAQ ### <a name="how-affected"></a>How do I know if I am affected? If you have a runtime or SDK with a version listed, or an affected package listed in [affected software](#affected-software), you're exposed to the vulnerability. ### <a name="how-fix"></a>How do I fix the issue? * To fix the issue please install the latest version of .NET 6.0 or .NET 7.0. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs. * If you have .NET Core 3.1 or greater installed, you can list the versions you have installed by running the `dotnet --info` command. You will see output like the following; * If you are using one of the affected packages, please update to the patched version listed above. ``` .NET Core SDK (reflecting any global.json): Version: 6.0.300 Commit: 8473146e7d Runtime Environment: OS Name: Windows OS Version: 10.0.18363 OS Platform: Windows RID: win10-x64 Base Path: C:\Program Files\dotnet\sdk\6.0.300\ Host (useful for support): Version: 6.0.5 Commit: 8473146e7d .NET Core SDKs installed: 6.0.300 [C:\Program Files\dotnet\sdk] .NET Core runtimes installed: Microsoft.AspNetCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App] Microsoft.NETCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App] Microsoft.WindowsDesktop.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App] To install additional .NET Core runtimes or SDKs: https://aka.ms/dotnet-download ``` * If you're using .NET 7.0, you should download and install Runtime 7.0.3 or SDK 7.0.103 (for Visual Studio 2022 v17.4) from https://dotnet.microsoft.com/download/dotnet-core/7.0. * If you're using .NET 6.0, you should download and install Runtime 6.0.14 or SDK 6.0.114 (for Visual Studio 2022 v17.1) from https://dotnet.microsoft.com/download/dotnet-core/6.0. .NET 6.0 and and .NET 7.0 updates are also available from Microsoft Update. To access this either type "Check for updates" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates. Once you have installed the updated runtime or SDK, restart your apps for the update to take effect. Additionally, if you've deployed [self-contained applications](https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd) targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed. ## Other Information ### Reporting Security Issues If you have found a potential security issue in .NET 6.0 or .NET 7.0, please email details to secure@microsoft.com. Reports may qualify for the Microsoft .NET Core & .NET 5 Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at <https://aka.ms/corebounty>. ### Support You can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime and https://github.com/dotnet/aspnet/. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue. ### Disclaimer The information provided in this advisory is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. ### Acknowledgements [Johan Gorter](https://www.linkedin.com/in/jgorter/) with [AFAS Software](https://www.afas.nl/) ### External Links [CVE-2023-21808]( https://www.cve.org/CVERecord?id=CVE-2023-21808) ### Revisions V1.0 (February 14, 2023): Advisory published. _Version 1.0_ _Last Updated 2023-02-14_
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.2'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.14'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.13'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.2'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.14'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.13'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.2'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.14'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.13'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.2'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.14'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.13'}}]
[{'type': 'WEB', 'url': 'https://github.com/dotnet/runtime/security/advisories/GHSA-824j-wqm8-89mj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-21808'}, {'type': 'PACKAGE', 'url': 'https://github.com/dotnet/runtime'}, {'type': 'WEB', 'url': 'https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21808'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T22:00:54Z', 'nvd_published_at': '2023-02-14T21:15:00Z'}
1.4.0
GHSA-r7jw-wp68-3xch
2023-02-21T20:00:42Z
2023-02-08T22:28:34Z
null
['CVE-2023-0215']
openssl-src vulnerable to Use-after-free following `BIO_new_NDEF`
The public API function `BIO_new_NDEF` is a helper function used for streaming ASN.1 data via a `BIO`. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications. The function receives a `BIO` from the caller, prepends a new `BIO_f_asn1` filter `BIO` onto the front of it to form a `BIO` chain, and then returns the new head of the `BIO` chain to the caller. Under certain conditions, for example if a CMS recipient public key is invalid, the new filter `BIO` is freed and the function returns a `NULL` result indicating a failure. However, in this case, the `BIO` chain is not properly cleaned up and the `BIO` passed by the caller still retains internal pointers to the previously freed filter `BIO`. If the caller then goes on to call `BIO_pop()` on the `BIO` then a use-after-free will occur. This will most likely result in a crash. This scenario occurs directly in the internal function `B64_write_ASN1()` which may cause `BIO_new_NDEF()` to be called and will subsequently call `BIO_pop()` on the `BIO`. This internal function is in turn called by the public API functions `PEM_write_bio_ASN1_stream`, `PEM_write_bio_CMS_stream`, `PEM_write_bio_PKCS7_stream`, `SMIME_write_ASN1`, `SMIME_write_CMS` and `SMIME_write_PKCS7`. Other public API functions that may be impacted by this include `i2d_ASN1_bio_stream`, `BIO_new_CMS`, `BIO_new_PKCS7`, `i2d_CMS_bio_stream` and `i2d_PKCS7_bio_stream`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '111.25.0'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '300.0.0'}, {'fixed': '300.0.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0215'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8818064ce3c3c0f1b740a5aaba2a987e75bfbafd'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9816136fe31d92ace4037d5da5257f763aeeb4eb'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=c3829dd8825c654652201e16f8a0a0c46ee3f344'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0009.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230427-0007/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230427-0009/'}, {'type': 'WEB', 'url': 'https://www.openssl.org/news/secadv/20230207.txt'}]
{'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:28:34Z', 'nvd_published_at': '2023-02-08T20:15:00Z'}
1.4.0
GHSA-8mwq-mj73-qv68
2023-02-24T18:48:34Z
2023-02-16T15:30:28Z
2023-02-24T18:48:34Z
[]
Duplicate advisory: Sequelize vulnerable to Improper Filtering of Special Elements
## Duplicate advisory This advisory has been withdrawn because it is a duplicate of [GHSA-f598-mfpv-gmfx](https://github.com/advisories/GHSA-f598-mfpv-gmfx). This link is maintained to preserve external references. ## Original Description Due to improper attribute filtering in the sequelize js library, an attacker can peform SQL injections. This issue can be mitigated by not accepting untrusted input.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': '@sequelize/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.0-alpha.20'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'sequelize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.29.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.28.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22578'}, {'type': 'WEB', 'url': 'https://csirt.divd.nl/CVE-2023-22578'}, {'type': 'WEB', 'url': 'https://csirt.divd.nl/DIVD-2022-00020/'}, {'type': 'PACKAGE', 'url': 'https://github.com/sequelize/sequelize'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/discussions/15694'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/releases/tag/v7.0.0-alpha.20'}]
{'cwe_ids': ['CWE-790'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T23:16:24Z', 'nvd_published_at': '2023-02-16T15:15:00Z'}
1.4.0
GHSA-gm7m-rqf8-jx4m
2023-02-22T16:31:38Z
2023-02-11T03:32:49Z
null
['CVE-2023-0780']
Improper Restriction of Rendered UI Layers or Frames in cockpit-hq/cockpit
Improper Restriction of Rendered UI Layers or Frames in GitHub repository cockpit-hq/cockpit prior to 2.3.9.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'cockpit-hq/cockpit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0780'}, {'type': 'WEB', 'url': 'https://github.com/cockpit-hq/cockpit/commit/8450bdf7e1dc23e9d88adf30a2aa9101c0c41720'}, {'type': 'PACKAGE', 'url': 'https://github.com/cockpit-hq/cockpit'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/801efd0b-404b-4670-961a-12a986252fa4'}]
{'cwe_ids': ['CWE-1021'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T01:02:50Z', 'nvd_published_at': '2023-02-11T02:20:00Z'}
1.4.0
