ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Packagist
GHSA-xp5q-77mh-6hm2
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF)
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF)
{'CVE-2021-3728'}
2021-08-24T20:02:07Z
2021-08-25T14:50:17Z
MODERATE
null
{'CWE-352'}
{'https://github.com/firefly-iii/firefly-iii/commit/14cdce113e0eb8090d09066fcd2b5cf03b5ac84e', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3728', 'https://github.com/firefly-iii/firefly-iii/', 'https://huntr.dev/bounties/dd54c5a1-0d4a-4f02-a111-7ce4ddc67a4d'}
null
Packagist
GHSA-3wwj-wh2w-g4xp
CRLF Injection in microweber
CRLF Injection leads to Stack Trace Exposure due to lack of filtering at https://demo.microweber.org/ in Packagist microweber/microweber prior to 1.2.11.
{'CVE-2022-0666'}
2022-02-23T15:04:54Z
2022-02-19T00:01:35Z
HIGH
null
{'CWE-93'}
{'https://github.com/microweber/microweber', 'https://github.com/microweber/microweber/commit/f0e338f1b7dc5ec9d99231f4ed3fa6245a5eb128', 'https://huntr.dev/bounties/7215afc7-9133-4749-8e8e-0569317dbd55', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0666'}
null
Packagist
GHSA-4p92-fv6v-fhfj
Cross-site Scripting in microweber
Microweber prior to 1.2.11 is vulnerable to reflected cross-site scripting.
{'CVE-2022-0723'}
2022-03-09T20:43:44Z
2022-02-27T00:00:15Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0723', 'https://github.com/microweber/microweber/commit/15e519a86e4b24526abaf9e6dc81cb1af86843a5', 'https://huntr.dev/bounties/16b0547b-1bb3-493c-8a00-5b6a11fca1c5', 'https://github.com/microweber/microweber'}
null
Packagist
GHSA-j5qg-w9jg-3wg3
Inability to de-op players if listed in ops.txt with non-lowercase letters
### Impact Originally reported in iTXTech/Genisys#1188 ```txt PotterHarry98 potterharry98 ``` `deop PotterHarry98` will remove `potterharry98` from the ops.txt but not `PotterHarry98`. Operator permissions are checked using `Config->exists()` with `lowercase=true`, which will result in a match: https://github.com/pmmp/PocketMine-MP/blob/22bb1ce8e03dba57173debf0415390511d68e045/src/utils/Config.php#L449 This means that it's possible to make yourself impossible to de-op (using commands) by adding your name to ops.txt with uppercase letters. ### Patches 4d37b79ff7f9d9452e988387f97919a9a1c4954e ### Workarounds This can be easily addressed by removing the offending lines from ops.txt manually. ### For more information If you have any questions or comments about this advisory: * Open an issue in [pmmp/PocketMine-MP](https://github.com/pmmp/PocketMine-MP) * Email us at [[email protected]](mailto:[email protected])
null
2021-12-16T15:47:47Z
2021-12-16T18:53:57Z
LOW
null
null
{'https://github.com/pmmp/PocketMine-MP', 'https://github.com/pmmp/PocketMine-MP/blob/4.0.3/changelogs/4.0.md#403', 'https://github.com/pmmp/PocketMine-MP/commit/4d37b79ff7f9d9452e988387f97919a9a1c4954e', 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-j5qg-w9jg-3wg3', 'https://github.com/iTXTech/Genisys/issues/1188'}
null
Packagist
GHSA-m6q5-wv4x-fv6h
Cross-site Scripting in Drupal Core
Access Bypass vulnerability in Drupal Core allows for an attacker to leverage the way that HTML is rendered for affected forms in order to exploit the vulnerability. This issue affects: Drupal Core 8.8.x versions prior to 8.8.10; 8.9.x versions prior to 8.9.6; 9.0.x versions prior to 9.0.6.
{'CVE-2020-13668'}
2022-02-25T15:33:47Z
2022-02-12T00:00:47Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-13668', 'https://github.com/drupal/core', 'https://www.drupal.org/sa-core-2020-009'}
null
Packagist
GHSA-qv7g-j98v-8pp7
XSS vulnerability on email template preview page
### Summary Email template preview is vulnerable to XSS payload added to email template content. The attacker should have permission to create or edit an email template. For successful payload, execution attacked user should preview a vulnerable email template. ### Workarounds There are no workarounds that address this vulnerability.
{'CVE-2021-41236'}
2022-01-04T17:51:41Z
2022-01-06T18:34:35Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41236', 'https://github.com/oroinc/platform/security/advisories/GHSA-qv7g-j98v-8pp7', 'https://github.com/oroinc/platform', 'https://github.com/oroinc/platform/commit/2a089c971fc70bc63baf8770d29ee515ce5a415a'}
null
Packagist
GHSA-86pv-95mj-7w5f
Stored XSS vulnerability on Bounce Management Callback
### Impact Insufficient sanitization / filtering allows for arbitrary JavaScript Injection in Mautic using the bounce management callback function. The values submitted in the "error" and "error_related_to" parameters of the POST request of the bounce management callback will be permanently stored and executed once the details page of an affected lead is opened by a Mautic user. An attacker with access to the bounce management callback function (identified with the Mailjet webhook, but it is assumed this will work uniformly across all kinds of webhooks) can inject arbitrary JavaScript Code into the "error" and "error_related_to" parameters of the POST request (POST /mailer/<product / webhook>/callback). It is noted that there is no authentication needed to access this function. The JavaScript Code is stored permanently in the web application and executed every time an authenticated user views the details page of a single contact / lead in Mautic. This means, arbitrary code can be executed to, e.g., steal or tamper with information. ### Patches Upgrade to 3.3.4 or 4.0.0 ### Workarounds No ### References https://github.com/mautic/mautic/releases/tag/3.3.4 https://github.com/mautic/mautic/releases/tag/4.0.0 ### For more information If you have any questions or comments about this advisory: * Email us at [[email protected]](mailto:[email protected])
{'CVE-2021-27910'}
2021-08-30T18:05:04Z
2021-09-01T18:40:48Z
HIGH
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-27910', 'https://github.com/mautic/mautic', 'https://github.com/mautic/mautic/security/advisories/GHSA-86pv-95mj-7w5f'}
null
Packagist
GHSA-7mv4-4xpg-xq44
FormField with square brackets in field name skips validation
FileField with array notation skips validation The FileField class is commonly used for file upload in custom code on a Silverstripe website. This field is designed to be used with a single file upload. PHP allows for submitting multiple values by adding square brackets to the field name. When this is done to a FileField, it will be coerced into allowing multiple files by using this notation. This is not a supported feature, though nothing is done to prevent this. In this scenario, validation such as limiting allowed extensions is not applied, and the FileField->saveInto() behaviour is not triggered. If custom controller logic is used to process the file uploads, it might implicitly rely on validation to be provided by the Form system, which is not the case.
