schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringclasses
11 values
aliases
stringlengths
2
20
summary
stringlengths
4
172
details
stringlengths
47
3.95k
severity
stringlengths
2
79
affected
stringlengths
76
3.32k
references
stringlengths
82
11.3k
database_specific
stringlengths
131
190
1.4.0
GHSA-hvmf-r92r-27hr
2021-08-19T16:04:59Z
2019-12-04T21:26:28Z
null
['CVE-2019-19118']
Django allows unintended model editing
Django 2.1 before 2.1.15 and 2.2 before 2.2.8 allows unintended model editing. A Django model admin displaying inline related models, where the user has view-only permissions to a parent model but edit permissions to the inline model, would be presented with an editing UI, allowing POST requests, for updating the inline model. Directly editing the view-only parent model was not possible, but the parent model's save() method was called, triggering potential side effects, and causing pre and post-save signal handlers to be invoked. (To resolve this, the Django admin is adjusted to require edit permissions on the parent model in order for inline models to be editable.)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.15'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19118'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/103ebe2b5ff1b2614b85a52c239f471904d26244'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/36f580a17f0b3cb087deadf3b65eea024f479c21'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/dev/releases/security/'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/django-announce/GjGqDvtNmWQ'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/6R4HD22PVEVQ45H2JA2NXH443AYJOPL5/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202004-17'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20191217-0003/'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2019/dec/02/security-releases/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/12/02/1'}]
{'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-04T19:44:26Z', 'nvd_published_at': None}
1.4.0
GHSA-v63x-xc9j-hhvq
2021-07-28T16:43:29Z
2019-12-11T02:01:44Z
null
['CVE-2019-10769']
Sandbox Breakout / Arbitrary Code Execution in safer-eval
All versions of `safer-eval` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context and is not suited to process arbitrary user input. This may allow attackers to execute arbitrary code in the system. ## Recommendation The package is not meant to receive user input. Consider using an alternative package until a fix is made available.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'safer-eval'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/commenthol/safer-eval/security/advisories/GHSA-v63x-xc9j-hhvq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10769'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-v63x-xc9j-hhvq'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SAFEREVAL-534901'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1428'}]
{'cwe_ids': ['CWE-20', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:57Z', 'nvd_published_at': '2019-12-06T23:15:00Z'}
1.4.0
GHSA-x92h-wmg2-6hp7
2021-08-19T15:18:27Z
2019-12-02T18:10:24Z
null
['CVE-2019-10913']
Invalid HTTP method overrides allow possible XSS or other attacks in Symfony
In Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, HTTP Methods provided as verbs or using the override header may be treated as trusted input, but they are not validated, possibly causing SQL injection or XSS. This is related to symfony/http-foundation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-foundation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.51'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-foundation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.50'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-foundation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.26'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-foundation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-foundation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.51'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.50'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.26'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10913'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/commit/944e60f083c3bffbc6a0b5112db127a10a66a8ec'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/http-foundation/CVE-2019-10913.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10913.yaml'}, {'type': 'WEB', 'url': 'https://symfony.com/blog/cve-2019-10913-reject-invalid-http-method-overrides'}, {'type': 'WEB', 'url': 'https://symfony.com/cve-2019-10913'}]
{'cwe_ids': ['CWE-79', 'CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-12-01T19:49:35Z', 'nvd_published_at': None}
1.4.0
GHSA-2mrj-435v-c2cr
2020-06-16T20:41:51Z
2019-12-02T18:15:31Z
2020-06-16T20:15:24Z
[]
possible DoS caused by malformed signature decoding in Pure-Python ECDSA
**Withdrawn:** Duplicate of GHSA-pwfw-mgfj-7g3g.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'ecdsa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14853'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14853'}, {'type': 'WEB', 'url': 'https://github.com/warner/python-ecdsa/releases/tag/python-ecdsa-0.13.3'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Dec/33'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4588'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-02T01:15:50Z', 'nvd_published_at': None}
1.4.0
GHSA-4328-8hgf-7wjr
2022-08-11T00:00:45Z
2019-12-13T15:39:32Z
null
['CVE-2019-16777']
npm Vulnerable to Global node_modules Binary Overwrite
Versions of the npm CLI prior to 6.13.4 are vulnerable to a Global node_modules Binary Overwrite. It fails to prevent existing globally-installed binaries to be overwritten by other package installations. For example, if a package was installed globally and created a `serve` binary, any subsequent installs of packages that also create a `serve` binary would overwrite the first binary. This will not overwrite system binaries but only binaries put into the global node_modules directory. This behavior is still allowed in local installations and also through install scripts. This vulnerability bypasses a user using the --ignore-scripts install option. ## Recommendation Upgrade to version 6.13.4 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'npm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.13.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/npm/cli/security/advisories/GHSA-4328-8hgf-7wjr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16777'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHEA-2020:0330'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0573'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0579'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0597'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0602'}, {'type': 'WEB', 'url': 'https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4328-8hgf-7wjr'}, {'type': 'PACKAGE', 'url': 'https://github.com/npm/cli'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202003-48'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1437'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00027.html'}]
{'cwe_ids': ['CWE-22', 'CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:57:02Z', 'nvd_published_at': '2019-12-13T01:15:00Z'}
1.4.0
GHSA-4mvc-qc5w-v5qr
2023-09-20T19:22:55Z
2019-12-17T22:53:34Z
null
['CVE-2019-19712']
Information disclosure in the Contao backend
### Impact Backend users can manipulate the details view URL to show pages and articles that have not been enabled for them. ### Patches Update to Contao 4.4.46 or 4.8.6. ### Workarounds None. ### References https://contao.org/en/security-advisories/information-disclosure-in-the-back-end ### For more information If you have any questions or comments about this advisory, open an issue in [contao/contao](https://github.com/contao/contao/issues/new/choose).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'contao/core-bundle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.4.46'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'contao/core-bundle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.5.0'}, {'fixed': '4.8.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/contao/contao/security/advisories/GHSA-4mvc-qc5w-v5qr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19712'}, {'type': 'WEB', 'url': 'https://contao.org/en/security-advisories/information-disclosure-in-the-back-end.html'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/contao/core-bundle/CVE-2019-19712.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/contao/contao'}]
{'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-17T19:35:52Z', 'nvd_published_at': None}
1.4.0
GHSA-q58g-455p-8vw9
2021-10-29T14:10:27Z
2019-12-16T19:30:17Z
null
['CVE-2019-16779']
In RubyGem excon, interrupted Persistent Connections May Leak Response Data
### Impact There was a race condition around persistent connections, where a connection which is interrupted (such as by a timeout) would leave data on the socket. Subsequent requests would then read this data, returning content from the previous response. The race condition window appears to be short, and it would be difficult to purposefully exploit this. ### Patches The problem has been patched in 0.71.0, users should upgrade to this or a newer version (if one exists). ### Workarounds Users can workaround the problem by disabling persistent connections, though this may cause performance implications. ### References See the [patch](https://github.com/excon/excon/commit/ccb57d7a422f020dc74f1de4e8fb505ab46d8a29) for further details. ### For more information If you have any questions or comments about this advisory: * Open an issue in [excon/issues](https://github.com/excon/excon/issues) * Email us at [[email protected]](mailto:[email protected])
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'excon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.71.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/excon/excon/security/advisories/GHSA-q58g-455p-8vw9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16779'}, {'type': 'WEB', 'url': 'https://github.com/excon/excon/commit/ccb57d7a422f020dc74f1de4e8fb505ab46d8a29'}, {'type': 'PACKAGE', 'url': 'https://github.com/excon/excon'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/excon/CVE-2019-16779.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/01/msg00015.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00021.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00062.html'}]
{'cwe_ids': ['CWE-362', 'CWE-664'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-16T19:28:10Z', 'nvd_published_at': '2019-12-16T20:15:00Z'}
1.4.0
GHSA-m6cx-g6qm-p2cx
2021-10-21T21:16:09Z
2019-12-13T15:39:19Z
null
['CVE-2019-16775']
Arbitrary File Write in npm
Versions of the npm CLI prior to 6.13.3 are vulnerable to an Arbitrary File Write. It fails to prevent access to folders outside of the intended node_modules folder through the bin field. A properly constructed entry in the package.json bin field would allow a package publisher to create files on a user's system when the package is installed. It is only possible to affect files that the user running `npm install` has access to and it is not possible to over write files that already exist on disk. This behavior is still possible through install scripts. This vulnerability bypasses a user using the --ignore-scripts install option. ## Recommendation Upgrade to version 6.13.3 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'npm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.13.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/npm/cli/security/advisories/GHSA-m6cx-g6qm-p2cx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16775'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHEA-2020:0330'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0573'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0579'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0597'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0602'}, {'type': 'WEB', 'url': 'https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-m6cx-g6qm-p2cx'}, {'type': 'PACKAGE', 'url': 'https://github.com/npm/cli'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1434'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00027.html'}]
{'cwe_ids': ['CWE-59', 'CWE-61'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T16:30:50Z', 'nvd_published_at': '2019-12-13T01:15:00Z'}
1.4.0
GHSA-rh46-3fgc-mvrf
2021-08-19T16:05:30Z
2019-12-04T21:25:28Z
null
['CVE-2019-19507']
Validation bypass is possible in Json Pattern Validator
In jpv (aka Json Pattern Validator) before 2.1.1, compareCommon() can be bypassed because certain internal attributes can be overwritten via a conflicting name, as demonstrated by 'constructor': {'name':'Array'}. This affects validate(). Hence, a crafted payload can overwrite this builtin attribute to manipulate the type detection result.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'jpv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19507'}, {'type': 'WEB', 'url': 'https://github.com/manvel-khnkoyan/jpv/issues/6'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/jpv'}]
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-04T19:47:26Z', 'nvd_published_at': None}
1.4.0
GHSA-qhrx-hcm6-pmrw
2023-01-17T13:55:02Z
2019-12-02T18:12:26Z
null
['CVE-2019-11458']
Unsafe deserialization in SmtpTransport in CakePHP
An issue was discovered in SmtpTransport in CakePHP 3.7.6. An unserialized object with modified internal properties can trigger arbitrary file overwriting upon destruction.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.5.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.6.0'}, {'fixed': '3.6.15'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.0'}, {'fixed': '3.7.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11458'}, {'type': 'WEB', 'url': 'https://github.com/cakephp/cakephp/commit/1a74e798309192a9895c9cedabd714ceee345f4e'}, {'type': 'WEB', 'url': 'https://bakery.cakephp.org/2019/04/23/cakephp_377_3615_3518_released.html'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/cakephp/cakephp/CVE-2019-11458.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/cakephp/cakephp'}, {'type': 'WEB', 'url': 'https://github.com/cakephp/cakephp/commits/master'}, {'type': 'WEB', 'url': 'https://github.com/cakephp/cakephp/compare/3.7.6...3.7.7'}, {'type': 'WEB', 'url': 'https://github.com/cakephp/cakephp/releases'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-12-02T00:51:02Z', 'nvd_published_at': None}
1.4.0
GHSA-484f-743f-6jx2
2022-07-05T18:07:34Z
2019-12-12T22:50:20Z
null
['CVE-2019-16774']
Object injection in cookie driver in phpfastcache
### Impact An possible object injection has been discovered in cookie driver prior 5.0.13 versions (of 5.x releases). ### Patches The issue has been addressed by enforcing JSON conversion when deserializing ### Workarounds If you can't fix it, use another driver such as "Files" (Filesystem) ### References Fixing release: https://github.com/PHPSocialNetwork/phpfastcache/releases/tag/5.0.13 ### For more information If you have any questions or comments about this advisory: * Open an issue in [the issue tracker](https://github.com/PHPSocialNetwork/phpfastcache/issues) * Email us at [[email protected]](mailto:[email protected])
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpfastcache/phpfastcache'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.13'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/PHPSocialNetwork/phpfastcache/security/advisories/GHSA-484f-743f-6jx2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16774'}, {'type': 'WEB', 'url': 'https://github.com/PHPSocialNetwork/phpfastcache/commit/c4527205cb7a402b595790c74310791f5b04a1a4'}, {'type': 'PACKAGE', 'url': 'https://github.com/PHPSocialNetwork/phpfastcache'}, {'type': 'WEB', 'url': 'https://github.com/PHPSocialNetwork/phpfastcache/releases/tag/5.0.13'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-484f-743f-6jx2'}]
{'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:57:47Z', 'nvd_published_at': None}
1.4.0
GHSA-6xc2-mj39-q599
2022-08-02T15:09:07Z
2019-12-02T18:20:41Z
null
['CVE-2019-18818']
Strapi allows unauthenticated attacker to reset admin password without valid reset token
Versions of `strapi` prior to 3.0.0-beta.17.5 are vulnerable to Privilege Escalation. The password reset routes allows an unauthenticated attacker to reset an admin's password without providing a valid password reset token. ## Recommendation Upgrade to version 3.0.0-beta.17.5 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'strapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0-beta.17.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.0-beta.17.4'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-18818'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/pull/4443'}, {'type': 'WEB', 'url': 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18818'}, {'type': 'PACKAGE', 'url': 'https://github.com/strapi/strapi'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/releases/tag/v3.0.0-beta.17.5'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1311'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/163939/Strapi-3.0.0-beta-Authentication-Bypass.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/163950/Strapi-CMS-3.0.0-beta.17.4-Remote-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/165896/Strapi-CMS-3.0.0-beta.17.4-Privilege-Escalation.html'}]
