cve_id
stringlengths
13
16
hash
stringlengths
40
40
repo_url
stringlengths
25
73
cve_description
stringlengths
64
3.9k
cvss2_base_score
float64
1.2
10
cvss3_base_score
float64
2.2
10
published_date
stringdate
1999-06-23 04:00:00
2024-07-22 18:15:00
severity
stringclasses
4 values
cwe_id
stringclasses
269 values
cwe_name
stringclasses
269 values
cwe_description
stringclasses
268 values
commit_message
stringlengths
0
46.8k
commit_date
stringlengths
25
25
version_tag
stringlengths
3
36
repo_total_files
int64
1
169k
repo_total_commits
int64
2
1.4M
file_paths
listlengths
0
53.6k
language
stringclasses
27 values
diff_stats
stringlengths
2
4.23M
diff_with_context
stringlengths
0
654M
vulnerable_code
stringlengths
0
55.3M
fixed_code
stringlengths
0
622M
security_keywords
listlengths
0
5
CVE-2024-24746
d42a0ebe6632bd0c318560e4293a522634f60594
https://github.com/apache/mynewt-nimble
[{'lang': 'en', 'value': "Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in Apache NimBLE.\xa0\n\nSpecially crafted GATT operation can cause infinite loop in GATT server leading to denial of service in Bluetooth stack or device.\n\nThis issue affects Apache NimBLE: through 1.6.0.\nUsers are recomm...
null
null
2024-04-06T12:15Z
nan
CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.
nimble/host: Fix disconnect on host connection timeout We don't need to have double loop and lock-unlock host lock when issuing disconnect. ble_gap_terminate_with_conn() can be used to disconnect and it can be called with already provided conn object under host lock.
2024-02-14 21:27:16 +0100
d42a0ebe
1,024
2
[ "nimble/host/src/ble_hs_conn.c" ]
C
{"nimble/host/src/ble_hs_conn.c": {"lines_added": 49, "lines_deleted": 62}}
diff --git a/nimble/host/src/ble_hs_conn.c b/nimble/host/src/ble_hs_conn.c index 9b7bdbb3..57ba16af 100644 --- a/nimble/host/src/ble_hs_conn.c +++ b/nimble/host/src/ble_hs_conn.c @@ -475,90 +475,77 @@ ble_hs_conn_timer(void) return BLE_HS_FOREVER; #endif struct ble_hs_conn *conn; - ble_npl_time_t now;...
ble_npl_time_t now; int32_t next_exp_in; uint16_t conn_handle; for (;;) { conn_handle = BLE_HS_CONN_HANDLE_NONE; next_exp_in = BLE_HS_FOREVER; now = ble_npl_time_get(); ble_hs_lock(); /* This loop performs one of two tasks: * 1. Determine if any connecti...
ble_npl_time_t now = ble_npl_time_get(); int32_t next_exp_in = BLE_HS_FOREVER; int32_t next_exp_in_new; bool next_exp_in_updated; ble_hs_lock(); /* This loop performs one of two tasks: * 1. Determine if any connections need to be terminated due to timeout. If * so connection is disc...
[]
CVE-2020-7763
b5d2da2639a49a95e0bdb3bc0c987cb6406b8259
https://github.com/pofider/phantom-html-to-pdf
[{'lang': 'en', 'value': 'This affects the package phantom-html-to-pdf before 0.6.1.'}]
5
7.5
2020-11-05T14:15Z
MEDIUM
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the...
fix access to files without protocol
2020-11-02 15:51:26 +0100
b5d2da2
20
2
[ "lib/scripts/conversionScriptPart.js", "test/test.js" ]
JavaScript
{"lib/scripts/conversionScriptPart.js": {"lines_added": 7, "lines_deleted": 7}, "test/test.js": {"lines_added": 33, "lines_deleted": 18}}
diff --git a/lib/scripts/conversionScriptPart.js b/lib/scripts/conversionScriptPart.js index 20c8f42..044ab07 100644 --- a/lib/scripts/conversionScriptPart.js +++ b/lib/scripts/conversionScriptPart.js @@ -17,23 +17,23 @@ if(body.cookies.length > 0) { page.onResourceRequested = function (request, networkRequest) { ...
} //potentially dangerous request if (request.url.lastIndexOf("file:///", 0) === 0 && !body.allowLocalFilesAccess) { networkRequest.abort(); return; } var should = require("should"), fs = require("fs"), }); it('should create a pdf file ignoring ssl errors', function...
} //potentially dangerous request if (request.url.lastIndexOf("http://", 0) !== 0 && request.url.lastIndexOf("https://", 0) && !body.allowLocalFilesAccess) { networkRequest.abort(); return; } var should = require("should"), fs = require("fs"), }); ...
[]
CVE-2023-51665
728496010cbfcee5b7b54001c9f79e02ede30d82
https://github.com/advplyr/audiobookshelf
[{'lang': 'en', 'value': 'Audiobookshelf is a self-hosted audiobook and podcast server. Prior to 2.7.0, Audiobookshelf is vulnerable to unauthenticated blind server-side request (SSRF) vulnerability in Auth.js. This vulnerability has been addressed in version 2.7.0. There are no known workarounds for this vulnerability...
null
7.5
2023-12-27T18:15Z
nan
CWE-918
Server-Side Request Forgery (SSRF)
The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.
Update:/auth/openid/config API endpoint to require admin user and validate issuer URL
2023-12-17 10:41:39 -0600
72849601
934
2
[ "server/Auth.js" ]
JavaScript
{"server/Auth.js": {"lines_added": 27, "lines_deleted": 6}}
diff --git a/server/Auth.js b/server/Auth.js index 0a282c9c..d2334de2 100644 --- a/server/Auth.js +++ b/server/Auth.js @@ -294,11 +294,11 @@ class Auth { // We will allow if it is in the whitelist, by saving it into this.openIdAuthSession and setting the redirect uri to /auth/openid/mobile-redirect //...
(Database.serverSettings.authOpenIDMobileRedirectURIs.length === 1 && Database.serverSettings.authOpenIDMobileRedirectURIs[0] === '*')) { * Used to auto-populate the openid URLs in config/authentication router.get('/auth/openid/config', async (req, res) => { const configUrl = `${issuerUrl...
(Database.serverSettings.authOpenIDMobileRedirectURIs.length === 1 && Database.serverSettings.authOpenIDMobileRedirectURIs[0] === '*')) { * Helper route used to auto-populate the openid URLs in config/authentication * Takes an issuer URL as a query param and requests the config data at "/.well-kn...
[ "validation", "authentication" ]
CVE-2023-51697
f2f2ea161ca0701e1405e737b0df0f96296e4f64
https://github.com/advplyr/audiobookshelf
[{'lang': 'en', 'value': 'Audiobookshelf is a self-hosted audiobook and podcast server. Prior to 2.7.0, Audiobookshelf is vulnerable to unauthenticated blind server-side request (SSRF) vulnerability in `podcastUtils.js`. This vulnerability has been addressed in version 2.7.0. There are no known workarounds for this vul...
null
7.5
2023-12-27T18:15Z
nan
CWE-918
Server-Side Request Forgery (SSRF)
The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.
Update:API endpoint /podcasts/feed validates rssFeed URL and uses SSRF req filter
2023-12-17 12:00:11 -0600
f2f2ea16
934
2
[ "server/controllers/PodcastController.js", "server/utils/index.js", "server/utils/podcastUtils.js" ]
JavaScript
{"server/controllers/PodcastController.js": {"lines_added": 12, "lines_deleted": 2}, "server/utils/index.js": {"lines_added": 22, "lines_deleted": 6}, "server/utils/podcastUtils.js": {"lines_added": 23, "lines_deleted": 5}}
diff --git a/server/controllers/PodcastController.js b/server/controllers/PodcastController.js index 035f9152..e476efd5 100644 --- a/server/controllers/PodcastController.js +++ b/server/controllers/PodcastController.js @@ -4,10 +4,11 @@ const Database = require('../Database') const fs = require('../libs/fsExtra') ...
var url = req.body.rssFeed return res.status(400).send('Bad request') Array(str1.length + 1).fill(null)); track[0][i] = i; track[j][0] = j; const indicator = str1[i - 1] === str2[j - 1] ? 0 : 1; ); return track[str2.length][str1.length]; const Logger = require('../Logger') return a...
const { validateUrl } = require('../utils/index') /** * POST: /api/podcasts/feed * * @typedef getPodcastFeedReqBody * @property {string} rssFeed * * @param {import('express').Request<{}, {}, getPodcastFeedReqBody, {}} req * @param {import('express').Response} res */ const url = validat...
[ "sanitization", "validation" ]
CVE-2024-35236
ce7f891b9b2cb57c6644aaf96f89a8bda6307664
https://github.com/advplyr/audiobookshelf
[{'lang': 'en', 'value': 'Audiobookshelf is a self-hosted audiobook and podcast server. Prior to version 2.10.0, opening an ebook with malicious scripts inside leads to code execution inside the browsing context. Attacking a user with high privileges (upload, creation of libraries) can lead to remote code execution (RC...
null
null
2024-05-27T17:15Z
nan
NVD-CWE-noinfo
Insufficient Information
There is insufficient information about the issue to classify it; details are unkown or unspecified.
Update:Disable epubs from running scripts by default, add library setting to enable it GHSA-7j99-76cj-q9pg
2024-05-26 16:01:08 -0500
ce7f891b9
934
2
[ "client/components/modals/libraries/LibrarySettings.vue", "client/components/readers/EpubReader.vue", "client/store/libraries.js", "client/strings/bg.json", "client/strings/bn.json", "client/strings/cs.json", "client/strings/da.json", "client/strings/de.json", "client/strings/en-us.json", "client/...
JSON
{"client/components/modals/libraries/LibrarySettings.vue": {"lines_added": 15, "lines_deleted": 1}, "client/components/readers/EpubReader.vue": {"lines_added": 4, "lines_deleted": 1}, "client/store/libraries.js": {"lines_added": 29, "lines_deleted": 25}, "client/strings/bg.json": {"lines_added": 2, "lines_deleted": 0},...
diff --git a/client/components/modals/libraries/LibrarySettings.vue b/client/components/modals/libraries/LibrarySettings.vue index 4183c4fe4..3808ed07b 100644 --- a/client/components/modals/libraries/LibrarySettings.vue +++ b/client/components/modals/libraries/LibrarySettings.vue @@ -58,10 +58,21 @@ <span ...
</script> allowScriptedContent: true, getCurrentLibrary: state => { return state.libraries.find(lib => lib.id === state.currentLibraryId) getSortedLibraries: state => () => { return state.libraries.map(lib => ({ ...lib })).sort((a, b) => a.displayOrder - b.displayOrder) getLibraryProvider: state =...
<div v-if="isBookLibrary" class="py-3"> <div class="flex items-center"> <ui-toggle-switch v-model="epubsAllowScriptedContent" @input="formUpdated" /> <ui-tooltip :text="$strings.LabelSettingsEpubsAllowScriptedContentHelp"> <p class="pl-4 text-base"> {{ $strings.LabelSetti...
[]
CVE-2021-4265
924d16008cfcc09356c87db01848e45290cb58ca
https://github.com/siwapp/siwapp-ror
[{'lang': 'en', 'value': 'A vulnerability was found in siwapp-ror. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to cross site scripting. The attack may be initiated remotely. The name of the patch is 924d16008cfcc09356c87db01848e45290cb58ca. It is recommended to a...
null
6.1
2022-12-21T19:15Z
nan
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Fix possible XSS issues (#365) * some fixes for old migrations, that allows new migrations * force ssl default true unless env var * check address no html tags
2021-10-19 11:07:49 +0200
924d160
334
2
[ "app/models/common.rb", "app/models/customer.rb", "config/environments/production.rb", "db/migrate/20160907152236_default_for_enabled.rb", "db/migrate/20160908093323_add_indexes_on_deleted_column.rb", "db/migrate/20160913081503_remove_status_from_commons.rb", "db/migrate/20160915000824_add_active_to_cus...
Ruby
{"app/models/common.rb": {"lines_added": 4, "lines_deleted": 0}, "app/models/customer.rb": {"lines_added": 4, "lines_deleted": 0}, "config/environments/production.rb": {"lines_added": 1, "lines_deleted": 1}, "db/migrate/20160907152236_default_for_enabled.rb": {"lines_added": 1, "lines_deleted": 1}, "db/migrate/20160908...
diff --git a/app/models/common.rb b/app/models/common.rb index 0c70c1d..388d781 100644 --- a/app/models/common.rb +++ b/app/models/common.rb @@ -29,10 +29,14 @@ class Common < ActiveRecord::Base validates :series, presence: true # from https://emailregex.com/ validates :email, format: {with: /\A([a-zA-Z0-...
# config.force_ssl = true class DefaultForEnabled < ActiveRecord::Migration class AddIndexesOnDeletedColumn < ActiveRecord::Migration class RemoveStatusFromCommons < ActiveRecord::Migration class AddActiveToCustomer < ActiveRecord::Migration class AddFailedToCommons < ActiveRecord::Migration class SeriesFirstNumber <...
validates :invoicing_address, format: { without: /<(.*)>.*?|<(.*) \/>/, message: "wrong format" } validates :shipping_address, format: { without: /<(.*)>.*?|<(.*) \/>/, message: "wrong format" } validates :invoicing_address, format: { without: /<(.*)>.*?|<(.*) \/>/, message: "Wrong address format" } ...
[ "validation" ]
CVE-2017-16876
5f06d724bc05580e7f203db2d4a4905fc1127f98
https://github.com/lepture/mistune
[{'lang': 'en', 'value': 'Cross-site scripting (XSS) vulnerability in the _keyify function in mistune.py in Mistune before 0.8.1 allows remote attackers to inject arbitrary web script or HTML by leveraging failure to escape the "key" argument.'}]
4.3
6.1
2017-12-29T15:29Z
MEDIUM
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Fix CVE-2017-16876
2017-11-21 00:15:09 +0900
5f06d72
127
3
[ "mistune.py" ]
Python
{"mistune.py": {"lines_added": 5, "lines_deleted": 3}}
diff --git a/mistune.py b/mistune.py index d6ecf7e..5b05fcb 100644 --- a/mistune.py +++ b/mistune.py @@ -9,11 +9,11 @@ """ import re import inspect -__version__ = '0.8' +__version__ = '0.8.1' __author__ = 'Hsiaoming Yang <me@lepture.com>' __all__ = [ 'BlockGrammar', 'BlockLexer', 'InlineGrammar', 'In...
__version__ = '0.8' return _key_pattern.sub(' ', key.lower()) r'<(\w+%s)((?:%s)*?)\s*>([\s\S]*?)<\/\1>' % (_valid_end, _valid_attr),
__version__ = '0.8.1' key = escape(key.lower(), quote=True) return _key_pattern.sub(' ', key) r'<(\w+%s)((?:%s)*?)\s*>([\s\S]*?)<\/\1>' % ( _valid_end, _valid_attr),
[]
CVE-2022-21159
cfa94cbf10302bedc779703f874ee2e8387a0721
https://github.com/mz-automation/libiec61850
[{'lang': 'en', 'value': 'A denial of service vulnerability exists in the parseNormalModeParameters functionality of MZ Automation GmbH libiec61850 1.5.0. A specially-crafted series of network requests can lead to denial of service. An attacker can send a sequence of malformed iec61850 messages to trigger this vulnerab...
5
7.5
2022-04-15T16:15Z
MEDIUM
CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.
- fixed - Bug in presentation layer parser can cause infinite loop (LIB61850-302)
2022-02-25 18:21:45 +0100
cfa94cb
896
3
[ "src/mms/iso_presentation/iso_presentation.c" ]
C
{"src/mms/iso_presentation/iso_presentation.c": {"lines_added": 4, "lines_deleted": 0}}
diff --git a/src/mms/iso_presentation/iso_presentation.c b/src/mms/iso_presentation/iso_presentation.c index 96fd8a3..e2ee12a 100644 --- a/src/mms/iso_presentation/iso_presentation.c +++ b/src/mms/iso_presentation/iso_presentation.c @@ -467,10 +467,14 @@ parseNormalModeParameters(IsoPresentation* self, uint8_t* buffer,...
if (bufPos < 0) return -1;
[]
CVE-2022-3976
10622ba36bb3910c151348f1569f039ecdd8786f
https://github.com/mz-automation/libiec61850
[{'lang': 'en', 'value': 'A vulnerability has been found in MZ Automation libiec61850 up to 1.4 and classified as critical. This vulnerability affects unknown code of the file src/mms/iso_mms/client/mms_client_files.c of the component MMS File Services. The manipulation of the argument filename leads to path traversal....
null
8.8
2022-11-13T14:15Z
nan
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the...
- fixed path traversal vulnerability in MMS file services (LIB61850-357)
2022-10-07 17:09:11 +0100
10622ba3
896
3
[ "hal/filesystem/linux/file_provider_linux.c", "src/mms/inc_private/mms_common_internal.h", "src/mms/iso_mms/client/mms_client_files.c", "src/mms/iso_mms/common/mms_common_msg.c", "src/mms/iso_mms/server/mms_file_service.c" ]
C
{"hal/filesystem/linux/file_provider_linux.c": {"lines_added": 0, "lines_deleted": 1}, "src/mms/inc_private/mms_common_internal.h": {"lines_added": 3, "lines_deleted": 0}, "src/mms/iso_mms/client/mms_client_files.c": {"lines_added": 30, "lines_deleted": 21}, "src/mms/iso_mms/common/mms_common_msg.c": {"lines_added": 19...
diff --git a/hal/filesystem/linux/file_provider_linux.c b/hal/filesystem/linux/file_provider_linux.c index dc869d96..7b501f00 100644 --- a/hal/filesystem/linux/file_provider_linux.c +++ b/hal/filesystem/linux/file_provider_linux.c @@ -35,11 +35,10 @@ struct sDirectoryHandle { DIR* handle; }; - FileHandle F...
MmsFileReadStateMachine* frsm = getFreeFrsm(connection); if (frsm != NULL) { MmsOutstandingCall obtainFileCall = mmsClient_getMatchingObtainFileRequest(connection, filename); if (obtainFileCall) { if (DEBUG_MMS_CLIENT) printf("MMS_CLIENT: fil...
LIB61850_INTERNAL bool mmsMsg_isFilenameSave(const char* filename); if (mmsMsg_isFilenameSave(filename) == false) { /* potential attack */ if (DEBUG_MMS_CLIENT) printf("MMS_CLIENT: client provided unsave filename -> rejected\n"); mmsMsg_createServiceErrorPdu...
[]
CVE-2023-27772
79a8eaf26070e02044afc4b2ffbfe777dfdf3e0b
https://github.com/mz-automation/libiec61850
[{'lang': 'en', 'value': 'libiec61850 v1.5.1 was discovered to contain a segmentation violation via the function ControlObjectClient_setOrigin() at /client/client_control.c.'}]
null
7.5
2023-04-13T18:15Z
nan
CWE-754
Improper Check for Unusual or Exceptional Conditions
The product does not check or incorrectly checks for unusual or exceptional conditions that are not expected to occur frequently during day to day operation of the product.
- added missing checks in iec61850_client_example_control (#442)
2023-02-24 11:07:09 +0000
79a8eaf2
896
3
[ "examples/iec61850_client_example_control/client_example_control.c" ]
C
{"examples/iec61850_client_example_control/client_example_control.c": {"lines_added": 106, "lines_deleted": 77}}
diff --git a/examples/iec61850_client_example_control/client_example_control.c b/examples/iec61850_client_example_control/client_example_control.c index 33da635a..37d6b6bc 100644 --- a/examples/iec61850_client_example_control/client_example_control.c +++ b/examples/iec61850_client_example_control/client_example_control...
if (error == IED_ERROR_OK) { MmsValue* ctlVal = MmsValue_newBoolean(true); ControlObjectClient_setOrigin(control, NULL, 3); if (ControlObjectClient_operate(control, ctlVal, 0 /* operate now */)) { printf("simpleIOGenericIO/GGIO1.SPCSO1 operated successfully\n"); } ...
if (error == IED_ERROR_OK) { MmsValue* ctlVal = NULL; MmsValue* stVal = NULL; if (control) { ctlVal = MmsValue_newBoolean(true); ControlObjectClient_setOrigin(control, NULL, 3); if (ControlObjectClient_operate(control, ctlVal, 0 /* operate now ...
[ "validation" ]
CVE-2019-25087
1a0de56e4dafff9c2f9c8f6b130a764f7a50df52
https://github.com/RamseyK/httpserver
[{'lang': 'en', 'value': "A vulnerability was found in RamseyK httpserver. It has been rated as critical. This issue affects the function ResourceHost::getResource of the file src/ResourceHost.cpp of the component URI Handler. The manipulation of the argument uri leads to path traversal: '../filedir'. The attack may be...
null
7.5
2022-12-27T09:15Z
nan
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the...
Deny any directory traversal paths. README update
2019-09-08 11:23:20 -0500
1a0de56
26
2
[ "README.md", "src/HTTPServer.cpp", "src/ResourceHost.cpp" ]
C++
{"README.md": {"lines_added": 4, "lines_deleted": 1}, "src/HTTPServer.cpp": {"lines_added": 1, "lines_deleted": 1}, "src/ResourceHost.cpp": {"lines_added": 3, "lines_deleted": 0}}
diff --git a/README.md b/README.md index ec0ba22..db89830 100755 --- a/README.md +++ b/README.md @@ -1,15 +1,18 @@ # HTTP Server Ramsey Kant https://github.com/RamseyK/httpserver -A high performance, single threaded, HTTP server written in C++ to serve as a kqueue socket management and HTTP protocol learning too...
A high performance, single threaded, HTTP server written in C++ to serve as a kqueue socket management and HTTP protocol learning tool std::cout << req->getHeaderStr(i) << std::endl;
A high performance, single threaded, HTTP server written in C++ to serve as a kqueue socket management and HTTP protocol learning tool on BSD systems ## Compiling Notes * On FreeBSD, compile with gmake std::cout << "\t" << req->getHeaderStr(i) << std::endl; if (uri.find("../") != std::string::npos) return NULL;
[]
CVE-2014-2829
586d96cc12ef218243a3466354b4d208b5472a6c
https://github.com/esl/MongooseIM
[{'lang': 'en', 'value': 'Erlang Solutions MongooseIM through 1.3.1 rev. 2 does not properly restrict the processing of compressed XML elements, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XMPP stream, aka an "xmppbomb" attack.'}]
7.8
null
2014-04-11T01:55Z
HIGH
CWE-264
Permissions, Privileges, and Access Controls
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Merge pull request #167 from esl/zlib_cwe400_fix Add zlib inflated data size limit
2014-04-09 15:05:37 +0200
586d96cc
1,451
3
[]
Unknown
{"apps/ejabberd/c_src/ejabberd_zlib_drv.c": {"lines_added": 79, "lines_deleted": 72}, "apps/ejabberd/src/ejabberd_c2s.erl": {"lines_added": 20, "lines_deleted": 18}, "apps/ejabberd/src/ejabberd_receiver.erl": {"lines_added": 10, "lines_deleted": 2}, "apps/ejabberd/src/ejabberd_socket.erl": {"lines_added": 4, "lines_del...
[]
CVE-2020-15084
7ecab5f8f0cab5297c2b863596566eb0c019cdef
https://github.com/auth0/express-jwt
[{'lang': 'en', 'value': 'In express-jwt (NPM package) up and including version 5.3.3, the algorithms entry to be specified in the configuration is not being enforced. When algorithms is not specified in the configuration, with the combination of jwks-rsa, it may lead to authorization bypass. You are affected by this v...
4.3
9.1
2020-06-30T16:15Z
MEDIUM
CWE-863
Incorrect Authorization
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.
Merge pull request from GHSA-6g6m-m6h5-w9gf Made algorithms mandatory
2020-06-29 16:36:49 -0300
7ecab5f
20
3
[]
Unknown
{"lib/index.js": {"lines_added": 3, "lines_deleted": 0}, "package.json": {"lines_added": 1, "lines_deleted": 1}, "test/jwt.test.js": {"lines_added": 46, "lines_deleted": 29}, "test/multitenancy.test.js": {"lines_added": 4, "lines_deleted": 2}, "test/revocation.test.js": {"lines_added": 2, "lines_deleted": 0}, "test/str...
