schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
stringlengths 20
20
⌀ | aliases
stringlengths 2
20
| summary
stringlengths 8
154
| details
stringlengths 31
19.1k
| severity
stringlengths 2
92
| affected
stringlengths 75
28.5k
| references
stringlengths 79
7.48k
| database_specific
stringlengths 131
196
|
---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0
|
GHSA-qpgx-64h2-gc3c
|
2023-08-28T22:32:08Z
|
2022-06-17T01:03:47Z
| null |
['CVE-2022-25856']
|
Insecure path traversal in Git Trigger Source can lead to arbitrary file read
|
### Impact
A path traversal issue was found in the `(g *GitArtifactReader).Read() API. Read()` calls into `(g *GitArtifactReader).readFromRepository()` that opens and reads the file that contains the trigger resource definition:
```go
func (g *GitArtifactReader) readFromRepository(r *git.Repository, dir string)
```
No checks are made on this file at read time, which could lead an attacker to read files anywhere on the system. This could be achieved by either using symbolic links, or putting `../` in the path.
### Patches
A patch for this vulnerability has been released in the following Argo Events version:
v1.7.1
### Credits
Disclosed by [Ada Logics](https://adalogics.com/) in a security audit sponsored by CNCF and facilitated by OSTIF.
### For more information
Open an issue in the [Argo Events issue tracker](https://github.com/argoproj/argo-events/issues) or [discussions](https://github.com/argoproj/argo-events/discussions)
Join us on [Slack](https://argoproj.github.io/community/join-slack) in channel #argo-events
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-events'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/argoproj/argo-events/security/advisories/GHSA-qpgx-64h2-gc3c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25856'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-events/issues/1947'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-events/pull/1965'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-events/commit/d0f66dbce78bc31923ca057b20fc722aa24ca961'}, {'type': 'PACKAGE', 'url': 'https://github.com/argoproj/argo-events'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0492'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMARGOPROJARGOEVENTSSENSORSARTIFACTS-2864522'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T01:03:47Z', 'nvd_published_at': '2022-06-17T20:15:00Z'}
|
1.4.0
|
GHSA-h642-5h74-3x9c
|
2022-12-05T22:29:16Z
|
2022-06-24T00:00:31Z
| null |
['CVE-2022-34182']
|
Reflected Cross-site Scripting in Jenkins Nested View Plugin
|
Jenkins Nested View Plugin 1.20 through 1.25 (both inclusive) does not escape search parameters, resulting in a reflected cross-site scripting (XSS) vulnerability.
Nested View Plugin 1.26 escapes search parameters
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:nested-view'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.20'}, {'fixed': '1.26'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34182'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/nested-view-plugin/commit/00505d69939bc45574ff27eecc06e997857e5bf6'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/nested-view-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2768'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T23:00:07Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
|
1.4.0
|
GHSA-2x4v-g8cx-jxrq
|
2022-06-02T21:02:24Z
|
2022-06-02T21:02:24Z
| null |
[]
|
Login timing attack in ibexa/core
|
Ibexa DXP is using random execution time to hinder timing attacks against user accounts, a method of discovering whether a given account exists in a system without knowing its password, thus affecting privacy. This implementation was found to not be good enough in some situations. The fix replaces this with constant time functionality, configured in the new security.yml parameter 'ibexa.security.authentication.constant_auth_time'. It will log a warning if the constant time is exceeded. If this happens the setting should be increased.
|
[]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'ibexa/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'ibexa/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.4'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/ibexa/core/security/advisories/GHSA-2x4v-g8cx-jxrq'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-006-vulnerabilities-in-page-builder-login-and-commerce'}, {'type': 'PACKAGE', 'url': 'https://github.com/ibexa/core'}]
|
{'cwe_ids': ['CWE-208'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T21:02:24Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-hv6q-5g4f-8897
|
2022-06-23T17:48:28Z
|
2022-06-15T00:00:24Z
| null |
['CVE-2022-2079']
|
Cross-site Scripting in NocoDB
|
Cross-site Scripting (XSS) - Stored in GitHub repository nocodb/nocodb prior to 0.91.9.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'nocodb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.91.9'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2079'}, {'type': 'WEB', 'url': 'https://github.com/nocodb/nocodb/issues/2262'}, {'type': 'WEB', 'url': 'https://github.com/nocodb/nocodb/pull/2343'}, {'type': 'WEB', 'url': 'https://github.com/nocodb/nocodb/commit/362f8f0869989bc13bdcd66c6fc9c86ac79b9992'}, {'type': 'PACKAGE', 'url': 'https://github.com/nocodb/nocodb'}, {'type': 'WEB', 'url': 'https://github.com/nocodb/nocodb/releases'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/2615adf2-ff40-4623-97fb-2e4a3800202a'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T17:48:28Z', 'nvd_published_at': '2022-06-14T09:15:00Z'}
|
1.4.0
|
GHSA-cgw6-f3mj-h742
|
2022-06-17T00:18:08Z
|
2022-06-17T00:18:08Z
| null |
[]
|
RustEmbed generated `get` method allows for directory traversal when reading files from disk
|
When running in debug mode and the `debug-embed` (off by default) feature is
not enabled, the generated `get` method does not check that the input path is
a child of the folder given.
This allows attackers to read arbitrary files in the file system if they have
control over the filename given. The following code will print the contents of
your `/etc/passwd` if adjusted with a correct number of `../`s depending on
where it is run from.
```rust
#[derive(rust_embed::RustEmbed)]
#[folder = "src/"]
pub struct Asset;
fn main() {
let d = Asset::get("../../../etc/passwd").unwrap().data;
println!("{}", String::from_utf8_lossy(&d));
}
```
The flaw was corrected by canonicalizing the input filename and ensuring that
it starts with the canonicalized folder path.
|
[]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'rust-embed'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pyros2097/rust-embed/issues/159'}, {'type': 'PACKAGE', 'url': 'https://github.com/pyros2097/rust-embed'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0126.html'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:18:08Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-3jxh-6635-6jwp
|
2022-07-06T16:49:14Z
|
2022-06-25T00:00:54Z
| null |
['CVE-2022-30117']
|
Path traversal in Concrete CMS
|
Concrete 8.5.7 and below as well as Concrete 9.0 through 9.0.2 allow traversal in /index.php/ccm/system/file/upload which could result in an Arbitrary File Delete exploit. This was remediated by sanitizing /index.php/ccm/system/file/upload to ensure Concrete doesn’t allow traversal and by changing isFullChunkFilePresent to have an early false return when input doesn't match expectations.Concrete CMS Security team ranked this 5.8 with CVSS v3.1 vector AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H. Credit to Siebene for reporting.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.1.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'concrete5/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.8'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30117'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1482280'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/858-release-notes'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/910-release-notes'}, {'type': 'PACKAGE', 'url': 'https://github.com/concretecms/concretecms-core'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T22:07:52Z', 'nvd_published_at': '2022-06-24T15:15:00Z'}
|
1.4.0
|
GHSA-5q2v-6j86-5h9v
|
2022-09-01T19:00:53Z
|
2022-06-17T21:44:01Z
| null |
['CVE-2022-29862']
|
Security Update for the OPC UA .NET Standard Stack
|
A vulnerability was discovered in OPC UA .NET Standard Stack that allows a malicious client or server to cause a peer to hang with a carefully crafted message sent during secure channel creation.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'NuGet', 'name': 'OPCFoundation.NetStandard.Opc.Ua.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.368.58'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.368.53'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-5q2v-6j86-5h9v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29862'}, {'type': 'WEB', 'url': 'https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2022-29862.pdf'}, {'type': 'PACKAGE', 'url': 'https://github.com/OPCFoundation/UA-.NETStandard'}]
|
{'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:44:01Z', 'nvd_published_at': '2022-06-16T17:15:00Z'}
|
1.4.0
|
GHSA-p23c-p8w2-ww5v
|
2022-06-20T22:27:37Z
|
2022-06-18T00:00:19Z
| null |
['CVE-2022-25871']
|
Prototype Pollution in querymen
|
All versions of package querymen are vulnerable to Prototype Pollution if the parameters of exported function handler(type, name, fn) can be controlled by users without any sanitization. Note: This vulnerability derives from an incomplete fix of [CVE-2020-7600](https://security.snyk.io/vuln/SNYK-JS-QUERYMEN-559867).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'querymen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25871'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-QUERYMEN-2391488'}]
|
{'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:27:37Z', 'nvd_published_at': '2022-06-17T20:15:00Z'}
|
1.4.0
|
GHSA-xhp9-4947-rq78
|
2022-06-14T20:06:55Z
|
2022-06-03T00:01:15Z
| null |
['CVE-2022-31799']
|
Denial of service in bottle
|
Bottle before 0.12.20 mishandles errors during early request binding.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'bottle'}, 'ecosystem_specific': {'affected_functions': ['bottle.Bottle._handle', 'bottle.BaseRequest.POST', 'bottle.CherryPyServer']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.20'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31799'}, {'type': 'WEB', 'url': 'https://github.com/bottlepy/bottle/commit/a2b0ee6bb4ce88895429ec4aca856616244c4c4c'}, {'type': 'WEB', 'url': 'https://github.com/bottlepy/bottle/commit/e140e1b54da721a660f2eb9d58a106b7b3ff2f00'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xhp9-4947-rq78'}, {'type': 'PACKAGE', 'url': 'https://github.com/bottlepy/bottle'}, {'type': 'WEB', 'url': 'https://github.com/bottlepy/bottle/compare/0.12.19...0.12.20'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/bottle/PYSEC-2022-227.yaml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/06/msg00010.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/IE7U6J45PUEXIYYVWJKPM6QXIRKDK4HD/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/KTLOQGMDZEPIYTFC2G53OQV2ULCGYS3F/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5159'}]
|
{'cwe_ids': ['CWE-755'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:31:26Z', 'nvd_published_at': '2022-06-02T14:15:00Z'}
|
1.4.0
|
GHSA-cgrj-xjm7-9q27
|
2022-07-08T17:04:13Z
|
2022-06-28T00:01:02Z
| null |
['CVE-2022-33146']
|
Open redirect in web2py
|
Open redirect vulnerability in web2py versions prior to 2.22.5 allows a remote attacker to redirect a user to an arbitrary web site and conduct a phishing attack by having a user to access a specially crafted URL.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'web2py'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.22.5'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-33146'}, {'type': 'WEB', 'url': 'https://github.com/web2py/web2py/commit/a181b855a43cb8b479d276b082cfcde385768451'}, {'type': 'WEB', 'url': 'https://github.com/web2py/web2py/commit/d9805606f88f00c0be56438247605cefde73e14e#diff-c1d01f37ee54d813815718760b9c4d7b274e2be7ad18f65552cd564336ab593bR110'}, {'type': 'PACKAGE', 'url': 'https://github.com/web2py/web2py'}, {'type': 'WEB', 'url': 'https://jvn.jp/en/jp/JVN02158640/index.html'}, {'type': 'WEB', 'url': 'http://web2py.com/'}]
|
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:06:03Z', 'nvd_published_at': '2022-06-27T01:15:00Z'}
|
1.4.0
|
GHSA-3jch-9qgp-4844
|
2022-06-16T23:54:35Z
|
2022-06-16T23:54:35Z
| null |
[]
|
Generated code can read and write out of bounds in safe code
|
Code generated by flatbuffers' compiler is `unsafe` but not marked as such.
See https://github.com/google/flatbuffers/issues/6627 for details.
All users that use generated code by `flatbuffers` compiler are recommended to:
1. not expose flatbuffer generated code as part of their public APIs
2. audit their code and look for any usage of `follow`, `push`, or any method that uses them
(e.g. `self_follow`).
3. Carefuly go through the crates' documentation to understand which "safe" APIs are not
intended to be used.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'flatbuffers'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.9.29'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/google/flatbuffers/issues/6627'}, {'type': 'WEB', 'url': 'https://github.com/google/flatbuffers/pull/7518'}, {'type': 'PACKAGE', 'url': 'https://github.com/google/flatbuffers'}, {'type': 'WEB', 'url': 'https://github.com/google/flatbuffers/releases/tag/v22.9.29'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0122.html'}]
|
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:54:35Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-c965-p3w4-835c
|
2022-12-05T21:41:11Z
|
2022-06-24T00:00:32Z
| null |
['CVE-2022-34211']
|
Cross-Site Request Forgery in Jenkins vRealize Orchestrator Plugin
|
A cross-site request forgery (CSRF) vulnerability in Jenkins vRealize Orchestrator Plugin 3.0 and earlier allows attackers to send an HTTP POST request to an attacker-specified URL.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:vmware-vrealize-orchestrator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34211'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/vmware-vrealize-orchestrator-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2279'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T19:14:58Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
|
1.4.0
|
GHSA-67r3-h899-9w95
|
2022-06-02T15:46:06Z
|
2022-06-02T15:46:06Z
| null |
[]
|
Embedded Malicious Code in ctx
|
The ctx hosted project on PyPI was taken over via user account compromise and replaced with a malicious project which contained runtime code which collected the content of os.environ.items() when instantiating Ctx objects.
|
[]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'ctx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.2-1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/ctx/PYSEC-2022-199.yaml'}, {'type': 'WEB', 'url': 'https://python-security.readthedocs.io/pypi-vuln/index-2022-05-24-ctx-domain-takeover.html'}]
|
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T15:46:06Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-q89g-4vhh-mvvm
|
2022-06-17T00:16:48Z
|
2022-06-17T00:16:48Z
| null |
[]
|
Incorrect Lifetime Bounds on Closures in `rusqlite`
|
The lifetime bound on several closure-accepting `rusqlite` functions (specifically, functions which register a callback to be later invoked by SQLite) was too relaxed. If a closure referencing borrowed values on the stack is was passed to one of these functions, it could allow Rust code to access objects on the stack after they have been dropped.
The impacted functions are:
- Under `cfg(feature = "functions")`: `Connection::create_scalar_function`, `Connection::create_aggregate_function` and `Connection::create_window_function`.
- Under `cfg(feature = "hooks")`: `Connection::commit_hook`, `Connection::rollback_hook` and `Connection::update_hook`.
- Under `cfg(feature = "collation")`: `Connection::create_collation`.
The issue exists in all `0.25.*` versions prior to `0.25.4`, and all `0.26.*` versions prior to 0.26.2 (specifically: `0.25.0`, `0.25.1`, `0.25.2`, `0.25.3`, `0.26.0`, and `0.26.1`).
The fix is available in versions `0.26.2` and newer, and also has been back-ported to `0.25.4`. As it does not exist in `0.24.*`, all affected versions should have an upgrade path to a semver-compatible release.
|
[]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'rusqlite'}, 'ecosystem_specific': {'affected_functions': ['rusqlite::Connection::commit_hook', 'rusqlite::Connection::create_aggregate_function', 'rusqlite::Connection::create_collation', 'rusqlite::Connection::create_scalar_function', 'rusqlite::Connection::create_window_function', 'rusqlite::Connection::rollback_hook', 'rusqlite::Connection::update_hook']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.26.0'}, {'fixed': '0.26.2'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'rusqlite'}, 'ecosystem_specific': {'affected_functions': ['rusqlite::Connection::commit_hook', 'rusqlite::Connection::create_aggregate_function', 'rusqlite::Connection::create_collation', 'rusqlite::Connection::create_scalar_function', 'rusqlite::Connection::create_window_function', 'rusqlite::Connection::rollback_hook', 'rusqlite::Connection::update_hook']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.25.0'}, {'fixed': '0.25.4'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/rusqlite/rusqlite/issues/1048'}, {'type': 'PACKAGE', 'url': 'https://github.com/rusqlite/rusqlite'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0128.html'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:16:48Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-x5m7-rwfx-w7qm
|
2022-06-17T01:15:00Z
|
2022-06-15T00:00:24Z
| null |
['CVE-2022-25167']
|
Remote Code Execution in Apache Flume
|
Apache Flume versions 1.4.0 through 1.9.0 are vulnerable to a remote code execution (RCE) attack when a configuration uses a JMS Source with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. This issue is fixed by limiting JNDI to allow only the use of the java protocol or no protocol.
|
[]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.flume.flume-ng-sources:flume-jms-source'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.10.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25167'}, {'type': 'WEB', 'url': 'https://github.com/apache/flume/commit/dafb26ccb172141c6e14e95447e1b6ae38e9a7d0'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/flume'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/FLUME-3416'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/16nf6b81zjpdc4y93ho99oxo83ddbsvg'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/06/14/1'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T01:15:00Z', 'nvd_published_at': '2022-06-14T08:15:00Z'}
|
1.4.0
|
GHSA-9rg7-3j4f-cf4x
|
2022-06-16T23:52:51Z
|
2022-06-16T23:52:51Z
| null |
[]
|
QueryInterface should call AddRef before returning pointer
|
Affected version of this crate, which is a required dependency in com-impl,
provides a faulty implementation of the `IUnknown::QueryInterface` method.