GHSA-gf34-hh5r-f74h
2023-02-23T22:08:43Z
2023-02-12T15:30:25Z
null
['CVE-2023-0794']
Cross-site Scripting in thorsten/phpmyfaq
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0794'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/edf0f6f90d4deaf46b4fd97ae92f16c1e10a2635'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpMyFAQ'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/949975f1-271d-46aa-85e5-1a013cdb5efb'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T00:47:02Z', 'nvd_published_at': '2023-02-12T14:15:00Z'}
1.4.0
GHSA-p2fr-mq9m-6w6p
2023-02-23T21:31:22Z
2023-02-15T15:30:41Z
null
['CVE-2023-25764']
Cross-site Scripting in Jenkins Email Extension Plugin
Jenkins Email Extension Plugin 2.93 and earlier does not escape, sanitize, or sandbox rendered email template output or log output generated during template rendering, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create or change custom email templates.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:email-ext'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.93'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25764'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/email-ext-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-2934'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/02/15/4'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T18:53:51Z', 'nvd_published_at': '2023-02-15T14:15:00Z'}
1.4.0
GHSA-vfmp-9999-6wqj
2023-02-22T00:10:52Z
2023-02-21T15:30:23Z
null
['CVE-2021-32855']
Vditor Cross-site Scripting vulnerability
Vditor is a browser-side Markdown editor. Versions prior to 3.8.7 are vulnerable to copy-paste cross-site scripting (XSS). For this particular type of XSS, the victim needs to be fooled into copying a malicious payload into the text editor. Version 3.8.7 contains a patch for this issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'vditor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32855'}, {'type': 'WEB', 'url': 'https://github.com/Vanessa219/vditor/issues/1085'}, {'type': 'WEB', 'url': 'https://github.com/Vanessa219/vditor/commit/1b2382d7f8a4ee509d9245db4450d926a0b24146'}, {'type': 'PACKAGE', 'url': 'https://github.com/Vanessa219/vditor'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2021-1006-vditor/'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T00:10:52Z', 'nvd_published_at': '2023-02-21T15:15:00Z'}
1.4.0
GHSA-hfrx-6qgj-fp6c
2023-03-02T19:56:24Z
2023-02-20T18:30:17Z
null
['CVE-2023-24998']
Apache Commons FileUpload denial of service vulnerability
Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads. Note that, like all of the file upload limits, the new configuration option (FileUploadBase#setFileCountMax) is not enabled by default and must be explicitly configured.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'commons-fileupload:commons-fileupload'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24998'}, {'type': 'WEB', 'url': 'https://github.com/apache/commons-fileupload/commit/e20c04990f7420ca917e96a84cec58b13a1b3d17'}, {'type': 'WEB', 'url': 'https://commons.apache.org/proper/commons-fileupload/security-reports.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/commons-fileupload'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/4xl4l09mhwg4vgsk7dxqogcjrobrrdoy'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202305-37'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/05/22/1'}]
{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T00:12:07Z', 'nvd_published_at': '2023-02-20T16:15:00Z'}
1.4.0
GHSA-29xx-hcv2-c4cp
2023-02-21T20:00:22Z
2023-02-08T22:23:39Z
null
['CVE-2023-0216']
openssl-src subject to Invalid pointer dereference in `d2i_PKCS7` functions
An invalid pointer dereference on read can be triggered when an application tries to load malformed PKCS7 data with the `d2i_PKCS7()`, `d2i_PKCS7_bio()` or `d2i_PKCS7_fp()` functions. The result of the dereference is an application crash which could lead to a denial of service attack. The TLS implementation in OpenSSL does not call this function however third party applications might call these functions on untrusted data.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '300.0.0'}, {'fixed': '300.0.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0216'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=934a04f0e775309cadbef0aa6b9692e1b12a76c6'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0011.html'}, {'type': 'WEB', 'url': 'https://www.openssl.org/news/secadv/20230207.txt'}]
{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:23:39Z', 'nvd_published_at': '2023-02-08T20:15:00Z'}
1.4.0
GHSA-p52g-cm5j-mjv4
2023-02-24T19:03:43Z
2023-02-08T22:31:42Z
null
['CVE-2022-4304']
openssl-src subject to Timing Oracle in RSA Decryption
A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '111.25.0'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '300.0.0'}, {'fixed': '300.0.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4304'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0007.html'}, {'type': 'WEB', 'url': 'https://www.openssl.org/news/secadv/20230207.txt'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:31:42Z', 'nvd_published_at': '2023-02-08T20:15:00Z'}
1.4.0
GHSA-4w59-c3gc-rrhp
2023-03-10T15:32:03Z
2023-02-28T23:20:05Z
null
['CVE-2023-23929']
vantage6 refresh tokens do not expire
From issue: Problem description Currently, the refresh token is valid indefinitely. This is bad security practice. Desired solution The refresh token should get a validity of 24-48 hours. Additional context When implementing this, also check that the refresh token returns a new refresh token When implementing this, also adapt the UI so that it logs out if refresh token is no longer valid. When implementing this, ensure that nodes refresh their token periodically so that they do not have to be restarted manually. ### Impact ### Patches None available ### Workarounds None available
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'vantage6'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/vantage6/vantage6/security/advisories/GHSA-4w59-c3gc-rrhp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23929'}, {'type': 'WEB', 'url': 'https://github.com/vantage6/vantage6/commit/48ebfca42359e9a6743e9598684585e2522cdce8'}, {'type': 'PACKAGE', 'url': 'https://github.com/vantage6/vantage6'}]
{'cwe_ids': ['CWE-613'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-28T23:20:05Z', 'nvd_published_at': '2023-03-04T00:15:00Z'}
1.4.0
GHSA-mv6w-j4xc-qpfw
2023-06-13T23:44:12Z
2023-02-08T22:37:10Z
null
['CVE-2023-25163']
Argo CD leaks repository credentials in user-facing error messages and in logs
### Impact All versions of Argo CD starting with v2.6.0-rc1 have an output sanitization bug which leaks repository access credentials in error messages. These error messages are visible to the user, and they are logged. The error message is visible when a user attempts to create or update an Application via the Argo CD API (and therefor the UI or CLI). The user must have `applications, create` or `applications, update` RBAC access to reach the code which may produce the error. The user is not guaranteed to be able to trigger the error message. They may attempt to spam the API with requests to trigger a rate limit error from the upstream repository. If the user has `repositories, update` access, they may edit an existing repository to introduce a URL typo or otherwise force an error message. But if they have that level of access, they are probably intended to have access to the credentials anyway. ### Patches A patch for this vulnerability has been released in the following Argo CD version: * v2.6.1 ### Workarounds The only way to completely resolve the issue is to upgrade. #### Mitigations To mitigate the issue, make sure that your repo credentials have only least necessary privileges. For example, the credentials should not have push access, and they should not have access to more resources than what Argo CD actually needs (for example, a whole GitHub org when only one repo is needed). To further mitigate the impact of a leaked write-capable repo credential, you could [enable commit signature verification](https://argo-cd.readthedocs.io/en/stable/user-guide/gpg-verification/#enforcing-signature-verification). Even if someone could push a malicious commit, the commit would not by synced. You should also enforce least privileges in Argo CD RBAC. Make sure users only have `repositories, update`, `applications, update`, or `applications, create` access if they absolutely need it. ### References * The problem was initially reported in a [GitHub issue](https://github.com/argoproj/argo-cd/issues/12309) * [Argo CD RBAC configuration documentation](https://argo-cd.readthedocs.io/en/stable/operator-manual/rbac/) ### For more information * Open an issue in [the Argo CD issue tracker](https://github.com/argoproj/argo-cd/issues) or [discussions](https://github.com/argoproj/argo-cd/discussions) * Join us on [Slack](https://argoproj.github.io/community/join-slack) in channel #argo-cd
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0-rc1'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0-rc1'}, {'fixed': '2.6.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/security/advisories/GHSA-mv6w-j4xc-qpfw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25163'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/issues/12309'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/pull/12320'}, {'type': 'WEB', 'url': 'https://argo-cd.readthedocs.io/en/stable/operator-manual/rbac/'}, {'type': 'PACKAGE', 'url': 'https://github.com/argoproj/argo-cd'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1548'}]
