ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-frcq-4ffq-v4mw
Directory Traversal in lessindex
Affected versions of `lessindex` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16211'}
2021-01-14T15:45:02Z
2020-09-01T18:12:07Z
HIGH
0
{'CWE-22'}
{'https://nodesecurity.io/advisories/423', 'https://github.com/advisories/GHSA-frcq-4ffq-v4mw', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/lessindex', 'https://www.npmjs.com/advisories/423', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16211'}
null
GHSA
GHSA-cqxr-xf2w-943w
Creation of Temporary File in Directory with Insecure Permissions in auto-generated Java, Scala code
### Impact **This vulnerability impacts generated code.** If this code was generated as a one-off occasion, not as a part of an automated CI/CD process, this code will remain vulnerable until fixed manually! On Unix-Like systems, the system temporary directory is shared between all local users. When files/directories are created, the default `umask` settings for the process are respected. As a result, by default, most processes/apis will create files/directories with the permissions `-rw-r--r--` and `drwxr-xr-x` respectively, unless an API that explicitly sets safe file permissions is used. This vulnerability exists due to the use of the JDK method `File.createTempFile`. This method creates an insecure temporary files that can leave application and system data vulnerable to exposure. Auto-generated code (Java, Scala) that deals with uploading or downloading binary data through API endpoints will create insecure temporary files during the process. For example, if the API endpoint returns a PDF file, the auto-generated clients will first download the PDF into a insecure temporary file that can be read by anyone on the system. Affected generators: - Java - `okhttp-gson` (default library) https://github.com/OpenAPITools/openapi-generator/blob/d85f61ff0cfd6b8cd7063a63f302998a51466269/modules/openapi-generator/src/main/resources/Java/libraries/okhttp-gson/ApiClient.mustache#L1085-L1088 - `jersey2` https://github.com/OpenAPITools/openapi-generator/blob/d85f61ff0cfd6b8cd7063a63f302998a51466269/modules/openapi-generator/src/main/resources/Java/libraries/jersey2/ApiClient.mustache#L1035-L1038 - `resteasy` https://github.com/OpenAPITools/openapi-generator/blob/d85f61ff0cfd6b8cd7063a63f302998a51466269/modules/openapi-generator/src/main/resources/Java/libraries/resteasy/ApiClient.mustache#L604-L607 - `retrofit2` https://github.com/OpenAPITools/openapi-generator/blob/d85f61ff0cfd6b8cd7063a63f302998a51466269/modules/openapi-generator/src/main/resources/Java/libraries/retrofit2/play26/ApiClient.mustache#L202-L208 - Scala - `scala-finch` https://github.com/OpenAPITools/openapi-generator/blob/764a3b044c19fadf4a0789473cde96a65b77868a/modules/openapi-generator/src/main/resources/scala-finch/api.mustache#L83-L88 - `scala-akka` https://github.com/OpenAPITools/openapi-generator/blob/150e24dc553a8ea5230ffb938ed3e6020e972faa/modules/openapi-generator/src/main/resources/scala-akka-http-server/multipartDirectives.mustache#L71-L73 ### Patches The issue has been patched by changing the generated code to use the JDK method `Files.createTempFile` and released in the v5.1.0 stable version. This vulnerability has the same root cause as CVE-2021-21364 from the `swagger-api/swagger-codegen` project as this project and that one both share the same original source tree. https://github.com/swagger-api/swagger-codegen/security/advisories/GHSA-hpv8-9rq5-hq7w ### For more information If you have any questions or comments about this advisory: * Open an issue in [OpenAPI Generator Github repo](https://github.com/openAPITools/openapi-generator/) * Email us at [[email protected]](mailto:[email protected])
{'CVE-2021-21430'}
2022-04-19T19:02:52Z
2021-05-11T00:05:06Z
MODERATE
6.2
{'CWE-379', 'CWE-378', 'CWE-377', 'CWE-269'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21430', 'https://github.com/OpenAPITools/openapi-generator/pull/9348', 'https://github.com/OpenAPITools/openapi-generator/pull/8787', 'https://github.com/OpenAPITools/openapi-generator/pull/8791', 'https://github.com/OpenAPITools/openapi-generator/security/advisories/GHSA-cqxr-xf2w-943w', 'https://github.com/advisories/GHSA-cqxr-xf2w-943w'}
null
GHSA
GHSA-4vvp-x9h2-x2vf
Path Traversal in public
All versions of `public` are vulnerable to Path Traversal. This vulnerability allows an attacker to access files outside the webroot since it allows symlink navigation in the URL. ## Recommendation No fix is currently available. Do not use `public` in production or consider using an alternative module until a fix is made available.
null
2021-09-29T16:30:39Z
2020-09-03T20:26:39Z
MODERATE
0
{'CWE-22'}
{'https://hackerone.com/reports/593911', 'https://www.npmjs.com/advisories/1144', 'https://github.com/advisories/GHSA-4vvp-x9h2-x2vf'}
null
GHSA
GHSA-3q5q-f79q-7hr2
High severity vulnerability that affects rubyzip
Withdrawn, accidental duplicate publish. The Zip::File component in the rubyzip gem before 1.2.1 for Ruby has a directory traversal vulnerability. If a site allows uploading of .zip files, an attacker can upload a malicious file that uses "../" pathname substrings to write arbitrary files to the filesystem.
null
2021-12-02T23:07:22Z
2018-07-31T18:21:46Z
HIGH
0
null
{'https://nvd.nist.gov/vuln/detail/CVE-2017-5946', 'https://github.com/advisories/GHSA-3q5q-f79q-7hr2'}
null
GHSA
GHSA-vxf6-w9mp-95hm
Low severity vulnerability that affects puppet
lib/puppet/network/authstore.rb in Puppet before 2.7.18, and Puppet Enterprise before 2.5.2, supports use of IP addresses in certnames without warning of potential risks, which might allow remote attackers to spoof an agent by acquiring a previously used IP address.
{'CVE-2012-3408'}
2021-09-20T22:23:47Z
2017-10-24T18:33:38Z
LOW
0
{'CWE-287'}
{'https://github.com/advisories/GHSA-vxf6-w9mp-95hm', 'http://puppetlabs.com/security/cve/cve-2012-3408/', 'https://nvd.nist.gov/vuln/detail/CVE-2012-3408', 'https://bugzilla.redhat.com/show_bug.cgi?id=839166', 'https://github.com/puppetlabs/puppet/commit/ab9150baa1b738467a33b01df1d90e076253fbbd'}
null
GHSA
GHSA-vmqm-g3vh-847m
Denial of service in Apache Xerces2
Apache Xerces2 Java Parser before 2.12.0 allows remote attackers to cause a denial of service (CPU consumption) via a crafted message to an XML service, which triggers hash table collisions.
{'CVE-2012-0881'}
2021-09-29T18:00:54Z
2020-06-15T18:51:38Z
HIGH
7.5
{'CWE-400'}
{'https://lists.apache.org/thread.html/49dc6702104a86ecbb40292dcd329ce9ae4c32b74733199ecab14a73@%3Cj-users.xerces.apache.org%3E', 'https://lists.apache.org/thread.html/rea7b831dceeb2a2fa817be6f63b08722042e3647fb2d47c144370a56@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://bugzilla.redhat.com/show_bug.cgi?id=787104', 'https://issues.apache.org/jira/browse/XERCESJ-1685', 'https://github.com/apache/xerces2-j/commit/992b5d9c24102ad20330d36c0a71162753a37449', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2014/07/08/11', 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E', 'https://github.com/advisories/GHSA-vmqm-g3vh-847m', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2012-0881', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-9m4x-8w29-r78g
Server-Side Request Forgery in @uppy/companion
The @uppy/companion npm package before versions 1.13.2 and 2.0.0-alpha.5 is vulnerable to a Server-Side Request Forgery (SSRF) vulnerability, which allows an attacker to scan local or external networks or otherwise interact with internal systems.
{'CVE-2020-8205'}
2021-01-08T20:55:35Z
2020-08-13T18:54:19Z
MODERATE
0
{'CWE-918'}
{'https://github.com/transloadit/uppy/pull/2322/commits/dbf2f4f30aeaf3bcc5971bb867bb0b5984084828', 'https://hackerone.com/reports/891270', 'https://github.com/advisories/GHSA-9m4x-8w29-r78g', 'https://github.com/transloadit/uppy/blob/master/CHANGELOG.md#1161', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8205'}
null
GHSA
GHSA-vw27-fwjf-5qxm
Arbitrary command execution on Windows via qutebrowserurl: URL handler
### Impact Starting with qutebrowser v1.7.0, the Windows installer for qutebrowser registers it as a handler for certain URL schemes. With some applications such as Outlook Desktop, opening a specially crafted URL can lead to argument injection, allowing execution of qutebrowser commands, which in turn allows arbitrary code execution via commands such as `:spawn` or `:debug-pyeval`. Only Windows installs where qutebrowser is registered as URL handler are affected. It does *not* have to be set as default browser for the exploit to work. ### Patches The issue has been fixed in [qutebrowser v2.4.0](https://github.com/qutebrowser/qutebrowser/releases/tag/v2.4.0) in commit 8f46ba3f6dc7b18375f7aa63c48a1fe461190430. The fix also adds additional hardening for potential similar issues on Linux (by adding the new `--untrusted-args` flag to the `.desktop` file), though no such vulnerabilities are known. Backported patches for older versions are available, but no further releases are planned: - v1.7.x: d1ceaab - v1.8.x: ca7155d - v1.9.x: 157d871 - v1.10.x: 94a6125 - v1.11.x: 10acfbb - v1.12.x: 363a18f - v1.13.x: 410f262 - v1.14.x: e4f4d93 - v2.0.x: 15a1654 - v2.1.x: 509ddf2 - v2.2.x: 03dcba5 - v2.3.x: 00a694c (commits are referring to qutebrowser/qutebrowser on GitHub) ### Workarounds Remove qutebrowser from the default browser settings entirely, so that it does not handle any kind of URLs. Make sure to remove *all* handlers, including an (accidental) `qutebrowserURL` handler, e.g. using [NirSoft URLProtocolView](https://www.nirsoft.net/utils/url_protocol_view.html). ### Timeline 2021-10-15: Issue reported via [email protected] by Ping Fan (Zetta) Ke of [Valkyrie-X Security Research Group (VXRL)](https://www.vxrl.hk/) 2021-10-15: Issue confirmed by @The-Compiler (lead developer), author of installer (@bitraid) contacted for help/review 2021-10-15: CVE assigned by GitHub 2021-10-15 to 2021-10-17: Fix developed 2021-10-17: Additional core developer (@toofar) contacted for help/review 2021-10-21: v2.4.0 released containing the fix 2021-10-21: Advisory and fix published ### References See the [commit message](https://github.com/qutebrowser/qutebrowser/commit/8f46ba3f6dc7b18375f7aa63c48a1fe461190430) for additional information and references to various similar issues in other projects. ### Acknowledgements Thanks to Ping Fan (Zetta) Ke of [Valkyrie-X Security Research Group](https://www.vxrl.hk/) (VXRL/@vxresearch) for finding and responsibly disclosing this issue. ### Contact If you have any questions or comments about this advisory, please email [[email protected]](mailto:[email protected]).
