schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
stringlengths 20
20
⌀ | aliases
stringlengths 2
20
| summary
stringlengths 20
140
| details
stringlengths 56
37.2k
| severity
stringlengths 2
92
| affected
stringlengths 88
7.07k
| references
stringlengths 139
4.72k
| database_specific
stringlengths 131
185
|
---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0
|
GHSA-j8wr-fwf2-vvr9
|
2023-02-03T20:29:29Z
|
2023-01-26T21:30:25Z
| null |
['CVE-2022-25908']
|
Command Injection in create-choo-electron
|
All versions of the package create-choo-electron are vulnerable to Command Injection via the devInstall function due to improper user-input sanitization.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'create-choo-electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25908'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-CREATECHOOELECTRON-3157953'}]
|
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:06:29Z', 'nvd_published_at': '2023-01-26T21:15:00Z'}
|
1.4.0
|
GHSA-r3gm-jwf4-xgv2
|
2023-01-27T01:27:59Z
|
2023-01-26T21:30:18Z
| null |
['CVE-2023-24437']
|
Cross-site request forgery vulnerability in Jenkins JIRA Pipeline Steps Plugin
|
A cross-site request forgery (CSRF) vulnerability in Jenkins JIRA Pipeline Steps Plugin 2.0.165.v8846cf59f3db and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
|
[]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:jira-steps'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.165.v8846cf59f3db'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24437'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2786'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:27:59Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}
|
1.4.0
|
GHSA-8gcg-vwmw-rxj4
|
2023-01-23T18:52:11Z
|
2023-01-10T22:27:13Z
| null |
['CVE-2023-22488']
|
Flarum notifications can leak restricted content
|
Using the notifications feature, one can read restricted/private content and bypass access checks that would be in place for such content.
The notification-sending component does not check that the subject of the notification can be seen by the receiver, and proceeds to send notifications through their different channels. The alerts do not leak data despite this as they are listed based on a visibility check, however, emails are still sent out.
This means that, for extensions which restrict access to posts, any actor can bypass the restriction by subscribing to the discussion if the [*Subscriptions*](https://extiverse.com/extension/flarum/subscriptions) extension is enabled.
### Impact
The attack allows the leaking of some posts in the forum database, including posts awaiting approval, posts in tags the user has no access to if they could subscribe to a discussion before it becomes private, and posts restricted by third-party extensions.
Other leaks could also happen for different notification subjects if some features allowed to receive specific types of notifications for restricted content.
All Flarum versions prior to v1.6.3 are affected.
### Patches
The vulnerability has been fixed and published as flarum/core v1.6.3. All communities running Flarum should upgrade as soon as possible to v1.6.3 using:
```
composer update --prefer-dist --no-dev -a -W
```
You can then confirm you run the latest version using:
```
composer show flarum/core
```
### Workarounds
Disable the Flarum Subscriptions extension or disable email notifications altogether.
**There is no other supported workaround for this issue for Flarum versions below 1.6.3.**
### For more information
For any questions or comments on this vulnerability please visit https://discuss.flarum.org/
For support questions create a discussion at https://discuss.flarum.org/t/support.
A reminder that if you ever become aware of a security issue in Flarum, please report it to us privately by emailing [[email protected]](mailto:[email protected]), and we will address it promptly.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'flarum/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/flarum/framework/security/advisories/GHSA-8gcg-vwmw-rxj4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22488'}, {'type': 'WEB', 'url': 'https://github.com/flarum/framework/commit/d0a2b95dca57d3dae9a0d77b610b1cb1d0b1766a'}, {'type': 'PACKAGE', 'url': 'https://github.com/flarum/framework'}, {'type': 'WEB', 'url': 'https://github.com/flarum/framework/releases/tag/v1.6.3'}]
|
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-10T22:27:13Z', 'nvd_published_at': '2023-01-12T20:15:00Z'}
|
1.4.0
|
GHSA-7p8m-22h4-9pj7
|
2023-01-20T22:38:04Z
|
2023-01-20T22:38:04Z
| null |
['CVE-2022-23538']
|
scs-library-client may leak user credentials to third-party service via HTTP redirect
|
### Impact
When the scs-library-client is used to pull a container image, with authentication, the HTTP Authorization header sent by the client to the library service may be incorrectly leaked to an S3 backing storage provider. This occurs in a specific flow, where the library service redirects the client to a backing S3 storage server, to perform a multi-part concurrent download.
Depending on site configuration, the S3 service may be provided by a third party. An attacker with access to the S3 service may be able to extract user credentials, allowing them to impersonate the user.
The vulnerable multi-part concurrent download flow, with redirect to S3, is only used when communicating with a Singularity Enterprise 1.x installation, or third party server implementing this flow.
Interaction with Singularity Enterprise 2.x, and Singularity Container Services (cloud.sylabs.io), does not trigger the vulnerable flow.
We encourage all users to update. Users who interact with a Singularity Enterprise 1.x installation, using a 3rd party S3 storage service, are advised to revoke and recreate their authentication tokens within Singularity Enterprise.
### Patches
The security issue was identified after the integration of a bug-fix commit 68ac4ca into the previously released scs-library-client 1.3.4. This commit fixes the security issue in the 1.3 series.
scs-library-client 1.4.2 contains a fix for the same vulnerability in the 1.4 series, as commit eebd7ca.
### Workarounds
There is no workaround available at this time.
As above, access to Singularity Enterprise 2.x, or Singularity Container Services (cloud.sylabs.io), does not trigger the vulnerable flow.
### References
https://cwe.mitre.org/data/definitions/522.html
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/sylabs/scs-library-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.2'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/sylabs/scs-library-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.4'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/sylabs/scs-library-client/security/advisories/GHSA-7p8m-22h4-9pj7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23538'}, {'type': 'WEB', 'url': 'https://github.com/sylabs/scs-library-client/commit/68ac4cab5cda0afd8758ff5b5e2e57be6a22fcfa'}, {'type': 'WEB', 'url': 'https://github.com/sylabs/scs-library-client/commit/b5db2aacba6bf1231f42dd475cc32e6355ab47b2'}, {'type': 'WEB', 'url': 'https://github.com/sylabs/scs-library-client/commit/eebd7caaab310b1fa803e55b8fc1acd9dcd2d00c'}, {'type': 'PACKAGE', 'url': 'https://github.com/sylabs/scs-library-client'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1497'}]
|
{'cwe_ids': ['CWE-522', 'CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T22:38:04Z', 'nvd_published_at': '2023-01-17T21:15:00Z'}
|
1.4.0
|
GHSA-v3cg-7r9h-r2g6
|
2023-01-24T20:54:28Z
|
2023-01-24T20:54:28Z
| null |
['CVE-2023-23613']
|
Field-level security issue with .keyword fields in OpenSearch
|
### Advisory title: Field-level security issue with .keyword fields
### Affected versions:
OpenSearch 1.0.0-1.3.7 and 2.0.0-2.4.1
### Patched versions:
OpenSearch 1.3.8 and 2.5.0
### Impact:
There is an issue in the implementation of field-level security (FLS) and field masking where rules written to explicitly exclude fields are not correctly applied for certain queries that rely on their auto-generated .keyword fields.
This issue is only present for authenticated users with read access to the indexes containing the restricted fields.
### Workaround:
FLS rules that use explicit exclusions can be written to grant explicit access instead. Policies authored in this way are not subject to this issue.
### Patches:
OpenSearch versions 1.3.8 and 2.5.0 contain a fix for this issue.
### For more information:
If you have any questions or comments about this advisory, please contact AWS/Amazon Security via our issue reporting page (https://aws.amazon.com/security/vulnerability-reporting/) or directly via email to [[email protected]](mailto:[email protected]). Please do not create a public GitHub issue.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.opensearch:opensearch-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.opensearch:opensearch-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.5.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/opensearch-project/security/security/advisories/GHSA-v3cg-7r9h-r2g6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23613'}, {'type': 'WEB', 'url': 'https://github.com/opensearch-project/OpenSearch/releases/tag/2.5.0'}, {'type': 'PACKAGE', 'url': 'https://github.com/opensearch-project/security'}]
|
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-24T20:54:28Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}
|
1.4.0
|
GHSA-64wp-jh9p-5cg2
|
2023-01-23T22:17:31Z
|
2023-01-11T22:04:44Z
| null |
['CVE-2023-22493']
|
RSSHub SSRF vulnerability
|
## Summary
RSSHub is vulnerable to Server-Side Request Forgery (SSRF) attacks. This vulnerability allows an attacker to send arbitrary HTTP requests from the server to other servers or resources on the network.
## Description
An attacker can exploit this vulnerability by sending a request to the affected routes with a malicious URL. For example, if an attacker controls the `ATTACKER.HOST` domain, they can send a request to affected routes with the value set to `ATTACKER.HOST%2F%23`.
The `%2F` and `%23` characters are URL-encoded versions of the forward-slash (`/`) and pound (`#`) characters, respectively. In this context, an attacker could use those characters to append the base URL (i.e. `https://${input}.defined.host`) to be modified to `https://ATTACKER.HOST/#.defined.host`. This will cause the server to send a request to the attacker-controlled domain, allowing the attacker to potentially gain access to sensitive information or perform further attacks on the server.
## Impact
An attacker could use this vulnerability to send requests to internal or any other servers or resources on the network, potentially gain access to sensitive information that would not normally be accessible and amplifying the impact of the attack.
## Reference
Fixing PR: https://github.com/DIYgod/RSSHub/pull/11588
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:L'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'rsshub'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0-master.a66cbcf'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/DIYgod/RSSHub/security/advisories/GHSA-64wp-jh9p-5cg2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22493'}, {'type': 'WEB', 'url': 'https://github.com/DIYgod/RSSHub/pull/11588'}, {'type': 'WEB', 'url': 'https://github.com/DIYgod/RSSHub/commit/a66cbcf6eebc700bf97ab097f404f16ab415506a'}, {'type': 'WEB', 'url': 'https://advisory.dw1.io/56'}, {'type': 'PACKAGE', 'url': 'https://github.com/DIYgod/RSSHub'}]
|
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-11T22:04:44Z', 'nvd_published_at': '2023-01-13T15:15:00Z'}
|
1.4.0
|
GHSA-8ph8-9q2j-c3rq
|
2023-01-12T23:41:46Z
|
2023-01-06T12:31:34Z
| null |
['CVE-2018-25066']
|
nodebatis SQL Injection vulnerability
|
A vulnerability was found in PeterMu nodebatis up to 2.1.x. It has been classified as critical. Affected is an unknown function. The manipulation leads to sql injection. Upgrading to version 2.2.0 can address this issue. The name of the patch is 6629ff5b7e3d62ad8319007a54589ec1f62c7c35. It is recommended to upgrade the affected component. VDB-217554 is the identifier assigned to this vulnerability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'nodebatis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25066'}, {'type': 'WEB', 'url': 'https://github.com/PeterMu/nodebatis/commit/6629ff5b7e3d62ad8319007a54589ec1f62c7c35'}, {'type': 'PACKAGE', 'url': 'https://github.com/PeterMu/nodebatis'}, {'type': 'WEB', 'url': 'https://github.com/PeterMu/nodebatis/releases/tag/v2.2.0'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217554'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217554'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-12T23:41:46Z', 'nvd_published_at': '2023-01-06T11:15:00Z'}
|
1.4.0
|
GHSA-3p73-mm7v-4f6m
|
2023-01-28T00:31:24Z
|
2023-01-27T00:55:11Z
| null |
['CVE-2023-23617']
|
DoS vulnerability in MaliciousCode filter
|
### Impact
Infinite loop in malicious code filter in certain conditions.
### Workarounds
None
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.4.22'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '20.0.0'}, {'fixed': '20.0.19'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/security/advisories/GHSA-3p73-mm7v-4f6m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23617'}, {'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/commit/494027785bdb7db53e60c11ef03c144b61cd3172'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenMage/magento-lts'}, {'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22'}, {'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19'}]
|
{'cwe_ids': ['CWE-835'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T00:55:11Z', 'nvd_published_at': '2023-01-28T00:15:00Z'}
|
1.4.0
|
GHSA-9h7x-9pmh-7gg8
|
2023-01-12T16:49:06Z
|
2023-01-07T06:30:19Z
| null |
['CVE-2023-0112']
|
usememos/memos vulnerable to stored Cross-site Scripting
|
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.10.0.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0112'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/46c13a4b7f675b92d297df6dabb4441f13c7cd9c'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ec2a29dc-79a3-44bd-a58b-15f676934af6'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T21:51:50Z', 'nvd_published_at': '2023-01-07T04:15:00Z'}
|
1.4.0
|
GHSA-chgc-rqjr-46gg
|
2023-01-25T02:56:08Z
|
2023-01-17T09:30:24Z
| null |
['CVE-2010-10008']
|
Cross Site Scripting in simplesamlphp-module-openidprovider
|
A vulnerability was found in simplesamlphp simplesamlphp-module-openidprovider up to 0.8.x. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file templates/trust.tpl.php. The manipulation of the argument StateID leads to cross site scripting. The attack can be launched remotely. Upgrading to version 0.9.0 is able to address this issue. The name of the patch is 8365d48c863cf06ccf1465cc0a161cefae29d69d. It is recommended to upgrade the affected component. The identifier VDB-218473 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'simplesamlphp/simplesamlphp-module-openidprovider'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-10008'}, {'type': 'WEB', 'url': 'https://github.com/simplesamlphp/simplesamlphp-module-openidprovider/commit/8365d48c863cf06ccf1465cc0a161cefae29d69d'}, {'type': 'PACKAGE', 'url': 'https://github.com/simplesamlphp/simplesamlphp-module-openidprovider'}, {'type': 'WEB', 'url': 'https://github.com/simplesamlphp/simplesamlphp-module-openidprovider/releases/tag/v0.9.0'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.218473'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.218473'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-25T02:56:08Z', 'nvd_published_at': '2023-01-17T08:15:00Z'}
|
1.4.0
|
GHSA-g298-59pg-93h7
|
2023-01-28T01:20:05Z
|
2023-01-19T18:30:19Z
| null |
['CVE-2023-0406']
|
Cross-Site Request Forgery in modoboa
|
Cross-Site Request Forgery (CSRF) in GitHub repository modoboa/modoboa prior to 2.0.4.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'modoboa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0406'}, {'type': 'WEB', 'url': 'https://github.com/modoboa/modoboa/commit/7f0573e917227686d2cc127be1364e2908740807'}, {'type': 'PACKAGE', 'url': 'https://github.com/modoboa/modoboa'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d7007f76-3dbc-48a7-a2fb-377040fe100c'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-28T01:20:05Z', 'nvd_published_at': '2023-01-19T18:15:00Z'}
|
1.4.0
|
GHSA-fpjc-cxr6-w6h8
|
2023-01-12T16:49:23Z
|
2023-01-07T06:30:19Z
| null |
['CVE-2023-0108']
|
usememos/memos vulnerable to stored Cross-site Scripting
|
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.10.0.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0108'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/46c13a4b7f675b92d297df6dabb4441f13c7cd9c'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/f66d33df-6588-4ab4-80a0-847451517944'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T21:53:46Z', 'nvd_published_at': '2023-01-07T04:15:00Z'}
|
1.4.0
|
GHSA-8xww-x3g3-6jcv
|
2023-05-16T15:48:14Z
|
2023-01-18T18:20:51Z
| null |
['CVE-2023-22795']
|
ReDoS based DoS vulnerability in Action Dispatch
|
There is a possible regular expression based DoS vulnerability in Action Dispatch related to the If-None-Match header. This vulnerability has been assigned the CVE identifier CVE-2023-22795.
Versions Affected: All Not affected: None Fixed Versions: 5.2.8.15 (Rails LTS), 6.1.7.1, 7.0.4.1
Impact
A specially crafted HTTP If-None-Match header can cause the regular expression engine to enter a state of catastrophic backtracking, when on a version of Ruby below 3.2.0. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately.
Releases
The FIXED releases are available at the normal locations.
Workarounds
We recommend that all users upgrade to one of the FIXED versions. In the meantime, users can mitigate this vulnerability by using a load balancer or other device to filter out malicious If-None-Match headers before they reach the application.
Users on Ruby 3.2.0 or greater are not affected by this vulnerability.
Patches
To aid users who aren’t able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset.