{'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:37:10Z', 'nvd_published_at': '2023-02-08T21:15:00Z'}
1.4.0
GHSA-w479-w22g-cffh
2023-02-28T00:05:48Z
2023-02-17T00:30:28Z
null
['CVE-2023-0821']
Uncontrolled Resource Consumption in Hashicorp Nomad
HashiCorp Nomad and Nomad Enterprise 1.2.15 up to 1.3.8, and 1.4.3 jobs using a maliciously compressed artifact stanza source can cause excessive disk usage. Fixed in 1.2.16, 1.3.9, and 1.4.4.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.15'}, {'fixed': '1.2.16'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.9'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0821'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2023-05-nomad-client-vulnerable-to-decompression-bombs-in-artifact-block/50292'}]
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-17T14:00:26Z', 'nvd_published_at': '2023-02-16T22:15:00Z'}
1.4.0
GHSA-626q-v9j4-mcp4
2023-02-13T16:56:47Z
2023-02-02T16:59:46Z
null
['CVE-2023-23940']
OpenZeppelin Contracts contains Improper Verification of Cryptographic Signature
### Cause `is_valid_eth_signature` is missing a call to `finalize_keccak` after calling `verify_eth_signature`. ### Impact As a result, any contract using `is_valid_eth_signature` from the account library (such as the `EthAccount` preset) is vulnerable to a malicious sequencer. Specifically, the malicious sequencer would be able to bypass signature validation to impersonate an instance of these accounts. ### Risk In order to exploit this vulnerability, it is required to control a sequencer or prover since they're the ones executing the hints, being able to inject incorrect keccak results. Today StarkWare is the only party running both a prover or a sequencer, greatly reducing the risk of exploit. ### Patches The issue has been patched in 0.6.1. ### For more information If you have any questions or comments about this advisory: * Open an issue in [the Contracts for Cairo repository](https://github.com/OpenZeppelin/cairo-contracts/issues/new/choose) * Email us at [security@openzeppelin.com](mailto:security@openzeppelin.com)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'openzeppelin-cairo-contracts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0'}, {'fixed': '0.6.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/cairo-contracts/security/advisories/GHSA-626q-v9j4-mcp4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23940'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/cairo-contracts/pull/542/commits/6d4cb750478fca2fd916f73297632f899aca9299'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenZeppelin/cairo-contracts'}]
{'cwe_ids': ['CWE-345', 'CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-02T16:59:46Z', 'nvd_published_at': '2023-02-03T20:15:00Z'}
1.4.0
GHSA-26f8-x7cc-wqpc
2023-07-21T18:01:38Z
2023-02-07T21:30:23Z
null
['CVE-2023-25194']
Apache Kafka Connect vulnerable to Deserialization of Untrusted Data
A possible security vulnerability has been identified in Apache Kafka Connect API. This requires access to a Kafka Connect worker, and the ability to create/modify connectors on it with an arbitrary Kafka client SASL JAAS config and a SASL-based security protocol, which has been possible on Kafka Connect clusters since Apache Kafka Connect 2.3.0. When configuring the connector via the Kafka Connect REST API, an authenticated operator can set the `sasl.jaas.config` property for any of the connector's Kafka clients to "com.sun.security.auth.module.JndiLoginModule", which can be done via the `producer.override.sasl.jaas.config`, `consumer.override.sasl.jaas.config`, or `admin.override.sasl.jaas.config` properties. This will allow the server to connect to the attacker's LDAP server and deserialize the LDAP response, which the attacker can use to execute java deserialization gadget chains on the Kafka connect server. Attacker can cause unrestricted deserialization of untrusted data (or) RCE vulnerability when there are gadgets in the classpath. Since Apache Kafka 3.0.0, users are allowed to specify these properties in connector configurations for Kafka Connect clusters running with out-of-the-box configurations. Before Apache Kafka 3.0.0, users may not specify these properties unless the Kafka Connect cluster has been reconfigured with a connector client override policy that permits them. Since Apache Kafka 3.4.0, we have added a system property ("-Dorg.apache.kafka.disallowed.login.modules") to disable the problematic login modules usage in SASL JAAS configuration. Also by default "com.sun.security.auth.module.JndiLoginModule" is disabled in Apache Kafka Connect 3.4.0. We advise the Kafka Connect users to validate connector configurations and only allow trusted JNDI configurations. Also examine connector dependencies for vulnerable versions and either upgrade their connectors, upgrading that specific dependency, or removing the connectors as options for remediation. Finally, in addition to leveraging the "org.apache.kafka.disallowed.login.modules" system property, Kafka Connect users can also implement their own connector client config override policy, which can be used to control which Kafka client properties can be overridden directly in a connector config and which cannot.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.kafka:connect'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '3.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25194'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1529790'}, {'type': 'WEB', 'url': 'https://kafka.apache.org/cve-list'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/vy1c7fqcdqvq5grcqp6q5jyyb302khyz'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/173151/Apache-Druid-JNDI-Injection-Remote-Code-Execution.html'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:18:02Z', 'nvd_published_at': '2023-02-07T20:15:00Z'}
1.4.0
GHSA-8x6c-cv3v-vp6g
2023-02-14T02:40:00Z
2023-02-11T00:13:31Z
2023-02-14T02:40:00Z
[]
Withdrawn: cacheable-request depends on http-cache-semantics, which is vulnerable to Regular Expression Denial of Service
## This advisory is withdawn. cacheable-request depends on http-cache-semanttics, which contains an Inefficient Regular Expression Complexity in versions prior to 4.1.1 of that package. cacheable-request has been updated to rely on the fixed version in 10.2.7. ### Summary of http-cache-semantics vulnerability http-cache semantics contains an Inefficient Regular Expression Complexity , leading to Denial of Service. This affects versions of the package http-cache-semantics before 4.1.1. The issue can be exploited via malicious request header values sent to a server, when that server reads the cache policy from the request using this library. ### Details https://github.com/advisories/GHSA-rc47-6667-2j5j
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'cacheable-request'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.2.7'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/jaredwray/cacheable-request/security/advisories/GHSA-8x6c-cv3v-vp6g'}, {'type': 'WEB', 'url': 'https://github.com/jaredwray/cacheable-request/commit/8a47777e4eb61960469873cf4b3a2823742fc15e'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rc47-6667-2j5j'}, {'type': 'PACKAGE', 'url': 'https://github.com/jaredwray/cacheable-request'}]
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-11T00:13:31Z', 'nvd_published_at': None}
1.4.0
GHSA-8c25-f3mj-v6h8
2023-02-22T23:15:10Z
2023-02-16T15:30:28Z
null
['CVE-2023-22580']
Sequelize information disclosure vulnerability
Due to improper input filtering in the sequelize js library, can malicious queries lead to sensitive information disclosure.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'sequelize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.28.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@sequelize/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.0-alpha.20'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22580'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/pull/15375'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/pull/15699'}, {'type': 'WEB', 'url': 'https://csirt.divd.nl/CVE-2023-22580'}, {'type': 'WEB', 'url': 'https://csirt.divd.nl/DIVD-2022-00020/'}, {'type': 'PACKAGE', 'url': 'https://github.com/sequelize/sequelize'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/releases/tag/v6.28.1'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/releases/tag/v7.0.0-alpha.20'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T23:15:10Z', 'nvd_published_at': '2023-02-16T15:15:00Z'}