{'CVE-2021-41146'}
2021-10-22T16:20:10Z
2021-10-22T16:20:10Z
HIGH
8.8
{'CWE-88', 'CWE-77', 'CWE-641'}
{'https://github.com/qutebrowser/qutebrowser/security/advisories/GHSA-vw27-fwjf-5qxm', 'https://github.com/advisories/GHSA-vw27-fwjf-5qxm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41146', 'https://github.com/qutebrowser/qutebrowser/commit/8f46ba3f6dc7b18375f7aa63c48a1fe461190430'}
null
GHSA
GHSA-c968-pq7h-7fxv
Division by 0 in `Conv3DBackprop*`
### Impact The `tf.raw_ops.Conv3DBackprop*` operations fail to validate that the input tensors are not empty. In turn, this would result in a division by 0: ```python import tensorflow as tf input_sizes = tf.constant([0, 0, 0, 0, 0], shape=[5], dtype=tf.int32) filter_tensor = tf.constant([], shape=[0, 0, 0, 1, 0], dtype=tf.float32) out_backprop = tf.constant([], shape=[0, 0, 0, 0, 0], dtype=tf.float32) tf.raw_ops.Conv3DBackpropInputV2(input_sizes=input_sizes, filter=filter_tensor, out_backprop=out_backprop, strides=[1, 1, 1, 1, 1], padding='SAME', data_format='NDHWC', dilations=[1, 1, 1, 1, 1]) ``` ```python import tensorflow as tf input_sizes = tf.constant([1], shape=[1, 1, 1, 1, 1], dtype=tf.float32) filter_tensor = tf.constant([0, 0, 0, 1, 0], shape=[5], dtype=tf.int32) out_backprop = tf.constant([], shape=[1, 1, 1, 1, 0], dtype=tf.float32) tf.raw_ops.Conv3DBackpropFilterV2(input=input_sizes, filter_sizes=filter_tensor, out_backprop=out_backprop, strides=[1, 1, 1, 1, 1], padding='SAME', data_format='NDHWC', dilations=[1, 1, 1, 1, 1]) ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/a91bb59769f19146d5a0c20060244378e878f140/tensorflow/core/kernels/conv_grad_ops_3d.cc#L430-L450) does not check that the divisor used in computing the shard size is not zero: ```cc const int64 size_A = output_image_size * dims.out_depth; const int64 size_B = filter_total_size * dims.out_depth; const int64 size_C = output_image_size * filter_total_size; const int64 work_unit_size = size_A + size_B + size_C; ... const size_t shard_size = use_parallel_contraction ? 1 : (target_working_set_size + work_unit_size - 1) / work_unit_size; ``` Thus, if attacker controls the input sizes, they can trigger a denial of service via a division by zero error. ### Patches We have patched the issue in GitHub commit [311403edbc9816df80274bd1ea8b3c0c0f22c3fa](https://github.com/tensorflow/tensorflow/commit/311403edbc9816df80274bd1ea8b3c0c0f22c3fa). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
{'CVE-2021-29522'}
2021-05-21T14:21:39Z
2021-05-21T14:21:39Z
LOW
2.5
{'CWE-369'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29522', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c968-pq7h-7fxv', 'https://github.com/tensorflow/tensorflow/commit/311403edbc9816df80274bd1ea8b3c0c0f22c3fa', 'https://github.com/advisories/GHSA-c968-pq7h-7fxv'}
null
GHSA
GHSA-2f5j-3mhq-xv58
Double free in sys-info
An issue was discovered in the sys-info crate before 0.8.0 for Rust. sys_info::disk_info calls can trigger a double free.
{'CVE-2020-36434'}
2021-08-25T20:58:15Z
2021-08-25T20:58:15Z
CRITICAL
9.8
{'CWE-415'}
{'https://github.com/FillZpp/sys-info-rs/issues/63', 'https://rustsec.org/advisories/RUSTSEC-2020-0100.html', 'https://github.com/advisories/GHSA-2f5j-3mhq-xv58', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36434', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/sys-info/RUSTSEC-2020-0100.md'}
null
GHSA
GHSA-jxgm-9f58-w4xp
Improper Input Validation in Apache Archiva
In Apache Archiva 2.0.0 - 2.2.3, it is possible to write files to the archiva server at arbitrary locations by using the artifact upload mechanism. Existing files can be overwritten, if the archiva run user has appropriate permission on the filesystem for the target file.
{'CVE-2019-0214'}
2021-07-27T20:35:40Z
2019-05-14T04:00:21Z
MODERATE
6.5
{'CWE-20'}
{'http://packetstormsecurity.com/files/152684/Apache-Archiva-2.2.3-File-Write-Delete.html', 'https://lists.apache.org/thread.html/239349b6dd8f66cf87a70c287b03af451dea158b776d3dfc550b4f0e@%3Cusers.maven.apache.org%3E', 'https://lists.apache.org/thread.html/18b670afc2f83034f47ebeb2f797c350fe60f1f2b33c95b95f467ef8@%3Cannounce.apache.org%3E', 'https://github.com/advisories/GHSA-jxgm-9f58-w4xp', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0214', 'https://seclists.org/bugtraq/2019/Apr/48', 'https://lists.apache.org/thread.html/5851cb0214f22ba681fb445870eeb6b01afd1fb614e45a22978d7dda@%3Cusers.archiva.apache.org%3E', 'https://lists.apache.org/thread.html/ada0052409d8a4a8c4eb2c7fd6b9cd9423bc753d5fce87eb826662fb@%3Cissues.archiva.apache.org%3E', 'http://www.securityfocus.com/bid/108124', 'http://archiva.apache.org/security.html#CVE-2019-0214', 'http://www.openwall.com/lists/oss-security/2019/04/30/8'}
null
GHSA
GHSA-6h2c-g688-q9qr
Path traversal in Jenkins Phoenix AutoTest Plugin
Jenkins Pipeline: Phoenix AutoTest Plugin 1.3 and earlier allows attackers with Item/Configure permission to copy arbitrary files and directories from the Jenkins controller to the agent workspace.
{'CVE-2022-28156'}
2022-04-12T21:59:20Z
2022-03-30T00:00:24Z
MODERATE
6.5
{'CWE-22'}
{'https://github.com/advisories/GHSA-6h2c-g688-q9qr', 'https://nvd.nist.gov/vuln/detail/CVE-2022-28156', 'http://www.openwall.com/lists/oss-security/2022/03/29/1', 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2683'}
null
GHSA
GHSA-hm82-qr45-h7mw
Improperly Controlled Modification of Dynamically-Determined Object Attributes in field
Prototype pollution vulnerability in 'field' versions 0.0.1 through 1.0.1 allows attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2020-28269'}
2021-12-10T17:22:58Z
2021-12-10T17:22:58Z
CRITICAL
9.8
{'CWE-915'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-28269', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28269,', 'https://github.com/advisories/GHSA-hm82-qr45-h7mw', 'https://github.com/jprichardson/field/blob/2a3811dfc4cdd13833977477d2533534fc61ce06/lib/field.js#L39', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28269'}
null
GHSA
GHSA-hxx6-p24v-wg8c
High severity vulnerability that affects curl
lib/curl.rb in the Curl Gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a URL.
{'CVE-2013-2617'}
2021-09-14T17:33:44Z
2017-10-24T18:33:37Z
HIGH
0
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2013-2617', 'http://www.osvdb.org/91230', 'http://packetstormsecurity.com/files/120778/Ruby-Gem-Curl-Command-Execution.html', 'https://github.com/advisories/GHSA-hxx6-p24v-wg8c', 'http://www.openwall.com/lists/oss-security/2013/03/19/9', 'http://seclists.org/fulldisclosure/2013/Mar/124'}
null
GHSA
GHSA-4g46-5grc-wq49
Cross-Site Scripting in seeftl
All versions of `seeftl` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
{'CVE-2019-15603'}
2021-01-08T20:23:55Z
2020-04-01T16:36:31Z
HIGH
0
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-15603', 'https://www.npmjs.com/advisories/1451', 'https://github.com/advisories/GHSA-4g46-5grc-wq49', 'https://hackerone.com/reports/665302'}
null
GHSA
GHSA-f78f-353m-cf4j
Code Injection in node-rules
node-rules including 3.0.0 and prior to 5.0.0 allows injection of arbitrary commands. The argument rules of function "fromJSON()" can be controlled by users without any sanitization.
{'CVE-2020-7609'}
2021-12-10T20:05:37Z
2021-12-10T20:05:37Z
CRITICAL
9.8
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7609', 'https://github.com/mithunsatheesh/node-rules/commit/100862223904bb6478fcc33b701c7dee11f7b832,', 'https://snyk.io/vuln/SNYK-JS-NODERULES-560426', 'https://github.com/mithunsatheesh/node-rules/commit/100862223904bb6478fcc33b701c7dee11f7b832', 'https://github.com/advisories/GHSA-f78f-353m-cf4j'}
null
GHSA
GHSA-c7pr-343r-5c46
missing clamps for decimal args in external functions
### Impact The following code does not properly validate that its input is in bounds. ```python @external def foo(x: decimal) -> decimal: return x ``` ### Patches 0.3.0 / #2447 ### Workarounds Don't use decimal args
{'CVE-2021-41122'}
2021-10-07T13:56:53Z
2021-10-06T17:48:46Z
MODERATE
4.3
{'CWE-682'}
{'https://github.com/advisories/GHSA-c7pr-343r-5c46', 'https://github.com/vyperlang/vyper/pull/2447', 'https://github.com/vyperlang/vyper/security/advisories/GHSA-c7pr-343r-5c46', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41122'}
null
GHSA
GHSA-w942-gw6m-p62c
Denial of service in GJSON
GJSON before 1.6.4 allows attackers to cause a denial of service via crafted JSON.
{'CVE-2020-35380'}
2021-06-23T17:53:05Z
2021-06-23T17:53:05Z
HIGH
7.5
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35380', 'https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc', 'https://github.com/tidwall/gjson/issues/192', 'https://github.com/advisories/GHSA-w942-gw6m-p62c'}
null
GHSA
GHSA-qwfw-gxx2-mmv2
Command Injection in Kylin
Similar to CVE-2020-1956, Kylin has one more restful API which concatenates the API inputs into OS commands and then executes them on the server; while the reported API misses necessary input validation, which causes the hackers to have the possibility to execute OS command remotely. Users of all previous versions after 2.3 should upgrade to 3.1.0.
{'CVE-2020-13925'}
2021-09-22T21:50:55Z
2020-07-27T22:51:37Z
CRITICAL
9.8
{'CWE-78'}
{'https://lists.apache.org/thread.html/r021baf9d8d4ae41e8c8332c167c4fa96c91b5086563d9be55d2d7acf@%3Ccommits.kylin.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13925', 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEKYLIN-584373', 'https://lists.apache.org/thread.html/r250a867961cfd6e0506240a9c7eaee782d84c6ab0091c7c4bc45f3eb%40%3Cuser.kylin.apache.org%3E', 'https://github.com/advisories/GHSA-qwfw-gxx2-mmv2'}
null
GHSA
GHSA-cj43-9h3w-v976
Moderate severity vulnerability that affects puppet
Unspecified vulnerability in Puppet 2.7.x before 2.7.23 and 3.2.x before 3.2.4, and Puppet Enterprise 2.8.x before 2.8.3 and 3.0.x before 3.0.1, allows remote attackers to execute arbitrary Ruby programs from the master via the resource_type service. NOTE: this vulnerability can only be exploited utilizing unspecified "local file system access" to the Puppet Master.
{'CVE-2013-4761'}
2021-12-02T22:32:28Z
2017-10-24T18:33:37Z
MODERATE
0
null
{'http://rhn.redhat.com/errata/RHSA-2013-1283.html', 'https://github.com/advisories/GHSA-cj43-9h3w-v976', 'http://rhn.redhat.com/errata/RHSA-2013-1284.html', 'http://www.debian.org/security/2013/dsa-2761', 'http://puppetlabs.com/security/cve/cve-2013-4761/', 'https://nvd.nist.gov/vuln/detail/CVE-2013-4761', 'http://lists.opensuse.org/opensuse-security-announce/2014-01/msg00009.html'}
null
GHSA
GHSA-5379-r78w-42h2
Unlimited transforms allowed for signed nodes
### Impact A malicious SAML payload can require transforms that consume significant system resources to process, thereby resulting in reduced or denied service. This would be an effective way to perform a denial-of-service attack. ### Patches This has been resolved in version 3.1.0. The resolution is to limit the number of allowable transforms to 2. ### References https://github.com/node-saml/passport-saml/pull/595
{'CVE-2021-39171'}
2022-04-19T19:03:03Z
2021-08-30T16:11:57Z
MODERATE
5.3
{'CWE-400'}
{'https://github.com/node-saml/passport-saml/security/advisories/GHSA-5379-r78w-42h2', 'https://github.com/advisories/GHSA-5379-r78w-42h2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39171', 'https://github.com/node-saml/passport-saml/pull/595'}
null
GHSA
GHSA-84wg-rgp8-2hg4
Command Injection in Apache James
Apache James prior to release 3.6.1 is vulnerable to a buffering attack relying on the use of the STARTTLS command. This can result in Man-in -the-middle command injection attacks, leading potentially to leakage of sensible information.
{'CVE-2021-38542'}
2022-01-08T00:40:33Z
2022-01-08T00:40:33Z
MODERATE
0
{'CWE-77'}
{'https://www.openwall.com/lists/oss-security/2022/01/04/1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38542', 'http://www.openwall.com/lists/oss-security/2022/01/04/1', 'https://github.com/advisories/GHSA-84wg-rgp8-2hg4'}
null
GHSA
GHSA-6m26-25q2-cq46
Cross-site Scripting in microweber
Microweber Cross-site Scripting (XSS) - Stored XSS vulnerability on admin page up to version 1.3.
{'CVE-2022-0763'}
2022-03-09T20:36:47Z
2022-02-27T00:00:15Z
MODERATE
4.8
{'CWE-79'}
{'https://github.com/advisories/GHSA-6m26-25q2-cq46', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0763', 'https://huntr.dev/bounties/6de9c621-740d-4d7a-9d77-d90c6c87f3b6', 'https://github.com/microweber/microweber/commit/c897d0dc159849763a813184d9b75b966c6360bf'}
null
GHSA
GHSA-267x-w5hx-8hjr
Integer Overflow or Wraparound in OpenCV
In opencv/modules/imgcodecs/src/grfmt_pxm.cpp, function ReadNumber did not checkout the input length, which lead to integer overflow. If the image is from remote, may lead to remote code execution or denial of service. This affects OpenCV 3.3 (corresponding with OpenCV-Python version 3.3.0.9) and earlier.