[]
CVE-2016-7149
9a4ab85439d1b838ee7b8eeebbf59174bb787811
https://github.com/b2evolution/b2evolution
[{'lang': 'en', 'value': 'Cross-site scripting (XSS) vulnerability in b2evolution 6.7.5 and earlier allows remote attackers to inject arbitrary web script or HTML via vectors related to the autolink function.'}]
4.3
6.1
2017-01-18T17:59Z
MEDIUM
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Fix autolink function to avoid XSS issue
2016-08-12 18:11:18 +0300
9a4ab8543
2,948
3
[ "_tests/blogs/evocore/misc.funcs.simpletest.php", "inc/_core/_misc.funcs.php" ]
PHP
{"_tests/blogs/evocore/misc.funcs.simpletest.php": {"lines_added": 3, "lines_deleted": 0}, "inc/_core/_misc.funcs.php": {"lines_added": 4, "lines_deleted": 4}}
diff --git a/_tests/blogs/evocore/misc.funcs.simpletest.php b/_tests/blogs/evocore/misc.funcs.simpletest.php index cd2fe71cb..a58d5b943 100644 --- a/_tests/blogs/evocore/misc.funcs.simpletest.php +++ b/_tests/blogs/evocore/misc.funcs.simpletest.php @@ -52,10 +52,13 @@ class MiscFuncsTestCase extends EvoUnitTestCase ...
array( '#(^|[\s>\(]|\[url=)(https?|mailto)://([^<>{}\s]+[^.,:;!\?<>{}\s\]\)])#i', '#(^|[\s>\(]|\[url=)aim:([^,<\s\]\)]+)#i', '#(^|[\s>\(]|\[url=)www\.'.$pattern_domain.'([^<>{}\s]*[^.,:;!\?\s\]\)])#i', '#(^|[\s>\(]|\[url=)([a-z0-9\-_.]+?)@'.$pattern_domain.'([^.,:;!\?<\s\]\)]+)#i', ),
// XSS sample: 'text http://test_url.test"onmouseover="alert(1)"onerror=1 "text' => 'text <a href="http://test_url.test">http://test_url.test</a>"onmouseover="alert(1)"onerror=1 "text', array( '#(^|[\s>\(]|\[url=)(https?|mailto)://([^"<>{}\s]+[^".,:;!\?<>{}\s\]\)])#i', '#(^|[\s>\(]|\[url=)aim:([^",<\s\]\)...
[]
CVE-2016-7150
dd975fff7fce81bf12f9c59edb1a99475747c83c
https://github.com/b2evolution/b2evolution
[{'lang': 'en', 'value': 'Cross-site scripting (XSS) vulnerability in b2evolution 6.7.5 and earlier allows remote authenticated users to inject arbitrary web script or HTML via the site name.'}]
3.5
5.4
2017-01-18T17:59Z
LOW
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Fix XSS vulnerability on "site name"
2016-08-12 18:24:55 +0300
dd975fff7f
2,948
3
[ "skins_site/_site_body_header.inc.php" ]
PHP
{"skins_site/_site_body_header.inc.php": {"lines_added": 2, "lines_deleted": 2}}
diff --git a/skins_site/_site_body_header.inc.php b/skins_site/_site_body_header.inc.php index 70e3c21796..99e63b9a90 100644 --- a/skins_site/_site_body_header.inc.php +++ b/skins_site/_site_body_header.inc.php @@ -15,12 +15,12 @@ global $baseurl, $Settings; <nav class="sitewide_header"> <?php if( $Settings->get( ...
$site_title = $Settings->get( 'notification_long_name' ) != '' ? ' title="'.$Settings->get( 'notification_long_name' ).'"' : ''; $site_name_text = '<img src="'.$Settings->get( 'notification_logo' ).'" alt="'.$Settings->get( 'notification_short_name' ).'"'.$site_title.' />';
$site_title = $Settings->get( 'notification_long_name' ) != '' ? ' title="'.format_to_output( $Settings->get( 'notification_long_name' ), 'htmlattr' ).'"' : ''; $site_name_text = '<img src="'.$Settings->get( 'notification_logo' ).'" alt="'.format_to_output( $Settings->get( 'notification_short_name' ), 'htmlattr' ).'"...
[]
CVE-2016-8901
999b5ad1d59760d7e450ceb541f55432fc74cd27
https://github.com/b2evolution/b2evolution
[{'lang': 'en', 'value': 'b2evolution 6.7.6 suffer from an Object Injection vulnerability in /htsrv/call_plugin.php.'}]
7.5
9.8
2019-05-23T18:29Z
HIGH
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Fix object injection vulnerability
2016-10-03 10:40:07 +0300
999b5ad1d5
2,948
3
[ "htsrv/call_plugin.php" ]
PHP
{"htsrv/call_plugin.php": {"lines_added": 1, "lines_deleted": 1}}
diff --git a/htsrv/call_plugin.php b/htsrv/call_plugin.php index 919c8e7106..542df0d16f 100644 --- a/htsrv/call_plugin.php +++ b/htsrv/call_plugin.php @@ -34,11 +34,11 @@ if( is_null( $params ) ) { // Use empty array by default if params are not sent by request: $params = array(); } else { // Params given: - if( ...
if( ( substr( $params, 0, 2 ) == 'a:' ) && ( ! preg_match( '/(;|{|})O:\+?[0-9]+:"/', $params ) ) )
if( ( substr( $params, 0, 2 ) == 'a:' ) && ( ! preg_match( '/(s:\d+:"[^"]*"|i:\d+)(;|{|})O:\+?[0-9]+:"/', $params ) ) )
[]
CVE-2016-8901
25c21cf9cc4261324001f9039509710b37ee2c4d
https://github.com/b2evolution/b2evolution
[{'lang': 'en', 'value': 'b2evolution 6.7.6 suffer from an Object Injection vulnerability in /htsrv/call_plugin.php.'}]
7.5
9.8
2019-05-23T18:29Z
HIGH
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Fix object injection vulnerability
2016-09-28 07:23:33 +0300
25c21cf9cc
2,948
3
[ "htsrv/call_plugin.php" ]
PHP
{"htsrv/call_plugin.php": {"lines_added": 12, "lines_deleted": 4}}
diff --git a/htsrv/call_plugin.php b/htsrv/call_plugin.php index 1b18e47f84..044d48c703 100644 --- a/htsrv/call_plugin.php +++ b/htsrv/call_plugin.php @@ -28,17 +28,25 @@ param( 'plugin_ID', 'integer', true ); // instead of calling handle_htsrv_action() all the time // and letting the plugin deal with its methods int...
if( is_null($params) ) { // Default: { // params given. This may result in "false", but this means that unserializing failed. $params = @unserialize($params);
if( is_null( $params ) ) { // Use empty array by default if params are not sent by request: { // Params given: if( substr( $params, 0, 2 ) == 'a:' ) { // Allow to unserialize only arrays, to avoid object injection vulnerability: // (This may result in "false", but this means that unserializing failed) $params = @...
[]
CVE-2017-1000423
b899d654d931f3bf3cfbbdd71e0d1a0f3a16d04c
https://github.com/b2evolution/b2evolution
[{'lang': 'en', 'value': "b2evolution version 6.6.0 - 6.8.10 is vulnerable to input validation (backslash and single quote escape) in basic install functionality resulting in unauthenticated attacker gaining PHP code execution on the victim's setup."}]
7.5
9.8
2018-01-02T20:29Z
HIGH
CWE-20
Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Format install params
2017-08-09 12:27:27 +0300
b899d654d9
2,948
3
[ "install/_functions_install.php" ]
PHP
{"install/_functions_install.php": {"lines_added": 19, "lines_deleted": 7}}
diff --git a/install/_functions_install.php b/install/_functions_install.php index 27d76ae342..c4c2e16055 100644 --- a/install/_functions_install.php +++ b/install/_functions_install.php @@ -1789,10 +1789,22 @@ function check_quick_install_request() return true; } +/** + * Format an install param like DB confi...
."\t'user' => '".str_replace( array( "'", "\$" ), array( "\'", "\\$" ), $params['db_user'] )."',\$1" ."\t'password' => '".str_replace( array( "'", "\$" ), array( "\'", "\\$" ), $params['db_password'] )."',\$2" ."\t'name' => '".str_replace( array( "'", "\$" ), array( "\'", "\\$" ), $params['db_nam...
/** * Format an install param like DB config and base url * * @return string */ function format_install_param( $value ) { $value = str_replace( array( "'", "\$" ), array( "\'", "\\$" ), $value ); return preg_replace( "#([\\\\]*)(\\\\\\\')#", "\\\\\\\\\\\\\\\\\'", $value ); } ."\t'user' => '".format_in...
[]
CVE-2017-1000423
0096a3ebc85f6aadbda2c4427cd092a538b161d2
https://github.com/b2evolution/b2evolution
[{'lang': 'en', 'value': "b2evolution version 6.6.0 - 6.8.10 is vulnerable to input validation (backslash and single quote escape) in basic install functionality resulting in unauthenticated attacker gaining PHP code execution on the victim's setup."}]
7.5
9.8
2018-01-02T20:29Z
HIGH
CWE-20
Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Format install params
2017-08-10 10:39:03 +0300
0096a3ebc8
2,948
3
[ "install/_functions_install.php" ]
PHP
{"install/_functions_install.php": {"lines_added": 13, "lines_deleted": 2}}
diff --git a/install/_functions_install.php b/install/_functions_install.php index c4c2e16055..96c065da59 100644 --- a/install/_functions_install.php +++ b/install/_functions_install.php @@ -1796,12 +1796,23 @@ function check_quick_install_request() * * @return string */ function format_install_param( $value ) ...
$value = str_replace( array( "'", "\$" ), array( "\'", "\\$" ), $value ); return preg_replace( "#([\\\\]*)(\\\\\\\')#", "\\\\\\\\\\\\\\\\\'", $value );
// We need backslashes only for single quote(') and backslash(\): $value = addcslashes( $value, "'\\" ); /* The below code excludes even number of slashes, because we need always odd number of slashes before single quote(') to avoid a broken string value. Examples for source and result: \' => \' ...
[]
CVE-2017-5480
26841d9c81f27ad23b2f6e4bd5eaec7f2f58dfe0
https://github.com/b2evolution/b2evolution
[{'lang': 'en', 'value': 'Directory traversal vulnerability in inc/files/files.ctrl.php in b2evolution through 6.8.3 allows remote authenticated users to read or delete arbitrary files by leveraging back-office access to provide a .. (dot dot) in the fm_selected array parameter.'}]
5.5
8.1
2017-01-15T22:59Z
MEDIUM
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the...
Fixed fm_selected parameter exploit
2017-01-15 16:31:00 +0800
26841d9c81
2,948
3
[ "inc/files/files.ctrl.php" ]
PHP
{"inc/files/files.ctrl.php": {"lines_added": 7, "lines_deleted": 0}}
diff --git a/inc/files/files.ctrl.php b/inc/files/files.ctrl.php index 66a473a5b8..e7ecda94e8 100644 --- a/inc/files/files.ctrl.php +++ b/inc/files/files.ctrl.php @@ -341,12 +341,19 @@ $Debuglog->add( count($fm_selected).' selected files/directories', 'files' ); * The selected files (must be within current fileroot) ...
// Prevent directory traversal using '..' $re = '/\/?\.\.\/+/'; if( preg_match( $re, $l_source_path ) ) { debug_die( 'Invalid fm_selected parameter value' ); }
[]
CVE-2017-5494
261dbd5b294e707af766691e65a177a290314a6e
https://github.com/b2evolution/b2evolution
[{'lang': 'en', 'value': 'Multiple cross-site scripting (XSS) vulnerabilities in the file types table in b2evolution through 6.8.3 allow remote authenticated users to inject arbitrary web script or HTML via a .swf file in a (1) comment frame or (2) avatar frame.'}]
3.5
5.4
2017-01-15T22:59Z
LOW
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Updated file types table to only allow admins to upload files with SWF extension
2017-01-15 15:17:52 +0800
261dbd5b29
2,948
3
[ "conf/_application.php", "install/_functions_create.php", "install/_functions_evoupgrade.php" ]
PHP
{"conf/_application.php": {"lines_added": 1, "lines_deleted": 1}, "install/_functions_create.php": {"lines_added": 1, "lines_deleted": 1}, "install/_functions_evoupgrade.php": {"lines_added": 8, "lines_deleted": 0}}
diff --git a/conf/_application.php b/conf/_application.php index 9e34c30c12..fc5f12fe77 100644 --- a/conf/_application.php +++ b/conf/_application.php @@ -34,11 +34,11 @@ $app_version_long = $app_version.'-'.$app_date; * This will be incrememented by 5 with each change in {@link upgrade_b2evo_tables()} * in order t...
$new_db_version = 11810; (20, 'swf', 'Flash video file', 'application/x-shockwave-flash', 'file_video', 'browser', 'registered'),
$new_db_version = 11815; (20, 'swf', 'Flash video file', 'application/x-shockwave-flash', 'file_video', 'browser', 'admin'), if( upg_task_start( 11815, 'Updating file types table...' ) ) { // part of 6.7.10-stable $DB->query( 'UPDATE T_filetypes SET ftyp_allowed = "admin" WHERE ftyp_extensions REGEXP "[[:...
[]
CVE-2017-5539
e35f7c195d8c1103d2d981a48cda5ab45ecac48a
https://github.com/b2evolution/b2evolution
[{'lang': 'en', 'value': 'The patch for directory traversal (CVE-2017-5480) in b2evolution version 6.8.4-stable has a bypass vulnerability. An attacker can use ..\\/ to bypass the filter rule. Then, this attacker can exploit this vulnerability to delete or read any files on the server. It can also be used to determine ...
9
9.1
2017-01-23T07:59Z
HIGH
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the...
Merge branch 'develop'
2017-01-19 17:14:27 +0100
e35f7c195d
2,948
3
[]
Unknown
{"Gruntfile.js": {"lines_added": 2, "lines_deleted": 0}, "conf/_advanced.php": {"lines_added": 7, "lines_deleted": 0}, "conf/_application.php": {"lines_added": 3, "lines_deleted": 3}, "htsrv/anon_async.php": {"lines_added": 140, "lines_deleted": 0}, "htsrv/async.php": {"lines_added": 35, "lines_deleted": 112}, "htsrv/g...
[]
CVE-2017-5553
ce5b36e44b714b18b0bcd34c6db0187b8d13bab8
https://github.com/b2evolution/b2evolution
[{'lang': 'en', 'value': 'Cross-site scripting (XSS) vulnerability in plugins/markdown_plugin/_markdown.plugin.php in b2evolution before 6.8.5 allows remote authenticated users to inject arbitrary web script or HTML via a javascript: URL.'}]
3.5
5.4
2017-01-23T07:59Z
LOW
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Ignore wrong urls on markdown plugin
2017-01-19 10:24:29 +0300
ce5b36e44b
2,948
3
[ "plugins/markdown_plugin/_parsedown.inc.php" ]
PHP
{"plugins/markdown_plugin/_parsedown.inc.php": {"lines_added": 5, "lines_deleted": 4}}
diff --git a/plugins/markdown_plugin/_parsedown.inc.php b/plugins/markdown_plugin/_parsedown.inc.php index 9ab2f281d9..7aea9f0065 100644 --- a/plugins/markdown_plugin/_parsedown.inc.php +++ b/plugins/markdown_plugin/_parsedown.inc.php @@ -27,10 +27,11 @@ Modifications by yura: - #header {.header-class-value#heade...
if (preg_match_all('/^[ ]{0,3}\[(.+)\][ ]?:[ ]*\n?[ ]*(.+)$/m', $text, $matches, PREG_SET_ORDER)) if( preg_match_all( '/(!?)(\[((?:[^][]+|(?2))*)\])\(([^"]*?)( "([^"]+)")?\)/', $text, $matches, PREG_SET_ORDER ) ) $element = '<img src="'.$matches[4].'" alt="'.$matches[3].'"'.( ! empty( $matches[6] ) ? ' ti...
12. Ignore wrong URLs for links and images; Allow only which begin with http://, https:// or / if (preg_match_all('/^[ ]{0,3}\[(.+)\][ ]?:[ ]*\n?[ ]*((https?:\/\/|\/).+)$/m', $text, $matches, PREG_SET_ORDER)) if( preg_match_all( '/(!?)(\[((?:[^][]+|(?2))*)\])\((https?:\/\/|\/)([^"]*?)( "([^"]+)")?\)/', $text, $m...
[]
CVE-2020-24654
8bf8c5ef07b0ac5e914d752681e470dea403a5bd
https://github.com/KDE/ark
[{'lang': 'en', 'value': "In KDE Ark before 20.08.1, a crafted TAR archive with symlinks can install files outside the extraction directory, as demonstrated by a write operation to a user's home directory."}]
4.3
3.3
2020-09-02T17:15Z
MEDIUM
CWE-59
Improper Link Resolution Before File Access ('Link Following')
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Pass the ARCHIVE_EXTRACT_SECURE_SYMLINKS flag to libarchive There are archive types which allow to first create a symlink and then later on dereference it. If the symlink points outside of the archive, this results in writing outside of the destination directory. With the ARCHIVE_EXTRACT_SECURE_SYMLINKS option set, l...
2020-08-27 21:47:49 +0200
8bf8c5ef
506
2
[ "plugins/libarchive/libarchiveplugin.cpp" ]
C++
{"plugins/libarchive/libarchiveplugin.cpp": {"lines_added": 3, "lines_deleted": 15}}
diff --git a/plugins/libarchive/libarchiveplugin.cpp b/plugins/libarchive/libarchiveplugin.cpp index 50e81da1..8a0fed21 100644 --- a/plugins/libarchive/libarchiveplugin.cpp +++ b/plugins/libarchive/libarchiveplugin.cpp @@ -507,25 +507,13 @@ void LibarchivePlugin::emitEntryFromArchiveEntry(struct archive_entry *aentry) ...
int result = ARCHIVE_EXTRACT_TIME; result |= ARCHIVE_EXTRACT_SECURE_NODOTDOT; // TODO: Don't use arksettings here /*if ( ArkSettings::preservePerms() ) { result &= ARCHIVE_EXTRACT_PERM; } if ( !ArkSettings::extractOverwrite() ) { result &= ARCHIVE_EXTRACT_NO_OVERWRITE; ...
return ARCHIVE_EXTRACT_TIME | ARCHIVE_EXTRACT_SECURE_NODOTDOT | ARCHIVE_EXTRACT_SECURE_SYMLINKS;
[ "validation" ]
CVE-2015-10092
74b3932696f9868e14563e51b7d0bb68c53bf5e4
https://github.com/wp-plugins/qtranslate-slug
[{'lang': 'en', 'value': 'A vulnerability was found in Qtranslate Slug Plugin up to 1.1.16 on WordPress. It has been classified as problematic. Affected is the function add_slug_meta_box of the file includes/class-qtranslate-slug.php. The manipulation leads to cross site scripting. It is possible to launch the attack r...
null
6.1
2023-03-06T06:15Z
nan
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
fixed XSS and added hability to filter the metabox position git-svn-id: https://plugins.svn.wordpress.org/qtranslate-slug/trunk@1213627 b8457f37-d9ea-0310-8a92-e5e31aec5664
2015-08-05 17:32:56 +0000
74b3932
24
2
[ "assets/css/qts-default.css", "assets/css/qts-default.min.css", "assets/css/qts-settings.css", "assets/js/qts-nav-menu-min.js", "assets/js/qts-nav-menu.js", "assets/js/qts-settings-upgrade.js", "assets/js/qts-settings.js", "includes/class-qtranslate-slug-widget.php", "includes/class-qtranslate-slug....
PHP
{"assets/css/qts-default.css": {"lines_added": 16, "lines_deleted": 0}, "assets/css/qts-default.min.css": {"lines_added": 1, "lines_deleted": 0}, "assets/css/qts-settings.css": {"lines_added": 42, "lines_deleted": 0}, "assets/js/qts-nav-menu-min.js": {"lines_added": 1, "lines_deleted": 0}, "assets/js/qts-nav-menu.js": ...
diff --git a/assets/css/qts-default.css b/assets/css/qts-default.css new file mode 100644 index 0000000..c700de0 --- /dev/null +++ b/assets/css/qts-default.css @@ -0,0 +1,16 @@ +.qts_type_image .qts_lang_item { + float: left; + margin-right: 7px; +} +.qts_type_image .qts_lang_item.last-child { + margin-right:...
.qts_type_image .qts_lang_item { float: left; margin-right: 7px; } .qts_type_image .qts_lang_item.last-child { margin-right: 0; } .qts_lang_item{ margin-top: 7px; margin-bottom: 7px; } .qts_both { white-space: nowrap; line-height:1em; } .qts_both img { margin-right: 4px } .qts_type_image .q...
[ "sanitization" ]
CVE-2022-0159
4da927d39a49138527c30db09c962ff706f95202
https://github.com/orchardcms/orchardcore
[{'lang': 'en', 'value': "orchardcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"}]
3.5
5.4
2022-01-12T03:15Z
LOW
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Fix encoding issues (#11008)
2022-01-11 07:23:58 -0800
4da927d39
9,182
2
[ "src/OrchardCore.Modules/OrchardCore.AdminDashboard/Controllers/DashboardController.cs", "src/OrchardCore.Modules/OrchardCore.AdminDashboard/Views/Dashboard/Manage.cshtml", "src/OrchardCore.Modules/OrchardCore.Contents/Controllers/AdminController.cs", "src/OrchardCore.Modules/OrchardCore.Contents/Views/Admin/...
Other
{"src/OrchardCore.Modules/OrchardCore.AdminDashboard/Controllers/DashboardController.cs": {"lines_added": 1, "lines_deleted": 1}, "src/OrchardCore.Modules/OrchardCore.AdminDashboard/Views/Dashboard/Manage.cshtml": {"lines_added": 1, "lines_deleted": 1}, "src/OrchardCore.Modules/OrchardCore.Contents/Controllers/AdminCon...
diff --git a/src/OrchardCore.Modules/OrchardCore.AdminDashboard/Controllers/DashboardController.cs b/src/OrchardCore.Modules/OrchardCore.AdminDashboard/Controllers/DashboardController.cs index b0b98bd09..bc2c9c6e0 100644 --- a/src/OrchardCore.Modules/OrchardCore.AdminDashboard/Controllers/DashboardController.cs +++ b/s...
dashboardCreatable.Add(new SelectListItem(new LocalizedString(ctd.DisplayName, ctd.DisplayName).Value, ctd.Name)); <a class="dropdown-item add-list-widget btn-sm" href="@Url.RouteUrl(new { area = "OrchardCore.Contents", controller = "Admin", action = "Create", id = @item.Value, r...
dashboardCreatable.Add(new SelectListItem(ctd.DisplayName, ctd.Name)); <a class="dropdown-item add-list-widget btn-sm" href="@Url.RouteUrl(new { area = "OrchardCore.Contents", controller = "Admin", action = "Create", id = @item.Value, returnUrl = FullRequestPath })">@T[Html.Encod...
[]
CVE-2022-0243
218f25ddfadb66a54de7a82dffe3ab2e4ab7c4b4
https://github.com/orchardcms/orchardcore
[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in NuGet OrchardCore.Application.Cms.Targets prior to 1.2.2.'}]
3.5
5.4
2022-01-19T20:15Z
LOW
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Fix localization and sanitization usages (#11034)
2022-01-18 11:03:05 -0800
218f25ddf
9,182
2
[ "src/OrchardCore.Modules/OrchardCore.ContentFields/Drivers/LinkFieldDisplayDriver.cs", "src/OrchardCore.Modules/OrchardCore.Contents/AuditTrail/Controllers/AuditTrailContentController.cs", "src/OrchardCore.Modules/OrchardCore.Menu/Drivers/HtmlMenuItemPartDisplayDriver.cs", "src/OrchardCore.Modules/OrchardCore...