1.4.0
GHSA-qx34-47fc-vv79
2023-02-16T21:53:07Z
2023-02-08T06:30:33Z
null
['CVE-2023-0739']
Answer vulnerable to Race Condition
Race Condition in Switch in GitHub repository answerdev/answer prior to 1.0.4.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0739'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/1ee34b884b905d14d4db457563176b77a974b992'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/93d7fac9-50be-4624-9096-45b89fbfd4ae'}]
{'cwe_ids': ['CWE-362', 'CWE-365'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:33:00Z', 'nvd_published_at': '2023-02-08T05:15:00Z'}
1.4.0
GHSA-rwhw-6c6r-2823
2023-02-10T00:19:14Z
2023-02-03T18:30:26Z
null
['CVE-2021-37304']
Insecure Permissions issue in jeecg-boot
An Insecure Permissions issue in jeecg-boot 2.4.5 allows unauthenticated remote attackers to gain escalated privilege and view sensitive information via the httptrace interface.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-base'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37304'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/issues/2793'}, {'type': 'PACKAGE', 'url': 'https://github.com/jeecgboot/jeecg-boot'}]
{'cwe_ids': ['CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-04T00:30:25Z', 'nvd_published_at': '2023-02-03T18:15:00Z'}
1.4.0
GHSA-9w8x-5hv5-r6gw
2023-04-04T21:45:28Z
2023-02-15T06:30:26Z
null
['CVE-2022-25978']
Cross Site Scripting in usememos/memos
All versions of the package github.com/usememos/memos/server prior to 0.11.0 are vulnerable to Cross-site Scripting (XSS) due to insufficient checks on external resources, which allows malicious actors to introduce links starting with a javascript: scheme.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.10.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25978'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/issues/1026'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/b11d2130a084385eb65c3761a3c841ebe9f81ae8'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1566'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUSEMEMOSMEMOSSERVER-3319070'}, {'type': 'PACKAGE', 'url': 'github.com/usememos/memos'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T18:16:31Z', 'nvd_published_at': '2023-02-15T05:15:00Z'}
1.4.0
GHSA-pgvh-p3g4-86jw
2023-04-27T19:55:01Z
2023-02-02T01:32:42Z
null
['CVE-2023-25313']
AVideo contains Command injection when embedding a video link
Impact: An attacker could execute remote code on a system running wwbn/avideo Step to Reproduce: 1. Go to the `My Videos` tab https://demo.avideo.com/mvideos 2. Click "Embed a video link" Append a command to the url as a query string. eg. `?whoami` then click Save This issue has been resolved in commit `236228f15`
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'wwbn/avideo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/WWBN/AVideo/security/advisories/GHSA-pgvh-p3g4-86jw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30842'}, {'type': 'WEB', 'url': 'https://github.com/WWBN/AVideo/commit/236228f15a9a31be5a0e60f05dac043682e49a5e'}, {'type': 'PACKAGE', 'url': 'https://github.com/WWBN/AVideo'}]
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-02T01:32:42Z', 'nvd_published_at': None}
1.4.0
GHSA-prjg-28jg-m3p5
2023-03-03T23:25:32Z
2023-02-24T03:30:14Z
null
['CVE-2023-0994']
RosarioSIS Improper Access Control vulnerability
Improper Access Control in GitHub repository francoisjacquet/rosariosis prior to 10.8.2.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'francoisjacquet/rosariosis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.8.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0994'}, {'type': 'WEB', 'url': 'https://github.com/francoisjacquet/rosariosis/commit/630d3e3d78270db8dbcbfe87db265bc3e70c5a76'}, {'type': 'PACKAGE', 'url': 'https://github.com/francoisjacquet/rosariosis'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a281c586-9b97-4d17-88ff-ca91bb4c45ad'}]
{'cwe_ids': ['CWE-200', 'CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-24T16:23:00Z', 'nvd_published_at': '2023-02-24T02:15:00Z'}
1.4.0
GHSA-vqfx-gj96-3w95
2023-02-23T16:58:56Z
2023-02-23T16:58:56Z
null
['CVE-2023-22579']
Unsafe fall-through in getWhereConditions
### Impact Providing an invalid value to the `where` option of a query caused Sequelize to ignore that option instead of throwing an error. A finder call like the following did not throw an error: ```ts User.findAll({ where: new Date(), }); ``` As this option is typically used with plain javascript objects, be aware that this only happens at the top level of this option. ### Patches This issue has been patched in [`sequelize@6.28.1`](https://github.com/sequelize/sequelize/pull/15699) & [`@sequelize/core@7.0.0.alpha-20`](https://github.com/sequelize/sequelize/pull/15375) ### References A discussion thread about this issue is open at https://github.com/sequelize/sequelize/discussions/15698 CVE: CVE-2023-22579 Snyk: https://security.snyk.io/vuln/SNYK-JS-SEQUELIZE-3324090
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'sequelize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.28.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@sequelize/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.0-alpha.20'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/security/advisories/GHSA-vqfx-gj96-3w95'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22579'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/pull/15375'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/pull/15699'}, {'type': 'WEB', 'url': 'https://csirt.divd.nl/CVE-2023-22579'}, {'type': 'WEB', 'url': 'https://csirt.divd.nl/DIVD-2022-00020/'}, {'type': 'PACKAGE', 'url': 'https://github.com/sequelize/sequelize'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/discussions/15698'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/releases/tag/v6.28.1'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/releases/tag/v7.0.0-alpha.20'}]
{'cwe_ids': ['CWE-843'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-23T16:58:56Z', 'nvd_published_at': None}
1.4.0
GHSA-jwr6-75xh-jh5j
2023-02-23T22:14:18Z
2023-02-15T21:30:30Z
null
['CVE-2023-23850']
Synopsys Jenkins Coverity Plugin has Incorrect Default Permissions
Synopsys Coverity Plugin 3.0.2 and earlier does not perform permission checks in several HTTP endpoints. This allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack to capture the credentials using another vulnerability. An enumeration of credentials IDs in Synopsys Coverity Plugin 3.0.3 requires the appropriate permissions.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:synopsys-coverity'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23850'}, {'type': 'WEB', 'url': 'https://community.synopsys.com/s/article/SIG-Product-Security-Advisory-Multiple-CVEs-affecting-Coverity-Jenkins-Plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-2793%20(1)'}]
{'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-23T22:14:18Z', 'nvd_published_at': '2023-02-15T19:15:00Z'}
1.4.0
GHSA-wjrj-jc3w-ppfw
2023-02-24T16:01:53Z
2023-02-12T15:30:25Z
null
['CVE-2023-0792']
Code Injection in thorsten/phpmyfaq
Code Injection in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0792'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/d8964568d69488de02f0a0a58acc822eeb5c3cb1'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpMyFAQ'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/9e21156b-ab1d-4c60-88ef-8c9f3e2feb7f'}]
{'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T01:03:49Z', 'nvd_published_at': '2023-02-12T14:15:00Z'}
1.4.0
GHSA-3vrc-rrpw-r5pw
2023-03-01T20:46:06Z
2023-02-19T18:30:21Z
null
['CVE-2014-125087']
java-xmlbuilder vulnerable to XML External Entity Reference
A vulnerability was found in java-xmlbuilder up to 1.1. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to xml external entity reference. Upgrading to version 1.2 is able to address this issue. The name of the patch is e6fddca201790abab4f2c274341c0bb8835c3e73. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-221480.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.jamesmurty.utils:java-xmlbuilder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-125087'}, {'type': 'WEB', 'url': 'https://github.com/jmurty/java-xmlbuilder/issues/6'}, {'type': 'WEB', 'url': 'https://github.com/jmurty/java-xmlbuilder/commit/e6fddca201790abab4f2c274341c0bb8835c3e73'}, {'type': 'PACKAGE', 'url': 'https://github.com/jmurty/java-xmlbuilder'}, {'type': 'WEB', 'url': 'https://github.com/jmurty/java-xmlbuilder/releases/tag/v1.2'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.221480'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.221480'}]