{'cwe_ids': ['CWE-640'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-12-02T17:36:24Z', 'nvd_published_at': '2019-11-07T22:15:00Z'}
1.4.0
GHSA-x8qc-rrcw-4r46
2022-08-10T23:58:46Z
2019-12-13T15:39:26Z
null
['CVE-2019-16776']
npm symlink reference outside of node_modules
Versions of the npm CLI prior to 6.13.3 are vulnerable to a symlink reference outside of node_modules. It is possible for packages to create symlinks to files outside of the`node_modules` folder through the `bin` field upon installation. A properly constructed entry in the package.json bin field would allow a package publisher to create a symlink pointing to arbitrary files on a user’s system when the package is installed. Only files accessible by the user running the `npm install` are affected. This behavior is still possible through install scripts. This vulnerability bypasses a user using the --ignore-scripts install option. ## Recommendation Upgrade to version 6.13.3 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'npm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.13.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/npm/cli/security/advisories/GHSA-x8qc-rrcw-4r46'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16776'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHEA-2020:0330'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0573'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0579'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0597'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0602'}, {'type': 'WEB', 'url': 'https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-x8qc-rrcw-4r46'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1436'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00027.html'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:02:49Z', 'nvd_published_at': '2019-12-13T01:15:00Z'}
1.4.0
GHSA-79gr-58r3-pwm3
2023-09-21T19:46:51Z
2019-12-02T18:07:16Z
null
['CVE-2019-18889']
Symfony Unsafe Cache Serialization Could Enable RCE
An issue was discovered in Symfony 3.4.0 through 3.4.34, 4.2.0 through 4.2.11, and 4.3.0 through 4.3.7. Serializing certain cache adapter interfaces could result in remote code injection. This is related to symfony/cache.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/cache'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.4.35'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/cache'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.2.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/cache'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.4.35'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.2.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-18889'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/cache/CVE-2019-18889.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-18889.yaml'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/releases/tag/v4.3.8'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/UED22BOXTL2SSFMGYKA64ZFHGLLJG3EA/'}, {'type': 'WEB', 'url': 'https://symfony.com/blog/cve-2019-18889-forbid-serializing-abstractadapter-and-tagawareadapter-instances'}, {'type': 'WEB', 'url': 'https://symfony.com/blog/symfony-4-3-8-released'}, {'type': 'WEB', 'url': 'https://symfony.com/cve-2019-18889'}]
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-12-01T19:45:07Z', 'nvd_published_at': None}
1.4.0
GHSA-844w-j86r-4x2j
2021-11-01T14:12:42Z
2019-12-16T20:17:10Z
null
['CVE-2019-16778']
Heap buffer overflow in `UnsortedSegmentSum` in TensorFlow
### Impact A heap buffer overflow in `UnsortedSegmentSum` can be produced when the `Index` template argument is `int32`. In this case `data_size` and `num_segments` fields are truncated from `int64` to `int32` and can produce negative numbers, resulting in accessing out of bounds heap memory. This is unlikely to be exploitable and was detected and fixed internally. We are making the security advisory only to notify users that it is better to update to TensorFlow 1.15 or 2.0 or later as these versions already have this fixed. ### Patches Patched by db4f9717c41bccc3ce10099ab61996b246099892 and released in all official releases after 1.15 and 2.0. ### For more information Please consult [`SECURITY.md`](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-844w-j86r-4x2j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16778'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/db4f9717c41bccc3ce10099ab61996b246099892'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2019-002.md'}]
{'cwe_ids': ['CWE-122', 'CWE-681'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2019-12-16T20:16:12Z', 'nvd_published_at': '2019-12-16T21:15:00Z'}
1.4.0
GHSA-hrqr-hxpp-chr3
2021-11-03T14:59:03Z
2019-12-18T19:01:31Z
null
['CVE-2019-16782']
Possible Information Leak / Session Hijack Vulnerability in Rack
There's a possible information leak / session hijack vulnerability in Rack. Attackers may be able to find and hijack sessions by using timing attacks targeting the session id. Session ids are usually stored and indexed in a database that uses some kind of scheme for speeding up lookups of that session id. By carefully measuring the amount of time it takes to look up a session, an attacker may be able to find a valid session id and hijack the session. The session id itself may be generated randomly, but the way the session is indexed by the backing store does not use a secure comparison. ### Impact The session id stored in a cookie is the same id that is used when querying the backing session storage engine. Most storage mechanisms (for example a database) use some sort of indexing in order to speed up the lookup of that id. By carefully timing requests and session lookup failures, an attacker may be able to perform a timing attack to determine an existing session id and hijack that session. ## Releases The 1.6.12 and 2.0.8 releases are available at the normal locations. ### Workarounds There are no known workarounds. ### Patches To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset. * 1-6-session-timing-attack.patch - Patch for 1.6 series * 2-0-session-timing-attack.patch - Patch for 2.6 series ### Credits Thanks Will Leinweber for reporting this!
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.12'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.8'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/rack/rack/security/advisories/GHSA-hrqr-hxpp-chr3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16782'}, {'type': 'WEB', 'url': 'https://github.com/rack/rack/commit/7fecaee81f59926b6e1913511c90650e76673b38'}, {'type': 'PACKAGE', 'url': 'https://github.com/rack/rack'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2019-16782.yml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/HZXMWILCICQLA2BYSP6I2CRMUG53YBLX/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00016.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/12/18/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/12/18/3'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/12/19/3'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/04/08/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/04/09/2'}]
{'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-18T19:01:07Z', 'nvd_published_at': '2019-12-18T20:15:00Z'}
1.4.0
GHSA-m5ff-3wj3-8ph4
2019-12-26T16:34:06Z
2019-12-26T16:34:38Z
null
[]
HTTP Request Smuggling: Invalid whitespace characters in headers in Waitress
### Impact If a proxy server is used in front of waitress, an invalid request may be sent by an attacker that bypasses the front-end and is parsed differently by waitress leading to a potential for HTTP request smuggling. ``` Content-Length: 10 Transfer-Encoding: [\x0b]chunked ``` For clarity: ``` 0x0b == vertical tab ``` Would get parsed by Waitress as being a `chunked` request, but a front-end server would use the `Content-Length` instead as the `Transfer-Encoding` header is considered invalid due to containing invalid characters. If a front-end server does HTTP pipelining to a backend Waitress server this could lead to HTTP request splitting which may lead to potential cache poisoning or unexpected information disclosure. ### Patches Please upgrade to Waitress 1.4.1 which fixes this issue with stricter HTTP field validation. Waitress 1.4.1 due to this change has become much more strict in what is allowed in header values, while the maintainers don't believe that these changes will cause any issues, it may cause failures with non-conformist reverse proxies or clients, and it is highly recommend that users validate the changes in their environment and make sure it won't cause any unacceptable failures. ### Workarounds You may enable additional protections on front-end servers, those that follow RFC7230 correctly would drop the request with a 400 Bad Request. Waitress will now correctly responds to the request with a 400 Bad Request, and will drop the connection to avoid any potential HTTP pipelining issues. ### References This was mentioned in https://portswigger.net/research/http-desync-attacks-what-happened-next and was specifically mentioned as being an issue in HAProxy which did not properly filter it in this article: https://nathandavison.com/blog/haproxy-http-request-smuggling ### Thanks The Pylons Project would like to thank ZeddYu Lu for doing extended testing against Waitress 1.4.0 and bringing this to our attention! ### For more information If you have any questions or comments about this advisory: * open an issue at https://github.com/Pylons/waitress/issues (if not sensitive or security related) * email the Pylons Security mailing list: [email protected] (if security related)
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'waitress'}, 'ecosystem_specific': {'affected_functions': ['waitress.parser.HTTPRequestParser.parse_header']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/security/advisories/GHSA-m5ff-3wj3-8ph4'}, {'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/commit/11d9e138125ad46e951027184b13242a3c1de017'}]
{'cwe_ids': ['CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-12-26T16:34:06Z', 'nvd_published_at': None}
1.4.0
GHSA-fpff-384j-vxq7
2021-08-19T15:10:08Z
2019-12-02T18:05:13Z
null
['CVE-2019-10763']
Data leakage via SQL Injection in Pimcore
pimcore/pimcore before 6.3.0 is vulnerable to SQL Injection. An attacker with limited privileges (classes permission) can achieve a SQL injection that can lead in data leakage. The vulnerability can be exploited via 'id', 'storeId', 'pageSize' and 'tables' parameters, using a payload for trigger a time based or error based sql injection.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10763'}, {'type': 'WEB', 'url': 'https://blog.certimetergroup.com/it/articolo/security/sql_injection_in_pimcore_6.2.3'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PHP-PIMCOREPIMCORE-480391'}]
{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-27T02:55:07Z', 'nvd_published_at': None}
1.4.0
GHSA-6rmq-x2hv-vxpp
2023-09-08T14:19:06Z
2019-12-02T18:11:25Z
null
['CVE-2019-6338']
Drupal core third-party PEAR Archive_Tar library is vulnerable to Deserialization of Untrusted Data
In Drupal Core versions 7.x prior to 7.62, 8.6.x prior to 8.6.6 and 8.5.x prior to 8.5.9; Drupal core uses the third-party PEAR Archive_Tar library. This library has released a security update which impacts some Drupal configurations. Refer to CVE-2018-1000888 for details
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'drupal/drupal'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.62.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'drupal/drupal'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.5.9'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'drupal/drupal'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.6.0'}, {'fixed': '8.6.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-6338'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/drupal/drupal/CVE-2019-6338.yaml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/02/msg00032.html'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4370'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2019-001'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106706'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-12-02T00:34:49Z', 'nvd_published_at': None}
1.4.0
GHSA-4vpc-5jx4-cfqg
2021-07-28T15:49:16Z
2019-12-02T18:09:21Z
null
['CVE-2019-18886']
User enumeration leak using switch user functionality in Symfony
An issue was discovered in Symfony 4.2.0 to 4.2.11 and 4.3.0 to 4.3.7. The ability to enumerate users was possible due to different handling depending on whether the user existed when making unauthorized attempts to use the switch users functionality. This is related to symfony/security.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.2.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.2.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-18886'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/security-http/CVE-2019-18886.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-18886.yaml'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/releases/tag/v4.3.8'}, {'type': 'WEB', 'url': 'https://symfony.com/blog/cve-2019-18886-prevent-user-enumeration-using-switch-user-functionality'}, {'type': 'WEB', 'url': 'https://symfony.com/blog/symfony-4-3-8-released'}, {'type': 'WEB', 'url': 'https://symfony.com/cve-2019-18886'}]
{'cwe_ids': ['CWE-200', 'CWE-203'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-01T19:47:26Z', 'nvd_published_at': '2019-11-21T18:15:00Z'}
1.4.0
GHSA-g2xc-35jw-c63p
2022-04-25T23:07:24Z
2019-12-20T23:04:18Z
null
['CVE-2019-16786']
HTTP Request Smuggling: Invalid Transfer-Encoding in Waitress
### Impact Waitress would parse the `Transfer-Encoding` header and only look for a single string value, if that value was not `chunked` it would fall through and use the `Content-Length` header instead. According to the HTTP standard `Transfer-Encoding` should be a comma separated list, with the inner-most encoding first, followed by any further transfer codings, ending with `chunked`. Requests sent with: ``` Transfer-Encoding: gzip, chunked ``` Would incorrectly get ignored, and the request would use a `Content-Length` header instead to determine the body size of the HTTP message. This could allow for Waitress to treat a single request as multiple requests in the case of HTTP pipelining. ### Patches This issue is fixed in Waitress 1.4.0. This brings a range of changes to harden Waitress against potential HTTP request confusions, and may change the behaviour of Waitress behind non-conformist proxies. Waitress will now return a 501 Not Implemented error if the `Transfer-Encoding` is not `chunked` or contains multiple elements. Waitress does not support any transfer codings such as `gzip` or `deflate`. The Pylons Project recommends upgrading as soon as possible, while validating that the changes in Waitress don&#39;t cause any changes in behavior. ### Workarounds Various reverse proxies may have protections against sending potentially bad HTTP requests to the backend, and or hardening against potential issues like this. If the reverse proxy doesn&#39;t use HTTP/1.1 for connecting to the backend issues are also somewhat mitigated, as HTTP pipelining does not exist in HTTP/1.0 and Waitress will close the connection after every single request (unless the Keep Alive header is explicitly sent... so this is not a fool proof security method). ### Issues/more security issues: * open an issue at https://github.com/Pylons/waitress/issues (if not sensitive or security related) * email the Pylons Security mailing list: [email protected] (if security related)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'waitress'}, 'ecosystem_specific': {'affected_functions': ['waitress.parser.HTTPRequestParser.received', 'waitress.parser.HTTPRequestParser.parse_header', 'waitress.parser.get_header_lines', 'waitress.receiver.ChunkedReceiver', 'waitress.receiver.ChunkedReceiver.received', 'waitress.utilities.find_double_newline', 'waitress.utilities.Error']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/security/advisories/GHSA-g2xc-35jw-c63p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16786'}, {'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/commit/f11093a6b3240fc26830b6111e826128af7771c3'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0720'}, {'type': 'WEB', 'url': 'https://docs.pylonsproject.org/projects/waitress/en/latest/#security-fixes'}, {'type': 'PACKAGE', 'url': 'https://github.com/Pylons/waitress'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/05/msg00011.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/GVDHR2DNKCNQ7YQXISJ45NT4IQDX3LJ7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/LYEOTGWJZVKPRXX2HBNVIYWCX73QYPM5/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}]
{'cwe_ids': ['CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-12-20T23:01:53Z', 'nvd_published_at': '2019-12-20T23:15:00Z'}