C#
{"src/OrchardCore.Modules/OrchardCore.ContentFields/Drivers/LinkFieldDisplayDriver.cs": {"lines_added": 18, "lines_deleted": 4}, "src/OrchardCore.Modules/OrchardCore.Contents/AuditTrail/Controllers/AuditTrailContentController.cs": {"lines_added": 4, "lines_deleted": 1}, "src/OrchardCore.Modules/OrchardCore.Menu/Drivers...
diff --git a/src/OrchardCore.Modules/OrchardCore.ContentFields/Drivers/LinkFieldDisplayDriver.cs b/src/OrchardCore.Modules/OrchardCore.ContentFields/Drivers/LinkFieldDisplayDriver.cs index e31df434b..cf8e9d2cb 100644 --- a/src/OrchardCore.Modules/OrchardCore.ContentFields/Drivers/LinkFieldDisplayDriver.cs +++ b/src/Orc...
IStringLocalizer<LinkFieldDisplayDriver> localizer) // Run this through a sanitizer in case someone puts html in it. // No settings. await _notifier.WarningAsync(new LocalizedHtmlString(error.ErrorMessage, error.ErrorMessage)); public HtmlMenuItem...
using System.Text.Encodings.Web; using OrchardCore.Infrastructure.Html; private readonly IHtmlSanitizerService _htmlSanitizerService; private readonly HtmlEncoder _htmlencoder; IStringLocalizer<LinkFieldDisplayDriver> localizer, IHtmlSanitizerService htmlSanitizerService, ...
[]
CVE-2022-0274
218f25ddfadb66a54de7a82dffe3ab2e4ab7c4b4
https://github.com/orchardcms/orchardcore
[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in NuGet OrchardCore.Application.Cms.Targets prior to 1.2.2.'}]
3.5
5.4
2022-01-19T18:15Z
LOW
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Fix localization and sanitization usages (#11034)
2022-01-18 11:03:05 -0800
218f25ddf
9,182
2
[ "src/OrchardCore.Modules/OrchardCore.ContentFields/Drivers/LinkFieldDisplayDriver.cs", "src/OrchardCore.Modules/OrchardCore.Contents/AuditTrail/Controllers/AuditTrailContentController.cs", "src/OrchardCore.Modules/OrchardCore.Menu/Drivers/HtmlMenuItemPartDisplayDriver.cs", "src/OrchardCore.Modules/OrchardCore...
C#
{"src/OrchardCore.Modules/OrchardCore.ContentFields/Drivers/LinkFieldDisplayDriver.cs": {"lines_added": 18, "lines_deleted": 4}, "src/OrchardCore.Modules/OrchardCore.Contents/AuditTrail/Controllers/AuditTrailContentController.cs": {"lines_added": 4, "lines_deleted": 1}, "src/OrchardCore.Modules/OrchardCore.Menu/Drivers...
diff --git a/src/OrchardCore.Modules/OrchardCore.ContentFields/Drivers/LinkFieldDisplayDriver.cs b/src/OrchardCore.Modules/OrchardCore.ContentFields/Drivers/LinkFieldDisplayDriver.cs index e31df434b..cf8e9d2cb 100644 --- a/src/OrchardCore.Modules/OrchardCore.ContentFields/Drivers/LinkFieldDisplayDriver.cs +++ b/src/Orc...
IStringLocalizer<LinkFieldDisplayDriver> localizer) // Run this through a sanitizer in case someone puts html in it. // No settings. await _notifier.WarningAsync(new LocalizedHtmlString(error.ErrorMessage, error.ErrorMessage)); public HtmlMenuItem...
using System.Text.Encodings.Web; using OrchardCore.Infrastructure.Html; private readonly IHtmlSanitizerService _htmlSanitizerService; private readonly HtmlEncoder _htmlencoder; IStringLocalizer<LinkFieldDisplayDriver> localizer, IHtmlSanitizerService htmlSanitizerService, ...
[]
CVE-2022-0820
b7096af1028d8f909f63dd076d1bbd573913a92d
https://github.com/orchardcms/orchardcore
[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository orchardcms/orchardcore prior to 1.3.0.'}]
4.3
6.1
2022-03-11T00:15Z
MEDIUM
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Fix missing permission checks and encoding. (#11344)
2022-03-10 10:03:52 -0800
b7096af102
9,182
2
[ "src/OrchardCore.Modules/OrchardCore.ContentFields/Controllers/LocalizationSetContentPickerAdminController.cs", "src/OrchardCore.Modules/OrchardCore.Demo/Controllers/ContentController.cs", "src/OrchardCore.Modules/OrchardCore.Features/Controllers/AdminController.cs", "src/OrchardCore.Modules/OrchardCore.Roles...
C#
{"src/OrchardCore.Modules/OrchardCore.ContentFields/Controllers/LocalizationSetContentPickerAdminController.cs": {"lines_added": 18, "lines_deleted": 7}, "src/OrchardCore.Modules/OrchardCore.Demo/Controllers/ContentController.cs": {"lines_added": 25, "lines_deleted": 1}, "src/OrchardCore.Modules/OrchardCore.Features/Co...
diff --git a/src/OrchardCore.Modules/OrchardCore.ContentFields/Controllers/LocalizationSetContentPickerAdminController.cs b/src/OrchardCore.Modules/OrchardCore.ContentFields/Controllers/LocalizationSetContentPickerAdminController.cs index f0a7ca5d11..3818679bd7 100644 --- a/src/OrchardCore.Modules/OrchardCore.ContentFi...
ISession session ) results.Add(new VueMultiselectItemViewModel Id = contentItem.Key, //localization set DisplayText = contentItem.Value.ToString(), HasPublished = await _contentManager.HasPublishedVersionAsync(contentIte...
using Microsoft.AspNetCore.Authorization; using OrchardCore.Contents; using IHttpContextAccessor = Microsoft.AspNetCore.Http.IHttpContextAccessor; private readonly IAuthorizationService _authorizationService; private readonly IHttpContextAccessor _httpContextAccessor; ISession session, ...
[ "validation", "authorization" ]
CVE-2022-0821
b7096af1028d8f909f63dd076d1bbd573913a92d
https://github.com/orchardcms/orchardcore
[{'lang': 'en', 'value': 'Improper Authorization in GitHub repository orchardcms/orchardcore prior to 1.3.0.'}]
4
6.5
2022-03-11T00:15Z
MEDIUM
NVD-CWE-Other
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Fix missing permission checks and encoding. (#11344)
2022-03-10 10:03:52 -0800
b7096af102
9,182
2
[ "src/OrchardCore.Modules/OrchardCore.ContentFields/Controllers/LocalizationSetContentPickerAdminController.cs", "src/OrchardCore.Modules/OrchardCore.Demo/Controllers/ContentController.cs", "src/OrchardCore.Modules/OrchardCore.Features/Controllers/AdminController.cs", "src/OrchardCore.Modules/OrchardCore.Roles...
C#
{"src/OrchardCore.Modules/OrchardCore.ContentFields/Controllers/LocalizationSetContentPickerAdminController.cs": {"lines_added": 18, "lines_deleted": 7}, "src/OrchardCore.Modules/OrchardCore.Demo/Controllers/ContentController.cs": {"lines_added": 25, "lines_deleted": 1}, "src/OrchardCore.Modules/OrchardCore.Features/Co...
diff --git a/src/OrchardCore.Modules/OrchardCore.ContentFields/Controllers/LocalizationSetContentPickerAdminController.cs b/src/OrchardCore.Modules/OrchardCore.ContentFields/Controllers/LocalizationSetContentPickerAdminController.cs index f0a7ca5d11..3818679bd7 100644 --- a/src/OrchardCore.Modules/OrchardCore.ContentFi...
ISession session ) results.Add(new VueMultiselectItemViewModel Id = contentItem.Key, //localization set DisplayText = contentItem.Value.ToString(), HasPublished = await _contentManager.HasPublishedVersionAsync(contentIte...
using Microsoft.AspNetCore.Authorization; using OrchardCore.Contents; using IHttpContextAccessor = Microsoft.AspNetCore.Http.IHttpContextAccessor; private readonly IAuthorizationService _authorizationService; private readonly IHttpContextAccessor _httpContextAccessor; ISession session, ...
[ "validation", "authorization" ]
CVE-2022-0822
b7096af1028d8f909f63dd076d1bbd573913a92d
https://github.com/orchardcms/orchardcore
[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in GitHub repository orchardcms/orchardcore prior to 1.3.0.'}]
3.5
5.4
2022-03-11T01:15Z
LOW
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Fix missing permission checks and encoding. (#11344)
2022-03-10 10:03:52 -0800
b7096af102
9,182
2
[ "src/OrchardCore.Modules/OrchardCore.ContentFields/Controllers/LocalizationSetContentPickerAdminController.cs", "src/OrchardCore.Modules/OrchardCore.Demo/Controllers/ContentController.cs", "src/OrchardCore.Modules/OrchardCore.Features/Controllers/AdminController.cs", "src/OrchardCore.Modules/OrchardCore.Roles...
C#
{"src/OrchardCore.Modules/OrchardCore.ContentFields/Controllers/LocalizationSetContentPickerAdminController.cs": {"lines_added": 18, "lines_deleted": 7}, "src/OrchardCore.Modules/OrchardCore.Demo/Controllers/ContentController.cs": {"lines_added": 25, "lines_deleted": 1}, "src/OrchardCore.Modules/OrchardCore.Features/Co...
diff --git a/src/OrchardCore.Modules/OrchardCore.ContentFields/Controllers/LocalizationSetContentPickerAdminController.cs b/src/OrchardCore.Modules/OrchardCore.ContentFields/Controllers/LocalizationSetContentPickerAdminController.cs index f0a7ca5d11..3818679bd7 100644 --- a/src/OrchardCore.Modules/OrchardCore.ContentFi...
ISession session ) results.Add(new VueMultiselectItemViewModel Id = contentItem.Key, //localization set DisplayText = contentItem.Value.ToString(), HasPublished = await _contentManager.HasPublishedVersionAsync(contentIte...
using Microsoft.AspNetCore.Authorization; using OrchardCore.Contents; using IHttpContextAccessor = Microsoft.AspNetCore.Http.IHttpContextAccessor; private readonly IAuthorizationService _authorizationService; private readonly IHttpContextAccessor _httpContextAccessor; ISession session, ...
[ "validation", "authorization" ]
CVE-2022-0402
c19d65abbe43d9b6359c1bf3498dc697d0c19d02
https://github.com/RensTillmann/super-forms
[{'lang': 'en', 'value': 'The Super Forms - Drag & Drop Form Builder WordPress plugin before 6.0.4 does not escape the bob_czy_panstwa_sprawa_zostala_rozwiazana parameter before outputting it back in an attribute via the super_language_switcher AJAX action, leading to a Reflected Cross-Site Scripting. The action is als...
null
6.1
2024-01-16T16:15Z
nan
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
fix PHP parse error
2022-01-27 01:44:45 +0100
c19d65ab
2,427
2
[ "docs/changelog.md", "src/add-ons/super-forms-register-login/super-forms-register-login.php", "src/assets/css/frontend/elements.css", "src/assets/css/frontend/elements.css.map", "src/assets/css/frontend/elements.sass", "src/assets/js/common.js", "src/assets/js/frontend/elements.js", "src/docs/changelo...
PHP
{"docs/changelog.md": {"lines_added": 7, "lines_deleted": 0}, "src/add-ons/super-forms-register-login/super-forms-register-login.php": {"lines_added": 1, "lines_deleted": 1}, "src/assets/css/frontend/elements.css": {"lines_added": 4, "lines_deleted": 0}, "src/assets/css/frontend/elements.css.map": {"lines_added": 1, "l...
diff --git a/docs/changelog.md b/docs/changelog.md index f4c54abf..1034e95f 100644 --- a/docs/changelog.md +++ b/docs/changelog.md @@ -6,10 +6,17 @@ ## PDF Generator Add-on now available! More info here: - [PDF Generator Add-on](https://renstillmann.github.io/super-forms/#/pdf-generator-add-on) +## Jan 26, 2022...
$result .= ' name="' . $atts['name'] . '" value="' . $code . '"'; {"version":3,"sourceRoot":"","sources":["elements.sass"],"names":[],"mappings":";AAqFA;EACE;;;AAEF;AAAA;AAAA;AAAA;AAAA;AAAA;EAME;;;AAEA;AAAA;EAEE;;;AAEF;AAAA;EAEE;;AACF;AAAA;EAEE;;;AAEF;AAAA;EAEE;;;AAGF;AAAA;AAAA;AAAA;AAAA;AAAA;EAME;;;AAG...
## Jan 26, 2022 - Version 6.0.4 - **Fix:** When `editing` is enabled for a `Listings` (Listings Add-on) make sure the styles/scripts are loaded so that normal form functions and styles are applied - **Fix:** Validate requests made to switch form language by using a custom nonce system - **Fix:** PHP parse error when l...
[]
CVE-2014-0177
016ec99d25b1cb83cb4367e541177aa431beb600
https://github.com/github/hub
[{'lang': 'en', 'value': 'The am function in lib/hub/commands.rb in hub before 1.12.1 allows local users to overwrite arbitrary files via a symlink attack on a temporary patch file.'}]
3.6
null
2014-05-27T14:55Z
LOW
CWE-310
Cryptographic Issues
Weaknesses in this category are related to the design and implementation of data confidentiality and integrity. Frequently these deal with the use of encoding techniques, encryption libraries, and hashing algorithms. The weaknesses in this category could lead to a degradation of the quality data if they are not address...
Use non-predictable filename for downloaded patch file Since the /tmp directory is readable by everybody on Unix, and since the patch name could be public or easy to guess, a attacker could create a symlink to a file writable by the user running hub, which would be replaced by the patch. This has been assigned CVE-20...
2014-04-15 19:04:30 +0200
016ec99
214
3
[ "lib/hub/commands.rb", "lib/hub/context.rb" ]
Ruby
{"lib/hub/commands.rb": {"lines_added": 1, "lines_deleted": 1}, "lib/hub/context.rb": {"lines_added": 0, "lines_deleted": 4}}
diff --git a/lib/hub/commands.rb b/lib/hub/commands.rb index f24e6f3..4b55529 100644 --- a/lib/hub/commands.rb +++ b/lib/hub/commands.rb @@ -517,11 +517,11 @@ module Hub else raise ArgumentError, url end end - patch_file = File.join(tmp_dir, patch_name) + patc...
patch_file = File.join(tmp_dir, patch_name) def tmp_dir ENV['TMPDIR'] || ENV['TEMP'] || '/tmp' end
patch_file = Tempfile.new('patch_name')
[]
CVE-2024-3651
1d365e17e10d72d0b7876316fc7b9ca0eebdd38d
https://github.com/kjd/idna
[{'lang': 'en', 'value': "A vulnerability was identified in the kjd/idna library, specifically within the `idna.encode()` function, affecting version 3.6. The issue arises from the function's handling of crafted input strings, which can lead to quadratic complexity and consequently, a denial of service condition. This ...
null
7.5
2024-07-07T18:15Z
nan
NVD-CWE-noinfo
Insufficient Information
There is insufficient information about the issue to classify it; details are unkown or unspecified.
Release v3.7
2024-04-10 20:30:58 -0700
1d365e1
27
3
[ "HISTORY.rst", "LICENSE.md", "idna/package_data.py" ]
Python
{"HISTORY.rst": {"lines_added": 8, "lines_deleted": 0}, "LICENSE.md": {"lines_added": 1, "lines_deleted": 1}, "idna/package_data.py": {"lines_added": 1, "lines_deleted": 1}}
diff --git a/HISTORY.rst b/HISTORY.rst index eea8a70..76dc8bc 100644 --- a/HISTORY.rst +++ b/HISTORY.rst @@ -1,10 +1,18 @@ .. :changelog: History ------- +3.7 (2024-04-11) +++++++++++++++++ + +- Fix issue where specially crafted inputs to encode() could + take exceptionally long amount of time to process. [CVE-...
Copyright (c) 2013-2023, Kim Davies and contributors. __version__ = '3.6'
3.7 (2024-04-11) - Fix issue where specially crafted inputs to encode() could take exceptionally long amount of time to process. [CVE-2024-3651] Thanks to Guido Vranken for reporting the issue. Copyright (c) 2013-2024, Kim Davies and contributors. __version__ = '3.7'
[]
CVE-2021-32765
76a7b10005c70babee357a7d0f2becf28ec7ed1e
https://github.com/redis/hiredis
[{'lang': 'en', 'value': "Hiredis is a minimalistic C client library for the Redis database. In affected versions Hiredis is vulnurable to integer overflow if provided maliciously crafted or corrupted `RESP` `mult-bulk` protocol data. When parsing `multi-bulk` (array-like) replies, hiredis fails to check if `count * si...
6.5
8.8
2021-10-04T21:15Z
MEDIUM
CWE-190
Integer Overflow or Wraparound
The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the ...
Fix for integer/buffer overflow CVE-2021-32765 This fix prevents hiredis from trying to allocate more than `SIZE_MAX` bytes, which would result in a buffer overrun. [Full Details](https://github.com/redis/hiredis/security/advisories/GHSA-hfm9-39pp-55p2)
2021-10-04 11:56:31 -0700
76a7b10
74
3
[ "hiredis.c", "test.c" ]
C
{"hiredis.c": {"lines_added": 1, "lines_deleted": 0}, "test.c": {"lines_added": 14, "lines_deleted": 0}}
diff --git a/hiredis.c b/hiredis.c index a7fbf48..ab0e398 100644 --- a/hiredis.c +++ b/hiredis.c @@ -172,10 +172,11 @@ static void *createArrayObject(const redisReadTask *task, size_t elements) { r = createReplyObject(task->type); if (r == NULL) return NULL; if (elements > 0) { + if (SI...
if (SIZE_MAX / sizeof(redisReply*) < elements) return NULL; /* Don't overflow */ test("Multi-bulk never overflows regardless of maxelements: "); size_t bad_mbulk_len = (SIZE_MAX / sizeof(void *)) + 3; char bad_mbulk_reply[100]; snprintf(bad_mbulk_reply, sizeof(bad_mbulk_reply), "*%llu\r\n+asdf\...
[]
CVE-2024-28236
e1572743b008e4fbce31ebb1dcd23bf6a1a30297
https://github.com/go-vela/worker
[{'lang': 'en', 'value': 'Vela is a Pipeline Automation (CI/CD) framework built on Linux container technology written in Golang. Vela pipelines can use variable substitution combined with insensitive fields like `parameters`, `image` and `entrypoint` to inject secrets into a plugin/image and — by using common substitut...
null
null
2024-03-12T21:15Z
nan
NVD-CWE-noinfo
Insufficient Information
There is insufficient information about the issue to classify it; details are unkown or unspecified.
Merge pull request from GHSA-pwx5-6wxg-px5h * fix(secrets): split env injection based on allow_substitution value * upgrade sdk server and types
2024-03-12 13:53:33 -0500
e157274
317
2
[ "executor/linux/build.go", "executor/linux/linux.go", "executor/linux/secret.go", "executor/linux/service.go", "executor/linux/step.go", "go.mod", "go.sum" ]
Go
{"executor/linux/build.go": {"lines_added": 20, "lines_deleted": 4}, "executor/linux/linux.go": {"lines_added": 11, "lines_deleted": 6}, "executor/linux/secret.go": {"lines_added": 7, "lines_deleted": 0}, "executor/linux/service.go": {"lines_added": 7, "lines_deleted": 0}, "executor/linux/step.go": {"lines_added": 7, "...
diff --git a/executor/linux/build.go b/executor/linux/build.go index 0fb2337..eca0623 100644 --- a/executor/linux/build.go +++ b/executor/linux/build.go @@ -197,12 +197,16 @@ func (c *client) PlanBuild(ctx context.Context) error { return fmt.Errorf("unable to decode secret: %w", err) } _log.AppendData(appen...
// add secret to the map c.Secrets[secret.Name] = s // add secret to the temp map lazySecrets[secret.Name] = s Logger *logrus.Entry Vela *vela.Client Runtime runtime.Engine Secrets map[string]*library.Secret Hostname string Version string github.com/go-vela/sdk-go v0.23.1 github.com/go-...
// add secret to the appropriate map if s.GetAllowSubstitution() { c.Secrets[secret.Name] = s } else { c.NoSubSecrets[secret.Name] = s } lazyNoSubSecrets := make(map[string]*library.Secret) // add secret to the appropriate temp map if s.GetAllowSubstitution() { lazySecrets[secret.Name] = s }...
[]
CVE-2023-32070
c40e2f5f9482ec6c3e71dbf1fff5ba8a5e44cdc1
https://github.com/xwiki/xwiki-rendering
[{'lang': 'en', 'value': "XWiki Platform is a generic wiki platform. Prior to version 14.6-rc-1, HTML rendering didn't check for dangerous attributes/attribute values. This allowed cross-site scripting (XSS) attacks via attributes and link URLs, e.g., supported in XWiki syntax. This has been patched in XWiki 14.6-rc-1....
null
6.1
2023-05-10T18:15Z
nan
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
XRENDERING-663: Restrict allowed attributes in HTML rendering * Change HTML renderers to only print allowed attributes and elements. * Add prefix to forbidden attributes to preserve them in XWiki syntax. * Adapt tests to expect that invalid attributes get a prefix.
2022-06-30 16:47:21 +0200
c40e2f5f
1,624
2
[ "xwiki-rendering-integration-tests/src/test/resources/simple/escape/escape15.test", "xwiki-rendering-integration-tests/src/test/resources/simple/group/group9.test", "xwiki-rendering-integration-tests/src/test/resources/simple/horizontalline/horizontalline5.test", "xwiki-rendering-integration-tests/src/test/re...
Other
{"xwiki-rendering-integration-tests/src/test/resources/simple/escape/escape15.test": {"lines_added": 3, "lines_deleted": 3}, "xwiki-rendering-integration-tests/src/test/resources/simple/group/group9.test": {"lines_added": 2, "lines_deleted": 2}, "xwiki-rendering-integration-tests/src/test/resources/simple/horizontallin...
diff --git a/xwiki-rendering-integration-tests/src/test/resources/simple/escape/escape15.test b/xwiki-rendering-integration-tests/src/test/resources/simple/escape/escape15.test index be4017ec..3dc50f45 100644 --- a/xwiki-rendering-integration-tests/src/test/resources/simple/escape/escape15.test +++ b/xwiki-rendering-in...
<p><span class="wikiexternallink"><a param="value" href="refe||rence">lab&gt;&gt;el~</a></span></p> <p><!--startwikilink:false|-|url|-|refe||rence--><span class="wikiexternallink"><a param="value" href="refe||rence">lab&gt;&gt;el~</a></span><!--stopwikilink--></p> <p><!--startwikilink:false|-|url|-|refe||rence--><span ...
<p><span class="wikiexternallink"><a data-xwiki-translated-attribute-param="value" href="refe||rence">lab&gt;&gt;el~</a></span></p> <p><!--startwikilink:false|-|url|-|refe||rence--><span class="wikiexternallink"><a data-xwiki-translated-attribute-param="value" href="refe||rence">lab&gt;&gt;el~</a></span><!--stopwikilin...
[]
CVE-2023-37908
f4d5acac451dccaf276e69f0b49b72221eef5d2f
https://github.com/xwiki/xwiki-rendering
[{'lang': 'en', 'value': 'XWiki Rendering is a generic Rendering system that converts textual input in a given syntax into another syntax. The cleaning of attributes during XHTML rendering, introduced in version 14.6-rc-1, allowed the injection of arbitrary HTML code and thus cross-site scripting via invalid attribute ...
null
9.6
2023-10-25T18:17Z
nan
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
XRENDERING-697: XHTMLWikiPrinter doesn't validate generated data attributes * Strip invalid characters and make sure the data attribute is allowed. * Add tests.