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-01T20:46:06Z', 'nvd_published_at': '2023-02-19T17:15:00Z'}
1.4.0
GHSA-22j4-qc48-j8f8
2023-02-08T22:42:21Z
2023-02-01T15:30:20Z
null
['CVE-2023-24997']
Apache InLong vulnerable to Deserialization of Untrusted Data vulnerability
Deserialization of Untrusted Data vulnerability in Apache Software Foundation Apache InLong. This issue affects Apache InLong: from 1.1.0 through 1.5.0. Users are advised to upgrade to Apache InLong's latest version or cherry-pick https://github.com/apache/inlong/pull/7223 to solve it.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.inlong:inlong'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'last_affected': '1.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24997'}, {'type': 'WEB', 'url': 'https://github.com/apache/inlong/pull/7223'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/inlong'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/nxvtxq7oxhwyzo9ty2hqz8rvh5r7ngd8'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-02T17:00:10Z', 'nvd_published_at': '2023-02-01T15:15:00Z'}
1.4.0
GHSA-3w96-p6vh-c298
2023-02-14T21:25:17Z
2023-02-14T15:30:27Z
null
['CVE-2023-0827']
Cross-site Scripting in pimcore
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 1.5.17.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.17'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0827'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/f4050586136cb4c44e3d6042111a1b87b340df95'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/75bc7d07-46a7-4ed9-a405-af4fc47fb422'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T21:25:17Z', 'nvd_published_at': '2023-02-14T13:15:00Z'}
1.4.0
GHSA-hjmr-xm25-36mh
2023-02-16T21:52:55Z
2023-02-08T09:30:24Z
null
['CVE-2023-0743']
Answer subject to Cross-site Scripting vulnerability
Cross-site Scripting (XSS) - Generic in GitHub repository answerdev/answer prior to 1.0.4.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0743'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/860b1a3bd8cfaa8827e6e6f50ab1d98fa4c2c816'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/366cf8bb-19f6-4388-b089-d0a260efd863'}]
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:39:02Z', 'nvd_published_at': '2023-02-08T08:15:00Z'}
1.4.0
GHSA-pc2q-jcxq-rjrr
2023-02-08T22:40:18Z
2023-02-08T18:18:05Z
null
['CVE-2023-25164']
Sensitive Information leak via Script File in TinaCMS
### Impact Sensitive Information leaked via script File in TinaCMS. Sites building with @tinacms/cli >= 1.0.0 && < 1.0.9 that store sensitive values in process.env var are impacted. If you're on a version prior to 1.0.0 this vulnerability does not affect you. If your Tina-enabled website has sensitive credentials stored as environment variables (eg. Algolia API keys) you should rotate those keys immediately. ### Patches This issue has been patched in @tinacms/cli@1.0.9 ### Workarounds Upgrading, and rotating secure & exposed keys is required for the proper fix. ### References https://github.com/tinacms/tinacms/pull/3584
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@tinacms/cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.9'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/tinacms/tinacms/security/advisories/GHSA-pc2q-jcxq-rjrr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25164'}, {'type': 'WEB', 'url': 'https://github.com/tinacms/tinacms/pull/3584'}, {'type': 'PACKAGE', 'url': 'https://github.com/tinacms/tinacms'}]
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T18:18:05Z', 'nvd_published_at': '2023-02-08T20:15:00Z'}
1.4.0
GHSA-r58m-v5pr-jhhq
2023-02-23T22:05:42Z
2023-02-16T00:30:28Z
null
['CVE-2020-19825']
Cross-site Scripting in kimai/kimai
Cross Site Scripting (XSS) vulnerability in kevinpapst kimai2 in /src/Twig/Runtime/MarkdownExtension.php, allows attackers to gain escalated privileges.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'kimai/kimai'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-19825'}, {'type': 'WEB', 'url': 'https://github.com/kevinpapst/kimai2/pull/962/files'}, {'type': 'WEB', 'url': 'https://github.com/kimai/kimai/pull/962'}, {'type': 'WEB', 'url': 'https://github.com/kevinpapst/kimai2'}, {'type': 'WEB', 'url': 'https://github.com/kimai/kimai/releases/tag/1.1'}, {'type': 'PACKAGE', 'url': 'https://github.com/kimai/kimai1'}]
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-16T14:10:11Z', 'nvd_published_at': '2023-02-15T22:15:00Z'}
1.4.0
GHSA-c57v-hc7m-8px2
2023-03-03T23:26:50Z
2023-02-23T21:30:16Z
null
['CVE-2023-0044']
Cross-site Scripting in Quarkus
If the Quarkus Form Authentication session cookie Path attribute is set to `/` then a cross-site attack may be initiated which might lead to the Information Disclosure. This attack can be prevented with the Quarkus CSRF Prevention feature.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.quarkus:quarkus-vertx-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.13.7.Final'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0044'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2023-0044'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2158081'}, {'type': 'PACKAGE', 'url': 'https://github.com/quarkusio/quarkus'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-23T22:15:09Z', 'nvd_published_at': '2023-02-23T20:15:00Z'}
1.4.0
GHSA-p2gm-ffr3-w2xw
2023-02-08T18:17:06Z
2023-02-08T18:17:06Z
null
[]
Nervos CKB vulnerable to low-resource flood DDoS attacks through network message
### Workarounds * forbid request genesis through network request * forbid requesting duplicate data through network request
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'ckb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.101.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/nervosnetwork/ckb/security/advisories/GHSA-p2gm-ffr3-w2xw'}, {'type': 'PACKAGE', 'url': 'https://github.com/nervosnetwork/ckb'}]
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T18:17:06Z', 'nvd_published_at': None}
1.4.0
GHSA-fjj4-2q73-jvgc
2023-02-08T18:15:28Z
2023-02-08T18:15:28Z
null
[]
Nervos CKB calculation of program load cycles may be missed when executing in resume mode
### Impact The calculation of program load cycles may be missed when executing in resume mode. Since the script execution order is now determined, this issue does not cause network splitting.
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'ckb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.100.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/nervosnetwork/ckb/security/advisories/GHSA-fjj4-2q73-jvgc'}, {'type': 'PACKAGE', 'url': 'https://github.com/nervosnetwork/ckb'}]
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T18:15:28Z', 'nvd_published_at': None}
1.4.0
GHSA-2275-rpf5-xv8h
2023-02-08T22:40:04Z
2023-02-01T06:30:30Z
null
['CVE-2022-25906']
is-http2 vulnerable to Improper Input Validation
All versions of the package is-http2 are vulnerable to Command Injection due to missing input sanitization or other checks, and sandboxes being employed to the isH2 function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'is-http2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25906'}, {'type': 'PACKAGE', 'url': 'https://github.com/stefanjudis/is-http2'}, {'type': 'WEB', 'url': 'https://github.com/stefanjudis/is-http2/blob/master/index.js#L23'}, {'type': 'WEB', 'url': 'https://github.com/stefanjudis/is-http2/blob/master/index.js%23L23'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-ISHTTP2-3153878'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-02T17:13:07Z', 'nvd_published_at': '2023-02-01T05:15:00Z'}
1.4.0
GHSA-r6cw-356h-mvwg
2023-02-23T22:08:30Z
2023-02-12T15:30:25Z
null
['CVE-2023-0788']
Code Injection in thorsten/phpmyfaq
Code Injection in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0788'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/77b42b9d0be3990ee7389207a71528b304b03039'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpMyFAQ'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/808d5452-607c-4af1-812f-26c49faf3e61'}]
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T01:03:33Z', 'nvd_published_at': '2023-02-12T14:15:00Z'}
1.4.0
GHSA-rj7m-2p3g-fjxg
2023-02-13T20:51:27Z
2023-02-06T06:30:25Z
null
['CVE-2022-25855']
create-choo-app3 is vulnerable to Command Injection via the devInstall function
All versions of the package create-choo-app3 are vulnerable to Command Injection via the devInstall function due to improper user-input sanitization.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'create-choo-app3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.12.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25855'}, {'type': 'PACKAGE', 'url': 'https://github.com/choojs/create-choo-app'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-CREATECHOOAPP3-3157951'}]