{'CVE-2020-26138'}
2022-03-26T00:14:34Z
2022-03-26T00:14:34Z
MODERATE
null
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-26138', 'https://www.silverstripe.org/download/security-releases/cve-2020-26138/'}
null
Packagist
GHSA-579x-cjvr-cqj9
Observable Response Discrepancy in Lost Password Service
### Impact It is possible to enumerate usernames via the forgot password functionality ### Patches Update to version `10.1.3` or apply this patch manually: https://github.com/pimcore/pimcore/pull/10223.patch ### Workarounds Apply https://github.com/pimcore/pimcore/pull/10223.patch manually.
{'CVE-2021-39189'}
2021-09-17T18:38:47Z
2021-09-20T19:53:55Z
MODERATE
null
{'CWE-203', 'CWE-204'}
{'https://github.com/pimcore/pimcore', 'https://github.com/pimcore/pimcore/security/advisories/GHSA-579x-cjvr-cqj9', 'https://github.com/pimcore/pimcore/pull/10223.patch', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39189', 'https://github.com/pimcore/pimcore/pull/10223/commits/d0a4de39cf05dce6af71f8ca039132bdfcbb0dce', 'https://huntr.dev/bounties/12462a99-ebf8-4e39-80b3-54a16caa3f4c/'}
null
Packagist
GHSA-974j-wjxx-wggj
Incorrect Access Control vulnerability in api-platform/core
API Platform version from 2.2.0 to 2.3.5 contains an Incorrect Access Control vulnerability in GraphQL delete mutations that can result in a user authorized to delete a resource can delete any resource. This attack appears to be exploitable via the user must be authorized. This vulnerability appears to have been fixed in 2.3.6.
{'CVE-2019-1000011'}
2021-06-11T15:59:46Z
2019-10-14T21:23:26Z
MODERATE
null
{'CWE-284'}
{'https://github.com/FriendsOfPHP/security-advisories/blob/master/api-platform/core/CVE-2019-1000011.yaml', 'https://github.com/api-platform/core/issues/2364', 'https://github.com/api-platform/core/pull/2441', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1000011'}
null
Packagist
GHSA-mr6r-82x4-f4jj
Timing attacks might allow practical recovery of the long-term private key
In elliptic-php versions priot to 1.0.6, Timing attacks might be possible which can result in practical recovery of the long-term private key generated by the library under certain conditions. Leakage of a bit-length of the scalar during scalar multiplication is possible on an elliptic curve which might allow practical recovery of the long-term private key.
{'CVE-2019-10764'}
2021-08-18T22:40:49Z
2019-11-20T01:34:50Z
HIGH
null
{'CWE-203'}
{'https://minerva.crocs.fi.muni.cz/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10764', 'https://github.com/simplito/elliptic-php/commit/15652609aa55968d56685c2a9120535ccdc00fd9', 'https://snyk.io/vuln/SNYK-PHP-SIMPLITOELLIPTICPHP-534576'}
null
Packagist
GHSA-mxh3-2699-98g9
Cross-site Scripting pimcore
pimcore version 10.3.0 and prior is vulnerable to cross-site scripting.
{'CVE-2022-0510'}
2022-02-14T22:35:03Z
2022-02-09T00:00:28Z
MODERATE
null
{'CWE-79'}
{'https://huntr.dev/bounties/bb3525d5-dedc-48b8-ab04-ad4c72499abe', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0510', 'https://github.com/pimcore/pimcore/', 'https://github.com/pimcore/pimcore/commit/b5a9ad65e5a4dde1916f02019f8686ad835681ce'}
null
Packagist
GHSA-gj85-pvp5-mvf9
Cross-site Scripting in Beanstalk console
Beanstalk console prior to version 1.7.12 is vulnerable to cross-site scripting.
{'CVE-2022-0501'}
2022-02-14T22:30:43Z
2022-02-06T00:00:54Z
MODERATE
null
{'CWE-79'}
{'https://huntr.dev/bounties/9af1c35e-3f74-4c93-a241-e8be01335ec7', 'https://github.com/ptrofimov/beanstalk_console/commit/e351c8260ec1d3718d9e475ee57c7e12c47f19da', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0501', 'https://github.com/ptrofimov/beanstalk_console'}
null
Packagist
GHSA-xmq3-hgjx-6997
Cross-site Scripting in Pimcore
Pimcore 10.3.3 and prior is vulnerable to stored cross-site scripting. A patch is available on the 10.x branch and will likely be part of version 10.4.0.
{'CVE-2022-0705'}
2022-03-29T15:16:27Z
2022-03-17T00:00:47Z
MODERATE
null
{'CWE-79'}
{'https://github.com/pimcore/pimcore', 'https://huntr.dev/bounties/0e1b6836-e5b5-4e47-b9ab-2f6a4790ee7b', 'https://github.com/pimcore/pimcore/pull/11447', 'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0705'}
null
Packagist
GHSA-hfm8-2q22-h7hv
Cross-site Scripting in pegasus/google-for-jobs
An XSS issue was discovered in the google_for_jobs (aka Google for Jobs) extension before 1.5.1 and 2.x before 2.1.1 for TYPO3. The extension fails to properly encode user input for output in HTML context. A TYPO3 backend user account is required to exploit the vulnerability.
{'CVE-2021-43561'}
2021-11-17T21:24:36Z
2021-11-15T17:39:18Z
MODERATE
null
{'CWE-79'}
{'https://github.com/pegasuswerbeagentur/google_for_jobs', 'https://typo3.org/security/advisory/typo3-ext-sa-2021-015', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43561'}
null
Packagist
GHSA-427g-2r83-3ccm
Information disclosure through processing of external XML entities
An XML entity injection vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated admin user can craft document type definition for an XML representing XML layout. The crafted document type definition and XML layout allow processing of external entities which can lead to information disclosure.
{'CVE-2019-8126'}
2021-07-28T15:37:48Z
2019-11-12T22:59:24Z
MODERATE
null
{'CWE-776', 'CWE-611'}
{'https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update', 'https://nvd.nist.gov/vuln/detail/CVE-2019-8126'}
null
Packagist
GHSA-cpv8-6xgr-rmf6
Cross-site Scripting in Dolibarr
In “Dolibarr ERP CRM”, WYSIWYG Editor module, v2.8.1 to v13.0.2 are affected by a stored XSS vulnerability that allows low privileged application users to store malicious scripts in the “Private Note” field at “/adherents/note.php?id=1” endpoint. These scripts are executed in a victim’s browser when they open the page containing the vulnerable field. In the worst case, the victim who inadvertently triggers the attack is a highly privileged administrator. The injected scripts can extract the Session ID, which can lead to full Account takeover of the admin and due to other vulnerability (Improper Access Control on Private notes) a low privileged user can update the private notes which could lead to privilege escalation.