`QueryInterface` implementation must call `IUnknown::AddRef` before returning the pointer,
as describe in this documentation:
<https://docs.microsoft.com/en-us/windows/win32/api/unknwn/nf-unknwn-iunknown-queryinterface(refiid_void)>
As it is not incrementing the refcount as expected, the following calls to `IUnknown::Release` method
will cause WMI to drop reference to the interface, and can lead to invalid reference.
This is documented in <https://docs.microsoft.com/en-us/windows/win32/learnwin32/managing-the-lifetime-of-an-object#reference-counting>
There is no simple workaround, as you can't know how many time QueryInterface will be called.
The only way to quick fix this is to use the macro expanded version of the code and modify
the QueryInterface method to add the AddRef call yourself.
The issue was corrected in commit `9803f31fbd1717d482d848f041044d061fca6da7`.
|
[]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'derive-com-impl'}, 'ecosystem_specific': {'affected_functions': ['derive_com_impl::derive_com_impl']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/Connicpu/com-impl/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/Connicpu/com-impl/commit/9803f31fbd1717d482d848f041044d061fca6da7'}, {'type': 'PACKAGE', 'url': 'https://github.com/Connicpu/com-impl'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0083.html'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:52:51Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-6978-4w92-428p
|
2022-06-17T21:51:19Z
|
2022-06-09T00:00:16Z
| null |
['CVE-2022-31313']
|
Backdoor in api-res-py
|
api-res-py package in PyPI 0.1 is vulnerable to a code execution backdoor in the request package.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'api-res-py'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31313'}, {'type': 'WEB', 'url': 'https://github.com/rakeshrkz7/as_api_res/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/rakeshrkz7/as_api_res'}, {'type': 'WEB', 'url': 'https://pypi.org/project/api-res-py/'}, {'type': 'WEB', 'url': 'http://pypi.doubanio.com/simple/request'}]
|
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:51:19Z', 'nvd_published_at': '2022-06-08T20:15:00Z'}
|
1.4.0
|
GHSA-8gmv-9hwg-w89g
|
2022-06-24T19:13:36Z
|
2022-06-17T20:52:47Z
| null |
['CVE-2022-31046']
|
Information Disclosure via Export Module
|
> ### Meta
> * CVSS: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:F/RL:O/RC:C` (4.0)
### Problem
The export functionality fails to limit the result set to allowed columns of a particular database table. This allows authenticated users to export internal details of database tables to which they already have access.
### Solution
Update to TYPO3 versions 7.6.57 ELTS, 8.7.47 ELTS, 9.5.35 ELTS, 10.4.29, 11.5.11 that fix the problem described above.
In order to address this issue, access to mentioned export functionality is completely denied for regular backend users.
ℹ️ **Strong security defaults - Manual actions required**
Following User TSconfig setting would allow using the export functionality for particular users:
```
options.impexp.enableExportForNonAdminUser = 1
```
### Credits
Thanks to TYPO3 core merger Lina Wolf who reported this issue and to TYPO3 security member Torben Hansen who fixed the issue.
### References
* [TYPO3-CORE-SA-2022-001](https://typo3.org/security/advisory/typo3-core-sa-2022-001)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.6.57'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.7.47'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.35'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.29'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.5.11'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.29'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.5.11'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-8gmv-9hwg-w89g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31046'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/commit/7447a3d1283017d2ee08737a7972c720001a93e9'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2022-31046.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2022-31046.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3-CMS/core'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2022-001'}]
|
{'cwe_ids': ['CWE-200', 'CWE-319'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T20:52:47Z', 'nvd_published_at': '2022-06-14T21:15:00Z'}
|
1.4.0
|
GHSA-437j-5qc3-c589
|
2022-07-08T17:05:12Z
|
2022-06-30T00:00:35Z
| null |
['CVE-2022-2252']
|
Open Redirect in microweber
|
Open Redirect in GitHub repository microweber/microweber prior to 1.2.19.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.19'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2252'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/187e949daf7dea6f10b80da70988f0f86444eeff'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/4d394bcc-a000-4f96-8cd2-8c565e1347e8'}]
|
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:17:26Z', 'nvd_published_at': '2022-06-29T16:15:00Z'}
|
1.4.0
|
GHSA-298j-9q4w-6rm4
|
2022-12-05T22:34:25Z
|
2022-06-24T00:00:31Z
| null |
['CVE-2022-34181']
|
Agent-to-controller security bypass in Jenkins xUnit Plugin
|
xUnit Plugin 3.0.8 and earlier implements an agent-to-controller message that creates a user-specified directory if it doesn’t exist, and parsing files inside it as test results.
This allows attackers able to control agent processes to create an arbitrary directory on the Jenkins controller or to obtain test results from existing files in an attacker-specified directory.
xUnit Plugin 3.1.0 changes the message type from agent-to-controller to controller-to-agent, preventing execution on the controller.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:xunit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34181'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/xunit-plugin/commit/6976b5da114845a7936ea36d5783a65cd91f9897'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/xunit-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2549'}]
|
{'cwe_ids': ['CWE-693'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T23:00:04Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
|
1.4.0
|
GHSA-75rw-34q6-72cr
|
2023-03-07T00:39:38Z
|
2022-06-17T00:38:03Z
| null |
['CVE-2022-31053']
|
Signature forgery in Biscuit
|
### Impact
The paper [Cryptanalysis of Aggregate Γ-Signature and Practical Countermeasures in Application to Bitcoin](https://eprint.iacr.org/2020/1484) defines a way to forge valid Γ-signatures, an algorithm that is used in the Biscuit specification version 1.
It would allow an attacker to create a token with any access level.
As Biscuit v1 was still an early version and not broadly deployed, we were able to contact all known users of Biscuit v1 and help them migrate to Biscuit v2.
We are not aware of any active exploitation of this vulnerability.
### Patches
The version 2 of the specification mandates a different algorithm than gamma signatures and as such is not affected by this vulnerability. The Biscuit implementations in Rust, Haskell, Go, Java and Javascript all have published versions following the v2 specification.
### Workarounds
There is no known workaround, any use of Biscuit v1 should be migrated to v2.
### References
[Cryptanalysis of Aggregate Γ-Signature and Practical Countermeasures in Application to Bitcoin](https://eprint.iacr.org/2020/1484)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [biscuit-auth/biscuit](https://github.com/biscuit-auth/biscuit)
* Ask questions on [Matrix](https://matrix.to/#/#biscuit-auth:matrix.org)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'biscuit-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '2.0.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/biscuit-auth/biscuit-go'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.clever-cloud:biscuit-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/biscuit-auth/biscuit/security/advisories/GHSA-75rw-34q6-72cr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31053'}, {'type': 'WEB', 'url': 'https://eprint.iacr.org/2020/1484'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-75rw-34q6-72cr'}, {'type': 'PACKAGE', 'url': 'https://github.com/biscuit-auth/biscuit'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0564'}]
|
{'cwe_ids': ['CWE-347'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:38:03Z', 'nvd_published_at': '2022-06-13T20:15:00Z'}
|
1.4.0
|
GHSA-8gj8-hv75-gp94
|
2022-06-16T23:51:13Z
|
2022-06-16T23:51:13Z
| null |
[]
|
`SegQueue` creates zero value of any type
|
Affected versions of this crate called `mem::zeroed()` to create values of a user-supplied type `T`.
This is unsound e.g. if `T` is a reference type (which must be non-null).
The flaw was corrected by avoiding the use of `mem::zeroed()`, using `MaybeUninit` instead.
|
[]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'crossbeam'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/crossbeam-rs/crossbeam/pull/458'}, {'type': 'PACKAGE', 'url': 'https://github.com/crossbeam-rs/crossbeam'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0020.html'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:51:13Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-8mj7-wxmc-f424
|
2022-06-17T00:13:40Z
|
2022-06-17T00:13:40Z
| null |
[]
|
Use after free in Neon external buffers
|
Neon provides functionality for creating JavaScript `ArrayBuffer` (and the `Buffer` subtype) instances backed by bytes allocated outside of V8/Node. The [`JsArrayBuffer::external`](https://docs.rs/neon/0.10.0/neon/types/struct.JsArrayBuffer.html#method.external) and [`JsBuffer::external`](https://docs.rs/neon/0.10.0/neon/types/struct.JsBuffer.html#method.external) did not require `T: 'static` prior to Neon `0.10.1`. This allowed creating an externally backed buffer from types that may be freed while they are still referenced by a JavaScript `ArrayBuffer`.
The following example demonstrates use after free. It compiles on versions `<0.10.1` and fails to compile afterward.
```rust
pub fn soundness_hole(mut cx: FunctionContext) -> JsResult<JsArrayBuffer> {
let mut data = vec![0u8, 1, 2, 3];
// Creating an external from `&mut [u8]` instead of `Vec<u8>` since there is a blanket impl
// of `AsMut<T> for &mut T`
let buf = JsArrayBuffer::external(&mut cx, data.as_mut_slice());
// `buf` is still holding a reference to `data`!
drop(data);
Ok(buf)
}
```
|
[]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'neon'}, 'ecosystem_specific': {'affected_functions': ['neon::types::JsArrayBuffer::external', 'neon::types::JsBuffer::external']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8.0'}, {'fixed': '0.10.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/neon-bindings/neon/issues/896'}, {'type': 'PACKAGE', 'url': 'https://github.com/neon-bindings/neon'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0028.html'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:13:40Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-27g3-58v4-fg9w
|
2022-06-29T21:53:51Z
|
2022-06-21T00:00:47Z
| null |
['CVE-2022-2130']
|
Cross-site Scripting in Microweber
|
Microweber versions 1.2.17 and prior are vulnerable to cross-site scripting. A patch is available on the `dev laravel9-php8` branch of the repository.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.17'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2130'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/dbd37dda91911360db23269897c737e0abae2c24'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0142970a-5cb8-4dba-8bbc-4fa2f3bee65c'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-21T20:07:48Z', 'nvd_published_at': '2022-06-20T09:15:00Z'}
|
1.4.0
|
GHSA-v7vq-3x77-87vg
|
2022-06-16T23:10:10Z
|
2022-06-16T23:10:10Z
| null |
['CVE-2022-29238']
|
Token bruteforcing.
|
### Impact
_What kind of vulnerability is it? Who is impacted?_
Authenticated requests to the notebook server with `ContentsManager.allow_hidden = False` only prevented listing the contents of hidden directories, not accessing individual hidden files or files in hidden directories (i.e. hidden files were 'hidden' but not 'inaccessible'). This could lead to notebook configurations allowing authenticated access to files that may reasonably be expected to be disallowed.
Because fully authenticated requests are required, this is of relatively low impact. But if a server's root directory contains sensitive files whose only protection from the server is being hidden (e.g. `~/.ssh` while serving $HOME), then any authenticated requests could access files if their names are guessable. Such contexts also necessarily have full access to the server and therefore execution permissions, which also generally grants access to all the same files. So this does not generally result in any privilege escalation or increase in information access, only an additional, unintended _means_ by which the files could be accessed.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
notebook 6.4.12
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
- Do not run the notebook server in a directory with hidden files, use subdirectories
- Use a custom ContentsManager with additional checks for `self.is_hidden(path)` prior to completing actions
### References
_Are there any links users can visit to find out more?_
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [example link to repo](http://example.com)
* Email us at [example email address](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'notebook'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.12'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/jupyter/notebook/security/advisories/GHSA-v7vq-3x77-87vg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29238'}, {'type': 'PACKAGE', 'url': 'https://github.com/jupyter/notebook'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/notebook/PYSEC-2022-212.yaml'}]
|
{'cwe_ids': ['CWE-425'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:10:10Z', 'nvd_published_at': '2022-06-14T18:15:00Z'}
|
1.4.0
|
GHSA-4w8f-hjm9-xwgf
|
2022-06-06T21:24:24Z
|
2022-06-06T21:24:24Z
| null |
['CVE-2022-24840']
|
Path Traversal in django-s3file
|
### Impact
It was possible to traverse the entire AWS S3 bucket and in most cases to access or delete files.
The issue was discovered by the maintainer. There were no reports of the vulnerability
being known to or exploited by a third party, before the release of the patch.
If the `AWS_LOCATION` setting was set, traversal was limited to that location only.
If all your files handling views (like form views) require authentication or special permission, the thread is limited to privileged users.
### Patches
The vulnerability has been fixed in version 5.5.1 and above.
### Workarounds
There is no feasible workaround. We must urge all users to immediately updated to a patched version.
### Detailed attack vector description
An attacker may use a request with malicious form data to traverse the entire AWS S3 bucket and perform destructive operations.
An attack could look as follows:
```bash
curl -X POST -F "s3file=file" -F "file=/priviliged/location/secrets.txt" https://www.example.com/any/path/will/work/
```
This will result in a request with files set and opened:
```python
>>> request.FILES.getlist("file")
[File("/priviliged/location/secrets.txt")]
```
Since this behavior is injected via a middleware, any view can be called this way and will carry any files defined by the attacker.
Via the `s3file` form field, any input name can be specified, including multiple inputs. For each input, multiple files can be freely
picked of the S3 bucket.
#### Scenarios and their practicality
There are four scenarios that would be considered practical in most setups:
1. Illegal file injection,
2. file deletion,
3. file retrieval & tree traversal.
4. code injection & remote code execution.
##### File deletion
An attacker knows the location of a privileged file, like a static asset. Next, the file is injected into a form view. The upload to function will move the file to a new location. This is effectively deleting the file, since the previous references to it are invalid, and will cause S3 to return a 404. Furthermore, the new location is unknown to the site operator.
##### File retrieval & tree traversal
An attacker knows the URL of a secret file and injects it into a form view. The view will move the file to a public location, making it accessible to the attacker. Since most form views will not be rate limited, this could also be used to guess files and traverse the file tree.
##### Illegal file injection
An attacker uses any form to upload a file to the temporary upload location. Next, the attacker injects that file into a request, does not validate the contents or is not equipped to handle the mime type. The latter could be used as a potential DOS vector.
In practice, this is not a practical risk in most hardened setup. Files should always be sanitized before processing, since files can be included in a request even without this security issues.