6-1-Avoid-regex-backtracking-on-If-None-Match-header.patch - Patch for 6.1 series
7-0-Avoid-regex-backtracking-on-If-None-Match-header.patch - Patch for 7.0 series
Please note that only the 7.0.Z and 6.1.Z series are supported at present, and 6.0.Z for severe vulnerabilities. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases.
|
[]
|
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.1.7.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.4.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22795'}, {'type': 'WEB', 'url': 'https://discuss.rubyonrails.org/t/cve-2023-22795-possible-redos-based-dos-vulnerability-in-action-dispatch/82118'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/releases/tag/v7.0.4.1'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2023-22795.yml'}, {'type': 'WEB', 'url': 'https://rubyonrails.org/2023/1/17/Rails-Versions-6-0-6-1-6-1-7-1-7-0-4-1-have-been-released'}]
|
{'cwe_ids': ['CWE-1333'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-01-18T18:20:51Z', 'nvd_published_at': '2023-02-09T20:15:00Z'}
|
1.4.0
|
GHSA-g3j5-mpp2-2fqm
|
2023-01-26T19:53:12Z
|
2023-01-26T19:53:11Z
| null |
[]
|
symfont/process typosquatting malware spoofs symfony/process
|
In September 2021, security researchers discovered a malicious Composer package called `symfont/process`, a typosquat targeting users of `symfony/process`. The malicious package has since been removed from Packagist.
|
[]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'symfont/process'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfont/process/2021-09-10.yaml'}, {'type': 'WEB', 'url': 'https://www.kernelmode.blog/typosquatting-malware-found-in-composer-repository/'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-26T19:53:11Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-79wq-g4v9-gfj4
|
2023-01-20T23:36:16Z
|
2023-01-14T15:30:24Z
| null |
['CVE-2022-2815']
|
Publify Core does not strip metadata from images
|
Insecure Storage of Sensitive Information in GitHub repository publify/publify prior to 9.2.10.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'RubyGems', 'name': 'publify_core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.2.10'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2815'}, {'type': 'WEB', 'url': 'https://github.com/publify/publify/commit/af69097d349f4c00f244c51cd3c3e937fd3387cd'}, {'type': 'WEB', 'url': 'https://github.com/publify/publify_core/commit/33f897c12b6efdcdfd8cf9df924deba0f878b71e'}, {'type': 'PACKAGE', 'url': 'https://github.com/publify/publify'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/publify_core/CVE-2022-2815.yml'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/22fdcc39-8c1a-4e4c-8eae-be3fd764f8b4'}]
|
{'cwe_ids': ['CWE-922'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T23:36:16Z', 'nvd_published_at': '2023-01-14T14:15:00Z'}
|
1.4.0
|
GHSA-m4ch-rfv5-x5g3
|
2023-01-20T23:36:41Z
|
2023-01-20T23:36:41Z
| null |
[]
|
git2-rs fails to verify SSH keys by default
|
The git2 and libgit2-sys crates are Rust wrappers around the [libgit2](https://libgit2.org/) C library. It was discovered that libgit2 1.5.0 and below did not verify SSH host keys when establishing an SSH connection, exposing users of the library to Man-In-the-Middle attacks.
The libgit2 team assigned [CVE-2023-22742](https://github.com/libgit2/libgit2/security/advisories/GHSA-8643-3wh5-rmjq) to this vulnerability. The following versions of the libgit2-sys Rust crate have been released:
* libgit2-sys 0.14.2, updating the underlying libgit2 C library to version 1.5.1.
* libgit2-sys 0.13.5, updating the underlying libgit2 C library to version 1.4.5.
A new git2 crate version has also been released, 0.16.1. This version only bumps its libgit2-sys dependency to ensure no vulnerable libgit2-sys versions are used, but contains no code changes: if you update the libgit2-sys version there is no need to also update the git2 crate version.
[You can learn more about this vulnerability in libgit2's advisory](https://github.com/libgit2/libgit2/security/advisories/GHSA-8643-3wh5-rmjq)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'libgit2-sys'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.14.0'}, {'fixed': '0.14.2'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'libgit2-sys'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.5'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'git2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.16.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/libgit2/libgit2/security/advisories/GHSA-8643-3wh5-rmjq'}, {'type': 'WEB', 'url': 'https://github.com/rust-lang/git2-rs/security/advisories/GHSA-m4ch-rfv5-x5g3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22742'}, {'type': 'WEB', 'url': 'https://github.com/rust-lang/git2-rs/commit/87934f87d36753ed702792ec063be7246444a8e1'}, {'type': 'PACKAGE', 'url': 'https://github.com/rust-lang/git2-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0003.html'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T23:36:41Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-6rrr-78xp-5jp8
|
2023-01-24T18:55:45Z
|
2023-01-11T18:27:48Z
| null |
['CVE-2023-22492']
|
Zitadel RefreshToken invalidation vulnerability
|
### Impact
RefreshTokens is an OAuth 2.0 feature that allows applications to retrieve new access tokens and refresh the user's session without the need for interacting with a UI.
RefreshTokens were not invalidated when a user was locked or deactivated. The deactivated or locked user was able to obtain a valid access token only through a refresh token grant.
When the locked or deactivated user’s session was already terminated (“logged out”) then it was not possible to create a new session. Renewal of access token through a refresh token grant is limited to the configured amount of time (RefreshTokenExpiration).
### Patches
2.x versions are fixed on >= [2.17.3](https://github.com/zitadel/zitadel/releases/tag/v2.17.3)
2.16.x versions are fixed on >= [2.16.4](https://github.com/zitadel/zitadel/releases/tag/v2.16.4)
ZITADEL recommends upgrading to the latest versions available in due course.
### Workarounds
Ensure the RefreshTokenExpiration in the OIDC settings of your instance is set according to your security requirements.
### References
https://zitadel.com/docs/guides/manage/console/instance-settings#oidc-token-lifetimes-and-expiration
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/zitadel/zitadel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.17.0'}, {'fixed': '2.17.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/zitadel/zitadel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.16.4'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/zitadel/zitadel/security/advisories/GHSA-6rrr-78xp-5jp8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22492'}, {'type': 'WEB', 'url': 'https://github.com/zitadel/zitadel/commit/301e22c4956ead6014a8179463c37263f7301a83'}, {'type': 'WEB', 'url': 'https://github.com/zitadel/zitadel/commit/fc892c52a10cd4ffdac395747494f3a93a7494c2'}, {'type': 'PACKAGE', 'url': 'https://github.com/zitadel/zitadel'}, {'type': 'WEB', 'url': 'https://github.com/zitadel/zitadel/releases/tag/v2.16.4'}, {'type': 'WEB', 'url': 'https://github.com/zitadel/zitadel/releases/tag/v2.17.3'}]
|
{'cwe_ids': ['CWE-613'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-11T18:27:48Z', 'nvd_published_at': '2023-01-11T20:15:00Z'}
|
1.4.0
|
GHSA-5v8v-gwmw-qw97
|
2023-01-24T18:06:35Z
|
2023-01-13T21:28:46Z
| null |
['CVE-2022-23532']
|
org.neo4j.procedure:apoc Path Traversal Vulnerability
|
### Impact
A Path Traversal Vulnerability found in the apoc.export.* procedures of apoc plugins in Neo4j Graph database.
The issue allows a malicious actor to potentially break out of the expected directory. The vulnerability is such that files could only be created but not overwritten.
For the vulnerability to be exploited, an attacker would need access to execute an arbitrary query, either by having access to an authenticated Neo4j client, or a Cypher injection vulnerability in an application. The procedure would need to have been allow listed in the neo4j configuration as well as having the apoc config `apoc.export.file.enabled` set to true.
On a UNIX based system the following query allows arbitrary write access to the tmp folder:
CALL apoc.export.csv.query('RETURN 1', 'file:///..//..//..//..//tmp/test.txt', {})
### Patches
The users should aim to use the latest released version compatible with their Neo4j version. The minimum versions containing patch for this vulnerability are 4.4.0.12 and 4.3.0.12.
### Workarounds
If you cannot upgrade the library, you can control the [allowlist of the ](https://neo4j.com/docs/operations-manual/current/reference/configuration-settings/#config_dbms.security.procedures.allowlist)procedures that can be used in your system, and/or turn off local file access by setting apoc.export.file.enabled=false
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [neo4j-apoc-procedures](https://github.com/neo4j-contrib/neo4j-apoc-procedures)
* Email us at [[email protected]](mailto:[email protected])
### Credits
We want to publicly recognise the contribution Adam Reziouk - Airbus.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:L'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.neo4j.procedure:apoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.0.12'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.neo4j.procedure:apoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0.0'}, {'fixed': '4.4.0.12'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/neo4j-contrib/neo4j-apoc-procedures/security/advisories/GHSA-5v8v-gwmw-qw97'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23532'}, {'type': 'WEB', 'url': 'https://github.com/neo4j-contrib/neo4j-apoc-procedures/commit/01e63ed2d187cd2a8aa1d78bf831ef0fdd69b522'}, {'type': 'PACKAGE', 'url': 'https://github.com/neo4j-contrib/neo4j-apoc-procedures'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-13T21:28:46Z', 'nvd_published_at': '2023-01-14T01:15:00Z'}
|
1.4.0
|
GHSA-7vcx-v65q-9wpg
|
2023-01-11T23:53:34Z
|
2023-01-11T23:53:34Z
| null |
[]
|
XML-RPC for PHP's `Wrapper::buildClientWrapperCode` method allows code injection via malicious `$client` argument
|
In order for this weakness to be exploited, the following conditions have to apply, at the same time:
- method `Wrapper::buildClientWrapperCode`, or any methods which depend on it, such as `Wrapper::wrapXmlrpcServer`, `Wrapper::wrapXmlrpcMethod` or `Wrapper::buildWrapMethodSource` must be in use. Note that they are _not_ used by default in either the Client or Server classes provided by the library; the developer has to specifically make use of them in his/her own code
- the `$client` argument to either of those methods should have been built with malicious data, ie. data controlled by a 3rd party, passed to its constructor call
This is most likely an uncommon usage scenario, and as such the chances of exploitation may be low.
*NB* the graphical debugger which is shipped as part of the library is vulnerable to this, when used with the option "Generate stub for method call" selected. In that case, the debugger will _display_ but not _execute_ the malicious code, which would have to be provided via carefully crafted values for the "Address" and "Path" inputs.
The attack scenario in this case is that a developer copies into his/her own source code the php snippet generated by the debugger, in a situation where the debugger is used with "Address"/"Path" input values supplied by a 3rd party.
The malicious payload in the "Address"/"Path" input values should be easily recognized as suspicious by any barely proficient developer, as it resembles a bog-standard injection attack.
It goes without saying that a responsible developer should not blindly copy and paste into his/her own code anything generated by a 3rd party tool, such as the phpxmlrpc debugger, without giving it at least a cursory scan.
Originally reported as issue #80
|
[]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'phpxmlrpc/phpxmlrpc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.9.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/gggeek/phpxmlrpc/security/advisories/GHSA-7vcx-v65q-9wpg'}, {'type': 'WEB', 'url': 'https://github.com/gggeek/phpxmlrpc/issues/80'}, {'type': 'WEB', 'url': 'https://github.com/gggeek/phpxmlrpc/commit/cf6e605e09d001ce520bfa8e7b168cfa514e663b'}, {'type': 'PACKAGE', 'url': 'https://github.com/gggeek/phpxmlrpc'}]
|
{'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-11T23:53:34Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-h857-2g56-468g
|
2023-01-05T12:18:35Z
|
2023-01-05T12:18:35Z
| null |
['CVE-2023-22461']
|
@mattkrick/sanitize-svg vulnerable to Cross-Site Scripting (XSS)
|
### Impact
The *sanitize-svg* package uses a deny-list-pattern to sanitize SVGs to prevent cross-site scripting (XSS). In doing so, literal `<script>`-tags and on-event handlers were detected:
```typescript
[...]
const svgEl = div.firstElementChild!
const attributes = Array.from(svgEl.attributes).map(({ name }) => name)
const hasScriptAttr = !!attributes.find((attr) => attr.startsWith('on'))
const scripts = svgEl.getElementsByTagName('script')
return scripts.length === 0 && !hasScriptAttr ? svg : null
[...]
```
There are more ways to embed JavaScript in XML files.
**Anchor Tag** (requires user to click link):
```xml
<svg viewBox="0 0 100 100" xmlns="http://www.w3.org/2000/svg">
<a href="javascript:alert(document.domain)">
<text x="50" y="50" text-anchor="middle">Lauritz</text>
</a>
</svg>
```
**Foreign Object Tag** (no user interaction required):
```xml
<svg width="500" height="500" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink">
<text x="20" y="35">Lauritz</text>
<foreignObject width="500" height="500">
<iframe xmlns="http://www.w3.org/1999/xhtml" src="javascript:confirm(document.domain);" width="400" height="250"/>
</foreignObject>
</svg>
```
As a result, downstream software that relies on `sanitize-svg` and expects resulting SVGs to be safe, may be vulnerable to XSS. We are aware of at least one downstream project for which this vulnerability had security implications.
### Patches
This vulnerability was addressed in v0.4.0.
### Workarounds
N/A
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@mattkrick/sanitize-svg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.3.1'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/mattkrick/sanitize-svg/security/advisories/GHSA-h857-2g56-468g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22461'}, {'type': 'WEB', 'url': 'https://github.com/mattkrick/sanitize-svg/commit/b107e453ede7b58adcccae74a3e474c012eec85d'}, {'type': 'PACKAGE', 'url': 'https://github.com/mattkrick/sanitize-svg'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-05T12:18:35Z', 'nvd_published_at': '2023-01-04T15:15:00Z'}
|
1.4.0
|
GHSA-9mq4-9556-6qxq
|
2023-02-07T23:23:31Z
|
2023-01-29T00:30:34Z
| null |
['CVE-2021-4315']
|
NYUCCL psiTurk IS vulnerable to Improper Neutralization of Special Elements
|
A vulnerability has been found in NYUCCL psiTurk up to 3.2.0 and classified as critical. This vulnerability affects unknown code of the file psiturk/experiment.py. The manipulation of the argument mode leads to improper neutralization of special elements used in a template engine. The exploit has been disclosed to the public and may be used. Upgrading to version 3.2.1 is able to address this issue. The name of the patch is 47787e15cecd66f2aa87687bf852ae0194a4335f. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-219676.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'psiTurk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4315'}, {'type': 'WEB', 'url': 'https://github.com/NYUCCL/psiTurk/pull/517'}, {'type': 'WEB', 'url': 'https://github.com/NYUCCL/psiTurk/commit/47787e15cecd66f2aa87687bf852ae0194a4335f'}, {'type': 'PACKAGE', 'url': 'https://github.com/NYUCCL/psiTurk'}, {'type': 'WEB', 'url': 'https://github.com/NYUCCL/psiTurk/releases/tag/v3.2.1'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.219676'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.219676'}]
|
{'cwe_ids': ['CWE-1336', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-31T22:53:23Z', 'nvd_published_at': '2023-01-28T23:15:00Z'}
|
1.4.0
|
GHSA-xgv7-pqqh-h2w9
|
2023-01-24T16:38:33Z
|
2023-01-19T17:51:27Z
| null |
['CVE-2009-4123']
|
jruby-openssl gem for JRuby fails to do proper certificate validation
|
A security problem involving peer certificate verification was found where failed verification silently did nothing, making affected applications vulnerable to attackers. Attackers could lead a client application to believe that a secure connection to a rogue SSL server is legitimate. Attackers could also penetrate client-validated SSL server applications with a dummy certificate.
|
[]
|
[{'package': {'ecosystem': 'RubyGems', 'name': 'jruby-openssl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6'}]}]}]
|
[{'type': 'PACKAGE', 'url': 'https://github.com/jruby/jruby-openssl/'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jruby-openssl/CVE-2009-4123.yml'}, {'type': 'WEB', 'url': 'http://jruby.org/2009/12/07/vulnerability-in-jruby-openssl'}]
|
{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-19T17:51:27Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-vjhf-8vqx-vqpq
|
2023-01-06T17:37:58Z
|
2023-01-06T17:37:58Z
| null |
['CVE-2023-22463']
|
KubePi allows malicious actor to login with a forged JWT token via Hardcoded Jwtsigkeys
|
### Summary
The jwt authentication function of kubepi <= v1.6.2 uses hard-coded Jwtsigkeys, resulting in the same Jwtsigkeys for all online projects. This means that an attacker can forge any jwt token to take over the administrator account of any online project.
### Details
[`session.go`](https://github.com/KubeOperator/KubePi/blob/da784f5532ea2495b92708cacb32703bff3a45a3/internal/api/v1/session/session.go#L35), the use of hard-coded JwtSigKey allows an attacker to use this value to forge jwt tokens arbitrarily. The JwtSigKey is confidential and should not be hard-coded in the code.
```golang
var JwtSigKey = []byte("signature_hmac_secret_shared_key")
var jwtMaxAge = 10 * time.Minute
type Handler struct {
userService user.Service
roleService role.Service
clusterService cluster.Service
rolebindingService rolebinding.Service
ldapService ldap.Service
jwtSigner *jwt.Signer
}
```
### Affected Version
<= v1.6.2
### Patches
The vulnerability has been fixed in [v1.6.3](https://github.com/KubeOperator/KubePi/releases/tag/v1.6.3).
https://github.com/KubeOperator/KubePi/commit/3be58b8df5bc05d2343c30371dd5fcf6a9fbbf8b : JWT key can be specified in app.yml, if leave it blank a random key will be used.
### Workarounds
It is recommended to upgrade the version to [v1.6.3](https://github.com/KubeOperator/KubePi/releases/tag/v1.6.3).