{'CVE-2021-25955'}
2021-10-21T14:19:19Z
2021-08-30T16:22:46Z
CRITICAL
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-25955', 'https://github.com/Dolibarr/dolibarr/', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25955', 'https://github.com/Dolibarr/dolibarr/commit/796b2d201acb9938b903fb2afa297db289ecc93e'}
null
Packagist
GHSA-x8xx-x82q-42q3
Exposure of Resource to Wrong Sphere in ezsystems/ezplatform-kernel
When image files are uploaded, they are made accessible under a name similar to the original file name. There are two issues with this. Both require access to uploading images in order to exploit them, this limits the impact. The first issue is that certain injection attacks can be possible, since not all possible attack vectors are removed from the original file name. The second issue is that direct access to the images is not access controlled. This is by design, for performance reasons, and documented as such. But it does mean that images not meant to be publicly accessible can be accessed, provided that the image path and filename is correctly deduced and/or guessed, through dictionary attacks and similar.
{'CVE-2022-25336'}
2022-03-04T21:37:29Z
2022-02-19T00:01:25Z
MODERATE
null
{'CWE-668'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-25336', 'https://github.com/ezsystems/ezplatform-kernel', 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-001-image-filenames-sanitization'}
null
Packagist
GHSA-xh9g-cp3v-p8q4
Missing Authorization in Crater Invoice
Crater Invoice prior to version 6.0.2 has a missing authorization vulnerability..
{'CVE-2022-0203'}
2022-02-03T21:01:13Z
2022-01-27T00:01:17Z
MODERATE
null
{'CWE-862', 'CWE-284'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0203', 'https://github.com/crater-invoice/crater', 'https://huntr.dev/bounties/395fc553-2b90-4e69-ba07-a316e1c06406', 'https://github.com/crater-invoice/crater/commit/dd324c8bb6b17009f82afe8bc830caec7241e992'}
null
Packagist
GHSA-82rr-mq4r-p4r3
SQL injection in francoisjacquet/rosariosis
An SQL Injection vulnerability exits in RosarioSIS before 7.6.1 via the votes parameter in ProgramFunctions/PortalPollsNotes.fnc.php.
{'CVE-2021-44567'}
2022-03-04T21:39:00Z
2022-02-25T00:01:08Z
CRITICAL
null
{'CWE-89'}
{'https://gitlab.com/francoisjacquet/rosariosis/-/commit/e001430aa9fb53d2502fb6f036f6c51c578d2016', 'https://gitlab.com/francoisjacquet/rosariosis', 'https://gitlab.com/francoisjacquet/rosariosis/-/issues/308', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44567', 'https://gitlab.com/francoisjacquet/rosariosis/-/commit/519af055a4fdc1362657d75bca76f9c95a081eaa', 'https://gitlab.com/francoisjacquet/rosariosis/-/blob/mobile/CHANGES.md#changes-in-761'}
null
Packagist
GHSA-7vph-p634-vrqf
Command Injection in RaspAP 2.6.6
includes/configure_client.php in RaspAP 2.6.6 allows attackers to execute commands via command injection.
{'CVE-2021-38556'}
2021-09-03T20:35:52Z
2021-09-02T17:11:00Z
HIGH
null
{'CWE-77'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-38556', 'https://github.com/RaspAP/raspap-webgui', 'https://zerosecuritypenetrationtesting.com/?page_id=306', 'https://github.com/RaspAP/raspap-webgui/blob/0e1d652c5e55f812aaf2a5908884e9db179416ee/includes/configure_client.php'}
null
Packagist
GHSA-p5hj-xxfr-pwc3
Code Injection in microweber
Code Injection in Packagist microweber/microweber prior to 1.2.11.
{'CVE-2022-0282'}
2022-01-27T18:32:42Z
2022-01-21T18:02:39Z
HIGH
null
{'CWE-94'}
{'https://github.com/microweber/microweber', 'https://huntr.dev/bounties/8815b642-bd9b-4737-951b-bde7319faedd', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0282', 'https://github.com/microweber/microweber/commit/51b5a4e3ef01e587797c0109159a8ad9d2bac77a'}
null
Packagist
GHSA-jv64-2m3x-6v4q
Cross-site scripting (XSS) vulnerability exists in the "contact us" plugin for Subrion CMS
A cross-site scripting (XSS) vulnerability exists in the "contact us" plugin for Subrion CMS <= 4.2.1 version via "List of subjects".
{'CVE-2021-41948'}
2022-05-04T18:10:42Z
2022-04-30T00:00:36Z
MODERATE
null
{'CWE-79'}
{'https://github.com/intelliants/subrion-plugin-contact_us/', 'https://github.com/intelliants/subrion-plugin-contact_us/issues/8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41948'}
null
Packagist
GHSA-7vwg-39h8-8qp8
/user/sessions endpoint allows detecting valid accounts
This Security Advisory is about a vulnerability in eZ Platform v1.13, v2.5, and v3.2, and in Ibexa DXP and Ibexa Open Source v3.3. The /user/sessions endpoint can let an attacker detect if a given username or email refers to a valid account. This can be detected through differences in the response data or response time of certain requests. The fix ensures neither attack is possible. The fix is distributed via Composer. If you come across a security issue in our products, here is how you can report it to us: https://doc.ibexa.co/en/latest/guide/reporting_issues/#toc
null
2021-03-11T17:41:09Z
2021-03-11T17:42:01Z
HIGH
null
{'CWE-203'}
{'https://github.com/ezsystems/ezplatform-rest/commit/e239bba8b154a3b4cf787e29b9f15edf8945d933', 'https://packagist.org/packages/ezsystems/ezplatform-rest', 'https://github.com/ezsystems/ezplatform-rest/security/advisories/GHSA-7vwg-39h8-8qp8'}
null
Packagist
GHSA-79mg-4w23-4fqc
Unauthenticated SQL Injection in Cachet
### Impact In Cachet versions through 2.3.18, there is a SQL injection which is in the `SearchableTrait#scopeSearch()`. Attackers without authentication can utilize this vulnerability to exfiltrate sensitive data from the database such as administrator's password and session. ### Patches The original repository of [https://github.com/CachetHQ/Cachet](https://github.com/CachetHQ/Cachet) is not active, the stable version 2.3.18 and it's developing 2.4 branch is affected. Update to version 2.5 or later in the [https://github.com/fiveai/Cachet fork](https://github.com/fiveai/Cachet) to fix this vulnerability.