### For more information
If you have any questions or comments about this advisory:
* Open an issue on [GitHub](https://github.com/codingjoe/django-s3file/issues)
* Email us at [[email protected]](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'django-s3file'}, 'ecosystem_specific': {'affected_functions': ['s3file.forms.S3FileInputMixin', 's3file.forms.S3FileInputMixin.build_attrs', 's3file.middleware.S3FileMiddleware.__call__', 's3file.middleware.S3FileMiddleware.get_files_from_storage']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.5.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/codingjoe/django-s3file/security/advisories/GHSA-4w8f-hjm9-xwgf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24840'}, {'type': 'WEB', 'url': 'https://github.com/codingjoe/django-s3file/commit/68ccd2c621a40eb66fdd6af2be9d5fcc9c373318'}, {'type': 'PACKAGE', 'url': 'https://github.com/codingjoe/django-s3file'}, {'type': 'WEB', 'url': 'https://github.com/codingjoe/django-s3file/releases/tag/5.5.1'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/django-s3file/PYSEC-2022-208.yaml'}]
|
{'cwe_ids': ['CWE-22', 'CWE-96'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-06T21:24:24Z', 'nvd_published_at': '2022-06-09T04:15:00Z'}
|
1.4.0
|
GHSA-mwh6-g9wx-xcx3
|
2022-06-29T22:09:05Z
|
2022-06-21T00:00:48Z
| null |
['CVE-2017-20063']
|
Unrestricted Upload of File with Dangerous Type in Elefant CMS
|
A vulnerability was found in Elefant CMS 1.3.12-RC. It has been classified as critical. Affected is an unknown function of the file /filemanager/upload/drop of the component File Upload. The manipulation leads to improper privilege management. It is possible to launch the attack remotely. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'elefant/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.13'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-20063'}, {'type': 'PACKAGE', 'url': 'https://github.com/jbroadway/elefant'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.97260'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2017/Feb/39'}]
|
{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T22:09:05Z', 'nvd_published_at': '2022-06-20T05:15:00Z'}
|
1.4.0
|
GHSA-hprf-rrwq-jm5c
|
2022-07-21T15:01:00Z
|
2022-06-17T20:51:48Z
| null |
['CVE-2022-31044']
|
Rundeck's Key Storage converter plugin mechanism's encryption layer not working in 4.2.0, 4.2.1, 4.3.0
|
### Impact
The Key Storage converter plugin mechanism was not enabled correctly in Rundeck 4.2.0 and 4.2.1, resulting in use of the encryption layer for Key Storage possibly not working. Any credentials created or overwritten using Rundeck 4.2.0 or 4.2.1 might result in them being written in plaintext to the backend storage.
If you are using a "[Storage Converter](https://docs.rundeck.com/docs/manual/key-storage/key-storage.html#key-data-storage-converter)" plugin, such as `jasypt-encryption` configured via the `rundeck.storage.converter.1.type=jasypt-encryption` setting, and you installed 4.2.0 or 4.2.1 then please upgrade to one of the patched versions.
If you *do not* use a "[Storage Converter](https://docs.rundeck.com/docs/manual/key-storage/key-storage.html#key-data-storage-converter)" plugin, this would not affect you.
### Patches
Rundeck 4.3.2 and 4.2.3 have fixed the code and upon upgrade will re-encrypt any plain text values. The fix is also included in 4.4.0 and later releases.
Note: 4.3.0 does not have the vulnerability, but does not include the patch to re-encrypt plain text values if 4.2.0 or 4.2.1 were used. The previously release 4.3.1 and 4.2.2 versions missed some re-encryption use cases that have been fixed in the versions mentioned above.
### Workarounds
To prevent plaintext credentials from being stored in Rundeck 4.2.0/4.2.1, write access to key storage can be disabled via ACLs. After upgrading to 4.3.1 or later, write access can be restored.
This aclpolicy document can be used to deny all write access to storage:
```
---
by:
group: '.*'
context:
application: rundeck
for:
storage:
- deny:
- create
- update
description: deny create or update for storage in application context
---
by:
group: '.*'
context:
project: .*
for:
storage:
- deny:
- create
- update
description: deny create or update for storage in project context
```
To remove plaintext credentials, the metadata of stored keys can be used to detect if the key was stored with encryption enabled or not. In the case of the “jasypt-encryption” plugin, encrypted values will have a metadata field of “jasypt-encryption:encrypted”:”true” in the JSON metadata. If you are using the relational database as your key storage backend (rundeck.storage.provider.1.type=db), you can query for keys that are unencrypted. Here is an example query for Mysql:
```
select id,dir,name from storage where json_data not like "%jasypt-encryption:encrypted\":\"true%" and namespace is null and dir like "keys%"
```
### References
Configuration Settings for Storage Converters: https://docs.rundeck.com/docs/administration/configuration/plugins/configuring.html#storage-converter-plugins
About Storage Converters:
https://docs.rundeck.com/docs/manual/key-storage/key-storage.html#key-data-storage-converter
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [our forums](https://community.pagerduty.com/forum/c/process-automation)
* Enterprise Customers can open a [Support ticket](https://support.rundeck.com)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.rundeck:rundeck'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.rundeck:rundeck'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/rundeck/rundeck/security/advisories/GHSA-hprf-rrwq-jm5c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31044'}, {'type': 'PACKAGE', 'url': 'https://github.com/rundeck/rundeck'}]
|
{'cwe_ids': ['CWE-256'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T20:51:48Z', 'nvd_published_at': '2022-06-15T19:15:00Z'}
|
1.4.0
|
GHSA-2jx3-5j9v-prpp
|
2022-08-11T20:36:40Z
|
2022-06-25T07:11:45Z
| null |
['CVE-2022-31101']
|
BlockWishList SQL Injection vulnerability
|
### Impact
An authenticated customer can perform SQL injection
### Patches
Issue is fixed in 2.1.1
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/blockwishlist'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/PrestaShop/blockwishlist/security/advisories/GHSA-2jx3-5j9v-prpp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31101'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/blockwishlist/commit/b3ec4b85af5fd73f74d55390b226d221298ca084'}, {'type': 'PACKAGE', 'url': 'https://github.com/PrestaShop/blockwishlist'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/168003/Prestashop-Blockwishlist-2.1.0-SQL-Injection.html'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-25T07:11:45Z', 'nvd_published_at': '2022-06-27T23:15:00Z'}
|
1.4.0
|
GHSA-gvmf-wcx6-p974
|
2022-07-11T19:29:18Z
|
2022-06-22T17:58:39Z
| null |
['CVE-2022-31092']
|
Improper quoting of columns when using setOrderBy() or setGroupBy() on listing classes in Pimcore
|
### Impact
Pimcore offers developers listing classes to make querying data easier. This listing classes also allow to order or group the results based on one or more columns which should be quoted by default.
The actual issue is that quoting is not done properly in both cases, so there's the theoretical possibility to inject custom SQL if the developer is using this methods with input data and not doing proper input validation in advance and so relies on the auto-quoting being done by the listing classes.
##### Example:
```php
// request url: https://example.com/foo?groupBy=o_id`; SELECT SLEEP(20);--
$list = new DataObject\Car\Listing();
$list->setOrderKey($request->get('orderBy'));
$list->setGroupBy($request->get('groupBy'));
$list->load();
```
### Patches
Upgrade to >= 10.4.4 or apply the following patch manually:
https://github.com/pimcore/pimcore/commit/21559c6bf0e4e828d33ff7af6e88caecb5ac6549.patch
### Workarounds
Apply this patch manually:
https://github.com/pimcore/pimcore/commit/21559c6bf0e4e828d33ff7af6e88caecb5ac6549.patch
### References
https://github.com/pimcore/pimcore/pull/12444
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.4.4'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-gvmf-wcx6-p974'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31092'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/12444'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/21559c6bf0e4e828d33ff7af6e88caecb5ac6549'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-22T17:58:39Z', 'nvd_published_at': '2022-06-27T22:15:00Z'}
|
1.4.0
|
GHSA-r7v4-jwx9-wx43
|
2022-06-06T21:21:40Z
|
2022-06-06T21:21:40Z
| null |
['CVE-2022-31027']
|
Authorization Bypass Through User-Controlled Key when using CILogonOAuthenticator oauthenticator
|
# Background
CILogon is a federated auth provider that allows users to authenticate
themselves via a number of Identity Providers (IdP), focused primarily on educational and
research institutions (such as Universities). More traditional and open IdPs
such as GitHub, ORCID, Google, Microsoft, etc are also supported.
CILogonOAuthenticator is provided by the OAuthenticator package, and lets users log
in to a JupyterHub via CILogon. This is primarily used to restrict a JupyterHub
only to users of a given institute. The allowed_idps configuration trait of
CILogonOAuthenticator is documented to be a list of domains that indicate the
institutions whose users are authorized to access this JupyterHub. This authorization
is validated by ensuring that the *email* field provided to us by CILogon has a
*domain* that matches one of the domains listed in `allowed_idps`.
# Impact
If `allowed_idps` contains `berkeley.edu`, you might expect only users with valid
current credentials provided by University of California, Berkeley to be able to
access the JupyterHub. However, CILogonOAuthenticator does *not* verify which provider
is used by the user to login, only the email address provided. So a user can login
with a GitHub account that has email set to `<something>@berkeley.edu`, and that will
be treated exactly the same as someone logging in using the UC Berkeley official
Identity Provider. This has two consequences:
1. Since GitHub (and most other providers we tested) only require you to verify
your email once, a user can access a JupyterHub even if their access to
the institution's IdP has been revoked or expired.
2. CILogon supports hundreds of identity providers - if even one of them allows
users to set any email ids without verifying, that can be used to impersonate
*any* user on any other identity provider! While CILogon itself has a stellar
security record, this particular method of doing authorization means an attacker
would only need to compromise a single identity provider to compromise all of
CILogon
We currently do not know of any identity provider that provides *unverified*
email addresses to CILogon, so this is not a severe known vulnerability. However,
there are hundreds of IdPs, and we could not try them all.
# Patches
This patch makes a *breaking change* in how `allowed_idps` is interpreted. It's
no longer a list of domains, but configuration representing the `EntityID` of the
IdPs that are allowed, picked from the [list maintained by CILogon](https://cilogon.org/idplist/).
So instead of `berkeley.edu`, you would specify `urn:mace:incommon:berkeley.edu` to
allow logins from users currently with `berkeley.edu` accounts. GitHub users
with a verified `berkeley.edu` email will no longer be allowed to log in.
For details on how to transition your CILogonOAuthenticator configuration to the patched version 15.0.0 or above, see [the migration](https://oauthenticator.readthedocs.io/en/latest/migrations.html) documentation.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'oauthenticator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '15.0.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/jupyterhub/oauthenticator/security/advisories/GHSA-r7v4-jwx9-wx43'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31027'}, {'type': 'WEB', 'url': 'https://github.com/jupyterhub/oauthenticator/commit/5cd2d1816f90dc5c946e6e38fd2d0ba535624c5c'}, {'type': 'PACKAGE', 'url': 'https://github.com/jupyterhub/oauthenticator'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/oauthenticator/PYSEC-2022-206.yaml'}]
|
{'cwe_ids': ['CWE-639'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-06T21:21:40Z', 'nvd_published_at': '2022-06-09T13:15:00Z'}
|
1.4.0
|
GHSA-64mj-3p92-589v
|
2022-12-05T23:29:44Z
|
2022-06-24T00:00:31Z
| null |
['CVE-2022-34176']
|
Cross-site Scripting in Jenkins JUnit Plugin
|
JUnit Plugin 1119.va_a_5e9068da_d7 and earlier does not escape descriptions of test results.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Run/Update permission.
JUnit Plugin 1119.1121.vc43d0fc45561 applies the configured markup formatter to descriptions of test results.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:junit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1119.1121.vc43d0fc45561'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34176'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/junit-plugin/commit/c43d0fc455619dd652ec87939ac3d70d6134fea1'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/junit-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2760'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:56:33Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
|
1.4.0
|
GHSA-qj69-c89v-jwq2
|
2022-06-16T23:41:05Z
|
2022-06-16T23:41:05Z
| null |
[]
|
Reading on uninitialized memory may cause UB ( `util::read_spv()` )
|
Affected versions of this crate passes an uninitialized buffer to a user-provided `Read` implementation.
Arbitrary `Read` implementations can read from the uninitialized buffer (memory exposure) and also can return incorrect number of bytes written to the buffer.
Reading from uninitialized memory produces undefined values that can quickly invoke undefined behavior.
|
[]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'ash'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.33.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/MaikKlein/ash/issues/354'}, {'type': 'PACKAGE', 'url': 'https://github.com/MaikKlein/ash'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0090.html'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:41:05Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-hfxp-p695-629x
|
2023-06-13T16:02:38Z
|
2022-06-16T23:24:29Z
| null |
[]
|
abomonation transmutes &T to and from &[u8] without sufficient constraints
|
This transmute is at the core of the abomonation crates. It's so easy to use it to violate alignment requirements that no test in the crate's test suite passes under miri.
The use of this transmute in serialization/deserialization also incorrectly assumes that the layout of a repr(Rust) type is stable.
This transmute can also disclose both the contents of padding bytes which may be an information leak and the contents of pointers, which may be used to defeat ASLR.
|
[]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'abomonation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.7.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/TimelyDataflow/abomonation/issues/23'}, {'type': 'PACKAGE', 'url': 'https://github.com/TimelyDataflow/abomonation'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0120.html'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:24:29Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-6q8v-2hvm-fx37
|
2022-08-15T20:10:01Z
|
2022-06-28T00:00:41Z
| null |
['CVE-2022-33879']
|
Apache Tika contains incomplete fix for regex DoS
|
The initial fixes in CVE-2022-30126 and CVE-2022-30973 for regexes in the StandardsExtractingContentHandler were insufficient, and we found a separate, new regex DoS in a different regex in the StandardsExtractingContentHandler. These are now fixed in 1.28.4 and 2.4.1.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tika:tika'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.28.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tika:tika'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.4.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-33879'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/wfno8mf5nlcvbs78z93q9thgrm30wwfh'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220812-0004/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/06/27/5'}]
|
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T19:20:51Z', 'nvd_published_at': '2022-06-27T22:15:00Z'}
|
1.4.0
|
GHSA-fq4h-m3c8-8m2v
|
2022-06-24T00:52:55Z
|
2022-06-14T00:00:37Z
| null |
['CVE-2022-2063']
|
Improper Privilege Management in NocoDB
|
Improper Privilege Management in GitHub repository nocodb/nocodb prior to 0.91.8.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'nocodb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.91.8'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2063'}, {'type': 'WEB', 'url': 'https://github.com/nocodb/nocodb/pull/2262'}, {'type': 'WEB', 'url': 'https://github.com/nocodb/nocodb/pull/2337'}, {'type': 'WEB', 'url': 'https://github.com/nocodb/nocodb/commit/269a19c2ad89a0e8a7596498e3806ff2ec1040c2'}, {'type': 'PACKAGE', 'url': 'https://github.com/nocodb/nocodb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/156f405b-21d6-4384-9bff-17ebfe484e20'}]
|
{'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T00:52:55Z', 'nvd_published_at': '2022-06-13T12:15:00Z'}
|
1.4.0
|
GHSA-v8x6-59g4-5g3w
|
2022-06-14T20:00:10Z
|
2022-06-03T22:18:58Z
| null |
['CVE-2022-31018']
|
Denial of service binding form from JSON in Play Framework
|
### Impact
A denial-of-service vulnerability has been discovered in Play's forms library, in both the Scala and Java APIs. This can occur when using either the `Form#bindFromRequest` method on a JSON request body or the `Form#bind` method directly on a JSON value. If the JSON data being bound to the form contains a deeply-nested JSON object or array, the form binding implementation may consume all available heap space and cause an `OutOfMemoryError`. If executing on the default dispatcher and `akka.jvm-exit-on-fatal-error` is enabled—as it is by default—then this can crash the application process.