2023-01-13 17:40:51 +0100
f4d5acac4
1,624
2
[ "xwiki-rendering-xml/src/main/java/org/xwiki/rendering/renderer/printer/XHTMLWikiPrinter.java", "xwiki-rendering-xml/src/test/java/org/xwiki/rendering/renderer/printer/XHTMLWikiPrinterTest.java" ]
Java
{"xwiki-rendering-xml/src/main/java/org/xwiki/rendering/renderer/printer/XHTMLWikiPrinter.java": {"lines_added": 51, "lines_deleted": 4}, "xwiki-rendering-xml/src/test/java/org/xwiki/rendering/renderer/printer/XHTMLWikiPrinterTest.java": {"lines_added": 81, "lines_deleted": 0}}
diff --git a/xwiki-rendering-xml/src/main/java/org/xwiki/rendering/renderer/printer/XHTMLWikiPrinter.java b/xwiki-rendering-xml/src/main/java/org/xwiki/rendering/renderer/printer/XHTMLWikiPrinter.java index 766250a17..83df754d1 100644 --- a/xwiki-rendering-xml/src/main/java/org/xwiki/rendering/renderer/printer/XHTMLWik...
cleanAttributes.put(TRANSLATED_ATTRIBUTE_PREFIX + e.getKey(), e.getValue()); return new String[] { TRANSLATED_ATTRIBUTE_PREFIX + entry[0], entry[1] }; ((AttributesImpl) allowedAttribute).addAttribute(null, null, TRANSLATED_ATTRIBUTE...
import java.util.Objects; import java.util.regex.Pattern; /** * Pattern for matching characters not allowed in data attributes. * <p> * This is the inverse of the definition of a name being * <a href="https://html.spec.whatwg.org/multipage/infrastructure.html#xml-compatible>XML-compatible</a>, ...
[ "validation" ]
CVE-2023-37912
5f558b8fac8b716d19999225f38cb8ed0814116e
https://github.com/xwiki/xwiki-rendering
[{'lang': 'en', 'value': 'XWiki Rendering is a generic Rendering system that converts textual input in a given syntax into another syntax. Prior to version 14.10.6 of `org.xwiki.platform:xwiki-core-rendering-macro-footnotes` and `org.xwiki.platform:xwiki-rendering-macro-footnotes` and prior to version 15.1-rc-1 of `org...
null
8.8
2023-10-25T18:17Z
nan
NVD-CWE-noinfo
Insufficient Information
There is insufficient information about the issue to classify it; details are unkown or unspecified.
XRENDERING-688: Improve footnote rendering (#246) * Parse and execute the footnote's content directly instead of from the putFootnotes macro. * Use the id generator to generate unique ids. * Adapt the existing test to expect nested footnote support. * Add new tests to test some more corner cases. * Wrap the con...
2023-02-16 13:46:00 +0100
5f558b8fa
1,624
2
[ "xwiki-rendering-macros/xwiki-rendering-macro-footnotes/pom.xml", "xwiki-rendering-macros/xwiki-rendering-macro-footnotes/src/main/java/org/xwiki/rendering/internal/macro/footnote/FootnoteMacro.java", "xwiki-rendering-macros/xwiki-rendering-macro-footnotes/src/main/java/org/xwiki/rendering/internal/macro/footno...
Java
{"xwiki-rendering-macros/xwiki-rendering-macro-footnotes/pom.xml": {"lines_added": 0, "lines_deleted": 2}, "xwiki-rendering-macros/xwiki-rendering-macro-footnotes/src/main/checkstyle/checkstyle-suppressions.xml": {"lines_added": 0, "lines_deleted": 30}, "xwiki-rendering-macros/xwiki-rendering-macro-footnotes/src/main/j...
diff --git a/xwiki-rendering-macros/xwiki-rendering-macro-footnotes/pom.xml b/xwiki-rendering-macros/xwiki-rendering-macro-footnotes/pom.xml index a44e855ab..cf3e0ab0e 100644 --- a/xwiki-rendering-macros/xwiki-rendering-macro-footnotes/pom.xml +++ b/xwiki-rendering-macros/xwiki-rendering-macro-footnotes/pom.xml @@ -32,...
<!-- {{putFootnotes}} is a complex macro that needs to instantiate several different XDOM classes --> <checkstyle.suppressions.location>${basedir}/src/main/checkstyle/checkstyle-suppressions.xml</checkstyle.suppressions.location> <?xml version="1.0" encoding="UTF-8"?> <!-- * See the NOTICE file distributed wi...
import javax.inject.Inject; import org.xwiki.rendering.macro.MacroContentParser; /** * Used to parse the content of the footnote. */ @Inject private MacroContentParser contentParser; return this.contentParser.parse(content, context, true, true).getChildren(); import java.util.LinkedHashM...
[ "validation" ]
CVE-2024-29900
d421d4bd3ced889a4143c5c3ab6d95e3be249eee
https://github.com/electron/packager
[{'lang': 'en', 'value': 'Electron Packager bundles Electron-based application source code with a renamed Electron executable and supporting files into folders ready for distribution. A random segment of ~1-10kb of Node.js heap memory allocated either side of a known buffer will be leaked into the final executable. Thi...
null
null
2024-03-29T16:15Z
nan
NVD-CWE-noinfo
Insufficient Information
There is insufficient information about the issue to classify it; details are unkown or unspecified.
fix: do not deref the integrity buffer (#1699)
2024-03-28 09:26:41 -0700
d421d4b
154
2
[ "src/resedit.ts" ]
TypeScript
{"src/resedit.ts": {"lines_added": 8, "lines_deleted": 3}}
diff --git a/src/resedit.ts b/src/resedit.ts index aa9c503..b517da2 100644 --- a/src/resedit.ts +++ b/src/resedit.ts @@ -114,14 +114,19 @@ export async function resedit(exePath: string, options: ExeMetadata) { // Output version info versionInfo[0].outputToResourceEntries(res.entries); // Asar Integrity if...
type: 'Integrity', id: 'ElectronAsar', bin: Buffer.from(JSON.stringify(options.asarIntegrity)).buffer,
const integrityList = Object.keys(options.asarIntegrity).map((file) => ({ file, alg: options.asarIntegrity![file].algorithm, value: options.asarIntegrity![file].hash, })); type: 'INTEGRITY', id: 'ELECTRONASAR', bin: Buffer.from(JSON.stringify(integrityList), 'utf-8'),
[]
CVE-2021-4431
3bd1709a8f7b1720529bf5dfc9855ad609f436cf
https://github.com/msyk/FMDataAPI
[{'lang': 'en', 'value': 'A vulnerability classified as problematic has been found in msyk FMDataAPI up to 22. Affected is an unknown function of the file FMDataAPI_Sample.php. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 23 is able to address this i...
null
6.1
2023-11-07T11:15Z
nan
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Fix XSS in FMDataAPI_Sample.php
2021-08-27 23:21:27 +0900
3bd1709
34
3
[ "samples/FMDataAPI_Sample.php" ]
PHP
{"samples/FMDataAPI_Sample.php": {"lines_added": 53, "lines_deleted": 53}}
diff --git a/samples/FMDataAPI_Sample.php b/samples/FMDataAPI_Sample.php index 107c3ee..3bf14f4 100644 --- a/samples/FMDataAPI_Sample.php +++ b/samples/FMDataAPI_Sample.php @@ -40,80 +40,80 @@ try { // In case of self-signed one (usually default situation), you don't have to call this method. //$fmdb->setCert...
echo "Product Info: {$pInfo}<hr>"; echo "Database Names: {$pInfo}<hr>"; echo "Layout Names: {$pInfo}<hr>"; echo "Script Names: {$pInfo}<hr>"; echo "Layout Metadata: {$pInfo}<hr>"; echo "Layout Metadata (Old): {$pInfo}<hr>"; echo "HTTP Status: {$fmdb->httpStatus()}<hr>"; echo "Error Code:...
echo htmlspecialchars("Product Info: {$pInfo}", ENT_QUOTES, "UTF-8") . "<hr>"; echo htmlspecialchars("Database Names: {$pInfo}", ENT_QUOTES, "UTF-8") . "<hr>"; echo htmlspecialchars("Layout Names: {$pInfo}", ENT_QUOTES, "UTF-8") . "<hr>"; echo htmlspecialchars("Script Names: {$pInfo}", ENT_QUOTES, "UTF-...
[]
CVE-2023-31470
56d0332bf91104cfc877635f6c82e9348587df04
https://github.com/pymumu/smartdns
[{'lang': 'en', 'value': 'SmartDNS through 41 before 56d0332 allows an out-of-bounds write because of a stack-based buffer overflow in the _dns_encode_domain function in the dns.c file, via a crafted DNS request.'}]
null
9.8
2023-04-28T21:15Z
nan
CWE-787
Out-of-bounds Write
The product writes data past the end, or before the beginning, of the intended buffer.
dns: fix crash issue
2023-04-22 19:06:44 +0800
56d0332
428
2
[ "src/dns.c", "src/dns.h", "src/util.c" ]
C
{"src/dns.c": {"lines_added": 72, "lines_deleted": 17}, "src/dns.h": {"lines_added": 16, "lines_deleted": 7}, "src/util.c": {"lines_added": 20, "lines_deleted": 3}}
diff --git a/src/dns.c b/src/dns.c index c2b0700..42a3b20 100644 --- a/src/dns.c +++ b/src/dns.c @@ -272,10 +272,14 @@ static int _dns_encode_domain(struct dns_context *context, const char *domain) /*[len]string[len]string...[0]0 */ while (_dns_left_len(context) > 1 && *domain != 0) { total_len++; if (dict_of...
int dns_add_rr_nested_memcpy(struct dns_rr_nested *rr_nested, void *data, int data_len) int target_len = strnlen(target, DNS_MAX_CNAME_LEN) + 1; int dns_HTTPS_add_ipv4hint(struct dns_rr_nested *svcparam, unsigned char addr[][DNS_RR_A_LEN], int addr_num) int dns_HTTPS_add_ipv6hint(struct dns_rr_nested *svcparam, unsign...
if (_dns_left_len(context) < 2) { return -1; } if (_dns_left_len(context) < 1) { return -1; } int dns_add_rr_nested_memcpy(struct dns_rr_nested *rr_nested, const void *data, int data_len) /* NO SVC keys, reset ptr */ if (len <= 14) { rr_nested->context.ptr = rr_nested->rr_start; return 0; } int...
[]
CVE-2023-28444
d701f51260637a84ede278e248934e0437a7ff86
https://github.com/kyubisation/angular-server-side-configuration
[{'lang': 'en', 'value': 'angular-server-side-configuration helps configure an angular application at runtime on the server or in a docker container via environment variables. angular-server-side-configuration detects used environment variables in TypeScript (.ts) files during build time of an Angular CLI project. The ...
null
7.5
2023-03-24T20:15Z
nan
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
feat: add searchPattern as an option and restrict default search pattern (#75) With version 15, the behavior of the environment variable lookup changed to try to find occurrences in the whole workspace. This could lead to a potential information disclosure vulnerability, by exposing environment variables meant for a b...
2023-03-22 17:36:12 +0100
d701f51
107
2
[ ".gitignore", ".nvmrc", "README.md", "package.json", "projects/angular-server-side-configuration/builders/browser/schema.json", "projects/angular-server-side-configuration/builders/dev-server/index.ts", "projects/angular-server-side-configuration/builders/dev-server/schema.json", "projects/angular-ser...
TypeScript
{".gitignore": {"lines_added": 1, "lines_deleted": 0}, ".nvmrc": {"lines_added": 1, "lines_deleted": 0}, "README.md": {"lines_added": 27, "lines_deleted": 5}, "package.json": {"lines_added": 2, "lines_deleted": 0}, "projects/angular-server-side-configuration/builders/browser/schema.json": {"lines_added": 73, "lines_del...
diff --git a/.gitignore b/.gitignore index 242e9b6..7720b6f 100644 --- a/.gitignore +++ b/.gitignore @@ -8,10 +8,11 @@ yarn-error.log* # Runtime data pids *.pid *.seed *.pid.lock +test/test-project-* # Directory for instrumented libs generated by jscoverage/JSCover lib-cov # Coverage directory used by tools...
either `app.module.ts`, `app.components.ts` or `main.ts` depending on availability. The ngssc builder will also now search all files for environment variable usages instead of just the defined environment file. Due to this, the `ngsscEnvironmentFile` option can be removed. "filePattern": "index.html" ### en...
test/test-project-* 18 ## Changes with version 15.1 With the change in version 15 to search all files for environment variables, a potential information disclosure vulnerability was introduced, as unintended environment variables might be exposed. You might be affected, if you use environment variables in your angula...
[]
CVE-2014-8351
489b6050f6c53fe7b24c4bed3eeb9c25543960e2
https://github.com/LaboCNIL/CookieViz
[{'lang': 'en', 'value': 'SQL injection vulnerability in info.php in French National Commission on Informatics and Liberty (aka CNIL) CookieViz before 1.0.1 allows remote web servers to execute arbitrary SQL commands via the domain parameter.'}]
7.5
null
2014-11-06T15:55Z
HIGH
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syn...
Patch vulnerabilities Patch vulnerabilities : CVE-2014-8352 CVE-2014-8351
2014-11-04 11:30:34 +0100
489b605
80
2
[ "cookieviz/info.php", "cookieviz/json.php" ]
PHP
{"cookieviz/info.php": {"lines_added": 8, "lines_deleted": 2}, "cookieviz/json.php": {"lines_added": 6, "lines_deleted": 2}}
diff --git a/cookieviz/info.php b/cookieviz/info.php index 9344255..84cffba 100755 --- a/cookieviz/info.php +++ b/cookieviz/info.php @@ -1,6 +1,6 @@ -<?php +<?php /*Copyright (c) 2013, Stéphane Petitcolas This file is part of CookieViz CookieViz is free software: you can redistribute it and/or modify it under th...
<?php $domain = $_GET["domain"]; $init_max_date = $_GET["max_date"]; $domain = $_GET["domain"];
<?php $domain = mysql_real_escape_string($_GET["domain"]); else { exit; } $init_max_date = mysql_real_escape_string($_GET["max_date"]); if (!is_numeric($init_max_date)) { $init_max_date=""; } $domain = mysql_real_escape_string($_GET["domain"]);
[]
CVE-2014-8352
489b6050f6c53fe7b24c4bed3eeb9c25543960e2
https://github.com/LaboCNIL/CookieViz
[{'lang': 'en', 'value': 'Cross-site scripting (XSS) vulnerability in json.php in French National Commission on Informatics and Liberty (aka CNIL) CookieViz allows remote we servers to inject arbitrary web script or HTML via the max_date parameter.'}]
4.3
null
2014-11-06T15:55Z
MEDIUM
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Patch vulnerabilities Patch vulnerabilities : CVE-2014-8352 CVE-2014-8351
2014-11-04 11:30:34 +0100
489b605
80
2
[ "cookieviz/info.php", "cookieviz/json.php" ]
PHP
{"cookieviz/info.php": {"lines_added": 8, "lines_deleted": 2}, "cookieviz/json.php": {"lines_added": 6, "lines_deleted": 2}}
diff --git a/cookieviz/info.php b/cookieviz/info.php index 9344255..84cffba 100755 --- a/cookieviz/info.php +++ b/cookieviz/info.php @@ -1,6 +1,6 @@ -<?php +<?php /*Copyright (c) 2013, Stéphane Petitcolas This file is part of CookieViz CookieViz is free software: you can redistribute it and/or modify it under th...
<?php $domain = $_GET["domain"]; $init_max_date = $_GET["max_date"]; $domain = $_GET["domain"];
<?php $domain = mysql_real_escape_string($_GET["domain"]); else { exit; } $init_max_date = mysql_real_escape_string($_GET["max_date"]); if (!is_numeric($init_max_date)) { $init_max_date=""; } $domain = mysql_real_escape_string($_GET["domain"]);
[]
CVE-2023-1070
0af3574caba27a61b16dc25c94fa51ae12d2d967
https://github.com/nilsteampassnet/teampass
[{'lang': 'en', 'value': 'External Control of File Name or Path in GitHub repository nilsteampassnet/teampass prior to 3.0.0.22.'}]
null
7.1
2023-02-27T16:15Z
nan
CWE-73
External Control of File Name or Path
The product allows user input to control or influence paths or file names that are used in filesystem operations.
3.0.0.23 Fix for #3520 Fix vulnerability related to teampass-seckey.txt file
2023-02-14 08:01:35 +0100
0af3574c
8,325
3
[ "api/Model/ItemModel.php", "includes/config/include.php", "includes/core/load.js.php", "includes/core/login.js.php", "includes/core/login.php", "includes/core/logout.php", "includes/core/otv.php", "includes/language/arabic.php", "includes/language/bulgarian.php", "includes/language/catalan.php", ...
PHP
{"api/Model/ItemModel.php": {"lines_added": 1, "lines_deleted": 1}, "includes/config/include.php": {"lines_added": 2, "lines_deleted": 2}, "includes/core/load.js.php": {"lines_added": 1, "lines_deleted": 1}, "includes/core/login.js.php": {"lines_added": 1, "lines_deleted": 1}, "includes/core/login.php": {"lines_added":...
diff --git a/api/Model/ItemModel.php b/api/Model/ItemModel.php index a27cb749..75c2a821 100755 --- a/api/Model/ItemModel.php +++ b/api/Model/ItemModel.php @@ -75,11 +75,11 @@ class ItemModel extends Database $path = ''; foreach ($arbo as $elem) { if (empty($path) === true) { ...
$path .= '>' . htmlspecialchars(stripslashes(htmlspecialchars_decode($elem->title, ENT_QUOTES)), ENT_QUOTES); * @version 3.0.0.22 define('TP_VERSION_FULL', TP_VERSION.'.22'); * @version 3.0.0.22 * @version 3.0.0.22 * @version 3.0.0.22 * @version 3.0.0.22 * @version 3.0.0.22 * @ver...
$path .= '/' . htmlspecialchars(stripslashes(htmlspecialchars_decode($elem->title, ENT_QUOTES)), ENT_QUOTES); * @version 3.0.0.23 define('TP_VERSION_FULL', TP_VERSION.'.23'); * @version 3.0.0.23 * @version 3.0.0.23 * @version 3.0.0.23 * @version 3.0.0.23 * @version 3.0.0.23 * @ver...
[]
CVE-2023-1463
4e06fbaf2b78c3615d0599855a72ba7e31157516
https://github.com/nilsteampassnet/teampass
[{'lang': 'en', 'value': 'Authorization Bypass Through User-Controlled Key in GitHub repository nilsteampassnet/teampass prior to 3.0.0.23.'}]
null
5.4
2023-03-17T12:15Z
nan
CWE-639
Authorization Bypass Through User-Controlled Key
The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.
3.0.0.23 Fix for identified CWE-285: Improper Authorization
2023-03-17 11:40:49 +0100
4e06fbaf2
8,325
3
[ "error.php", "includes/core/load.js.php", "includes/core/logout.php", "install/css/install.css", "install/upgrade.php" ]
PHP
{"error.php": {"lines_added": 1, "lines_deleted": 1}, "includes/core/load.js.php": {"lines_added": 2, "lines_deleted": 2}, "includes/core/logout.php": {"lines_added": 6, "lines_deleted": 4}, "install/css/install.css": {"lines_added": 0, "lines_deleted": 8}, "install/upgrade.php": {"lines_added": 30, "lines_deleted": 1}...
diff --git a/error.php b/error.php index b5e44337c..76f55ed1b 100755 --- a/error.php +++ b/error.php @@ -101,11 +101,11 @@ if ( <div class="error-content"> <h3><i class="fa fa-warning text-danger"></i> Oops! <?php echo $errorCode; ?>.</h3> <p> - For ...
For security reason, you have been disconnected. Click to <a href="./includes/core/logout.php?user_id=" + <?php echo isset($_SESSION['user_id']) === true ? $_SESSION['user_id'] : ''; ?>>log in</a>. window.location.href = "./includes/core/logout.php?user_id=" + <?php echo $_SESSION['u...
For security reason, you have been disconnected. Click to <a href="./includes/core/logout.php?token=" + <?php echo isset($_SESSION['key']) === true ? $_SESSION['key'] : ''; ?>>log in</a>. window.location.href = "./includes/core/logout.php?token=<?php echo $_SESSION['key']; ?>"; ...
[ "authentication" ]
CVE-2023-1545
4780252fdb600ef2ec2758f17a37d738570cbe66
https://github.com/nilsteampassnet/teampass
[{'lang': 'en', 'value': 'SQL Injection in GitHub repository nilsteampassnet/teampass prior to 3.0.0.23.'}]
null
7.5
2023-03-21T11:15Z
nan
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syn...
3.0.0.22 Fix CWE-89: SQL Injection in API (Sonia Zorba)
2023-02-09 18:46:52 +0100
4780252fd
8,325
3
[ "api/Model/AuthModel.php" ]
PHP
{"api/Model/AuthModel.php": {"lines_added": 49, "lines_deleted": 20}}
diff --git a/api/Model/AuthModel.php b/api/Model/AuthModel.php index dcc37ec8a..6d97c0e25 100755 --- a/api/Model/AuthModel.php +++ b/api/Model/AuthModel.php @@ -39,46 +39,75 @@ class AuthModel extends Database * @param string $apikey * @return array */ public function getUserAuth(string $login, s...
// Check if user exists $userInfoRes = $this->select("SELECT id, pw, public_key, private_key, personal_folder, fonction_id, groupes_visibles, groupes_interdits, user_api_key FROM " . prefixTable('users') . " WHERE login='".$login."'"); $userInfoRes[0]['special'] = ''; $userInfo = $userIn...
// Sanitize include_once API_ROOT_PATH . '/../sources/main.functions.php'; $inputData = dataSanitizer( [ 'login' => isset($login) === true ? $login : '', 'password' => isset($password) === true ? $password : '', 'apikey' => isset($apike...
[]
CVE-2023-2021
77c541a0151841d1f4ceb0a84ca391e1b526d58d
https://github.com/nilsteampassnet/teampass
[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.3.'}]
null
5.4
2023-04-13T12:15Z
nan
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
3.0.3 Fix potential XSS in item description field
2023-04-09 14:54:25 +0200
77c541a01
8,325
3
[ "includes/libraries/anti-xss-master/src/voku/helper/ASCII.php", "includes/libraries/anti-xss-master/src/voku/helper/UTF8.php", "includes/libraries/anti-xss-master/src/voku/helper/data/ascii_by_languages.php", "includes/libraries/anti-xss-master/src/voku/helper/data/ascii_extras_by_languages.php", "includes/...
PHP
{"includes/libraries/anti-xss-master/src/voku/helper/ASCII.php": {"lines_added": 1501, "lines_deleted": 0}, "includes/libraries/anti-xss-master/src/voku/helper/UTF8.php": {"lines_added": 14100, "lines_deleted": 0}, "includes/libraries/anti-xss-master/src/voku/helper/data/ascii_by_languages.php": {"lines_added": 2950, "...
diff --git a/includes/libraries/anti-xss-master/src/voku/helper/ASCII.php b/includes/libraries/anti-xss-master/src/voku/helper/ASCII.php new file mode 100644 index 000000000..6688c27ef --- /dev/null +++ b/includes/libraries/anti-xss-master/src/voku/helper/ASCII.php @@ -0,0 +1,1501 @@ +<?php + +declare(strict_types=1); ...
$post_description = ($dataReceived['description']); $post_description = ($dataReceived['description']);
<?php declare(strict_types=1); namespace voku\helper; /** * ## 🇷🇺 Русским гражданам * В Украине сейчас идет война. Силами РФ наносятся удары по гражданской инфраструктуре в [Харькове][1], [Киеве][2], [Чернигове][3], [Сумах][4], [Ирпене][5] и десятках других городов. Гибнут люди - и гражданское население, и военн...
[]
CVE-2023-2516
39b774cba118ca5383b0a51a71b1e7dea2761927
https://github.com/nilsteampassnet/teampass
[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.7.'}]
null
5.4
2023-05-05T19:15Z
nan
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
3.0.7 Added purify library to fix potentiel xss
2023-05-02 08:30:07 +0200
39b774cba
8,325
3
[ "index.php", "pages/items.js.php", "plugins/DOMPurify/purify.cjs.js", "plugins/DOMPurify/purify.cjs.js.map", "plugins/DOMPurify/purify.es.js", "plugins/DOMPurify/purify.es.js.map", "plugins/DOMPurify/purify.js", "plugins/DOMPurify/purify.js.map", "plugins/DOMPurify/purify.min.js", "plugins/DOMPuri...