### For more information
If you have any questions or comments about this advisory, please [open an issue](https://github.com/KubeOperator/KubePi/issues).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/KubeOperator/kubepi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.6.2'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/KubeOperator/KubePi/security/advisories/GHSA-vjhf-8vqx-vqpq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22463'}, {'type': 'WEB', 'url': 'https://github.com/KubeOperator/KubePi/commit/3be58b8df5bc05d2343c30371dd5fcf6a9fbbf8b'}, {'type': 'PACKAGE', 'url': 'https://github.com/KubeOperator/KubePi'}, {'type': 'WEB', 'url': 'https://github.com/KubeOperator/KubePi/blob/da784f5532ea2495b92708cacb32703bff3a45a3/internal/api/v1/session/session.go#L35'}, {'type': 'WEB', 'url': 'https://github.com/KubeOperator/KubePi/releases/tag/v1.6.3'}]
|
{'cwe_ids': ['CWE-798'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-06T17:37:58Z', 'nvd_published_at': '2023-01-04T16:15:00Z'}
|
1.4.0
|
GHSA-65f5-mfpf-vfhj
|
2023-06-23T19:40:01Z
|
2023-01-18T18:19:33Z
| null |
['CVE-2022-44570']
|
Denial of service via header parsing in Rack
|
There is a possible denial of service vulnerability in the Range header parsing component of Rack. This vulnerability has been assigned the CVE identifier CVE-2022-44570.
Versions Affected: >= 1.5.0 Not affected: None. Fixed Versions: 2.0.9.2, 2.1.4.2, 2.2.6.2, 3.0.0.1
Impact
Carefully crafted input can cause the Range header parsing component in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. Any applications that deal with Range requests (such as streaming applications, or applications that serve files) may be impacted.
Releases
The fixed releases are available at the normal locations.
Workarounds
There are no feasible workarounds for this issue.
Patches
To aid users who aren’t able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset.
2-0-Fix-ReDoS-in-Rack-Utils.get_byte_ranges.patch - Patch for 2.0 series
2-1-Fix-ReDoS-in-Rack-Utils.get_byte_ranges.patch - Patch for 2.1 series
2-2-Fix-ReDoS-in-Rack-Utils.get_byte_ranges.patch - Patch for 2.2 series
3-0-Fix-ReDoS-in-Rack-Utils.get_byte_ranges.patch - Patch for 3.0 series
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '2.0.9.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0.0'}, {'fixed': '2.1.4.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0.0'}, {'fixed': '2.2.6.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0.0'}, {'fixed': '3.0.4.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-44570'}, {'type': 'WEB', 'url': 'https://discuss.rubyonrails.org/t/cve-2022-44570-possible-denial-of-service-vulnerability-in-racks-range-header-parsing/82125'}, {'type': 'PACKAGE', 'url': 'https://github.com/rack/rack'}, {'type': 'WEB', 'url': 'https://github.com/rack/rack/releases/tag/v3.0.4.1'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2022-44570.yml'}]
|
{'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-18T18:19:33Z', 'nvd_published_at': '2023-02-09T20:15:00Z'}
|
1.4.0
|
GHSA-4jqw-vfmj-9rmh
|
2023-02-21T20:04:34Z
|
2023-01-26T21:30:29Z
| null |
['CVE-2021-36686']
|
Cross-site Scripting in yapi-vendor
|
Cross Site Scripting (XSS) vulnerability in yapi 1.9.1 allows attackers to execute arbitrary code via the /interface/api edit page.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'yapi-vendor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.9.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36686'}, {'type': 'WEB', 'url': 'https://github.com/YMFE/yapi/issues/2190'}, {'type': 'WEB', 'url': 'https://github.com/YMFE/yapi/issues/2240'}, {'type': 'PACKAGE', 'url': 'https://github.com/YMFE/yapi'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:04:11Z', 'nvd_published_at': '2023-01-26T21:15:00Z'}
|
1.4.0
|
GHSA-x2h8-4mhh-5hwh
|
2023-01-24T18:06:00Z
|
2023-01-16T00:30:24Z
| null |
['CVE-2023-0313']
|
phpMyFAQ Stored Cross-site Scripting vulnerability
|
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.10.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.10'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0313'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/1123c0872314fa68d7d0d8136939f62270fb4b7b'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpmyfaq'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/bc27e84b-1f91-4e1b-a78c-944edeba8256'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T22:01:39Z', 'nvd_published_at': '2023-01-15T22:15:00Z'}
|
1.4.0
|
GHSA-93pm-5p5f-3ghx
|
2023-02-10T00:20:39Z
|
2023-01-18T18:24:40Z
| null |
['CVE-2022-44571']
|
Denial of Service Vulnerability in Rack Content-Disposition parsing
|
There is a denial of service vulnerability in the Content-Disposition parsing component of Rack. This vulnerability has been assigned the CVE identifier CVE-2022-44571.
Versions Affected: >= 2.0.0 Not affected: None. Fixed Versions: 2.0.9.2, 2.1.4.2, 2.2.6.1, 3.0.0.1
Impact
Carefully crafted input can cause Content-Disposition header parsing in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. This header is used typically used in multipart parsing. Any applications that parse multipart posts using Rack (virtually all Rails applications) are impacted.
Releases
The fixed releases are available at the normal locations.
Workarounds
There are no feasible workarounds for this issue.
Patches
To aid users who aren’t able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset.
2-0-Fix-ReDoS-vulnerability-in-multipart-parser - Patch for 2.0 series
2-1-Fix-ReDoS-vulnerability-in-multipart-parser - Patch for 2.1 series
2-2-Fix-ReDoS-vulnerability-in-multipart-parser - Patch for 2.2 series
3-0-Fix-ReDoS-vulnerability-in-multipart-parser - Patch for 3.0 series
|
[]
|
[{'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.9.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.4.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.6.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0.0'}, {'fixed': '3.0.4.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-44571'}, {'type': 'WEB', 'url': 'https://discuss.rubyonrails.org/t/cve-2022-44571-possible-denial-of-service-vulnerability-in-rack-content-disposition-parsing/82126'}, {'type': 'PACKAGE', 'url': 'https://github.com/rack/rack'}, {'type': 'WEB', 'url': 'https://github.com/rack/rack/releases/tag/v3.0.4.1'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2022-44571.yml'}]
|
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-01-18T18:24:40Z', 'nvd_published_at': '2023-02-09T20:15:00Z'}
|
1.4.0
|
GHSA-5pm2-9mr2-3frq
|
2023-04-13T17:39:27Z
|
2023-01-18T00:30:16Z
| null |
['CVE-2023-21893']
|
Component takeover in Oracle Data Provider for .NET
|
Vulnerability in the Oracle Data Provider for .NET component of Oracle Database Server. Supported versions that are affected are 19c and 21c. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TCPS to compromise Oracle Data Provider for .NET. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Oracle Data Provider for .NET. Note: Applies also to Database client-only on Windows platform. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).
See the readme.txt files inside the `.nupkg` packages for a reference to the fix.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'NuGet', 'name': 'Oracle.ManagedDataAccess'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '21.0.0'}, {'fixed': '21.9.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Oracle.ManagedDataAccess.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.21.0'}, {'fixed': '3.21.90'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Oracle.ManagedDataAccess'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '19.0.0'}, {'fixed': '19.18.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Oracle.ManagedDataAccess.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.19.0'}, {'fixed': '2.19.180'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-21893'}, {'type': 'WEB', 'url': 'https://www.nuget.org/packages/Oracle.ManagedDataAccess.Core/3.21.90'}, {'type': 'WEB', 'url': 'https://www.nuget.org/packages/Oracle.ManagedDataAccess/21.9.0'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2023.html'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-12T23:07:14Z', 'nvd_published_at': '2023-01-18T00:15:00Z'}
|
1.4.0
|
GHSA-j9q2-f9q7-jhgq
|
2023-01-20T23:22:09Z
|
2023-01-20T23:22:09Z
| null |
[]
|
CakePHP SecurityComponent cross form submission issue
|
Prior to versions 2.4.8 and 1.3.18, forms secured by SecurityComponent could be submitted to any action without triggering SecurityComponent’s tampering protection. If an application contained multiple POST forms to manipulate the same models, it could be vulnerable to mass assignment issues.
|
[]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.4.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.18'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/cakephp/cakephp/commit/f23d811ff59c50ef278e98bb75f4ec1e7e54a5b3'}, {'type': 'WEB', 'url': 'https://bakery.cakephp.org/2014/04/29/CakePHP-1-3-18-and-2-4-8-released.html'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/cakephp/cakephp/2014-04-29.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/cakephp/cakephp'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T23:22:09Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-c732-xvv8-g94c
|
2023-02-01T09:17:22Z
|
2023-01-21T15:30:18Z
| null |
['CVE-2023-22884']
|
Command Injection in Apache Airflow and Apache Airflow MySQL Provider
|
Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Apache Software Foundation Apache Airflow, Apache Software Foundation Apache Airflow MySQL Provider.This issue affects Apache Airflow: before 2.5.1; Apache Airflow MySQL Provider: before 4.0.0.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow-providers-mysql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22884'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/28811'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/0l0j3nt0t7fzrcjl2ch0jgj6c58kxs5h'}]
|
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-23T20:42:27Z', 'nvd_published_at': '2023-01-21T14:15:00Z'}
|
1.4.0
|
GHSA-4p88-cfhq-f3vg
|
2023-01-23T18:50:41Z
|
2023-01-16T00:30:25Z
| null |
['CVE-2023-0307']
|
phpMyFAQ has Weak Password Requirements
|
Weak Password Requirements in GitHub repository thorsten/phpmyfaq prior to 3.1.10
|
[]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.10'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0307'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/8beed2fca5b0b82c6ba866d0ffd286d0c1fbf596'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpmyfaq'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/fac01e9f-e3e5-4985-94ad-59a76485f215'}]
|
{'cwe_ids': ['CWE-521'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T22:46:36Z', 'nvd_published_at': '2023-01-15T22:15:00Z'}
|
1.4.0
|
GHSA-6m7c-45ff-3328
|
2023-01-10T22:28:54Z
|
2023-01-03T09:30:25Z
| null |
['CVE-2015-10012']
|
FrameworkUserBundle Generates Error Message Containing Sensitive Information
|
A vulnerability was found in sumocoders FrameworkUserBundle up to 1.3.x. It has been rated as problematic. Affected by this issue is some unknown functionality of the file Resources/views/Security/login.html.twig. The manipulation leads to information exposure through error message. Upgrading to version 1.4.0 can address this issue. The name of the patch is abe4993390ba9bd7821ab12678270556645f94c8. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217268.
NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'sumocoders/framework-user-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-10012'}, {'type': 'WEB', 'url': 'https://github.com/sumocoders/FrameworkUserBundle/commit/abe4993390ba9bd7821ab12678270556645f94c8'}, {'type': 'PACKAGE', 'url': 'https://github.com/sumocoders/FrameworkUserBundle'}, {'type': 'WEB', 'url': 'https://github.com/sumocoders/FrameworkUserBundle/releases/tag/v1.4.0'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217268'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217268'}]
|
{'cwe_ids': ['CWE-209'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-10T22:28:54Z', 'nvd_published_at': '2023-01-03T09:15:00Z'}
|
1.4.0
|
GHSA-jqh6-9574-5x22
|
2023-02-28T20:40:27Z
|
2023-01-23T22:05:28Z
| null |
['CVE-2023-24057']
|
MITM based Zip Slip in `ca.uhn.hapi.fhir:org.hl7.fhir.core`
|
### Impact
MITM can enable Zip-Slip.
### Vulnerability
#### Vulnerability 1: `Scanner.java`
There is no validation that the zip file being unpacked has entries that are not maliciously writing outside of the intended destination directory.
https://github.com/hapifhir/org.hl7.fhir.core/blob/8c43e21094af971303131efd081503e5a112db4b/org.hl7.fhir.validation/src/main/java/org/hl7/fhir/validation/Scanner.java#L335-L357
This zip archive is downloaded over HTTP instead of HTTPS, leaving it vulnerable to compromise in-flight.
https://github.com/hapifhir/org.hl7.fhir.core/blob/8c43e21094af971303131efd081503e5a112db4b/org.hl7.fhir.validation/src/main/java/org/hl7/fhir/validation/Scanner.java#L136
##### Vulnerability 2: `TerminologyCacheManager.java`
**Note:** While these links point to only one implementation, both implementations of `TerminologyCacheManager.java` are vulnerable to this as their code seems to be duplicated.
- https://github.com/hapifhir/org.hl7.fhir.core/blob/f58b7acfb5e393cac52cc5bbb170bdb669c2880e/org.hl7.fhir.r5/src/main/java/org/hl7/fhir/r5/terminologies/TerminologyCacheManager.java
- https://github.com/hapifhir/org.hl7.fhir.core/blob/f58b7acfb5e393cac52cc5bbb170bdb669c2880e/org.hl7.fhir.r4b/src/main/java/org/hl7/fhir/r4b/terminologies/TerminologyCacheManager.java
While there is validation in this bit of logic that attempts to validate that the zip file doesn't contain malicious entries that escape the destination directory, the guard is insufficient.
https://github.com/hapifhir/org.hl7.fhir.core/blob/f58b7acfb5e393cac52cc5bbb170bdb669c2880e/org.hl7.fhir.r5/src/main/java/org/hl7/fhir/r5/terminologies/TerminologyCacheManager.java#L97-L113
This is because the `Utilities.path(String... path)` method does not normalize the path, although it seems to be attempting to do so.
https://github.com/hapifhir/org.hl7.fhir.core/blob/f58b7acfb5e393cac52cc5bbb170bdb669c2880e/org.hl7.fhir.utilities/src/main/java/org/hl7/fhir/utilities/Utilities.java#L617-L675
The normalization only occurs if the path element starts with a path traversal payload. As an example, calling `Utilities.path("/base", "/child/../test")` will return the string `"/base/child/../test"`.
This guard logic can, thus, be easily bypassed:
https://github.com/hapifhir/org.hl7.fhir.core/blob/f58b7acfb5e393cac52cc5bbb170bdb669c2880e/org.hl7.fhir.r5/src/main/java/org/hl7/fhir/r5/terminologies/TerminologyCacheManager.java#L100-L104
Assuming an attacker can control the return value of `ze.getName()`, they can supply a value like `/anything/../../../../zipsip-protection-bypass.txt`.
Similarly, an attacker can control the contents of the Zip file via a MITM attack as this logic is used with resources not downloaded over HTTPS.
https://github.com/hapifhir/org.hl7.fhir.core/blob/f58b7acfb5e393cac52cc5bbb170bdb669c2880e/org.hl7.fhir.r5/src/main/java/org/hl7/fhir/r5/terminologies/TerminologyCacheManager.java#L66-L73
### Patches
Unknown
### Workarounds
Unknown
### References
- https://snyk.io/research/zip-slip-vulnerability
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'ca.uhn.hapi.fhir:org.hl7.fhir.core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.92'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'ca.uhn.hapi.fhir:org.hl7.fhir.convertors'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.92'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'ca.uhn.hapi.fhir:org.hl7.fhir.r4b'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.92'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'ca.uhn.hapi.fhir:org.hl7.fhir.r5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.92'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'ca.uhn.hapi.fhir:org.hl7.fhir.utilities'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.92'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'ca.uhn.hapi.fhir:org.hl7.fhir.validation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.92'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/HL7/fhir-ig-publisher/security/advisories/GHSA-xr8x-pxm6-prjg'}, {'type': 'WEB', 'url': 'https://github.com/hapifhir/org.hl7.fhir.core/security/advisories/GHSA-jqh6-9574-5x22'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24057'}, {'type': 'WEB', 'url': 'https://github.com/hapifhir/org.hl7.fhir.core/commit/b50aec59124416b7315a49220cfc3999223414cc'}, {'type': 'PACKAGE', 'url': 'https://github.com/hapifhir/org.hl7.fhir.core'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-23T22:05:28Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}
|
1.4.0
|
GHSA-f259-h6m8-hm8m
|
2023-01-12T16:49:52Z
|
2023-01-06T06:30:25Z
| null |
['CVE-2022-25923']
|
exec-local-bin vulnerable to Command Injection
|
Versions of the package exec-local-bin before 1.2.0 are vulnerable to Command Injection via the `theProcess()` functionality due to improper user-input sanitization.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'exec-local-bin'}, 'ecosystem_specific': {'affected_functions': ['exec-local-bin']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25923'}, {'type': 'WEB', 'url': 'https://github.com/saeedseyfi/exec-local-bin/commit/d425866375c85038133a6f79db2aac66c0a72624'}, {'type': 'PACKAGE', 'url': 'https://github.com/saeedseyfi/exec-local-bin'}, {'type': 'WEB', 'url': 'https://github.com/saeedseyfi/exec-local-bin/blob/92db00bde9d6e2d83410849f898df12f075b73b0/index.js%23L9'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-EXECLOCALBIN-3157956'}]
|
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T20:11:57Z', 'nvd_published_at': '2023-01-06T05:15:00Z'}
|
1.4.0
|
GHSA-xrh7-m5pp-39r6
|
2023-02-08T22:37:39Z
|
2023-01-31T22:39:40Z
| null |
['CVE-2023-23630']
|
XSS Attack with Express API
|
### Impact
XSS attack - anyone using the Express API is impacted
### Patches
The problem has been resolved. Users should upgrade to version 2.0.0.