`Form.bindFromRequest` is vulnerable when using any body parser that produces a type of `AnyContent` or `JsValue` in Scala, or one that can produce a `JsonNode` in Java. This includes Play's default body parser.
### Patches
This vulnerability been patched in version 2.8.16. There is now a global limit on the depth of a JSON object that can be parsed, which can be configured by the user if necessary.
### Workarounds
Applications that do not need to parse a request body of type `application/json` can switch from the default body parser to another body parser that supports only the specific type of body they expect; for example, the `formUrlEncoded` body parser can be used if the Play action only needs to accept `application/x-www-form-urlencoded`.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.typesafe.play:play_2.13'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.3'}, {'fixed': '2.8.16'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.typesafe.play:play_2.12'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.3'}, {'fixed': '2.8.16'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/playframework/playframework/security/advisories/GHSA-v8x6-59g4-5g3w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31018'}, {'type': 'WEB', 'url': 'https://github.com/playframework/playframework/pull/11301'}, {'type': 'PACKAGE', 'url': 'https://github.com/playframework/playframework'}, {'type': 'WEB', 'url': 'https://github.com/playframework/playframework/releases/tag/2.8.16'}]
|
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:18:58Z', 'nvd_published_at': '2022-06-02T17:15:00Z'}
|
1.4.0
|
GHSA-4qf6-vpj8-p4r6
|
2022-06-14T20:06:07Z
|
2022-06-03T00:01:08Z
| null |
['CVE-2022-30349']
|
Cross site scripting in SSCMS
|
siteserver SSCMS 6.15.51 is vulnerable to Cross Site Scripting (XSS).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'NuGet', 'name': 'SSCMS'}, 'versions': ['6.15.51']}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30349'}, {'type': 'WEB', 'url': 'https://github.com/siteserver/cms/issues/3238'}, {'type': 'PACKAGE', 'url': 'https://github.com/siteserver/cms'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:29:37Z', 'nvd_published_at': '2022-06-02T14:15:00Z'}
|
1.4.0
|
GHSA-h4mx-xv96-2jgm
|
2022-06-24T19:55:04Z
|
2022-06-17T20:56:24Z
| null |
['CVE-2022-31049']
|
Cross-Site Scripting in TYPO3's Frontend Login Mailer
|
> ### Meta
> * CVSS: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C` (4.9)
### Problem
User submitted content was used without being properly encoded in HTML emails sent to users. The actually affected components were mail clients used to view those messages.
### Solution
Update to TYPO3 versions 9.5.35 ELTS, 10.4.29, 11.5.11 that fix the problem described above.
### Credits
Thanks to Christian Seifert who reported this issue and to TYPO3 framework merger Andreas Fernandez who fixed the issue.
### References
* [TYPO3-CORE-SA-2022-004](https://typo3.org/security/advisory/typo3-core-sa-2022-004)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.35'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.29'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.5.11'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.29'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.5.11'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-h4mx-xv96-2jgm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31049'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/commit/da611775f92102d7602713003f4c79606c8a445d'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2022-31049.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2022-31049.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3-CMS/core'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2022-004'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T20:56:24Z', 'nvd_published_at': '2022-06-14T21:15:00Z'}
|
1.4.0
|
GHSA-xq4v-vrp9-vcf2
|
2022-06-08T22:24:25Z
|
2022-06-08T22:24:25Z
| null |
['CVE-2022-31038']
|
Cross-site Scripting vulnerability in repository issue list in Gogs
|
### Impact
`DisplayName` allows all the characters from users, which leads to an XSS vulnerability when directly displayed in the issue list.
### Patches
`DisplayName` is sanitized before being displayed. Users should upgrade to 0.12.9 or the latest 0.13.0+dev.
### Workarounds
Check and update the existing users' display names that contain malicious characters.
### References
N/A
### For more information
If you have any questions or comments about this advisory, please post on https://github.com/gogs/gogs/pull/7009.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'gogs.io/gogs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.9'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/gogs/gogs/security/advisories/GHSA-xq4v-vrp9-vcf2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31038'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/pull/7009'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/commit/155cae1de8916fc3fde78f350763034b7422caee'}, {'type': 'PACKAGE', 'url': 'https://github.com/gogs/gogs'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/releases/tag/v0.12.9'}]
|
{'cwe_ids': ['CWE-79', 'CWE-80'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-08T22:24:25Z', 'nvd_published_at': '2022-06-09T17:15:00Z'}
|
1.4.0
|
GHSA-994f-7g86-qr56
|
2022-06-17T19:21:00Z
|
2022-06-08T20:15:11Z
| null |
['CVE-2022-1992']
|
Path Traversal in file editor on Windows in Gogs
|
### Impact
The malicious user is able to delete and upload arbitrary file(s). All installations on Windows with [repository upload enabled (default)](https://github.com/gogs/gogs/blob/f36eeedbf89328ee70cc3a2e239f6314f9021f58/conf/app.ini#L127-L129) are affected.
### Patches
Path cleaning has accommodated for Windows. Users should upgrade to 0.12.9 or the latest 0.13.0+dev.
### Workarounds
N/A
### References
https://huntr.dev/bounties/2e8cdc57-a9cf-46ae-9088-87f09e6c90ab/
### For more information
If you have any questions or comments about this advisory, please post on #7001.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'gogs.io/gogs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.9'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/gogs/gogs/security/advisories/GHSA-994f-7g86-qr56'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1992'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/commit/2ca014250fbf0bba94c914d9e43b1f6d8eca3bb0'}, {'type': 'PACKAGE', 'url': 'https://github.com/gogs/gogs'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/blob/f36eeedbf89328ee70cc3a2e239f6314f9021f58/conf/app.ini#L127-L129'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/2e8cdc57-a9cf-46ae-9088-87f09e6c90ab'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/2e8cdc57-a9cf-46ae-9088-87f09e6c90ab/'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-08T20:15:11Z', 'nvd_published_at': '2022-06-09T17:15:00Z'}
|
1.4.0
|
GHSA-c8mf-mc3f-2wvc
|
2022-12-05T21:55:06Z
|
2022-06-24T00:00:31Z
| null |
['CVE-2022-34199']
|
Plaintext Storage of a Password in Jenkins Convertigo Mobile Platform Plugin
|
Jenkins Convertigo Mobile Platform Plugin 1.1 and earlier stores passwords unencrypted in job `config.xml` files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.convertigo.jenkins.plugins:convertigo-mobile-platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34199'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/convertigo-mobile-platform-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2064'}]
|
{'cwe_ids': ['CWE-256', 'CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:55:56Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
|
1.4.0
|
GHSA-j9m2-h2pv-wvph
|
2023-07-19T19:58:03Z
|
2022-06-03T00:00:59Z
| null |
['CVE-2021-43306']
|
Regular expression denial of service in jquery-validation
|
An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the jquery-validation npm package, when an attacker is able to supply arbitrary input to the url2 method
|
[]
|
[{'package': {'ecosystem': 'npm', 'name': 'jquery-validation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.19.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'jQuery.Validation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.19.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43306'}, {'type': 'WEB', 'url': 'https://github.com/jquery-validation/jquery-validation/commit/69cb17ed774b427f7e2ffcdf197968231725c30e'}, {'type': 'PACKAGE', 'url': 'https://github.com/jquery-validation/jquery-validation'}, {'type': 'WEB', 'url': 'https://research.jfrog.com/vulnerabilities/jquery-validation-redos-xray-211348/'}]
|
{'cwe_ids': ['CWE-1333'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:26:59Z', 'nvd_published_at': '2022-06-02T14:15:00Z'}
|
1.4.0
|
GHSA-6j88-6whg-x687
|
2022-07-05T18:03:05Z
|
2022-06-24T00:00:32Z
| null |
['CVE-2022-34305']
|
Cross-site Scripting in Apache Tomcat
|
In Apache Tomcat 10.1.0-M1 to 10.1.0-M16, 10.0.0-M1 to 10.0.22, 9.0.30 to 9.0.64 and 8.5.50 to 8.5.81 the Form authentication example in the examples web application displayed user provided data without filtering, exposing a XSS vulnerability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.1.0-M1'}, {'fixed': '10.1.0-M17'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.1.0-M16'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0-M1'}, {'fixed': '10.0.22'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.30'}, {'fixed': '9.0.65'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.5.50'}, {'fixed': '8.5.82'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34305'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/k04zk0nq6w57m72w5gb0r6z9ryhmvr4k'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202208-34'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220729-0006/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/06/23/1'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-25T07:23:42Z', 'nvd_published_at': '2022-06-23T11:15:00Z'}
|
1.4.0
|
GHSA-c6px-4grw-hrjr
|
2023-06-13T16:28:06Z
|
2022-06-16T23:42:49Z
| null |
[]
|
'Read' on uninitialized memory may cause UB
|
Affected versions of this crate passes an uninitialized buffer to a user-provided `Read` implementation. The crate currently contains 4 occurrences of such cases. Arbitrary `Read` implementations can read from the uninitialized buffer (memory exposure) and also can return incorrect number of bytes written to the buffer.
Reading from uninitialized memory produces undefined values that can quickly invoke undefined behavior.
|
[]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'binjs_io'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/binast/binjs-ref/issues/460'}, {'type': 'PACKAGE', 'url': 'https://github.com/binast/binjs-ref'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0085.html'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:42:49Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-2226-4v3c-cff8
|
2022-06-17T00:18:24Z
|
2022-06-17T00:18:24Z
| null |
[]
|
Stack overflow in rustc_serialize when parsing deeply nested JSON
|
When parsing JSON using `json::Json::from_str`, there is no limit to the depth of the stack, therefore deeply nested objects can cause a stack overflow, which aborts the process.
Example code that triggers the vulnerability is
```rust
fn main() {
let _ = rustc_serialize::json::Json::from_str(&"[0,[".repeat(10000));
}
```
[serde](https://crates.io/crates/serde) is recommended as a replacement to rustc_serialize.
|
[]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'rustc-serialize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.24'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/rust-lang-deprecated/rustc-serialize'}, {'type': 'PACKAGE', 'url': 'https://github.com/rust-lang/rustc-serialize'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0004.html'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:18:24Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-m2ww-6wv6-vw3c
|
2022-07-06T16:48:12Z
|
2022-06-25T00:00:54Z
| null |
['CVE-2022-30120']
|
Cross site scripting in Concrete CMS
|
XSS in /dashboard/blocks/stacks/view_details/ - old browsers only. When using an older browser with built-in XSS protection disabled, insufficient sanitation where built urls are outputted can be exploited for Concrete 8.5.7 and below as well as Concrete 9.0 through 9.0.2 to allow XSS. This cannot be exploited in modern-day web browsers due to an automatic input escape mechanism. Concrete CMS Security team ranked this vulnerability 3.1with CVSS v3.1 Vector AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N. Sanitation has been added where built urls are output.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.1.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'concrete5/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.8'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30120'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1363598'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/858-release-notes'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/910-release-notes'}, {'type': 'PACKAGE', 'url': 'https://github.com/concretecms/concretecms-core'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T21:18:26Z', 'nvd_published_at': '2022-06-24T15:15:00Z'}
|
1.4.0
|
GHSA-rc57-9r3x-98cq
|
2022-06-29T20:38:41Z
|
2022-06-17T00:01:28Z
| null |
['CVE-2021-41411']
|
XML External Entity Reference in drools
|
drools <=7.59.x is affected by an XML External Entity (XXE) vulnerability in KieModuleMarshaller.java. The Validator class is not used correctly, resulting in the XXE injection vulnerability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.drools:drools-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.60.0.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.59.0.Final'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41411'}, {'type': 'WEB', 'url': 'https://github.com/kiegroup/drools/pull/3808'}, {'type': 'PACKAGE', 'url': 'https://github.com/kiegroup/drools'}]
|
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:54:41Z', 'nvd_published_at': '2022-06-16T10:15:00Z'}
|
1.4.0
|
GHSA-6888-wf7j-34jq
|
2022-06-16T23:50:05Z
|
2022-06-16T23:50:05Z
| null |
[]
|
`SegQueue` creates zero value of any type
|
Affected versions of this crate called `mem::zeroed()` to create values of a user-supplied type `T`.
This is unsound e.g. if `T` is a reference type (which must be non-null).
The flaw was corrected by avoiding the use of `mem::zeroed()`, using `MaybeUninit` instead.
|
[]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'crossbeam-queue'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/crossbeam-rs/crossbeam/pull/458'}, {'type': 'PACKAGE', 'url': 'https://github.com/crossbeam-rs/crossbeam'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0021.html'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:50:05Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-76x2-h8h3-cwjg
|
2022-06-15T19:43:51Z
|
2022-06-04T00:00:25Z
| null |
['CVE-2022-29773']
|
Access control issue in AlekSIS-Core
|
An access control issue in aleksis/core/util/auth_helpers.py: ClientProtectedResourceMixin of AlekSIS-Core v2.8.1 and below allows attackers to access arbitrary scopes if no allowed scopes are specifically set.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'aleksis-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29773'}, {'type': 'WEB', 'url': 'https://aleksis.org/2022-05-04_advisory.html'}, {'type': 'PACKAGE', 'url': 'https://edugit.org/AlekSIS/official/AlekSIS-Core'}, {'type': 'WEB', 'url': 'https://edugit.org/AlekSIS/official/AlekSIS-Core/-/commit/0d39d5f566e1d916e3c8dedd3f5bd62161f30bd8'}, {'type': 'WEB', 'url': 'https://edugit.org/AlekSIS/official/AlekSIS-Core/-/issues/688'}, {'type': 'WEB', 'url': 'https://edugit.org/AlekSIS/official/AlekSIS-Core/-/merge_requests/1011'}]
|
{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-06T21:20:39Z', 'nvd_published_at': '2022-06-03T21:15:00Z'}
|
1.4.0
|
GHSA-8gvg-f6qp-39wx
|
2022-06-17T01:07:31Z
|
2022-06-04T00:00:25Z
| null |
['CVE-2022-29770']
|
Cross site scripting in XXL-job
|
XXL-Job v2.3.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via /xxl-job-admin/jobinfo.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.xuxueli:xxl-job'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29770'}, {'type': 'WEB', 'url': 'https://github.com/xuxueli/xxl-job/issues/2836'}, {'type': 'PACKAGE', 'url': 'https://github.com/xuxueli/xxl-job'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T01:07:31Z', 'nvd_published_at': '2022-06-03T21:15:00Z'}
|
1.4.0
|
GHSA-cqpr-pcm7-m3jc
|
2022-08-04T19:38:53Z
|
2022-06-16T23:48:34Z
|
2022-07-21T18:06:06Z
|
[]
|
Potential segfault in `localtime_r` invocations
|
### Impact
Unix-like operating systems may segfault due to dereferencing a dangling pointer in specific circumstances. This requires an environment variable to be set in a different thread than the affected functions. This may occur without the user's knowledge, notably in a third-party library.