JavaScript
{"index.php": {"lines_added": 2, "lines_deleted": 0}, "pages/items.js.php": {"lines_added": 7, "lines_deleted": 7}, "plugins/DOMPurify/purify.cjs.js": {"lines_added": 1597, "lines_deleted": 0}, "plugins/DOMPurify/purify.cjs.js.map": {"lines_added": 1, "lines_deleted": 0}, "plugins/DOMPurify/purify.es.js": {"lines_added...
diff --git a/index.php b/index.php index b933a76b9..ccec1e240 100755 --- a/index.php +++ b/index.php @@ -1152,10 +1152,12 @@ if (($session_validite_pw === null <!--<link rel="stylesheet" href="./plugins/icheck-material/icheck-material.min.css">--> <link rel="stylesheet" href="./plugins/icheck/skins/all.css"> ...
'description': $('#form-item-description').summernote('code') !== "<p><br></p>" ? $('#form-item-description').summernote('code') : '', 'email': $('#form-item-email').val(), 'label': $('#form-item-label').val(), 'login': $('#form-item-login'...
<!-- DOMPurify --> <script type="text/javascript" src="plugins/DOMPurify/purify.min.js"></script> 'description': $('#form-item-description').summernote('code') !== "<p><br></p>" ? DOMPurify.sanitize($('#form-item-description').summernote('code'), {USE_PROFILES: {html: true}}) : '', ...
[]
CVE-2023-2591
57a977c6323656e5dc06ab5c227e75c3465a1a4a
https://github.com/nilsteampassnet/teampass
[{'lang': 'en', 'value': "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitHub repository nilsteampassnet/teampass prior to 3.0.7."}]
null
5.4
2023-05-09T10:15Z
nan
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
3.0.7 Fix potential vulnerability in item label field
2023-05-09 10:34:40 +0200
57a977c63
8,325
3
[ "pages/items.js.php" ]
PHP
{"pages/items.js.php": {"lines_added": 2, "lines_deleted": 2}}
diff --git a/pages/items.js.php b/pages/items.js.php index 6ae72589f..6f8404cc6 100755 --- a/pages/items.js.php +++ b/pages/items.js.php @@ -2792,19 +2792,19 @@ $var['hidden_asterisk'] = '<i class="fas fa-asterisk mr-2"></i><i class="fas fa- } //prepare data var data =...
'description': $('#form-item-description').summernote('code') !== "<p><br></p>" ? DOMPurify.sanitize($('#form-item-description').summernote('code'), {USE_PROFILES: {html: true}}) : '', 'label': DOMPurify.sanitize($('#form-item-label').val()),
'description': $('#form-item-description').summernote('code') !== "<p><br></p>" ? DOMPurify.sanitize($('#form-item-description').summernote('code'), {USE_PROFILES: {html: true, svg: false, svgFilters: false}}) : '', 'label': DOMPurify.sanitize($('#form-item-label').val(), {USE_PR...
[]
CVE-2023-2859
1f51482a0c4d152ca876844212b0f8f3cb9387af
https://github.com/nilsteampassnet/teampass
[{'lang': 'en', 'value': 'Code Injection in GitHub repository nilsteampassnet/teampass prior to 3.0.9.'}]
null
8.8
2023-05-24T08:15Z
nan
CWE-94
Improper Control of Generation of Code ('Code Injection')
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
3.0.9 Fix vulnerability in form folder creation
2023-05-24 08:59:22 +0200
1f51482a0
8,325
3
[ "includes/config/include.php", "pages/items.js.php", "pages/users.js.php", "sources/main.functions.php" ]
PHP
{"includes/config/include.php": {"lines_added": 1, "lines_deleted": 1}, "{install1 => install}/css/install.css": {"lines_added": 0, "lines_deleted": 0}, "{install1 => install}/css/overcast/images/animated-overlay.gif": {"lines_added": 0, "lines_deleted": 0}, "{install1 => install}/css/overcast/images/ui-bg_flat_0_aaaaa...
diff --git a/includes/config/include.php b/includes/config/include.php index e39d33a29..6d1528975 100755 --- a/includes/config/include.php +++ b/includes/config/include.php @@ -27,11 +27,11 @@ define('TP_ADMIN_FULL_RIGHT', false); define('TP_ADMIN_NO_INFO', false); define('TP_COPYRIGHT', '2009-'.date('Y')); define('...
define('WIP', true); body{ width: 1000px; margin-left: auto; margin-right: auto; background-image: url(../../includes/images/install_background.jpg); -webkit-background-size: cover; background-size: cover; font-family: sans-serif; } #top{ width: 1000px; margin-left: auto; margin-right: auto; ...
define('WIP', false); debugJavascript = false; 'title': DOMPurify.sanitize($('#form-folder-add-label').val(), {USE_PROFILES: {html: false}}), 'icon': DOMPurify.sanitize($('#form-folder-add-icon').val(), {USE_PROFILES: {html: false}}), 'iconSelected': DOMPurify.sanitize($('#fo...
[]
CVE-2023-3009
6ba8cf1f4b89d62a08d122d533ccf4cb4e26a4ee
https://github.com/nilsteampassnet/teampass
[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.9.'}]
null
5.4
2023-05-31T13:15Z
nan
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
3.0.9 Vulnerability fix (#3741)
2023-05-31 13:20:19 +0200
6ba8cf1f4b
8,325
3
[ "includes/js/functions.js", "pages/items.js.php" ]
PHP
{"includes/js/functions.js": {"lines_added": 31, "lines_deleted": 0}, "pages/items.js.php": {"lines_added": 33, "lines_deleted": 9}}
diff --git a/includes/js/functions.js b/includes/js/functions.js index 59bd790d11..6f395f954e 100755 --- a/includes/js/functions.js +++ b/includes/js/functions.js @@ -386,6 +386,37 @@ if (typeof String.prototype.utf8Decode == 'undefined') { return decodeURIComponent( escape( this ) ); } catch (e) ...
if ($('#form-item-label').val() === '') { } else if ($('#form-item-tags').val() !== '' && reg.test($('#form-item-tags').val()) 'description': $('#form-item-description').summernote('code') !== "<p><br></p>" ? DOMPurify.sanitize($('#form-item-description').summ...
} function fieldSanitizeStep1( field, bHtml=true, bSvg=true, bSvgFilters=true, text='' ) { if (field === undefined ||field === '') { return false; } let string = ''; text = (text === '') ? $(field).val() : text; // Purify string string = DOMPurify.sanitize( ...
[]
CVE-2023-3083
79731553fa305d45dabb7a227f3074d56d7c94c1
https://github.com/nilsteampassnet/teampass
[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.9.'}]
null
8.7
2023-06-03T08:15Z
nan
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
3.0.9 Fix xss in user form WIP - session ending handling
2023-06-03 08:13:13 +0200
79731553fa
8,325
3
[ "includes/core/load.js.php", "includes/core/logout.php", "index.php", "pages/users.js.php", "sources/main.queries.php" ]
PHP
{"includes/core/load.js.php": {"lines_added": 14, "lines_deleted": 0}, "includes/core/logout.php": {"lines_added": 1, "lines_deleted": 0}, "index.php": {"lines_added": 11, "lines_deleted": 0}, "pages/users.js.php": {"lines_added": 22, "lines_deleted": 4}, "sources/main.queries.php": {"lines_added": 1, "lines_deleted": ...
diff --git a/includes/core/load.js.php b/includes/core/load.js.php index 90046065c5..ccf3178717 100755 --- a/includes/core/load.js.php +++ b/includes/core/load.js.php @@ -52,10 +52,24 @@ if ( <script type="text/javascript"> var userScrollPosition = 0, debugJavascript = true; let hourInMinutes = 60; ...
'login': DOMPurify.sanitize($('#form-login').val()), 'name': DOMPurify.sanitize($('#form-name').val()), 'lastname': DOMPurify.sanitize($('#form-lastname').val()), 'email': DOMPurify.sanitize($('#form-email').val()), header('Cache-Contro...
$(document).ready(function() { //console.log('-- PAGE LOADED --'+$(location).attr('href').includes('?')+" -- "+store.get('teampassUser')); if ($(location).attr('href').includes('?') === true && (store.get('teampassUser') === undefined || parseInt(store.get('teampassUser').user_id) <= 0)) { ...
[]
CVE-2023-3084
61b9b7d4e33bbaad2cd61a7ee988f9c22298bf1a
https://github.com/nilsteampassnet/teampass
[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.9.'}]
null
8.1
2023-06-03T11:15Z
nan
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
3.0.9 Fix for XSS on FolderName
2023-06-03 11:44:52 +0200
61b9b7d4e3
8,325
3
[ "includes/core/load.js.php", "pages/items.js.php", "pages/users.js.php", "sources/identify.php" ]
PHP
{"includes/core/load.js.php": {"lines_added": 1, "lines_deleted": 1}, "pages/items.js.php": {"lines_added": 20, "lines_deleted": 3}, "pages/users.js.php": {"lines_added": 1, "lines_deleted": 1}, "sources/identify.php": {"lines_added": 5, "lines_deleted": 1}}
diff --git a/includes/core/load.js.php b/includes/core/load.js.php index ccf3178717..c6e049034f 100755 --- a/includes/core/load.js.php +++ b/includes/core/load.js.php @@ -782,11 +782,11 @@ if ( setTimeout( function() { $(".fade").removeClass("out"); // Is user not ready - ...
if (typeof store.get('teampassUser').is_ready_for_usage !== 'undefined' && parseInt(store.get('teampassUser').is_ready_for_usage) === 0) { 'title': DOMPurify.sanitize($('#form-folder-add-label').val(), {USE_PROFILES: {html: false}}), 'icon': DOMPurify.sanitize($('#form-folder-add-ico...
if (typeof store.get('teampassUser') !== 'undefined' && typeof store.get('teampassUser').is_ready_for_usage !== 'undefined' && parseInt(store.get('teampassUser').is_ready_for_usage) === 0) { // Sanitize text fields let formLabel = fieldSanitizeStep1('#form-folder-add-label', false, false, fa...
[]
CVE-2023-3086
1c0825b67eb8f8b5ecc418ff7614423a275e6a79
https://github.com/nilsteampassnet/teampass
[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.9.'}]
null
9
2023-06-03T12:15Z
nan
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
3.0.9 Fix xss in user profile form
2023-06-03 12:11:48 +0200
1c0825b67e
8,325
3
[ "includes/js/functions.js", "pages/profile.js.php", "sources/main.functions.php" ]
PHP
{"includes/js/functions.js": {"lines_added": 17, "lines_deleted": 2}, "pages/profile.js.php": {"lines_added": 24, "lines_deleted": 4}, "sources/main.functions.php": {"lines_added": 8, "lines_deleted": 2}}
diff --git a/includes/js/functions.js b/includes/js/functions.js index 6f395f954e..c820cd7d3f 100755 --- a/includes/js/functions.js +++ b/includes/js/functions.js @@ -401,16 +401,31 @@ function fieldSanitizeStep1( if (field === undefined ||field === '') { return false; } let string = ''; te...
.replaceAll('&gt;', '>'), 'name': DOMPurify.sanitize($('#profile-user-name').val()), 'lastname': DOMPurify.sanitize($('#profile-user-lastname').val()), 'email': DOMPurify.sanitize($('#profile-user-email').val()), //console.log(data) $sanitizer = new Elega...
/* // Sanitize string var tagsToReplace = { '&': '&amp;', '<': '&lt;', '>': '&gt;', "'" : '&#39;', '"' : '&quot;' }; text = text.replace(/[&<>'"]/g, function(tag) { return tagsToReplace[tag] || tag; }); */ .replaceAll('&gt;', '>') ...
[]
CVE-2023-3095
774985f62f080715774604927fba2cb6ef701612
https://github.com/nilsteampassnet/teampass
[{'lang': 'en', 'value': 'Improper Access Control in GitHub repository nilsteampassnet/teampass prior to 3.0.9.'}]
null
6.5
2023-06-04T11:15Z
nan
CWE-284
Improper Access Control
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
3.0.9 Fix Broken Access Control On Item via ID
2023-06-04 11:20:08 +0200
774985f62f
8,325
3
[ "install/install.queries.php", "install/upgrade.php", "install/upgrade_operations.php", "install/upgrade_run_3.0.php", "install/upgrade_scripts_manager.php", "pages/items.js.php", "sources/items.queries.php" ]
PHP
{"install/install.php": {"lines_added": 0, "lines_deleted": 0}, "install/install.queries.php": {"lines_added": 2, "lines_deleted": 1}, "install/tp.functions.php": {"lines_added": 0, "lines_deleted": 0}, "install/upgrade.php": {"lines_added": 8, "lines_deleted": 2}, "install/upgrade_ajax.php": {"lines_added": 0, "lines_...
diff --git a/install/install.php b/install/install.php old mode 100644 new mode 100755 diff --git a/install/install.queries.php b/install/install.queries.php old mode 100644 new mode 100755 index 04657bdb73..9b21eebe28 --- a/install/install.queries.php +++ b/install/install.queries.php @@ -428,12 +428,13 @@ if (null !=...
KEY `restricted_inactif_idx` (`restricted_to`,`inactif`) info = ''; $("#step4_progress").html("<div>" + getTime() +" - <i>"+script_file+"</i> - Loop #"+loop_number+" <span id='span_"+rand_number+"'>is now running ... <i class=\"fas fa-cog fa-spin\" style=\"color:orange\"></i><...
`item_key` varchar(500) NOT NULL DEFAULT '1', KEY `restricted_inactif_idx` (`restricted_to`,`inactif`) info = '', text_action_in_progress = script_file; // Inform if (script_file === 'upgrade_operations.php') { text_action_in_progre...
[ "authorization" ]
CVE-2023-3190
241dbd4159a5d63b55af426464d30dbb53925705
https://github.com/nilsteampassnet/teampass
[{'lang': 'en', 'value': 'Improper Encoding or Escaping of Output in GitHub repository nilsteampassnet/teampass prior to 3.0.9.'}]
null
4.6
2023-06-10T09:15Z
nan
CWE-116
Improper Encoding or Escaping of Output
The product prepares a structured message for communication with another component, but encoding or escaping of the data is either missing or done incorrectly. As a result, the intended structure of the message is not preserved.
3.0.9 Fix xss vulnerabilities in several text inputs
2023-06-10 09:30:21 +0200
241dbd4159
8,325
3
[ "includes/js/functions.js", "pages/admin.js.php", "pages/api.js.php", "pages/api.php", "pages/backups.js.php", "pages/emails.js.php", "pages/folders.js.php", "pages/folders.php", "pages/items.js.php", "pages/profile.js.php", "pages/roles.js.php", "pages/users.js.php", "pages/users.php", "s...
PHP
{"includes/js/functions.js": {"lines_added": 123, "lines_deleted": 26}, "pages/admin.js.php": {"lines_added": 7, "lines_deleted": 0}, "pages/api.js.php": {"lines_added": 19, "lines_deleted": 5}, "pages/api.php": {"lines_added": 4, "lines_deleted": 4}, "pages/backups.js.php": {"lines_added": 3, "lines_deleted": 3}, "pag...
diff --git a/includes/js/functions.js b/includes/js/functions.js index c820cd7d3f..9a307a8993 100755 --- a/includes/js/functions.js +++ b/includes/js/functions.js @@ -388,50 +388,147 @@ if (typeof String.prototype.utf8Decode == 'undefined') { return this; // invalid UTF-8? return as-is } }; ...
function fieldSanitizeStep1( field, bHtml=true, bSvg=true, bSvgFilters=true, text='' if (field === undefined ||field === '') { return false; } let string = ''; text = (text === '') ? $(field).val() : text; /* // Sanitize string var tagsToReplace = { '&': '&amp...
function simplePurifier( text, bHtml = false, bSvg = false, bSvgFilters = false return DOMPurify.sanitize( } /** * Permits to purify the content of a string using domPurify * @param {*} field * @param {*} bHtml * @param {*} bSvg * @param {*} bSvgFilters * @param {*} text * @returns bool...
[ "input_handling" ]
CVE-2023-3191
241dbd4159a5d63b55af426464d30dbb53925705
https://github.com/nilsteampassnet/teampass
[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.9.'}]
null
5.4
2023-06-10T09:15Z
nan
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
3.0.9 Fix xss vulnerabilities in several text inputs
2023-06-10 09:30:21 +0200
241dbd4159
8,325
3
[ "includes/js/functions.js", "pages/admin.js.php", "pages/api.js.php", "pages/api.php", "pages/backups.js.php", "pages/emails.js.php", "pages/folders.js.php", "pages/folders.php", "pages/items.js.php", "pages/profile.js.php", "pages/roles.js.php", "pages/users.js.php", "pages/users.php", "s...
PHP
{"includes/js/functions.js": {"lines_added": 123, "lines_deleted": 26}, "pages/admin.js.php": {"lines_added": 7, "lines_deleted": 0}, "pages/api.js.php": {"lines_added": 19, "lines_deleted": 5}, "pages/api.php": {"lines_added": 4, "lines_deleted": 4}, "pages/backups.js.php": {"lines_added": 3, "lines_deleted": 3}, "pag...
diff --git a/includes/js/functions.js b/includes/js/functions.js index c820cd7d3f..9a307a8993 100755 --- a/includes/js/functions.js +++ b/includes/js/functions.js @@ -388,50 +388,147 @@ if (typeof String.prototype.utf8Decode == 'undefined') { return this; // invalid UTF-8? return as-is } }; ...
function fieldSanitizeStep1( field, bHtml=true, bSvg=true, bSvgFilters=true, text='' if (field === undefined ||field === '') { return false; } let string = ''; text = (text === '') ? $(field).val() : text; /* // Sanitize string var tagsToReplace = { '&': '&amp...
function simplePurifier( text, bHtml = false, bSvg = false, bSvgFilters = false return DOMPurify.sanitize( } /** * Permits to purify the content of a string using domPurify * @param {*} field * @param {*} bHtml * @param {*} bSvg * @param {*} bSvgFilters * @param {*} text * @returns bool...
[ "input_handling" ]
CVE-2023-3531
cb8ea5ccca61653895bb6881547e463baa50293d
https://github.com/nilsteampassnet/teampass
[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.10.'}]
null
5.4
2023-07-06T20:15Z
nan
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
3.0.10 Including new time related fields Improving XSS protection
2023-07-06 21:16:02 +0200
cb8ea5ccca
8,325
3
[ "includes/js/functions.js", "install/install.queries.php", "install/upgrade_operations.php", "install/upgrade_run_3.0.php", "install/upgrade_scripts_manager.php", "pages/items.js.php", "pages/items.php", "sources/items.queries.php" ]
PHP
{"includes/js/functions.js": {"lines_added": 14, "lines_deleted": 2}, "install/install.queries.php": {"lines_added": 3, "lines_deleted": 0}, "install/upgrade_operations.php": {"lines_added": 123, "lines_deleted": 37}, "install/upgrade_run_3.0.php": {"lines_added": 56, "lines_deleted": 4}, "install/upgrade_scripts_manag...
diff --git a/includes/js/functions.js b/includes/js/functions.js index 9a307a8993..0340b87ba8 100755 --- a/includes/js/functions.js +++ b/includes/js/functions.js @@ -398,13 +398,21 @@ function simplePurifier( ) { return DOMPurify.sanitize( text .replaceAll('&lt;', '<') + .replac...
typeof $(element).data('purify-text') !== undefined ? $(element).data('purify-text') : '' arrFields[$(element).data('field')] = purifiedField; // ----> // OPERATION - 20230604_1 - generate key for item_key // Get items to treat $rows = mysqli_query( "SELECT id FROM ".$pre...
.replaceAll('&#x3C;', '<') .replaceAll('&#60;', '<') .replaceAll('&#x3E;', '>') .replaceAll('&#62;', '>') .replaceAll('&#38;', '&') .replaceAll('&#x26;', '&') .replaceAll('&#34;;', '"') .replaceAll('&#x22;', '"') ...
[]
CVE-2023-3551
cc6abc76aa46ed4a27736c1d2f21e432a5d54e6f
https://github.com/nilsteampassnet/teampass
[{'lang': 'en', 'value': ' Code Injection in GitHub repository nilsteampassnet/teampass prior to 3.0.10.'}]
null
7.2
2023-07-08T09:15Z
nan
CWE-94
Improper Control of Generation of Code ('Code Injection')
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
3.0.10 Fix for #3779, #3775 Fix for improper handling of input in admin setting pages
2023-07-08 10:02:56 +0200
cc6abc76aa
8,325
3
[ "includes/js/functions.js", "includes/libraries/anti-xss-master/src/voku/helper/AntiXSS.php", "pages/2fa.js.php", "pages/2fa.php", "pages/admin.js.php", "pages/users.js.php", "sources/logs.datatables.php" ]
PHP
{"includes/js/functions.js": {"lines_added": 25, "lines_deleted": 4}, "includes/libraries/anti-xss-master/src/voku/helper/AntiXSS.php": {"lines_added": 1, "lines_deleted": 0}, "pages/2fa.js.php": {"lines_added": 6, "lines_deleted": 25}, "pages/2fa.php": {"lines_added": 4, "lines_deleted": 4}, "pages/admin.js.php": {"li...
diff --git a/includes/js/functions.js b/includes/js/functions.js index 0340b87ba8..8d06dc008b 100755 --- a/includes/js/functions.js +++ b/includes/js/functions.js @@ -393,14 +393,14 @@ if (typeof String.prototype.utf8Decode == 'undefined') { function simplePurifier( text, bHtml = false, bSvg = false, ...
) text let string = ''; string = simplePurifier($(field).val(), bHtml, bSvg, bSvgFilters); console.log('2FA loaded') $(document).on('click', '.generate-key', function() { var size = $(this).data('length'), target = $(this).closest('.input-group').find('input').attr('id'); ...
) sanitizeDom(text) bSetting = false, let string = '', currentString = $(field).val(); // if bSetting is true, we use the setting value // remove any closing ', string that could corrupt the setting if (bSetting === true) { currentString = currentString.replace(/',/g, ''); ...
[ "input_handling" ]
CVE-2023-3552
8acb4dacc2d008a4186a4e13cc143e978f113955
https://github.com/nilsteampassnet/teampass
[{'lang': 'en', 'value': 'Improper Encoding or Escaping of Output in GitHub repository nilsteampassnet/teampass prior to 3.0.10.'}]
null
5.4
2023-07-08T09:15Z
nan
CWE-116
Improper Encoding or Escaping of Output
The product prepares a structured message for communication with another component, but encoding or escaping of the data is either missing or done incorrectly. As a result, the intended structure of the message is not preserved.
3.0.10 Fix possible xss in folder page
2023-07-08 10:17:10 +0200
8acb4dacc2
8,325
3
[ "includes/js/functions.js", "pages/folders.js.php" ]
PHP
{"includes/js/functions.js": {"lines_added": 20, "lines_deleted": 16}, "pages/folders.js.php": {"lines_added": 1, "lines_deleted": 0}}
diff --git a/includes/js/functions.js b/includes/js/functions.js index 8d06dc008b..e394e64a92 100755 --- a/includes/js/functions.js +++ b/includes/js/functions.js @@ -395,26 +395,30 @@ function simplePurifier( bHtml = false, bSvg = false, bSvgFilters = false ) { - return DOMPurify.sanitize( - ...
return DOMPurify.sanitize( sanitizeDom(text) .replaceAll('&lt;', '<') .replaceAll('&#x3C;', '<') .replaceAll('&#60;', '<') .replaceAll('&gt;', '>') .replaceAll('&#x3E;', '>') .replaceAll('&#62;', '>') .replaceAll('&amp;', '&...
return sanitizeDom( DOMPurify.sanitize( text .replaceAll('&lt;', '<') .replaceAll('&#x3C;', '<') .replaceAll('&#x3c;', '<') .replaceAll('&#60;', '<') .replaceAll('&gt;', '>') .replaceAll('&#x3E;', '>'...