{'CVE-2017-12864'}
2021-11-18T15:30:15Z
2021-10-12T22:02:45Z
HIGH
8.8
{'CWE-190'}
{'https://github.com/opencv/opencv/issues/9372', 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html', 'https://github.com/opencv/opencv/pull/9376', 'https://security.gentoo.org/glsa/201712-02', 'https://github.com/advisories/GHSA-267x-w5hx-8hjr', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12864'}
null
GHSA
GHSA-qh4w-7pw3-p4rp
Potential denial of service in bson rubygem
The Moped::BSON::ObjecId.legal? method in mongodb/bson-ruby before 3.0.4 as used in rubygem-moped allows remote attackers to cause a denial of service (worker resource consumption) via a crafted string. NOTE: This issue is due to an incomplete fix to CVE-2015-4410.
{'CVE-2015-4411'}
2021-08-25T21:02:03Z
2020-04-29T15:34:50Z
HIGH
7.5
{'CWE-400'}
{'http://www.securityfocus.com/bid/75045', 'https://github.com/mongoid/moped/commit/dd5a7c14b5d2e466f7875d079af71ad19774609b#diff-3b93602f64c2fe46d38efd9f73ef5358R24', 'https://github.com/mongodb/bson-ruby/compare/7446d7c6764dfda8dc4480ce16d5c023e74be5ca...28f34978a85b689a4480b4d343389bf4886522e7', 'https://www.securityfocus.com/bid/75045', 'https://github.com/advisories/GHSA-qh4w-7pw3-p4rp', 'https://seclists.org/oss-sec/2015/q2/653', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161964.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161987.html', 'https://nvd.nist.gov/vuln/detail/CVE-2015-4411', 'https://github.com/mongodb/bson-ruby/commit/fef6f75413511d653c76bf924a932374a183a24f#diff-8c8558c185bbb548ccb5a6d6ac4bfee5R191', 'http://www.openwall.com/lists/oss-security/2015/06/06/3', 'https://bugzilla.redhat.com/show_bug.cgi?id=1229706', 'https://security-tracker.debian.org/tracker/CVE-2015-4411', 'https://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html', 'https://github.com/mongodb/bson-ruby/commit/976da329ff03ecdfca3030eb6efe3c85e6db9999', 'https://homakov.blogspot.ru/2012/05/saferweb-injects-in-various-ruby.html'}
null
GHSA
GHSA-w3f4-3q6j-rh82
Deserialization of Untrusted Data in jackson-databind
FasterXML jackson-databind through 2.8.11 and 2.9.x through 2.9.3 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 and CVE-2017-17485 deserialization flaws. This is exploitable via two different gadgets that bypass a blacklist.
{'CVE-2018-5968'}
2021-09-22T18:44:20Z
2020-06-30T20:40:50Z
HIGH
8.1
{'CWE-184', 'CWE-502'}
{'https://access.redhat.com/errata/RHSA-2018:0480', 'https://github.com/GulajavaMinistudio/jackson-databind/pull/92/commits/038b471e2efde2e8f96b4e0be958d3e5a1ff1d05', 'https://access.redhat.com/errata/RHSA-2018:0481', 'https://security.netapp.com/advisory/ntap-20180423-0002/', 'https://github.com/advisories/GHSA-w3f4-3q6j-rh82', 'https://access.redhat.com/errata/RHSA-2018:1525', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.debian.org/security/2018/dsa-4114', 'https://access.redhat.com/errata/RHSA-2018:0479', 'https://access.redhat.com/errata/RHSA-2018:0478', 'https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03902en_us', 'https://github.com/FasterXML/jackson-databind/issues/1899', 'https://nvd.nist.gov/vuln/detail/CVE-2018-5968', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://access.redhat.com/errata/RHSA-2019:3149'}
null
GHSA
GHSA-xqfj-cr6q-pc8w
Crash in `tf.transpose` with complex inputs
### Impact Passing a complex argument to `tf.transpose` at the same time as passing `conjugate=True` argument results in a crash: ```python import tensorflow as tf tf.transpose(conjugate=True, a=complex(1)) ``` ### Patches We have received a patch for the issue in GitHub commit [1dc6a7ce6e0b3e27a7ae650bfc05b195ca793f88](https://github.com/tensorflow/tensorflow/commit/1dc6a7ce6e0b3e27a7ae650bfc05b195ca793f88). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported in [#42105](https://github.com/tensorflow/issues/42105) and fixed in [#46973](https://github.com/tensorflow/issues/46973).
{'CVE-2021-29618'}
2021-05-21T14:28:58Z
2021-05-21T14:28:58Z
LOW
2.5
{'CWE-755'}
{'https://github.com/tensorflow/issues/42105', 'https://github.com/tensorflow/tensorflow/commit/1dc6a7ce6e0b3e27a7ae650bfc05b195ca793f88', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xqfj-cr6q-pc8w', 'https://github.com/tensorflow/issues/46973', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29618', 'https://github.com/advisories/GHSA-xqfj-cr6q-pc8w'}
null
GHSA
GHSA-wppj-3pjr-9w79
crater is vulnerable to Unrestricted Upload of File with Dangerous Type
crater is vulnerable to Unrestricted Upload of File with Dangerous Type
{'CVE-2021-4080'}
2022-01-21T23:55:11Z
2022-01-21T23:55:11Z
HIGH
8.8
{'CWE-434'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-4080', 'https://github.com/crater-invoice/crater/commit/cdc913d16cf624aee852bc9163a7c6ffc8d1da9d', 'https://github.com/advisories/GHSA-wppj-3pjr-9w79', 'https://huntr.dev/bounties/d7453360-baca-4e56-985f-481275fa38db'}
null
GHSA
GHSA-q7wx-62r7-j2x7
Moderate severity vulnerability that affects nokogiri
The xmlreader in libxml allows remote attackers to cause a denial of service (memory consumption) via crafted XML data, related to an XML Entity Expansion (XEE) attack.
{'CVE-2015-1819'}
2021-09-16T19:39:37Z
2018-08-08T22:31:12Z
MODERATE
0
null
{'https://support.apple.com/HT206167', 'http://rhn.redhat.com/errata/RHSA-2015-2550.html', 'http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html', 'https://support.apple.com/HT206169', 'https://nvd.nist.gov/vuln/detail/CVE-2015-1819', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172710.html', 'https://support.apple.com/HT206168', 'http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html', 'http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html', 'https://security.gentoo.org/glsa/201507-08', 'http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html', 'http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html', 'https://github.com/advisories/GHSA-q7wx-62r7-j2x7', 'http://www.ubuntu.com/usn/USN-2812-1', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172943.html', 'http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html', 'https://security.gentoo.org/glsa/201701-37', 'https://support.apple.com/HT206166', 'https://git.gnome.org/browse/libxml2/commit/?id=213f1fe0d76d30eaed6e5853057defc43e6df2c9', 'http://www.securityfocus.com/bid/75570', 'http://www.securitytracker.com/id/1034243', 'http://rhn.redhat.com/errata/RHSA-2015-1419.html', 'http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html', 'http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html', 'http://xmlsoft.org/news.html', 'http://www.debian.org/security/2015/dsa-3430'}
null
GHSA
GHSA-hpcf-8vf9-q4gj
XSS in dialog closeText in jquery-ui
Affected versions of `jquery-ui` are vulnerable to a cross-site scripting vulnerability when arbitrary user input is supplied as the value of the `closeText` parameter in the `dialog` function. jQuery-UI is a library for manipulating UI elements via jQuery. Version 1.11.4 has a cross site scripting (XSS) vulnerability in the `closeText` parameter of the `dialog` function. If your application passes user input to this parameter, it may be vulnerable to XSS via this attack vector. ## Recommendation Upgrade to jQuery-UI 1.12.0 or later.
{'CVE-2016-7103'}
2022-02-08T22:08:51Z
2017-10-24T18:33:35Z
HIGH
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-7103', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://www.npmjs.com/advisories/127', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://github.com/jquery/jquery-ui/commit/9644e7bae9116edaf8d37c5b38cb32b892f10ff6', 'https://security.netapp.com/advisory/ntap-20190416-0007/', 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/ba79cf1658741e9f146e4c59b50aee56656ea95d841d358d006c18b6@%3Ccommits.roller.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'http://www.securityfocus.com/bid/104823', 'https://github.com/jquery/jquery-ui/pull/1622', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html', 'http://rhn.redhat.com/errata/RHSA-2016-2932.html', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'https://jqueryui.com/changelog/1.12.0/', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'http://rhn.redhat.com/errata/RHSA-2017-0161.html', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://www.tenable.com/security/tns-2016-19', 'https://www.drupal.org/sa-core-2022-002', 'https://github.com/jquery/api.jqueryui.com/issues/281', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'http://rhn.redhat.com/errata/RHSA-2016-2933.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://github.com/advisories/GHSA-hpcf-8vf9-q4gj', 'https://nodesecurity.io/advisories/127', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E2I4UHPIW26FIALH7GGZ3IYUUA53VOOJ/', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-c3h9-896r-86jm
Improper Input Validation in GoGo Protobuf
An issue was discovered in GoGo Protobuf before 1.3.2. plugin/unmarshal/unmarshal.go lacks certain index validation, aka the "skippy peanut butter" issue.
{'CVE-2021-3121'}
2022-03-29T21:02:00Z
2022-03-28T20:28:00Z
HIGH
8.6
{'CWE-20', 'CWE-129'}
{'https://github.com/advisories/GHSA-c3h9-896r-86jm', 'https://discuss.hashicorp.com/t/hcsec-2021-23-consul-exposed-to-denial-of-service-in-gogo-protobuf-dependency/29025', 'https://github.com/gogo/protobuf/commit/b03c65ea87cdc3521ede29f62fe3ce239267c1bc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3121', 'https://security.netapp.com/advisory/ntap-20210219-0006/', 'https://lists.apache.org/thread.html/r68032132c0399c29d6cdc7bd44918535da54060a10a12b1591328bff@%3Cnotifications.skywalking.apache.org%3E', 'https://github.com/gogo/protobuf/compare/v1.3.1...v1.3.2', 'https://lists.apache.org/thread.html/rc1e9ff22c5641d73701ba56362fb867d40ed287cca000b131dcf4a44@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r88d69555cb74a129a7bf84838073b61259b4a3830190e05a3b87994e@%3Ccommits.pulsar.apache.org%3E'}
null
GHSA
GHSA-q24h-5rq3-63j9
Incorrect Authorization in @uppy/companion
@uppy/companion prior to version 3.3.1 is vulnerable to incorrect authorization. A user with URL upload access could enumerate internal companion server networks, send local webservers files to the destination server, and finally download them If each of these files had a guessable and regular name.
{'CVE-2022-0528'}
2022-03-11T23:24:58Z
2022-03-04T00:00:19Z
HIGH
7.5
{'CWE-200', 'CWE-863'}
{'https://github.com/advisories/GHSA-q24h-5rq3-63j9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0528', 'https://huntr.dev/bounties/8b060cc3-2420-468e-8293-b9216620175b', 'https://github.com/transloadit/uppy/commit/267c34045a1e62c98406d8c31261c604a11e544a'}
null
GHSA
GHSA-p46c-w9m3-7qr2
Use of Uninitialized Resource in flumedb.
An issue was discovered in the flumedb crate through 2021-01-07 for Rust. read_entry may read from uninitialized memory locations.
{'CVE-2021-45684'}
2022-01-07T16:14:38Z
2022-01-06T22:18:35Z
CRITICAL
9.8
{'CWE-908'}
{'https://rustsec.org/advisories/RUSTSEC-2021-0086.html', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/flumedb/RUSTSEC-2021-0086.md', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45684', 'https://github.com/advisories/GHSA-p46c-w9m3-7qr2'}
null
GHSA
GHSA-ggjr-2f7v-vhq4
Authentication Bypass in Kiali
An authentication bypass vulnerability was found in Kiali in versions before 1.31.0 when the authentication strategy `OpenID` is used. When RBAC is enabled, Kiali assumes that some of the token validation is handled by the underlying cluster. When OpenID `implicit flow` is used with RBAC turned off, this token validation doesn't occur, and this allows a malicious user to bypass the authentication.
{'CVE-2021-20278'}
2021-06-03T21:52:23Z
2021-06-01T21:57:08Z
MODERATE
6.5
{'CWE-290'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=1937171', 'https://kiali.io/news/security-bulletins/kiali-security-002/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20278', 'https://github.com/advisories/GHSA-ggjr-2f7v-vhq4'}
null
GHSA
GHSA-hxm2-r34f-qmc5
Regular Expression Denial of Service in minimatch
Affected versions of `minimatch` are vulnerable to regular expression denial of service attacks when user input is passed into the `pattern` argument of `minimatch(path, pattern)`. ## Proof of Concept ``` var minimatch = require(“minimatch”); // utility function for generating long strings var genstr = function (len, chr) { var result = “”; for (i=0; i<=len; i++) { result = result + chr; } return result; } var exploit = “[!” + genstr(1000000, “\\”) + “A”; // minimatch exploit. console.log(“starting minimatch”); minimatch(“foo”, exploit); console.log(“finishing minimatch”); ``` ## Recommendation Update to version 3.0.2 or later.