{'CVE-2021-39165'}
2021-08-27T12:54:52Z
2021-08-30T16:12:58Z
HIGH
null
{'CWE-287', 'CWE-89'}
{'https://github.com/fiveai/Cachet/security/advisories/GHSA-79mg-4w23-4fqc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39165', 'https://github.com/fiveai/Cachet/commit/27bca8280419966ba80c6fa283d985ddffa84bb6'}
null
Packagist
GHSA-9722-rr68-rfpg
Upload whitelisted files to any directory in OctoberCMS
### Impact An attacker can exploit this vulnerability to upload jpg, jpeg, bmp, png, webp, gif, ico, css, js, woff, woff2, svg, ttf, eot, json, md, less, sass, scss, xml files to any directory of an October CMS server. The vulnerability is only exploitable by an authenticated backend user with the `cms.manage_assets` permission. ### Patches Issue has been patched in Build 466 (v1.0.466). ### Workarounds Apply https://github.com/octobercms/october/commit/6711dae8ef70caf0e94cec434498012a2ccd86b8 to your installation manually if unable to upgrade to Build 466. ### References Reported by [Sivanesh Ashok](https://stazot.com/) ### For more information If you have any questions or comments about this advisory: * Email us at [[email protected]](mailto:[email protected]) ### Threat assessment: <img width="1241" alt="Screen Shot 2020-03-31 at 12 21 10 PM" src="https://user-images.githubusercontent.com/7253840/78061230-255f5400-734a-11ea-92b4-1120f6960505.png">
{'CVE-2020-5297'}
2021-03-04T18:26:59Z
2020-06-03T21:58:27Z
LOW
null
{'CWE-73'}
{'https://github.com/octobercms/october/commit/6711dae8ef70caf0e94cec434498012a2ccd86b8', 'https://github.com/octobercms/october/security/advisories/GHSA-9722-rr68-rfpg', 'http://seclists.org/fulldisclosure/2020/Aug/2', 'http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5297'}
null
Packagist
GHSA-3vg7-jw9m-pc3f
Broken Access Control in Form Framework
### Problem Due to improper input validation, attackers can by-pass restrictions of predefined options and submit arbitrary data in the Form Designer backend module of the Form Framework. In the default configuration of the Form Framework this allows attackers to explicitly allow arbitrary mime-types for file uploads - however, default _fileDenyPattern_ successfully blocked files like _.htaccess_ or _malicious.php_. Besides that, attackers can persist those files in any writable directory of the corresponding TYPO3 installation. A valid backend user account with access to the form module is needed to exploit this vulnerability. ### Solution Update to TYPO3 versions 8.7.40, 9.5.25, 10.4.14, 11.1.1 that fix the problem described. ### Credits Thanks to Richie Lee who reported this issue and to TYPO3 contributor Ralf Zimmermann who fixed the issue. ### References * [TYPO3-CORE-SA-2021-003](https://typo3.org/security/advisory/typo3-core-sa-2021-003)
{'CVE-2021-21357'}
2021-03-29T18:01:00Z
2021-03-23T01:53:57Z
HIGH
null
{'CWE-434', 'CWE-22', 'CWE-20'}
{'https://packagist.org/packages/typo3/cms-form', 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-3vg7-jw9m-pc3f', 'https://typo3.org/security/advisory/typo3-core-sa-2021-003', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21357'}
null
Packagist
GHSA-gwpx-q2h9-wxgx
elgg is vulnerable to Authorization Bypass Through User-Controlled Key
elgg is vulnerable to Authorization Bypass Through User-Controlled Key
{'CVE-2021-3964'}
2021-12-03T15:16:06Z
2021-12-03T20:43:25Z
MODERATE
null
{'CWE-639'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3964', 'https://huntr.dev/bounties/a4df45d6-b739-4299-967f-c960b569383a', 'https://github.com/elgg/elgg/', 'https://github.com/elgg/elgg/commit/d9fcad76ee380ea17edd61d13d0f87828ea3f744'}
null
Packagist
GHSA-673x-f5wx-fxpw
Cross Site Scripting and RCE in baserCMS
baserCMS 4.3.6 and earlier is affected by Cross Site Scripting (XSS) and Remote Code Execution (RCE). * Impact: XSS to RCE via Arbitrary file upload. * Attack vector is: Administrator must be logged in. * Components are: ThemeFilesController.php, UploaderFilesController.php. * Tested baserCMS Version : 4.3.6 (Latest) * Affected baserCMS Version : 4.2.0 ~ 4.3.6 (XSS), 3.0.10 ~ 4.3.6 (RCE) * Patches : https://basercms.net/security/20200827 Found by Vulnerability Research team in [Flatt Security Inc.](https://flatt.tech/)
{'CVE-2020-15159'}
2021-01-07T23:39:00Z
2020-08-28T21:45:15Z
LOW
null
{'CWE-79'}
{'https://basercms.net/security/20200827', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15159', 'https://github.com/baserproject/basercms/commit/16a7b3cd09a0ca355474119c76897eac2034a66d', 'https://github.com/baserproject/basercms/security/advisories/GHSA-673x-f5wx-fxpw'}
null
Packagist
GHSA-g7w8-pp9w-7p32
Creation of order credits was not validated by acl in admin orders
### Impact Creation of order credits was not validated by ACL in admin orders ### Patches We recommend updating to the current version 6.4.1.1. You can get the update to 6.4.1.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ### Workarounds For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
null
2021-10-05T17:26:03Z
2021-06-28T16:57:32Z
LOW
null
{'CWE-306'}
{'https://github.com/shopware/platform/security/advisories/GHSA-g7w8-pp9w-7p32', 'https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32709', 'https://www.shopware.com/en/download/#shopware-6', 'https://github.com/shopware/platform'}
null
Packagist
GHSA-xpfv-89vg-r562
Cross Site Request Forgery in Moodle
A flaw was found in Moodle in versions 3.11 to 3.11.4, 3.10 to 3.10.8, 3.9 to 3.9.11 and earlier unsupported versions. The "delete badge alignment" functionality did not include the necessary token check to prevent a CSRF risk.
{'CVE-2022-0335'}
2022-02-02T16:06:32Z
2022-01-28T22:07:23Z
HIGH
null
{'CWE-352'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=2043666', 'https://github.com/moodle/moodle/commit/d40cc61eba229c6d1f47b9a525022fbc9136b9f6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0335', 'https://github.com/moodle/moodle', 'https://moodle.org/mod/forum/discuss.php?d=431103'}
null
Packagist
GHSA-68wg-qv6r-j4vp
SQL Injection in usmanhalalit/pixie
Pixie versions 1.0.x before 1.0.3, and 2.0.x before 2.0.2 allow SQL Injection in the limit() function due to improper sanitization.