1.4.0
GHSA-h9rv-jmmf-4pgx
2021-01-08T18:42:22Z
2019-12-05T18:44:37Z
null
['CVE-2019-16769']
Cross-Site Scripting in serialize-javascript
Versions of `serialize-javascript` prior to 2.1.1 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize serialized regular expressions. This vulnerability does not affect Node.js applications. ## Recommendation Upgrade to version 2.1.1 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'serialize-javascript'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/yahoo/serialize-javascript/security/advisories/GHSA-h9rv-jmmf-4pgx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16769'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h9rv-jmmf-4pgx'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1426'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:51Z', 'nvd_published_at': None}
1.4.0
GHSA-6rjc-4pwr-3vp7
2021-08-19T15:34:42Z
2019-12-02T18:14:30Z
null
['CVE-2019-10771']
Cross-Site Scripting in iobroker.web
Versions of `iobroker.web` prior to 2.4.10 are vulnerable to Cross-Site Scripting. The package fails to escape URL parameters that may be reflected in the server response. This can be used by attackers to execute arbitrary JavaScript in the victim's browser. ## Recommendation Upgrade to version 2.4.10 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'iobroker.web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10771'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-IOBROKERWEB-534971'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1345'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-02T01:13:05Z', 'nvd_published_at': None}
1.4.0
GHSA-9xcj-c8cr-8c3c
2022-10-07T20:34:53Z
2019-12-26T18:22:26Z
null
['CVE-2019-17563']
In Apache Tomcat, when using FORM authentication there was a narrow window where an attacker could perform a session fixation attack
When using FORM authentication with Apache Tomcat 9.0.0.M1 to 9.0.29, 8.5.0 to 8.5.49 and 7.0.0 to 7.0.98 there was a narrow window where an attacker could perform a session fixation attack. The window was considered too narrow for an exploit to be practical but, erring on the side of caution, this issue has been treated as a security vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.99'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.5.50'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.30'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17563'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/8b4c1db8300117b28a0f3f743c0b9e3f964687a690cdf9662a884bbd%40%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/reb9a66f176df29b9a832caa95ebd9ffa3284e8f4922ec4fa3ad8eb2e@%3Cissues.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/01/msg00024.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Dec/43'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202003-43'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200107-0001/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4251-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4596'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4680'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00013.html'}]
{'cwe_ids': ['CWE-384'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-12-26T18:22:01Z', 'nvd_published_at': '2019-12-23T17:15:00Z'}
1.4.0
GHSA-4ppp-gpcr-7qf6
2022-03-24T17:52:19Z
2019-12-20T23:04:35Z
null
[]
HTTP Request Smuggling: Content-Length Sent Twice in Waitress
### Impact Waitress would header fold a double `Content-Length` header and due to being unable to cast the now comma separated value to an integer would set the `Content-Length` to 0 internally. So a request with: ``` Content-Length: 10 Content-Length: 10 ``` would get transformed to: ``` Content-Length: 10, 10 ``` Which would Waitress would then internally set to `Content-Lenght: 0`. Waitress would then treat the request as having no body, thereby treating the body of the request as a new request in HTTP pipelining. ### Patches This issue is fixed in Waitress 1.4.0. This brings a range of changes to harden Waitress against potential HTTP request confusions, and may change the behaviour of Waitress behind non-conformist proxies. The Pylons Project recommends upgrading as soon as possible, while validating that the changes in Waitress don't cause any changes in behavior. ### Workarounds Various reverse proxies may have protections against sending potentially bad HTTP requests to the backend, and or hardening against potential issues like this. If the reverse proxy doesn't use HTTP/1.1 for connecting to the backend issues are also somewhat mitigated, as HTTP pipelining does not exist in HTTP/1.0 and Waitress will close the connection after every single request (unless the Keep Alive header is explicitly sent... so this is not a fool proof security method). ### Issues/more security issues: * open an issue at https://github.com/Pylons/waitress/issues (if not sensitive or security related) * email the Pylons Security mailing list: [email protected] (if security related)
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'waitress'}, 'ecosystem_specific': {'affected_functions': ['waitress.parser.HTTPRequestParser.parse_header']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/security/advisories/GHSA-4ppp-gpcr-7qf6'}, {'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/commit/575994cd42e83fd772a5f7ec98b2c56751bd3f65'}, {'type': 'WEB', 'url': 'https://docs.pylonsproject.org/projects/waitress/en/latest/#security-fixes'}, {'type': 'PACKAGE', 'url': 'https://github.com/Pylons/waitress'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j7j6-7hfx-5522'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/waitress/PYSEC-2020-178.yaml'}]
{'cwe_ids': ['CWE-444'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-12-20T23:02:03Z', 'nvd_published_at': None}
1.4.0
GHSA-cmch-296j-wfvw
2021-08-19T15:11:15Z
2019-12-02T18:06:14Z
null
['CVE-2019-10767']
Arbitrary File Write in iobroker.js-controller
Versions of `iobroker.controller` prior to 2.0.25 are vulnerable to Path Traversal. The package fails to restrict access to folders outside of the intended `/adapter/<adapter-name>` folder, which may allow attackers to include arbitrary files in the system. An attacker would need to be authenticated to perform the attack but the package has authentication disabled by default. ## Recommendation Upgrade to version 2.0.25 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'iobroker.js-controller'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.25'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10767'}, {'type': 'WEB', 'url': 'https://github.com/ioBroker/ioBroker.js-controller/commit/f6e292c6750a491a5000d0f851b2fede4f9e2fda'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-IOBROKERJSCONTROLLER-534881'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1419'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-27T03:26:55Z', 'nvd_published_at': None}
1.4.0
GHSA-26p8-xrj2-mv53
2021-08-19T16:02:34Z
2019-12-02T18:18:37Z
null
['CVE-2019-10083']
Apache NiFi process group information disclosure
When updating a Process Group via the API in NiFi versions 1.3.0 to 1.9.2, the response to the request includes all of its contents (at the top most level, not recursively). The response included details about processors and controller services which the user may not have had read access to.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi-web-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.10.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.10.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10083'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security.html#CVE-2019-10083'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-02T17:30:21Z', 'nvd_published_at': None}
1.4.0
GHSA-h47j-hc6x-h3qq
2023-09-12T18:35:46Z
2019-12-30T19:30:31Z
null
['CVE-2019-10758']
Remote Code Execution Vulnerability in NPM mongo-express
### Impact Remote code execution on the host machine by any authenticated user. ### Proof Of Concept Launching mongo-express on a Mac, pasting the following into the "create index" field will pop open the Mac calculator: ```javascript this.constructor.constructor("return process")().mainModule.require('child_process').execSync('/Applications/Calculator.app/Contents/MacOS/Calculator') ``` ### Patches Users should upgrade to version `0.54.0` ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ ### References [Snyk Security Advisory](https://snyk.io/vuln/SNYK-JS-MONGOEXPRESS-473215) [CVE](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10758) ### For more information If you have any questions or comments about this advisory: * Open an issue in [example link to repo](http://example.com) * Email us at [example email address](mailto:[email protected]) #### Thanks @JLLeitschuh for finding and reporting this vulnerability
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'mongo-express'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.54.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/mongo-express/mongo-express/security/advisories/GHSA-h47j-hc6x-h3qq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10758'}, {'type': 'WEB', 'url': 'https://github.com/mongo-express/mongo-express/pull/522'}, {'type': 'WEB', 'url': 'https://github.com/mongo-express/mongo-express/commit/7d365141deadbd38fa961cd835ce68eab5731494'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MONGOEXPRESS-473215'}]
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-12-30T19:29:02Z', 'nvd_published_at': None}
1.4.0
GHSA-7xxv-wpxj-mx5v
2023-09-05T14:45:56Z
2019-12-02T18:03:09Z
null
['CVE-2019-19275']
typed-ast Out-of-bounds Read
typed_ast 1.3.0 and 1.3.1 has an ast_for_arguments out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not execute) Python code. (This issue also affected certain Python 3.8.0-alpha prereleases.)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'typed-ast'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19275'}, {'type': 'WEB', 'url': 'https://github.com/python/cpython/commit/a4d78362397fc3bced6ea80fbc7b5f4827aec55e'}, {'type': 'WEB', 'url': 'https://github.com/python/cpython/commit/dcfcd146f8e6fc5c2fc16a4c192a0c5f5ca8c53c'}, {'type': 'WEB', 'url': 'https://github.com/python/typed_ast/commit/156afcb26c198e162504a57caddfe0acd9ed7dce'}, {'type': 'WEB', 'url': 'https://github.com/python/typed_ast/commit/dc317ac9cff859aa84eeabe03fb5004982545b3b'}, {'type': 'WEB', 'url': 'https://bugs.python.org/issue36495'}, {'type': 'PACKAGE', 'url': 'https://github.com/python/typed_ast'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/LG5H4Q6LFVRX7SFXLBEJMNQFI4T5SCEA/'}]
{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-27T02:25:57Z', 'nvd_published_at': None}
1.4.0
GHSA-4x6v-rwh4-55jw
2023-09-08T19:57:36Z
2019-12-02T18:16:34Z
null
['CVE-2019-18954']
Pomelo allows external control of critical state data
Pomelo v2.2.5 allows external control of critical state data. A malicious user input can corrupt arbitrary methods and attributes in `template/game-server/app/servers/connector/handler/entryHandler.js` because certain internal attributes can be overwritten via a conflicting name. Hence, a malicious attacker can manipulate internal attributes by adding additional attributes to user input.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'pomelo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-18954'}, {'type': 'WEB', 'url': 'https://github.com/NetEase/pomelo/issues/1149'}, {'type': 'WEB', 'url': 'https://github.com/cl0udz/vulnerabilities/tree/master/pomelo-critical-state-manipulation'}]
{'cwe_ids': ['CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-02T01:20:21Z', 'nvd_published_at': None}
1.4.0
GHSA-hh3j-x4mc-g48r
2022-04-19T18:42:25Z
2019-12-26T18:22:36Z
null
['CVE-2019-12418']
Insufficiently Protected Credentials in Apache Tomcat
When Apache Tomcat 9.0.0.M1 to 9.0.28, 8.5.0 to 8.5.47, 7.0.0 and 7.0.97 is configured with the JMX Remote Lifecycle Listener, a local attacker without access to the Tomcat process or configuration files is able to manipulate the RMI registry to perform a man-in-the-middle attack to capture user names and passwords used to access the JMX interface. The attacker can then use these credentials to access the JMX interface and gain complete control over the Tomcat instance.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.99'}]}], 'database_specific': {'last_known_affected_version_range': '< 7.0.98'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.5.49'}]}], 'database_specific': {'last_known_affected_version_range': '< 8.5.48'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.29'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12418'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/43530b91506e2e0c11cfbe691173f5df8c48f51b98262426d7493b67%40%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/01/msg00024.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/03/msg00029.html'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Dec/43'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202003-43'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200107-0001/'}, {'type': 'WEB', 'url': 'https://support.f5.com/csp/article/K10107360?utm_source=f5support&amp;utm_medium=RSS'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4251-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4596'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4680'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00013.html'}]
{'cwe_ids': ['CWE-522'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-12-26T18:22:10Z', 'nvd_published_at': '2019-12-23T18:15:00Z'}
1.4.0
GHSA-35fr-h7jr-hh86
2021-04-27T18:03:07Z
2019-12-06T18:55:47Z
null
[]
Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting') in Armeria
Versions of Armeria 0.85.0 through and including 0.96.0 are vulnerable to HTTP response splitting, which allows remote attackers to inject arbitrary HTTP headers via CRLF sequences when unsanitized data is used to populate the headers of an HTTP response. ### Impact 1. Cross-User Defacement 2. Cache Poisoning 3. Cross-Site Scripting (XSS) 4. Page Hijacking ### Root Cause The root cause is due to the usage of Netty without the HTTP header validation. https://github.com/line/armeria/blob/f0d870fde1088114070be31b67f7df0a21e835c6/core/src/main/java/com/linecorp/armeria/common/DefaultHttpHeaders.java#L23 ### Patches This vulnerability has been patched in 0.97.0. ### References [CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting')](https://cwe.mitre.org/data/definitions/113.html) https://github.com/ratpack/ratpack/security/advisories/GHSA-mvqp-q37c-wf9j ### For more information If you have any questions or comments about this advisory: * Open an issue in [GitHub](https://github.com/line/armeria/issues)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.linecorp.armeria:armeria'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.85.0'}, {'fixed': '0.97.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/line/armeria/security/advisories/GHSA-35fr-h7jr-hh86'}]
{'cwe_ids': ['CWE-113', 'CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T18:03:07Z', 'nvd_published_at': None}
1.4.0
GHSA-5h9j-q6j2-253f
2021-06-15T17:23:03Z
2019-12-02T18:13:28Z
null
['CVE-2019-17632']
Unescaped exception messages in error responses in Jetty
In Eclipse Jetty versions 9.4.21.v20190926, 9.4.22.v20191022, and 9.4.23.v20191118, the generation of default unhandled Error response content (in text/html and text/json Content-Type) does not escape Exception messages in stacktraces included in error output.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4.21.v20190926'}, {'fixed': '9.4.24.v20191120'}]}], 'versions': ['9.4.21.v20190926']}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4.22.v20191022'}, {'fixed': '9.4.24.v20191120'}]}], 'versions': ['9.4.22.v20191022']}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4.23.v20191118'}, {'fixed': '9.4.24.v20191120'}]}], 'versions': ['9.4.23.v20191118']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17632'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=553443'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/SAITZ27GKPD2CCNHGT2VBT4VWIBUJJNS/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-02T01:09:14Z', 'nvd_published_at': '2019-11-25T22:15:00Z'}
1.4.0
GHSA-hm6q-r2jc-cpqh
2023-09-06T20:10:25Z
2019-12-16T19:29:33Z
null
['CVE-2019-19771']
lodahs is malware
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'lodahs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19771'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1417'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/lodahs'}]
{'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-12-15T14:26:04Z', 'nvd_published_at': '2019-12-12T20:15:00Z'}
1.4.0
GHSA-m3jw-62m7-jjcm
2023-09-05T14:46:42Z
2019-12-02T18:02:02Z
null
['CVE-2019-19274']
typed-ast Out-of-bounds Read