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-07T20:06:02Z', 'nvd_published_at': '2023-02-06T05:15:00Z'}
1.4.0
GHSA-x4qr-2fvf-3mr5
2023-03-01T01:47:38Z
2023-02-08T22:17:06Z
null
['CVE-2023-0286']
Vulnerable OpenSSL included in cryptography wheels
pyca/cryptography's wheels include a statically linked copy of OpenSSL. The versions of OpenSSL included in cryptography 0.8.1-39.0.0 are vulnerable to a security issue. More details about the vulnerabilities themselves can be found in https://www.openssl.org/news/secadv/20221213.txt and https://www.openssl.org/news/secadv/20230207.txt. If you are building cryptography source ("sdist") then you are responsible for upgrading your copy of OpenSSL. Only users installing from wheels built by the cryptography project (i.e., those distributed on PyPI) need to update their cryptography versions.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'cryptography'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8.1'}, {'fixed': '39.0.1'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '111.25.0'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '300.0.0'}, {'fixed': '300.0.12'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/security/advisories/GHSA-x4qr-2fvf-3mr5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0286'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2023-0286'}, {'type': 'WEB', 'url': 'https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.6.2-relnotes.txt'}, {'type': 'WEB', 'url': 'https://ftp.openbsd.org/pub/OpenBSD/patches/7.2/common/018_x509.patch.sig'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c6c9d439b484e1ba9830d8454a34fa4f80fdfe9'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2f7530077e0ef79d98718138716bc51ca0cad658'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fd2af07dc083a350c959147097003a14a5e8ac4d'}, {'type': 'PACKAGE', 'url': 'https://github.com/pyca/cryptography'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0006.html'}, {'type': 'WEB', 'url': 'https://www.openssl.org/news/secadv/20230207.txt'}]
{'cwe_ids': ['CWE-843'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:17:06Z', 'nvd_published_at': '2023-02-08T20:15:00Z'}
1.4.0
GHSA-p8r3-83r8-jwj5
2023-02-08T22:40:37Z
2023-02-08T18:19:56Z
null
['CVE-2023-25152']
Pterodactyl Wings contains UNIX Symbolic Link (Symlink) Following
### Impact This vulnerability impacts anyone running the affected versions of Wings. The vulnerability can be used to create new files and on the host system that previously did not exist, potentially allowing attackers to change their resource allocations, promote their containers to privileged mode, or potentially add ssh authorized keys to allow the attacker access to a remote shell on the target machine. In order to use this exploit, an attacker must have an existing "server" allocated and controlled by Wings. Information on how the exploitation of this vulnerability works will be released on February 24th, 2023 in North America. ### Patches This vulnerability has been resolved in version `v1.11.3` of Wings, and has been back-ported to the 1.7 release series in `v1.7.3`. Anyone running `v1.11.x` should upgrade to `v1.11.3` and anyone running `v1.7.x` should upgrade to `v1.7.3`. ### Workarounds None at this time.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/pterodactyl/wings'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/pterodactyl/wings'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pterodactyl/wings/security/advisories/GHSA-p8r3-83r8-jwj5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25152'}, {'type': 'WEB', 'url': 'https://github.com/pterodactyl/wings/commit/dac9685298c3c1c49b3109fa4241aa88272b9f14'}, {'type': 'PACKAGE', 'url': 'https://github.com/pterodactyl/wings'}, {'type': 'WEB', 'url': 'https://github.com/pterodactyl/wings/releases/tag/v1.11.3'}, {'type': 'WEB', 'url': 'https://github.com/pterodactyl/wings/releases/tag/v1.7.3'}]
{'cwe_ids': ['CWE-59', 'CWE-61'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T18:19:56Z', 'nvd_published_at': '2023-02-08T19:15:00Z'}
1.4.0
GHSA-5r9g-qh6m-jxff
2023-02-16T20:46:30Z
2023-02-16T20:46:30Z
null
['CVE-2023-23936']
CRLF Injection in Nodejs ‘undici’ via host
### Impact undici library does not protect `host` HTTP header from CRLF injection vulnerabilities. ### Patches This issue was patched in Undici v5.19.1. ### Workarounds Sanitize the `headers.host` string before passing to undici. ### References Reported at https://hackerone.com/reports/1820955. ### Credits Thank you to Zhipeng Zhang ([@timon8](https://hackerone.com/timon8)) for reporting this vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'undici'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '5.19.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/nodejs/undici/security/advisories/GHSA-5r9g-qh6m-jxff'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23936'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/undici/commit/a2eff05401358f6595138df963837c24348f2034'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1820955'}, {'type': 'PACKAGE', 'url': 'https://github.com/nodejs/undici'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/undici/releases/tag/v5.19.1'}]
{'cwe_ids': ['CWE-74', 'CWE-93'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-16T20:46:30Z', 'nvd_published_at': '2023-02-16T18:15:00Z'}
1.4.0
GHSA-5h8c-8ccp-8gmh
2023-02-08T21:48:39Z
2023-02-01T06:30:30Z
null
['CVE-2022-25916']
mt7688-wiscan is vulnerable to Command Injection due to improper input sanitization
Versions of the package mt7688-wiscan before 0.8.3 are vulnerable to Command Injection due to improper input sanitization in the 'wiscan.scan' function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'mt7688-wiscan'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25916'}, {'type': 'WEB', 'url': 'https://github.com/simenkid/mt7688-wiscan/commit/ff6d6567c65b4e972916a8fbc4533212f20a2fa5'}, {'type': 'PACKAGE', 'url': 'https://github.com/simenkid/mt7688-wiscan'}, {'type': 'WEB', 'url': 'https://github.com/simenkid/mt7688-wiscan/blob/master/index.js%23L22'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-MT7688WISCAN-3177394'}]
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T21:48:39Z', 'nvd_published_at': '2023-02-01T05:15:00Z'}
1.4.0
GHSA-6wxg-wh7f-rqpr
2023-04-14T21:35:17Z
2023-02-16T20:46:49Z
null
['CVE-2023-23926']
XML External Entity (XXE) vulnerability in apoc.import.graphml
### Impact A XML External Entity (XXE) vulnerability found in the apoc.import.graphml procedure of APOC core plugin in Neo4j graph database. XML External Entity (XXE) injection occurs when the XML parser allows external entities to be resolved. The XML parser used by the apoc.import.graphml procedure was not configured in a secure way and therefore allowed this. External entities can be used to read local files, send HTTP requests, and perform denial-of-service attacks on the application. Abusing the XXE vulnerability enabled assessors to read local files remotely. Although with the level of privileges assessors had this was limited to one-line files. With the ability to write to the database, any file could have been read. Additionally, assessors noted, with local testing, the server could be crashed by passing in improperly formatted XML. ### Patches The users should aim to use the latest released version compatible with their Neo4j version. The minimum versions containing patch for this vulnerability is 5.5.0. ### Workarounds If you cannot upgrade the library, you can control the [allowlist](https://neo4j.com/docs/operations-manual/current/reference/configuration-settings/#config_dbms.security.procedures.allowlist) of the procedures that can be used in your system. ### For more information If you have any questions or comments about this advisory: * Open an issue in [neo4j-apoc](https://github.com/neo4j/apoc) * Email us at [security@neo4j.com](mailto:security@neo4j.com) ### Credits We want to publicly recognise the contribution of Christopher Schneider – State Farm.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.neo4j.procedure:apoc-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.5.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.neo4j.procedure:apoc-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.0.14'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/neo4j/apoc/security/advisories/GHSA-6wxg-wh7f-rqpr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23926'}, {'type': 'WEB', 'url': 'https://github.com/neo4j/apoc/pull/310'}, {'type': 'WEB', 'url': 'https://github.com/neo4j/apoc/commit/f175f1f1f663d29fc151c297b56d154255eb7016'}, {'type': 'PACKAGE', 'url': 'https://github.com/neo4j/apoc'}, {'type': 'WEB', 'url': 'https://github.com/neo4j/apoc/releases/tag/5.5.0'}, {'type': 'WEB', 'url': 'https://neo4j.com/docs/operations-manual/current/reference/configuration-settings/#config_dbms.security.procedures.allowlist'}]
{'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-16T20:46:49Z', 'nvd_published_at': '2023-02-16T16:15:00Z'}