{'CVE-2016-10540'}
2021-06-10T23:23:42Z
2018-10-09T00:40:41Z
HIGH
7.5
{'CWE-400'}
{'https://www.npmjs.com/advisories/118', 'https://github.com/advisories/GHSA-hxm2-r34f-qmc5', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10540', 'https://nodesecurity.io/advisories/118'}
null
GHSA
GHSA-m93v-9qjc-3g79
Context isolation bypass via leaked cross-context objects in Electron
### Impact Apps using `contextIsolation` are affected. This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions. ### Workarounds There are no app-side workarounds, you must update your Electron version to be protected. ### Fixed Versions * `9.0.0-beta.21` * `8.2.4` * `7.2.4` ### Non-Impacted Versions * `9.0.0-beta.*` ### For more information If you have any questions or comments about this advisory: * Email us at [[email protected]](mailto:[email protected])
{'CVE-2020-4076'}
2021-01-07T23:48:12Z
2020-07-07T00:01:07Z
HIGH
7.8
{'CWE-501'}
{'https://www.electronjs.org/releases/stable?page=3#release-notes-for-v824', 'https://github.com/electron/electron/security/advisories/GHSA-m93v-9qjc-3g79', 'https://github.com/advisories/GHSA-m93v-9qjc-3g79', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4076'}
null
GHSA
GHSA-wv26-rj8c-4r33
Moderate severity vulnerability that affects auth0-js
CSRF exists in the Auth0 authentication service through 14591 if the Legacy Lock API flag is enabled.
{'CVE-2018-6874'}
2021-09-21T21:53:19Z
2018-11-06T23:15:13Z
HIGH
8.8
{'CWE-352'}
{'https://auth0.com/docs/security/bulletins/cve-2018-6874', 'https://nvd.nist.gov/vuln/detail/CVE-2018-6874', 'http://www.securityfocus.com/bid/103695', 'https://github.com/advisories/GHSA-wv26-rj8c-4r33'}
null
GHSA
GHSA-hqc8-j86x-2764
Off-by-one error in simple-slab
An issue was discovered in the simple-slab crate before 0.3.3 for Rust. remove() has an off-by-one error, causing memory leakage and a drop of uninitialized memory.
{'CVE-2020-35893'}
2021-08-25T20:48:33Z
2021-08-25T20:48:33Z
HIGH
7.5
{'CWE-193'}
{'https://github.com/advisories/GHSA-hqc8-j86x-2764', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35893', 'https://github.com/nathansizemore/simple-slab/issues/2', 'https://rustsec.org/advisories/RUSTSEC-2020-0039.html'}
null
GHSA
GHSA-8w65-xjc5-9w79
Cross-Site Scripting in node-red
Versions of `node-red` prior to 0.20.8are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize the `name` field in new Flows, allowing attackers to execute arbitrary JavaScript in the victim's browser. ## Recommendation Upgrade to version 0.18.6 or later.
{'CVE-2019-15607'}
2021-01-08T20:32:09Z
2020-01-30T21:00:21Z
MODERATE
0
{'CWE-79'}
{'https://hackerone.com/reports/681986', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15607', 'https://github.com/advisories/GHSA-8w65-xjc5-9w79', 'https://www.npmjs.com/advisories/1456'}
null
GHSA
GHSA-qqxw-m5fj-f7gv
The pattern '/\domain.com' is not disallowed when redirecting, allowing for open redirect
### Impact An open redirect vulnerability has been found in `oauth2_proxy`. Anyone who uses `oauth2_proxy` may potentially be impacted. For a context [detectify] have an in depth blog post about the potential impact of an open redirect. Particularly see the OAuth section. **tl;dr**: People's authentication tokens could be silently harvested by an attacker. e.g: `facebook.com/oauth.php?clientid=123&state=abc&redirect_url=https://yourdomain.com/red.php?url%3dhttps://attacker.com/` ### Patches @sauyon found the issue, and has submitted a patch. ``` diff --git a/oauthproxy.go b/oauthproxy.go index 72ab580..f420df6 100644 --- a/oauthproxy.go +++ b/oauthproxy.go @@ -517,7 +517,7 @@ func (p *OAuthProxy) GetRedirect(req *http.Request) (redirect string, err error) // IsValidRedirect checks whether the redirect URL is whitelisted func (p *OAuthProxy) IsValidRedirect(redirect string) bool { switch { - case strings.HasPrefix(redirect, "/") && !strings.HasPrefix(redirect, "//"): + case strings.HasPrefix(redirect, "/") && !strings.HasPrefix(redirect, "//") && !strings.HasPrefix(redirect, "/\\"): return true case strings.HasPrefix(redirect, "http://") || strings.HasPrefix(redirect, "https://"): redirectURL, err := url.Parse(redirect) ``` This patch will be applied to the next release, which is scheduled for when this is publicly disclosed. ### Workarounds At this stage there is no work around.
{'CVE-2020-5233'}
2022-04-19T19:02:24Z
2021-12-20T18:02:38Z
MODERATE
5.9
{'CWE-601'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-5233', 'https://github.com/advisories/GHSA-qqxw-m5fj-f7gv', 'https://github.com/oauth2-proxy/oauth2_proxy/releases/tag/v5.0.0', 'https://github.com/oauth2-proxy/oauth2-proxy/security/advisories/GHSA-qqxw-m5fj-f7gv', 'https://github.com/oauth2-proxy/oauth2_proxy/commit/a316f8a06f3c0ca2b5fc5fa18a91781b313607b2', 'https://blog.detectify.com/2019/05/16/the-real-impact-of-an-open-redirect/'}
null
GHSA
GHSA-553q-hpvp-q8pc
Server-Side Request Forgery in snipe/snipe-it
Admin users on the external network can perform blind POST-based SSRF (issue requests on behalf of the server into the internal network) via the Slack Integration. This vulnerability is capable of port-scanning of the internal network, issue POST requests to web servers on the internal network which can be escalated to higher-impact.
{'CVE-2021-4075'}
2021-12-10T20:22:15Z
2021-12-10T20:22:15Z
HIGH
7.2
{'CWE-918'}
{'https://github.com/advisories/GHSA-553q-hpvp-q8pc', 'https://github.com/snipe/snipe-it/commit/4612b9e711b3ff5d2bcddbec5b18866d25f8e34e', 'https://huntr.dev/bounties/4386fd8b-8c80-42bb-87b8-b506c46597de', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4075'}
null
GHSA
GHSA-4jqc-8m5r-9rpr
Prototype Pollution in set-value
This affects the package `set-value` before 2.0.1, and starting with 3.0.0 but prior to 4.0.1. A type confusion vulnerability can lead to a bypass of CVE-2019-10747 when the user-provided keys used in the path parameter are arrays.
{'CVE-2021-23440'}
2022-03-30T21:18:08Z
2021-09-13T20:09:36Z
HIGH
7.3
{'CWE-843', 'CWE-1321'}
{'https://github.com/jonschlinkert/set-value/pull/33', 'https://snyk.io/vuln/SNYK-JS-SETVALUE-1540541', 'https://github.com/advisories/GHSA-4jqc-8m5r-9rpr', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1584212', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23440', 'https://www.huntr.dev/bounties/2eae1159-01de-4f82-a177-7478a408c4a2/', 'https://github.com/jonschlinkert/set-value/commit/7cf8073bb06bf0c15e08475f9f952823b4576452', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
null
GHSA
GHSA-cpqf-3c3r-c9g2
Cobbler before 3.3.0 allows log poisoning
Cobbler before 3.3.0 allows log poisoning, and resultant Remote Code Execution, via an XMLRPC method that logs to the logfile for template injection.
{'CVE-2021-40323'}
2021-10-13T17:27:09Z
2021-10-05T17:53:20Z
HIGH
0
{'CWE-94'}
{'https://github.com/cobbler/cobbler/commit/d8f60bbf14a838c8c8a1dba98086b223e35fe70a', 'https://github.com/advisories/GHSA-cpqf-3c3r-c9g2', 'https://github.com/cobbler/cobbler/releases/tag/v3.3.0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40323'}
null
GHSA
GHSA-gjq4-69wj-p6pr
Path traversal in pimcore
The application doesn't perform a check/filter against the value of "importFile" parameter at endpoint "/admin/translation/import". After the API is executed, PHP unlink function will proceed to delete the file.
{'CVE-2022-0665'}
2022-03-03T13:27:26Z
2022-02-23T00:00:59Z
MODERATE
6.5
{'CWE-22'}
{'https://huntr.dev/bounties/423df64d-c591-4ad9-bf1c-411bcbc06ba3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0665', 'https://github.com/pimcore/pimcore/commit/28945649a6234ccaa8c94c6cd83d1954603baf3e', 'https://github.com/advisories/GHSA-gjq4-69wj-p6pr'}
null
GHSA
GHSA-83r3-c79w-f6wc
High severity vulnerability that affects org.apache.hive:hive, org.apache.hive:hive-exec, and org.apache.hive:hive-service
The authorization framework in Apache Hive 1.0.0, 1.0.1, 1.1.0, 1.1.1, 1.2.0 and 1.2.1, on clusters protected by Ranger and SqlStdHiveAuthorization, allows attackers to bypass intended parent table access restrictions via unspecified partition-level operations.
{'CVE-2015-7521'}
2021-09-03T22:28:50Z
2018-11-21T22:23:49Z
HIGH
8.3
{'CWE-287'}
{'http://packetstormsecurity.com/files/135836/Apache-Hive-Authorization-Bypass.html', 'http://www.openwall.com/lists/oss-security/2016/01/28/12', 'http://mail-archives.apache.org/mod_mbox/hive-user/201601.mbox/%3C20160128205008.2154F185EB%40minotaur.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7521', 'https://github.com/advisories/GHSA-83r3-c79w-f6wc', 'http://www.securityfocus.com/archive/1/537549/100/0/threaded'}
null
GHSA
GHSA-vh95-rmgr-6w4m
Prototype Pollution in minimist
Affected versions of `minimist` are vulnerable to prototype pollution. Arguments are not properly sanitized, allowing an attacker to modify the prototype of `Object`, causing the addition or modification of an existing property that will exist on all objects. Parsing the argument `--__proto__.y=Polluted` adds a `y` property with value `Polluted` to all objects. The argument `--__proto__=Polluted` raises and uncaught error and crashes the application. This is exploitable if attackers have control over the arguments being passed to `minimist`. ## Recommendation Upgrade to versions 0.2.1, 1.2.3 or later.
{'CVE-2020-7598'}
2022-04-26T21:01:40Z
2020-04-03T21:48:32Z
MODERATE
5.6
{'CWE-1321'}
{'https://www.npmjs.com/advisories/1179', 'https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94', 'https://github.com/advisories/GHSA-vh95-rmgr-6w4m', 'https://github.com/substack/minimist/commit/38a4d1caead72ef99e824bb420a2528eec03d9ab', 'http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html', 'https://snyk.io/vuln/SNYK-JS-MINIMIST-559764', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7598', 'https://github.com/substack/minimist/commit/4cf1354839cb972e38496d35e12f806eea92c11f#diff-a1e0ee62c91705696ddb71aa30ad4f95'}
null
GHSA
GHSA-h698-r4hm-w94p
Validation Bypass in paypal-ipn
Versions 2.x.x and earlier of `paypal-ipn` are affected by a validation bypass vulnerability. paypal-ipn uses the `test_ipn` parameter (which is set by the PayPal IPN simulator) to determine if it should use the production PayPal site or the sandbox. A motivated attacker could craft a request string using the simulator to fool the application into entering the sandbox mode, potentially allowing purchases without valid payment. ## Recommendation Upgrade to version 3.0.0 or later.