typed_ast 1.3.0 and 1.3.1 has a handle_keywordonly_args out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not execute) Python code. (This issue also affected certain Python 3.8.0-alpha prereleases.)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'typed-ast'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19274'}, {'type': 'WEB', 'url': 'https://github.com/python/cpython/commit/a4d78362397fc3bced6ea80fbc7b5f4827aec55e'}, {'type': 'WEB', 'url': 'https://github.com/python/cpython/commit/dcfcd146f8e6fc5c2fc16a4c192a0c5f5ca8c53c'}, {'type': 'WEB', 'url': 'https://github.com/python/typed_ast/commit/156afcb26c198e162504a57caddfe0acd9ed7dce'}, {'type': 'WEB', 'url': 'https://github.com/python/typed_ast/commit/dc317ac9cff859aa84eeabe03fb5004982545b3b'}, {'type': 'WEB', 'url': 'https://bugs.python.org/issue36495'}, {'type': 'PACKAGE', 'url': 'https://github.com/python/typed_ast'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/LG5H4Q6LFVRX7SFXLBEJMNQFI4T5SCEA/'}]
{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-27T02:13:07Z', 'nvd_published_at': None}
1.4.0
GHSA-744r-vv2g-2x6g
2021-06-15T17:22:36Z
2019-12-02T18:17:36Z
null
['CVE-2019-10080']
Apache NiFi information disclosure by XXE
The XMLFileLookupService in NiFi versions 1.3.0 to 1.9.2 allowed trusted users to inadvertently configure a potentially malicious XML file. The XML file has the ability to make external calls to services (via XXE) and reveal information such as the versions of Java, Jersey, and Apache that the NiFI instance uses.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.10.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.10.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10080'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi/pull/3507'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security.html#CVE-2019-10080'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}]
{'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-02T17:27:21Z', 'nvd_published_at': '2019-11-19T22:15:00Z'}
1.4.0
GHSA-fmqw-vqh5-cwq9
2021-08-19T16:03:16Z
2019-12-02T18:19:39Z
null
['CVE-2019-12421']
Apache NiFi user log out issue
When using an authentication mechanism other than PKI, when the user clicks Log Out in NiFi versions 1.0.0 to 1.9.2, NiFi invalidates the authentication token on the client side but not on the server side. This permits the user's client-side token to be used for up to 12 hours after logging out to make API requests to NiFi.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi-web-security'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.10.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi-web-api'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.10.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12421'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi/pull/3362'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi/commit/cf6f5172503ce438c6c22c334c9367f774db7b24'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security.html#CVE-2019-12421'}]
{'cwe_ids': ['CWE-613'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-12-02T17:32:47Z', 'nvd_published_at': None}
1.4.0
GHSA-7xx3-m584-x994
2021-01-08T19:12:47Z
2019-12-05T19:26:37Z
null
['CVE-2019-16770']
A poorly-behaved client could use keepalive requests to monopolize Puma's reactor and create a denial of service attack
## Keepalive thread overload/DoS ### Impact A poorly-behaved client could use keepalive requests to monopolize Puma's reactor and create a denial of service attack. If more keepalive connections to Puma are opened than there are threads available, additional connections will wait permanently if the attacker sends requests frequently enough. ### Patches This vulnerability is patched in Puma 4.3.1 and 3.12.2. ### Workarounds Reverse proxies in front of Puma could be configured to always allow less than X keepalive connections to a Puma cluster or process, where X is the number of threads configured in Puma's thread pool. ### For more information If you have any questions or comments about this advisory: * Open an issue at [puma](github.com/puma/puma).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'puma'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.12.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puma'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/puma/puma/security/advisories/GHSA-7xx3-m584-x994'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16770'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7xx3-m584-x994'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puma/CVE-2019-16770.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/05/msg00034.html'}]
{'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:51Z', 'nvd_published_at': '2019-12-05T20:15:00Z'}
1.4.0
GHSA-jc43-qrrp-98f5
2023-04-25T16:31:36Z
2019-12-17T22:53:40Z
null
['CVE-2019-19714']
Insert tag injection in the Contao login module
### Impact It is possible to inject insert tags into the login module which will be replaced when the page is rendered. ### Patches Update to Contao 4.8.6. ### Workarounds None. ### References https://contao.org/en/security-advisories/insert-tag-injection-in-the-login-module ### For more information If you have any questions or comments about this advisory, open an issue in [contao/contao](https://github.com/contao/contao/issues/new/choose).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'contao/core-bundle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.8.4'}, {'fixed': '4.8.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/contao/contao/security/advisories/GHSA-jc43-qrrp-98f5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19714'}, {'type': 'WEB', 'url': 'https://contao.org/en/security-advisories/insert-tag-injection-in-the-login-module.html'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/contao/core-bundle/CVE-2019-19714.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/contao/contao'}]
{'cwe_ids': ['CWE-116'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-17T19:35:29Z', 'nvd_published_at': None}
1.4.0
GHSA-42fp-4hm3-j8r7
2021-08-31T21:37:18Z
2019-01-04T17:46:08Z
null
['CVE-2017-5934']
Moderate severity vulnerability that affects moin
Cross-site scripting (XSS) vulnerability in the link dialogue in GUI editor in MoinMoin before 1.9.10 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'moin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-5934'}, {'type': 'WEB', 'url': 'https://github.com/moinwiki/moin-1.9/commit/70955a8eae091cc88fd9a6e510177e70289ec024'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-42fp-4hm3-j8r7'}, {'type': 'PACKAGE', 'url': 'https://github.com/moinwiki/moin-1.9'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/10/msg00007.html'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3794-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2018/dsa-4318'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00024.html'}, {'type': 'WEB', 'url': 'http://moinmo.in/SecurityFixes'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:59Z', 'nvd_published_at': None}
1.4.0
GHSA-45r8-3495-x6rm
2022-09-17T00:06:13Z
2019-01-04T17:43:36Z
null
['CVE-2018-18893']
Jinjava calls getClass
Jinjava before 2.4.6 does not block the getClass method, related to com/hubspot/jinjava/el/ext/JinjavaBeanELResolver.java.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.hubspot.jinjava:jinjava'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18893'}, {'type': 'WEB', 'url': 'https://github.com/HubSpot/jinjava/pull/230'}, {'type': 'PACKAGE', 'url': 'https://github.com/HubSpot/jinjava'}, {'type': 'WEB', 'url': 'https://github.com/HubSpot/jinjava/blob/master/CHANGES.md'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-45r8-3495-x6rm'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:57:27Z', 'nvd_published_at': None}
1.4.0
GHSA-4rm3-4mq4-mfwr
2022-09-14T22:29:42Z
2019-01-04T17:43:22Z
null
['CVE-2018-20595']
Cross-Site Request Forgery (CSRF) in hswebframework.web:hsweb-commons
A CSRF issue was discovered in web/authorization/oauth2/controller/OAuth2ClientController.java in hsweb 3.0.4 because the state parameter in the request is not compared with the state parameter in the session after user authentication is successful.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.hswebframework.web:hsweb-commons'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20595'}, {'type': 'WEB', 'url': 'https://github.com/hs-web/hsweb-framework/issues/107'}, {'type': 'WEB', 'url': 'https://github.com/hs-web/hsweb-framework/commit/40929e9b0d336a26281a5ed2e0e721d54dd8d2f2'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4rm3-4mq4-mfwr'}, {'type': 'PACKAGE', 'url': 'https://github.com/hs-web/hsweb-framework'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:04Z', 'nvd_published_at': None}
1.4.0
GHSA-wr5r-m8pc-85j9
2020-06-16T22:01:07Z
2019-01-25T16:18:49Z
null
['CVE-2019-3772']
Low severity vulnerability that affects org.springframework.integration:spring-integration-ws and org.springframework.integration:spring-integration-xml
Spring Integration (spring-integration-xml and spring-integration-ws modules), versions 4.3.18, 5.0.10, 5.1.1, and older unsupported versions, were susceptible to XML External Entity Injection (XXE) when receiving XML data from untrusted sources.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.integration:spring-integration-xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.19'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.integration:spring-integration-xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.integration:spring-integration-xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '5.1.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.integration:spring-integration-ws'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.19'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.integration:spring-integration-ws'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.integration:spring-integration-ws'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '5.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3772'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wr5r-m8pc-85j9'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2019-3772'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106749'}]
{'cwe_ids': ['CWE-611'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:07Z', 'nvd_published_at': None}
1.4.0
GHSA-m9mq-p2f9-cfqv
2023-08-08T10:24:53Z
2019-01-04T17:46:30Z
null
['CVE-2018-7753']
Bleach URI Scheme Restriction Bypass
An issue was discovered in Bleach 2.1.x before 2.1.3. Attributes that have URI values weren't properly sanitized if the values contained character entities. Using character entities, it was possible to construct a URI value with a scheme that was not allowed that would slide through unsanitized.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'bleach'}, 'ecosystem_specific': {'affected_functions': ['bleach.sanitizer.BleachSanitizerFilter.allow_token']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-7753'}, {'type': 'WEB', 'url': 'https://github.com/mozilla/bleach/commit/c5df5789ec3471a31311f42c2d19fc2cf21b35ef'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/892252'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-m9mq-p2f9-cfqv'}, {'type': 'PACKAGE', 'url': 'https://github.com/mozilla/bleach'}, {'type': 'WEB', 'url': 'https://github.com/mozilla/bleach/releases/tag/v2.1.3'}]
{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:45:43Z', 'nvd_published_at': None}
1.4.0
GHSA-2x54-j4m3-r6wx
2023-08-07T15:57:08Z
2019-01-04T17:44:48Z
null
['CVE-2019-3575']
sqla-yaml-fixtures is vulnerable to Code Injection
Sqla_yaml_fixtures versions up to 0.9.1 allows local users to execute arbitrary python code via the fixture_text argument in `sqla_yaml_fixtures.load`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'sqla-yaml-fixtures'}, 'ecosystem_specific': {'affected_functions': ['sqla_yaml_fixtures.load']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3575'}, {'type': 'WEB', 'url': 'https://github.com/schettino72/sqla_yaml_fixtures/issues/20'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2x54-j4m3-r6wx'}, {'type': 'PACKAGE', 'url': 'https://github.com/schettino72/sqla_yaml_fixtures'}]
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:16Z', 'nvd_published_at': None}
1.4.0
GHSA-6qvp-r6r3-9p7h
2023-08-26T00:01:34Z
2019-01-17T14:05:03Z
null
['CVE-2018-14404']
Nokogiri NULL Pointer Dereference
A NULL pointer dereference vulnerability exists in the `xpath.c:xmlXPathCompOpEval()` function of libxml2 through 2.9.8 when parsing an invalid XPath expression in the `XPATH_OP_AND` or `XPATH_OP_OR` case. Applications processing untrusted XSL format inputs with the use of the libxml2 library may be vulnerable to a denial of service attack due to a crash of the application.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14404'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/issues/1785'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1543'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901817'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1595985'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2018-14404.yml'}, {'type': 'WEB', 'url': 'https://gitlab.gnome.org/GNOME/libxml2/issues/10'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/09/msg00035.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190719-0002/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3739-1/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3739-2/'}]
{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:04Z', 'nvd_published_at': None}
1.4.0
GHSA-4p24-vmcr-4gqj
2023-08-25T23:47:33Z
2019-01-17T13:57:27Z
null
['CVE-2016-10735']
Bootstrap XSS vulnerability
In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the data-target attribute. Note that this is a different vulnerability than CVE-2018-14041. See https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/ for more info.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'bootstrap'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'bootstrap'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-beta'}, {'fixed': '4.0.0-beta.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10735'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/issues/20184'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/pull/23679'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/pull/23687'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/pull/26460'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:1076'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:1570'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1456'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3023'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0132'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0133'}, {'type': 'WEB', 'url': 'https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap-sass/CVE-2016-10735.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/twbs/bootstrap'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:39Z', 'nvd_published_at': '2019-01-09T05:29:00Z'}
1.4.0
GHSA-8222-6fc8-mhvf
2021-06-15T16:59:20Z
2019-01-25T16:18:52Z
null
['CVE-2019-3773']
Vulnerability that affects org.springframework.ws:spring-ws and org.springframework.ws:spring-xml
Spring Web Services, versions 2.4.3, 3.0.4, and older unsupported versions of all three projects, were susceptible to XML External Entity Injection (XXE) when receiving XML data from untrusted sources.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.ws:spring-ws'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.ws:spring-ws'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.4'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.ws:spring-xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.ws:spring-xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.4'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3773'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8222-6fc8-mhvf'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2019-3773'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2021.html'}]
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:54Z', 'nvd_published_at': '2019-01-18T22:29:00Z'}
1.4.0
GHSA-r28v-mw67-m5p9
2023-09-05T12:37:34Z
2019-01-04T17:50:07Z
null
['CVE-2018-7536']
Django Denial-of-service possibility in urlize and urlizetrunc template filters
An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. The `django.utils.html.urlize()` function was extremely slow to evaluate certain inputs due to catastrophic backtracking vulnerabilities in two regular expressions (only one regular expression for Django 1.8.x). The `urlize()` function is used to implement the urlize and urlizetrunc template filters, which were thus vulnerable.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11'}, {'fixed': '1.11.11'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8'}, {'fixed': '1.8.19'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-7536'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/1ca63a66ef3163149ad822701273e8a1844192c2'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/abf89d729f210c692a50e0ad3f75fb6bec6fae16'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/e157315da3ae7005fa0683ffc9751dbeca7306c8'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2927'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0051'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0082'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0265'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-r28v-mw67-m5p9'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/03/msg00006.html'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3591-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2018/dsa-4161'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2018/mar/06/security-releases/'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/103361'}]