[]
CVE-2023-3553
e9f90b746fdde135da3c7fbe4fa22fe2bd32e66b
https://github.com/nilsteampassnet/teampass
[{'lang': 'en', 'value': 'Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository nilsteampassnet/teampass prior to 3.0.10.'}]
null
7.5
2023-07-08T09:15Z
nan
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
3.0.10 Fix directory listing
2023-07-08 10:32:15 +0200
e9f90b746f
8,325
3
[ "api/Controller/index.html", "api/Model/index.html", "api/inc/index.html", "includes/config/index.html", "includes/index.html", "pages/index.html", "plugins/index.html", "scripts/index.html", "sources/index.html" ]
HTML
{"api/Controller/index.html": {"lines_added": 23, "lines_deleted": 0}, "api/Model/index.html": {"lines_added": 23, "lines_deleted": 0}, "api/inc/index.html": {"lines_added": 23, "lines_deleted": 0}, "includes/config/index.html": {"lines_added": 23, "lines_deleted": 0}, "includes/index.html": {"lines_added": 23, "lines_...
diff --git a/api/Controller/index.html b/api/Controller/index.html new file mode 100644 index 0000000000..c98b5bd8b2 --- /dev/null +++ b/api/Controller/index.html @@ -0,0 +1,23 @@ +<!DOCTYPE html> +<html> +<head> + <meta charset="UTF-8"> + <title>Teampass Incorrect Path</title> + <style> + body { + ...
<!DOCTYPE html> <html> <head> <meta charset="UTF-8"> <title>Teampass Incorrect Path</title> <style> body { font-family: Arial, sans-serif; text-align: center; padding: 50px; } h1 { color: #FF0000; } </style> </head>...
[]
CVE-2023-3565
820bb49a362a566c9038e4a3048b26d654babb0e
https://github.com/nilsteampassnet/teampass
[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Generic in GitHub repository nilsteampassnet/teampass prior to 3.0.10.'}]
null
5.4
2023-07-10T16:15Z
nan
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
3.0.10 Fix possible xss
2023-07-08 15:23:13 +0200
820bb49a36
8,325
3
[ "includes/core/load.js.php", "pages/options.php" ]
PHP
{"includes/core/load.js.php": {"lines_added": 1, "lines_deleted": 1}, "pages/options.php": {"lines_added": 11, "lines_deleted": 11}}
diff --git a/includes/core/load.js.php b/includes/core/load.js.php index c6e049034f..4562405d03 100755 --- a/includes/core/load.js.php +++ b/includes/core/load.js.php @@ -1513,11 +1513,11 @@ if ( ); // Perform action $.when( IncreaseSessionTime( - ...
$('#warningModal-input').val() <input type='text' class='form-control form-control-sm' id='default_session_expiration_time' value='<?php echo $SETTINGS['default_session_expiration_time'] ?? '60'; ?>'> <input type='text' class='form-cont...
fieldDomPurifierWithWarning('#warningModal-input') <input type='number' class='form-control form-control-sm' id='default_session_expiration_time' value='<?php echo $SETTINGS['default_session_expiration_time'] ?? '60'; ?>'> <input type='...
[]
CVE-2015-6941
c0689e32154c41f59840ae10ffc5fbfa30618710
https://github.com/twangboy/salt
[{'lang': 'en', 'value': 'win_useradd, salt-cloud and the Linode driver in salt 2015.5.x before 2015.5.6, and 2015.8.x before 2015.8.1 leak password information in debug logs.'}]
5
9.8
2017-08-09T16:29Z
MEDIUM
CWE-534
DEPRECATED: Information Exposure Through Debug Log Files
This entry has been deprecated because its abstraction was too low-level. See CWE-532.
Replaced password with redacted when displayed
2015-09-11 16:48:21 -0600
c0689e321
6,766
2
[ "salt/states/user.py" ]
Python
{"salt/states/user.py": {"lines_added": 6, "lines_deleted": 4}}
diff --git a/salt/states/user.py b/salt/states/user.py index 1f269b3aa..b31ec0c69 100644 --- a/salt/states/user.py +++ b/salt/states/user.py @@ -365,10 +365,12 @@ def present(name, if __opts__['test']: ret['result'] = None ret['comment'] = ('The following user attributes are set to be...
' {1}'.format(name, password) ret['changes']['password'] = password ' {1}'.format(name, password) ret['changes']['passwd'] = password
if key == 'password': val = 'XXX-REDACTED-XXX' ' {1}'.format(name, 'XXX-REDACTED-XXX') ret['changes']['password'] = 'XXX-REDACTED-XXX' ' {1}'.format(name, 'XXX-REDACTED-XXX') ...
[]
CVE-2020-15095
a9857b8f6869451ff058789c4631fadfde5bbcbc
https://github.com/npm/cli
[{'lang': 'en', 'value': 'Versions of the npm CLI prior to 6.14.6 are vulnerable to an information exposure vulnerability through log files. The CLI supports URLs like "<protocol>://[<user>[:<password>]@]<hostname>[:<port>][:][/]<path>". The password value is not redacted and is printed to stdout and also to any genera...
1.9
4.4
2020-07-07T19:15Z
LOW
CWE-532
Insertion of Sensitive Information into Log File
Information written to log files can be of a sensitive nature and give valuable guidance to an attacker or expose sensitive user information.
chore: remove auth info from logs
2020-06-30 13:38:27 -0500
a9857b8f6
7,037
2
[ "bin/npm-cli.js", "lib/fetch-package-metadata.js", "lib/utils/error-handler.js", "lib/utils/error-message.js", "lib/utils/replace-info.js" ]
JavaScript
{"bin/npm-cli.js": {"lines_added": 3, "lines_deleted": 1}, "lib/fetch-package-metadata.js": {"lines_added": 6, "lines_deleted": 3}, "lib/utils/error-handler.js": {"lines_added": 4, "lines_deleted": 1}, "lib/utils/error-message.js": {"lines_added": 5, "lines_deleted": 0}, "lib/utils/replace-info.js": {"lines_added": 22,...
diff --git a/bin/npm-cli.js b/bin/npm-cli.js index 93eddc7a3..c0d9be004 100755 --- a/bin/npm-cli.js +++ b/bin/npm-cli.js @@ -26,10 +26,11 @@ unsupported.checkForUnsupportedNode() var npm = require('../lib/npm.js') var npmconf = require('../lib/config/core.js') var errorHandler = require('../lib/utils/erro...
log.verbose('cli', process.argv) const tempFilename = require('./utils/temp-filename') const pacote = require('pacote') log.silly('fetchPackageMetaData', 'error for ' + String(spec), er.message) log.verbose('argv', process.argv.map(JSON.stringify).join(' '))
var replaceInfo = require('../lib/utils/replace-info.js') var args = replaceInfo(process.argv) log.verbose('cli', args) const pacote = require('pacote') const tempFilename = require('./utils/temp-filename.js') const replaceInfo = require('./utils/replace-info.js') er.message = replaceInfo(er.message) ...
[ "authentication" ]
CVE-2021-43616
457e0ae61bbc55846f5af44afa4066921923490f
https://github.com/npm/cli
[{'lang': 'en', 'value': 'The npm ci command in npm 7.x and 8.x through 8.1.3 proceeds with an installation even if dependency information in package-lock.json differs from package.json. This behavior is inconsistent with the documentation, and makes it easier for attackers to install malware that was supposed to have ...
7.5
9.8
2021-11-13T18:15Z
HIGH
CWE-345
Insufficient Verification of Data Authenticity
The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
fix(ci): lock file validation Make sure to validate any lock file (either package-lock.json or npm-shrinkwrap.json) against the current install. This will properly throw an error in case any of the dependencies being installed don't match the dependencies that are currently listed in the lock file. Fixes: https://git...
2022-02-03 14:23:46 -0500
457e0ae61
7,037
2
[ "lib/commands/ci.js", "lib/utils/validate-lockfile.js", "smoke-tests/index.js", "tap-snapshots/smoke-tests/index.js.test.cjs", "tap-snapshots/test/lib/commands/ci.js.test.cjs", "tap-snapshots/test/lib/utils/validate-lockfile.js.test.cjs", "test/lib/commands/ci.js", "test/lib/utils/validate-lockfile.js...
JavaScript
{"lib/commands/ci.js": {"lines_added": 23, "lines_deleted": 0}, "lib/utils/validate-lockfile.js": {"lines_added": 29, "lines_deleted": 0}, "smoke-tests/index.js": {"lines_added": 29, "lines_deleted": 0}, "tap-snapshots/smoke-tests/index.js.test.cjs": {"lines_added": 11, "lines_deleted": 0}, "tap-snapshots/test/lib/comm...
diff --git a/lib/commands/ci.js b/lib/commands/ci.js index 2c2f8da86..376a85d60 100644 --- a/lib/commands/ci.js +++ b/lib/commands/ci.js @@ -4,10 +4,11 @@ const rimraf = util.promisify(require('rimraf')) const reifyFinish = require('../utils/reify-finish.js') const runScript = require('@npmcli/run-script') const fs ...
const validateLockfile = require('../utils/validate-lockfile.js') // retrieves inventory of packages from loaded virtual tree (lock file) const virtualInventory = new Map(arb.virtualTree.inventory) // build ideal tree step needs to come right after retrieving the virtual // inventory since it's going ...
[ "validation" ]
CVE-2018-1000041
f9d69eadd2b16b00d1a1f9f286122123f8e547dd
https://github.com/ImageMagick/librsvg
[{'lang': 'en', 'value': "GNOME librsvg version before commit c6ddf2ed4d768fd88adbea2b63f575cd523022ea contains a Improper input validation vulnerability in rsvg-io.c that can result in the victim's Windows username and NTLM password hash being leaked to remote attackers through SMB. This attack appear to be exploitabl...
4.3
8.8
2018-02-09T23:29Z
MEDIUM
NVD-CWE-noinfo
Insufficient Information
There is insufficient information about the issue to classify it; details are unkown or unspecified.
Fixed possible credentials leaking reported by Alex Birsan.
2017-11-27 21:18:43 +0100
f9d69ea
423
2
[ "rsvg-io.c" ]
C
{"rsvg-io.c": {"lines_added": 1, "lines_deleted": 1}}
diff --git a/rsvg-io.c b/rsvg-io.c index 7452b73..6e68b6f 100644 --- a/rsvg-io.c +++ b/rsvg-io.c @@ -128,11 +128,11 @@ gchar * _rsvg_io_get_file_path (const gchar * filename, const gchar * base_uri) { gchar *absolute_filename; - if (g_file_test (filename, G_FILE_TEST_EXISTS) || g_pa...
if (g_file_test (filename, G_FILE_TEST_EXISTS) || g_path_is_absolute (filename)) {
if (g_path_is_absolute (filename)) {
[ "authentication" ]
CVE-2021-21403
9a125624f219e496bdf4b07b404816d5a309bdc1
https://github.com/kongchuanhujiao/server
[{'lang': 'en', 'value': 'In github.com/kongchuanhujiao/server before version 1.3.21 there is an authentication Bypass by Primary Weakness vulnerability. All users are impacted. This is fixed in version 1.3.21.'}]
7.5
9.8
2021-03-26T18:15Z
HIGH
CWE-287
Improper Authentication
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
重构:优化验证码生成逻辑,最小化权责
2021-03-16 19:18:48 +0800
9a12562
57
2
[ "internal/app/datahub/pkg/account/memory.go", "internal/app/kongchuanhujiao/account/apis.go", "internal/app/kongchuanhujiao/account/utils.go" ]
Go
{"internal/app/datahub/pkg/account/memory.go": {"lines_added": 32, "lines_deleted": 8}, "internal/app/kongchuanhujiao/account/apis.go": {"lines_added": 1, "lines_deleted": 1}, "internal/app/kongchuanhujiao/account/utils.go": {"lines_added": 1, "lines_deleted": 18}}
diff --git a/internal/app/datahub/pkg/account/memory.go b/internal/app/datahub/pkg/account/memory.go index cca1457..1e89024 100644 --- a/internal/app/datahub/pkg/account/memory.go +++ b/internal/app/datahub/pkg/account/memory.go @@ -1,15 +1,39 @@ package account -import "github.com/kongchuanhujiao/server/internal/ap...
import "github.com/kongchuanhujiao/server/internal/app/datahub/internal/memory" func GetCode(id string) string { return memory.Code[id] } func WriteCode(id string, code string) { memory.Code[id] = code func DeleteCode(id string) { delete(memory.Code, id) if v.Code != account.GetCode(v.ID) || v.Code == "" { // FIXME...
import ( "math/rand" "strconv" "time" "github.com/kongchuanhujiao/server/internal/app/datahub/internal/memory" ) // GenerateCode 写入验证码返回一个验证码 func GenerateCode(id string) (c string) { rand.Seed(time.Now().UnixNano()) c = strconv.FormatFloat(rand.Float64(), 'f', -1, 64)[2:6] memory.Code[id] = c go func() { ...
[]
CVE-2021-32851
073485269ac83af24371f35bd08507defa885655
https://github.com/ssshooter/mind-elixir-core
[{'lang': 'en', 'value': 'Mind-elixir is a free, open source mind map core. Prior to version 0.18.1, mind-elixir is prone to cross-site scripting when handling untrusted menus. This issue is patched in version 0.18.1'}]
null
6.1
2023-02-20T22:15Z
nan
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
fix: prevent XSS
2021-11-25 15:03:34 +0800
0734852
137
2
[ "package.json", "readme.md", "src/plugin/contextMenu.ts", "src/plugin/nodeMenu.ts", "src/plugin/toolBar.ts", "src/utils/dom.ts", "src/utils/index.ts" ]
TypeScript
{"package.json": {"lines_added": 1, "lines_deleted": 1}, "readme.md": {"lines_added": 0, "lines_deleted": 1}, "src/plugin/contextMenu.ts": {"lines_added": 3, "lines_deleted": 2}, "src/plugin/nodeMenu.ts": {"lines_added": 6, "lines_deleted": 11}, "src/plugin/toolBar.ts": {"lines_added": 1, "lines_deleted": 1}, "src/util...
diff --git a/package.json b/package.json index 3621c61..7c93416 100644 --- a/package.json +++ b/package.json @@ -1,8 +1,8 @@ { "name": "mind-elixir", - "version": "0.18.0", + "version": "0.18.1", "description": "Mind elixir is a free open source mind map core.", "main": "dist/MindElixir.js", "scripts": {...
"version": "0.18.0", <script src="https://cdn.jsdelivr.net/npm/regenerator-runtime"></script> div.innerHTML = words li.innerHTML = `<span>${name}</span><span>${keyname}</span>` const createDiv = (id, name) => { div.innerHTML = `<span>${name}</span>` const styleDiv = createDiv('nm-style', 'style') const ...
"version": "0.18.1", import { encodeHTML } from '../utils/index' div.innerText = words li.innerHTML = `<span>${encodeHTML(name)}</span><span>${encodeHTML(keyname)}</span>` const createDiv = (id) => { const styleDiv = createDiv('nm-style') const tagDiv = createDiv('nm-tag') const iconDiv = createDiv('nm-...
[]
CVE-2020-29074
69eeb9f7baa14ca03b16c9de821f9876def7a36a
https://github.com/LibVNC/x11vnc
[{'lang': 'en', 'value': 'scan.c in x11vnc 0.9.16 uses IPC_CREAT|0777 in shmget calls, which allows access by actors other than the current user.'}]
6.5
8.8
2020-11-25T23:15Z
MEDIUM
CWE-732
Incorrect Permission Assignment for Critical Resource
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
scan: limit access to shared memory segments to current user
2020-11-18 08:40:45 +0100
69eeb9f
200
2
[ "src/scan.c" ]
C
{"src/scan.c": {"lines_added": 1, "lines_deleted": 1}}
diff --git a/src/scan.c b/src/scan.c index 43e00d2..12994d5 100644 --- a/src/scan.c +++ b/src/scan.c @@ -318,11 +318,11 @@ static int shm_create(XShmSegmentInfo *shm, XImage **ximg_ptr, int w, int h, *ximg_ptr = xim; #if HAVE_XSHM shm->shmid = shmget(IPC_PRIVATE, - xim->bytes_per_line * xim->height, IPC_CR...
xim->bytes_per_line * xim->height, IPC_CREAT | 0777);
xim->bytes_per_line * xim->height, IPC_CREAT | 0600);
[]
CVE-2021-4286
dba52642f5e95d3da7af1780561213ee6053195f
https://github.com/cocagne/pysrp
[{'lang': 'en', 'value': 'A vulnerability, which was classified as problematic, has been found in cocagne pysrp up to 1.0.16. This issue affects the function calculate_x of the file srp/_ctsrp.py. The manipulation leads to information exposure through discrepancy. Upgrading to version 1.0.17 is able to address this iss...
null
7.5
2022-12-27T11:15Z
nan
CWE-203
Observable Discrepancy
The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not.
Merge pull request #43 from ddealmei/fix-srp-vuln Fix side channel leaks
2021-02-01 10:15:45 -0600
dba5264
13
3
[]
Unknown
{"srp/_ctsrp.py": {"lines_added": 6, "lines_deleted": 0}}
[]
CVE-2013-4509
6aae0a9f145f536515e268dd6b25aa740a5edfe7
https://github.com/ibus/ibus-anthy
[{'lang': 'en', 'value': 'The default configuration of IBUS 1.5.4, and possibly 1.5.2 and earlier, when IBus.InputPurpose.PASSWORD is not set and used with GNOME 3, does not obscure the entered password characters, which allows physically proximate attackers to obtain a user password by reading the lockscreen.'}]
1.9
null
2013-11-23T19:55Z
LOW
CWE-255
Credentials Management Errors
Weaknesses in this category are related to the management of credentials.
Added to check the input purpose for gnome-shell password dialog.
2013-08-30 11:13:31 +0900
6aae0a9
127
2
[ "engine/engine.py" ]
Python
{"engine/engine.py": {"lines_added": 14, "lines_deleted": 0}}
diff --git a/engine/engine.py b/engine/engine.py index a42f642..be66738 100644 --- a/engine/engine.py +++ b/engine/engine.py @@ -124,10 +124,14 @@ class Engine(IBus.EngineSimple): self.__context.set_encoding(Anthy.UTF8_ENCODING) # init state self.__idle_id = 0 self.__prop_dict = {}...
self.__input_purpose = 0 self.__has_input_purpose = False if hasattr(IBus, 'InputPurpose'): self.__has_input_purpose = True if self.__has_input_purpose: self.__input_purpose = 0 def do_set_content_type(self, purpose, hints): if self.__has_input_purpose...
[ "validation", "input_handling" ]
CVE-2021-29451
8c754a0ad234555e813dcbf9e57d637f9f23d8fb
https://github.com/ManyDesigns/Portofino
[{'lang': 'en', 'value': 'Portofino is an open source web development framework. Portofino before version 5.2.1 did not properly verify the signature of JSON Web Tokens. This allows forging a valid JWT. The issue will be patched in the upcoming 5.2.1 release.'}]
6.4
9.1
2021-04-16T22:15Z
MEDIUM
CWE-347
Improper Verification of Cryptographic Signature
The product does not verify, or incorrectly verifies, the cryptographic signature for data.
Fix security vulnerability
2021-04-01 18:16:16 +0200
8c754a0ad
1,260
3
[ "CHANGELOG.md", "dispatcher/src/main/java/com/manydesigns/portofino/dispatcher/security/jwt/JWTRealm.java", "portofino-core/src/main/java/com/manydesigns/portofino/shiro/AbstractPortofinoRealm.java" ]
Java
{"CHANGELOG.md": {"lines_added": 2, "lines_deleted": 1}, "dispatcher/src/main/java/com/manydesigns/portofino/dispatcher/security/jwt/JWTRealm.java": {"lines_added": 4, "lines_deleted": 6}, "portofino-core/src/main/java/com/manydesigns/portofino/shiro/AbstractPortofinoRealm.java": {"lines_added": 5, "lines_deleted": 8}}
diff --git a/CHANGELOG.md b/CHANGELOG.md index 1b6acf06f..befeadada 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -11,12 +11,13 @@ The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/). - Render internal links in text pages with no target attribute (that the Quill editor adds by default). ...
- Backwards compatibility: revert `T extends Serializable` in CRUD actions, introduced in v5.2.0. [#428](https://github.com/ManyDesigns/Portofino/issues/428) import io.jsonwebtoken.Jwt; import io.jsonwebtoken.Jwts; import io.jsonwebtoken.SignatureAlgorithm; Jwt jwt = Jwts.parser(). parse((String...
- Important security vulnerability that may have allowed access with forged tokens. - Backwards compatibility: revert `T extends Serializable` in CRUD actions, introduced in v5.2.0. [#428](https://github.com/ManyDesigns/Portofino/issues/428) import io.jsonwebtoken.*; Jws<Claims> jwt = Jwts.parser(). ...
[]
CVE-2022-3952
94653cb357806c9cf24d8d294e6afea33f8f0775
https://github.com/ManyDesigns/Portofino
[{'lang': 'en', 'value': 'A vulnerability has been found in ManyDesigns Portofino 5.3.2 and classified as problematic. Affected by this vulnerability is the function createTempDir of the file WarFileLauncher.java. The manipulation leads to creation of temporary file in directory with insecure permissions. Upgrading to ...
null
7.1
2022-11-11T14:15Z
nan
CWE-668
Exposure of Resource to Wrong Sphere
The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.
vuln-fix: Temporary Directory Hijacking or Information Disclosure This fixes either Temporary Directory Hijacking, or Temporary Directory Local Information Disclosure. Weakness: CWE-379: Creation of Temporary File in Directory with Insecure Permissions Severity: High CVSSS: 7.3 Detection: CodeQL & OpenRewrite (http...
2022-10-04 00:22:10 +0000
94653cb35
1,260
3
[ "microservices/launcher/src/main/java/com/manydesigns/portofino/microservices/launcher/WarFileLauncher.java" ]
Java
{"microservices/launcher/src/main/java/com/manydesigns/portofino/microservices/launcher/WarFileLauncher.java": {"lines_added": 2, "lines_deleted": 3}}
diff --git a/microservices/launcher/src/main/java/com/manydesigns/portofino/microservices/launcher/WarFileLauncher.java b/microservices/launcher/src/main/java/com/manydesigns/portofino/microservices/launcher/WarFileLauncher.java index 5e8ea8c8e..dec746aef 100644 --- a/microservices/launcher/src/main/java/com/manydesign...
File tempDir = File.createTempFile("portofino.tomcat.", "." + port); tempDir.delete(); tempDir.mkdir();
import java.nio.file.Files; File tempDir = Files.createTempDirectory("portofino.tomcat." + "." + port).toFile();
[ "authentication", "authorization" ]
CVE-2022-22984
e8dd2a330b40d7fc0ab47e34413e80a0146d7ac3
https://github.com/snyk/snyk-hex-plugin
[{'lang': 'en', 'value': 'The package snyk before 1.1064.0; the package snyk-mvn-plugin before 2.31.3; the package snyk-gradle-plugin before 3.24.5; the package @snyk/snyk-cocoapods-plugin before 2.5.3; the package snyk-sbt-plugin before 2.16.2; the package snyk-python-plugin before 1.24.2; the package snyk-docker-plug...
null
6.3
2022-11-30T13:15Z
nan
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
fix: quote spawn args
2022-11-29 10:27:21 +0100
e8dd2a3
67
3
[ ".snyk", "lib/sub-process.ts", "package.json" ]
Other
{".snyk": {"lines_added": 8, "lines_deleted": 3}, "lib/sub-process.ts": {"lines_added": 2, "lines_deleted": 0}, "package.json": {"lines_added": 1, "lines_deleted": 0}}
diff --git a/.snyk b/.snyk index ceb0a97..4b826da 100644 --- a/.snyk +++ b/.snyk @@ -1,5 +1,10 @@ # Snyk (https://snyk.io) policy file, patches or ignores known vulnerabilities. -version: v1.13.5 -ignore: {} -# patches apply the minimum changes required to fix a vulnerability +version: v1.25.0 +# ignores vulnerabiliti...
version: v1.13.5 ignore: {} # patches apply the minimum changes required to fix a vulnerability
version: v1.25.0 # ignores vulnerabilities until expiry date; change duration by modifying expiry date ignore: 'snyk:lic:npm:shescape:MPL-2.0': - '*': reason: None Given expires: 2122-12-29T08:08:41.608Z created: 2022-11-29T08:08:41.611Z import { quoteAll } from 'shescape'; args = quoteA...