{'CVE-2014-10067'}
2021-09-23T20:58:30Z
2020-08-31T22:54:56Z
MODERATE
5.9
{'CWE-287'}
{'https://www.npmjs.com/advisories/26', 'https://nodesecurity.io/advisories/26', 'https://github.com/andzdroid/paypal-ipn/issues/11', 'https://nvd.nist.gov/vuln/detail/CVE-2014-10067', 'https://github.com/advisories/GHSA-h698-r4hm-w94p'}
null
GHSA
GHSA-j67m-jg9p-ppg4
Malicious Package in ns-sha3
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-10-01T16:10:46Z
2020-09-03T23:18:05Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1298', 'https://github.com/advisories/GHSA-j67m-jg9p-ppg4'}
null
GHSA
GHSA-g6wq-qcwm-j5g2
Regular Expression Denial of Service in websocket-extensions (RubyGem)
### Impact The ReDoS flaw allows an attacker to exhaust the server's capacity to process incoming requests by sending a WebSocket handshake request containing a header of the following form: Sec-WebSocket-Extensions: a; b="\c\c\c\c\c\c\c\c\c\c ... That is, a header containing an unclosed string parameter value whose content is a repeating two-byte sequence of a backslash and some other character. The parser takes exponential time to reject this header as invalid, and this will block the processing of any other work on the same thread. Thus if you are running a single-threaded server, such a request can render your service completely unavailable. ### Patches Users should upgrade to version 0.1.5. ### Workarounds There are no known work-arounds other than disabling any public-facing WebSocket functionality you are operating. ### References - https://blog.jcoglan.com/2020/06/02/redos-vulnerability-in-websocket-extensions/
{'CVE-2020-7663'}
2021-08-25T21:51:51Z
2020-06-05T14:21:29Z
HIGH
8.2
{'CWE-400'}
{'https://github.com/faye/websocket-extensions-ruby/commit/aa156a439da681361ed6f53f1a8131892418838b', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7663', 'https://blog.jcoglan.com/2020/06/02/redos-vulnerability-in-websocket-extensions', 'https://snyk.io/vuln/SNYK-RUBY-WEBSOCKETEXTENSIONS-570830', 'https://github.com/faye/websocket-extensions-ruby/security/advisories/GHSA-g6wq-qcwm-j5g2', 'https://lists.debian.org/debian-lts-announce/2020/08/msg00031.html', 'https://github.com/advisories/GHSA-g6wq-qcwm-j5g2', 'https://usn.ubuntu.com/4502-1/'}
null
GHSA
GHSA-3f8r-4qwm-r7jf
Improper Authentication in Apache Traffic Control
Improper authentication is possible in Apache Traffic Control versions 3.0.0 and 3.0.1 if LDAP is enabled for login in the Traffic Ops API component. Given a username for a user that can be authenticated via LDAP, it is possible to improperly authenticate as that user without that user's correct password.
{'CVE-2019-12405'}
2021-10-13T17:25:42Z
2021-05-18T15:39:16Z
CRITICAL
9.8
{'CWE-287'}
{'https://github.com/advisories/GHSA-3f8r-4qwm-r7jf', 'https://support.f5.com/csp/article/K84141859?utm_source=f5support&amp;utm_medium=RSS', 'https://github.com/apache/trafficcontrol/commit/f780aff77a52d52a37b4d1cc3e8e801c0b557356', 'https://lists.apache.org/thread.html/r3c675031ac220b5eae64a9c84a03ee60045c6045738607dca4a96cb8@%3Ccommits.trafficcontrol.apache.org%3E', 'https://lists.apache.org/thread.html/e128e9d382f3b0d074e2b597ac58e1d92139394509d81ddbc9e3700e@%3Cusers.trafficcontrol.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12405', 'https://support.f5.com/csp/article/K84141859', 'https://lists.apache.org/thread.html/rc8bfd7d4f71d61e9193efcd4699eccbab3c202ec1d75ed9d502f08bf@%3Ccommits.trafficcontrol.apache.org%3E'}
null
GHSA
GHSA-2gjg-5x33-mmp2
Path Traversal in localhost-now
Versions of `localhost-now` before 1.0.2 are vulnerable to path traversal. This allows a remote attacker to read the content of an arbitrary file. ## Recommendation Update to version 1.0.2 or later.
{'CVE-2018-3729'}
2021-01-08T20:08:59Z
2018-07-25T22:44:05Z
HIGH
0
{'CWE-22'}
{'https://hackerone.com/reports/312889', 'https://github.com/advisories/GHSA-2gjg-5x33-mmp2', 'https://github.com/DCKT/localhost-now/commit/30b004c7f145d677df8800a106c2edc982313995#diff-b9cfc7f2cdf78a7f4b91a753d10865a2', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3729', 'https://www.npmjs.com/advisories/582'}
null
GHSA
GHSA-62jx-8vmh-4mcw
Path trav in tar
An issue was discovered in the tar crate before 0.4.36 for Rust. When symlinks are present in a TAR archive, extraction can create arbitrary directories via .. traversal.
{'CVE-2021-38511'}
2021-08-25T20:58:23Z
2021-08-25T20:58:23Z
HIGH
7.5
{'CWE-22'}
{'https://github.com/advisories/GHSA-62jx-8vmh-4mcw', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38511', 'https://rustsec.org/advisories/RUSTSEC-2021-0080.html', 'https://github.com/alexcrichton/tar-rs/issues/238', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/tar/RUSTSEC-2021-0080.md'}
null
GHSA
GHSA-gv26-jpj9-c8gq
Incomplete validation in `SparseSparseMinimum`
### Impact Incomplete validation in `SparseAdd` results in allowing attackers to exploit undefined behavior (dereferencing null pointers) as well as write outside of bounds of heap allocated data: ```python import tensorflow as tf a_indices = tf.ones([45, 92], dtype=tf.int64) a_values = tf.ones([45], dtype=tf.int64) a_shape = tf.ones([1], dtype=tf.int64) b_indices = tf.ones([1, 1], dtype=tf.int64) b_values = tf.ones([1], dtype=tf.int64) b_shape = tf.ones([1], dtype=tf.int64) tf.raw_ops.SparseSparseMinimum(a_indices=a_indices, a_values=a_values, a_shape=a_shape, b_indices=b_indices, b_values=b_values, b_shape=b_shape) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/656e7673b14acd7835dc778867f84916c6d1cac2/tensorflow/core/kernels/sparse_sparse_binary_op_shared.cc) has a large set of validation for the two sparse tensor inputs (6 tensors in total), but does not validate that the tensors are not empty or that the second dimension of `*_indices` matches the size of corresponding `*_shape`. This allows attackers to send tensor triples that represent invalid sparse tensors to abuse code assumptions that are not protected by validation. ### Patches We have patched the issue in GitHub commit [ba6822bd7b7324ba201a28b2f278c29a98edbef2](https://github.com/tensorflow/tensorflow/commit/ba6822bd7b7324ba201a28b2f278c29a98edbef2) followed by GitHub commit [f6fde895ef9c77d848061c0517f19d0ec2682f3a](https://github.com/tensorflow/tensorflow/commit/f6fde895ef9c77d848061c0517f19d0ec2682f3a). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
{'CVE-2021-29607'}
2022-03-21T20:38:04Z
2022-03-18T17:52:25Z
MODERATE
5.3
{'CWE-754'}
{'https://github.com/advisories/GHSA-gv26-jpj9-c8gq', 'https://github.com/tensorflow/tensorflow/commit/ba6822bd7b7324ba201a28b2f278c29a98edbef2', 'https://github.com/tensorflow/tensorflow/commit/f6fde895ef9c77d848061c0517f19d0ec2682f3a', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29607', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gv26-jpj9-c8gq'}
null
GHSA
GHSA-x5pg-88wf-qq4p
Regular Expression Denial of Service in marked
Affected versions of `marked` are vulnerable to a regular expression denial of service. The amplification in this vulnerability is significant, with 1,000 characters resulting in the event loop being blocked for around 6 seconds. ## Recommendation Update to version 0.3.9 or later.
{'CVE-2017-16114'}
2021-01-08T00:47:39Z
2018-07-24T20:10:52Z
HIGH
0
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16114', 'https://github.com/chjj/marked/issues/937', 'https://nodesecurity.io/advisories/531', 'https://github.com/advisories/GHSA-x5pg-88wf-qq4p', 'https://www.npmjs.com/advisories/531'}
null
GHSA
GHSA-m69q-pmxg-vqch
Directory Traversal in cypserver
Affected versions of `cypserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16191'}
2021-01-14T15:40:59Z
2020-09-01T18:26:00Z
HIGH
0
{'CWE-22'}
{'https://nodesecurity.io/advisories/440', 'https://github.com/advisories/GHSA-m69q-pmxg-vqch', 'https://www.npmjs.com/advisories/440', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16191', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/cypserver'}
null
GHSA
GHSA-m7p8-9w66-9frm
Moderate severity vulnerability that affects net-ldap
The Net::LDAP (aka net-ldap) gem before 0.16.0 for Ruby has Missing SSL Certificate Validation.
{'CVE-2017-17718'}
2021-09-15T18:19:26Z
2018-01-06T01:11:34Z
MODERATE
5.9
{'CWE-295'}
{'https://github.com/ruby-ldap/ruby-net-ldap/issues/258', 'http://openwall.com/lists/oss-security/2017/12/17/10', 'https://github.com/ruby-ldap/ruby-net-ldap/pull/279', 'https://nvd.nist.gov/vuln/detail/CVE-2017-17718', 'https://github.com/advisories/GHSA-m7p8-9w66-9frm'}
null
GHSA
GHSA-7xf6-cpxm-5mx9
Malicious Package in bufner-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T21:35:53Z
2020-09-03T22:27:18Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-7xf6-cpxm-5mx9', 'https://www.npmjs.com/advisories/1264'}
null
GHSA
GHSA-73xv-w5gp-frxh
Logic error in Legion of the Bouncy Castle BC Java
An issue was discovered in Legion of the Bouncy Castle BC Java 1.65 and 1.66. The OpenBSDBCrypt.checkPassword utility method compared incorrect data when checking the password, allowing incorrect passwords to indicate they were matching with previously hashed ones that were different.
{'CVE-2020-28052'}
2022-04-22T17:24:18Z
2021-04-30T16:14:15Z
HIGH
8.1
{'CWE-670'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r2ddabd06d94b60cfb0141e4abb23201c628ab925e30742f61a04d013@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r77af3ac7c3bfbd5454546e13faf7aec21d627bdcf36c9ca240436b94@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r167dbc42ef7c59802c2ca1ac14735ef9cf687c25208229993d6206fe@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/rf9abfc0223747a56694825c050cc6b66627a293a32ea926b3de22402@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r8c36ba34e80e05eecb1f80071cc834d705616f315b634ec0c7d8f42e@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/rdfd2901b8b697a3f6e2c9c6ecc688fd90d7f881937affb5144d61d6e@%3Ccommits.druid.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28052', 'https://lists.apache.org/thread.html/r175f5a25d100dbe2b1bd3459b3ce882a84c3ff91b120ed4ff2d57b53@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r4e1619cfefcd031fac62064a3858f5c9229eef907bd5d8ef14c594fc@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/rddd2237b8636a48d573869006ee809262525efb2b6ffa6eff50d2a2d@%3Cjira.kafka.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r37d332c0bf772f4982d1fdeeb2f88dd71dab6451213e69e43734eadc@%3Ccommits.pulsar.apache.org%3E', 'https://github.com/bcgit/bc-java/wiki/CVE-2020-28052', 'https://lists.apache.org/thread.html/rcd37d9214b08067a2e8f2b5b4fd123a1f8cb6008698d11ef44028c21@%3Cissues.karaf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r954d80fd18e9dafef6e813963eb7e08c228151c2b6268ecd63b35d1f@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r30a139c165b3da6e0d5536434ab1550534011b1fdfcd2f5d95892c5b@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/rfc0db1f3c375087e69a239f9284ded72d04fbb55849eadde58fa9dc2@%3Cissues.karaf.apache.org%3E', 'https://www.bouncycastle.org/releasenotes.html', 'https://www.synopsys.com/blogs/software-security/cve-2020-28052-bouncy-castle/', 'https://github.com/advisories/GHSA-73xv-w5gp-frxh', 'https://lists.apache.org/thread.html/rc9e441c1576bdc4375d32526d5cf457226928e9c87b9f54ded26271c@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r25d53acd06f29244b8a103781b0339c5e7efee9099a4d52f0c230e4a@%3Ccommits.druid.apache.org%3E', 'https://github.com/bcgit/bc-java/commit/97578f9b7ed277e6ecb58834e85e3d18385a4219', 'https://lists.apache.org/thread.html/rdcbad6d8ce72c79827ed8c635f9a62dd919bb21c94a0b64cab2efc31@%3Cissues.karaf.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-r7c9-c69m-rph8
Code Injection in PHPUnit
Util/PHP/eval-stdin.php in PHPUnit starting with 4.8.19 and before 4.8.28, as well as 5.x before 5.6.3, allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a `<?php ` substring, as demonstrated by an attack on a site with an exposed /vendor folder, i.e., external access to the /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php URI.