### Workarounds
Don't pass user supplied data directly to `res.renderFile`.
### References
_Are there any links users can visit to find out more?_
See https://github.com/eta-dev/eta/releases/tag/v2.0.0
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'eta'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/eta-dev/eta/security/advisories/GHSA-xrh7-m5pp-39r6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23630'}, {'type': 'WEB', 'url': 'https://github.com/eta-dev/eta/commit/5651392462ee0ff19d77c8481081a99e5b9138dd'}, {'type': 'PACKAGE', 'url': 'https://github.com/eta-dev/eta'}, {'type': 'WEB', 'url': 'https://github.com/eta-dev/eta/releases/tag/v2.0.0'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-31T22:39:40Z', 'nvd_published_at': '2023-02-01T01:15:00Z'}
|
1.4.0
|
GHSA-88p8-4vv5-82j7
|
2023-01-26T23:51:40Z
|
2023-01-26T23:51:40Z
| null |
['CVE-2015-2179']
|
xaviershay-dm-rails Gem for Ruby exposes sensitive information via the process table
|
xaviershay-dm-rails Gem for Ruby contains a flaw in the `execute()` function in `/datamapper/dm-rails/blob/master/lib/dm-rails/storage.rb`. The issue is due to the function exposing sensitive information via the process table. This may allow a local attack to gain access to MySQL credential information.
|
[]
|
[{'package': {'ecosystem': 'RubyGems', 'name': 'xaviershay-dm-rails'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-2179'}, {'type': 'PACKAGE', 'url': 'https://github.com/datamapper/dm-rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/xaviershay-dm-rails/CVE-2015-2179.yml'}]
|
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-26T23:51:40Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-h632-p764-pjqm
|
2023-02-07T04:10:00Z
|
2023-01-27T00:56:58Z
| null |
['CVE-2021-41231']
|
DataFlow upload remote code execution vulnerability
|
### Impact
An administrator with the permissions to upload files via DataFlow and to create products was able to execute arbitrary code via the convert profile.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.4.22'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '20.0.0'}, {'fixed': '20.0.19'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/security/advisories/GHSA-h632-p764-pjqm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41231'}, {'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/commit/d16fc6c5a1e66c6f0d9f82020f11702a7ddd78e4'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenMage/magento-lts'}, {'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22'}, {'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19'}]
|
{'cwe_ids': ['CWE-434', 'CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T00:56:58Z', 'nvd_published_at': '2023-01-27T19:15:00Z'}
|
1.4.0
|
GHSA-jm3m-wr3p-hjrq
|
2023-02-02T17:16:19Z
|
2023-01-27T00:30:18Z
| null |
['CVE-2023-0519']
|
Cross-site Scripting in modoboa
|
Cross-site Scripting (XSS) - Stored in GitHub repository modoboa/modoboa prior to 2.0.4.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'modoboa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0519'}, {'type': 'WEB', 'url': 'https://github.com/modoboa/modoboa/commit/eef9ab72b5305578a3ad7a7463bd284aa645e98b'}, {'type': 'PACKAGE', 'url': 'https://github.com/modoboa/modoboa'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/891ad0cb-d12f-4c5e-aac8-d7326caf2129'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:05:12Z', 'nvd_published_at': '2023-01-26T23:15:00Z'}
|
1.4.0
|
GHSA-7rrj-xr53-82p7
|
2023-01-06T21:40:58Z
|
2023-01-06T21:40:58Z
| null |
['CVE-2023-22466']
|
Tokio reject_remote_clients configuration may get dropped when creating a Windows named pipe
|
### Impact
When configuring a Windows named pipe server, setting `pipe_mode` will reset `reject_remote_clients` to `false`. If the application has previously configured `reject_remote_clients` to `true`, this effectively undoes the configuration. This also applies if `reject_remote_clients` is not explicitly set as this is the default configuration and is cleared by calling `pipe_mode`.
Remote clients may only access the named pipe if the named pipe's associated path is accessible via a publically shared folder (SMB).
### Patches
The following versions have been patched:
* 1.23.1
* 1.20.3
* 1.18.4
The fix will also be present in all releases starting from version 1.24.0.
Named pipes were introduced to Tokio in version 1.7.0, so releases older than 1.7.0 are not affected.
### Workarounds
Ensure that `pipe_mode` is set **first** after initializing a `ServerOptions`. For example:
```rust
let mut opts = ServerOptions::new();
opts.pipe_mode(PipeMode::Message);
opts.reject_remote_clients(true);
```
### References
https://learn.microsoft.com/en-us/windows/win32/api/winbase/nf-winbase-createnamedpipea#pipe_reject_remote_clients
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L'}]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'tokio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.18.4'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'tokio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.19.0'}, {'fixed': '1.20.3'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'tokio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.21.0'}, {'fixed': '1.23.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/tokio-rs/tokio/security/advisories/GHSA-7rrj-xr53-82p7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22466'}, {'type': 'WEB', 'url': 'https://github.com/tokio-rs/tokio/pull/5336'}, {'type': 'PACKAGE', 'url': 'https://github.com/tokio-rs/tokio'}, {'type': 'WEB', 'url': 'https://github.com/tokio-rs/tokio/releases/tag/tokio-1.23.1'}, {'type': 'WEB', 'url': 'https://learn.microsoft.com/en-us/windows/win32/api/winbase/nf-winbase-createnamedpipea#pipe_reject_remote_clients'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0001.html'}]
|
{'cwe_ids': ['CWE-665'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-06T21:40:58Z', 'nvd_published_at': '2023-01-04T22:15:00Z'}
|
1.4.0
|
GHSA-fhg7-m89q-25r3
|
2023-06-21T18:10:46Z
|
2023-01-24T15:36:32Z
| null |
['CVE-2022-25927']
|
ReDoS Vulnerability in ua-parser-js version
|
### Description:
A regular expression denial of service (ReDoS) vulnerability has been discovered in `ua-parser-js`.
### Impact:
This vulnerability bypass the library's `MAX_LENGTH` input limit prevention. By crafting a very-very-long user-agent string with specific pattern, an attacker can turn the script to get stuck processing for a very long time which results in a denial of service (DoS) condition.
### Affected Versions:
All versions of the library prior to version `0.7.33` / `1.0.33`.
### Patches:
A patch has been released to remove the vulnerable regular expression, update to version `0.7.33` / `1.0.33` or later.
### References:
[Regular expression Denial of Service - ReDoS](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS)
### Credits:
Thanks to @Snyk who first reported the issue.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'ua-parser-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.33'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ua-parser-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8.0'}, {'fixed': '1.0.33'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/faisalman/ua-parser-js/security/advisories/GHSA-fhg7-m89q-25r3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25927'}, {'type': 'WEB', 'url': 'https://github.com/faisalman/ua-parser-js/commit/a6140a17dd0300a35cfc9cff999545f267889411'}, {'type': 'PACKAGE', 'url': 'https://github.com/faisalman/ua-parser-js'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-UAPARSERJS-3244450'}]
|
{'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-24T15:36:32Z', 'nvd_published_at': '2023-01-26T21:15:00Z'}
|
1.4.0
|
GHSA-58h4-9m7m-j9m4
|
2023-01-31T01:47:43Z
|
2023-01-09T20:06:02Z
| null |
['CVE-2022-3145']
|
@okta/oidc-middlewareOpen Redirect vulnerability
|
An open redirect vulnerability exists in Okta OIDC Middleware prior to version 5.0.0 allowing an attacker to redirect a user to an arbitrary URL.
**Affected products and versions**
Okta OIDC Middleware prior to version 5.0.0.
**Resolution**
The vulnerability is fixed in OIDC Middleware 5.0.0. To remediate this vulnerability, upgrade Okta OIDC Middleware to this version or later.
**CVE details**
**CVE ID:** [CVE-2022-3145](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-3145)
**Published Date:** 01/05/2023
**Vulnerability Type:** Open Redirect
**CWE:** CWE-601
**CVSS v3.1 Score:** 4.3
**Severity:** Medium
**Vector string:** AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
**Severity Details**
To exploit this issue, an attacker would need to send a victim a malformed URL containing a target server that they control. Once a user successfully completed the login process, the victim user would then be redirected to the attacker controlled site.
**References**
https://github.com/okta/okta-oidc-middleware
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@okta/oidc-middleware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/okta/okta-oidc-middleware/security/advisories/GHSA-58h4-9m7m-j9m4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3145'}, {'type': 'WEB', 'url': 'https://github.com/okta/okta-oidc-middleware/commit/5d10b3ccdd5d6893de4d8b58696094267d30c113'}, {'type': 'PACKAGE', 'url': 'https://github.com/okta/okta-oidc-middleware'}]
|
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T20:06:02Z', 'nvd_published_at': '2023-01-12T19:15:00Z'}
|
1.4.0
|
GHSA-6p4m-hw2h-6gmw
|
2023-01-25T19:39:03Z
|
2023-01-25T19:39:03Z
| null |
['CVE-2023-22736']
|
Controller reconciles apps outside configured namespaces when sharding is enabled
|
### Impact
All Argo CD versions starting with 2.5.0-rc1 are vulnerable to an authorization bypass bug which allows a malicious Argo CD user to deploy Applications outside the configured allowed namespaces.
#### Description of exploit
Reconciled Application namespaces are specified as a comma-delimited list of glob patterns. When sharding is enabled on the Application controller, it does not enforce that list of patterns when reconciling Applications. For example, if Application namespaces are configured to be `argocd-*`, the Application controller may reconcile an Application installed in a namespace called `other`, even though it does not start with `argocd-`.
Reconciliation of the out-of-bounds Application is only triggered when the Application is updated, so the attacker must be able to cause an update operation on the Application resource.
#### Limitations
This bug only applies to users who have explicitly enabled the "apps-in-any-namespace" feature by setting `application.namespaces` in the argocd-cmd-params-cm ConfigMap or otherwise setting the `--application-namespaces` flags on the Application controller and API server components. The apps-in-any-namespace feature is in beta as of this Security Advisory's publish date.
The bug is also limited to Argo CD instances where sharding is enabled by increasing the `replicas` count for the Application controller.
Finally, the AppProjects' `sourceNamespaces` field acts as a secondary check against this exploit. To cause reconciliation of an Application in an out-of-bounds namespace, an AppProject must be available which permits Applications in the out-of-bounds namespace.
### Patches
A patch for this vulnerability has been released in the following Argo CD versions:
* v2.5.8
* v2.6.0-rc5
### Workarounds
Running only one replica of the Application controller will prevent exploitation of this bug.
Making sure all AppProjects' `sourceNamespaces` are restricted within the confines of the configured Application namespaces will also prevent exploitation of this bug.
### Credits
Thanks to ChangZhuo Chen (@czchen) for finding the issue and for contributing the fix!
### References
* [Documentation for apps-in-any-namespace](https://argo-cd--10678.org.readthedocs.build/en/10678/operator-manual/app-any-namespace/)
### For more information
* Open an issue in [the Argo CD issue tracker](https://github.com/argoproj/argo-cd/issues) or [discussions](https://github.com/argoproj/argo-cd/discussions)
* Join us on [Slack](https://argoproj.github.io/community/join-slack) in channel #argo-cd
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0-rc1'}, {'fixed': '2.5.8'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0-rc4'}, {'fixed': '2.6.0-rc5'}]}], 'versions': ['2.6.0-rc4']}]
|
[{'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/security/advisories/GHSA-6p4m-hw2h-6gmw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22736'}, {'type': 'PACKAGE', 'url': 'https://github.com/argoproj/argo-cd'}]
|
{'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-25T19:39:03Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}
|
1.4.0
|
GHSA-w9mr-4mfr-499f
|
2023-01-11T23:00:55Z
|
2023-01-05T12:30:27Z
| null |
['CVE-2017-20162']
|
Vercel ms Inefficient Regular Expression Complexity vulnerability
|
A vulnerability, which was classified as problematic, has been found in vercel ms up to 1.x. This issue affects the function parse of the file index.js. The manipulation of the argument str leads to inefficient regular expression complexity. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.0.0 is able to address this issue. The name of the patch is caae2988ba2a37765d055c4eee63d383320ee662. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217451.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'ms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-20162'}, {'type': 'WEB', 'url': 'https://github.com/vercel/ms/pull/89'}, {'type': 'WEB', 'url': 'https://github.com/vercel/ms/commit/caae2988ba2a37765d055c4eee63d383320ee662'}, {'type': 'PACKAGE', 'url': 'https://github.com/vercel/ms'}, {'type': 'WEB', 'url': 'https://github.com/vercel/ms/releases/tag/2.0.0'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217451'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217451'}]
|
{'cwe_ids': ['CWE-1333'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-10T21:45:33Z', 'nvd_published_at': '2023-01-05T12:15:00Z'}
|
1.4.0
|
GHSA-v9gj-5rgp-w33r
|
2023-01-20T23:06:48Z
|
2023-01-19T09:30:16Z
| null |
['CVE-2023-0398']
|
Modoboa is vulnerable to Cross-Site Request Forgery
|
Modoboa 2.0.3 and prior is vulnerable to Cross-Site Request Forgery. A patch is available and anticipated to be part of version 2.0.4.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'modoboa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0398'}, {'type': 'WEB', 'url': 'https://github.com/modoboa/modoboa/commit/8e14ac93669df4f35fcdebd55dc9d2f0fed3ed48'}, {'type': 'PACKAGE', 'url': 'https://github.com/modoboa/modoboa'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0a852351-00ed-44d2-a650-9055b7beed58'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T23:06:48Z', 'nvd_published_at': '2023-01-19T09:15:00Z'}
|
1.4.0
|
GHSA-m589-mv4q-p7rj
|
2023-01-23T18:49:42Z
|
2023-01-13T21:30:26Z
| null |
['CVE-2022-45299']
|
webbrowser-rs allows attackers to access arbitrary files via supplying a crafted URL
|
An issue in the IpFile argument of rust-lang webbrowser-rs v0.8.2 allows attackers to access arbitrary files via supplying a crafted URL.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'webbrowser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45299'}, {'type': 'WEB', 'url': 'https://github.com/amodm/webbrowser-rs/commit/431b5139e274b7e456bea27e768aaa121b97be4c'}, {'type': 'PACKAGE', 'url': 'https://github.com/amodm/webbrowser-rs'}, {'type': 'WEB', 'url': 'https://github.com/amodm/webbrowser-rs/releases/tag/v0.8.3'}, {'type': 'WEB', 'url': 'https://github.com/offalltn/CVE-2022-45299'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-14T05:18:53Z', 'nvd_published_at': '2023-01-13T21:15:00Z'}
|
1.4.0
|
GHSA-685j-36qx-3vp2
|
2023-02-06T16:43:39Z
|
2023-01-26T21:30:18Z
| null |
['CVE-2023-24428']
|
Cross-site request forgery vulnerability in Jenkins Bitbucket OAuth Plugin
|
A cross-site request forgery (CSRF) vulnerability in Jenkins Bitbucket OAuth Plugin 0.12 and earlier allows attackers to trick users into logging in to the attacker's account.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:bitbucket-oauth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24428'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/bitbucket-oauth-plugin/commit/a927a8ff2e069afebb97f33f6798033ef4451e4f'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/bitbucket-oauth-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2981'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:08:12Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}
|
1.4.0
|
GHSA-h6p3-p4vx-wr8q
|
2023-01-11T23:47:24Z
|
2023-01-11T23:47:24Z
| null |
[]
|
dompurify vulnerable to Cross-site Scripting
|
dompurify prior to version 2.2.3 is vulnerable to a cross-site scripting problem caused by nested headlines.
|
[]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'dompurify'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.3'}]}]}]
|
[{'type': 'PACKAGE', 'url': 'https://github.com/cure53/DOMPurify'}, {'type': 'WEB', 'url': 'https://github.com/cure53/DOMPurify/releases/tag/2.2.3'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-DOMPURIFY-2863266'}, {'type': 'WEB', 'url': 'https://www.vidocsecurity.com/blog/hacking-swagger-ui-from-xss-to-account-takeovers/'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-11T23:47:24Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-r3c9-9j5q-pwv4
|
2023-02-07T21:54:06Z
|
2023-01-26T19:51:48Z
| null |
['CVE-2021-21395']
|
magento-lts Reset Password not protected against well-timed CSRF
|
### Impact
Password reset form is vulnerable to CSRF between time reset password link is clicked and user submits new password.