{'cwe_ids': ['CWE-185'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:53:19Z', 'nvd_published_at': '2018-03-09T20:29:00Z'}
1.4.0
GHSA-mc23-976p-j42x
2022-12-18T23:44:26Z
2019-01-14T16:19:55Z
null
['CVE-2019-0542']
xterm vulnerable to remote code execution
A remote code execution vulnerability exists in Xterm.js when the component mishandles special characters.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'xterm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'xterm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.9.0'}, {'fixed': '3.9.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'xterm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10.0'}, {'fixed': '3.10.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0542'}, {'type': 'WEB', 'url': 'https://github.com/xtermjs/xterm.js/commit/3592c641cd0348e0b698e8a180aea2072c6bcd9a'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:0959'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1422'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2551'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2552'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mc23-976p-j42x'}, {'type': 'PACKAGE', 'url': 'https://github.com/xtermjs/xterm.js'}, {'type': 'WEB', 'url': 'https://github.com/xtermjs/xterm.js/releases/tag/3.8.1'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106434'}]
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:45:48Z', 'nvd_published_at': '2019-01-09T15:29:00Z'}
1.4.0
GHSA-f9hv-mg5h-xcw9
2023-06-12T22:34:10Z
2019-01-04T19:06:57Z
null
['CVE-2018-19360']
Deserialization of Untrusted Data in jackson-databind due to polymorphic deserialization
FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the axis2-transport-jms class from polymorphic deserialization.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.11.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.11.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.9.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.9.4'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19360'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2186'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/42912cac4753f3f718ece875e4d486f8264c2f2b'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:0959'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0782'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0877'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1782'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1797'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1822'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1823'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2804'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2858'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3002'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3140'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3149'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3892'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:4037'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.8'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-f9hv-mg5h-xcw9'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/TINKERPOP-2121'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/37e1ed724a1b0e5d191d98c822c426670bdfde83804567131847d2a3@%3Cdevnull.infra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/c70da3cb6e3f03e0ad8013e38b6959419d866c4a7c80fdd34b73f25c@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/May/68'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190530-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4452'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/107985'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:16Z', 'nvd_published_at': None}
1.4.0
GHSA-4q69-q4q7-x82c
2023-09-06T20:01:34Z
2019-01-04T17:41:46Z
null
['CVE-2017-18353']
rendertron can remotely shut down Chrome instance
Rendertron 1.0.0 includes an `_ah/stop` route to shutdown the Chrome instance responsible for serving render requests to all users. Visiting this route with a GET request allows any unauthorized remote attacker to disable the core service of the application.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'rendertron'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18353'}, {'type': 'WEB', 'url': 'https://github.com/GoogleChrome/rendertron/pull/88'}, {'type': 'WEB', 'url': 'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/chromium/issues/detail?id=759111'}, {'type': 'PACKAGE', 'url': 'https://github.com/GoogleChrome/rendertron'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4q69-q4q7-x82c'}]
{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:46Z', 'nvd_published_at': None}
1.4.0
GHSA-77rc-x84q-pv4f
2022-09-14T22:41:33Z
2019-01-25T16:19:19Z
null
['CVE-2018-20245']
Improper Certificate Validation in Apache Airflow
The LDAP auth backend (airflow.contrib.auth.backends.ldap_auth) prior to Apache Airflow 1.10.1 was misconfigured and contained improper checking of exceptions which disabled server certificate checking.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20245'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-77rc-x84q-pv4f'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b549c7573b342a6e457e5a3225c33054244343927bbfb2a4cdc4cf73@%3Cdev.airflow.apache.org%3E'}]
{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:21:58Z', 'nvd_published_at': None}
1.4.0
GHSA-3wc8-659g-r88q
2020-06-16T20:56:44Z
2019-01-25T16:18:56Z
null
['CVE-2019-3774']
Low severity vulnerability that affects org.springframework.batch:spring-batch-core
Spring Batch versions 3.0.9, 4.0.1, 4.1.0, and older unsupported versions, were susceptible to XML External Entity Injection (XXE) when receiving XML data from untrusted sources.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.batch:spring-batch-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.batch:spring-batch-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.batch:spring-batch-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.1'}]}], 'versions': ['4.1.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3774'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3wc8-659g-r88q'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r01292194daa9ed3117b34dabec0c26929f6db13b9613fc144f720d52@%3Cissues.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0153a08177fcfac7584c7b9ea3027f1e8f18f770126f905b9989190e@%3Cissues.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r08e7ddc354bdcbf95d88399f18b3d804865034f8bc706095e594b29f@%3Cissues.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2349237482bcec43632d9d78d7d2804520d9a82f4d8b1fd96bb616b8@%3Cissues.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r47c7f67a3067ec09262eef0705abc42ea1b646699d9198bcaf8dad02@%3Cissues.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5fbb63e405d2211c16524d33f52e3b122109d3bc88d5f74623fb212d@%3Ccommits.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r78645ca0eef44a276e144447fb2087db758b1fb8826d0330b3f0da1a@%3Cissues.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r79991aeb5d0c53c67e400e037c72758a06607752ca2f23b5302dd61f@%3Cissues.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r96d90e59bb12af5e5c631dcf7d7d80857a52bf3dc44d5b85553e7fc4@%3Cissues.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra329bb85da9da93ac6f9b5fc0fc5446a3af0ee2a62c5de484da0af54@%3Ccommits.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra62a3bf48ab4e0e9aaed970b03d79a73224d68a4275858c707542f6c@%3Cissues.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra8c7573911082e9968f4835943045ad0952232bb6314becf23dc3de5@%3Cissues.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raae74a9290784e20e86fcd4e2525fa8700aeed6f65f3613b5b04bb11@%3Ccommits.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb9fe3ae33246d7f11604a1c85c861cb013a1e32248a43a0c22457107@%3Cissues.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcd26a5409af7356b5f69b2fafae3cf621bff8bf155f50e9ccf9ed5f6@%3Cissues.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcd4945d66d8bb2fc92396af56a70ede4af983a2c98166f1281338346@%3Cissues.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ree71c6425d2cc0e36b77bda6902965a657c1e09c7229459811d66474@%3Cissues.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf83697efcbcfe1131e31bbc7025cb3ee1db5d9185e9481093b2ef961@%3Cissues.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfea6eebfebb13bc015f258e7fa31d4e24a4202601be3b307da28d530@%3Ccommits.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2019-3774'}]
{'cwe_ids': ['CWE-611'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:44Z', 'nvd_published_at': None}
1.4.0
GHSA-9gqg-3fxr-9hv7
2023-08-30T23:28:15Z
2019-01-25T16:19:09Z
null
['CVE-2017-17836']
Apache Airflow vulnerable to XSS
In Apache Airflow 1.8.2 and earlier, an experimental Airflow feature displayed authenticated cookies, as well as passwords to databases used by Airflow. An attacker who has limited access to airflow, weather it be via XSS or by leaving a machine unlocked can exfil all credentials from the system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.8.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-17836'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9gqg-3fxr-9hv7'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ade4d54ebf614f68dc81a08891755e60ea58ba88e0209233eeea5f57@%3Cdev.airflow.apache.org%3E'}]
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:37Z', 'nvd_published_at': None}
1.4.0
GHSA-38rv-5jqc-m2cv
2023-09-01T20:25:56Z
2019-01-04T17:48:09Z
null
['CVE-2017-0906']
Recurly vulnerable to SSRF
The Recurly Client Python Library before 2.0.5, 2.1.16, 2.2.22, 2.3.1, 2.4.5, 2.5.1, 2.6.2 is vulnerable to a Server-Side Request Forgery vulnerability in the `Resource.get` method that could result in compromise of API keys or other critical resources.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.5'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.22'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.16'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0906'}, {'type': 'WEB', 'url': 'https://github.com/recurly/recurly-client-python/commit/049c74699ce93cf126feff06d632ea63fba36742'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/288635'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-38rv-5jqc-m2cv'}]
{'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:38Z', 'nvd_published_at': None}
1.4.0
GHSA-3mgp-fx93-9xv5
2023-01-23T20:33:58Z
2019-01-17T13:57:34Z
null
['CVE-2018-20676']
XSS vulnerability that affects bootstrap
In Bootstrap before 3.4.0, XSS is possible in the tooltip data-viewport attribute.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'bootstrap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20676'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/issues/27044'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/issues/27915#issuecomment-452196628'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/pull/27047'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/commit/2a5ba23ce8f041f3548317acc992ed8a736b609d'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:1076'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:1570'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1456'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3023'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0132'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0133'}, {'type': 'WEB', 'url': 'https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/'}, {'type': 'PACKAGE', 'url': 'https://github.com/twbs/bootstrap'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:33Z', 'nvd_published_at': '2019-01-09T05:29:00Z'}
1.4.0
GHSA-7qqv-r2q4-jxhm
2021-09-03T21:43:07Z
2019-01-14T16:19:31Z
null
['CVE-2018-1000809']
High severity vulnerability that affects privacyIDEA
privacyIDEA version 2.23.1 and earlier contains a Improper Input Validation vulnerability in token validation api that can result in Denial-of-Service. This attack appear to be exploitable via http request with user=<space>&pass= to /validate/check url. This vulnerability appears to have been fixed in 2.23.2.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'privacyIDEA'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.23.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000809'}, {'type': 'WEB', 'url': 'https://github.com/privacyidea/privacyidea/issues/1227'}, {'type': 'WEB', 'url': 'https://github.com/privacyidea/privacyidea/commit/a3edc09beffa2104f357fe24971ea3211ce40751'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7qqv-r2q4-jxhm'}, {'type': 'PACKAGE', 'url': 'https://github.com/privacyidea/privacyidea'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:21Z', 'nvd_published_at': None}
1.4.0
GHSA-68wv-rjrm-576p
2022-09-14T22:40:56Z
2019-01-25T16:19:14Z
null
['CVE-2017-17835']
Cross-Site Request Forgery (CSRF) in Apache Airflow
In Apache Airflow 1.8.2 and earlier, a CSRF vulnerability allowed for a remote command injection on a default install of Airflow.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.8.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-17835'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-68wv-rjrm-576p'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ade4d54ebf614f68dc81a08891755e60ea58ba88e0209233eeea5f57@%3Cdev.airflow.apache.org%3E'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:18:39Z', 'nvd_published_at': None}
1.4.0
GHSA-ph58-4vrj-w6hr
2023-01-23T21:29:22Z
2019-01-17T13:57:56Z
null
['CVE-2018-20677']
bootstrap Cross-site Scripting vulnerability
In Bootstrap before 3.4.0, XSS is possible in the affix configuration target property.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'bootstrap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20677'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/issues/27045'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/issues/27915#issuecomment-452196628'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/pull/27047'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/commit/2a5ba23ce8f041f3548317acc992ed8a736b609d'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:1076'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:1570'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1456'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3023'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0132'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0133'}, {'type': 'WEB', 'url': 'https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/'}, {'type': 'PACKAGE', 'url': 'https://github.com/twbs/bootstrap'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e@%3Cdev.superset.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:11Z', 'nvd_published_at': '2019-01-09T05:29:00Z'}
1.4.0
GHSA-mx9v-gmh4-mgqw
2022-09-14T22:31:36Z
2019-01-04T19:07:01Z
null
['CVE-2018-19361']
Deserialization of Untrusted Data in jackson-databind
FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the openjpa class from polymorphic deserialization.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.9.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.9.4'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.11.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.11.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19361'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2186'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/42912cac4753f3f718ece875e4d486f8264c2f2b'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:0959'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0782'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0877'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1782'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1797'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1822'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1823'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2804'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2858'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3002'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3140'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3149'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3892'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:4037'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.8'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mx9v-gmh4-mgqw'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/TINKERPOP-2121'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/37e1ed724a1b0e5d191d98c822c426670bdfde83804567131847d2a3@%3Cdevnull.infra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/c70da3cb6e3f03e0ad8013e38b6959419d866c4a7c80fdd34b73f25c@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/May/68'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190530-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4452'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/107985'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:38Z', 'nvd_published_at': None}