1.4.0
GHSA-2q79-56rq-8v3c
2023-03-03T22:55:46Z
2023-02-21T18:30:17Z
null
['CVE-2017-20178']
Codiad information disclosure vulnerability
A vulnerability was found in Codiad 2.8.0. It has been rated as problematic. Affected by this issue is the function saveJSON of the file components/install/process.php. The manipulation of the argument data leads to information disclosure. The attack may be launched remotely. Upgrading to version 2.8.1 is able to address this issue. The name of the patch is 517119de673e62547ee472a730be0604f44342b5. It is recommended to upgrade the affected component. VDB-221498 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'codiad/codiad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-20178'}, {'type': 'WEB', 'url': 'https://github.com/Codiad/Codiad/pull/974'}, {'type': 'WEB', 'url': 'https://github.com/Codiad/Codiad/commit/517119de673e62547ee472a730be0604f44342b5'}, {'type': 'PACKAGE', 'url': 'https://github.com/Codiad/Codiad'}, {'type': 'WEB', 'url': 'https://github.com/Codiad/Codiad/releases/tag/v.2.8.1'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.221498'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.221498'}]
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T22:55:46Z', 'nvd_published_at': '2023-02-21T18:15:00Z'}
1.4.0
GHSA-3gv2-29qc-v67m
2023-02-15T17:39:12Z
2023-02-01T18:48:06Z
null
['CVE-2022-24895']
Symfony vulnerable to Session Fixation of CSRF tokens
Description ----------- When authenticating users Symfony by default regenerates the session ID upon login, but preserves the rest of session attributes. Because this does not clear CSRF tokens upon login, this might enables [same-site attackers](https://canitakeyoursubdomain.name/) to bypass the CSRF protection mechanism by performing an attack similar to a session-fixation. Resolution ---------- Symfony removes all CSRF tokens from the session on successful login. The patch for this issue is available [here](https://github.com/symfony/symfony/commit/5909d74ecee359ea4982fcf4331aaf2e489a1fd4) for branch 4.4. Credits ------- We would like to thank Marco Squarcina for reporting the issue and Nicolas Grekas for fixing it.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '4.4.50'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.4.20'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.20'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.0'}, {'fixed': '6.1.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.2.0'}, {'fixed': '6.2.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '4.4.50'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.4.20'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.20'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.0'}, {'fixed': '6.1.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.2.0'}, {'fixed': '6.2.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/symfony/symfony/security/advisories/GHSA-3gv2-29qc-v67m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24895'}, {'type': 'WEB', 'url': 'https://github.com/symfony/security-bundle/commit/076fd2088ada33d760758d98ff07ddedbf567946'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/commit/5909d74ecee359ea4982fcf4331aaf2e489a1fd4'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/security-bundle/CVE-2022-24895.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2022-24895.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/symfony/symfony'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/07/msg00014.html'}, {'type': 'WEB', 'url': 'https://symfony.com/cve-2022-24895'}]
{'cwe_ids': ['CWE-384', 'CWE-613'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-01T18:48:06Z', 'nvd_published_at': '2023-02-03T22:15:00Z'}
1.4.0
GHSA-wxfj-84xf-7gxv
2023-03-08T23:14:00Z
2023-02-28T06:30:25Z
null
['CVE-2023-26105']
mde utilities contains Prototype Pollution
All versions of the package utilities are vulnerable to Prototype Pollution via the _mix function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'utilities'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26105'}, {'type': 'WEB', 'url': 'https://github.com/mde/utilities/issues/29'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-UTILITIES-3184491'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-06T21:55:12Z', 'nvd_published_at': '2023-02-28T05:15:00Z'}
1.4.0
GHSA-79jr-8fhm-8wv3
2023-03-03T23:19:18Z
2023-02-22T21:30:39Z
null
['CVE-2023-0846']
OpenNMS Horizon and Meridian vulnerable to Cross-site Scripting
Unauthenticated, stored cross-site scripting in the display of alarm reduction keys in multiple versions of OpenNMS Horizon and Meridian could allow an attacker access to confidential session information.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.opennms:opennms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '31.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0846'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/pull/5506/files'}, {'type': 'WEB', 'url': 'https://docs.opennms.com/meridian/2022/releasenotes/changelog.html#releasenotes-changelog-Meridian-2022.1.13'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenNMS/opennms'}, {'type': 'WEB', 'url': 'https://issues.opennms.org/browse/NMS-14877'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T22:59:29Z', 'nvd_published_at': '2023-02-22T19:15:00Z'}
1.4.0
GHSA-vxrh-cpg7-8vjr
2023-02-21T19:59:13Z
2023-02-08T22:22:12Z
null
['CVE-2023-0217']
openssl-src subject to NULL dereference validating DSA public key
An invalid pointer dereference on read can be triggered when an application tries to check a malformed DSA public key by the `EVP_PKEY_public_check()` function. This will most likely lead to an application crash. This function can be called on public keys supplied from untrusted sources which could allow an attacker to cause a denial of service attack. The TLS implementation in OpenSSL does not call this function but applications might call the function if there are additional security requirements imposed by standards such as FIPS 140-3.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '300.0.0'}, {'fixed': '300.0.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0217'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=23985bac83fd50c8e29431009302b5442f985096'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0012.html'}, {'type': 'WEB', 'url': 'https://www.openssl.org/news/secadv/20230207.txt'}]
{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:22:12Z', 'nvd_published_at': '2023-02-08T20:15:00Z'}
1.4.0
GHSA-jrwr-5x3p-hvc3
2023-03-06T19:44:07Z
2023-02-23T00:30:40Z
null
['CVE-2023-26302']
markdown-it-py Denial of Service vulnerability in the command line interface
Denial of service could be caused to the command line interface of markdown-it-py, before v2.2.0, if an attacker was allowed to use invalid UTF-8 characters as input.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'markdown-it-py'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26302'}, {'type': 'WEB', 'url': 'https://github.com/executablebooks/markdown-it-py/pull/247'}, {'type': 'WEB', 'url': 'https://github.com/executablebooks/markdown-it-py/commit/53ca3e9c2b9e9b295f6abf7f4ad2730a9b70f68c'}, {'type': 'PACKAGE', 'url': 'https://github.com/executablebooks/markdown-it-py'}, {'type': 'WEB', 'url': 'https://github.com/executablebooks/markdown-it-py/releases/tag/v2.2.0'}]
{'cwe_ids': ['CWE-173'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-23T19:40:54Z', 'nvd_published_at': '2023-02-22T23:15:00Z'}
1.4.0
GHSA-h685-83w4-3ph3
2023-02-22T00:10:03Z
2023-02-21T15:30:23Z
null
['CVE-2021-32860']
iziModal Cross-site Scripting vulnerability
iziModal is a modal plugin with jQuery. Versions prior to 1.6.1 are vulnerable to cross-site scripting (XSS) when handling untrusted modal titles. An attacker who is able to influence the field `title` when creating a `iziModal` instance is able to supply arbitrary `html` or `javascript` code that will be rendered in the context of a user, potentially leading to `XSS`. Version 1.6.1 contains a patch for this issue
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'izimodal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32860'}, {'type': 'WEB', 'url': 'https://github.com/marcelodolza/iziModal/issues/249'}, {'type': 'WEB', 'url': 'https://github.com/marcelodolza/iziModal/commit/01728ac52bac5c1b4512087dafe0ad8b091fdc9e'}, {'type': 'PACKAGE', 'url': 'https://github.com/marcelodolza/iziModal'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2021-1044_iziModal/'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T00:10:03Z', 'nvd_published_at': '2023-02-21T15:15:00Z'}