### Patches
PR forthcoming
### Workarounds
None
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.4.22'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '20.0.0'}, {'fixed': '20.0.19'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/security/advisories/GHSA-r3c9-9j5q-pwv4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21395'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1086752'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenMage/magento-lts'}, {'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22'}, {'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/openmage/magento-lts'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-26T19:51:48Z', 'nvd_published_at': '2023-01-27T16:15:00Z'}
|
1.4.0
|
GHSA-2phw-rgr7-5pvh
|
2023-01-13T21:05:41Z
|
2023-01-09T09:30:25Z
| null |
['CVE-2010-10004']
|
Information Cards Module vulnerable to Cross-site Scripting
|
A vulnerability was found in Information Cards Module and classified as problematic. This issue affects some unknown processing. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 1.0 is able to address this issue. The name of the patch is f6bfea49ae16dc6e179df8306d39c3694f1ef186. It is recommended to upgrade the affected component. The identifier VDB-217661 was assigned to this vulnerability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'simplesamlphp/simplesamlphp-module-infocard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-10004'}, {'type': 'WEB', 'url': 'https://github.com/simplesamlphp/simplesamlphp-module-infocard/commit/f6bfea49ae16dc6e179df8306d39c3694f1ef186'}, {'type': 'PACKAGE', 'url': 'https://github.com/simplesamlphp/simplesamlphp-module-infocard'}, {'type': 'WEB', 'url': 'https://github.com/simplesamlphp/simplesamlphp-module-infocard/releases/tag/v1.0'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217661'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217661'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-13T21:05:41Z', 'nvd_published_at': '2023-01-09T08:15:00Z'}
|
1.4.0
|
GHSA-5465-xc2j-6p84
|
2023-02-08T21:36:10Z
|
2023-01-26T21:30:20Z
| null |
['CVE-2023-0229']
|
github.com/openshift/apiserver-library-go Improper Input Validation vulnerability
|
A flaw was found in github.com/openshift/apiserver-library-go, used in OpenShift 4.12 and 4.11, that contains an issue that can allow low-privileged users to set the seccomp profile for pods they control to "unconfined." By default, the seccomp profile used in the restricted-v2 Security Context Constraint (SCC) is "runtime/default," allowing users to disable seccomp for pods they can create and modify.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/openshift/apiserver-library-go'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20230120221150-cefee9e0162b'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0229'}, {'type': 'WEB', 'url': 'https://github.com/openshift/apiserver-library-go/pull/97'}, {'type': 'WEB', 'url': 'https://github.com/openshift/apiserver-library-go/commit/30f75d79e424ca462c6de53ee8b93f91183763e6'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2160349'}, {'type': 'PACKAGE', 'url': 'github.com/openshift/apiserver-library-go'}]
|
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T21:36:10Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}
|
1.4.0
|
GHSA-5qq4-m6c3-xxmf
|
2023-01-30T18:17:38Z
|
2023-01-26T21:30:28Z
| null |
['CVE-2022-21192']
|
Directory Traversal vulnerability in serve-lite
|
All versions of the package serve-lite are vulnerable to Directory Traversal due to missing input sanitization or other checks and protections employed to the req.url passed as-is to path.join().
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'serve-lite'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21192'}, {'type': 'WEB', 'url': 'https://gist.github.com/lirantal/9ccdfda0edcb95e36d07a04b0b6c2db0'}, {'type': 'PACKAGE', 'url': 'https://github.com/beenotung/serve-lite'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-SERVELITE-3149916'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-30T18:17:38Z', 'nvd_published_at': '2023-01-26T21:15:00Z'}
|
1.4.0
|
GHSA-g25r-gvq3-wrq7
|
2023-02-07T15:49:33Z
|
2023-01-25T19:36:09Z
| null |
['CVE-2022-21953']
|
Authenticated user can gain unauthorized shell pod and kubectl access in the local cluster
|
### Impact
An issue was discovered in Rancher where an authorization logic flaw allows an authenticated user on any downstream cluster to (1) open a shell pod in the Rancher `local` cluster and (2) have limited `kubectl` access to it. The expected behavior is that a user does not have such access in the Rancher `local` cluster unless explicitly granted.
This issue does not allow the user to escalate privileges in the `local` cluster directly (this would require another vulnerability to be exploited).
The security issue happens in two different ways:
1. Shell pod access - This is when a user opens a shell pod in the Rancher UI to a downstream cluster that the user has permission to access. The web request can be intercepted using the browser's web inspector/network console or a proxy tool to change the shell's destination to the Rancher `local` cluster instead of the desired downstream cluster.
- This flaw cannot be exploited to access a downstream cluster that the user has no permissions to.
- The shell pod runs with a limited non-root user, reducing the severity of this issue. However, even as a non-root user, it is still possible download and run binaries inside the shell pod.
- The blast radius of this issue can increase based on the configuration of the `local` cluster. For example:
- If the `local` cluster has unlimited network access, e.g. to the Internet, the user can open a reverse network connection to the shell pod.
- Or access the cloud metadata API of the underlying cloud infrastructure, where the user can extract the credentials associated with the `local` cluster and use them to interact with the cloud environment (this will be limited by the permissions granted to the cloud credentials in question).
- Check further recommendations about liming access to the cloud metadata API in Rancher's [security best practices](https://ranchermanager.docs.rancher.com/reference-guides/rancher-security/kubernetes-security-best-practices).
2. Kubectl access - When downloading the kubeconfig file of a downstream cluster that the user has access to, the `server` cluster address in the kubeconfig file can be changed to point to the Rancher `local` cluster instead of the intended downstream cluster.
- This can also be achieved by crafting a kubeconfig using a Rancher token instead of using the kubeconfig from an active cluster.
- This flaw cannot be exploited to access a downstream cluster that the user has no permissions to.
Notes:
- Rancher `local` cluster means the cluster where Rancher is installed. It is named as `local` inside the list of clusters in the Rancher UI.
- Audit logs in Rancher can be used to identify possible abuses of this issue, by tracking API requests to the user ID of the user that performed the action. API audit logs can be enabled as described in the [documentation](https://ranchermanager.docs.rancher.com/how-to-guides/advanced-user-guides/enable-api-audit-log) when set to level `1` or above.
### Workarounds
There is no workaround or direct mitigation besides updating to a patched Rancher version.
### Patches
Patched versions include releases 2.5.17, 2.6.10, 2.7.1 and later versions.
### For more information
If you have any questions or comments about this advisory:
* Reach out to [SUSE Rancher Security team](https://github.com/rancher/rancher/security/policy) for security related inquiries.
* Open an issue in [Rancher](https://github.com/rancher/rancher/issues/new/choose) repository.
* Verify our [support matrix](https://www.suse.com/suse-rancher/support-matrix/all-supported-versions/) and [product support lifecycle](https://www.suse.com/lifecycle/).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.17'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.10'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/rancher/rancher/security/advisories/GHSA-g25r-gvq3-wrq7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21953'}, {'type': 'WEB', 'url': 'https://bugzilla.suse.com/show_bug.cgi?id=1199731'}, {'type': 'PACKAGE', 'url': 'https://github.com/rancher/rancher'}]
|
{'cwe_ids': ['CWE-284', 'CWE-285', 'CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-25T19:36:09Z', 'nvd_published_at': '2023-02-07T13:15:00Z'}
|
1.4.0
|
GHSA-j94p-hv25-rm5g
|
2023-01-03T12:28:06Z
|
2023-01-03T12:28:06Z
| null |
['CVE-2022-47551']
|
Apiman has potential permissions bypass
|
### Impact
Incorrect default permissions for certain read-only resources in the Apiman 1.5.7.Final through 2.2.3.Final in the Apiman Manager REST API allows a remote authenticated attacker to access information and resources in an Apiman Organizations they are not a member of and/or do not have permissions for.
For example, an attacker may be able to craft an HTTP request to discover APIs that are private to organizations they are not members of, via fuzzing, search, and other similar mechanisms.
If the attacker has sufficient permissions in their own organization, they may also be able to sign up to the private APIs they have discovered by crafting a tailored HTTP request, thereby gaining access to an API Management protected resource that they should have access to.
* A malicious account-holder may be able to see information about APIs they do not have permission for.
* A malicious account-holder may be able to sign up to APIs they do not have permission for, and hence access API Management-protected resources they are not authorized to access.
* This does NOT relate to the Apiman Gateway.
### Patches
* Upgrade to Apiman 3.0.0.Final (or later). The issue is fixed in this version.
* If you are using an older version of Apiman, contact to your [Apiman support provider](https://www.apiman.io/support.html) for advice/long-term support.
### References
* https://www.apiman.io/blog/permissions-bypass-disclosure/
* https://github.com/advisories/GHSA-54r5-wr8x-x5v3
* https://nvd.nist.gov/vuln/detail/CVE-2022-47551
* https://github.com/orgs/apiman/discussions/2409
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'io.apiman:apiman-manager-api-rest-impl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.7'}, {'fixed': '3.0.0.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.3.Final'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/apiman/apiman/security/advisories/GHSA-j94p-hv25-rm5g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-47551'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-54r5-wr8x-x5v3'}, {'type': 'PACKAGE', 'url': 'https://github.com/apiman/apiman'}, {'type': 'WEB', 'url': 'https://github.com/orgs/apiman/discussions/2409'}, {'type': 'WEB', 'url': 'https://www.apiman.io/blog/permissions-bypass-disclosure/'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-03T12:28:06Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-2x48-p6cq-5xcw
|
2023-01-31T01:59:08Z
|
2023-01-23T06:30:20Z
| null |
['CVE-2022-46959']
|
Path Traversal in github.com/go-sonic/sonic
|
An issue in the component /admin/backups/work-dir of Sonic v1.0.4 allows attackers to execute a directory traversal.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/go-sonic/sonic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.5'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46959'}, {'type': 'WEB', 'url': 'https://github.com/go-sonic/sonic/issues/56'}, {'type': 'WEB', 'url': 'https://github.com/go-sonic/sonic/pull/61/commits/3b00266a13fa69284f4b3f4b37d29be8f8e02f31'}, {'type': 'PACKAGE', 'url': 'https://github.com/go-sonic/sonic'}, {'type': 'WEB', 'url': 'https://github.com/go-sonic/sonic/releases/tag/v1.0.5'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-23T20:37:57Z', 'nvd_published_at': '2023-01-23T05:15:00Z'}
|
1.4.0
|
GHSA-6mjp-2rm6-9g85
|
2023-01-10T21:42:55Z
|
2023-01-06T17:15:47Z
| null |
['CVE-2023-22457']
|
XWiki CKEditor.HTMLConverter vulnerable to Remote Code Execution via Cross-Site Request Forgery
|
### Impact
The `CKEditor.HTMLConverter` document lacked a protection against Cross-Site Request Forgery (CSRF), allowing to execute macros with the rights of the current user. If a privileged user with programming rights was tricked into executing a GET request to this document with certain parameters (e.g., via an image with a corresponding URL embedded in a comment or via a redirect), this would allow arbitrary remote code execution and the attacker could gain rights, access private information or impact the availability of the wiki.
The attack can be demonstrated by accessing the URL `<server>/xwiki/bin/view/Main?sheet=CKEditor.HTMLConverter&language=en&sourceSyntax=xwiki%2F2.1&stripHTMLEnvelope=true&fromHTML=false&toHTML=true&text=%7B%7Bgroovy%7D%7Dprintln%28%22Hello+from+Groovy%21%22%29%7B%7B%2Fgroovy%7D%7D` where `<server>` is the URL of the XWiki installation as a user with programming rights. If this displays the text "Hello from Groovy!", the installation is vulnerable.
### Patches
The issue has been patched in the CKEditor Integration version 1.64.3. This has also been patched in the version of the CKEditor integration that is bundled starting with XWiki 14.6 RC1.
### Workarounds
There are no known workarounds for this other than upgrading the CKEditor integration to a fixed version.
### References
* https://github.com/xwiki-contrib/application-ckeditor/commit/6b1053164386aefc526df7512bc664918aa6849b
* https://jira.xwiki.org/browse/CKEDITOR-475
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)
* Email us at [Security Mailing List](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.contrib:application-ckeditor-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.64.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki-contrib/application-ckeditor/security/advisories/GHSA-6mjp-2rm6-9g85'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22457'}, {'type': 'WEB', 'url': 'https://github.com/xwiki-contrib/application-ckeditor/commit/6b1053164386aefc526df7512bc664918aa6849b'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki-contrib/application-ckeditor'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/CKEDITOR-475'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-06T17:15:47Z', 'nvd_published_at': '2023-01-04T15:15:00Z'}
|
1.4.0
|
GHSA-8686-4cr3-76wj
|
2023-01-12T16:49:30Z
|
2023-01-07T06:30:20Z
| null |
['CVE-2023-0106']
|
usememos/memos vulnerable to stored Cross-site Scripting
|
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.10.0.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0106'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/0f8ce3dd1696722f951d7195ad1f88b39a5d15d7'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/5c0809cb-f4ff-4447-bed6-b5625fb374bb'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T21:53:55Z', 'nvd_published_at': '2023-01-07T04:15:00Z'}
|
1.4.0
|
GHSA-v436-q368-hvgg
|
2023-01-23T18:47:54Z
|
2023-01-12T23:39:39Z
| null |
['CVE-2023-0091']
|
Keycloak has lack of validation of access token on client registrations endpoint
|
When a service account with the create-client or manage-clients role can use the client-registration endpoints to create/manage clients with an access token.