### Workarounds
No workarounds are known.
|
[]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'chrono'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.20'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/chronotope/chrono/issues/499'}, {'type': 'WEB', 'url': 'https://github.com/time-rs/time/issues/293'}, {'type': 'PACKAGE', 'url': 'https://github.com/chronotope/chrono'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0159.html'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:48:34Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-8rp2-j3vj-hgj4
|
2022-06-10T15:53:33Z
|
2022-06-03T00:01:05Z
| null |
['CVE-2022-29648']
|
Cross site scripting in Jfinal
|
A cross-site scripting (XSS) vulnerability in Jfinal CMS v5.1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted X-Forwarded-For request.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.jflyfox:jflyfox_jfinal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.1.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29648'}, {'type': 'WEB', 'url': 'https://github.com/jflyfox/jfinal_cms/issues/34'}, {'type': 'PACKAGE', 'url': 'https://github.com/jflyfox/jfinal_cms'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:28:11Z', 'nvd_published_at': '2022-06-02T14:15:00Z'}
|
1.4.0
|
GHSA-9pvq-4cc7-24jg
|
2022-07-05T18:03:18Z
|
2022-06-24T00:00:31Z
| null |
['CVE-2022-33113']
|
Cross-site Scripting in Jfinal CMS
|
Jfinal CMS v5.1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the keyword text field under the publish blog module.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.jfinal:jfinal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.1.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-33113'}, {'type': 'WEB', 'url': 'https://github.com/jflyfox/jfinal_cms/issues/39'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-25T07:23:57Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
|
1.4.0
|
GHSA-m325-rxjv-pwph
|
2023-06-13T18:41:50Z
|
2022-06-17T00:11:41Z
| null |
[]
|
Deserialization functions pass uninitialized memory to user-provided Read
|
Affected versions of this crate passed an uninitialized buffer to a
user-provided `Read` instance in:
* `deserialize_binary`
* `deserialize_string`
* `deserialize_extension_others`
* `deserialize_string_primitive`
This can result in safe `Read` implementations reading from the uninitialized
buffer leading to undefined behavior.
|
[]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'messagepack-rs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.8.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/otake84/messagepack-rs/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/otake84/messagepack-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0092.html'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:11:41Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-fp36-299x-pwmw
|
2022-06-14T20:02:53Z
|
2022-06-03T00:01:01Z
| null |
['CVE-2022-1929']
|
Regular expression denial of service in devcert
|
An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the devcert npm package, when an attacker is able to supply arbitrary input to the certificateFor method
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'devcert'}, 'ecosystem_specific': {'affected_functions': ['devcert.certificateFor']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1929'}, {'type': 'WEB', 'url': 'https://github.com/davewasmer/devcert/commit/b0763215f6683271d296fda98f7ef7bcd4a55977'}, {'type': 'PACKAGE', 'url': 'https://github.com/davewasmer/devcert'}, {'type': 'WEB', 'url': 'https://research.jfrog.com/vulnerabilities/devcert-redos-xray-211352/'}]
|
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:27:34Z', 'nvd_published_at': '2022-06-02T14:15:00Z'}
|
1.4.0
|
GHSA-qqmc-hwqp-8g2w
|
2022-06-17T00:11:13Z
|
2022-06-17T00:11:13Z
| null |
[]
|
Use after free in lru crate
|
Lru crate has use after free vulnerability.
Lru crate has two functions for getting an iterator. Both iterators give
references to key and value. Calling specific functions, like pop(), will remove
and free the value, and but it's still possible to access the reference of value
which is already dropped causing use after free.
|
[]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'lru'}, 'ecosystem_specific': {'affected_functions': ['lru::LruCache::iter', 'lru::LruCache::iter_mut']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/jeromefroe/lru-rs/issues/120'}, {'type': 'PACKAGE', 'url': 'https://github.com/jeromefroe/lru-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0130.html'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:11:13Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-64qm-hrgp-pgr9
|
2022-07-21T14:53:46Z
|
2022-06-09T23:47:57Z
| null |
['CVE-2022-31033']
|
Mechanize before v2.8.5 vulnerable to authorization header leak on port redirect
|
**Summary**
Mechanize (rubygem) `< v2.8.5` leaks the `Authorization` header after a redirect to a different port on the same site.
**Mitigation**
Upgrade to Mechanize v2.8.5 or later.
**Notes**
See [https://curl.se/docs/CVE-2022-27776.html](CVE-2022-27776) for a similar vulnerability in curl.
Cookies are shared with a server at a different port on the same site, per https://datatracker.ietf.org/doc/html/rfc6265#section-8.5 which states in part:
> Cookies do not provide isolation by port. If a cookie is readable
> by a service running on one port, the cookie is also readable by a
> service running on another port of the same server. If a cookie is
> writable by a service on one port, the cookie is also writable by a
> service running on another port of the same server. For this
> reason, servers SHOULD NOT both run mutually distrusting services on
> different ports of the same host and use cookies to store security-
> sensitive information.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'RubyGems', 'name': 'mechanize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.5'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/sparklemotion/mechanize/security/advisories/GHSA-64qm-hrgp-pgr9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31033'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/mechanize/commit/c7fe6996a5b95f9880653ba3bc548a8d4ef72317'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/mechanize/CVE-2022-31033.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/sparklemotion/mechanize'}]
|
{'cwe_ids': ['CWE-200', 'CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-09T23:47:57Z', 'nvd_published_at': '2022-06-09T20:15:00Z'}
|
1.4.0
|
GHSA-27mx-gchc-6xjp
|
2022-06-17T00:40:15Z
|
2022-06-11T00:00:17Z
| null |
['CVE-2022-21211']
|
Unhandled crash in npm posix
|
This affects all versions of package posix. When invoking the toString method, it will fallback to 0x0 value, as the value of toString is not invokable (not a function), and then it will crash with type-check.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'posix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.2.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21211'}, {'type': 'PACKAGE', 'url': 'https://github.com/ohmu/node-posix'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-POSIX-2400719'}]
|
{'cwe_ids': ['CWE-252'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:40:15Z', 'nvd_published_at': '2022-06-10T20:15:00Z'}
|
1.4.0
|
GHSA-22p3-qrh9-cx32
|
2022-06-29T21:51:23Z
|
2022-06-29T21:51:23Z
| null |
['CVE-2022-31052']
|
URL previews of unusual or maliciously-crafted pages can crash Synapse media repositories or Synapse monoliths
|
### Impact
URL previews of some web pages can exhaust the available stack space for the Synapse process due to unbounded recursion.
This is sometimes recoverable and leads to an error for the request causing the problem, but in other cases the Synapse process may crash altogether.
It is possible to exploit this maliciously, either by malicious users on the homeserver, or by remote users sending URLs that a local user's client may automatically request a URL preview for.
Remote users are not able to exploit this directly, because [the URL preview endpoint is authenticated](https://spec.matrix.org/v1.2/client-server-api/#get_matrixmediav3preview_url).
### Am I affected?
* deployments with `url_preview_enabled: false` set in configuration are not affected.
* deployments with `url_preview_enabled: true` set in configuration **are** affected.
* deployments with no configuration value set for `url_preview_enabled` are not affected, because the default is `false`.
### Patches
Administrators of homeservers with URL previews enabled are advised to upgrade to v1.61.1 or higher.
### Workarounds
* URL previews can be disabled in the configuration file by setting `url_preview_enabled: false`.
* Deployments using workers can choose to offload URL previews to one or more dedicated worker(s), ensuring that a process crash does not disrupt other functionality of Synapse.
### For more information
If you have any questions or comments about this advisory, e-mail us at [[email protected]](mailto:[email protected]).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.61.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/security/advisories/GHSA-22p3-qrh9-cx32'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31052'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/commit/fa1308061802ac7b7d20e954ba7372c5ac292333'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/synapse'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/matrix-synapse/PYSEC-2022-224.yaml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/7EARKKJZ2W7WUITFDT4EG4NVATFYJQHF/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/QGSDQ4YAITCUACAB7SXQZDJIU3IQ4CJD/'}, {'type': 'WEB', 'url': 'https://spec.matrix.org/v1.2/client-server-api/#get_matrixmediav3preview_url'}]
|
{'cwe_ids': ['CWE-674'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T21:51:23Z', 'nvd_published_at': '2022-06-28T17:15:00Z'}
|
1.4.0
|
GHSA-gp39-qj5f-43qv
|
2022-06-16T23:19:32Z
|
2022-06-03T00:01:05Z
| null |
['CVE-2022-29647']
|
Cross Site Request Forgery in Mingsoft MCMS
|
An issue was discovered in MCMS 5.2.7. There is a CSRF vulnerability that can add an administrator account via ms/basic/manager/save.do.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.7'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29647'}, {'type': 'WEB', 'url': 'https://gist.github.com/aaaahuia/f708c6c8a320e0f3afbb9247903c4670'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:19:32Z', 'nvd_published_at': '2022-06-02T14:15:00Z'}
|
1.4.0
|
GHSA-f2g5-426f-353q
|
2022-06-17T18:48:13Z
|
2022-06-09T00:00:20Z
| null |
['CVE-2022-30875']
|
Cross-site Scripting in Dolibarr
|
Dolibarr 12.0.5 is vulnerable to Cross Site Scripting (XSS) via Sql Error Page.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'versions': ['12.0.5']}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30875'}, {'type': 'PACKAGE', 'url': 'https://github.com/Dolibarr/dolibarr'}, {'type': 'WEB', 'url': 'https://github.com/mustgundogdu/Research/edit/main/Dolibar_12.0.5-ReflectedXSS,'}, {'type': 'WEB', 'url': 'https://github.com/mustgundogdu/Research/edit/main/Dolibar_12.0.5-ReflectedXSS/README.md'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-09T23:49:56Z', 'nvd_published_at': '2022-06-08T17:15:00Z'}
|
1.4.0
|
GHSA-chj3-f7xw-367m
|
2022-08-22T18:53:32Z
|
2022-06-11T00:00:18Z
| null |
['CVE-2022-24376']
|
OS Command Injection in git-promise
|
All versions of package git-promise is vulnerable to Command Injection due to an inappropriate fix of a prior [vulnerability](https://security.snyk.io/vuln/SNYK-JS-GITPROMISE-567476) in this package. **Note:** Please note that the vulnerability will not be fixed. The README file was updated with a warning regarding this issue.
### Credits
@lirantal for discovering this vulnerability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'git-promise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24376'}, {'type': 'WEB', 'url': 'https://github.com/lirantal/git-promise/commit/030e4f993f3b65419d60f7f60e81e0a742b72e77'}, {'type': 'WEB', 'url': 'https://gist.github.com/lirantal/9da1fceb32f5279eb76a5fc1cb9707dd'}, {'type': 'PACKAGE', 'url': 'https://github.com/piuccio/git-promise'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-GITPROMISE-2434310'}]
|
{'cwe_ids': ['CWE-77', 'CWE-88'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:56:05Z', 'nvd_published_at': '2022-06-10T20:15:00Z'}
|
1.4.0
|
GHSA-w689-557m-2cvq
|
2022-06-03T15:35:32Z
|
2022-06-03T15:35:32Z
| null |
['CVE-2022-1285']
|
Server-Side Request Forgery in gogs webhook
|
### Impact
The malicious user is able to discover services in the internal network through webhook functionality. All installations accepting public traffic are affected.
### Patches
Webhook payload URLs are revalidated before each delivery to make sure they are not resolved to blocked local network addresses. Users should upgrade to 0.12.8 or the latest 0.13.0+dev.
### Workarounds
Run Gogs in its own private network.
### References
https://huntr.dev/bounties/da1fbd6e-7a02-458e-9c2e-6d226c47046d/
### For more information
If you have any questions or comments about this advisory, please post on https://github.com/gogs/gogs/issues/6901.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'gogs.io/gogs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.8'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/gogs/gogs/security/advisories/GHSA-w689-557m-2cvq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1285'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/commit/7885f454a4946c4bbec1b4f8c603b5eea7429c7f'}, {'type': 'PACKAGE', 'url': 'https://github.com/gogs/gogs'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/da1fbd6e-7a02-458e-9c2e-6d226c47046d'}]
|
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T15:35:32Z', 'nvd_published_at': '2022-06-01T06:15:00Z'}
|
1.4.0
|
GHSA-qw3f-w4pf-jh5f
|
2023-08-24T20:25:40Z
|
2022-06-01T00:00:36Z
| null |
['CVE-2022-30973']
|
Regular expression denial of service in apache tika
|
We failed to apply the fix for CVE-2022-30126 to the 1.x branch in the 1.28.2 release. In Apache Tika, a regular expression in the StandardsText class, used by the StandardsExtractingContentHandler could lead to a denial of service caused by backtracking on a specially crafted file. This only affects users who are running the StandardsExtractingContentHandler, which is a non-standard handler. This is fixed in 1.28.3.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tika:tika-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.17'}, {'fixed': '1.28.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30973'}, {'type': 'WEB', 'url': 'https://github.com/apache/tika/commit/a36711610fa1f6f5ba0f594803415af795e0b265'}, {'type': 'WEB', 'url': 'https://github.com/apache/tika/commit/e76302196ebcafb7b51fce37fbe8256e6c0fbc51'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rpjm-422r-95mh'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tika'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/gqvb5t4p7tmdpl0y5bdbf72pgxj04h7p'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220722-0004/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/05/31/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/06/27/5'}]
|
{'cwe_ids': ['CWE-1333'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:18:15Z', 'nvd_published_at': '2022-05-31T14:15:00Z'}
|
1.4.0
|
GHSA-5ffw-gxpp-mxpf
|
2022-06-06T22:07:10Z
|
2022-06-06T22:07:10Z
| null |
['CVE-2022-31030']
|
containerd CRI plugin: Host memory exhaustion through ExecSync
|
### Impact
A bug was found in containerd's CRI implementation where programs inside a container can cause the containerd daemon to consume memory without bound during invocation of the `ExecSync` API. This can cause containerd to consume all available memory on the computer, denying service to other legitimate workloads. Kubernetes and crictl can both be configured to use containerd's CRI implementation; `ExecSync` may be used when running probes or when executing processes via an "exec" facility.
### Patches
This bug has been fixed in containerd 1.6.6 and 1.5.13. Users should update to these versions to resolve the issue.
### Workarounds
Ensure that only trusted images and commands are used.
### References
* Similar fix in cri-o's CRI implementation https://github.com/cri-o/cri-o/security/advisories/GHSA-fcm2-6c3h-pg6j
### Credits
The containerd project would like to thank David Korczynski and Adam Korczynski of ADA Logics for responsibly disclosing this issue in accordance with the [containerd security policy](https://github.com/containerd/project/blob/main/SECURITY.md) during a security audit sponsored by CNCF and facilitated by OSTIF.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [containerd](https://github.com/containerd/containerd/issues/new/choose)
* Email us at [[email protected]](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/containerd/containerd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.13'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/containerd/containerd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.6.6'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/containerd/containerd/security/advisories/GHSA-5ffw-gxpp-mxpf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31030'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/commit/c1bcabb4541930f643aa36a2b38655e131346382'}, {'type': 'PACKAGE', 'url': 'https://github.com/containerd/containerd'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/REOZCUAPCA7NFDWYBDYX6EYXWLHABKBO/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/WSIGDBHAB3I75JBJNGWEPBTJPS2FOVHD/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5162'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/06/07/1'}]
|
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-06T22:07:10Z', 'nvd_published_at': '2022-06-09T14:15:00Z'}
|
1.4.0
|
GHSA-rm89-9g65-4ffr
|
2022-06-17T01:16:36Z
|
2022-06-17T01:16:36Z
| null |
[]
|
Insufficient HTML Sanitization
|
### Impact
Affected versions can have malicious javascript code injected into the users browser by other authenticated users, as data fields retrieved from the database are not properly sanitized before displaying in various front-end views.
The problem here stems from multiple issues:
- Insufficient database sanitation on multiple fields allows injection of un-sanitized HTML
- Lack of HTML escaping when rendering data on the front end
The attack vector here is limited, as only authenticated users are able to write data to the database, for it to be subsequently rendered on the front-end. However, it is a vulnerability that the InvenTree development team takes seriously.
### Solution
The proposed patch for this vulnerability is prevents injection of un-escaped fields into front-end UI elements.
A future patch will also address sanitization of database fields on the "back end", however this will require a much larger effort to refactor multiple database tables.
### Patches
- The issue is addressed in the upcoming `0.8.0` release
- This fix will also be back-ported to the `0.7.x` branch, applied to the `0.7.2` release
### Workarounds
There are no workarounds for this issue, users should upgrade to a patched version.