1.4.0
GHSA-h8p2-8g72-qpgh
2023-03-06T21:58:46Z
2023-02-24T12:31:20Z
null
['CVE-2023-25692']
Apache Airflow Google Provider Improper Input Validation vulnerability
Improper Input Validation vulnerability in the Apache Airflow Google Provider. This issue affects Apache Airflow Google Provider versions before 8.10.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow-providers-google'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.10.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25692'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/29499'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/ks4l78l5rwdpmvfn7y7yhs179nyxtlsh'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-24T16:25:37Z', 'nvd_published_at': '2023-02-24T12:15:00Z'}
1.4.0
GHSA-fj78-2vc5-f6cm
2023-02-22T00:05:05Z
2023-02-22T00:05:05Z
null
['CVE-2023-25805']
Versionn Command Injection Vulnerability
### Impact Command Injection Vulnerability. All versions <1.1.0 are affected. ### Patches Please upgrade to versionn@1.1.0
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'versionn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/commenthol/versionn/security/advisories/GHSA-fj78-2vc5-f6cm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25805'}, {'type': 'WEB', 'url': 'https://github.com/commenthol/versionn/commit/2ca128823efe962b37f2698f0eb530c2b124842d'}, {'type': 'PACKAGE', 'url': 'https://github.com/commenthol/versionn'}]
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T00:05:05Z', 'nvd_published_at': '2023-02-20T16:15:00Z'}
1.4.0
GHSA-5r5m-65gx-7vrh
2023-06-13T23:47:42Z
2023-02-08T22:32:16Z
null
['CVE-2023-25151']
otelhttp and otelbeego have DoS vulnerability for high cardinality metrics
### Impact The [v0.38.0](https://github.com/open-telemetry/opentelemetry-go-contrib/releases/tag/v1.13.0) release of [`go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp`](https://github.com/open-telemetry/opentelemetry-go-contrib/blob/463c2e7cd69d25f40b0a595b05394eeb26c68ae2/instrumentation/net/http/otelhttp/handler.go#L218) uses the [`httpconv.ServerRequest`](https://github.com/open-telemetry/opentelemetry-go/blob/v1.12.0/semconv/internal/v2/http.go#L159) function to annotate metric measurements for the `http.server.request_content_length`, `http.server.response_content_length`, and `http.server.duration` instruments. The `ServerRequest` function sets the `http.target` attribute value to be the whole request URI (including the query string)[^1]. The metric instruments do not "forget" previous measurement attributes when `cumulative` temporality is used, this means the cardinality of the measurements allocated is directly correlated with the unique URIs handled. If the query string is constantly random, this will result in a constant increase in memory allocation that can be used in a denial-of-service attack. Pseudo-attack: ``` for infinite loop { r := generate_random_string() do_http_request("/some/path?random="+r) } ``` ### Patches - `go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp` - v0.39.0 - `go.opentelemetry.io/contrib/instrumentation/github.com/astaxie/beego/otelbeego` - v0.39.0 [^1]: https://github.com/open-telemetry/opentelemetry-go/blob/6cb5718eaaed5c408c3bf4ad1aecee5c20ccdaa9/semconv/internal/v2/http.go#L202-L208
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.38.0'}, {'fixed': '0.39.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'go.opentelemetry.io/contrib/instrumentation/github.com/astaxie/beego/otelbeego'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.38.0'}, {'fixed': '0.39.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/open-telemetry/opentelemetry-go-contrib/security/advisories/GHSA-5r5m-65gx-7vrh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25151'}, {'type': 'PACKAGE', 'url': 'https://github.com/open-telemetry/opentelemetry-go-contrib'}, {'type': 'WEB', 'url': 'https://github.com/open-telemetry/opentelemetry-go/blob/v1.12.0/semconv/internal/v2/http.go#L159'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:32:16Z', 'nvd_published_at': '2023-02-08T20:15:00Z'}
1.4.0
GHSA-mrrw-grhq-86gf
2023-02-28T20:30:10Z
2023-02-28T20:30:10Z
null
[]
Ascii (crate) allows out-of-bounds array indexing in safe code
Affected version of this crate had implementation of `From<&mut AsciiStr>` for `&mut [u8]` and `&mut str`. This can result in out-of-bounds array indexing in safe code. The flaw was corrected in commit [8a6c779](https://github.com/tomprogrammer/rust-ascii/pull/63/commits/8a6c7798c202766bd57d70fb8d12739dd68fb9dc) by removing those impls.
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'ascii'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.6.0'}, {'fixed': '0.9.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/tomprogrammer/rust-ascii/issues/64'}, {'type': 'WEB', 'url': 'https://github.com/tomprogrammer/rust-ascii/pull/63/commits/8a6c7798c202766bd57d70fb8d12739dd68fb9dc'}, {'type': 'PACKAGE', 'url': 'https://github.com/tomprogrammer/rust-ascii'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0015.html'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-28T20:30:10Z', 'nvd_published_at': None}
1.4.0
GHSA-h45f-rjvw-2rv2
2023-02-08T20:54:38Z
2023-02-01T12:32:41Z
2023-02-02T19:26:25Z
[]
Withdrawn: wallabag subject to Improper Authorization
## Duplicate advisory This advisory has been withdrawn because it is a duplicate of [GHSA-qwx8-mxxx-mg96](https://github.com/advisories/GHSA-qwx8-mxxx-mg96). This link is maintained to preserve external references. ## Original Description Improper Authorization in GitHub repository wallabag/wallabag prior to 2.5.3.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'wallabag/wallabag'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-alpha.1'}, {'fixed': '2.5.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0609'}, {'type': 'WEB', 'url': 'https://github.com/wallabag/wallabag/commit/0f7460dbab9e29f4f7d2944aca20210f828b6abb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3adef66f-fc86-4e6d-a540-2ffa59342ff0'}]
{'cwe_ids': ['CWE-285'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-02T19:26:25Z', 'nvd_published_at': '2023-02-01T12:15:00Z'}
1.4.0
GHSA-p2hp-3wv3-4w74
2023-03-08T17:22:31Z
2023-02-24T21:30:18Z
null
['CVE-2022-44310']
ecdh vulnerable to Exposure of Resource to Wrong Sphere
In Development IL ecdh before 0.2.0, an attacker can send an invalid point (not on the curve) as the public key, and obtain the derived shared secret.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'ecdh'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-44310'}, {'type': 'WEB', 'url': 'https://github.com/developmentil/ecdh/issues/3'}, {'type': 'WEB', 'url': 'https://github.com/developmentil/ecdh/pull/4'}, {'type': 'WEB', 'url': 'https://github.com/developmentil/ecdh/commit/ef4560e7233f4e8107a17a77bc540121599c78fa'}, {'type': 'PACKAGE', 'url': 'https://github.com/developmentil/ecdh'}]
{'cwe_ids': ['CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-08T17:22:31Z', 'nvd_published_at': '2023-02-24T20:15:00Z'}
1.4.0
GHSA-q3r2-23r8-wqr9
2023-03-08T17:21:27Z
2023-02-26T06:30:15Z
null
['CVE-2023-26091']
frp_form_answers allows Cross-site Scripting
The frp_form_answers (aka Forms Export) extension before 3.1.2, and 4.x before 4.0.2, for TYPO3 allows XSS via saved emails.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'frappant/frp-form-answers'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'frappant/frp-form-answers'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26091'}, {'type': 'WEB', 'url': 'https://github.com/frappant/frp_form_answers/commit/39fa16c8c792abdfc33e38bae17847364ff6a71d'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/frappant/frp-form-answers/CVE-2023-26091.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/frappant/frp_form_answers'}, {'type': 'WEB', 'url': 'https://typo3.org/help/security-advisories'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2023-002'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-08T17:21:27Z', 'nvd_published_at': '2023-02-26T05:15:00Z'}
1.4.0
GHSA-mv37-xrmc-hf64
2023-02-22T00:10:33Z
2023-02-21T15:30:23Z
null
['CVE-2021-32856']
Microweber Cross-site Scripting vulnerability
Microweber is a drag and drop website builder and content management system. Versions 1.2.12 and prior are vulnerable to copy-paste cross-site scripting (XSS). For this particular type of XSS, the victim needs to be fooled into copying a malicious payload into the text editor. A fix was attempted in versions 1.2.9 and 1.2.12, but it is incomplete.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32856'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/f3b86d59ab674dbf514f9f9948ddfa091739ab75'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2021-1005-Microweber/'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T00:10:33Z', 'nvd_published_at': '2023-02-21T15:15:00Z'}