{'CVE-2019-10766'}
2021-08-18T22:44:59Z
2019-11-20T17:44:54Z
CRITICAL
null
{'CWE-89'}
{'https://snyk.io/vuln/SNYK-PHP-USMANHALALITPIXIE-534879', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10766', 'https://github.com/usmanhalalit/pixie/commit/9bd991021abbcbfb19347a07dca8b7e518b8abc9'}
null
Packagist
GHSA-7fjp-g4m7-fx23
User (Encrypted) Password Field Being Serialised
### Impact Leaking Password field during serialisation of the User model. Password is in the encrypted form but if User model is requested in json or array form the value is printed. ### Patches Issue has been patched in version 0.3.7-beta and onwards. ### Workarounds Add the 'password' field to the Users model file in the hidden array: ```php /** * The attributes that should be hidden for arrays. * * @var array */ protected $hidden = [ 'remember_token', 'password', ]; ``` ### For more information If you have any questions or comments about this advisory: * Open an issue in [pwweb/laravel-core](https://github.com/pwweb/laravel-core) * Email us at [[email protected]](mailto:[email protected])
null
2021-04-12T20:05:57Z
2021-04-13T15:12:26Z
LOW
null
{'CWE-200'}
{'https://github.com/pwweb/laravel-core/security/advisories/GHSA-7fjp-g4m7-fx23'}
null
Packagist
GHSA-g54x-29xv-58h5
Remote code execution in Subrion
Subrion is an open source php content management system. A Remiote Code Execution (RCE) vulnerability exiss in Subrion CMS 4.2.1 via modified code in a background field; when the information is modified, the data in it will be executed through eval().
{'CVE-2021-43464'}
2022-04-15T02:46:19Z
2022-04-05T00:00:23Z
HIGH
null
null
{'https://github.com/intelliants/subrion/issues/888', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43464', 'https://github.com/intelliants/subrion'}
null
Packagist
GHSA-79hv-pfx6-hhpj
Cross-site scripting (XSS)
Cross-site scripting (XSS) in modules/content/admin/content.php in ImpressCMS profile 1.4.2 allows remote attackers to inject arbitrary web script or HTML parameters through the "Display Name" field.
{'CVE-2021-28088'}
2021-03-12T19:56:01Z
2021-03-12T21:34:02Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-28088', 'https://anotepad.com/note/read/s3kkk6h7', 'https://hackerone.com/reports/1119296'}
null
Packagist
GHSA-crf2-xm6x-46p6
Observable Timing Discrepancy in OpenMage LTS
### Impact This vulnerability allows to circumvent the **formkey protection** in the Admin Interface and increases the attack surface for **Cross Site Request Forgery** attacks ### Patches The latest OpenMage Versions up from 19.4.6 and 20.0.2 have this Issue solved ### References Related to Adobes CVE-2020-9690 ( https://helpx.adobe.com/security/products/magento/apsb20-47.html ) fixed in Magento2 https://github.com/magento/magento2/commit/52d72b8010c9cecb5b8e3d98ec5edc1ddcc65fb4 as part of 2.4.0/2.3.5-p2
{'CVE-2020-15151'}
2021-11-19T15:36:13Z
2020-08-19T18:02:36Z
HIGH
null
{'CWE-203', 'CWE-352'}
{'https://github.com/OpenMage/magento-lts', 'https://helpx.adobe.com/security/products/magento/apsb20-47.html', 'https://github.com/OpenMage/magento-lts/security/advisories/GHSA-crf2-xm6x-46p6', 'https://github.com/OpenMage/magento-lts/commit/7c526bc6a6a51b57a1bab4c60f104dc36cde347a', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15151'}
null
Packagist
GHSA-2rxh-h6h9-qrqc
Class destructors causing side-effects when being unserialized in TYPO3 CMS
Calling unserialize() on malicious user-submitted content can result in the following scenarios: - trigger deletion of arbitrary directory in file system (if writable for web server) - trigger message submission via email using identity of web site (mail relay) Another insecure deserialization vulnerability is required to actually exploit mentioned aspects. Update to TYPO3 versions 9.5.17 or 10.4.2 that fix the problem described. ### References * https://typo3.org/security/advisory/typo3-core-sa-2020-004
{'CVE-2020-11066'}
2021-01-08T20:16:34Z
2020-05-13T23:18:38Z
HIGH
null
{'CWE-915'}
{'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-2rxh-h6h9-qrqc', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11066'}
null
Packagist
GHSA-64fq-9c6w-rq44
Improper Neutralization of Formula Elements in a CSV File in Kimai 2
A CSV Injection vulnerablity exists in Kimai Kimai 2 prior to 1.14.1 via a description in a new timesheet.
{'CVE-2021-43515'}
2022-04-22T20:21:47Z
2022-04-09T00:00:25Z
HIGH
null
{'CWE-1236'}
{'https://github.com/kevinpapst/kimai2/pull/2532', 'https://github.com/kevinpapst/kimai2/commit/dad1b8b772947f1596175add1b4f33b791705507#diff-6774f5865dbaf8bc6c55b75bd92e6f9950ebe7834aa2efd828a19fd637e667cf', 'https://github.com/kevinpapst/kimai2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43515'}
null
Packagist
GHSA-qcgx-7p5f-hxvr
Discoverability of user password hash in Statamic CMS
## Description It was possible to confirm a single character of a user's password hash (just the hash, not the password) using a specially crafted regular expression filter in the users endpoint of the REST API. Many requests could eventually uncover the entire hash. The hash would not be in the response, however the presence or absence of a result would confirm if the character was in the right position. It would take a long time since the API has throttling enabled by default. Additionally, the REST API would need to be enabled, as well as the users endpoint. Both of which are disabled by default. ## Resolution Filtering by password or password hash has been disabled. ## Credits We would like to thank Thibaud Kehler for reporting the issue.
{'CVE-2022-24784'}
2022-03-29T22:11:45Z
2022-03-29T22:11:45Z
LOW
null
{'CWE-326', 'CWE-200'}
{'https://github.com/statamic/cms', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24784', 'https://github.com/statamic/cms/security/advisories/GHSA-qcgx-7p5f-hxvr', 'https://github.com/statamic/cms/issues/5604', 'https://github.com/statamic/cms/pull/5568'}
null
Packagist
GHSA-q348-f93x-9gx4
Lack of Input Validation in zendesk_api_client_php for Zendesk Subdomain
### Impact Lack of input validation of the Zendesk subdomain could expose users of the library to Server Side Request Forgery (SSRF). ### Resolution Validate the provided Zendesk subdomain to be a valid subdomain in: * getAuthUrl * getAccessToken
{'CVE-2021-30492'}
2021-04-28T22:29:16Z
2021-04-29T21:53:06Z
CRITICAL
null
{'CWE-918', 'CWE-20'}
{'https://github.com/zendesk/zendesk_api_client_php/commit/b451b743d9d6d81a9abf7cb86e70ec9c5332123e', 'https://github.com/zendesk/zendesk_api_client_php/pull/466', 'https://github.com/zendesk/zendesk_api_client_php/security/advisories/GHSA-q348-f93x-9gx4'}
null
Packagist
GHSA-59x4-67mh-px54
Crypt_GPG does not prevent additional options in GPG calls
The Crypt_GPG extension before 1.6.7 for PHP does not prevent additional options in GPG calls, which presents a risk for certain environments and GPG versions.