If the access token is leaked, there is an option to revoke the specific token. However, the check is not performed in client-registration endpoints.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20.0.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 20.0.2'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/security/advisories/GHSA-v436-q368-hvgg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0091'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2023-0091'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}]
|
{'cwe_ids': ['CWE-284', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-12T23:39:39Z', 'nvd_published_at': '2023-01-13T06:15:00Z'}
|
1.4.0
|
GHSA-prcg-mc23-hgjh
|
2023-02-02T22:19:25Z
|
2023-01-26T21:30:29Z
| null |
['CVE-2020-22452']
|
phpmyadmin contains SQL Injection vulnerability
|
SQL Injection vulnerability in function getTableCreationQuery in CreateAddField.php in phpMyAdmin 5.x before 5.0.2 via the tbl_storage_engine or tbl_collation parameters to tbl_create.php.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-22452'}, {'type': 'WEB', 'url': 'https://github.com/phpmyadmin/phpmyadmin/issues/15898'}, {'type': 'WEB', 'url': 'https://github.com/phpmyadmin/phpmyadmin/pull/16004'}, {'type': 'WEB', 'url': 'https://github.com/phpmyadmin/phpmyadmin/commit/bc982466f08ddccad4804ba928f84ff8e25107cb'}, {'type': 'PACKAGE', 'url': 'https://github.com/phpmyadmin/phpmyadmin'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-02T22:19:25Z', 'nvd_published_at': '2023-01-26T21:15:00Z'}
|
1.4.0
|
GHSA-r4hg-4cpq-q57c
|
2023-02-07T21:17:31Z
|
2023-01-31T06:30:26Z
| null |
['CVE-2022-25979']
|
jSuites subect to Cross-site Scripting
|
Versions of the package jsuites before 5.0.1 are vulnerable to Cross-site Scripting (XSS) due to improper user-input sanitization in the Editor() function.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'jsuites'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25979'}, {'type': 'WEB', 'url': 'https://github.com/jsuites/jsuites/issues/134'}, {'type': 'WEB', 'url': 'https://github.com/jsuites/jsuites/commit/b31770d5fe91684a00177f629aab933139c32d9f'}, {'type': 'PACKAGE', 'url': 'https://github.com/jsuites/jsuites'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3253331'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-JSUITES-3226764'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-01T20:58:02Z', 'nvd_published_at': '2023-01-31T05:15:00Z'}
|
1.4.0
|
GHSA-c467-5c2g-jp86
|
2023-01-27T01:16:04Z
|
2023-01-27T00:30:18Z
| null |
['CVE-2023-0470']
|
Cross-site Scripting in modoboa
|
Cross-site Scripting (XSS) - Stored in GitHub repository modoboa/modoboa prior to 2.0.4.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'modoboa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0470'}, {'type': 'WEB', 'url': 'https://github.com/modoboa/modoboa/commit/354ab6884019009249097a7f3a1881d81ecd2fd2'}, {'type': 'PACKAGE', 'url': 'https://github.com/modoboa/modoboa'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/baae3180-b63b-4880-b2af-1a3f30056c2b'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:16:04Z', 'nvd_published_at': '2023-01-26T22:15:00Z'}
|
1.4.0
|
GHSA-r894-5r7v-7rx3
|
2023-01-12T23:40:22Z
|
2023-01-07T09:30:17Z
| null |
['CVE-2014-125055']
|
easy-scrypt Observable Timing Discrepancy vulnerability
|
A vulnerability, which was classified as problematic, was found in agnivade easy-scrypt. Affected is the function `VerifyPassphrase` of the file `scrypt.go`. The manipulation leads to observable timing discrepancy. Upgrading to version 1.0.0 can address this issue. The name of the patch is 477c10cf3b144ddf96526aa09f5fdea613f21812. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217596.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/agnivade/easy-scrypt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-125055'}, {'type': 'WEB', 'url': 'https://github.com/agnivade/easy-scrypt/commit/477c10cf3b144ddf96526aa09f5fdea613f21812'}, {'type': 'PACKAGE', 'url': 'https://github.com/agnivade/easy-scrypt'}, {'type': 'WEB', 'url': 'https://github.com/agnivade/easy-scrypt/releases/tag/v1.0.0'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217596'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217596'}]
|
{'cwe_ids': ['CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-12T23:40:22Z', 'nvd_published_at': '2023-01-07T09:15:00Z'}
|
1.4.0
|
GHSA-x9vc-5q77-m7x4
|
2023-01-23T20:40:08Z
|
2023-01-22T03:30:28Z
| null |
['CVE-2023-0434']
|
Improper Input Validation in pyload-ng
|
Improper Input Validation in GitHub repository pyload/pyload prior to 0.5.0b3.dev40.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:P/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'pyload-ng'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0b3.dev40'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0434'}, {'type': 'WEB', 'url': 'https://github.com/pyload/pyload/commit/a2b1eb1028f45ac58dea5f58593c1d3db2b4a104'}, {'type': 'PACKAGE', 'url': 'https://github.com/pyload/pyload'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/7d9332d8-6997-483b-9fb9-bcf2ae01dad4'}]
|
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-23T20:40:08Z', 'nvd_published_at': '2023-01-22T01:15:00Z'}
|
1.4.0
|
GHSA-8mmh-h4jh-2g34
|
2023-02-03T20:34:57Z
|
2023-01-26T21:30:18Z
| null |
['CVE-2023-24455']
|
Path Traversal in Jenkins visualexpert Plugin
|
Jenkins visualexpert Plugin 1.3 and earlier does not restrict the names of files in methods implementing form validation, allowing attackers with Item/Configure permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:visualexpert'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24455'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2709'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T00:56:07Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}
|
1.4.0
|
GHSA-9jwh-qvg7-gr59
|
2023-01-27T01:26:59Z
|
2023-01-26T21:30:18Z
| null |
['CVE-2023-24432']
|
CSRF vulnerability in Jenkins Orka Plugin allow capturing credentials
|
A cross-site request forgery (CSRF) vulnerability in Jenkins Orka by MacStadium Plugin 1.31 and earlier allows attackers to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
|
[]
|
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:macstadium-orka'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.32'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24432'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2772%20(2)'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:26:59Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}
|
1.4.0
|
GHSA-g7mw-9pf9-p2pm
|
2023-01-12T23:40:45Z
|
2023-01-07T21:30:39Z
| null |
['CVE-2014-125064']
|
gosqljson SQL Injection vulnerability
|
A vulnerability, which was classified as critical, has been found in elgs gosqljson. This issue affects the function `QueryDbToArray/QueryDbToMap/ExecDb` of the file `gosqljson.go`. The manipulation of the argument sqlStatement leads to sql injection. The name of the patch is 2740b331546cb88eb61771df4c07d389e9f0363a. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217631.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/elgs/gosqljson'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20220916234230-750f26ee23c7'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-125064'}, {'type': 'WEB', 'url': 'https://github.com/elgs/gosqljson/commit/2740b331546cb88eb61771df4c07d389e9f0363a'}, {'type': 'PACKAGE', 'url': 'https://github.com/elgs/gosqljson'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1494'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217631'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217631'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-12T23:40:45Z', 'nvd_published_at': '2023-01-07T20:15:00Z'}
|
1.4.0
|
GHSA-6c25-cxcc-pmc4
|
2023-02-08T22:20:19Z
|
2023-01-31T18:30:23Z
| null |
['CVE-2023-24163']
|
Dromara hutool vulnerable to SQL Injection
|
SQL Inection vulnerability in Dromara hutool v5.8.11 allows attacker to execute arbitrary code via the aviator template engine.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'cn.hutool:hutool-all'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.8.11'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24163'}, {'type': 'PACKAGE', 'url': 'https://gitee.com/dromara/hutool'}, {'type': 'WEB', 'url': 'https://gitee.com/dromara/hutool/issues/I6AJWJ#note_15801868'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:20:19Z', 'nvd_published_at': '2023-01-31T16:15:00Z'}
|
1.4.0
|
GHSA-5xpc-c4xv-7w62
|
2023-02-03T20:39:19Z
|
2023-01-26T21:30:18Z
| null |
['CVE-2023-24449']
|
Path traversal vulnerability in Jenkins PWauth Security Realm Plugin
|
Jenkins PWauth Security Realm Plugin 0.4 and earlier does not restrict the names of files in methods implementing form validation, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jvnet.hudson.plugins:pwauth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24449'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2985'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:28:27Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}
|
1.4.0
|
GHSA-g5mj-c26g-vmpm
|
2023-02-03T20:36:33Z
|
2023-01-26T21:30:18Z
| null |
['CVE-2023-24443']
|
XML Entity Expansion in Jenkins TestComplete support Plugin
|
Jenkins TestComplete support Plugin 2.8.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:TestComplete'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.8.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24443'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2741'}]
|
{'cwe_ids': ['CWE-611', 'CWE-776'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:00:03Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}
|
1.4.0
|
GHSA-v4w5-r2xc-7f8h
|
2023-07-21T18:02:01Z
|
2023-01-09T21:57:10Z
| null |
['CVE-2023-22479']
|
KubePi session fixation attack allows an attacker to hijack a legitimate user session.
|
### Summary
A session fixation attack allows an attacker to hijack a legitimate user session. The attack investigates a flaw in how the online application handles the session ID, especially the susceptible web application.
### Affected Version
<= v1.6.3
### Patches
The vulnerability has been fixed in [v1.6.4](https://github.com/KubeOperator/KubePi/releases/tag/v1.6.4).
https://github.com/KubeOperator/KubePi/commit/1e9c550356c1a425a742480efcf743d373e98dcb : A session fixation attack allows an attacker to hijack a legitimate user session.
### Workarounds
It is recommended to upgrade the version to [v1.6.4](https://github.com/KubeOperator/KubePi/releases/tag/v1.6.4).
### For more information
If you have any questions or comments about this advisory, please [open an issue](https://github.com/KubeOperator/KubePi/issues).
This vulnerability is reported by [sachinh09](https://huntr.dev/users/sachinh09/) from [huntr.dev](https://huntr.dev/).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/KubeOperator/kubepi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.6.3'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/1Panel-dev/KubePi/security/advisories/GHSA-v4w5-r2xc-7f8h'}, {'type': 'WEB', 'url': 'https://github.com/KubeOperator/KubePi/security/advisories/GHSA-v4w5-r2xc-7f8h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22479'}, {'type': 'WEB', 'url': 'https://github.com/KubeOperator/KubePi/commit/1e9c550356c1a425a742480efcf743d373e98dcb'}, {'type': 'PACKAGE', 'url': 'https://github.com/KubeOperator/KubePi'}, {'type': 'WEB', 'url': 'https://github.com/KubeOperator/KubePi/releases/tag/v1.6.4'}]
|
{'cwe_ids': ['CWE-384'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T21:57:10Z', 'nvd_published_at': '2023-01-10T21:15:00Z'}
|
1.4.0
|
GHSA-vf99-xw26-86g5
|
2023-01-11T20:54:21Z
|
2023-01-05T09:30:28Z
| null |
['CVE-2023-22626']
|
PgHero Allows Information Disclosure Through EXPLAIN Feature
|
PgHero before 3.1.0 allows Information Disclosure via EXPLAIN because query results may be present in an error message. (Depending on database user privileges, this may only be information from the database, or may be information from file contents on the database server.)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'RubyGems', 'name': 'pghero'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22626'}, {'type': 'WEB', 'url': 'https://github.com/ankane/pghero/issues/439'}, {'type': 'PACKAGE', 'url': 'https://github.com/ankane/pghero'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/pghero/CVE-2023-22626.yml'}]
|
{'cwe_ids': ['CWE-209'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T20:03:14Z', 'nvd_published_at': '2023-01-05T08:15:00Z'}
|
1.4.0
|
GHSA-9963-gmh8-vvm6
|
2023-02-03T20:35:06Z
|
2023-01-26T21:30:18Z
| null |
['CVE-2023-24456']
|
Session fixation vulnerability in Jenkins Keycloak Authentication Plugin
|
Jenkins Keycloak Authentication Plugin 2.3.0 and earlier does not invalidate the previous session on login.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:keycloak'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24456'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2987'}]
|
{'cwe_ids': ['CWE-384'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T00:57:52Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}
|
1.4.0
|
GHSA-w475-749h-c77m
|
2023-01-23T18:50:19Z
|
2023-01-16T00:30:25Z
| null |
['CVE-2023-0308']
|
phpMyFAQ Stored Cross-site Scripting vulnerability
|
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.10.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.10'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0308'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/810ee26d25c3d97664532861863099952f0e9a1f'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpmyfaq'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/83cfed62-af8b-4aaa-94f2-5a33dc0c2d69'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T22:02:26Z', 'nvd_published_at': '2023-01-15T22:15:00Z'}
|
1.4.0
|
GHSA-jjvp-wfp8-rv69
|
2023-01-12T20:58:04Z
|
2023-01-06T21:30:40Z
| null |
['CVE-2018-25068']
|
globalpom-utils has Insecure Temporary File
|
A vulnerability has been found in devent globalpom-utils up to 4.5.0 and classified as critical. This vulnerability affects the function `createTmpDir` of the file `globalpomutils-fileresources/src/main/java/com/anrisoftware/globalpom/fileresourcemanager/FileResourceManagerProvider.java`. The manipulation leads to insecure temporary file. The attack can be initiated remotely. Upgrading to version 4.5.1 can address this issue. The name of the patch is 77a820bac2f68e662ce261ecb050c643bd7ee560. It is recommended to upgrade the affected component. VDB-217570 is the identifier assigned to this vulnerability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.anrisoftware.globalpom:globalpomutils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25068'}, {'type': 'WEB', 'url': 'https://github.com/devent/globalpom-utils/commit/77a820bac2f68e662ce261ecb050c643bd7ee560'}, {'type': 'PACKAGE', 'url': 'https://github.com/devent/globalpom-utils'}, {'type': 'WEB', 'url': 'https://github.com/devent/globalpom-utils/releases/tag/globalpomutils-4.5.1'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217570'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217570'}]
|
{'cwe_ids': ['CWE-377'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-12T20:58:04Z', 'nvd_published_at': '2023-01-06T21:15:00Z'}
|
1.4.0
|
GHSA-864v-6qj7-62qj
|
2023-02-03T20:32:27Z
|
2023-01-24T20:47:19Z
| null |
['CVE-2023-23612']
|
Issue with whitespace in JWT roles in OpenSearch
|
### Advisory title: Issue with whitespace in JWT roles
### Affected versions:
OpenSearch 1.0.0-1.3.7 and 2.0.0-2.4.1
### Patched versions:
OpenSearch 1.3.8 and 2.5.0
### Impact:
OpenSearch uses JWTs to store role claims obtained from the Identity Provider (IdP) when the authentication backend is SAML or OpenID Connect. There is an issue in how those claims are processed from the JWTs where the leading and trailing whitespace is trimmed, allowing users to potentially claim roles they are not assigned to if any role matches the whitespace-stripped version of the roles they are a member of.
This issue is only present for authenticated users, and it requires either the existence of roles that match, not considering leading/trailing whitespace, or the ability for users to create said matching roles. In addition, the Identity Provider must allow leading and trailing spaces in role names.
### Patches:
OpenSearch versions 1.3.8 and 2.5.0 contain a fix for this issue.
### For more information:
If you have any questions or comments about this advisory, please contact AWS/Amazon Security via our issue reporting page (https://aws.amazon.com/security/vulnerability-reporting/) or directly via email to [[email protected]](mailto:[email protected]). Please do not create a public GitHub issue.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.opensearch:opensearch-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.opensearch:opensearch-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.5.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/opensearch-project/security/security/advisories/GHSA-864v-6qj7-62qj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23612'}, {'type': 'WEB', 'url': 'https://github.com/opensearch-project/OpenSearch/releases/tag/2.5.0'}, {'type': 'PACKAGE', 'url': 'https://github.com/opensearch-project/security'}]
|
{'cwe_ids': ['CWE-269', 'CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-24T20:47:19Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}
|
1.4.0
|
GHSA-3xq5-wjfh-ppjc
|
2023-01-09T14:10:49Z
|
2023-01-09T14:10:49Z
| null |
['CVE-2023-22467']
|
Luxon Inefficient Regular Expression Complexity vulnerability
|
# Impact
Luxon's `DateTime.fromRFC2822() has quadratic (N^2) complexity on some specific inputs. This causes a noticeable slowdown for inputs with lengths above 10k characters. Users providing untrusted data to this method are therefore vulnerable to (Re)DoS attacks.
This is the same bug as Moment's https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g
# Workarounds
Limit the length of the input.
# References
There is an excellent writeup of the same issue in Moment: https://github.com/moment/moment/pull/6015#issuecomment-1152961973
# Details
`DateTime.fromRFC2822("(".repeat(500000))` takes a couple minutes to complete.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'luxon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.28.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'luxon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'luxon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/moment/luxon/security/advisories/GHSA-3xq5-wjfh-ppjc'}, {'type': 'WEB', 'url': 'https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22467'}, {'type': 'WEB', 'url': 'https://github.com/moment/moment/pull/6015#issuecomment-1152961973'}, {'type': 'WEB', 'url': 'https://github.com/moment/luxon/commit/5ab3bf64a10da929a437629cdb2f059bb83212bf'}, {'type': 'PACKAGE', 'url': 'https://github.com/moment/luxon'}]
|
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T14:10:49Z', 'nvd_published_at': '2023-01-04T22:15:00Z'}
|
1.4.0
|
GHSA-8f7f-vqg5-jrv9
|
2023-01-23T18:52:27Z
|
2023-01-10T22:43:38Z
| null |
['CVE-2023-21538']
|
.NET Denial of Service Vulnerability
|
# Microsoft Security Advisory CVE-2023-21538: .NET Denial of Service Vulnerability
## <a name="executive-summary"></a>Executive summary
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 6.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.
A denial of service vulnerability exists in .NET 6.0 where a malicious client could cause a stack overflow which may result in a denial of service attack when an attacker sends an invalid request to an exposed endpoint.
## Discussion
Discussion for this issue can be found at https://github.com/dotnet/runtime/issues/80449
### <a name="mitigation-factors"></a>Mitigation factors
Microsoft has not identified any mitigating factors for this vulnerability.
## <a name="affected-software"></a>Affected software
* Any .NET 6.0 application running on .NET 6.0.12 or earlier.
If your application uses the following package versions, ensure you update to the latest version of .NET.
### <a name=".NET 6"></a>.NET 6
Package name | Affected version | Patched version
------------ | ---------------- | -------------------------
[Microsoft.NetCore.App.Runtime.linux-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-arm)|>= 6.0.0, <= 6.0.12|6.0.13
[Microsoft.NetCore.App.Runtime.linux-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-arm64)|>= 6.0.0, <= 6.0.12|6.0.13
[Microsoft.NetCore.App.Runtime.linux-musl-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-arm)|>= 6.0.0, <= 6.0.12|6.0.13
[Microsoft.NetCore.App.Runtime.linux-musl-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-arm64)|>= 6.0.0, <= 6.0.12|6.0.13
[Microsoft.NetCore.App.Runtime.linux-musl-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-x64)|>= 6.0.0, <= 6.0.12|6.0.13
[Microsoft.NetCore.App.Runtime.linux-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-x64)|>= 6.0.0, <= 6.0.12|6.0.13
[Microsoft.NetCore.App.Runtime.osx-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.osx-arm64)|>= 6.0.0, <= 6.0.12|6.0.13
[Microsoft.NetCore.App.Runtime.osx-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.osx-x64)|>= 6.0.0, <= 6.0.12|6.0.13
[Microsoft.NetCore.App.Runtime.win-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm)|>= 6.0.0, <= 6.0.12|6.0.13
[Microsoft.NetCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm64)|>= 6.0.0, <= 6.0.12|6.0.13
[Microsoft.NetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x64)|>= 6.0.0, <= 6.0.12|6.0.13
[Microsoft.NetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x86)|>= 6.0.0, <= 6.0.12|6.0.13
## Advisory FAQ
### <a name="how-affected"></a>How do I know if I am affected?
If you have a runtime or SDK with a version listed, or an affected package listed in [affected software](#affected-software), you're exposed to the vulnerability.
### <a name="how-fix"></a>How do I fix the issue?
* To fix the issue please install the latest version of .NET 6.0. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs.
* If you have .NET Core 3.1 or greater installed, you can list the versions you have installed by running the `dotnet --info` command. You will see output like the following;
* If you are using one of the affected packages, please update to the patched version listed above.
```
.NET Core SDK (reflecting any global.json):
Version: 6.0.300
Commit: 8473146e7d
Runtime Environment:
OS Name: Windows
OS Version: 10.0.18363
OS Platform: Windows
RID: win10-x64
Base Path: C:\Program Files\dotnet\sdk\6.0.300\
Host (useful for support):
Version: 6.0.5
Commit: 8473146e7d
.NET Core SDKs installed:
6.0.300 [C:\Program Files\dotnet\sdk]
.NET Core runtimes installed:
Microsoft.AspNetCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App]
Microsoft.NETCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App]
Microsoft.WindowsDesktop.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App]
To install additional .NET Core runtimes or SDKs:
https://aka.ms/dotnet-download
```
* If you're using .NET 6.0, you should download and install Runtime 6.0.13 or SDK 6.0.113 (for Visual Studio 2022 v17.1) from https://dotnet.microsoft.com/download/dotnet-core/6.0.