{'CVE-2017-9841'}
2022-04-19T20:16:50Z
2022-03-26T00:19:30Z
CRITICAL
9.8
{'CWE-94'}
{'http://www.securityfocus.com/bid/101798', 'https://github.com/sebastianbergmann/phpunit/pull/1955', 'https://security.gentoo.org/glsa/201711-15', 'https://nvd.nist.gov/vuln/detail/CVE-2017-9841', 'https://github.com/sebastianbergmann/phpunit/pull/1956', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'http://www.securitytracker.com/id/1039812', 'https://github.com/sebastianbergmann/phpunit/commit/3aaddb1c5bd9b9b8d070b4cf120e71c36fd08412', 'http://web.archive.org/web/20170701212357/http://phpunit.vulnbusters.com/', 'https://github.com/advisories/GHSA-r7c9-c69m-rph8', 'https://github.com/sebastianbergmann/phpunit/commit/284a69fb88a2d0845d23f42974a583d8f59bf5a5'}
null
GHSA
GHSA-hxf5-mg84-pj4m
Moderate severity vulnerability that affects moment
Withdrawn, accidental duplicate publish. The duration function in the moment package before 2.11.2 for Node.js allows remote attackers to cause a denial of service (CPU consumption) via a long string, aka a "regular expression Denial of Service (ReDoS)."
null
2021-12-02T23:08:18Z
2018-07-31T23:03:17Z
MODERATE
0
null
{'https://nvd.nist.gov/vuln/detail/CVE-2016-4055', 'https://github.com/advisories/GHSA-hxf5-mg84-pj4m'}
null
GHSA
GHSA-jh2m-j8pp-55rc
Prototype Pollution in gedi
All versions of package gedi up to and including version 1.6.3 are vulnerable to Prototype Pollution via the set function.
{'CVE-2020-7727'}
2021-07-29T22:08:46Z
2021-05-06T18:12:47Z
CRITICAL
9.8
{'CWE-1321'}
{'https://snyk.io/vuln/SNYK-JS-GEDI-598803', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7727', 'https://github.com/advisories/GHSA-jh2m-j8pp-55rc'}
null
GHSA
GHSA-2j55-pcw5-x4h2
Critical severity vulnerability that affects active-support
The `active-support` ruby gem gem is malware and duplicates the official `activesupport` (no hyphen) gem, but adds a compiled extension. The extension attempts to resolve a base64 encoded domain (29faea63.planfhntage.de), downloads a payload, and executes. This trojan horse gem could allow a remote attacker to execute arbitrary code on the system, caused by containing a malicious backdoor. An attacker could exploit this vulnerability to execute arbitrary code on the system. No version of this gem should be considered safe.
{'CVE-2018-3779'}
2021-01-08T20:07:51Z
2018-08-13T15:02:49Z
CRITICAL
0
{'CWE-77'}
{'https://github.com/advisories/GHSA-2j55-pcw5-x4h2', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3779', 'https://hackerone.com/reports/392311'}
null
GHSA
GHSA-8j3f-mhq8-gmh4
Reject unauthorized access with GitHub PATs
### Impact _What kind of vulnerability is it? Who is impacted?_ The additional auth mechanism added within https://github.com/go-vela/server/pull/246 enables some malicious user to obtain secrets utilizing the injected credentials within the `~/.netrc` file. Steps to reproduce 1. Create Vela server 2. Login to Vela UI 3. Promote yourself to Vela administrator - `UPDATE users SET admin = 't' WHERE name = <username>` 4. Activate repository within Vela 5. Add `.vela.yml` to the repository with the following content ```yaml version: "1" steps: - name: steal image: alpine commands: - cat ~/.netrc ``` 1. Look at build logs to find the following content ``` $ cat ~/.netrc machine <GITHUB URL> login x-oauth-basic password <token> ``` 1. Copy the password to be utilized in some later step 1. Add secret(s) to activated repo 1. Copy the following script into `main.go` ```golang package main import ( "fmt" "github.com/go-vela/sdk-go/vela" "os" ) func main() { // create client to connect to vela client, err := vela.NewClient(os.Getenv("VELA_SERVER_ADDR"), "vela", nil) if err != nil { panic(err) } // add PAT to request client.Authentication.SetPersonalAccessTokenAuth(os.Getenv("VELA_TOKEN")) secrets, _, err := client.Admin.Secret.GetAll(&vela.ListOptions{}) if err != nil { panic(err) } for _, secret := range *secrets { fmt.Println(*secret.Name) fmt.Println(*secret.Value) } } ``` 1. Run the `main.go` with environment specific settings - `VELA_SERVER_ADDR=http://localhost:8080 VELA_TOKEN=<token obtained previously> go run main.go` The previously posted script could be updated to utilize any API endpoint(s) the activated user has access against. ### Patches _Has the problem been patched? What versions should users upgrade to?_ * Upgrade to `v0.7.5` or later ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ * No known workarounds ### References _Are there any links users can visit to find out more?_ * https://github.com/go-vela/server/pull/246 * https://docs.github.com/en/[email protected]/rest/reference/apps#check-a-token ### For more information If you have any questions or comments about this advisory * Email us at [[email protected]](mailto:[email protected])
{'CVE-2021-21432'}
2022-04-19T19:02:53Z
2022-02-15T01:57:18Z
HIGH
7.5
{'CWE-863', 'CWE-285'}
{'https://github.com/go-vela/server/security/advisories/GHSA-8j3f-mhq8-gmh4', 'https://github.com/advisories/GHSA-8j3f-mhq8-gmh4', 'https://pkg.go.dev/github.com/go-vela/server', 'https://github.com/go-vela/server/commit/cb4352918b8ecace9fe969b90404d337b0744d46', 'https://github.com/go-vela/server/pull/337', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21432', 'https://github.com/go-vela/server/releases/tag/v0.7.5'}
null
GHSA
GHSA-f3mq-99jr-ww4r
Multiple mutable pointers in cgc
Affected versions of this crate have the following issues: 1. `Ptr` implements `Send` and `Sync` for all types, this can lead to data races by sending non-thread safe types across threads. 2. `Ptr::get` violates mutable alias rules by returning multiple mutable references to the same object. 3. `Ptr::write` uses non-atomic writes to the underlying pointer. This means that when used across threads it can lead to data races.
{'CVE-2020-36467'}
2021-08-25T20:56:16Z
2021-08-25T20:56:16Z
MODERATE
5.9
{'CWE-657'}
{'https://rustsec.org/advisories/RUSTSEC-2020-0148.html', 'https://github.com/playXE/cgc/issues/5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36467', 'https://github.com/advisories/GHSA-f3mq-99jr-ww4r'}
null
GHSA
GHSA-c36v-fmgq-m8hx
Prototype Pollution in immer
immer is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
{'CVE-2021-3757'}
2021-09-13T20:32:41Z
2021-09-07T22:57:14Z
HIGH
7.5
{'CWE-1321', 'CWE-915'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3757', 'https://huntr.dev/bounties/23d38099-71cd-42ed-a77a-71e68094adfa', 'https://github.com/advisories/GHSA-c36v-fmgq-m8hx', 'https://github.com/immerjs/immer/commit/fa671e55ee9bd42ae08cc239102b665a23958237'}
null
GHSA
GHSA-vwhc-pww7-72x6
Code Injection in total.js
Total.js framework (npm package total.js) is a framework for Node.js platfrom written in pure JavaScript similar to PHP's Laravel or Python's Django or ASP.NET MVC. In total.js framework before version 3.4.9, calling the utils.set function with user-controlled values leads to code-injection. This can cause a variety of impacts that include arbitrary code execution. This is fixed in version 3.4.9.
{'CVE-2021-32831'}
2021-09-01T18:24:05Z
2021-09-01T18:24:05Z
HIGH
7.5
{'CWE-94'}
{'https://github.com/totaljs/framework/blob/e644167d5378afdc45cb0156190349b2c07ef235/changes.txt#L11', 'https://securitylab.github.com/advisories/GHSL-2021-066-totaljs-totaljs/', 'https://github.com/advisories/GHSA-vwhc-pww7-72x6', 'https://www.npmjs.com/package/total.js', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32831', 'https://github.com/totaljs/framework/commit/887b0fa9e162ef7a2dd9cec20a5ca122726373b3'}
null
GHSA
GHSA-qgp4-5qx6-548g
Cross-site scripting (XSS) from unsanitized uploaded SVG files in Kirby
### Impact An editor with write access to the Kirby Panel can upload an SVG or XML file that contains harmful content like `<script>` tags. The direct link to that file can be sent to other users or visitors of the site. If the victim opens that link in a browser where they are logged in to Kirby, the script will run and can for example trigger requests to Kirby's API with the permissions of the victim. This vulnerability is critical if you might have potential attackers in your group of authenticated Panel users. They can escalate their privileges if they get access to the Panel session of an admin user. Depending on your site, other JavaScript-powered attacks are possible. Visitors without Panel access can only use this attack vector if your site allows SVG or XML file uploads in frontend forms and you don't already validate or sanitize uploaded SVG or XML files. The attack requires user interaction by another user or visitor and *cannot* be automated. ### Patches #### Uploads in the Panel The problem has been patched in [Kirby 3.5.4](https://github.com/getkirby/kirby/releases/tag/3.5.4) by validating uploaded SVG and XML files and rejecting potentially harmful files. Please update to this or a [later version](https://github.com/getkirby/kirby/releases/) to fix the vulnerability. #### Frontend upload forms Frontend upload forms need to be patched separately depending on how they store the uploaded file(s). If you use `File::create()`, you are protected by updating to Kirby 3.5.4+. #### Validate existing files Already uploaded files are *not* automatically validated again. If you are not sure if you have been impacted by this vulnerability in the past, we recommend to run all site files through the validator classes after updating to Kirby 3.5.4. You can use the following test script by pasting it into a template or uploading it to your web root: ```php <?php @include_once __DIR__ . '/kirby/bootstrap.php'; if (version_compare(kirby()->version(), '3.5.4', '<') === true) { die('This script requires Kirby 3.5.4+.'); } $objects = [ // the site itself site(), // all pages and drafts ...site()->index(true)->values(), // all users ...kirby()->users()->values() ]; $errors = false; foreach ($objects as $object) { foreach ($object->files() as $file) { try { // validate the contents lazily // (if a validator exists) $file->validateContents(true); } catch (\Kirby\Exception\InvalidArgumentException $e) { echo $file->id() . ': ' . $e->getMessage() . "<br>\n"; $errors = true; } } } if ($errors === false) { echo 'No validation errors found.'; } ``` You only need to run this validator script once as future uploads will automatically be validated. If the script prints "No validation errors found", you have not been impacted by the vulnerability so far. Errors that it lists may or may not be critical as our validator classes also catch files with an invalid data structure or less harmful attacks like the ["billion laughs" denial-of-service attack](https://en.wikipedia.org/wiki/Billion_laughs_attack) or the usage of external sources. We recommend to review and fix each listed error manually until the script no longer finds any validation errors. **Please delete the script again after you have used it.** ### Workarounds If you cannot update to Kirby 3.5.4, you can disable the upload of SVG and XML files in your [file blueprints](https://getkirby.com/docs/reference/panel/blueprints/file#accept) and validate or replace your already uploaded files once. ### Credits Thanks to @sreenathr10 for reporting the problem.
{'CVE-2021-29460'}
2022-04-19T19:02:55Z
2021-04-30T17:30:06Z
HIGH
7.6
{'CWE-79'}
{'https://github.com/advisories/GHSA-qgp4-5qx6-548g', 'http://packetstormsecurity.com/files/162359/Kirby-CMS-3.5.3.1-Cross-Site-Scripting.html', 'https://github.com/getkirby/kirby/releases/tag/3.5.4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29460', 'https://github.com/getkirby/kirby/security/advisories/GHSA-qgp4-5qx6-548g'}
null
GHSA
GHSA-73cq-fhp3-8rpw
Moderate severity vulnerability that affects org.restlet.jse:org.restlet
Restlet Framework 2.1.x before 2.1.7 and 2.x.x before 2.2 RC1, when using XMLRepresentation or XML serializers, allows attackers to cause a denial of service via an XML Entity Expansion (XEE) attack.
{'CVE-2014-1868'}
2021-09-02T19:18:13Z
2018-10-17T00:04:53Z
MODERATE
0
{'CWE-776'}
{'https://github.com/advisories/GHSA-73cq-fhp3-8rpw', 'https://github.com/restlet/restlet-framework-java/wiki/XEE-security-enhancements', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/91181', 'http://secunia.com/advisories/56940', 'https://nvd.nist.gov/vuln/detail/CVE-2014-1868'}
null
GHSA
GHSA-7xfp-9c55-5vqj
Remote Memory Exposure in request
Affected versions of `request` will disclose local system memory to remote systems in certain circumstances. When a multipart request is made, and the type of `body` is `number`, then a buffer of that size will be allocated and sent to the remote server as the body. ## Proof of Concept ``` var request = require('request'); var http = require('http'); var serveFunction = function (req, res){ req.on('data', function (data) { console.log(data) }); res.end(); }; var server = http.createServer(serveFunction); server.listen(8000); request({ method: "POST", uri: 'http://localhost:8000', multipart: [{body:500}] },function(err,res,body){}); ``` ## Recommendation Update to version 2.68.0 or later
{'CVE-2017-16026'}
2021-01-08T19:13:46Z
2018-11-09T17:44:01Z
MODERATE
0
{'CWE-201'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16026', 'https://github.com/request/request/pull/2018', 'https://github.com/advisories/GHSA-7xfp-9c55-5vqj', 'https://github.com/request/request/issues/1904', 'https://www.npmjs.com/advisories/309', 'https://nodesecurity.io/advisories/309'}
null
GHSA
GHSA-959q-32g8-vvp7
Moderate severity vulnerability that affects org.keycloak:keycloak-core
It was found that keycloak before 3.4.2 final would permit misuse of a client-side /etc/hosts entry to spoof a URL in a password reset request. An attacker could use this flaw to craft a malicious password reset request and gain a valid reset token, leading to information disclosure or further attacks.