### References
- https://huntr.dev/bounties/4cae8442-c042-43c2-ad89-6f666eaf3d57/
- https://huntr.dev/bounties/9d640ef2-c52c-4106-b043-f7497d577078/
- https://huntr.dev/bounties/b114e82f-6c02-485b-82ea-e242f89169c2/
- https://huntr.dev/bounties/22783cd3-1b2c-48fc-b31f-03b53c86da0b/
Thank you @saharshtapi for bringing this issue to our attention and giving pointers for fixing them.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [github](http://github.com/inventree/inventree)
* Email us at [[email protected]](mailto:[email protected])
|
[]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'inventree'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/inventree/InvenTree/security/advisories/GHSA-rm89-9g65-4ffr'}, {'type': 'PACKAGE', 'url': 'https://github.com/inventree/inventree-python/'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T01:16:36Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-4v3r-hqr9-69jf
|
2022-06-23T06:44:17Z
|
2022-06-13T00:00:18Z
| null |
['CVE-2022-2054']
|
Command Injection in Nuitka
|
Nuitka 0.8.4 and prior is vulnerable to command injection. A patch is available and anticipated to be part of the `0.9` release.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'Nuitka'}, 'ecosystem_specific': {'affected_functions': ['nuitka.__main__.main', 'nuitka.build.SconsCaching.checkCachingSuccess', 'nuitka.nodes.NodeBases.fromXML', 'nuitka.plugins.PluginBase.NuitkaPluginBase']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.8.4'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2054'}, {'type': 'WEB', 'url': 'https://github.com/Nuitka/Nuitka/commit/1765ffce2a9ab859853210337390de242cd80712'}, {'type': 'PACKAGE', 'url': 'https://github.com/nuitka/nuitka'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/nuitka/PYSEC-2022-209.yaml'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ea4a842c-c48c-4aae-a599-3305125c63a7'}]
|
{'cwe_ids': ['CWE-77', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T06:44:17Z', 'nvd_published_at': '2022-06-12T14:15:00Z'}
|
1.4.0
|
GHSA-4p35-cfcx-8653
|
2022-07-07T17:15:50Z
|
2022-06-28T00:01:01Z
| null |
['CVE-2022-0722']
|
Hostname confusion in parse-url
|
Exposure of Sensitive Information to an Unauthorized Actor via hostname confusion in GitHub repository ionicabizau/parse-url prior to 6.0.1
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'parse-url'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0722'}, {'type': 'WEB', 'url': 'https://github.com/ionicabizau/parse-url/commit/21c72ab9412228eea753e2abc48f8962707b1fe3'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/2490ef6d-5577-4714-a4dd-9608251b4226'}]
|
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:05:53Z', 'nvd_published_at': '2022-06-27T11:15:00Z'}
|
1.4.0
|
GHSA-9hx5-jmxv-x44q
|
2022-07-05T22:17:16Z
|
2022-06-18T00:00:25Z
| null |
['CVE-2022-2112']
|
CSV Injection in inventree
|
Improper Neutralization of Formula Elements in a CSV File in GitHub repository inventree/inventree prior to 0.7.2.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'inventree'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2112'}, {'type': 'WEB', 'url': 'https://github.com/inventree/inventree/commit/26bf51c20a1c9b3130ac5dd2e17649bece5ff84f'}, {'type': 'PACKAGE', 'url': 'https://github.com/inventree/InvenTree'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/e57c36e7-fa39-435f-944a-3a52ee066f73'}]
|
{'cwe_ids': ['CWE-1236'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:17:16Z', 'nvd_published_at': '2022-06-17T13:15:00Z'}
|
1.4.0
|
GHSA-q6wq-5p59-983w
|
2022-07-07T17:15:32Z
|
2022-06-28T00:01:02Z
| null |
['CVE-2022-2217']
|
Cross site scripting in parse-url
|
Cross-site Scripting (XSS) - Generic in GitHub repository ionicabizau/parse-url prior to 6.0.1
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'parse-url'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2217'}, {'type': 'WEB', 'url': 'https://github.com/ionicabizau/parse-url/commit/21c72ab9412228eea753e2abc48f8962707b1fe3'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/4e046c63-b1ca-4bcc-b418-29796918a71b'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:07:55Z', 'nvd_published_at': '2022-06-27T11:15:00Z'}
|
1.4.0
|
GHSA-g63h-q855-vp3q
|
2022-07-11T21:21:42Z
|
2022-06-17T01:11:42Z
| null |
['CVE-2022-31066']
|
Configuration API in EdgeXFoundry 2.1.0 and earlier exposes message bus credentials to local unauthenticated users
|
### Impact
The /api/v2/config endpoint exposes message bus credentials to local unauthenticated users. In security-enabled mode, message bus credentials are supposed to be kept in the EdgeX secret store and require authentication to access. This vulnerability bypasses the access controls on message bus credentials when running in security-enabled mode. (No credentials are required when running in security-disabled mode.) As a result, attackers could intercept data or inject fake data into the EdgeX message bus.
### Patches
Users should upgrade to EdgeXFoundry Kamakura release (2.2.0) or to the June 2022 EdgeXFoundry LTS Jakarta release (2.1.1).
The issue has been patched in the following docker containers and snaps:
#### Patched go modules
github.com/edgexfoundry/device-sdk-go/v2 >= v2.1.1
github.com/edgexfoundry/app-functions-sdk-go/v2 >= v2.1.1
#### Patched docker containers
URL: https://hub.docker.com/r/edgexfoundry
- docker.io/edgexfoundry/core-metadata:>=2.1.1
- docker.io/edgexfoundry/core-metadata-arm64:>=2.1.1
- docker.io/edgexfoundry/core-data:>=2.1.1
- docker.io/edgexfoundry/core-data-arm64:>=2.1.1
- docker.io/edgexfoundry/core-command:>=2.1.1
- docker.io/edgexfoundry/core-command-arm64:>=2.1.1
- docker.io/edgexfoundry/support-notifications:>=2.1.1
- docker.io/edgexfoundry/support-notifications-arm64:>=2.1.1
- docker.io/edgexfoundry/support-scheduler:>=2.1.1
- docker.io/edgexfoundry/support-scheduler-arm64:>=2.1.1
- docker.io/edgexfoundry/sys-mgmt-agent:>=2.1.1
- docker.io/edgexfoundry/sys-mgmt-agent-arm64:>=2.1.1
- docker.io/edgexfoundry/security-proxy-setup:>=2.1.1
- docker.io/edgexfoundry/security-proxy-setup-arm64:>=2.1.1
- docker.io/edgexfoundry/security-secretstore-setup:>=2.1.1
- docker.io/edgexfoundry/security-secretstore-setup-arm64:>=2.1.1
- docker.io/edgexfoundry/security-bootstrapper:>=2.1.1
- docker.io/edgexfoundry/security-bootstrapper-arm64:>=2.1.1
- docker.io/edgexfoundry/app-rfid-llrp-inventory:>=2.1.1
- docker.io/edgexfoundry/app-rfid-llrp-inventory-arm64:>=2.1.1
- docker.io/edgexfoundry/app-service-configurable:>=2.1.1
- docker.io/edgexfoundry/app-service-configurable-arm64:>=2.1.1
- docker.io/edgexfoundry/device-camera:>=2.2.0
- docker.io/edgexfoundry/device-camera-arm64:>=2.2.0
- docker.io/edgexfoundry/device-gpio:>=2.1.1
- docker.io/edgexfoundry/device-gpio-arm64:>=2.1.1
- docker.io/edgexfoundry/device-modbus:>=2.1.1
- docker.io/edgexfoundry/device-modbus-arm64:>=2.1.1
- docker.io/edgexfoundry/device-mqtt:>=2.1.1
- docker.io/edgexfoundry/device-mqtt-arm64:>=2.1.1
- docker.io/edgexfoundry/device-rest:>=2.1.1
- docker.io/edgexfoundry/device-rest-arm64:>=2.1.1
- docker.io/edgexfoundry/device-rfid-llrp:>=2.1.1
- docker.io/edgexfoundry/device-rfid-llrp-arm64:>=2.1.1
- docker.io/edgexfoundry/device-snmp:>=2.1.1
- docker.io/edgexfoundry/device-snmp-arm64:>=2.1.1
- docker.io/edgexfoundry/device-virtual:>=2.1.1
- docker.io/edgexfoundry/device-virtual-arm64:>=2.1.1
#### Patched snaps
URL: https://snapcraft.io/edgexfoundry
edgexfoundry 2.1/stable (will be automatically upgraded to 2.1.1)
### Workarounds
No workaround available.
### References
* https://github.com/edgexfoundry/edgex-go/security/advisories/GHSA-g63h-q855-vp3q
* https://github.com/edgexfoundry/device-sdk-go/pull/1161 (patch against Kamakura)
* https://github.com/edgexfoundry/edgex-go/pull/4016 (patch against Kamakura)
* https://github.com/edgexfoundry/edgex-go/pull/4039 (cherry-pick patch against Jakarta)
* https://github.com/edgexfoundry/device-sdk-go/pull/1167 (differs from patch on main: don't copy PW in vs delete it after)
### For more information
If you have any questions or comments about this advisory:
* Contact us in the [Slack #security channel](https://slack.edgexfoundry.org/)
* Open an issue in [edgex-go](https://github.com/edgexfoundry/edgex-go)
* Email us at [[email protected]](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/edgexfoundry/device-sdk-go/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/edgexfoundry/app-functions-sdk-go/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/edgexfoundry/edgex-go/security/advisories/GHSA-g63h-q855-vp3q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31066'}, {'type': 'WEB', 'url': 'https://github.com/edgexfoundry/device-sdk-go/pull/1161'}, {'type': 'WEB', 'url': 'https://github.com/edgexfoundry/edgex-go/pull/4016'}, {'type': 'PACKAGE', 'url': 'https://github.com/edgexfoundry/edgex-go'}]
|
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T01:11:42Z', 'nvd_published_at': '2022-06-14T22:15:00Z'}
|
1.4.0
|
GHSA-ww3v-6xjf-jv28
|
2022-06-28T23:23:20Z
|
2022-06-28T23:23:20Z
| null |
['CVE-2018-18855']
|
Uncontrolled Resource Consumption in Spray JSON
|
Recursive decent parsers are susceptible too StackOverflowExceptions on too deeply nested structures as currently "open" parsing state is kept on the stack.
|
[]
|
[{'package': {'ecosystem': 'Maven', 'name': 'io.spray:spray-json'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.5'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/spray/spray-json/pull/284'}, {'type': 'PACKAGE', 'url': 'https://github.com/spray/spray-json'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JAVA-IOSPRAY-72601'}]
|
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T23:23:20Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-rmpj-7c96-mrg8
|
2023-06-27T20:51:43Z
|
2022-06-14T00:00:37Z
| null |
['CVE-2021-37404']
|
Apache Hadoop heap overflow before v2.10.2, v3.2.3, v3.3.2
|
There is a potential heap buffer overflow in Apache Hadoop libhdfs native code. Opening a file path provided by user without validation may result in a denial of service or arbitrary code execution. Users should upgrade to Apache Hadoop 2.10.2, 3.2.3, 3.3.2 or higher.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.0'}, {'fixed': '3.3.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37404'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/hadoop'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/2h56ztcj3ojc66qzf1nno88vjw9vd4wo'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220715-0007/'}]
|
{'cwe_ids': ['CWE-120', 'CWE-131', 'CWE-787'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T01:09:36Z', 'nvd_published_at': '2022-06-13T07:15:00Z'}
|
1.4.0
|
GHSA-4jqc-jvh2-pxg9
|
2022-06-17T01:11:10Z
|
2022-06-17T01:11:10Z
| null |
[]
|
Path traversal for local publishers in TechDocs backend
|
### Impact
A malicious actor with the ability to register entities in the Software Catalog is able to write files to arbitrary paths on the techdocs backend host instance when `techdocs.publisher.type` is set to `local`.
This vulnerability is mitigated by the fact that the Software Catalog must be configured with non-standard field format validators and/or non-standard entity policies.
### Patches
Those affected are advised to upgrade to `@backstage/plugin-techdocs-node` version `1.1.2` or higher.
### Workarounds
If patching or upgrading is not possible, it would be sufficient to update any custom Catalog field format validators and/or custom entity policies to disallow entity names, kinds, and namespaces containing `..`
<!--
### References
todo: Link to blog post / published report.
-->
### For more information
If you have any questions or comments about this advisory:
- Open an issue in the [Backstage repository](https://github.com/backstage/backstage)
- Visit our chat, linked to in the [Backstage README](https://github.com/backstage/backstage)
|
[]
|
[{'package': {'ecosystem': 'npm', 'name': '@backstage/plugin-techdocs-node'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@backstage/techdocs-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.16'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/backstage/backstage/security/advisories/GHSA-4jqc-jvh2-pxg9'}, {'type': 'WEB', 'url': 'https://github.com/backstage/backstage/commit/429c9f9daa5654dd1b996aa85f7264eb23a2e4fa'}, {'type': 'PACKAGE', 'url': 'https://github.com/backstage/backstage'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T01:11:10Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-48f2-m7jg-866x
|
2022-06-06T21:24:39Z
|
2022-06-06T21:24:39Z
| null |
['CVE-2022-29254']
|
Failed payment recorded has completed in Silverstripe Omnipay
|
### Impact
For a subset of Omnipay gateways (those that use intermediary states like `isNotification()` or `isRedirect()`), if the payment identifier or success URL is exposed it is possible for payments to be prematurely marked as completed without payment being taken. This is mitigated by the fact that most payment gateways hide this information from users, however some issuing banks offer flawed 3DSecure implementations that may inadvertently expose this data.
### Patches
The following versions have been patched to fix this issue:
- `2.5.2`
- `3.0.2`
- `3.1.4`
- `3.2.1`
### Workarounds
There are no known workarounds for this vulnerability.
### References
N/A.
### For more information
If you have any questions or comments about this advisory:
* Email us at [[email protected]](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/silverstripe-omnipay'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/silverstripe-omnipay'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/silverstripe-omnipay'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/silverstripe-omnipay'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-omnipay/security/advisories/GHSA-48f2-m7jg-866x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29254'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-omnipay/commit/7dee9a1e0a5f54c2dc06e018cff3d9a19044e01b'}, {'type': 'PACKAGE', 'url': 'https://github.com/silverstripe/silverstripe-omnipay'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-omnipay/releases/tag/2.5.2'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-omnipay/releases/tag/3.0.2'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-omnipay/releases/tag/3.1.4'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-omnipay/releases/tag/3.2.1'}]
|
{'cwe_ids': ['CWE-436', 'CWE-437'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-06-06T21:24:39Z', 'nvd_published_at': '2022-06-09T07:15:00Z'}
|
1.4.0
|
GHSA-gp95-ppv5-3jc5
|
2022-09-15T01:24:15Z
|
2022-06-01T19:58:29Z
| null |
['CVE-2022-29256']
|
sharp vulnerable to Command Injection in post-installation over build environment
|
There's a possible vulnerability in logic that is run only at `npm install` time when installing versions of `sharp` prior to the latest v0.30.5.
This is not part of any runtime code, does not affect Windows users at all, and is unlikely to affect anyone that already cares about the security of their build environment. However, out of an abundance of caution, I've created this advisory.
If an attacker has the ability to set the value of the `PKG_CONFIG_PATH` environment variable in a build environment then they might be able to use this to inject an arbitrary command at `npm install` time.
I've used the Common Vulnerability Scoring System (CVSS) calculator to determine the maximum possible impact, which suggests a "medium" score of 5.9, but for most people the real impact will be dealing with the noise from automated security tooling that this advisory will bring.