.NET 6.0 and and .NET 7.0 updates are also available from Microsoft Update. To access this either type "Check for updates" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates.
Once you have installed the updated runtime or SDK, restart your apps for the update to take effect.
Additionally, if you've deployed [self-contained applications](https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd) targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed.
## Other Information
### Reporting Security Issues
If you have found a potential security issue in .NET 6.0 or .NET 7.0, please email details to [email protected]. Reports may qualify for the Microsoft .NET Core & .NET 5 Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at <https://aka.ms/corebounty>.
### Support
You can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime and https://github.com/dotnet/aspnet/. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue.
### Disclaimer
The information provided in this advisory is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
### External Links
[CVE-2023-21538]( https://www.cve.org/CVERecord?id=CVE-2023-21538)
### Revisions
V1.0 (January 10, 2023): Advisory published.
_Version 1.0_
_Last Updated 2023-01-10_
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.linux-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.13'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.linux-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.13'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.linux-musl-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.13'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.linux-musl-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.13'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.linux-musl-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.13'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.linux-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.13'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.osx-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.13'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.osx-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.13'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.13'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.13'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.13'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.13'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/dotnet/runtime/security/advisories/GHSA-8f7f-vqg5-jrv9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-21538'}, {'type': 'PACKAGE', 'url': 'https://github.com/dotnet/runtime'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/GV5QDWYJ4C26JB7RTI55Z4O76WSH4FMV/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/ZI27LYW5C4Z4644WYIQWOXBZL7WIP2X6/'}, {'type': 'WEB', 'url': 'https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21538'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-21538'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-10T22:43:38Z', 'nvd_published_at': '2023-01-10T22:15:00Z'}
|
1.4.0
|
GHSA-8fcj-gf77-47mg
|
2023-02-07T15:50:58Z
|
2023-01-25T19:40:26Z
| null |
['CVE-2022-43756']
|
Denial of service (DoS) when processing Git credentials
|
### Impact
A denial of services (DoS) vulnerability was discovered in Wrangler Git package affecting versions up to and including `v1.0.0`.
Specially crafted Git credentials can result in a denial of service (DoS) attack on an application that uses Wrangler due to the exhaustion of the available memory and CPU resources. This is caused by a lack of input validation of Git credentials before they are used, which may lead to a denial of service in some cases. This issue can be triggered when accessing both private and public Git repositories.
### Workarounds
A workaround is to sanitize input passed to the Git package to remove potential unsafe and ambiguous characters. Otherwise, the best course of action is to update to a patched Wrangler version.
### Patches
Patched versions include `v1.0.1` and later and the backported tags - `v0.7.4-security1`, `v0.8.5-security1` and `v0.8.11`.
### For more information
If you have any questions or comments about this advisory:
* Reach out to [SUSE Rancher Security team](https://github.com/rancher/rancher/security/policy) for security related inquiries.
* Open an issue in [Rancher](https://github.com/rancher/rancher/issues/new/choose) or [Wrangler](https://github.com/rancher/wrangler/issues/new) repository.
* Verify our [support matrix](https://www.suse.com/suse-rancher/support-matrix/all-supported-versions/) and [product support lifecycle](https://www.suse.com/lifecycle/).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/wrangler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.4-security1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.7.3'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/wrangler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8.0'}, {'fixed': '0.8.5-security1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.8.4'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/wrangler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.1'}]}], 'versions': ['1.0.0']}, {'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/wrangler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8.6'}, {'fixed': '0.8.11'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/rancher/wrangler/security/advisories/GHSA-8fcj-gf77-47mg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43756'}, {'type': 'WEB', 'url': 'https://github.com/rancher/wrangler/commit/341018c8fef3e12867c7cb2649bd2cecac75f287'}, {'type': 'WEB', 'url': 'https://bugzilla.suse.com/show_bug.cgi?id=1205296'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8fcj-gf77-47mg'}, {'type': 'WEB', 'url': 'https://github.com/rancher/rancher/security/policy'}, {'type': 'PACKAGE', 'url': 'https://github.com/rancher/wrangler'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1515'}]
|
{'cwe_ids': ['CWE-150', 'CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-25T19:40:26Z', 'nvd_published_at': '2023-02-07T13:15:00Z'}
|
1.4.0
|
GHSA-h8r9-467r-vjjf
|
2023-01-11T20:55:13Z
|
2023-01-05T03:30:37Z
| null |
['CVE-2023-0057']
|
pyLoad vulnerable to Improper Restriction of Rendered UI Layers or Frames
|
Improper Restriction of Rendered UI Layers or Frames in GitHub repository pyload/pyload prior to 0.5.0b3.dev33.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'pyload-ng'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0b3.dev33'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0057'}, {'type': 'WEB', 'url': 'https://github.com/pyload/pyload/commit/bd2a31b7de54570b919aa1581d486e6ee18c0f64'}, {'type': 'PACKAGE', 'url': 'https://github.com/pyload/pyload'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/12b64f91-d048-490c-94b0-37514b6d694d'}]
|
{'cwe_ids': ['CWE-1021'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T19:54:21Z', 'nvd_published_at': '2023-01-05T01:15:00Z'}
|
1.4.0
|
GHSA-46h7-vj7x-fxg2
|
2023-01-20T23:18:41Z
|
2023-01-20T23:18:41Z
| null |
['CVE-2023-22734']
|
Shopware has Improper Input Validation issue in newsletter subscription
|
### Impact
The newsletter double opt-in validation was not checked properly, and it was possible to skip the complete double opt in process.
### Patches
The problem has been fixed with 6.4.18.1
### Workarounds
For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. Or disable the newsletter registration completely.
### References
https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-01-2023?category=security-updates
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.18.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.18.0'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.18.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.18.0'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-46h7-vj7x-fxg2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22734'}, {'type': 'WEB', 'url': 'https://github.com/shopware/platform/commit/f5a95ee2bcf1e546878450963ef1d9886e59a620'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-01-2023?category=security-updates'}, {'type': 'PACKAGE', 'url': 'https://github.com/shopware/platform'}]
|
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T23:18:41Z', 'nvd_published_at': '2023-01-17T22:15:00Z'}
|
1.4.0
|
GHSA-j6gc-792m-qgm2
|
2023-08-18T21:10:40Z
|
2023-01-18T18:23:20Z
| null |
['CVE-2023-22796']
|
ReDoS based DoS vulnerability in Active Support's underscore
|
There is a possible regular expression based DoS vulnerability in Active Support. This vulnerability has been assigned the CVE identifier CVE-2023-22796.
Versions Affected: All Not affected: None Fixed Versions: 5.2.8.15 (Rails LTS, which is a paid service and not part of the rubygem), 6.1.7.1, 7.0.4.1
Impact
A specially crafted string passed to the underscore method can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability.
This affects String#underscore, ActiveSupport::Inflector.underscore, String#titleize, and any other methods using these.
All users running an affected release should either upgrade or use one of the workarounds immediately.
Releases
The FIXED releases are available at the normal locations.
Workarounds
There are no feasible workarounds for this issue.
Users on Ruby 3.2.0 or greater may be able to reduce the impact by configuring Regexp.timeout.
Patches
To aid users who aren’t able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset.
6-1-Avoid-regex-backtracking-in-Inflector.underscore.patch - Patch for 6.1 series
7-0-Avoid-regex-backtracking-in-Inflector.underscore.patch - Patch for 7.0 series
Please note that only the 7.0.Z and 6.1.Z series are supported at present, and 6.0.Z for severe vulnerabilities. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases.
|
[]
|
[{'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.1.7.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.4.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22796'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/2164d4f6a1bde74b911fe9ba3c8df1b5bf345bf8'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/a7cda7e6aa5334ab41b1f4b0f671be931be946ef'}, {'type': 'WEB', 'url': 'https://discuss.rubyonrails.org/t/cve-2023-22796-possible-redos-based-dos-vulnerability-in-active-supports-underscore/82116'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/releases/tag/v6.1.7.1'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/releases/tag/v7.0.4.1'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activesupport/CVE-2023-22796.yml'}, {'type': 'WEB', 'url': 'https://rubyonrails.org/2023/1/17/Rails-Versions-6-0-6-1-6-1-7-1-7-0-4-1-have-been-released'}]
|
{'cwe_ids': ['CWE-1333'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-01-18T18:23:20Z', 'nvd_published_at': '2023-02-09T20:15:00Z'}
|
1.4.0
|
GHSA-rc42-jghf-vr8f
|
2023-01-23T20:34:52Z
|
2023-01-14T15:30:25Z
| null |
['CVE-2022-1812']
|
Integer overflow in publify_core
|
Integer Overflow or Wraparound in GitHub repository publify/publify prior to 9.2.10 due to an unlimited length user name field.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'RubyGems', 'name': 'publify_core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.2.10'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1812'}, {'type': 'WEB', 'url': 'https://github.com/publify/publify/commit/29a5837c29620e33857d7a5afce01384e3f8e41a'}, {'type': 'PACKAGE', 'url': 'https://github.com/publify/publify_core'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/publify_core/CVE-2022-1812.yml'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/17d86a50-265c-4ec8-9592-0bd909ddc8f3'}]
|
{'cwe_ids': ['CWE-190'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-23T20:34:52Z', 'nvd_published_at': '2023-01-14T14:15:00Z'}
|
1.4.0
|
GHSA-3ppr-72x5-x67q
|
2023-01-27T01:03:33Z
|
2023-01-26T21:30:18Z
| null |
['CVE-2023-24441']
|
XML external entity vulnerability on agents in Jenkins MSTest Plugin
|
Jenkins MSTest Plugin 1.0.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
|
[]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jvnet.hudson.plugins:mstest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24441'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/mstest-plugin/releases/tag/mstest-1.0.1'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2292'}]
|
{'cwe_ids': ['CWE-776'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:03:33Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}
|
1.4.0
|
GHSA-798h-g4j5-5537
|
2023-01-19T16:38:30Z
|
2023-01-11T15:30:28Z
| null |
['CVE-2020-36649']
|
PapaParse Inefficient Regular Expression Complexity vulnerability
|
A vulnerability was found in mholt PapaParse up to 5.1.x. It has been classified as problematic. Affected is an unknown function of the file papaparse.js. The manipulation leads to inefficient regular expression complexity. Upgrading to version 5.2.0 is able to address this issue. The name of the patch is 235a12758cd77266d2e98fd715f53536b34ad621. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-218004.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'papaparse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36649'}, {'type': 'WEB', 'url': 'https://github.com/mholt/PapaParse/issues/777'}, {'type': 'WEB', 'url': 'https://github.com/mholt/PapaParse/pull/779'}, {'type': 'WEB', 'url': 'https://github.com/mholt/PapaParse/commit/235a12758cd77266d2e98fd715f53536b34ad621'}, {'type': 'PACKAGE', 'url': 'https://github.com/mholt/PapaParse'}, {'type': 'WEB', 'url': 'https://github.com/mholt/PapaParse/releases/tag/5.2.0'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.218004'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.218004'}]
|
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-12T20:51:49Z', 'nvd_published_at': '2023-01-11T15:15:00Z'}
|
1.4.0
|
GHSA-3g2g-rcm6-rrq2
|
2023-02-06T16:40:55Z
|
2023-01-26T21:30:18Z
| null |
['CVE-2023-24440']
|
Cleartext Transmission of Sensitive Information in Jenkins JIRA Pipeline Steps Plugin
|
Jenkins JIRA Pipeline Steps Plugin 2.0.165.v8846cf59f3db and earlier transmits the private key in plain text as part of the global Jenkins configuration form, potentially resulting in their exposure.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:jira-steps'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.165.v8846cf59f3db'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24440'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2774'}]
|
{'cwe_ids': ['CWE-319'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:19:05Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}
|
1.4.0
|
GHSA-ww43-mcvh-35p4
|
2023-01-12T23:43:48Z
|
2023-01-08T00:30:15Z
| null |
['CVE-2014-125029']
|
PaginationServiceProvider SQL Injection vulnerability
|
A vulnerability was found in ttskch PaginationServiceProvider up to 0.x. It has been declared as critical. This vulnerability affects unknown code of the file `demo/index.php` of the component demo. The manipulation of the argument sort/id leads to sql injection. Upgrading to version 1.0.0 can address this issue. The name of the patch is 619de478efce17ece1a3b913ab16e40651e1ea7b. It is recommended to upgrade the affected component. VDB-217150 is the identifier assigned to this vulnerability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'ttskch/pagination-service-provider'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-125029'}, {'type': 'WEB', 'url': 'https://github.com/ttskch/PaginationServiceProvider/commit/619de478efce17ece1a3b913ab16e40651e1ea7b'}, {'type': 'PACKAGE', 'url': 'https://github.com/ttskch/PaginationServiceProvider'}, {'type': 'WEB', 'url': 'https://github.com/ttskch/PaginationServiceProvider/releases/tag/1.0.0'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217150'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217150'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-12T23:43:48Z', 'nvd_published_at': '2023-01-07T22:15:00Z'}
|
1.4.0
|
GHSA-87rh-wc85-xqvc
|
2023-02-03T20:40:22Z
|
2023-01-26T21:30:18Z
| null |
['CVE-2023-24431']
|
Missing permission checks in Jenkins Orka Plugin allow enumerating credentials IDs
|
A missing permission check in Jenkins Orka by MacStadium Plugin 1.31 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:macstadium-orka'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.32'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24431'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2772%20(1)'}]
|
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:27:22Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}
|
1.4.0
|
GHSA-cp68-42pf-6627
|
2023-01-24T18:05:37Z
|
2023-01-16T03:30:25Z
| null |
['CVE-2023-0315']
|
Froxlor vulnerable to Command Injection
|
Command Injection in GitHub repository froxlor/froxlor prior to 2.0.8.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'froxlor/froxlor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.8'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0315'}, {'type': 'WEB', 'url': 'https://github.com/froxlor/froxlor/commit/090cfc26f2722ac3036cc7fd1861955bc36f065a'}, {'type': 'PACKAGE', 'url': 'https://github.com/Froxlor/Froxlor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ff4e177b-ba48-4913-bbfa-ab8ce0db5943'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/171108/Froxlor-2.0.6-Remote-Command-Execution.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/171729/Froxlor-2.0.3-Stable-Remote-Code-Execution.html'}]
|
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-18T18:24:58Z', 'nvd_published_at': '2023-01-16T01:15:00Z'}
|
1.4.0
|
GHSA-h2ph-9r76-37v5
|
2023-01-12T16:47:52Z
|
2023-01-07T06:30:19Z
| null |
['CVE-2023-0111']
|
usememos/memos vulnerable to stored Cross-site Scripting
|
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.10.0.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0111'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/46c13a4b7f675b92d297df6dabb4441f13c7cd9c'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/70da256c-977a-487e-8a6a-9ae22caedbe3'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T21:52:08Z', 'nvd_published_at': '2023-01-07T04:15:00Z'}
|
1.4.0
|
GHSA-4jrm-c32x-w4jf
|
2023-02-09T17:41:49Z
|
2023-01-10T21:50:00Z
| null |
['CVE-2023-0163']
|
convict vulnerable to Prototype Pollution
|
### Impact
* An attacker can inject attributes that are used in other components
* An attacker can override existing attributes with ones that have incompatible type, which may lead to a crash.
The main use case of Convict is for handling server-side configurations written by the admins owning the servers, and not random users. So it's unlikely that an admin would deliberately sabotage their own server. Still a situation can happen where an admin not knowledgeable about JavaScript could be tricked by an attacker into writing the malicious JavaScript code into some config files.
### Patches
The problem is patched in `[email protected]`. Users should upgrade to `[email protected]`.