{'CVE-2017-12161'}
2021-01-08T19:05:50Z
2018-10-18T16:50:05Z
MODERATE
0
{'CWE-602'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=1484564', 'https://github.com/advisories/GHSA-959q-32g8-vvp7', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12161', 'https://github.com/keycloak/keycloak-documentation/pull/268/commits/a2b58aadee42af2c375b72e86dffc2cf23cc3770'}
null
GHSA
GHSA-m6w8-fq7v-ph4m
GovernorCompatibilityBravo incorrect ABI encoding may lead to unexpected behavior
### Impact The `GovernorCompatibilityBravo` module may lead to the creation of governance proposals that execute function calls with incorrect arguments due to bad ABI encoding. This happens if the proposal is created using explicit function signatures, e.g. a proposal to invoke the function `foo(uint256)` is created as `propose([target], [0], ["foo(uint256)"], ["0x00..01"])`. If the function selector is provided as part of the encoded proposal data the issue is not present, e.g. the same proposal is created as `propose([target], [0], ["0x2fbebd3800..01"])`, where `2fbebd38` is the function selector. We've assessed the instances of this contract found on chain, and did not find any occurrence of this bug in the past. Proposal creation through Tally or OpenZeppelin Defender is not affected. The core `Governor` contract on its own is not affected. ### Patches A fix is included in version v4.4.2 of `@openzeppelin/contracts` and `@openzeppelin/contracts-upgradeable`. ### Workarounds Do not create proposals using explicit function signatures. Instead, use the `propose` function without the `signatures` argument, and create the proposal using the fully ABI-encoded function call including the function selector in the `calldatas` argument as explained above. ### References https://github.com/OpenZeppelin/openzeppelin-contracts/issues/3099 ### Credits This issue was identified and reported by @GeraldHost. ### For more information If you have any questions, comments, or need assistance regarding this advisory, email us at [email protected]. To submit security reports please use [our bug bounty on Immunefi](https://immunefi.com/bounty/openzeppelin/).
null
2022-04-19T19:03:20Z
2022-01-13T16:09:36Z
MODERATE
0
null
{'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-m6w8-fq7v-ph4m', 'https://github.com/advisories/GHSA-m6w8-fq7v-ph4m'}
null
GHSA
GHSA-vcg5-9xw6-r56c
Malicious Package in logsymbles
Version 2.2.0 of `logsymbles` contains malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opens a backdoor. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T21:55:56Z
2020-09-02T21:40:49Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-vcg5-9xw6-r56c', 'https://www.npmjs.com/advisories/908'}
null
GHSA
GHSA-6mqq-8r44-vmjc
Low severity vulnerability that affects org.apache.spark:spark-core_2.10 and org.apache.spark:spark-core_2.11
In Apache Spark 1.0.0 to 2.1.2, 2.2.0 to 2.2.1, and 2.3.0, when using PySpark or SparkR, it's possible for a different local user to connect to the Spark application and impersonate the user running the Spark application.
{'CVE-2018-1334'}
2021-09-02T18:14:47Z
2019-03-14T15:41:04Z
MODERATE
4.7
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1334', 'https://spark.apache.org/security.html#CVE-2018-1334', 'https://lists.apache.org/thread.html/4d6d210e319a501b740293daaeeeadb51927111fb8261a3e4cd60060@%3Cdev.spark.apache.org%3E', 'https://github.com/advisories/GHSA-6mqq-8r44-vmjc'}
null
GHSA
GHSA-h9ph-jcgh-gf69
Cross-site Scripting in Limesurvey
The "File upload question" functionality in LimeSurvey 3.x-LTS through 3.27.18 allows XSS in assets/scripts/modaldialog.js and assets/scripts/uploader.js.
{'CVE-2021-42112'}
2021-11-17T21:26:06Z
2021-10-12T16:40:28Z
MODERATE
6.1
{'CWE-79'}
{'https://www.on-x.com/sites/default/files/on-x_-_security_advisory_-_limesurvey_-_cve-2021-42112.pdf', 'https://github.com/LimeSurvey/LimeSurvey/pull/2044', 'https://nvd.nist.gov/vuln/detail/CVE-2021-42112', 'https://github.com/advisories/GHSA-h9ph-jcgh-gf69', 'https://github.com/LimeSurvey/LimeSurvey/commit/d56619a50cfd191bbffd0adb660638a5e438070d', 'https://bugs.limesurvey.org/view.php?id=17562'}
null
GHSA
GHSA-qgm6-9472-pwq7
Integer Overflow in openssl-src
Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).
{'CVE-2021-23840'}
2022-04-25T20:25:41Z
2021-08-25T20:52:19Z
HIGH
7.5
{'CWE-190'}
{'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf', 'https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E', 'https://www.tenable.com/security/tns-2021-03', 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://rustsec.org/advisories/RUSTSEC-2021-0057.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/advisories/GHSA-qgm6-9472-pwq7', 'https://www.openssl.org/news/secadv/20210216.txt', 'https://security.gentoo.org/glsa/202103-03', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://www.tenable.com/security/tns-2021-10', 'https://kc.mcafee.com/corporate/index?page=content&id=SB10366', 'https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E', 'https://www.tenable.com/security/tns-2021-09', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23840', 'https://security.netapp.com/advisory/ntap-20210219-0009/', 'https://www.debian.org/security/2021/dsa-4855', 'https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-4mvc-qc5w-v5qr
Information disclosure in the Contao back end
### Impact Back end users can manipulate the details view URL to show pages and articles that have not been enabled for them. ### Patches Update to Contao 4.4.46 or 4.8.6. ### Workarounds None. ### References https://contao.org/en/security-advisories/information-disclosure-in-the-back-end.html ### For more information If you have any questions or comments about this advisory, open an issue in [contao/contao](https://github.com/contao/contao/issues/new/choose).
{'CVE-2019-19712'}
2021-08-19T16:09:47Z
2019-12-17T22:53:34Z
MODERATE
5.3
{'CWE-276'}
{'https://github.com/FriendsOfPHP/security-advisories/blob/master/contao/core-bundle/CVE-2019-19712.yaml', 'https://github.com/advisories/GHSA-4mvc-qc5w-v5qr', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19712', 'https://contao.org/en/news.html', 'https://github.com/contao/contao/security/advisories/GHSA-4mvc-qc5w-v5qr', 'https://contao.org/en/security-advisories/information-disclosure-in-the-back-end.html'}
null
GHSA
GHSA-wq6x-g685-w5f2
Improper Restriction of XML External Entity Reference in Plone
Plone before 5.2.3 allows XXE attacks via a feature that is explicitly only available to the Manager role.
{'CVE-2020-28734'}
2021-04-07T21:13:00Z
2021-04-07T21:13:00Z
HIGH
8.8
{'CWE-611'}
{'https://github.com/advisories/GHSA-wq6x-g685-w5f2', 'https://dist.plone.org/release/5.2.3/RELEASE-NOTES.txt', 'https://github.com/plone/Products.CMFPlone/issues/3209', 'https://www.misakikata.com/codes/plone/python-en.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28734'}
null
GHSA
GHSA-xrr4-p6fq-hjg7
Directory traversal vulnerability in Action View in Ruby on Rails
Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname.
{'CVE-2016-0752'}
2022-04-25T20:40:52Z
2017-10-24T18:33:35Z
HIGH
7.5
{'CWE-22'}
{'http://www.securityfocus.com/bid/81801', 'https://www.exploit-db.com/exploits/40561/', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178069.html', 'http://rhn.redhat.com/errata/RHSA-2016-0296.html', 'http://www.securitytracker.com/id/1034816', 'http://www.openwall.com/lists/oss-security/2016/01/25/13', 'https://nvd.nist.gov/vuln/detail/CVE-2016-0752', 'http://www.debian.org/security/2016/dsa-3464', 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html', 'https://github.com/advisories/GHSA-xrr4-p6fq-hjg7', 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178044.html', 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html', 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/335P1DcLG00/JXcBnTtZEgAJ'}
null
GHSA
GHSA-fc42-h7q4-qp8h
Command Injection in killport
This affects the package killport before 1.0.2. If (attacker-controlled) user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization. Running this PoC will cause the command touch success to be executed, leading to the creation of a file called success.
{'CVE-2021-23360'}
2021-04-13T15:16:20Z
2021-04-13T15:16:20Z
HIGH
7.5
{'CWE-77'}
{'https://github.com/ssnau/killport/blob/5268f23ea8f152e47182b263d8f7ef20c12a9f28/index.js%23L9', 'https://snyk.io/vuln/SNYK-JS-KILLPORT-1078535', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23360', 'https://github.com/ssnau/killport/commit/bec8e371f170a12e11cd222ffc7a6e1ae9942638', 'https://github.com/advisories/GHSA-fc42-h7q4-qp8h'}
null
GHSA
GHSA-frxp-xxx8-hrg6
Missing Authorization in DayByDay CRM
In Daybyday CRM, versions 2.0.0 through 2.2.0 are vulnerable to Missing Authorization. An attacker that has the lowest privileges account (employee type user), can view the absences of all users in the system including administrators. This type of user is not authorized to view this kind of information.
{'CVE-2022-22108'}
2022-01-08T00:31:52Z
2022-01-08T00:31:52Z
MODERATE
4.3
{'CWE-862'}
{'https://github.com/advisories/GHSA-frxp-xxx8-hrg6', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22108', 'https://github.com/Bottelet/DaybydayCRM/commit/fe842ea5ede237443f1f45a99aeb839133115d8b', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22108'}
null
GHSA
GHSA-7ph6-5cmq-xgjq
Path traversal in xwiki-platform-skin-skinx
### Impact AbstractSxExportURLFactoryActionHandler#processSx does not escape anything from SSX document reference when serializing it on filesystem, so it's easy to mess up the HTML export process with reference elements containing filesystem syntax like "../", "./". or "/" in general (the last two not causing any security threat, but can cause conflicts with others serialized files). ### Patches Fixed in 13.6-rc-1 ### Workarounds * giving script or subwiki admin right only to trusted people * disabling HTML/PDF export ### References https://jira.xwiki.org/browse/XWIKI-18819 ### For more information If you have any questions or comments about this advisory: * Open an issue in [JIRA](https://jira.xwiki.org) * Email us at [XWiki Security Mailing list](mailto:[email protected])
{'CVE-2022-23620'}
2022-02-11T15:00:33Z
2022-02-09T21:53:29Z
MODERATE
6.8
{'CWE-22'}
{'https://jira.xwiki.org/browse/XWIKI-18819', 'https://github.com/xwiki/xwiki-platform/commit/ab778254fb8f71c774e1c1239368c44fe3b6bba5', 'https://github.com/advisories/GHSA-7ph6-5cmq-xgjq', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-7ph6-5cmq-xgjq', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23620'}
null
GHSA
GHSA-v3jv-wrf4-5845
Local Privilege Escalation in npm
Affected versions of `npm` use predictable temporary file names during archive unpacking. If an attacker can create a symbolic link at the location of one of these temporary file names, the attacker can arbitrarily write to any file that the user which owns the `npm` process has permission to write to, potentially resulting in local privilege escalation. ## Recommendation Update to version 1.3.3 or later.
{'CVE-2013-4116'}
2021-09-23T21:38:19Z
2020-09-01T16:03:34Z
LOW
0
{'CWE-59'}
{'https://github.com/npm/npm/issues/3635', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/87141', 'https://bugzilla.redhat.com/show_bug.cgi?id=983917', 'https://github.com/advisories/GHSA-v3jv-wrf4-5845', 'http://www.securityfocus.com/bid/61083', 'http://www.openwall.com/lists/oss-security/2013/07/11/9', 'https://www.npmjs.com/advisories/152', 'http://www.openwall.com/lists/oss-security/2013/07/10/17', 'https://github.com/npm/npm/commit/f4d31693', 'https://nvd.nist.gov/vuln/detail/CVE-2013-4116', 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=715325'}
null
GHSA
GHSA-69fv-gw6g-8ccg
Potential memory corruption in arrayfire
An issue was discovered in the arrayfire crate before 3.6.0 for Rust. Addition of the repr() attribute to an enum is mishandled, leading to memory corruption.