{'CVE-2022-24953'}
2022-03-01T18:36:13Z
2022-02-18T00:00:36Z
MODERATE
null
{'CWE-20'}
{'https://github.com/pear/Crypt_GPG/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24953', 'https://github.com/pear/Crypt_GPG/commit/29c0fbe96d0d4063ecd5c9a4644cb65a7fb7cc4e', 'https://github.com/pear/Crypt_GPG/commit/74c8f989cefbe0887274b461dc56197e121bfd04'}
null
Packagist
GHSA-h6m7-j4h3-9rf5
Remote Code Execution in SyliusResourceBundle
### Impact Request parameters injected inside an expression evaluated by `symfony/expression-language` package haven't been sanitized properly. This allows the attacker to access any public service by manipulating that request parameter, allowing for Remote Code Execution. The vulnerable versions include: `<=1.3.13 || >=1.4.0 <=1.4.6 || >=1.5.0 <=1.5.1 || >=1.6.0 <=1.6.3`. ### Example ```yaml sylius_grid: grids: foo: fields: bar: options: baz: "expr:service('sylius.repository.product').find($id)" ``` In this case, `$id` can be prepared in a way that calls other services. If you visit `/route?id="~service('doctrine').getManager().getConnection().executeQuery("DELETE * FROM TABLE")~"`, it will result in a following expression `expr:service('repository').find(""~service('doctrine').getManager().getConnection().executeQuery("DELETE * FROM TABLE")~"")`, which will execute a query on the currently connected database. To find a vulnerability in your application, look for any routing definition that uses request parameters inside expression language. ### Patches This issue has been patched for versions 1.3.14, 1.4.7, 1.5.2 and 1.6.4. Versions prior to 1.3 were not patched. ### Workarounds The fix requires adding `addslashes` in `OptionsParser::parseOptionExpression` to sanitize user input before evaluating it using the expression language. ```php - return is_string($variable) ? sprintf('"%s"', $variable) : $variable; + return is_string($variable) ? sprintf('"%s"', addslashes($variable)) : $variable; ``` ### Acknowledgements This security issue has been reported by Craig Blanchette (@isometriks), thanks a lot! ### For more information If you have any questions or comments about this advisory: * Email us at [[email protected]](mailto:[email protected])
{'CVE-2020-15146'}
2021-11-19T15:36:47Z
2020-08-19T19:52:30Z
CRITICAL
null
{'CWE-917', 'CWE-74'}
{'https://github.com/Sylius/SyliusResourceBundle', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15146', 'https://github.com/Sylius/SyliusResourceBundle/security/advisories/GHSA-h6m7-j4h3-9rf5'}
null
Packagist
GHSA-5rcc-6cmj-7728
Cross-site Scripting in BookStack
Iframe tags don't have a sandbox attribute, this makes an attacker able to execute malicious javascript via an iframe and perform phishing attacks. The sandbox attribute will block script execution and prevents the content to navigate its top-level browsing context which will stop this type of attack.
{'CVE-2022-0877'}
2022-03-14T21:03:33Z
2022-03-09T00:00:44Z
MODERATE
null
{'CWE-79'}
{'https://huntr.dev/bounties/b04df4e3-ae5a-4dc6-81ec-496248b15f3c', 'https://github.com/bookstackapp/bookstack', 'https://github.com/bookstackapp/bookstack/commit/856fca8289b7370cafa033ea21c408e7d4303fd6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0877'}
null
Packagist
GHSA-vpq7-m4qm-p2gp
Business Logic Errors in microweber
Business Logic Errors in Packagist microweber/microweber prior to 1.2.11.
{'CVE-2022-0596'}
2022-02-24T13:55:54Z
2022-02-16T00:01:45Z
MODERATE
null
null
{'https://github.com/microweber/microweber', 'https://github.com/microweber/microweber/commit/91a9d899741557c75050614ff7adb8c0e3feb005', 'https://huntr.dev/bounties/f68b994e-2b8b-49f5-af2a-8cd99e8048a5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0596'}
null
Packagist
GHSA-h7f9-cvh5-qw7f
Path traversal in pimcore/pimcore
This affects the package pimcore/pimcore before 6.8.8. A Local FIle Inclusion vulnerability exists in the downloadCsvAction function of the CustomReportController class (bundles/AdminBundle/Controller/Reports/CustomReportController.php). An authenticated user can reach this function with a GET request at the following endpoint: /admin/reports/custom-report/download-csv?exportFile=&91;filename]. Since exportFile variable is not sanitized, an attacker can exploit a local file inclusion vulnerability.
{'CVE-2021-23340'}
2021-02-24T07:37:55Z
2021-02-25T16:32:46Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23340', 'https://github.com/pimcore/pimcore/commit/1786bdd4962ee51544fad537352c2b4223309442', 'https://github.com/pimcore/pimcore/blob/v6.7.2/bundles/AdminBundle/Controller/Reports/CustomReportController.php%23L454', 'https://snyk.io/vuln/SNYK-PHP-PIMCOREPIMCORE-1070132'}
null
Packagist
GHSA-mj9p-v2r8-wf8w
Cross-site scripting in SimpleSAMLphp
### Background SimpleSAMLphp allows users to report errors and failures to the system administrators via a web form. This web form gathers some contextual information automatically, but it also allows the user to provide their email address for follow-ups and a free-text explanation of what happened. Once submitted, the report is sent as an email to the administrative email address configured in the software. ### Description The `www/erroreport.php` script allows error reports to be submitted and sent to the system administrator. Starting with SimpleSAMLphp 1.18.0, a new `SimpleSAML\Utils\EMail` class was introduced to handle sending emails, implemented as a wrapper of an external dependency. This new wrapper allows us to use Twig templates in order to create the email sent with an error report. Since Twig provides automatic escaping of variables, manual escaping of the free-text field in `www/errorreport.php` was removed to avoid double escaping. However, for those not using the new user interface yet, an email template is hardcoded into the class itself in plain PHP. Since no escaping is provided in this template, it is then possible to inject HTML inside the template by manually crafting the contents of the free-text field. ### Affected versions SimpleSAMLphp versions 1.18.0 to 1.18.3, both inclusive. ### Impact An attacker may take advantage of this issue to manually craft a modified email sent via the error reporting mechanism, such as this email might trick a system administrator into performing an action, such as introducing their credentials into a phishing web site that resembles the original. Remote execution of javascript code is considered unfeasible since email clients do not run javascript present in emails, although there might be email clients which don't follow this rule, making the attack surface grow. ### Resolution Upgrade the SimpleSAMLphp installation to version 1.18.4. ### Credit This vulnerability was discovered and reported by Frederic Vleminckx.