[]
CVE-2022-4639
b19f8a6046b080e4c2e28354a58556bb26040c6f
https://github.com/yrutschle/sslh
[{'lang': 'en', 'value': 'A vulnerability, which was classified as critical, has been found in sslh. This issue affects the function hexdump of the file probe.c of the component Packet Dumping Handler. The manipulation of the argument msg_info leads to format string. The attack may be initiated remotely. The name of th...
null
9.8
2022-12-21T22:15Z
nan
CWE-134
Use of Externally-Controlled Format String
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.
fix possible format string exploit if packet dumping enabled Signed-off-by: Toni Uhlig <matzeton@googlemail.com>
2022-09-10 12:53:57 +0200
b19f8a6
138
2
[ "probe.c" ]
C
{"probe.c": {"lines_added": 1, "lines_deleted": 1}}
diff --git a/probe.c b/probe.c index bef73af..da35d3d 100644 --- a/probe.c +++ b/probe.c @@ -114,11 +114,11 @@ void hexdump(msg_info msg_info, const char *mem, unsigned int len) else /* other char */ str[c++] = '.'; } str[c++] = '\n'; str[c++]...
print_message(msg_info, str);
print_message(msg_info, "%s", str);
[]
CVE-2022-1650
10ee0c4881a6ba2fe65ec18ed195ac35889583c4
https://github.com/eventsource/eventsource
[{'lang': 'en', 'value': 'Improper Removal of Sensitive Information Before Storage or Transfer in GitHub repository eventsource/eventsource prior to v2.0.2.\n\n'}]
5.8
9.3
2022-05-12T11:15Z
MEDIUM
CWE-212
Improper Removal of Sensitive Information Before Storage or Transfer
The product stores, transfers, or shares a resource that contains sensitive information, but it does not properly remove that information before the product makes the resource available to unauthorized actors.
fix: strip sensitive headers on redirect to different origin
2022-05-12 06:39:46 +0200
10ee0c4
44
2
[ "lib/eventsource.js", "test/eventsource_test.js" ]
JavaScript
{"lib/eventsource.js": {"lines_added": 38, "lines_deleted": 10}, "test/eventsource_test.js": {"lines_added": 43, "lines_deleted": 0}}
diff --git a/lib/eventsource.js b/lib/eventsource.js index ffcbe37..d6836bb 100644 --- a/lib/eventsource.js +++ b/lib/eventsource.js @@ -30,10 +30,12 @@ function hasBom (buf) { * @param {Object} [eventSourceInitDict] extra init params. See README for details. * @api public **/ function EventSource (url, eventSou...
// The url may have been changed by a temporary // redirect. If that's the case, revert it now. if (eventSourceInitDict && eventSourceInitDict.headers && eventSourceInitDict.headers['Last-Event-ID']) { lastEventId = eventSourceInitDict.headers['Last-Event-ID'] delete eventSourceInitDict.headers['Last-...
var headers = eventSourceInitDict && eventSourceInitDict.headers var hasNewOrigin = false // The url may have been changed by a temporary redirect. If that's the case, // revert it now, and flag that we are no longer pointing to a new origin hasNewOrigin = false if (headers && headers['Last-Event-ID...
[]
CVE-2020-26298
a699c82292b17c8e6a62e1914d5eccc252272793
https://github.com/vmg/redcarpet
[{'lang': 'en', 'value': 'Redcarpet is a Ruby library for Markdown processing. In Redcarpet before version 3.5.1, there is an injection vulnerability which can enable a cross-site scripting attack. In affected versions no HTML escaping was being performed when processing quotes. This applies even when the `:escape_html...
3.5
5.4
2021-01-11T19:15Z
LOW
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Fix a security issue using `:quote` with `:escape_html` Reported by @johan-smits.
2020-12-15 21:01:19 +0100
a699c82
134
2
[ "CHANGELOG.md", "ext/redcarpet/html.c", "lib/redcarpet.rb", "redcarpet.gemspec", "test/markdown_test.rb" ]
Ruby
{"CHANGELOG.md": {"lines_added": 7, "lines_deleted": 0}, "ext/redcarpet/html.c": {"lines_added": 8, "lines_deleted": 1}, "lib/redcarpet.rb": {"lines_added": 1, "lines_deleted": 1}, "redcarpet.gemspec": {"lines_added": 2, "lines_deleted": 2}, "test/markdown_test.rb": {"lines_added": 10, "lines_deleted": 0}}
diff --git a/CHANGELOG.md b/CHANGELOG.md index e7203c6..4ff6958 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -1,7 +1,14 @@ # Changelog +## Version 3.5.1 (Security) + +* Fix a security vulnerability using `:quote` in combination with the + `:escape_html` option. + + Reported by *Johan Smits*. + ## Version 3.5.0...
bufput(ob, text->data, text->size); VERSION = '3.5.0' s.version = '3.5.0' s.date = '2019-07-29'
## Version 3.5.1 (Security) * Fix a security vulnerability using `:quote` in combination with the `:escape_html` option. Reported by *Johan Smits*. struct html_renderopt *options = opaque; if (options->flags & HTML_ESCAPE) escape_html(ob, text->data, text->size); else bufput(ob, text->data, text->size);...
[ "sanitization" ]
CVE-2020-26298
a699c82292b17c8e6a62e1914d5eccc252272793
https://github.com/vmg/redcarpet
[{'lang': 'en', 'value': 'Redcarpet is a Ruby library for Markdown processing. In Redcarpet before version 3.5.1, there is an injection vulnerability which can enable a cross-site scripting attack. In affected versions no HTML escaping was being performed when processing quotes. This applies even when the `:escape_html...
3.5
5.4
2021-01-11T19:15Z
LOW
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Fix a security issue using `:quote` with `:escape_html` Reported by @johan-smits.
2020-12-15 21:01:19 +0100
a699c82
134
2
[ "CHANGELOG.md", "ext/redcarpet/html.c", "lib/redcarpet.rb", "redcarpet.gemspec", "test/markdown_test.rb" ]
Ruby
{"CHANGELOG.md": {"lines_added": 7, "lines_deleted": 0}, "ext/redcarpet/html.c": {"lines_added": 8, "lines_deleted": 1}, "lib/redcarpet.rb": {"lines_added": 1, "lines_deleted": 1}, "redcarpet.gemspec": {"lines_added": 2, "lines_deleted": 2}, "test/markdown_test.rb": {"lines_added": 10, "lines_deleted": 0}}
diff --git a/CHANGELOG.md b/CHANGELOG.md index e7203c6..4ff6958 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -1,7 +1,14 @@ # Changelog +## Version 3.5.1 (Security) + +* Fix a security vulnerability using `:quote` in combination with the + `:escape_html` option. + + Reported by *Johan Smits*. + ## Version 3.5.0...
bufput(ob, text->data, text->size); VERSION = '3.5.0' s.version = '3.5.0' s.date = '2019-07-29'
## Version 3.5.1 (Security) * Fix a security vulnerability using `:quote` in combination with the `:escape_html` option. Reported by *Johan Smits*. struct html_renderopt *options = opaque; if (options->flags & HTML_ESCAPE) escape_html(ob, text->data, text->size); else bufput(ob, text->data, text->size);...
[ "sanitization" ]
CVE-2014-125079
e52a758f96861dcef2dabfecb9da191bb2e07761
https://github.com/agy/pontifex.http
[{'lang': 'en', 'value': 'A vulnerability was found in agy pontifex.http. It has been declared as critical. This vulnerability affects unknown code of the file lib/Http.coffee. The manipulation leads to sql injection. Upgrading to version 0.1.0 is able to address this issue. The name of the patch is e52a758f96861dcef2d...
null
9.8
2023-01-15T09:15Z
nan
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syn...
Fixed SQL Injection Hole
2014-07-30 13:47:31 -0400
e52a758
6
2
[ "lib/Http.coffee" ]
Other
{"lib/Http.coffee": {"lines_added": 1, "lines_deleted": 1}}
diff --git a/lib/Http.coffee b/lib/Http.coffee index d089d5e..0442cbc 100644 --- a/lib/Http.coffee +++ b/lib/Http.coffee @@ -24,11 +24,11 @@ Http = (Bridge,Url) => self.server.stats.push [ 'wrote_connection', req.url, req.session, domain, req.socket.bytesWritten, new Date().getTime()] self.server.stats.push [ '...
url: "http://auth.wot.io/authenticate_token/#{token}/#{command}/#{path}"
url: "http://auth.wot.io/authenticate_token/#{token}/#{command}/#{path}".replace("'", "''")
[]
CVE-2023-7166
c62da9bb3a9b3603014d0edb436146512631100d
https://github.com/201206030/novel-plus
[{'lang': 'en', 'value': 'A vulnerability classified as problematic has been found in Novel-Plus up to 4.2.0. This affects an unknown part of the file /user/updateUserInfo of the component HTTP POST Request Handler. The manipulation of the argument nickName leads to cross site scripting. It is possible to initiate the ...
null
5.4
2023-12-29T09:15Z
nan
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
fix: nickName、userPhoto 更新校验
2023-12-29 00:11:01 +0800
c62da9b
3,605
2
[ "novel-common/src/main/java/com/java2nb/novel/entity/User.java" ]
Java
{"novel-common/src/main/java/com/java2nb/novel/entity/User.java": {"lines_added": 14, "lines_deleted": 9}}
diff --git a/novel-common/src/main/java/com/java2nb/novel/entity/User.java b/novel-common/src/main/java/com/java2nb/novel/entity/User.java index fd3805e..04b93af 100644 --- a/novel-common/src/main/java/com/java2nb/novel/entity/User.java +++ b/novel-common/src/main/java/com/java2nb/novel/entity/User.java @@ -12,47 +12,5...
@NotBlank(groups = {AddGroup.class},message="手机号不能为空!") @Pattern(groups = {AddGroup.class},regexp="^1[3|4|5|6|7|8|9][0-9]{9}$",message="手机号格式不正确!") @NotBlank(groups = {AddGroup.class},message="密码不能为空!") @Min(value = 0,groups = {UpdateGroup.class}) @Max(value = 1,groups = {UpdateGroup.class}) @Nu...
@NotBlank(groups = {AddGroup.class}, message = "手机号不能为空!") @Pattern(groups = {AddGroup.class}, regexp = "^1[3|4|5|6|7|8|9][0-9]{9}$", message = "手机号格式不正确!") @Null(groups = {UpdateGroup.class}) @NotBlank(groups = {AddGroup.class}, message = "密码不能为空!") @Pattern(groups = { UpdateGroup.class}, r...
[]
CVE-2023-7171
d6093d8182362422370d7eaf6c53afde9ee45215
https://github.com/201206030/novel-plus
[{'lang': 'en', 'value': 'A vulnerability was found in Novel-Plus up to 4.2.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file novel-admin/src/main/java/com/java2nb/novel/controller/FriendLinkController.java of the component Friendly Link Handler. The manipula...
null
4.8
2023-12-29T18:15Z
nan
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
fix(novel-admin): 友情链接URL格式校验
2023-12-29 18:54:53 +0800
d6093d8
3,605
2
[ "novel-admin/src/main/java/com/java2nb/novel/controller/FriendLinkController.java", "novel-admin/src/main/java/com/java2nb/novel/domain/FriendLinkDO.java", "novel-admin/src/main/resources/templates/novel/friendLink/add.html", "novel-admin/src/main/resources/templates/novel/friendLink/edit.html" ]
Java
{"novel-admin/src/main/java/com/java2nb/novel/controller/FriendLinkController.java": {"lines_added": 3, "lines_deleted": 2}, "novel-admin/src/main/java/com/java2nb/novel/domain/FriendLinkDO.java": {"lines_added": 160, "lines_deleted": 148}, "novel-admin/src/main/resources/templates/novel/friendLink/add.html": {"lines_a...
diff --git a/novel-admin/src/main/java/com/java2nb/novel/controller/FriendLinkController.java b/novel-admin/src/main/java/com/java2nb/novel/controller/FriendLinkController.java index a26a40a..dd86893 100644 --- a/novel-admin/src/main/java/com/java2nb/novel/controller/FriendLinkController.java +++ b/novel-admin/src/main...
public R save(FriendLinkDO friendLink) { public R update(FriendLinkDO friendLink) { import java.io.Serializable; import java.math.BigDecimal; import java.util.Date; * * private static final long serialVersionUID = 1L; //主键 private Integer id; //链接名 private String linkName; //链接url priva...
import org.springframework.validation.annotation.Validated; public R save(@Validated FriendLinkDO friendLink) { public R update(@Validated FriendLinkDO friendLink) { import org.hibernate.validator.constraints.URL; import java.io.Serializable; import java.util.Date; private static final long serialVersionUI...
[]
CVE-2021-22204
cf0f4e7dcd024ca99615bfd1102a841a25dde031
https://github.com/exiftool/exiftool
[{'lang': 'en', 'value': 'Improper neutralization of user data in the DjVu file format in ExifTool versions 7.44 and up allows arbitrary code execution when parsing the malicious image'}]
6.8
7.8
2021-04-23T18:15Z
MEDIUM
CWE-94
Improper Control of Generation of Code ('Code Injection')
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Update to 12.24
2021-04-13 11:11:46 -0400
cf0f4e7d
1,246
2
[ "Changes", "META.json", "META.yml", "README", "config_files/acdsee.config", "exiftool", "html/ExifTool.html", "html/ExifTool.pdf", "html/Shift.pdf", "html/TagNames/FujiFilm.html", "html/TagNames/Jpeg2000.html", "html/TagNames/MacOS.html", "html/TagNames/Panasonic.html", "html/TagNames/Phas...
HTML
{"Changes": {"lines_added": 11, "lines_deleted": 0}, "META.json": {"lines_added": 1, "lines_deleted": 1}, "META.yml": {"lines_added": 1, "lines_deleted": 1}, "README": {"lines_added": 2, "lines_deleted": 2}, "config_files/acdsee.config": {"lines_added": 193, "lines_deleted": 6}, "exiftool": {"lines_added": 2, "lines_de...
diff --git a/Changes b/Changes index 3e694fe7..16922a81 100644 --- a/Changes +++ b/Changes @@ -5,10 +5,21 @@ ExifTool Version History RSS feed: https://exiftool.org/rss.xml Note: The most recent production release is Version 12.16. (Other versions are considered development releases, and are not uploaded to MetaCP...
"version" : "12.23", version: 12.23 gzip -dc Image-ExifTool-12.23.tar.gz | tar -xf - cd Image-ExifTool-12.23 # Usage: exiftool -config acdsee.config -ACDSEETAG=VALUE FILE ... 'w' => { Writable => 'real' }, 'h' => { Writable => 'real' }, 'unit' => { }, # new XMP n...
Apr. 13, 2021 - Version 12.24 - Added a new PhaseOne RawFormat value (thanks LibRaw) - Decode a new Sony tag (thanks Jos Roost) - Decode a few new Panasonic and FujiFilm tags (thanks LibRaw and Greybeard) - Patched security vulnerability in DjVu reader - Updated acdsee.config in distribution (thanks StarGeek...
[]
CVE-2022-23935
74dbab1d2766d6422bb05b033ac6634bf8d1f582
https://github.com/exiftool/exiftool
[{'lang': 'en', 'value': 'lib/Image/ExifTool.pm in ExifTool before 12.38 mishandles a $file =~ /\\|$/ check, leading to command injection.'}]
7.6
7.8
2022-01-25T06:15Z
HIGH
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Update to 12.38
2021-12-20 09:20:55 -0500
74dbab1d
1,246
2
[ "Changes", "META.json", "META.yml", "README", "exiftool", "html/ExifTool.pdf", "html/Shift.pdf", "html/TagNames/CanonCustom.html", "html/TagNames/Nikon.html", "html/TagNames/XMP.html", "html/TagNames/index.html", "html/exiftool_pod.html", "html/exiftool_pod.pdf", "html/history.html", "ht...
HTML
{"Changes": {"lines_added": 11, "lines_deleted": 0}, "META.json": {"lines_added": 1, "lines_deleted": 1}, "META.yml": {"lines_added": 1, "lines_deleted": 1}, "README": {"lines_added": 2, "lines_deleted": 2}, "exiftool": {"lines_added": 6, "lines_deleted": 4}, "html/ExifTool.pdf": {"lines_added": 39, "lines_deleted": 39...
diff --git a/Changes b/Changes index 5ff3f303..5d8ee4fc 100644 --- a/Changes +++ b/Changes @@ -5,10 +5,21 @@ ExifTool Version History RSS feed: https://exiftool.org/rss.xml Note: The most recent production release is Version 12.30. (Other versions are considered development releases, and are not uploaded to MetaCP...
"version" : "12.37", version: 12.37 gzip -dc Image-ExifTool-12.37.tar.gz | tar -xf - cd Image-ExifTool-12.37 my $version = '12.37'; AddGroups($$info{$tag}, $grp0, \%groups, \@groups) if ref $$info{$tag}; -- Generated by ExifTool 12.37 -- B<-W+> with an output file I<FMT> that does not con...
Dec. 20, 2021 - Version 12.38 - Decode a number of new tags for the Nikon Z9 (thanks Warren Hatch) - Patched incorrect decoding of AEBShotCount for the Canon EOS 90D - Patched EXR reader to support long tag names - Patched security issue (thanks Joe Lothan) - Fixed an incorrect tag ID for a new Nikon MakerNo...
[]
CVE-2020-15098
85d3e70dff35a99ef53f4b561114acfa9e5c47e1
https://github.com/TYPO3/TYPO3.CMS
[{'lang': 'en', 'value': 'In TYPO3 CMS greater than or equal to 9.0.0 and less than 9.5.20, and greater than or equal to 10.0.0 and less than 10.4.6, it has been discovered that an internal verification mechanism can be used to generate arbitrary checksums. This allows to inject arbitrary data having a valid cryptograp...
6.5
8.8
2020-07-29T17:15Z
MEDIUM
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
The product uses a broken or risky cryptographic algorithm or protocol.
[SECURITY] Avoid ambiguous HMAC results Cryptographic hashes being calculated from and for query parameters must only be used for a specific use-case or scope in order to avoid resulting hashes being ambiguous. Resolves: #91689 Releases: master, 10.4, 9.5 Change-Id: I59ca16fe71e27195b98a822607aab564425d248d Security-...
2020-07-28 10:19:06 +0200
85d3e70dff
17,742
2
[ "typo3/sysext/backend/Classes/Controller/LinkBrowserController.php", "typo3/sysext/backend/Classes/Form/FieldControl/EditPopup.php", "typo3/sysext/backend/Classes/Form/FieldControl/LinkPopup.php" ]
PHP
{"typo3/sysext/backend/Classes/Controller/LinkBrowserController.php": {"lines_added": 2, "lines_deleted": 2}, "typo3/sysext/backend/Classes/Form/FieldControl/EditPopup.php": {"lines_added": 1, "lines_deleted": 1}, "typo3/sysext/backend/Classes/Form/FieldControl/LinkPopup.php": {"lines_added": 1, "lines_deleted": 1}}
diff --git a/typo3/sysext/backend/Classes/Controller/LinkBrowserController.php b/typo3/sysext/backend/Classes/Controller/LinkBrowserController.php index 619bfcbab5..94fc5417b0 100644 --- a/typo3/sysext/backend/Classes/Controller/LinkBrowserController.php +++ b/typo3/sysext/backend/Classes/Controller/LinkBrowserControll...
$result = hash_equals(GeneralUtility::hmac(serialize($fieldChangeFunctions)), $this->parameters['fieldChangeFuncHash']); $formEngineParameters['fieldChangeFuncHash'] = GeneralUtility::hmac(serialize($this->parameters['fieldChangeFunc'])); 'fieldChangeFuncHash' => GeneralUtility::hmac...
$result = hash_equals(GeneralUtility::hmac(serialize($fieldChangeFunctions), 'backend-link-browser'), $this->parameters['fieldChangeFuncHash']); $formEngineParameters['fieldChangeFuncHash'] = GeneralUtility::hmac(serialize($this->parameters['fieldChangeFunc']), 'backend-link-browser'); ...
[ "cryptography" ]
CVE-2023-52266
17405b975948abc216f6a085d2d027ec1cfd5766
https://github.com/hongliuliao/ehttp
[{'lang': 'en', 'value': 'ehttp 1.0.6 before 17405b9 has an epoll_socket.cpp read_func use-after-free. An attacker can make many connections over a short time to trigger this.'}]
null
7.5
2023-12-31T00:15Z
nan
CWE-416
Use After Free
The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory...
fix log overflow & epoll_context use after free bug
2023-10-08 06:54:01 +0000
17405b9
407
2
[ "Makefile", "src/epoll_socket.cpp", "src/sim_parser.cpp", "test/issue38/poc.py" ]
C++
{"Makefile": {"lines_added": 2, "lines_deleted": 2}, "src/epoll_socket.cpp": {"lines_added": 3, "lines_deleted": 5}, "src/sim_parser.cpp": {"lines_added": 1, "lines_deleted": 1}, "test/issue38/poc.py": {"lines_added": 9, "lines_deleted": 0}}
diff --git a/Makefile b/Makefile index 9a312f5..79116e0 100644 --- a/Makefile +++ b/Makefile @@ -3,12 +3,12 @@ CXX=g++ CXXFLAGS += -g -Wall LDFLAGS += -pthread ifdef ACOV - CXXFLAGS += -fprofile-arcs -ftest-coverage - LDFLAGS += -lgcov --coverage + CXXFLAGS += -fprofile-arcs -ftest-coverage -fsanitize=address + L...
CXXFLAGS += -fprofile-arcs -ftest-coverage LDFLAGS += -lgcov --coverage EpollContext *hc = (EpollContext *) td->event.data.ptr; if (hc != NULL) { hc->_ctx_status = CONTEXT_READ_OVER; } LOG_DEBUG("read from client: size:%d, content:%s", read_size, read_buffer);
CXXFLAGS += -fprofile-arcs -ftest-coverage -fsanitize=address LDFLAGS += -lgcov --coverage -fsanitize=address if (epoll_context != NULL) { epoll_context->_ctx_status = CONTEXT_READ_OVER; } LOG_DEBUG("read from client: size:%d, content:%.4096s", read_size, read_buffer); #!/usr/bin/env python3 impo...
[]
CVE-2023-52267
17405b975948abc216f6a085d2d027ec1cfd5766
https://github.com/hongliuliao/ehttp
[{'lang': 'en', 'value': 'ehttp 1.0.6 before 17405b9 has a simple_log.cpp _log out-of-bounds-read during error logging for long strings.'}]
null
7.5
2023-12-31T00:15Z
nan
CWE-125
Out-of-bounds Read
The product reads data past the end, or before the beginning, of the intended buffer.
fix log overflow & epoll_context use after free bug
2023-10-08 06:54:01 +0000
17405b9
407
2
[ "Makefile", "src/epoll_socket.cpp", "src/sim_parser.cpp", "test/issue38/poc.py" ]
C++
{"Makefile": {"lines_added": 2, "lines_deleted": 2}, "src/epoll_socket.cpp": {"lines_added": 3, "lines_deleted": 5}, "src/sim_parser.cpp": {"lines_added": 1, "lines_deleted": 1}, "test/issue38/poc.py": {"lines_added": 9, "lines_deleted": 0}}
diff --git a/Makefile b/Makefile index 9a312f5..79116e0 100644 --- a/Makefile +++ b/Makefile @@ -3,12 +3,12 @@ CXX=g++ CXXFLAGS += -g -Wall LDFLAGS += -pthread ifdef ACOV - CXXFLAGS += -fprofile-arcs -ftest-coverage - LDFLAGS += -lgcov --coverage + CXXFLAGS += -fprofile-arcs -ftest-coverage -fsanitize=address + L...
CXXFLAGS += -fprofile-arcs -ftest-coverage LDFLAGS += -lgcov --coverage EpollContext *hc = (EpollContext *) td->event.data.ptr; if (hc != NULL) { hc->_ctx_status = CONTEXT_READ_OVER; } LOG_DEBUG("read from client: size:%d, content:%s", read_size, read_buffer);
CXXFLAGS += -fprofile-arcs -ftest-coverage -fsanitize=address LDFLAGS += -lgcov --coverage -fsanitize=address if (epoll_context != NULL) { epoll_context->_ctx_status = CONTEXT_READ_OVER; } LOG_DEBUG("read from client: size:%d, content:%.4096s", read_size, read_buffer); #!/usr/bin/env python3 impo...