1.4.0
GHSA-j87c-cj65-vmh5
2023-09-06T20:06:31Z
2019-01-04T17:41:51Z
null
['CVE-2017-18354']
rendertron LFI vulnerability
Rendertron 1.0.0 allows for alternative protocols such as 'file://' introducing a Local File Inclusion (LFI) bug where arbitrary files can be read by a remote attacker.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'rendertron'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18354'}, {'type': 'WEB', 'url': 'https://github.com/GoogleChrome/rendertron/pull/88'}, {'type': 'WEB', 'url': 'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/chromium/issues/detail?id=759111'}, {'type': 'PACKAGE', 'url': 'https://github.com/GoogleChrome/rendertron'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j87c-cj65-vmh5'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:38Z', 'nvd_published_at': None}
1.4.0
GHSA-xvwv-6wvx-px9x
2023-09-01T21:13:18Z
2019-01-04T17:47:21Z
null
['CVE-2017-1000484']
Plone Open Redirect
By linking to a specific url in Plone 2.5-5.1rc1 with a parameter, an attacker could send you to his own website. On its own this is not so bad: the attacker could more easily link directly to his own website instead. But in combination with another attack, you could be sent to the Plone login form and login, then get redirected to the specific url, and then get a second redirect to the attacker website.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.16'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000484'}, {'type': 'WEB', 'url': 'https://github.com/plone/Products.CMFPlone/issues/2232'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xvwv-6wvx-px9x'}, {'type': 'PACKAGE', 'url': 'https://github.com/plone/Plone'}, {'type': 'WEB', 'url': 'https://plone.org/security/hotfix/20171128/an-open-redirection-when-calling-a-specific-url'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:39Z', 'nvd_published_at': None}
1.4.0
GHSA-mvjj-gqq2-p4hw
2023-09-13T19:45:25Z
2019-01-04T19:05:35Z
null
['CVE-2018-6341']
Cross-Site Scripting in react-dom
Affected versions of `react-dom` are vulnerable to Cross-Site Scripting (XSS). The package fails to validate attribute names in HTML tags which may lead to Cross-Site Scripting in specific scenarios. This may allow attackers to execute arbitrary JavaScript in the victim's browser. To be affected by this vulnerability, the application needs to: - be a server-side React app - be rendered to HTML using `ReactDOMServer` - include an attribute name from user input in an HTML tag ## Recommendation If you are using `react-dom` 16.0.x, upgrade to 16.0.1 or later. If you are using `react-dom` 16.1.x, upgrade to 16.1.2 or later. If you are using `react-dom` 16.2.x, upgrade to 16.2.1 or later. If you are using `react-dom` 16.3.x, upgrade to 16.3.3 or later. If you are using `react-dom` 16.4.x, upgrade to 16.4.2 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'react-dom'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '16.0.0'}, {'fixed': '16.0.1'}]}], 'versions': ['16.0.0']}, {'package': {'ecosystem': 'npm', 'name': 'react-dom'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '16.1.0'}, {'fixed': '16.1.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'react-dom'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '16.2.0'}, {'fixed': '16.2.1'}]}], 'versions': ['16.2.0']}, {'package': {'ecosystem': 'npm', 'name': 'react-dom'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '16.3.0'}, {'fixed': '16.3.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'react-dom'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '16.4.0'}, {'fixed': '16.4.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-6341'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mvjj-gqq2-p4hw'}, {'type': 'WEB', 'url': 'https://reactjs.org/blog/2018/08/01/react-v-16-4-2.html'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:react-dom:20180802'}, {'type': 'WEB', 'url': 'https://twitter.com/reactjs/status/1024745321987887104'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1421'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:15Z', 'nvd_published_at': None}
1.4.0
GHSA-chj8-5xgw-wcvj
2021-09-09T18:04:45Z
2019-01-07T19:14:46Z
null
['CVE-2016-8750']
Moderate severity vulnerability that affects org.apache.karaf:apache-karaf
Apache Karaf prior to 4.0.8 used the LDAPLoginModule to authenticate users to a directory via LDAP. However, it did not encoding usernames properly and hence was vulnerable to LDAP injection attacks leading to a denial of service.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.karaf:apache-karaf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-8750'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1322'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-chj8-5xgw-wcvj'}, {'type': 'WEB', 'url': 'https://karaf.apache.org/security/cve-2016-8750.txt'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/103098'}]
{'cwe_ids': ['CWE-90'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:46Z', 'nvd_published_at': None}
1.4.0
GHSA-98gj-wwxm-cj3h
2023-08-07T16:27:52Z
2019-01-04T17:47:50Z
null
['CVE-2017-16876']
mistune Cross-site scripting (XSS) vulnerability
Cross-site scripting (XSS) vulnerability in the _keyify function in mistune.py in Mistune before 0.8.1 allows remote attackers to inject arbitrary web script or HTML by leveraging failure to escape the "key" argument.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'mistune'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16876'}, {'type': 'WEB', 'url': 'https://github.com/lepture/mistune/commit/5f06d724bc05580e7f203db2d4a4905fc1127f98'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1524596'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-98gj-wwxm-cj3h'}, {'type': 'PACKAGE', 'url': 'https://github.com/lepture/mistune'}, {'type': 'WEB', 'url': 'https://github.com/lepture/mistune/blob/master/CHANGES.rst'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/NUR3GMHQBMA3UC4PFMCK6GCLOQC4LQQC/'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:52Z', 'nvd_published_at': None}
1.4.0
GHSA-vx85-mj8c-4qm6
2023-09-11T18:30:27Z
2019-01-17T13:56:33Z
null
['CVE-2018-11798']
Apache Thrift Node.js static web server sandbox escape
The Apache Thrift Node.js static web server in versions 0.9.2 through 0.11.0 have been determined to contain a security vulnerability in which a remote user has the ability to access files outside the set webservers docroot path.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.thrift:libthrift'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.2'}, {'fixed': '0.12.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11798'}, {'type': 'WEB', 'url': 'https://github.com/apache/thrift/pull/1606'}, {'type': 'WEB', 'url': 'https://github.com/apache/thrift/commit/2a2b72f6c8aef200ecee4984f011e06052288ff2'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1545'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3140'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vx85-mj8c-4qm6'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/THRIFT-4647'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6e9edd282684896cedf615fb67a02bebfe6007f2d5baf03ba52e34fd@%3Cuser.thrift.apache.org%3E'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227094236/http://www.securityfocus.com/bid/106501'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}]
{'cwe_ids': ['CWE-538'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:46Z', 'nvd_published_at': None}
1.4.0
GHSA-37hp-765x-j95x
2023-09-05T14:07:04Z
2019-01-04T17:50:26Z
null
['CVE-2017-7233']
Django Open redirect and possible XSS attack via user-supplied numeric redirect URLs
Django 1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18 relies on user input in some cases to redirect the user to an "on success" URL. The security check for these redirects (namely ``django.utils.http.is_safe_url()``) considered some numeric URLs "safe" when they shouldn't be, aka an open redirect vulnerability. Also, if a developer relies on ``is_safe_url()`` to provide safe redirect targets and puts such a URL into a link, they could suffer from an XSS attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10'}, {'fixed': '1.10.7'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9'}, {'fixed': '1.9.13'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8'}, {'fixed': '1.8.18'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7233'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1445'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1451'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1462'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1470'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1596'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3093'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2927'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-37hp-765x-j95x'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2017/apr/04/security-releases/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2017/dsa-3835'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/97406'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1038177'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:21Z', 'nvd_published_at': None}
1.4.0
GHSA-c8hm-7hpq-7jhg
2021-06-10T23:51:07Z
2019-01-04T19:07:03Z
null
['CVE-2018-19362']
High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind
FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the jboss-common-core class from polymorphic deserialization.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.11.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.11.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.9.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.9.4'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19362'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2186'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/42912cac4753f3f718ece875e4d486f8264c2f2b'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:0959'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0782'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0877'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1782'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1797'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1822'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1823'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2804'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2858'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3002'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3140'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3149'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3892'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:4037'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.8'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c8hm-7hpq-7jhg'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/TINKERPOP-2121'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/37e1ed724a1b0e5d191d98c822c426670bdfde83804567131847d2a3@%3Cdevnull.infra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/c70da3cb6e3f03e0ad8013e38b6959419d866c4a7c80fdd34b73f25c@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/May/68'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190530-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4452'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/107985'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:35Z', 'nvd_published_at': None}
1.4.0
GHSA-4gq5-ch57-c2mg
2023-09-13T18:31:09Z
2019-01-04T19:09:49Z
null
['CVE-2018-14719']
Arbitrary Code Execution in jackson-databind
FasterXML jackson-databind 2.x before 2.9.7, 2.8.11.3, and 2.7.9.5 might allow remote attackers to execute arbitrary code by leveraging failure to block the blaze-ds-opt and blaze-ds-core classes from polymorphic deserialization.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.11.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.11.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.7.9.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.9.4'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14719'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2097'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:0959'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0782'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0877'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1782'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1797'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1822'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1823'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2804'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2858'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3002'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3140'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3149'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3892'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:4037'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/May/68'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190530-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4452'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:21Z', 'nvd_published_at': '2019-01-02T18:29:00Z'}
1.4.0
GHSA-cq9c-55r7-455x
2022-09-14T22:34:31Z
2019-01-07T19:14:51Z
null
['CVE-2018-11787']
Improper Authentication in Apache Karaf
In Apache Karaf version prior to 3.0.9, 4.0.9, 4.1.1, when the webconsole feature is installed in Karaf, it is available at .../system/console and requires authentication to access it. One part of the console is a Gogo shell/console that gives access to the command line console of Karaf via a Web browser, and when navigated to it is available at .../system/console/gogo. Trying to go directly to that URL does require authentication. And optional bundle that some applications use is the Pax Web Extender Whiteboard, it is part of the pax-war feature and perhaps others. When it is installed, the Gogo console becomes available at another URL .../gogo/, and that URL is not secured giving access to the Karaf console to unauthenticated users. A mitigation for the issue is to manually stop/uninstall Gogo plugin bundle that is installed with the webconsole feature, although of course this removes the console from the .../system/console application, not only from the unauthenticated endpoint. One could also stop/uninstall the Pax Web Extender Whiteboard, but other components/applications may require it and so their functionality would be reduced/compromised.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.karaf:apache-karaf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.9'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.karaf:apache-karaf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.9'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.karaf:apache-karaf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.1'}]}], 'versions': ['4.1.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11787'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cq9c-55r7-455x'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/KARAF-4993'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/d9ba4c3104ba32225646879a057b75b54430f349c246c85469037d3c@%3Cdev.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'http://karaf.apache.org/security/cve-2018-11787.txt'}]
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:32:22Z', 'nvd_published_at': None}
1.4.0
GHSA-29gp-92wp-94q8
2022-08-03T19:36:45Z
2019-01-04T17:41:20Z
null
['CVE-2018-6342']
react-dev-utils on Windows vulnerable to Remote Code Execution
`react-dev-utils` on Windows is vulnerable to remote code execution. ## Recommendation Update to one of the following versions, depending on the release line that you are using. - 1.0.4 - 2.0.2 - 3.1.2 - 4.2.2 - 5.0.2 - 6.0.0-next.a671462c
[]
[{'package': {'ecosystem': 'npm', 'name': 'react-dev-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'react-dev-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'react-dev-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'react-dev-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.2.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'react-dev-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-6342'}, {'type': 'WEB', 'url': 'https://github.com/facebook/create-react-app/pull/4866'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-29gp-92wp-94q8'}, {'type': 'PACKAGE', 'url': 'https://github.com/facebook/create-react-app'}, {'type': 'WEB', 'url': 'https://github.com/facebook/create-react-app/releases/tag/v1.1.5'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/695'}]