{'CVE-2020-5226'}
2021-01-08T20:32:54Z
2020-01-24T21:26:54Z
LOW
null
{'CWE-79'}
{'https://github.com/simplesamlphp/simplesamlphp/security/advisories/GHSA-mj9p-v2r8-wf8w', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5226', 'https://simplesamlphp.org/security/202001-01'}
null
Packagist
GHSA-v9p9-535w-4285
Prototype Pollution in litespeed.js and appwrite/server-ce
This affects the package litespeed.js before 0.3.12; the package appwrite/server-ce from 0.12.0 and before 0.12.2, before 0.11.1. When parsing the query string in the getJsonFromUrl function, the key that is set in the result object is not properly sanitized leading to a Prototype Pollution vulnerability.
{'CVE-2021-23682'}
2022-02-25T15:40:33Z
2022-02-17T00:00:32Z
CRITICAL
null
{'CWE-1321'}
{'https://github.com/litespeed-js/litespeed.js/pull/18', 'https://snyk.io/vuln/SNYK-JS-LITESPEEDJS-2359250', 'https://github.com/appwrite/appwrite/pull/2778', 'https://snyk.io/vuln/SNYK-PHP-APPWRITESERVERCE-2401820', 'https://github.com/appwrite/appwrite/releases/tag/0.12.2', 'https://github.com/appwrite/appwrite/releases/tag/0.11.1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23682'}
null
Packagist
GHSA-x2j7-6hxm-87p3
Remote code injection
An issue was discovered in Craft CMS before 3.6.7. In some circumstances, a potential Remote Code Execution vulnerability existed on sites that did not restrict administrative changes (if an attacker were somehow able to hijack an administrator's session).
{'CVE-2021-27903'}
2021-07-07T17:13:30Z
2021-07-02T18:36:41Z
CRITICAL
null
{'CWE-94', 'CWE-74'}
{'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#security', 'https://github.com/craftcms/cms/commit/c17728fa0bec11d3b82c34defe0930ed409aec38', 'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#367---2021-02-23', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27903'}
null
Packagist
GHSA-xv7v-rf6g-xwrc
Directory Traversal in typo3/phar-stream-wrapper
The PharStreamWrapper (aka phar-stream-wrapper) package 2.x before 2.1.1 and 3.x before 3.1.1 for TYPO3 does not prevent directory traversal, which allows attackers to bypass a deserialization protection mechanism, as demonstrated by a phar:///path/bad.phar/../good.phar URL.
{'CVE-2019-11831'}
2021-09-30T16:49:05Z
2021-09-30T17:10:14Z
CRITICAL
null
{'CWE-502', 'CWE-22'}
{'https://github.com/TYPO3/phar-stream-wrapper/releases/tag/v2.1.1', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11831', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E3NUKPG7V4QEM6QXRMHYR4ABFMW5MM2P/', 'https://github.com/TYPO3/phar-stream-wrapper/releases/tag/v3.1.1', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/Z246UWBXBEKTQUDTLRJTC7XYBIO4IBE4/', 'https://www.synology.com/security/advisory/Synology_SA_19_22', 'http://www.securityfocus.com/bid/108302', 'https://lists.debian.org/debian-lts-announce/2019/05/msg00029.html', 'https://www.drupal.org/sa-core-2019-007', 'https://typo3.org/security/advisory/typo3-psa-2019-007/', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/AUEXS4HRI4XZ2DTZMWAVQBYBTFSJ34AR/', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/65ODQHDHWR74L6TCAPAQR5FQHG6MCXAW/', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/U6JX7WR6DPMKCZQP7EYFACYXSGJ3K523/', 'https://www.debian.org/security/2019/dsa-4445', 'https://github.com/TYPO3/phar-stream-wrapper', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/6QDJVUJPUW3RZ4746SC6BX4F4T6ZXNBH/', 'https://seclists.org/bugtraq/2019/May/36'}
null
Packagist
GHSA-w2fr-65vp-mxw3
Deserialization of untrusted data in Symfony
In Symfony before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, it is possible to cache objects that may contain bad user input. On serialization or unserialization, this could result in the deletion of files that the current user has access to. This is related to symfony/cache and symfony/phpunit-bridge.
{'CVE-2019-10912'}
2021-08-19T17:12:23Z
2020-02-12T18:44:50Z
HIGH
null
{'CWE-502'}
{'https://lists.fedoraproject.org/archives/list/[email protected]/message/BHHIG4GMSGEIDT3RITSW7GJ5NT6IBHXU/', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10912.yaml', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/ZLOZX5BZMQKWG7PJRQL6MB5CAMKBQAWD/', 'https://symfony.com/blog/cve-2019-10912-prevent-destructors-with-side-effects-from-being-unserialized', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/LFARAUAWZE4UDSKVDWRD35D75HI5UGSD/', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/6QEAOZXVNDA63537A2OIH4QE77EKZR5O/', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/42UEKSLKJB72P24JBWVN6AADHLMYSUQD/', 'https://symfony.com/cve-2019-10912', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/MDSM576XIOVXVCMHNJHLBBZBTOD62LDA/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10912', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BAC2TQVEEH5FDJSSWPM2BCRIPTCOEMMO/', 'https://seclists.org/bugtraq/2019/May/21', 'https://github.com/symfony/symfony/commit/4fb975281634b8d49ebf013af9e502e67c28816b', 'https://www.debian.org/security/2019/dsa-4441', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/phpunit-bridge/CVE-2019-10912.yaml', 'https://typo3.org/security/advisory/typo3-core-sa-2019-016/', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/cache/CVE-2019-10912.yaml', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/RTJGZJLPG5FHKFH7KNAKNTWOGBB6LXAL/'}
null
Packagist
GHSA-8xv9-qcr9-ww9j
Authenticated XML External Entity Processing
### Impact Authenticated XML External Entity Processing ### Patches We recommend to update to the current version 6.3.2.1. You can get the update to 6.3.2.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ### Workarounds For older versions of 6.1 and 6.2 the corresponding changes are also available via plugin: https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659 ### For more information https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-10-2020
null
2021-10-04T21:28:06Z
2020-10-19T21:32:18Z
MODERATE
null
{'CWE-611'}
{'https://github.com/shopware/platform', 'https://github.com/shopware/platform/security/advisories/GHSA-8xv9-qcr9-ww9j', 'https://snyk.io/vuln/SNYK-PHP-SHOPWAREPLATFORM-1019470'}
null
Packagist
GHSA-j85q-whc9-g4p9
Use of Cryptographically Weak Pseudo-Random Number Generator in showdoc
showdoc is vulnerable to Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
{'CVE-2021-3678'}
2021-08-16T23:13:12Z
2021-09-02T17:07:48Z
MODERATE
null
{'CWE-338'}
{'https://github.com/star7th/showdoc/commit/4b962c1740311e0d46775023b6acba39ad60e370', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3678', 'https://huntr.dev/bounties/f9a9defd-29ea-4442-b692-ff1512813de4'}
null
Packagist
GHSA-m2q4-qghh-p9cq
Server-Side Request Forgery in yoast_seo
The yoast_seo (aka Yoast SEO) extension before 7.2.1 for TYPO3 allows SSRF via a backend user account.