{'CVE-2018-20998'}
2021-08-25T20:43:26Z
2021-08-25T20:43:26Z
CRITICAL
9.8
{'CWE-119'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-20998', 'https://rustsec.org/advisories/RUSTSEC-2018-0011.html', 'https://github.com/arrayfire/arrayfire-rust/pull/177', 'https://github.com/advisories/GHSA-69fv-gw6g-8ccg'}
null
GHSA
GHSA-5pg7-v24c-9rp9
Prototype pollution in controlled-merge
Prototype pollution vulnerability in 'controlled-merge' versions 1.0.0 through 1.2.0 allows attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2020-28268'}
2021-07-28T22:07:01Z
2021-05-18T01:53:46Z
HIGH
7.5
{'CWE-1321'}
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28268', 'https://github.com/advisories/GHSA-5pg7-v24c-9rp9', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28268', 'https://github.com/hlfshell/controlled-merge/commit/5a4b2e9ffe5a0be7f8843d4ab038599d3ae5f9d4', 'https://www.npmjs.com/package/controlled-merge'}
null
GHSA
GHSA-f85h-23mf-2fwh
Argument Injection in Ansible
A flaw was found in Ansible Engine when the module package or service is used and the parameter 'use' is not specified. If a previous task is executed with a malicious user, the module sent can be selected by the attacker using the ansible facts file. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.
{'CVE-2020-1738'}
2022-02-09T22:00:04Z
2022-02-09T22:00:04Z
MODERATE
3.9
{'CWE-88'}
{'https://security.gentoo.org/glsa/202006-11', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1738', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1738', 'https://github.com/advisories/GHSA-f85h-23mf-2fwh', 'https://github.com/ansible/ansible/issues/67796'}
null
GHSA
GHSA-f7q6-xxph-mfm8
Cross-site Scripting in Pimcore
Pimcore prior to version 10.2.10 contains a cross-site scripting vulnerability.
{'CVE-2022-0251'}
2022-02-10T22:24:52Z
2022-01-27T00:01:26Z
MODERATE
5.4
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0251', 'https://github.com/pimcore/pimcore/commit/3ae96b9d41c117aafa45873ad10077d4b873a3cb', 'https://github.com/advisories/GHSA-f7q6-xxph-mfm8', 'https://huntr.dev/bounties/eb4b08f9-cf8b-4335-b3b8-ed44e5fa80a5'}
null
GHSA
GHSA-gchq-9r68-6jwv
Cross-Site Request Forgery in Jenkins Credentials Plugin
Jenkins Credentials Plugin 2.3.18 and earlier does not escape user-controlled information on a view it provides, resulting in a reflected cross-site scripting (XSS) vulnerability.
{'CVE-2021-21648'}
2021-06-16T17:24:31Z
2021-06-16T17:24:31Z
MODERATE
6.1
{'CWE-79'}
{'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2349', 'https://github.com/advisories/GHSA-gchq-9r68-6jwv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21648'}
null
GHSA
GHSA-hq8g-qq57-5275
SQL Injection in untitled-model
All versions of `untitled-model` re vulnerable to SQL Injection. Query parameters are not properly sanitized allowing attackers to inject SQL statements and execute arbitrary SQL queries. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2021-09-28T17:03:10Z
2020-09-11T21:24:33Z
HIGH
0
{'CWE-89'}
{'https://hackerone.com/reports/507222', 'https://www.npmjs.com/advisories/989', 'https://github.com/advisories/GHSA-hq8g-qq57-5275'}
null
GHSA
GHSA-pfjq-935c-4895
Data races in v9
Affected versions of this crate unconditionally implement `Sync` for `SyncRef<T>`. This definition allows data races if `&T` is accessible through `&SyncRef`. `SyncRef<T>` derives `Clone` and `Debug`, and the default implementations of those traits access `&T` by invoking `T::clone()` & `T::fmt()`. It is possible to create data races & undefined behavior by concurrently invoking `SyncRef<T>::clone()` or `SyncRef<T>::fmt()` from multiple threads with `T: !Sync`.
null
2021-08-25T21:00:37Z
2021-08-25T21:00:37Z
MODERATE
0
{'CWE-362'}
{'https://github.com/purpleposeidon/v9/issues/1', 'https://github.com/advisories/GHSA-pfjq-935c-4895', 'https://rustsec.org/advisories/RUSTSEC-2020-0127.html'}
null
GHSA
GHSA-vm59-329q-p468
Cross-site Scripting in Apache UIMA
This vulnerability relates to the user's browser processing of DUCC webpage input data.The javascript comprising Apache UIMA DUCC (<= 2.2.2) which runs in the user's browser does not sufficiently filter user supplied inputs, which may result in unintended execution of user supplied javascript code.
{'CVE-2018-8035'}
2021-08-03T21:30:32Z
2019-05-14T04:00:37Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-vm59-329q-p468', 'https://uima.apache.org/security_report', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8035'}
null
GHSA
GHSA-mq7g-6rv4-pj95
Downloads Resources over HTTP in embedza
Affected versions of `embedza` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `embedza`. ## Recommendation Update to version 1.2.4 or later.
{'CVE-2016-10569'}
2021-01-08T18:26:11Z
2019-02-18T23:35:23Z
HIGH
0
{'CWE-311'}
{'https://www.npmjs.com/advisories/187', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10569', 'https://github.com/advisories/GHSA-mq7g-6rv4-pj95', 'https://nodesecurity.io/advisories/187'}
null
GHSA
GHSA-m3xv-x3ph-mq22
Server-side Template Injection in nystudio107/craft-seomatic
A Server-side Template Injection (SSTI) vulnerability exists in Nystudio107 Seomatic prior to 3.4.12 in src/helpers/UrlHelper.php via the host header.
{'CVE-2021-44618'}
2022-03-24T13:44:50Z
2022-03-12T00:00:34Z
HIGH
9.8
{'CWE-94'}
{'https://github.com/nystudio107/craft-seomatic/releases/tag/3.4.12', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44618', 'https://github.com/advisories/GHSA-m3xv-x3ph-mq22', 'https://github.com/nystudio107/craft-seomatic/commit/0c5c0c0e0cb61000d12ec55ebf174745a5bf6469'}
null
GHSA
GHSA-crr2-ph72-c52g
Malicious Package in my-very-own-package
All versions of `my-very-own-package` contain malicious code. The package sends the output of `process.versions`, `process.arch` and `process.platform` to a remote server in a postinstall script. ## Recommendation Remove the package from your environment. There are no further signs of compromise.
null
2021-09-30T17:44:06Z
2020-09-03T17:27:22Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1043', 'https://github.com/advisories/GHSA-crr2-ph72-c52g'}
null
GHSA
GHSA-p43w-g3c5-g5mq
Out of bounds read in Pillow
An issue was discovered in Pillow before 8.1.1. There is an out-of-bounds read in SGIRleDecode.c.
{'CVE-2021-25293'}
2021-12-02T15:31:01Z
2021-03-29T16:35:27Z
HIGH
7.5
{'CWE-125'}
{'https://security.gentoo.org/glsa/202107-33', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25293', 'https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html', 'https://github.com/python-pillow/Pillow/commit/4853e522bddbec66022c0915b9a56255d0188bf9', 'https://github.com/advisories/GHSA-p43w-g3c5-g5mq'}
null
GHSA
GHSA-4fcw-pq4r-f4q7
Server-Side Request Forgery in Spinnaker Orca
The Spinnaker template resolution functionality is vulnerable to Server-Side Request Forgery (SSRF), which allows an attacker to send requests on behalf of Spinnaker potentially leading to sensitive data disclosure.
{'CVE-2020-9298'}
2021-05-07T15:54:31Z
2021-05-07T15:54:31Z
HIGH
7.5
{'CWE-918'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-9298', 'https://github.com/spinnaker/orca/releases/tag/v8.7.0', 'https://github.com/advisories/GHSA-4fcw-pq4r-f4q7', 'https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2020-003.md', 'https://github.com/spinnaker/orca/pull/3706/commits/4f3c07da8fcacd67bb1984aef11b2066f2c0d11c'}
null
GHSA
GHSA-v988-828w-xvf2
Authentication Bypass Using an Alternate Path or Channel and Authentication Bypass by Primary Weakness in rucio-webui
### Impact `rucio-webui` installations of the `1.26` release line potentially leak the contents of cookies to other sessions within a wsgi container. Impact is that Rucio authentication tokens are leaked to other users accessing the `webui` within a close timeframe, thus allowing users to access the `webui` with the leaked authentication token. Privileges are therefore also escalated. Rucio server / daemons are not affected by this issue, it is isolated to the webui. ### Patches This issue is fixed in the `1.26.7` release of the `rucio-webui`. ### Workarounds Installation of the `1.25.7` `webui` release. The `1.25` and previous webui release lines are not affected by this issue. ### References https://github.com/rucio/rucio/issues/4928
null
2021-10-22T16:21:07Z
2021-10-22T16:21:07Z
HIGH
0
{'CWE-288', 'CWE-305'}
{'https://github.com/advisories/GHSA-v988-828w-xvf2', 'https://github.com/rucio/rucio/issues/4928', 'https://github.com/rucio/rucio/issues/4810', 'https://github.com/rucio/rucio/releases/tag/1.26.7', 'https://github.com/rucio/rucio/security/advisories/GHSA-v988-828w-xvf2'}
null
GHSA
GHSA-qggc-pj29-j27m
Improper Privilege Management in Mattermost
One of the API in Mattermost version 6.4.1 and earlier fails to properly protect the permissions, which allows the authenticated members with restricted custom admin role to bypass the restrictions and view the server logs and server config.json file contents. Per the Mattermost security updates page, versions 6.4.2, 6.3.5, 6.2.5, and 5.37.9 contain patches for this issue
{'CVE-2022-1332'}
2022-04-22T21:05:51Z
2022-04-14T00:00:17Z
MODERATE
4.3
{'CWE-200', 'CWE-269'}
{'https://github.com/advisories/GHSA-qggc-pj29-j27m', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1332', 'https://mattermost.com/security-updates/'}
null
GHSA
GHSA-5q8m-mqmx-pxp9
Spring Data Commons contain a property path parser vulnerability caused by unlimited resource allocation
Spring Data Commons, versions 1.13 to 1.13.10, 2.0 to 2.0.5, and older unsupported versions, contain a property path parser vulnerability caused by unlimited resource allocation. An unauthenticated remote malicious user (or attacker) can issue requests against Spring Data REST endpoints or endpoints using property path parsing which can cause a denial of service (CPU and memory consumption).
{'CVE-2018-1274'}
2022-04-27T13:59:21Z
2018-10-17T17:23:44Z
HIGH
7.5
{'CWE-770'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1274', 'https://pivotal.io/security/cve-2018-1274', 'http://www.securityfocus.com/bid/103769', 'https://github.com/advisories/GHSA-5q8m-mqmx-pxp9'}
null
GHSA
GHSA-954j-f27r-cj52
Cleartext storage of session identifier
User session identifiers were stored in cleartext - without processing of additional cryptographic hashing algorithms. This vulnerability cannot be exploited directly and occurs in combination with a chained attack - like for instance SQL injection in any other component of the system. ### Solution Update to TYPO3 versions 9.5.23 or 10.4.10 that fix the problem described. ### Credits Thanks to TYPO3 security team member Helmut Hummel who reported this issue and to TYPO3 core & security team members Benni Mack & Oliver Hader as well as TYPO3 contributor Markus Klein who fixed the issue.
{'CVE-2020-26228'}
2022-04-19T19:02:40Z
2020-11-23T21:18:36Z
HIGH
8.1
{'CWE-312'}
{'https://github.com/advisories/GHSA-954j-f27r-cj52', 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-954j-f27r-cj52', 'https://typo3.org/security/advisory/typo3-core-sa-2020-011', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26228'}
null
GHSA
GHSA-c7fh-chf7-jr5x
ReDOS in Vfsjfilechooser2
A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in Vfsjfilechooser2 which occurs when the application attempts to validate crafted URIs.
{'CVE-2021-29061'}
2022-01-06T18:44:27Z
2022-01-06T18:44:27Z
HIGH
7.5
{'CWE-770'}
{'https://github.com/yetingli/PoCs/blob/main/CVE-2021-29061/Vfsjfilechooser2.md', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29061', 'https://github.com/fracpete/vfsjfilechooser2/releases/tag/vfsjfilechooser2-0.2.9', 'https://github.com/advisories/GHSA-c7fh-chf7-jr5x', 'https://github.com/fracpete/vfsjfilechooser2/commit/9c9f2c317f3de5ece60a3ae28c371e9796e3909b', 'https://github.com/yetingli/SaveResults/blob/main/md/vfsjfilechooser2.md', 'https://github.com/fracpete/vfsjfilechooser2/issues/7'}
null