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:51:46Z', 'nvd_published_at': '2018-12-31T22:29:00Z'}
1.4.0
GHSA-2f9x-5v75-3qv4
2023-09-05T14:06:09Z
2019-01-04T17:50:00Z
null
['CVE-2018-7537']
Django Denial-of-service possibility in truncatechars_html and truncatewords_html template filters
An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11'}, {'fixed': '1.11.11'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8'}, {'fixed': '1.8.19'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-7537'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2927'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0265'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2f9x-5v75-3qv4'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/03/msg00006.html'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3591-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2018/dsa-4161'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2018/mar/06/security-releases/'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/103357'}]
{'cwe_ids': ['CWE-185'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:51:51Z', 'nvd_published_at': None}
1.4.0
GHSA-h4hv-m4h4-mhwg
2023-09-05T18:19:49Z
2019-01-04T17:50:17Z
null
['CVE-2017-7234']
Django open redirect
A maliciously crafted URL to a Django (1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18) site using the `django.views.static.serve()` view could redirect to any other domain, aka an open redirect vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10'}, {'fixed': '1.10.7'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9'}, {'fixed': '1.9.13'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8'}, {'fixed': '1.8.18'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7234'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h4hv-m4h4-mhwg'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20170429023907/http://www.securitytracker.com/id/1038177'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20170526042328/http://www.securityfocus.com/bid/97401'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2017/apr/04/security-releases/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2017/dsa-3835'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:38:44Z', 'nvd_published_at': None}
1.4.0
GHSA-j88m-953w-8r2c
2023-09-06T20:07:11Z
2019-01-07T19:14:21Z
null
['CVE-2017-18352']
rendertron XSS vulnerability
Error reporting within Rendertron 1.0.0 allows reflected Cross Site Scripting (XSS) from invalid URLs.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'rendertron'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18352'}, {'type': 'WEB', 'url': 'https://github.com/GoogleChrome/rendertron/pull/88'}, {'type': 'WEB', 'url': 'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/chromium/issues/detail?id=759111'}, {'type': 'PACKAGE', 'url': 'https://github.com/GoogleChrome/rendertron'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j88m-953w-8r2c'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:41Z', 'nvd_published_at': None}
1.4.0
GHSA-q485-j897-qc27
2022-09-14T22:34:12Z
2019-01-07T19:14:34Z
null
['CVE-2018-20433']
XML External Entity Reference in mchange:c3p0
c3p0 0.9.5.2 allows XXE in extractXmlConfigFromInputStream in com/mchange/v2/c3p0/cfg/C3P0ConfigXmlUtils.java during initialization.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.mchange:c3p0'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.5.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.5.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20433'}, {'type': 'WEB', 'url': 'https://github.com/zhutougg/c3p0/commit/2eb0ea97f745740b18dd45e4a909112d4685f87b'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q485-j897-qc27'}, {'type': 'PACKAGE', 'url': 'https://github.com/zhutougg/c3p0'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/12/msg00021.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BFIVX6HOVNLAM7W3SUAMHYRNLCVQSAWR/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/MQ47OFV57Y2DAHMGA5H3JOL4WHRWRFN4/'}]
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:54Z', 'nvd_published_at': None}
1.4.0
GHSA-92wj-x78c-m4fx
2023-09-11T22:40:24Z
2019-01-07T19:14:49Z
null
['CVE-2018-11788']
XML External Entity Reference in Apache Karaf
Apache Karaf provides a features deployer, which allows users to "hot deploy" a features XML by dropping the file directly in the deploy folder. The features XML is parsed by XMLInputFactory class. Apache Karaf XMLInputFactory class doesn't contain any mitigation codes against XXE. This is a potential security risk as an user can inject external XML entities in Apache Karaf version prior to 4.1.7 or 4.2.2. It has been fixed in Apache Karaf 4.1.7 and 4.2.2 releases.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.karaf.specs:org.apache.karaf.specs.java.xml'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.karaf.specs:org.apache.karaf.specs.java.xml'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11788'}, {'type': 'WEB', 'url': 'https://github.com/apache/karaf/commit/0c36c50bc158739c8fc8543122a6740c54adafca'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/karaf'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227101219/https://www.securityfocus.com/bid/106479/'}, {'type': 'WEB', 'url': 'http://karaf.apache.org/security/cve-2018-11788.txt'}]
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:16Z', 'nvd_published_at': None}
1.4.0
GHSA-9r8w-6x8c-6jr9
2023-09-05T17:57:28Z
2019-01-04T17:50:34Z
null
['CVE-2017-12794']
Django vulnerable to XSS on 500 pages
In Django 1.10.x before 1.10.8 and 1.11.x before 1.11.5, HTML autoescaping was disabled in a portion of the template for the technical 500 debug page. Given the right circumstances, this allowed a cross-site scripting attack. This vulnerability shouldn't affect most production sites since you shouldn't run with `DEBUG = True` (which makes this page accessible) in your production settings.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.10.8'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12794'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9r8w-6x8c-6jr9'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3559-1/'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20170927072701/http://www.securitytracker.com/id/1039264'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227150819/http://www.securityfocus.com/bid/100643'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2017/sep/05/security-releases/'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:31Z', 'nvd_published_at': None}
1.4.0
GHSA-jhjh-ghwx-6h7r
2023-09-01T09:30:29Z
2019-01-17T13:56:18Z
null
['CVE-2017-1002157']
modulemd uses an unsafe function for processing externally provided data
modulemd 1.3.1 and earlier uses an unsafe function for processing externally provided data, leading to remote code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'modulemd'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1002157'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jhjh-ghwx-6h7r'}, {'type': 'PACKAGE', 'url': 'https://github.com/xsuchy/modulemd'}, {'type': 'WEB', 'url': 'https://pagure.io/modulemd/issue/55'}]
{'cwe_ids': ['CWE-20', 'CWE-242'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:31Z', 'nvd_published_at': '2019-01-10T21:29:00Z'}
1.4.0
GHSA-x2w5-5m2g-7h5m
2023-06-12T22:34:49Z
2019-01-04T19:09:46Z
null
['CVE-2018-14720']
XML External Entity Reference (XXE) in jackson-databind
FasterXML jackson-databind 2.x before 2.9.7 might allow attackers to conduct external XML entity (XXE) attacks by leveraging failure to block unspecified JDK classes from polymorphic deserialization.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.11.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.11.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.9.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.9.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14720'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2097'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:0959'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0782'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1106'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1107'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1108'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1140'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1822'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1823'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2858'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3149'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3892'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:4037'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-x2w5-5m2g-7h5m'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6a78f88716c3c57aa74ec05764a37ab3874769a347805903b393b286@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/82b01bfb6787097427ce97cec6a7127e93718bc05d1efd5eaffc228f@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ba973114605d936be276ee6ce09dfbdbf78aa56f6cdc6e79bfa7b8df@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/May/68'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190530-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4452'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}]
{'cwe_ids': ['CWE-502', 'CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:50Z', 'nvd_published_at': None}
1.4.0
GHSA-rprw-h62v-c2w7
2023-09-05T17:58:47Z
2019-01-04T17:45:26Z
null
['CVE-2017-18342']
PyYAML insecurely deserializes YAML strings leading to arbitrary code execution
In PyYAML before 4.1, the `yaml.load()` API could execute arbitrary code. In other words, `yaml.safe_load` is not used.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'PyYAML'}, 'ecosystem_specific': {'affected_functions': ['yaml.load', 'yaml.dump', 'safe_dump_all', 'safe_dump', 'yaml.CSafeLoader', 'yaml.CLoader', 'yaml.CSafeDumper', 'yaml.CDumper', 'yaml.SafeDumper', 'yaml.Dumper', 'yaml.SafeLoader', 'yaml.Loader']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18342'}, {'type': 'WEB', 'url': 'https://github.com/marshmallow-code/apispec/issues/278'}, {'type': 'WEB', 'url': 'https://github.com/yaml/pyyaml/issues/193'}, {'type': 'WEB', 'url': 'https://github.com/yaml/pyyaml/pull/74'}, {'type': 'WEB', 'url': 'https://github.com/yaml/pyyaml/commit/7b68405c81db889f83c32846462b238ccae5be80'}, {'type': 'PACKAGE', 'url': 'https://github.com/yaml/pyyaml'}, {'type': 'WEB', 'url': 'https://github.com/yaml/pyyaml/blob/master/CHANGES'}, {'type': 'WEB', 'url': 'https://github.com/yaml/pyyaml/wiki/PyYAML-yaml.load(input)-Deprecation'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/JEX7IPV5P2QJITAMA5Z63GQCZA5I6NVZ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/KSQQMRUQSXBSUXLCRD3TSZYQ7SEZRKCE/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/M6JCFGEIEOFMWWIXGHSELMKQDD4CV2BA/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202003-45'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:26Z', 'nvd_published_at': None}
1.4.0
GHSA-wjxj-f8rg-99wx
2023-03-01T20:05:50Z
2019-01-17T13:56:40Z
null
['CVE-2018-1320']
Improper Input Validation in Apache Thrift
Apache Thrift Java client library versions 0.5.0 prior to 0.9.3-1 and 0.10.0 prior to 0.12.0 can bypass SASL negotiation isComplete validation in the org.apache.thrift.transport.TSaslTransport class. An assert used to determine if the SASL handshake had successfully completed could be disabled in production settings making the validation incomplete.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.thrift:libthrift'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.5.0'}, {'fixed': '0.9.3-1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.thrift:libthrift'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.10.0'}, {'fixed': '0.12.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1320'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2413'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/thrift'}, {'type': 'WEB', 'url': 'https://github.com/apache/thrift/releases/tag/0.9.3.1'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/THRIFT-4506'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/07c3cd5a2953a4b253eee4437b1397b1603d0f886437e19b657d2c54@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/187684ac8b94d55256253f5220cb55e8bd568afdf9a8a86e9bbb66c9@%3Cdevnull.infra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/3d3b6849fcf4cd1e87703b3dde0d57aabeb9ba0193dc0cf3c97f545d@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6b07f6f618155c777191b4fad8ade0f0cf4ed4c12a1a746ce903d816@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/8be5b16c02567fff61b1284e5df433a4e38617bc7de4804402bf62be@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/da5234b5e78f1c99190407f791dfe1bf6c58de8d30d15974a9669be3@%3Cuser.thrift.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/dbe3a39b48900318ad44494e8721f786901ba4520cd412c7698f534f@%3Cdev.storm.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/dfee89880c84874058c6a584d8128468f8d3c2ac25068ded91073adc@%3Cuser.storm.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/e825ff2f4e129c0ecdb6a19030b53c1ccdf810a8980667628d0c6a80@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r09c3dcdccf4b74ad13bda79b354e6b793255ccfe245cca1b8cee23f5@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1015eaadef8314daa9348aa423086a732cfeb998ceb5d42605c9b0b5@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2278846f7ab06ec07a0aa31457235e0ded9191b216cba55f3f315f16@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r261972a3b14cf6f1dcd94b1b265e9ef644a38ccdf0d0238fa0c4d459@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3d71a6dbb063aa61ba81278fe622b20bfe7501bb3821c27695641ac3@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4d3f1d3e333d9c2b2f6e6ae8ed8750d4de03410ac294bcd12c7eefa3@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/02/msg00008.html'}, {'type': 'WEB', 'url': 'https://support.f5.com/csp/article/K36361684'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227094237/http://www.securityfocus.com/bid/106551'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/07/24/3'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106551'}]
{'cwe_ids': ['CWE-20', 'CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:45Z', 'nvd_published_at': '2019-01-07T17:29:00Z'}
1.4.0
GHSA-cf66-xwfp-gvc4
2022-04-06T20:39:38Z
2019-01-04T17:40:59Z
null
['CVE-2018-14732']
Missing Origin Validation in webpack-dev-server
Versions of `webpack-dev-server` before 3.1.10 are missing origin validation on the websocket server. This vulnerability allows a remote attacker to steal a developer's source code because the origin of requests to the websocket server that is used for Hot Module Replacement (HMR) are not validated. ## Recommendation For `webpack-dev-server` update to version 3.1.11 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'webpack-dev-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14732'}, {'type': 'WEB', 'url': 'https://github.com/webpack/webpack-dev-server/issues/1445'}, {'type': 'WEB', 'url': 'https://github.com/webpack/webpack-dev-server/issues/1620'}, {'type': 'WEB', 'url': 'https://github.com/webpack/webpack-dev-server/commit/f18e5adf123221a1015be63e1ca2491ca45b8d10'}, {'type': 'PACKAGE', 'url': 'https://github.com/webpack/webpack-dev-server'}, {'type': 'WEB', 'url': 'https://github.com/webpack/webpack-dev-server/blob/master/CHANGELOG.md#3111-2018-12-21'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/725'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:15Z', 'nvd_published_at': None}
1.4.0
GHSA-qqv6-5w6p-3pgr
2021-09-16T20:04:03Z
2019-01-04T17:43:30Z
null
['CVE-2018-20594']
Moderate severity vulnerability that affects org.hswebframework.web:hsweb-commons
An issue was discovered in hsweb 3.0.4. It is a reflected XSS vulnerability due to the absence of type parameter checking in FlowableModelManagerController.java.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.hswebframework.web:hsweb-commons'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20594'}, {'type': 'WEB', 'url': 'https://github.com/hs-web/hsweb-framework/issues/107'}, {'type': 'WEB', 'url': 'https://github.com/hs-web/hsweb-framework/commit/b72a2275ed21240296c6539bae1049c56abb542f'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qqv6-5w6p-3pgr'}, {'type': 'PACKAGE', 'url': 'https://github.com/hs-web/hsweb-framework'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:34Z', 'nvd_published_at': None}
1.4.0
GHSA-8fg4-j562-mjrc
2022-09-14T22:38:08Z
2019-01-25T16:19:01Z
null
['CVE-2017-15720']
Improper Input Validation in Apache Airflow resulting in Remote Code Execution
In Apache Airflow 1.8.2 and earlier, an authenticated user can execute code remotely on the Airflow webserver by creating a special object.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.8.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15720'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8fg4-j562-mjrc'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ade4d54ebf614f68dc81a08891755e60ea58ba88e0209233eeea5f57@%3Cdev.airflow.apache.org%3E'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:25:26Z', 'nvd_published_at': None}