{'CVE-2021-31779'}
2021-05-20T22:39:55Z
2021-05-21T19:21:38Z
MODERATE
null
{'CWE-918'}
{'https://typo3.org/security/advisory/typo3-ext-sa-2021-006', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31779'}
null
Packagist
GHSA-cv9j-78f7-w6v9
Incorrect Authorization in TYPO3 extension
The l10nmgr (aka Localization Manager) extension before 7.4.0, 8.x before 8.7.0, and 9.x before 9.2.0 for TYPO3 allows Information Disclosure (translatable fields).
{'CVE-2020-25025'}
2021-07-28T19:21:31Z
2021-07-26T21:41:22Z
MODERATE
null
{'CWE-863'}
{'https://typo3.org/help/security-advisories', 'https://typo3.org/security/advisory/typo3-ext-sa-2020-016', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25025'}
null
Packagist
GHSA-jp6h-mxhx-pgqh
Shopware guest session is shared between customers
### Impact Guest sessions are shared between customers when HTTP cache is enabled. Setups with Varnish are not affected by this issue ## Patches We recommend updating to the current version 6.4.8.2. You can get the update to 6.4.8.2 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ## Workarounds ### Security Plugin For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. ### Disable HTTP Cache Disabling HTTP Cache is also a valid workaround
{'CVE-2022-24745'}
2022-03-24T00:22:07Z
2022-03-10T17:28:55Z
MODERATE
null
{'CWE-384'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24745', 'https://github.com/shopware/platform', 'https://github.com/shopware/platform/security/advisories/GHSA-jp6h-mxhx-pgqh', 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-03-2022?_ga=2.159980029.1931762803.1646933116-1088482757.1646933116'}
null
Packagist
GHSA-4jhw-2p6j-5wmp
Open Redirection in Login Handling
### Problem It has been discovered that Login Handling is susceptible to open redirection which allows attackers redirecting to arbitrary content, and conducting phishing attacks. No authentication is required in order to exploit this vulnerability. ### Solution Update to TYPO3 versions 6.2.57, 7.6.51, 8.7.40, 9.5.25, 10.4.14, 11.1.1 that fix the problem described. ### Credits Thanks to Alexander Kellner who reported this issue and to TYPO3 security team member Torben Hansen who fixed the issue. ### References * [TYPO3-CORE-SA-2021-001](https://typo3.org/security/advisory/typo3-core-sa-2021-001)
{'CVE-2021-21338'}
2021-03-29T18:07:53Z
2021-03-23T01:53:35Z
MODERATE
null
{'CWE-601'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21338', 'https://packagist.org/packages/typo3/cms-core', 'https://typo3.org/security/advisory/typo3-core-sa-2021-001', 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-4jhw-2p6j-5wmp'}
null
Packagist
GHSA-952m-m83c-3xm6
Open redirect in direct_mail
The direct_mail extension through 5.2.3 for TYPO3 has an Open Redirect via jumpUrl.
{'CVE-2020-12699'}
2021-05-21T23:05:25Z
2021-05-24T16:58:37Z
MODERATE
null
{'CWE-601'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-12699', 'https://typo3.org/help/security-advisories', 'https://typo3.org/security/advisory/typo3-ext-sa-2020-005'}
null
Packagist
GHSA-x752-qjv4-c4hc
Remote code injection in dompdf/dompdf
Dompdf is an HTML to PDF converter. Dompdf before 1.2.1 allows remote code execution via a .php file in the src:url field of an @font-face Cascading Style Sheets (CSS) statement (within an HTML input file).
{'CVE-2022-28368'}
2022-04-15T16:49:27Z
2022-04-04T00:00:55Z
CRITICAL
null
{'CWE-74'}
{'https://snyk.io/blog/security-alert-php-pdf-library-dompdf-rce/', 'https://packagist.org/packages/dompdf/dompdf#v1.2.1', 'https://github.com/snyk-labs/php-goof', 'https://github.com/dompdf/dompdf/issues/2598', 'https://github.com/dompdf/dompdf', 'https://nvd.nist.gov/vuln/detail/CVE-2022-28368', 'https://github.com/dompdf/dompdf/commit/4c70e1025bcd9b7694b95dd552499bd83cd6141d', 'https://github.com/dompdf/dompdf/pull/2808'}
null
Packagist
GHSA-xx8f-qf9f-5fgw
Remote code execution in zendframework and laminas-http
Zend Framework 3.0.0 has a deserialization vulnerability that can lead to remote code execution if the content is controllable, related to the __destruct method of the Zend\Http\Response\Stream class in Stream.php. NOTE: the code may be related to Laminas Project laminas-http. Zend Framework is no longer supported by the maintainer. However, not all Zend Framework 3.0.0 vulnerabilities exist in a Laminas Project release.
{'CVE-2021-3007'}
2021-04-07T18:11:15Z
2021-06-08T20:11:19Z
CRITICAL
null
{'CWE-502'}
{'https://github.com/laminas/laminas-http/commits/2.15.x/src/Response/Stream.php', 'https://github.com/laminas/laminas-http/pull/48', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3007', 'https://research.checkpoint.com/2021/freakout-leveraging-newest-vulnerabilities-for-creating-a-botnet/', 'https://github.com/laminas/laminas-http/releases/tag/2.14.2', 'https://github.com/Ling-Yizhou/zendframework3-/blob/main/zend%20framework3%20%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%20rce.md'}
null
Packagist
GHSA-c32w-3cqh-f6jx
Weak Password Recovery Mechanism for Forgotten Password
In “Dolibarr” application, v2.8.1 to v13.0.2 are vulnerable to account takeover via password reset functionality. A low privileged attacker can reset the password of any user in the application using the password reset link the user received through email when requested for a forgotten password.
{'CVE-2021-25957'}
2021-10-21T14:15:19Z
2021-09-02T17:08:33Z
HIGH
null
{'CWE-640'}
{'https://github.com/Dolibarr/dolibarr/commit/87f9530272925f0d651f59337a35661faeb6f377', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25957', 'https://github.com/Dolibarr/dolibarr', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25957'}
null