[`AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C/CR:X/IR:X/AR:X/MAV:X/MAC:X/MPR:X/MUI:R/MS:X/MC:X/MI:X/MA:X`](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C/CR:X/IR:X/AR:X/MAV:X/MAC:X/MPR:X/MUI:R/MS:X/MC:X/MI:X/MA:X&version=3.1)
This problem was fixed in commit a6aeef6 and published as part of `sharp` v0.30.5.
Thank you very much to @dwisiswant0 for the responsible disclosure.
Remember: if an attacker has control over environment variables in your build environment then you have a bigger problem to deal with than this issue.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'sharp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.30.5'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/lovell/sharp/security/advisories/GHSA-gp95-ppv5-3jc5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29256'}, {'type': 'WEB', 'url': 'https://github.com/lovell/sharp/commit/a6aeef612be50f5868a77481848b1de674216f0c'}, {'type': 'WEB', 'url': 'https://advisory.dw1.io/54'}, {'type': 'PACKAGE', 'url': 'https://github.com/lovell/sharp'}]
|
{'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T19:58:29Z', 'nvd_published_at': '2022-05-25T22:15:00Z'}
|
1.4.0
|
GHSA-h4w9-6x78-8vrj
|
2022-06-21T20:04:34Z
|
2022-06-21T20:04:34Z
| null |
['CVE-2022-31035']
|
Argo CD's external URLs for Deployments can include JavaScript
|
### Impact
All unpatched versions of Argo CD starting with v1.0.0 are vulnerable to a cross-site scripting (XSS) bug allowing a malicious user to inject a `javascript:` link in the UI. When clicked by a victim user, the script will execute with the victim's permissions (up to and including admin).
The script would be capable of doing anything which is possible in the UI or via the API, such as creating, modifying, and deleting Kubernetes resources.
### Patches
A patch for this vulnerability has been released in the following Argo CD versions:
* v2.4.1
* v2.3.5
* v2.2.10
* v2.1.16
### Workarounds
There are no completely-safe workarounds besides upgrading.
**Mitigations:**
1. Avoid clicking external links presented in the UI. Here is an example of an Application node with an external link:

The link's title is user-configurable. So even if you hover the link, and the tooltip looks safe, the link might be malicious. The only way to be certain that the link is safe is to inspect the page's source.
2. Carefully limit who has permissions to edit resource manifests (this is configured in [RBAC](https://argo-cd.readthedocs.io/en/stable/operator-manual/rbac/)).
### References
* [Documentation for the external links feature](https://argo-cd.readthedocs.io/en/stable/user-guide/external-url/)
### Credits
Disclosed by ADA Logics in a security audit of the Argo project sponsored by CNCF and facilitated by OSTIF. Thanks to Adam Korczynski and David Korczynski for their work on the audit.
### For more information
* Open an issue in [the Argo CD issue tracker](https://github.com/argoproj/argo-cd/issues) or [discussions](https://github.com/argoproj/argo-cd/discussions)
* Join us on [Slack](https://argoproj.github.io/community/join-slack) in channel #argo-cd
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '2.1.16'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.8.7'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.16'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.5'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.1'}]}], 'versions': ['2.4.0']}]
|
[{'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/security/advisories/GHSA-h4w9-6x78-8vrj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31035'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/commit/8bc3ef690de29c68a36f473908774346a44d4038'}, {'type': 'WEB', 'url': 'https://argo-cd.readthedocs.io/en/stable/user-guide/external-url/'}, {'type': 'PACKAGE', 'url': 'https://github.com/argoproj/argo-cd'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-21T20:04:34Z', 'nvd_published_at': '2022-06-27T19:15:00Z'}
|
1.4.0
|
GHSA-fj34-jhjx-xmvv
|
2022-06-14T20:04:41Z
|
2022-06-03T00:00:33Z
| null |
['CVE-2021-33473']
|
Arbitrary file write in dragonfly
|
An argument injection vulnerability in Dragonfly Ruby Gem v1.3.0 allows attackers to read and write arbitrary files when the verify_url option is disabled. This vulnerability is exploited via a crafted URL.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'RubyGems', 'name': 'dragonfly'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33473'}, {'type': 'WEB', 'url': 'https://github.com/markevans/dragonfly/issues/513'}, {'type': 'WEB', 'url': 'https://github.com/markevans/dragonfly/commit/25399297bb457f7fcf8e3f91e85945b255b111b5'}, {'type': 'PACKAGE', 'url': 'https://github.com/markevans/dragonfly'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/dragonfly/CVE-2021-33473.yml'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220715-0004/'}]
|
{'cwe_ids': ['CWE-88'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:16:58Z', 'nvd_published_at': '2022-06-02T20:15:00Z'}
|
1.4.0
|
GHSA-j32j-2hxv-rqf7
|
2022-06-20T22:28:59Z
|
2022-06-18T00:00:20Z
| null |
['CVE-2022-25852']
|
Uncontrolled Resource Consumption in pg-native and libpq
|
All versions of package pg-native; all versions of package libpq are vulnerable to Denial of Service (DoS) when the addons attempt to cast the second argument to an array and fail. This happens for every non-array argument passed. **Note:** pg-native is a mere binding to npm's libpq library, which in turn has the addons and bindings to the actual C libpq library. This means that problems found in pg-native may transitively impact npm's libpq.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'libpq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.8.9'}}, {'package': {'ecosystem': 'npm', 'name': 'pg-native'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.0'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25852'}, {'type': 'WEB', 'url': 'https://github.com/brianc/node-libpq/issues/84'}, {'type': 'WEB', 'url': 'https://github.com/brianc/node-libpq/pull/86'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-LIBPQ-2392366'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PGNATIVE-2392365'}]
|
{'cwe_ids': ['CWE-400', 'CWE-88'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:28:59Z', 'nvd_published_at': '2022-06-17T20:15:00Z'}
|
1.4.0
|
GHSA-p2g9-94wh-65c2
|
2022-06-16T23:39:55Z
|
2022-06-16T23:39:55Z
| null |
[]
|
Space bug in `clean_text`
|
An incorrect mapping from HTML specification to ASCII codes was used.
Because HTML treats the Form Feed as whitespace, code like this has an injection bug:
let html = format!("<div title={}>", clean_text(user_supplied_string));
Applications are not affected if they quote their attributes, or if they don't use `clean_text` at all.
|
[]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'ammonia'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/rust-ammonia/ammonia/pull/147'}, {'type': 'WEB', 'url': 'https://github.com/rust-ammonia/ammonia/commit/6c7bf22907a75d1bbaed52e4f7dd9716f5e6f737'}, {'type': 'PACKAGE', 'url': 'https://github.com/rust-ammonia/ammonia'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0003.html'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:39:55Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-fcm2-6c3h-pg6j
|
2023-07-24T19:33:40Z
|
2022-06-06T21:50:21Z
| null |
['CVE-2022-1708']
|
Node DOS by way of memory exhaustion through ExecSync request in CRI-O
|
### Description
An ExecSync request runs a command in a container and returns the output to the Kubelet. It is used for readiness and liveness probes within a pod. The way CRI-O runs ExecSync commands is through conmon. CRI-O asks conmon to start the process, and conmon writes the output to disk. CRI-O then reads the output and returns it to the Kubelet.
If the output of the command is large enough, it is possible to exhaust the memory (or disk usage) of the node. The following deployment is an example yaml file that will output around 8GB of ‘A’ characters, which would be written to disk by conmon and read by CRI-O.
```yaml
apiVersion: apps/v1
kind: Deployment
metadata:
name: nginx-deployment100
spec:
selector:
matchLabels:
app: nginx
replicas: 2
template:
metadata:
labels:
app: nginx
spec:
containers:
- name: nginx
image: nginx:1.14.2
lifecycle:
postStart:
exec:
command: ["/bin/sh", "-c", "seq 1 50000000`; do echo -n 'aaaaaaaaaaaaaaaa'; done"]
```
### Impact
It is possible for the node to be exhausted of memory or disk space, depending on the node the command is being run on. What is further problematic is that the memory and disk usage aren't attributed to the container, as this file and its processing are implementation details of CRI-O. The consequence of the exhaustion is that other services on the node, e.g. other containers, will be unable to allocate memory and thus causing a denial of service.
### Patches
This vulnerability will be fixed in 1.24.1, 1.23.3, 1.22.5, v1.21.8, v1.20.8, v1.19.7
### Workarounds
At the time of writing, no workaround exists other than ensuring only trusted images are used.
### References
https://github.com/containerd/containerd/security/advisories/GHSA-5ffw-gxpp-mxpf
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the CRI-O repo](http://github.com/cri-o/cri-o/issues)
* To make a report, email your vulnerability to the private
[[email protected]](mailto:[email protected]) list
with the security details and the details expected for [all CRI-O bug
reports](https://github.com/cri-o/cri-o/blob/main/.github/ISSUE_TEMPLATE/bug-report.yml).
### Credits
Disclosed by Ada Logics in a security audit sponsored by CNCF and facilitated by OSTIF.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cri-o/cri-o'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.24.0'}, {'fixed': '1.24.1'}]}], 'versions': ['1.24.0']}, {'package': {'ecosystem': 'Go', 'name': 'github.com/cri-o/cri-o'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.23.0'}, {'fixed': '1.23.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/cri-o/cri-o'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.22.5'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/cri-o/cri-o/security/advisories/GHSA-fcm2-6c3h-pg6j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1708'}, {'type': 'WEB', 'url': 'https://github.com/cri-o/cri-o/commit/f032cf649ecc7e0c46718bd9e7814bfb317cb544'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2085361'}, {'type': 'PACKAGE', 'url': 'https://github.com/cri-o/cri-o'}]
|
{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-06T21:50:21Z', 'nvd_published_at': '2022-06-07T18:15:00Z'}
|
1.4.0
|
GHSA-7m9h-v68w-pfw3
|
2022-08-30T20:12:54Z
|
2022-06-03T00:00:41Z
| null |
['CVE-2022-30429']
|
Neos CMS vulnerable to XSS in various backend modules
|
Multiple cross-site scripting (XSS) vulnerabilities in Neos CMS allow attackers with the editor role or higher to inject arbitrary script or HTML code using the editor function, the deletion of assets, or a workspace title. The vulnerabilities were found in versions 3.3.29 and 8.0.1 and could also be present in all intermediate versions.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'neos/neos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.0'}, {'fixed': '4.4.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'neos/neos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3.0'}, {'fixed': '5.3.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'neos/neos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.9'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'neos/neos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.1.0'}, {'fixed': '7.1.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'neos/neos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.2.0'}, {'fixed': '7.2.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'neos/neos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.3.0'}, {'fixed': '7.3.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'neos/neos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.0.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30429'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/neos/neos/CVE-2022-30429.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/neos/neos'}, {'type': 'WEB', 'url': 'https://it-sec.de/unbekannte-schwachstellen-in-neos-cms/'}, {'type': 'WEB', 'url': 'https://www.neos.io/blog/xss-in-various-backend-modules.html'}, {'type': 'WEB', 'url': 'http://cms.com'}, {'type': 'WEB', 'url': 'http://neos.com'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:12:54Z', 'nvd_published_at': '2022-06-02T18:15:00Z'}
|
1.4.0
|
GHSA-6hjc-m38h-7jhh
|
2022-06-20T22:38:22Z
|
2022-06-13T00:00:19Z
| null |
['CVE-2021-41750']
|
Cross-site Scripting in SEOmatic plugin
|
A cross-site scripting (XSS) vulnerability in the SEOmatic plugin 3.4.10 for Craft CMS 3 allows remote attackers to inject arbitrary web script via a GET to /index.php?action=seomatic/file/seo-file-link with url parameter containing the base64 encoded URL of a malicious web page / file and fileName parameter containing an arbitrary filename with the intended content-type to be rendered in the user's browser as the extension.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'nystudio107/craft-seomatic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.11'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41750'}, {'type': 'WEB', 'url': 'https://github.com/nystudio107/craft-seomatic/commit/4e46b792ce973ac0c652fb330055f41aca1981c8'}, {'type': 'WEB', 'url': 'https://github.com/nystudio107/craft-seomatic/commit/5f2cdc7c39e0a4bfb60d2f84131508f0a87b2873'}, {'type': 'PACKAGE', 'url': 'https://github.com/nystudio107/craft-seomatic'}, {'type': 'WEB', 'url': 'https://github.com/nystudio107/craft-seomatic/blob/develop/CHANGELOG.md'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:38:22Z', 'nvd_published_at': '2022-06-12T12:15:00Z'}
|
1.4.0
|
GHSA-w4q4-jcm7-g4m6
|
2022-07-05T22:08:44Z
|
2022-06-17T00:01:21Z
| null |
['CVE-2020-28865']
|
Insufficiently Protected Credentials in PowerJob
|
An issue was discovered in PowerJob through 3.2.2, allows attackers to change arbitrary user passwords via the id parameter to /appinfo/save.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.github.kfcfans:powerjob'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28865'}, {'type': 'WEB', 'url': 'https://github.com/KFCFans/PowerJob/issues/99'}, {'type': 'WEB', 'url': 'https://github.com/PowerJob/PowerJob/commit/464ce2dc0ca3e65fa1dc428239829890c52a413a'}, {'type': 'PACKAGE', 'url': 'https://github.com/PowerJob/PowerJob'}]
|
{'cwe_ids': ['CWE-522'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:08:44Z', 'nvd_published_at': '2022-06-16T21:15:00Z'}
|
1.4.0
|
GHSA-3pqv-6pm3-g46j
|
2022-06-22T17:49:21Z
|
2022-06-14T00:00:37Z
| null |
['CVE-2022-2067']
|
SQL Injection in RosarioSIS
|
SQL Injection in GitHub repository francoisjacquet/rosariosis prior to 9.0.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'francoisjacquet/rosariosis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2067'}, {'type': 'WEB', 'url': 'https://github.com/francoisjacquet/rosariosis/commit/15d5e8700d538935b5c411b2a1e25bcf7e16c47c'}, {'type': 'PACKAGE', 'url': 'https://github.com/francoisjacquet/rosariosis'}, {'type': 'WEB', 'url': 'https://github.com/francoisjacquet/rosariosis/blob/51947b6cfc7f0df62ab3305839c89586004fbec2/modules/School_Setup/Calendar.php#L498'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a85a53a4-3009-4f41-ac33-8bed8bbe16a8'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-22T17:49:21Z', 'nvd_published_at': '2022-06-13T13:15:00Z'}
|
1.4.0
|
GHSA-qr6m-f3gv-8678
|
2022-07-08T19:19:48Z
|
2022-06-29T00:00:55Z
| null |
['CVE-2022-23896']
|
Cross-site Scripting in admidio
|
Admidio 4.1.2 version is affected by stored cross-site scripting (XSS).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'admidio/admidio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23896'}, {'type': 'WEB', 'url': 'https://github.com/admidio/admidio/commit/1ff30f7cc7159bfa0235a7df3f60c0771a0e22a9'}, {'type': 'PACKAGE', 'url': 'https://github.com/Admidio/admidio'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/79c2d16c-bae2-417f-ab50-10c52707a30f/'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T19:19:48Z', 'nvd_published_at': '2022-06-28T13:15:00Z'}
|
1.4.0
|
GHSA-35r9-gfqf-r6cw
|
2022-12-05T21:39:54Z
|
2022-06-24T00:00:32Z
| null |
['CVE-2022-34212']
|
Missing permission check in Jenkins vRealize Orchestrator Plugin
|
A missing permission check in Jenkins vRealize Orchestrator Plugin 3.0 and earlier allows attackers with Overall/Read permission to send an HTTP POST request to an attacker-specified URL.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:vmware-vrealize-orchestrator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34212'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/vmware-vrealize-orchestrator-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2279'}]
|
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T19:14:57Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
|
1.4.0
|
GHSA-hv9v-7w3v-rj6f
|
2023-06-13T16:02:49Z
|
2022-06-16T23:38:37Z
| null |
[]
|
`Read` on uninitialized buffer in `fill_buf()` and `read_up_to()`
|
Affected versions of this crate passes an uninitialized buffer to a user-provided `Read` implementation.