1.4.0
GHSA-9mxf-g3x6-wv74
2022-09-14T22:31:12Z
2019-01-04T19:07:06Z
null
['CVE-2018-14721']
Server-Side Request Forgery (SSRF) in jackson-databind
FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.11.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.11.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.9.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.9.4'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14721'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2097'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:0959'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0782'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1106'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1107'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1108'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1140'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1822'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1823'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2858'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3149'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3892'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:4037'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9mxf-g3x6-wv74'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/May/68'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190530-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4452'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}]
{'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:04Z', 'nvd_published_at': None}
1.4.0
GHSA-337x-4q8g-prc5
2023-09-05T18:43:33Z
2019-01-14T16:20:05Z
null
['CVE-2019-3498']
Improper Input Validation in Django
In Django 1.11.x before 1.11.18, 2.0.x before 2.0.10, and 2.1.x before 2.1.5, an Improper Neutralization of Special Elements in Output Used by a Downstream Component issue exists in `django.views.defaults.page_not_found()`, leading to content spoofing (in a 404 error page) if a user fails to recognize that a crafted URL has malicious content.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.18'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.10'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3498'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/dev/releases/security/'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-337x-4q8g-prc5'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/django-announce/VYU7xQQTEPQ'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/01/msg00005.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3851-1/'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227094237/http://www.securityfocus.com/bid/106453'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4363'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2019/jan/04/security-releases/'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:52Z', 'nvd_published_at': '2019-01-09T23:29:00Z'}
1.4.0
GHSA-645p-88qh-w398
2023-09-14T14:00:55Z
2019-01-04T19:06:55Z
null
['CVE-2018-14718']
Arbitrary Code Execution in jackson-databind
FasterXML jackson-databind 2.x before 2.9.7, 2.8.11.3, 2.7.9.5, and 2.6.7.3 might allow remote attackers to execute arbitrary code by leveraging failure to block the slf4j-ext class from polymorphic deserialization.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.11.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.11.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.9.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.9.4'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.6.7.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14718'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2097'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:0959'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0782'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0877'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1782'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1797'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1822'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1823'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2804'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2858'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3002'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3140'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3149'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3892'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:4037'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-645p-88qh-w398'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6a78f88716c3c57aa74ec05764a37ab3874769a347805903b393b286@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/82b01bfb6787097427ce97cec6a7127e93718bc05d1efd5eaffc228f@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ba973114605d936be276ee6ce09dfbdbf78aa56f6cdc6e79bfa7b8df@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1d4a247329a8478073163567bbc8c8cb6b49c6bfc2bf58153a857af1@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/May/68'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190530-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4452'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106601'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:17:52Z', 'nvd_published_at': '2019-01-02T18:29:00Z'}
1.4.0
GHSA-mh24-7wvg-v88g
2023-09-01T09:46:45Z
2019-01-30T20:56:26Z
null
['CVE-2019-6802']
CRLF Injection in pypiserver
CRLF Injection in pypiserver 1.2.5 and below allows attackers to set arbitrary HTTP headers and possibly conduct XSS attacks via a `%0d%0a` in a URI.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pypiserver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.2.5'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-6802'}, {'type': 'WEB', 'url': 'https://github.com/pypiserver/pypiserver/issues/237'}, {'type': 'WEB', 'url': 'https://github.com/pypiserver/pypiserver/commit/1375a67c55a9b8d4619df30d2a1c0b239d7357e6'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mh24-7wvg-v88g'}, {'type': 'PACKAGE', 'url': 'https://github.com/pypiserver/pypiserver'}]
{'cwe_ids': ['CWE-74', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:14Z', 'nvd_published_at': '2019-01-25T04:29:00Z'}
1.4.0
GHSA-54mg-vgrp-mwx9
2021-08-04T15:01:30Z
2019-05-14T04:01:37Z
null
['CVE-2019-11808']
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in Ratpack
Ratpack versions before 1.6.1 generate a session ID using a cryptographically weak PRNG in the JDK's ThreadLocalRandom. This means that if an attacker can determine a small window for the server start time and obtain a session ID value, they can theoretically determine the sequence of session IDs.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.ratpack:ratpack-session'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.ratpack:ratpack-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.ratpack:ratpack-groovy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11808'}, {'type': 'WEB', 'url': 'https://github.com/ratpack/ratpack/issues/1448'}, {'type': 'WEB', 'url': 'https://github.com/ratpack/ratpack/commit/f2b63eb82dd71194319fd3945f5edf29b8f3a42d'}, {'type': 'WEB', 'url': 'https://github.com/ratpack/ratpack/releases/tag/v1.6.1'}]
{'cwe_ids': ['CWE-338'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2019-05-14T03:48:09Z', 'nvd_published_at': '2019-05-07T07:29:00Z'}
1.4.0
GHSA-jgmr-wrwx-mgfj
2021-08-03T21:46:37Z
2019-05-14T04:02:35Z
null
['CVE-2019-3797']
Exposure of Sensitive Information to an Unauthorized Actor and SQL Injection in Spring Data JPA
This affects Spring Data JPA in versions up to and including 2.1.5, 2.0.13 and 1.11.19. Derived queries using any of the predicates ?startingWith?, ?endingWith? or ?containing? could return more results than anticipated when a maliciously crafted query parameter value is supplied. Also, LIKE expressions in manually defined queries could return unexpected results if the parameter values bound did not have escaped reserved characters properly.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.data:spring-data-jpa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.20'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.data:spring-data-jpa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.14'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.data:spring-data-jpa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3797'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2019-3797'}]
{'cwe_ids': ['CWE-200', 'CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-10T04:22:00Z', 'nvd_published_at': '2019-05-06T16:29:00Z'}
1.4.0
GHSA-wv67-9jq7-8r69
2021-08-03T21:47:43Z
2019-05-14T04:02:45Z
null
['CVE-2019-5432']
Improper Input Validation and Buffer Over-read in mqtt-packet
A specifically malformed MQTT Subscribe packet crashes MQTT Brokers using the mqtt-packet module versions < 3.5.1, 4.0.0 - 4.1.3, 5.0.0 - 5.6.1, 6.0.0 - 6.1.2 for decoding.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'mqtt-packet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'mqtt-packet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'mqtt-packet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.6.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'mqtt-packet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5432'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/541354'}]
{'cwe_ids': ['CWE-125', 'CWE-126'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-10T04:24:12Z', 'nvd_published_at': '2019-05-06T17:29:00Z'}
1.4.0
GHSA-2xv3-h762-ccxv
2020-08-31T18:31:05Z
2019-05-29T19:18:02Z
null
[]
Out-of-bounds Read in concat-with-sourcemaps
Versions of `concat-with-sourcemaps` before 1.0.6 allocates uninitialized Buffers when a number is passed as a separator. ## Recommendation Update to version 1.0.6 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'concat-with-sourcemaps'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.6'}]}]}]
[{'type': 'WEB', 'url': 'https://hackerone.com/reports/320166'}, {'type': 'WEB', 'url': 'https://github.com/floridoo/concat-with-sourcemaps/blob/v1.0.5/index.js#L18'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/644'}]
{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-29T19:17:27Z', 'nvd_published_at': None}
1.4.0
GHSA-37pw-qw47-4jxm
2021-05-11T16:17:59Z
2019-05-31T16:09:15Z
null
['CVE-2018-8029']
Privilege escalation vulnerability in Apache Hadoop
In Apache Hadoop versions 3.0.0-alpha1 to 3.1.0, 2.9.0 to 2.9.1, and 2.2.0 to 2.8.4, a user who can escalate to yarn user can possibly run arbitrary commands as root user.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8029'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/0b8d58e02dbd0fb8bf7320c514fe58da1d6728bdc150f1ba04e0d9fc@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/17084c09e6dedf60efe08028b429c92ffd28aacc28454e4fa924578a@%3Cgeneral.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a0164b87660223a2d491f83c88f905fe1a9fa8dc795148d9b0d968c8@%3Cdev.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a97c53a81e639ca2fc7b8f61a4fcd1842c2a78544041244a7c624727@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4dddf1705dbedfa94392913b2dad1cd2d1d89040facd389eea0b3510@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb21df54a4e39732ce653d2aa5672e36a792b59eb6717f2a06bb8d02a@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190617-0001/'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/108518'}]
{'cwe_ids': ['CWE-285'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-31T16:08:38Z', 'nvd_published_at': None}
1.4.0
GHSA-6qh5-wx38-q92g
2020-08-31T18:22:04Z
2019-05-30T17:15:59Z
null
[]
Directory Traversal in ltt.js
Affected versions of `ltt.js` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
[]
[{'package': {'ecosystem': 'npm', 'name': 'ltt.js'}, 'versions': ['1.0.0']}]
[{'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/ltt.js'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/ltt.js'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/411'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-30T17:15:20Z', 'nvd_published_at': None}
1.4.0
GHSA-72fv-qgj6-2w2p
2021-08-03T21:27:01Z
2019-05-01T18:37:08Z
null
['CVE-2015-9286']
Cross-site Scripting in NodeBB
Controllers.outgoing in controllers/index.js in NodeBB before 0.7.3 has outgoing XSS.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'nodebb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-9286'}, {'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/pull/3371'}, {'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/compare/56b79a9...4de7529'}, {'type': 'WEB', 'url': 'https://vulners.com/securityvulns/SECURITYVULNS:DOC:32625'}, {'type': 'WEB', 'url': 'https://www.vulnerability-lab.com/get_content.php?id=1608'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-01T18:20:32Z', 'nvd_published_at': '2019-04-30T14:29:00Z'}
1.4.0
GHSA-g86p-hgx5-2pfh
2022-03-04T21:16:27Z
2019-05-29T18:48:11Z
null
['CVE-2019-12300']
Improper Authentication in Buildbot
Buildbot before 1.8.2 and 2.x before 2.3.1 accepts a user-submitted authorization token from OAuth and uses it to authenticate a user. If an attacker has a token allowing them to read the user details of a victim, they can login as the victim.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'buildbot'}, 'ecosystem_specific': {'affected_functions': ['buildbot.www.oauth2.OAuth2Auth.acceptToken']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'buildbot'}, 'ecosystem_specific': {'affected_functions': ['buildbot.www.oauth2.OAuth2Auth.acceptToken']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12300'}, {'type': 'PACKAGE', 'url': 'https://github.com/buildbot/buildbot'}, {'type': 'WEB', 'url': 'https://github.com/buildbot/buildbot/wiki/OAuth-vulnerability-in-using-submitted-authorization-token-for-authentication'}]
{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-05-29T18:47:56Z', 'nvd_published_at': '2019-05-23T15:30:00Z'}
1.4.0
GHSA-8v67-x8q5-3x3g
2021-08-04T14:53:05Z
2019-05-14T04:01:27Z
null
['CVE-2018-19048']
Cross-Site Scripting in simditor
Versions of `simditor` prior to 2.3.22 are vulnerable to Cross-Site Scripting. The package does not sanitize user input that is rendered with `innerHTML`, allowing attackers to execute arbitrary JavaScript. ## Recommendation Upgrade to version 2.3.22 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'simditor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.22'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19048'}, {'type': 'WEB', 'url': 'https://github.com/mycolorway/simditor/commit/ef01a643cbb7f8163535d6bfb71135f80ec6a6fd'}, {'type': 'WEB', 'url': 'https://github.com/hkglue/simditor_demo.git'}, {'type': 'WEB', 'url': 'https://github.com/hkglue/simditor_dom_xss/blob/master/README.md'}, {'type': 'WEB', 'url': 'https://github.com/mycolorway/simditor/releases/tag/v2.3.22'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SIMDITOR-174638'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/884'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-14T01:08:11Z', 'nvd_published_at': None}
1.4.0
GHSA-5f7m-mmpc-qhh4
2022-08-03T20:30:06Z
2019-05-23T09:27:00Z
null
[]
mysql Node.JS Module Vulnerable to Remote Memory Exposure
Versions of `mysql` before 2.14.0 are vulnerable to remove memory exposure. Affected versions of `mysql` package allocate and send an uninitialized memory over the network when a number is provided as a password. Only `mysql` running on Node.js versions below 6.0.0 are affected due to a throw added in newer node.js versions. Proof of Concept: ``` require('mysql').createConnection({ host: 'localhost', user: 'user', password : USERPROVIDEDINPUT, // number database : 'my_db' }).connect(); ``` ## Recommendation Update to version 2.14.0 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'mysql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-alpha8'}, {'fixed': '2.14.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/mysqljs/mysql/commit/192fe45593ba5768534afb6f2154432ca67a5002'}, {'type': 'WEB', 'url': 'https://github.com/mysqljs/mysql/commit/310c6a7d1b2e14b63b572dbfbfa10128f20c6d52'}, {'type': 'PACKAGE', 'url': 'https://github.com/mysqljs/mysql'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/602'}]
{'cwe_ids': ['CWE-201'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-23T07:40:10Z', 'nvd_published_at': None}
1.4.0
GHSA-7jfh-2xc9-ccv7
2020-08-31T18:29:45Z
2019-05-31T23:46:40Z
null
[]
Cross-Site Scripting in public
All versions of `public` are vulnerable to stored cross-site scripting (XSS). ## Recommendation No fix is currently available for this vulnerability. It is our recommendation to not install or use this module at this time.
[]
[{'package': {'ecosystem': 'npm', 'name': 'public'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'public'}, 'versions': ['0.1.5']}]
[{'type': 'WEB', 'url': 'https://hackerone.com/reports/316346'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/609'}]
{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2019-05-31T23:44:38Z', 'nvd_published_at': None}