[]
CVE-2017-17713
628149159ba25adbfc29a3ae1d4b10c7eb936dd3
https://github.com/boxug/trape
[{'lang': 'en', 'value': 'Trape before 2017-11-05 has SQL injection via the /nr red parameter, the /nr vId parameter, the /register User-Agent HTTP header, the /register country parameter, the /register countryCode parameter, the /register cpu parameter, the /register isp parameter, the /register lat parameter, the /re...
7.5
9.8
2017-12-16T20:29Z
HIGH
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syn...
SQL Insert error for some region [FIXED]
2017-11-05 09:46:10 -0500
6281491
59
3
[ "core/db.py", "core/stats.py", "core/victim.py" ]
Python
{"core/db.py": {"lines_added": 48, "lines_deleted": 31}, "core/stats.py": {"lines_added": 5, "lines_deleted": 4}, "core/victim.py": {"lines_added": 1, "lines_deleted": 1}}
diff --git a/core/db.py b/core/db.py index 68a7283..fa18349 100644 --- a/core/db.py +++ b/core/db.py @@ -26,76 +26,93 @@ class Database(object): self.cursor.execute("""CREATE TABLE IF NOT EXISTS "clicks" ( `id` TEXT, `site` TEXT, `date` TEXT )""") self.conn.commit() return True def sql...
self.cursor.execute(sentence) self.cursor.execute(sentence) self.cursor.execute(sentence) 'get_data' : "SELECT victims.*, geo.*, victims.ip AS ip_local, COUNT(clicks.id) FROM victims INNER JOIN geo ON victims.id = geo.id LEFT JOIN clicks ON clicks.id = victims.id GROUP BY victims.id ...
if type(sentence) is str: self.cursor.execute(sentence) else: self.cursor.execute(sentence[0], sentence[1]) if type(sentence) is str: self.cursor.execute(sentence) else: self.cursor.execute(sentence[0], sentence[1]) if type(sentence) is str: s...
[]
CVE-2017-17714
628149159ba25adbfc29a3ae1d4b10c7eb936dd3
https://github.com/boxug/trape
[{'lang': 'en', 'value': 'Trape before 2017-11-05 has XSS via the /nr red parameter, the /nr vId parameter, the /register User-Agent HTTP header, the /register country parameter, the /register countryCode parameter, the /register cpu parameter, the /register isp parameter, the /register lat parameter, the /register lon...
4.3
6.1
2017-12-16T20:29Z
MEDIUM
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
SQL Insert error for some region [FIXED]
2017-11-05 09:46:10 -0500
6281491
59
3
[ "core/db.py", "core/stats.py", "core/victim.py" ]
Python
{"core/db.py": {"lines_added": 48, "lines_deleted": 31}, "core/stats.py": {"lines_added": 5, "lines_deleted": 4}, "core/victim.py": {"lines_added": 1, "lines_deleted": 1}}
diff --git a/core/db.py b/core/db.py index 68a7283..fa18349 100644 --- a/core/db.py +++ b/core/db.py @@ -26,76 +26,93 @@ class Database(object): self.cursor.execute("""CREATE TABLE IF NOT EXISTS "clicks" ( `id` TEXT, `site` TEXT, `date` TEXT )""") self.conn.commit() return True def sql...
self.cursor.execute(sentence) self.cursor.execute(sentence) self.cursor.execute(sentence) 'get_data' : "SELECT victims.*, geo.*, victims.ip AS ip_local, COUNT(clicks.id) FROM victims INNER JOIN geo ON victims.id = geo.id LEFT JOIN clicks ON clicks.id = victims.id GROUP BY victims.id ...
if type(sentence) is str: self.cursor.execute(sentence) else: self.cursor.execute(sentence[0], sentence[1]) if type(sentence) is str: self.cursor.execute(sentence) else: self.cursor.execute(sentence[0], sentence[1]) if type(sentence) is str: s...
[]
CVE-2021-29421
3f38f73218e5e782fe411ccbb3b44a793c0b343a
https://github.com/pikepdf/pikepdf
[{'lang': 'en', 'value': 'models/metadata.py in the pikepdf package 1.3.0 through 2.9.2 for Python allows XXE when parsing XMP metadata entries.'}]
5
7.5
2021-04-01T20:15Z
MEDIUM
CWE-611
Improper Restriction of XML External Entity Reference
The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.
Fix XXE vulnerability in XMP metadata parsing For details: https://portswigger.net/web-security/xxe Reported by: Eric Therond eric.therond@sonarsource.com) of Sonarsource (https://www.sonarsource.com/)
2021-03-29 23:59:59 -0700
3f38f73
236
2
[ "src/pikepdf/_xml.py", "src/pikepdf/models/metadata.py", "tests/test_metadata.py" ]
Python
{"src/pikepdf/_xml.py": {"lines_added": 30, "lines_deleted": 0}, "src/pikepdf/models/metadata.py": {"lines_added": 5, "lines_deleted": 5}, "tests/test_metadata.py": {"lines_added": 24, "lines_deleted": 0}}
diff --git a/src/pikepdf/_xml.py b/src/pikepdf/_xml.py new file mode 100644 index 0000000..f0e1c38 --- /dev/null +++ b/src/pikepdf/_xml.py @@ -0,0 +1,30 @@ +# This Source Code Form is subject to the terms of the Mozilla Public +# License, v. 2.0. If a copy of the MPL was not distributed with this +# file, You can obtai...
from lxml.etree import QName, XMLParser, XMLSyntaxError, parse return parse(BytesIO(xml)) return parse(BytesIO(re_xml_illegal_bytes.sub(b'', xml))) parser = XMLParser(recover=True) return parse(BytesIO(xml), parser)
# This Source Code Form is subject to the terms of the Mozilla Public # License, v. 2.0. If a copy of the MPL was not distributed with this # file, You can obtain one at http://mozilla.org/MPL/2.0/. # # Copyright (C) 2021, James R. Barlow (https://github.com/jbarlow83/) from typing import IO, Any, AnyStr, Union from...
[]
CVE-2016-4444
5cd60033ea7f5bdf8c19c27b23ea2d773d9b09f5
https://github.com/fedora-selinux/setroubleshoot
[{'lang': 'en', 'value': 'The allow_execmod plugin for setroubleshoot before 3.2.23 allows local users to execute arbitrary commands by triggering an execmod SELinux denial with a crafted binary filename, related to the commands.getstatusoutput function.'}]
6.9
7
2017-04-11T18:59Z
MEDIUM
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
plugins: get rid of commands.getstatusoutput()
2015-04-09 14:14:44 +0200
5cd6003
315
2
[ "plugins/src/allow_execmod.py" ]
Python
{"plugins/src/allow_execmod.py": {"lines_added": 8, "lines_deleted": 2}}
diff --git a/plugins/src/allow_execmod.py b/plugins/src/allow_execmod.py index a839fe3..42f2751 100644 --- a/plugins/src/allow_execmod.py +++ b/plugins/src/allow_execmod.py @@ -89,14 +89,20 @@ setroubleshoot examined '$FIX_TARGET_PATH' to make sure it was built correctly, def __init__(self): Plugin.__init...
import commands if (commands.getstatusoutput("eu-readelf -d %s | fgrep -q TEXTREL" % avc.tpath)[0] == 1):
import subprocess # from https://docs.python.org/2.7/library/subprocess.html#replacing-shell-pipeline p1 = subprocess.Popen(['eu-readelf', '-d', avc.tpath], stdout=subprocess.PIPE) p2 = subprocess.Popen(["fgrep", "-q", "TEXTREL"], stdin=p1.stdout, stdout=subprocess.PIPE) ...
[]
CVE-2016-4445
2d12677629ca319310f6263688bb1b7f676c01b7
https://github.com/fedora-selinux/setroubleshoot
[{'lang': 'en', 'value': 'The fix_lookup_id function in sealert in setroubleshoot before 3.2.23 allows local users to execute arbitrary commands as root by triggering an SELinux denial with a crafted file name, related to executing external commands with the commands.getstatusoutput function.'}]
6.9
7
2017-04-11T18:59Z
MEDIUM
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
framework: get rid of commands.getstatusoutput()
2015-04-09 14:14:44 +0200
2d12677
315
2
[ "framework/src/sealert", "framework/src/setroubleshoot/signature.py" ]
Other
{"framework/src/sealert": {"lines_added": 7, "lines_deleted": 7}, "framework/src/setroubleshoot/signature.py": {"lines_added": 3, "lines_deleted": 0}}
diff --git a/framework/src/sealert b/framework/src/sealert index 9126012..d095a22 100755 --- a/framework/src/sealert +++ b/framework/src/sealert @@ -139,26 +139,26 @@ def fix_lookup_id(local_id, analysis_id): async_rpc = cl.alert_client.query_alerts(local_id) async_rpc.add_callback(query_alerts_callba...
import commands command = siginfo.substitute(p.get_fix_cmd(siginfo.audit_event, plugin.args)) rc, output = commands.getstatusoutput(command) if rc == 0: print _("Successfully ran %s" % command) else: ...
import subprocess command = siginfo.substitute_array(p.get_fix_cmd(siginfo.audit_event, plugin.args).split()) try: output = subprocess.check_output(command) print _("Successfully ran %s" % ' '.join(command)) ...
[]
CVE-2024-29187
6d372e5169f1a334a395cdf496443bc0732098e9
https://github.com/wixtoolset/wix3
[{'lang': 'en', 'value': "WiX toolset lets developers create installers for Windows Installer, the Windows installation engine. When a bundle runs as SYSTEM user, Burn uses GetTempPathW which points to an insecure directory C:\\Windows\\Temp to drop and load multiple binaries. Standard users can hijack the binary befor...
null
null
2024-03-24T20:15Z
nan
NVD-CWE-noinfo
Insufficient Information
There is insufficient information about the issue to classify it; details are unkown or unspecified.
Protect elevated working folder from malicious data When running elevated, Burn uses the Windows Temp folder as its working folder to prevent normal processes from tampering with the files. Windows Temp does allow non-elevated processes to write to the folder but they cannot see the files there. Unfortunately, contrar...
2024-03-22 01:04:33 -0700
6d372e51
3,295
2
[ "src/DTF/Tools/SfxCA/SfxUtil.cpp", "src/burn/engine/cache.cpp" ]
C++
{"src/DTF/Tools/SfxCA/SfxUtil.cpp": {"lines_added": 6, "lines_deleted": 26}, "src/burn/engine/cache.cpp": {"lines_added": 43, "lines_deleted": 10}}
diff --git a/src/DTF/Tools/SfxCA/SfxUtil.cpp b/src/DTF/Tools/SfxCA/SfxUtil.cpp index 2e6b0555..32dc6e04 100644 --- a/src/DTF/Tools/SfxCA/SfxUtil.cpp +++ b/src/DTF/Tools/SfxCA/SfxUtil.cpp @@ -162,42 +162,22 @@ bool ExtractToTempDirectory(__in MSIHANDLE hSession, __in HMODULE hModule, return false; ...
for (int i = 0; DirectoryExists(szTempDir); i++) if (!CreateDirectory(szTempDir, NULL)) cchCopied = GetTempPath(cchTempDirBuf, szTempDir); if (cchCopied == 0 || cchCopied >= cchTempDirBuf) { Log(hSession, L"Failed to get temp direct...
BOOL fCreatedDirectory = FALSE; for (int i = 0; i < 10000 && !fCreatedDirectory; i++) fCreatedDirectory = ::CreateDirectory(szTempDir, NULL); if (!fCreatedDirectory) Log(hSession, L"Failed to create temp directory. Error code %d", ::GetLastError()); ...
[]
CVE-2024-29188
93eeb5f6835776694021f66d4226c262c67d487a
https://github.com/wixtoolset/wix3
[{'lang': 'en', 'value': "WiX toolset lets developers create installers for Windows Installer, the Windows installation engine. The custom action behind WiX's `RemoveFolderEx` functionality could allow a standard user to delete protected directories. `RemoveFolderEx` deletes an entire directory tree during installation...
null
null
2024-03-24T20:15Z
nan
NVD-CWE-noinfo
Insufficient Information
There is insufficient information about the issue to classify it; details are unkown or unspecified.
Don't follow junctions when recursing directories. When deleting directories recursively, an elevated custom action following junctions in a user-writable location could recurse into any directory, including some that you might not want to be deleted. Therefore, avoid recursing into directories that are actually junct...
2024-03-22 01:03:57 -0700
93eeb5f6
3,295
2
[ "src/DTF/Tools/SfxCA/SfxUtil.cpp", "src/ext/ca/wixca/dll/RemoveFoldersEx.cpp" ]
C++
{"src/DTF/Tools/SfxCA/SfxUtil.cpp": {"lines_added": 3, "lines_deleted": 1}, "src/ext/ca/wixca/dll/RemoveFoldersEx.cpp": {"lines_added": 10, "lines_deleted": 2}}
diff --git a/src/DTF/Tools/SfxCA/SfxUtil.cpp b/src/DTF/Tools/SfxCA/SfxUtil.cpp index 1bf2c5b2..2e6b0555 100644 --- a/src/DTF/Tools/SfxCA/SfxUtil.cpp +++ b/src/DTF/Tools/SfxCA/SfxUtil.cpp @@ -91,11 +91,13 @@ bool DeleteDirectory(const wchar_t* szDir) while (hSearch != INVALID_HANDLE_VALUE) { ...
if (wcscmp(fd.cFileName, L".") != 0 && wcscmp(fd.cFileName, L"..") != 0)
if (wcscmp(fd.cFileName, L".") != 0 && wcscmp(fd.cFileName, L"..") != 0 && ((fd.dwFileAttributes & FILE_ATTRIBUTE_REPARSE_POINT) == 0)) // Do NOT follow junctions. DWORD dwAttributes = ::GetFileAttributesW(wzPath); if (dwAttribu...
[]
CVE-2018-21234
9bffc3913aeb8472c11bb543243004b4b4376f16
https://github.com/oblac/jodd
[{'lang': 'en', 'value': 'Jodd before 5.0.4 performs Deserialization of Untrusted JSON Data when setClassMetadataName is set.'}]
7.5
9.8
2020-05-21T23:15Z
HIGH
CWE-502
Deserialization of Untrusted Data
The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid.
Added `allowClass` (closes #628)
2018-08-17 18:32:20 +0200
9bffc3913
839
2
[ "CHANGELOG.md", "jodd-json/src/main/java/jodd/json/JsonParser.java", "jodd-json/src/main/java/jodd/json/JsonParserBase.java", "jodd-json/src/main/java/jodd/json/MapToBean.java", "jodd-json/src/test/java/jodd/json/JSONDeserializerTest.java" ]
Java
{"CHANGELOG.md": {"lines_added": 1, "lines_deleted": 0}, "jodd-json/src/main/java/jodd/json/JsonParser.java": {"lines_added": 21, "lines_deleted": 0}, "jodd-json/src/main/java/jodd/json/JsonParserBase.java": {"lines_added": 1, "lines_deleted": 0}, "jodd-json/src/main/java/jodd/json/MapToBean.java": {"lines_added": 14, ...
diff --git a/CHANGELOG.md b/CHANGELOG.md index 186210faa..4b77ee175 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -22,10 +22,11 @@ All notable changes to Jodd project are documented here. + **joy** - added excluded jars for faster scanning. + **mail** - added custom properties. + **json** - added `onValue` callb...
+ **json** - added `allowClass` for whitelisting class names. import java.util.ArrayList; /** * Adds a {@link jodd.util.Wildcard wildcard} pattern for white-listing classes. * @see #setClassMetadataName(String) */ public JsonParser allowClass(final String classPattern) { if (super.classnameWhitelist == null) ...
[]
CVE-2019-10767
f6e292c6750a491a5000d0f851b2fede4f9e2fda
https://github.com/ioBroker/ioBroker.js-controller
[{'lang': 'en', 'value': 'An attacker can include file contents from outside the `/adapter/xxx/` directory, where `xxx` is the name of an existent adapter like "admin". It is exploited using the administrative web panel with a request for an adapter file. **Note:** The attacker has to be logged in if the authentication...
5
7.5
2019-11-21T17:15Z
MEDIUM
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the...
some security enhancements to better prevent path traversing
2019-10-04 20:24:49 +0200
f6e292c
625
2
[ "lib/objects/objectsUtils.js", "test/lib/testObjects.js" ]
JavaScript
{"lib/objects/objectsUtils.js": {"lines_added": 9, "lines_deleted": 3}, "test/lib/testObjects.js": {"lines_added": 33, "lines_deleted": 0}}
diff --git a/lib/objects/objectsUtils.js b/lib/objects/objectsUtils.js index e23c481..d6df772 100644 --- a/lib/objects/objectsUtils.js +++ b/lib/objects/objectsUtils.js @@ -470,15 +470,21 @@ function sanitizePath(id, name, callback) { } return; } if (id) { - id = id.replace(/\.\./g,...
id = id.replace(/\.\./g, ''); // do not allow to write in parent directories if (name.indexOf('..') !== -1) { name = path.normalize(name);
id = id.replace(/[\]\[*,;'"`<>\\?\/]/g, ''); // remove all invalid characters from states plus slashes if (name.includes('..')) { name = path.normalize('/' + name); name = name.replace(/\\/g, '/'); } if (name.includes('..')) { // Also after normalization we still have .. in i...
[]
CVE-2021-32773
6ca4ffeca1e5877d44f835760ad89f18488d97e1
https://github.com/racket/racket
[{'lang': 'en', 'value': 'Racket is a general-purpose programming language and an ecosystem for language-oriented programming. In versions prior to 8.2, code evaluated using the Racket sandbox could cause system modules to incorrectly use attacker-created modules instead of their intended dependencies. This could allow...
5
7.5
2021-07-20T00:15Z
MEDIUM
CWE-610
Externally Controlled Reference to a Resource in Another Sphere
The product uses an externally controlled name or reference that resolves to a resource that is outside of the intended control sphere.
racket/sandbox: documentation and tests for reader and require checking
2021-07-01 15:55:40 -0600
6ca4ffeca1
5,810
2
[ "pkgs/racket-doc/scribblings/reference/sandbox.scrbl", "pkgs/racket-test-core/tests/racket/sandbox.rktl" ]
Other
{"pkgs/racket-doc/scribblings/reference/sandbox.scrbl": {"lines_added": 56, "lines_deleted": 10}, "pkgs/racket-test-core/tests/racket/sandbox.rktl": {"lines_added": 28, "lines_deleted": 0}}
diff --git a/pkgs/racket-doc/scribblings/reference/sandbox.scrbl b/pkgs/racket-doc/scribblings/reference/sandbox.scrbl index c88a2362c6..ce489ea0d9 100644 --- a/pkgs/racket-doc/scribblings/reference/sandbox.scrbl +++ b/pkgs/racket-doc/scribblings/reference/sandbox.scrbl @@ -27,17 +27,20 @@ for the common use case where...
[#:allow-read allow-read (listof (or/c module-path? path-string?)) null]) [#:language lang (or/c #f module-path?) #f] [#:allow-read allow-read (listof (or/c module-path? path-string?)) null]) @racket[allow-for-load], an...
[#:allow-read allow-read (listof (or/c module-path? path-string?)) null] [#:allow-syntactic-requires allow-syntactic-requires (or/c #f (listof module-path?)) #f]) [#:language lang (or/c #f module-path?) #f] ...
[ "validation" ]
CVE-2013-7283
ef2d756e73a188401c36133c2e2f7ce4f3c6ae55
https://github.com/libreswan/libreswan
[{'lang': 'en', 'value': 'Race condition in the libreswan.spec files for Red Hat Enterprise Linux (RHEL) and Fedora packages in libreswan 3.6 has unspecified impact and attack vectors, involving the /var/tmp/libreswan-nss-pwd temporary file.'}]
9.3
null
2014-01-09T18:07Z
HIGH
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
The product contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.
packaging: SECURITY, insecure temp files on rpm package installation
2013-11-08 10:35:00 +0200
ef2d756e7
16,875
2
[ "packaging/fedora/17/libreswan.spec", "packaging/fedora/18/libreswan.spec", "packaging/fedora/19/libreswan.spec", "packaging/rhel/5/libreswan.spec", "packaging/rhel/6/libreswan.spec", "packaging/rhel/7/libreswan.spec" ]
Other
{"packaging/fedora/17/libreswan.spec": {"lines_added": 9, "lines_deleted": 7}, "packaging/fedora/18/libreswan.spec": {"lines_added": 10, "lines_deleted": 8}, "packaging/fedora/19/libreswan.spec": {"lines_added": 10, "lines_deleted": 8}, "packaging/rhel/5/libreswan.spec": {"lines_added": 7, "lines_deleted": 5}, "packagi...
diff --git a/packaging/fedora/17/libreswan.spec b/packaging/fedora/17/libreswan.spec index 7b950d160..793c4014b 100644 --- a/packaging/fedora/17/libreswan.spec +++ b/packaging/fedora/17/libreswan.spec @@ -147,12 +147,12 @@ install -d %{buildroot}%{_sbindir} %if %{USE_FIPSCHECK} mkdir -p %{buildroot}%{_libdir}/fipsc...
echo "include /etc/ipsec.d/*.secrets" > %{buildroot}%{_sysconfdir}/ipsec.secrets rm -fr %{buildroot}/etc/rc.d/rc* if [ ! -f /etc/ipsec.d/cert8.db ] ; then echo > /var/tmp/libreswan-nss-pwd certutil -N -f /var/tmp/libreswan-nss-pwd -d /etc/ipsec.d restorecon /etc/ipsec.d/*db 2>/dev/null || : rm /var/tmp/libreswan-nss-pw...
echo "include %{_sysconfdir}/ipsec.d/*.secrets" > %{buildroot}%{_sysconfdir}/ipsec.secrets rm -fr %{buildroot}%{_sysconfdir}/rc.d/rc* if [ ! -f %{_sysconfdir}/ipsec.d/cert8.db ] ; then TEMPFILE=$(/bin/mktemp %{_sysconfdir}/ipsec.d/nsspw.XXXXXXX) [ $? -gt 0 ] && TEMPFILE=%{_sysconfdir}/ipsec.d/nsspw.$$ echo ...
[]
CVE-2013-7294
2899351224fe2940aec37d7656e1e392c0fe07f0
https://github.com/libreswan/libreswan
[{'lang': 'en', 'value': 'The ikev2parent_inI1outR1 function in pluto/ikev2_parent.c in libreswan before 3.7 allows remote attackers to cause a denial of service (restart) via an IKEv2 I1 notification without a KE payload.'}]
5
null
2014-01-16T05:05Z
MEDIUM
CWE-20
Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
SECURITY: Properly handle IKEv2 I1 notification packet without KE payload
2013-11-26 19:46:49 -0500
289935122
16,875
2
[ "programs/pluto/ikev2_parent.c" ]
C
{"programs/pluto/ikev2_parent.c": {"lines_added": 18, "lines_deleted": 13}}
diff --git a/programs/pluto/ikev2_parent.c b/programs/pluto/ikev2_parent.c index 72526ba03..ce67cc3c0 100644 --- a/programs/pluto/ikev2_parent.c +++ b/programs/pluto/ikev2_parent.c @@ -304,12 +304,10 @@ static void ikev2_parent_outI1_continue(struct pluto_crypto_req_cont *pcrc, if (ke->md) release_md(ke->md); ...
passert(GLOBALS_ARE_RESET()); char fromname[ADDRTOT_BUF]; addrtot(&md->sender, 0, fromname, ADDRTOT_BUF); return v2N_INVALID_KE_PAYLOAD; passert(GLOBALS_ARE_RESET()); passert(GLOBALS_ARE_RESET()); reset_globals(); passert(GLOBALS_ARE_RESET());
char fromname[ADDRTOT_BUF]; addrtot(&md->sender, 0, fromname, ADDRTOT_BUF); if (!md->chain[ISAKMP_NEXT_v2KE]) { /* is this a notify? If so, log it */ if(md->chain[ISAKMP_NEXT_v2N]) { libreswan_log("Received Notify(%d): %s", md->chain[ISAKMP_NEXT_v2N]->payload.v2n.isan_type, enum_name(&ikev2_n...
[]