### Workarounds
No way for users to fix or remediate the vulnerability without upgrading
### References
https://github.com/mozilla/node-convict/issues/410
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'convict'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.2.4'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/mozilla/node-convict/security/advisories/GHSA-4jrm-c32x-w4jf'}, {'type': 'WEB', 'url': 'https://github.com/mozilla/node-convict/commit/fb602fbe1e9f14f2e88ecb8179d0f76466d21ecb'}, {'type': 'PACKAGE', 'url': 'https://github.com/mozilla/node-convict'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-10T21:50:00Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-mjgw-f2c4-f8qj
|
2023-01-12T23:42:27Z
|
2023-01-08T12:30:24Z
| null |
['CVE-2021-4308']
|
WebPA SQL Injection vulnerability
|
A vulnerability was found in WebPA up to 3.1.1. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to sql injection. Upgrading to version 3.1.2 can to address this issue. The name of the patch is 8836c4f549181e885a68e0e7ca561fdbcbd04bf0. It is recommended to upgrade the affected component. The identifier VDB-217637 was assigned to this vulnerability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'webpa/webpa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4308'}, {'type': 'WEB', 'url': 'https://github.com/WebPA/WebPA/pull/87'}, {'type': 'WEB', 'url': 'https://github.com/WebPA/WebPA/commit/8836c4f549181e885a68e0e7ca561fdbcbd04bf0'}, {'type': 'PACKAGE', 'url': 'https://github.com/WebPA/WebPA'}, {'type': 'WEB', 'url': 'https://github.com/WebPA/WebPA/releases/tag/v3.1.2'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217637'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217637'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-12T23:42:27Z', 'nvd_published_at': '2023-01-08T10:15:00Z'}
|
1.4.0
|
GHSA-68hv-8926-j34c
|
2023-01-12T23:42:44Z
|
2023-01-06T15:30:45Z
| null |
['CVE-2015-10018']
|
DBRisinajumi d2files SQL Injection vulnerability
|
A vulnerability has been found in DBRisinajumi d2files and classified as critical. Affected by this vulnerability is the function `actionUpload/actionDownloadFile` of the file `controllers/D2filesController.php`. The manipulation leads to sql injection. Upgrading to version 1.0.0 can address this issue. The name of the patch is b5767f2ec9d0f3cbfda7f13c84740e2179c90574. It is recommended to upgrade the affected component. The identifier VDB-217561 was assigned to this vulnerability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'dbrisinajumi/d2files'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-10018'}, {'type': 'WEB', 'url': 'https://github.com/DBRisinajumi/d2files/commit/b5767f2ec9d0f3cbfda7f13c84740e2179c90574'}, {'type': 'PACKAGE', 'url': 'https://github.com/DBRisinajumi/d2files'}, {'type': 'WEB', 'url': 'https://github.com/DBRisinajumi/d2files/releases/tag/1.0.0'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217561'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217561'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-12T23:42:44Z', 'nvd_published_at': '2023-01-06T13:15:00Z'}
|
1.4.0
|
GHSA-vqqm-c9gx-773q
|
2023-02-07T21:14:09Z
|
2023-01-30T00:30:35Z
| null |
['CVE-2023-0565']
|
Froxlor contains Business Logic Errors
|
Business Logic Errors in GitHub repository froxlor/froxlor prior to 2.0.10.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'froxlor/froxlor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.10'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0565'}, {'type': 'WEB', 'url': 'https://github.com/froxlor/froxlor/commit/2feb8020941a82bfb4ac68890f6ced0e5b3c4a15'}, {'type': 'PACKAGE', 'url': 'https://github.com/Froxlor/Froxlor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/12d78294-1723-4450-a239-023952666102'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-01T01:38:25Z', 'nvd_published_at': '2023-01-29T22:15:00Z'}
|
1.4.0
|
GHSA-p84v-45xj-wwqj
|
2023-02-10T22:06:15Z
|
2023-01-18T18:23:34Z
| null |
['CVE-2023-22792']
|
ReDoS based DoS vulnerability in Action Dispatch
|
There is a possible regular expression based DoS vulnerability in Action Dispatch. This vulnerability has been assigned the CVE identifier CVE-2023-22792.
Versions Affected: >= 3.0.0 Not affected: < 3.0.0 Fixed Versions: 5.2.8.15 (Rails LTS), 6.1.7.1, 7.0.4.1
Impact
Specially crafted cookies, in combination with a specially crafted X_FORWARDED_HOST header can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately.
Releases
The FIXED releases are available at the normal locations.
Workarounds
We recommend that all users upgrade to one of the FIXED versions. In the meantime, users can mitigate this vulnerability by using a load balancer or other device to filter out malicious X_FORWARDED_HOST headers before they reach the application.
Patches
To aid users who aren’t able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset.
6-1-Use-string-split-instead-of-regex-for-domain-parts.patch - Patch for 6.1 series
7-0-Use-string-split-instead-of-regex-for-domain-parts.patch - Patch for 7.0 series
Please note that only the 7.0.Z and 6.1.Z series are supported at present, and 6.0.Z for severe vulnerabilities. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases.
https://rubyonrails.org/2023/1/17/Rails-Versions-6-0-6-1-6-1-7-1-7-0-4-1-have-been-released
|
[]
|
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '5.2.8.15'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.1.7.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.4.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22792'}, {'type': 'WEB', 'url': 'https://discuss.rubyonrails.org/t/cve-2023-22792-possible-redos-based-dos-vulnerability-in-action-dispatch/82115'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/releases/tag/v7.0.4.1'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2023-22792.yml'}, {'type': 'WEB', 'url': 'https://rubyonrails.org/2023/1/17/Rails-Versions-6-0-6-1-6-1-7-1-7-0-4-1-have-been-released'}]
|
{'cwe_ids': ['CWE-1333'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-01-18T18:23:34Z', 'nvd_published_at': '2023-02-09T20:15:00Z'}
|
1.4.0
|
GHSA-23c2-gwp5-pxw9
|
2023-09-18T20:31:36Z
|
2023-01-18T18:13:19Z
| null |
['CVE-2023-22799']
|
ReDoS based DoS vulnerability in GlobalID
|
There is a ReDoS based DoS vulnerability in the GlobalID gem. This vulnerability has been assigned the CVE identifier CVE-2023-22799.
Versions Affected: >= 0.2.1 Not affected: NOTAFFECTED Fixed Versions: 1.0.1
Impact
There is a possible DoS vulnerability in the model name parsing section of the GlobalID gem. Carefully crafted input can cause the regular expression engine to take an unexpected amount of time. All users running an affected release should either upgrade or use one of the workarounds immediately.
Releases
The FIXED releases are available at the normal locations.
Workarounds
There are no feasible workarounds for this issue.
Patches
To aid users who aren’t able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset.
1-0-model-name-redos.patch - Patch for 1.0 series
|
[]
|
[{'package': {'ecosystem': 'RubyGems', 'name': 'globalid'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.1'}, {'fixed': '1.0.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22799'}, {'type': 'WEB', 'url': 'https://github.com/rails/globalid/commit/4a75ecbfd73a8e92e32a1723b81a17e3136bd8fc'}, {'type': 'WEB', 'url': 'https://discuss.rubyonrails.org/t/cve-2023-22799-possible-redos-based-dos-vulnerability-in-globalid/82127'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/globalid'}, {'type': 'WEB', 'url': 'https://github.com/rails/globalid/releases/tag/v1.0.1'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/globalid/CVE-2023-22799.yml'}]
|
{'cwe_ids': ['CWE-1333'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-01-18T18:13:19Z', 'nvd_published_at': '2023-02-09T20:15:00Z'}
|
1.4.0
|
GHSA-ffxj-547x-5j7c
|
2023-02-03T20:29:55Z
|
2023-01-26T21:30:25Z
| null |
['CVE-2022-25882']
|
Directory Traversal in onnx
|
Versions of the package onnx before 1.13.0 are vulnerable to Directory Traversal as the external_data field of the tensor proto can have a path to the file which is outside the model current directory or user-provided directory, for example "../../../etc/passwd"
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'onnx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25882'}, {'type': 'WEB', 'url': 'https://github.com/onnx/onnx/issues/3991'}, {'type': 'WEB', 'url': 'https://github.com/onnx/onnx/pull/4400'}, {'type': 'WEB', 'url': 'https://github.com/onnx/onnx/commit/f369b0e859024095d721f1d1612da5a8fa38988d'}, {'type': 'WEB', 'url': 'https://gist.github.com/jnovikov/02a9aff9bf2188033e77bd91ff062856'}, {'type': 'PACKAGE', 'url': 'https://github.com/onnx/onnx'}, {'type': 'WEB', 'url': 'https://github.com/onnx/onnx/blob/96516aecd4c110b0ac57eba08ac236ebf7205728/onnx/checker.cc%23L129'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-PYTHON-ONNX-2395479'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:04:53Z', 'nvd_published_at': '2023-01-26T21:15:00Z'}
|
1.4.0
|
GHSA-fw3g-2h3j-qmm7
|
2023-01-28T01:17:44Z
|
2023-01-28T01:17:44Z
| null |
['CVE-2023-23627']
|
Improper neutralization of `noscript` element content may allow XSS in Sanitize
|
### Impact
Using carefully crafted input, an attacker may be able to sneak arbitrary HTML through Sanitize `>= 5.0.0, < 6.0.1` when Sanitize is configured with a custom allowlist that allows `noscript` elements. This could result in XSS (cross-site scripting) or other undesired behavior when that HTML is rendered in a browser.
Sanitize's default configs don't allow `noscript` elements and are not vulnerable. This issue only affects users who are using a custom config that adds `noscript` to the element allowlist.
### Patches
Sanitize `>= 6.0.1` always removes `noscript` elements and their contents, even when `noscript` is in the allowlist.
### Workarounds
Users who are unable to upgrade can prevent this issue by using one of Sanitize's default configs or by ensuring that their custom config does not include `noscript` in the element allowlist.
### Details
The root cause of this issue is that HTML parsing rules treat the contents of a `noscript` element differently depending on whether scripting is enabled in the user agent. Nokogiri (the HTML parser Sanitize uses) doesn't support scripting so it follows the "scripting disabled" rules, but a web browser with scripting enabled will follow the "scripting enabled" rules. This means that Sanitize can't reliably make the contents of a `noscript` element safe for scripting enabled browsers. The safest thing to do is to remove the element and its contents entirely, which is now what Sanitize does in version 6.0.1 and later.
### References
- [Release Notes](https://github.com/rgrove/sanitize/releases/tag/v6.0.1)
### Credit
Thanks to David Klein from [TU Braunschweig](https://www.tu-braunschweig.de/en/ias) (@leeN) for reporting this issue.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'RubyGems', 'name': 'sanitize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '6.0.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/rgrove/sanitize/security/advisories/GHSA-fw3g-2h3j-qmm7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23627'}, {'type': 'WEB', 'url': 'https://github.com/rgrove/sanitize/commit/ec14265e530dc3fe31ce2ef773594d3a97778d22'}, {'type': 'PACKAGE', 'url': 'https://github.com/rgrove/sanitize'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/sanitize/CVE-2023-23627.yml'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-28T01:17:44Z', 'nvd_published_at': '2023-01-28T00:15:00Z'}
|
1.4.0
|
GHSA-wg99-5vrx-j2gg
|
2023-01-11T23:01:28Z
|
2023-01-05T12:30:28Z
| null |
['CVE-2020-36640']
|
bonita-connector-webservice XML External Entity vulnerability
|
A vulnerability, which was classified as problematic, was found in bonitasoft bonita-connector-webservice up to 1.3.0. This affects the function `TransformerConfigurationException` of the file `src/main/java/org/bonitasoft/connectors/ws/SecureWSConnector.java`. The manipulation leads to xml external entity reference. Upgrading to version 1.3.1 can address this issue. The name of the patch is a12ad691c05af19e9061d7949b6b828ce48815d5. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217443.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.bonitasoft.connectors:bonita-connector-webservice'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36640'}, {'type': 'WEB', 'url': 'https://github.com/bonitasoft/bonita-connector-webservice/pull/17'}, {'type': 'WEB', 'url': 'https://github.com/bonitasoft/bonita-connector-webservice/commit/a12ad691c05af19e9061d7949b6b828ce48815d5'}, {'type': 'PACKAGE', 'url': 'https://github.com/bonitasoft/bonita-connector-webservice'}, {'type': 'WEB', 'url': 'https://github.com/bonitasoft/bonita-connector-webservice/releases/tag/1.3.1'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217443'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217443'}]
|
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T20:04:58Z', 'nvd_published_at': '2023-01-05T10:15:00Z'}
|
1.4.0
|
GHSA-c653-6hhg-9x92
|
2023-01-05T12:04:09Z
|
2023-01-05T12:04:09Z
| null |
['CVE-2023-22460']
|
go-ipld-prime/codec/json may panic if asked to encode bytes
|
`go-ipld-prime` is a series of Go interfaces for manipulating IPLD data and a Go module that contains the `go-ipld-prime/codec/json` codec.
### Impact
Encoding data which contains a `Bytes` kind Node will pass a `Bytes` token to the JSON encoder which will panic as it doesn't expect to receive `Bytes` tokens. Such an encoding should be treated as an error, as plain JSON should not be able to encode Bytes.
**This only impacts uses of the "json" codec, "dag-json" is not impacted.** Use of "json" as a decoder is not impacted.
### Patches
Fixed in v0.19.0.
### Workarounds
Prefer the "dag-json" codec which has the ability to [encode bytes](https://ipld.io/specs/codecs/dag-json/spec/#bytes).
### References
See fix in [#472](https://github.com/ipld/go-ipld-prime/pull/472)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ipld/go-ipld-prime'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.19.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/ipld/go-ipld-prime/security/advisories/GHSA-c653-6hhg-9x92'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22460'}, {'type': 'WEB', 'url': 'https://github.com/ipld/go-ipld-prime/pull/472'}, {'type': 'WEB', 'url': 'https://github.com/ipld/go-ipld-prime/commit/146d1c8529676fe9ee0604f014656af2395505fc'}, {'type': 'PACKAGE', 'url': 'https://github.com/ipld/go-ipld-prime'}, {'type': 'WEB', 'url': 'https://github.com/ipld/go-ipld-prime/releases/tag/v0.19.0'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1269'}]
|
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-05T12:04:09Z', 'nvd_published_at': '2023-01-04T15:15:00Z'}
|
1.4.0
|
GHSA-qrg7-hfx7-95c5
|
2023-02-08T22:37:02Z
|
2023-01-25T19:40:43Z
| null |
['CVE-2022-31249']
|
Command injection in Git package in Wrangler
|
### Impact
A command injection vulnerability was discovered in Wrangler's Git package affecting versions up to and including `v1.0.0`.
Wrangler's Git package uses the underlying Git binary present in the host OS or container image to execute Git operations. Specially crafted commands can be passed to Wrangler that will change their behavior and cause confusion when executed through Git, resulting in command injection in the underlying host.
### Workarounds
A workaround is to sanitize input passed to the Git package to remove potential unsafe and ambiguous characters. Otherwise, the best course of action is to update to a patched Wrangler version.
### Patches
Patched versions include `v1.0.1` and later and the backported tags - `v0.7.4-security1`, `v0.8.5-security1` and `v0.8.11`.
### For more information
If you have any questions or comments about this advisory:
* Reach out to [SUSE Rancher Security team](https://github.com/rancher/rancher/security/policy) for security related inquiries.
* Open an issue in [Rancher](https://github.com/rancher/rancher/issues/new/choose) or [Wrangler](https://github.com/rancher/wrangler/issues/new) repository.
* Verify our [support matrix](https://www.suse.com/suse-rancher/support-matrix/all-supported-versions/) and [product support lifecycle](https://www.suse.com/lifecycle/).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/wrangler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.4-security1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/wrangler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8.0'}, {'fixed': '0.8.5-security1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/wrangler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.1'}]}], 'versions': ['1.0.0']}, {'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/wrangler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8.6'}, {'fixed': '0.8.11'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/rancher/wrangler/security/advisories/GHSA-qrg7-hfx7-95c5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31249'}, {'type': 'WEB', 'url': 'https://github.com/rancher/wrangler/commit/12397eec50155cb2d24aa70bdf9e90c5f3b9a727'}, {'type': 'WEB', 'url': 'https://github.com/rancher/wrangler/commit/341018c8fef3e12867c7cb2649bd2cecac75f287'}, {'type': 'WEB', 'url': 'https://github.com/rancher/wrangler/commit/5a387e13e8d51e3340d9e5012a1951f0cca5fc90'}, {'type': 'WEB', 'url': 'https://github.com/rancher/wrangler/commit/8649ecc062204f28764fd80157a621cbae89c9cf'}, {'type': 'WEB', 'url': 'https://bugzilla.suse.com/show_bug.cgi?id=1200299'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qrg7-hfx7-95c5'}, {'type': 'PACKAGE', 'url': 'https://github.com/rancher/wrangler'}, {'type': 'WEB', 'url': 'https://github.com/rancher/wrangler/compare/v0.7.2...v0.7.4-security1'}, {'type': 'WEB', 'url': 'https://github.com/rancher/wrangler/compare/v0.8.4...v0.8.5-security1'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1519'}]
|
{'cwe_ids': ['CWE-77', 'CWE-78', 'CWE-88'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-25T19:40:43Z', 'nvd_published_at': '2023-02-07T13:15:00Z'}
|
1.4.0
|
GHSA-894c-rg7f-3c62
|
2023-01-24T23:28:21Z
|
2023-01-17T12:30:33Z
| null |
['CVE-2023-22298']
|
pgAdmin 4 Open Redirect vulnerability
|
Open redirect vulnerability in pgAdmin 4 versions prior to v6.14 allows a remote unauthenticated attacker to redirect a user to an arbitrary web site and conduct a phishing attack by having a user to access a specially crafted URL.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'pgadmin4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.14'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22298'}, {'type': 'WEB', 'url': 'https://github.com/pgadmin-org/pgadmin4/issues/5343'}, {'type': 'PACKAGE', 'url': 'https://github.com/pgadmin-org/pgadmin4'}, {'type': 'WEB', 'url': 'https://jvn.jp/en/jp/JVN03832974/index.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/VHY2B25YHIIFQ3G44TR7NNEST7FJGJPH/'}, {'type': 'WEB', 'url': 'https://www.pgadmin.org/'}]
|
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T23:17:38Z', 'nvd_published_at': '2023-01-17T10:15:00Z'}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.