Arbitrary `Read` implementations can read from the uninitialized buffer (memory exposure) and also can return incorrect number of bytes written to the buffer.
Reading from uninitialized memory produces undefined values that can quickly invoke undefined behavior.
|
[]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'acc_reader'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/netvl/acc_reader/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/netvl/acc_reader'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0155.html'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:38:37Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-pq7f-cq6q-94xh
|
2022-06-29T22:08:50Z
|
2022-06-21T00:00:48Z
| null |
['CVE-2017-20062']
|
Cross-Site Request Forgery in Elefant CMS
|
A vulnerability was found in Elefant CMS 1.3.12-RC and classified as problematic. This issue affects some unknown processing. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'elefant/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.13'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-20062'}, {'type': 'PACKAGE', 'url': 'https://github.com/jbroadway/elefant'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.97259'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2017/Feb/37'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T22:08:50Z', 'nvd_published_at': '2022-06-20T05:15:00Z'}
|
1.4.0
|
GHSA-p6gj-gpc8-f8xw
|
2022-06-17T00:13:24Z
|
2022-06-17T00:13:24Z
| null |
[]
|
Aliased mutable references from `tls_rand` & `TlsWyRand`
|
`TlsWyRand`'s implementation of `Deref` unconditionally dereferences a raw pointer, and returns
multiple mutable references to the same object, which is undefined behavior.
|
[]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'nanorand'}, 'ecosystem_specific': {'affected_functions': ['nanorand::tls::tls_rand']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.5.0'}, {'fixed': '0.6.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/Absolucy/nanorand-rs/issues/28'}, {'type': 'PACKAGE', 'url': 'https://github.com/Absolucy/nanorand-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0114.html'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:13:24Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-w3vw-ccc5-qr8v
|
2022-06-17T01:17:41Z
|
2022-06-17T01:17:41Z
| null |
[]
|
Use After Free in Context::start_auth_session
|
### Impact
**This issue only applies to applications starting authorization sessions using an explicit initial `nonce`.**
When [`Context::start_auth_session`](https://docs.rs/tss-esapi/7.0.1/tss_esapi/struct.Context.html#method.start_auth_session) was called with a `nonce` argument value of `Some(...)`, the nonce pointer passed down through FFI to `Esys_StartAuthSession` would be a dangling pointer, left over from a defunct instance of `TPM2B_NONCE`. This could lead to an incorrect value being used as a nonce, though whether that value is controllable is unclear (so should be assumed as possible). The error became apparent due to changes in v1.61.0 of the Rust compiler.
Logs indicating a failure due to this issue (with the 1.61.0 version of the Rust toolchain) look as follows:
```
2022-05-24T01:04:41.9131341Z WARNING:esys:src/tss2-esys/api/Esys_StartAuthSession.c:390:Esys_StartAuthSession_Finish() Received TPM Error
2022-05-24T01:04:41.9132192Z ERROR:esys:src/tss2-esys/api/Esys_StartAuthSession.c:136:Esys_StartAuthSession() Esys Finish ErrorCode (0x000001d5)
2022-05-24T01:04:41.9145124Z [2022-05-24T01:04:41Z ERROR tss_esapi::context::tpm_commands::session_commands] Error when creating a session: structure is the wrong size (associated with parameter number 1)
2022-05-24T01:04:41.9153816Z thread 'main' panicked at 'Call to start_auth_session failed: Tss2Error(FormatOne(FormatOneResponseCode { .0: 469, error_number: 21, parameter: true, format_selector: true, number: 1 }))', tss-esapi/tests/integration_tests/context_tests/tpm_commands/enhanced_authorization_ea_commands_tests.rs:870:14
```
### Patches
The issue has been patched in versions 6 and 7 of the `tss-esapi` crate. Please update to `7.1.0` or `6.1.2`.
### Workarounds
There is no workaround that achieves the same functionality.
### References
For more information on the cause of the issue and the fix, see [this](https://github.com/parallaxsecond/rust-tss-esapi/pull/344) PR.
For more details about the `TPM2_StartAuthSession` command see section 11.1 of [the TPM spec, part 3](https://trustedcomputinggroup.org/wp-content/uploads/TCG_TPM2_r1p59_Part3_Commands_pub.pdf), and section 19.6.3 of [part 1 of the same spec](https://trustedcomputinggroup.org/wp-content/uploads/TCG_TPM2_r1p59_Part1_Architecture_pub.pdf) for more information regarding session nonces.
### For more information
If you have any questions or comments about this advisory:
* Open an issue or discussion in [our repo](https://github.com/parallaxsecond/rust-tss-esapi)
* Get in touch on [our Slack channel](https://github.com/parallaxsecond/community#community-channel)
|
[]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'tss-esapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.1.0'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'tss-esapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.1.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/parallaxsecond/rust-tss-esapi/security/advisories/GHSA-w3vw-ccc5-qr8v'}, {'type': 'PACKAGE', 'url': 'https://github.com/parallaxsecond/rust-tss-esapi'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T01:17:41Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-r45x-ghr2-qjxc
|
2022-06-23T17:29:03Z
|
2022-06-17T00:30:52Z
|
2022-06-23T17:29:03Z
|
[]
|
Duplicate Advisory: `#[zeroize(drop)]` doesn't implement `Drop` for `enum`s
|
## Duplicate Advisory
This advisory is a duplicate of [GHSA-c5hx-w945-j4pq](https://github.com/advisories/GHSA-c5hx-w945-j4pq). This link is preserved to maintain external references.
## Original Description
Affected versions of this crate did not implement `Drop` when `#[zeroize(drop)]` was used on an `enum`.
This can result in memory not being zeroed out after dropping it, which is exactly what is intended when adding this attribute.
The flaw was corrected in version 1.2 and `#[zeroize(drop)]` on `enum`s now properly implements `Drop`.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'zeroize_derive'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/iqlusioninc/crates/issues/876'}, {'type': 'PACKAGE', 'url': 'https://github.com/iqlusioninc/crates'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0115.html'}]
|
{'cwe_ids': ['CWE-226'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:30:52Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-xfqg-p48g-hh94
|
2022-06-02T21:02:00Z
|
2022-06-02T21:02:00Z
| null |
[]
|
Login timing attack in ezsystems/ezpublish-kernel
|
Ibexa DXP is using random execution time to hinder timing attacks against user accounts, a method of discovering whether a given account exists in a system without knowing its password, thus affecting privacy. This implementation was found to not be good enough in some situations. The fix replaces this with constant time functionality, configured in the new security.yml parameter 'ibexa.security.authentication.constant_auth_time'. It will log a warning if the constant time is exceeded. If this happens the setting should be increased.
|
[]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezpublish-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.5.0'}, {'fixed': '7.5.29'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezpublish-kernel/security/advisories/GHSA-xfqg-p48g-hh94'}, {'type': 'WEB', 'url': 'https://github.com/ezsystems/ezpublish-kernel/commit/913fe17281536a91437d94e8267181ae8b57f5d5'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-006-vulnerabilities-in-page-builder-login-and-commerce'}, {'type': 'PACKAGE', 'url': 'https://github.com/ezsystems/ezpublish-kernel'}, {'type': 'WEB', 'url': 'https://issues.ibexa.co/browse/IBX-1755'}]
|
{'cwe_ids': ['CWE-208'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T21:02:00Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-px3r-27qc-hx5g
|
2022-07-07T17:14:17Z
|
2022-06-24T00:00:32Z
| null |
['CVE-2022-34298']
|
NT auth module vulnerability in OpenAM
|
The NT auth module in OpenAM before 14.6.6 allows a "replace Samba username attack."
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.openidentityplatform.openam:openam-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '14.6.6'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34298'}, {'type': 'WEB', 'url': 'https://github.com/OpenIdentityPlatform/OpenAM/pull/514'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenIdentityPlatform/OpenAM'}, {'type': 'WEB', 'url': 'https://github.com/OpenIdentityPlatform/OpenAM/compare/14.6.5...14.6.6'}, {'type': 'WEB', 'url': 'https://github.com/OpenIdentityPlatform/OpenAM/releases/tag/14.6.6'}]
|
{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-25T07:23:20Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
|
1.4.0
|
GHSA-jvxx-v45p-v5vf
|
2022-06-29T20:37:27Z
|
2022-06-23T06:45:03Z
| null |
['CVE-2022-31110']
|
Denial of Service (DoS) vulnerability in RSSHub
|
### Impact
Passing some special values to the `filter` and `filterout` parameters can cause an abnormally high CPU. Impact on the performance of the servers and RSSHub services.
### Patches
It is fixed in 5c4177441417b44a6e45c3c63e9eac2504abeb5b , please update to this or the later versions as soon as possible.
### References
Full report: https://github.com/DIYgod/RSSHub/issues/10045
### For more information
If you have any questions or comments about this advisory:
* Open an issue in <https://github.com/DIYgod/RSSHub/issues>
* Email us at [[email protected]](mailto:[email protected])
### Credits
@Rongronggg9
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'rsshub'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/DIYgod/RSSHub/security/advisories/GHSA-jvxx-v45p-v5vf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31110'}, {'type': 'WEB', 'url': 'https://github.com/DIYgod/RSSHub/issues/10045'}, {'type': 'WEB', 'url': 'https://github.com/DIYgod/RSSHub/commit/4671720f4c5e1aaaad8fcc1dce684b6546baf2ff'}, {'type': 'WEB', 'url': 'https://github.com/DIYgod/RSSHub/commit/5c4177441417b44a6e45c3c63e9eac2504abeb5b'}, {'type': 'PACKAGE', 'url': 'https://github.com/DIYgod/RSSHub'}]
|
{'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T06:45:03Z', 'nvd_published_at': '2022-06-29T18:15:00Z'}
|
1.4.0
|
GHSA-q4w5-4gq2-98vm
|
2022-06-21T20:04:51Z
|
2022-06-21T20:04:51Z
| null |
['CVE-2022-31036']
|
Symlink following allows leaking out-of-bounds YAML files from Argo CD repo-server
|
### Impact
All unpatched versions of Argo CD starting with v1.3.0 are vulnerable to a symlink following bug allowing a malicious user with repository write access to leak sensitive YAML files from Argo CD's repo-server.
A malicious Argo CD user with write access for a repository which is (or may be) used in a Helm-type Application may commit a symlink which points to an out-of-bounds file. If the target file is a valid YAML file, the attacker can read the contents of that file.
Sensitive files which could be leaked include manifest files from other Applications' source repositories (potentially decrypted files, if you are using a decryption plugin) or any YAML-formatted secrets which have been mounted as files on the repo-server.
### Patches
A patch for this vulnerability has been released in the following Argo CD versions:
* v2.4.1
* v2.3.5
* v2.2.10
* v2.1.16
### Workarounds
* If you are using >=v2.3.0 and do not have any Helm-type Applications, [disable the Helm config management tool](https://argo-cd.readthedocs.io/en/stable/user-guide/tool_detection/#disable-built-in-tools).
#### Mitigations
* Avoid mounting YAML-formatted secrets as files on the repo-server.
* Upgrade to >=2.3.0 to significantly reduce the risk of leaking out-of-bounds manifest files. Starting with 2.3.0, repository paths are randomized, and read permissions are restricted when manifests are not being actively being generated. This makes it very difficult to craft and use a malicious symlink.
#### Best practices which can mitigate risk
* Limit who has push access to manifest repositories.
* Limit who is allowed to configure new source repositories.
### Credits
Disclosed by ADA Logics in a security audit of the Argo project sponsored by CNCF and facilitated by OSTIF. Thanks to Adam Korczynski and David Korczynski for their work on the audit.
### References
* List of [types of Applications](https://argo-cd.readthedocs.io/en/stable/user-guide/application_sources/), including Helm-type
* [RBAC documentation](https://argo-cd.readthedocs.io/en/stable/operator-manual/rbac/), showing how to limit repository permissions
### For more information
* Open an issue in [the Argo CD issue tracker](https://github.com/argoproj/argo-cd/issues) or [discussions](https://github.com/argoproj/argo-cd/discussions)
* Join us on [Slack](https://argoproj.github.io/community/join-slack) in channel #argo-cd
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '2.1.16'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.8.7'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.16'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.5'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.1'}]}], 'versions': ['2.4.0']}]
|
[{'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/security/advisories/GHSA-q4w5-4gq2-98vm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31036'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/commit/04c305396458508a31d03d44afea07b1c620d7cd'}, {'type': 'PACKAGE', 'url': 'https://github.com/argoproj/argo-cd'}]
|
{'cwe_ids': ['CWE-20', 'CWE-59'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-21T20:04:51Z', 'nvd_published_at': '2022-06-27T20:15:00Z'}
|
1.4.0
|
GHSA-q588-3544-8g33
|
2022-06-22T18:10:37Z
|
2022-06-22T00:00:54Z
| null |
['CVE-2022-22979']
|
Denial of Service in Spring Cloud Function
|
In Spring Cloud Function versions prior to 3.2.6, it is possible for a user who directly interacts with framework provided lookup functionality to cause a denial-of-service condition due to the caching issue in the Function Catalog component of the framework.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.cloud:spring-cloud-function-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.6'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22979'}, {'type': 'PACKAGE', 'url': 'https://github.com/spring-cloud/spring-cloud-function'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2022-22979'}]
|
{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-22T18:10:37Z', 'nvd_published_at': '2022-06-21T15:15:00Z'}
|
1.4.0
|
GHSA-3hxh-7jxm-59x4
|
2022-06-17T00:13:03Z
|
2022-06-17T00:13:03Z
| null |
[]
|
AtomicBucket<T> unconditionally implements Send/Sync
|
In the affected versions of the crate, `AtomicBucket<T>` unconditionally implements `Send`/`Sync` traits. Therefore, users can create a data race to the inner
`T: !Sync` by using the `AtomicBucket::data_with()` API.
Such data races can potentially cause memory corruption or other undefined behavior.
The flaw was fixed in commit 8e6daab by adding appropriate Send/Sync bounds to the Send/Sync impl of struct `Block<T>` (which is a data type contained inside `AtomicBucket<T>`).
|
[]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'metrics-util'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/metrics-rs/metrics/issues/190'}, {'type': 'PACKAGE', 'url': 'https://github.com/metrics-rs/metrics'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0113.html'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:13:03Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-fpxm-fprw-6hxj
|
2022-06-25T07:21:19Z
|
2022-06-25T07:21:19Z
| null |
['CVE-2022-22967']
|
Salt's PAM auth fails to reject locked accounts
|
An issue was discovered in SaltStack Salt in versions before 3002.9, 3003.5, 3004.2. PAM auth fails to reject locked accounts, which allows a previously authorized user whose account is locked still run Salt commands when their account is locked. This affects both local shell accounts with an active session and salt-api users that authenticate via PAM eauth.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'salt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3002.9'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'salt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3003.0'}, {'fixed': '3003.5'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'salt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3004.0'}, {'fixed': '3004.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22967'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fpxm-fprw-6hxj'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/salt/PYSEC-2022-210.yaml'}, {'type': 'WEB', 'url': 'https://repo.saltproject.io/'}, {'type': 'WEB', 'url': 'https://saltproject.io/security_announcements/salt-security-advisory-release-june-21st-2022/,'}]
|
{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-25T07:21:19Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.