schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
20
140
details
stringlengths
56
37.2k
severity
stringlengths
2
92
affected
stringlengths
88
7.07k
references
stringlengths
139
4.72k
database_specific
stringlengths
131
185
1.4.0
GHSA-j8wr-fwf2-vvr9
2023-02-03T20:29:29Z
2023-01-26T21:30:25Z
null
['CVE-2022-25908']
Command Injection in create-choo-electron
All versions of the package create-choo-electron are vulnerable to Command Injection via the devInstall function due to improper user-input sanitization.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'create-choo-electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25908'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-CREATECHOOELECTRON-3157953'}]
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:06:29Z', 'nvd_published_at': '2023-01-26T21:15:00Z'}
1.4.0
GHSA-r3gm-jwf4-xgv2
2023-01-27T01:27:59Z
2023-01-26T21:30:18Z
null
['CVE-2023-24437']
Cross-site request forgery vulnerability in Jenkins JIRA Pipeline Steps Plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins JIRA Pipeline Steps Plugin 2.0.165.v8846cf59f3db and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:jira-steps'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.165.v8846cf59f3db'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24437'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2786'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:27:59Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}
1.4.0
GHSA-8gcg-vwmw-rxj4
2023-01-23T18:52:11Z
2023-01-10T22:27:13Z
null
['CVE-2023-22488']
Flarum notifications can leak restricted content
Using the notifications feature, one can read restricted/private content and bypass access checks that would be in place for such content. The notification-sending component does not check that the subject of the notification can be seen by the receiver, and proceeds to send notifications through their different channels. The alerts do not leak data despite this as they are listed based on a visibility check, however, emails are still sent out. This means that, for extensions which restrict access to posts, any actor can bypass the restriction by subscribing to the discussion if the [*Subscriptions*](https://extiverse.com/extension/flarum/subscriptions) extension is enabled. ### Impact The attack allows the leaking of some posts in the forum database, including posts awaiting approval, posts in tags the user has no access to if they could subscribe to a discussion before it becomes private, and posts restricted by third-party extensions. Other leaks could also happen for different notification subjects if some features allowed to receive specific types of notifications for restricted content. All Flarum versions prior to v1.6.3 are affected. ### Patches The vulnerability has been fixed and published as flarum/core v1.6.3. All communities running Flarum should upgrade as soon as possible to v1.6.3 using: ``` composer update --prefer-dist --no-dev -a -W ``` You can then confirm you run the latest version using: ``` composer show flarum/core ``` ### Workarounds Disable the Flarum Subscriptions extension or disable email notifications altogether. **There is no other supported workaround for this issue for Flarum versions below 1.6.3.** ### For more information For any questions or comments on this vulnerability please visit https://discuss.flarum.org/ For support questions create a discussion at https://discuss.flarum.org/t/support. A reminder that if you ever become aware of a security issue in Flarum, please report it to us privately by emailing [[email protected]](mailto:[email protected]), and we will address it promptly.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'flarum/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/flarum/framework/security/advisories/GHSA-8gcg-vwmw-rxj4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22488'}, {'type': 'WEB', 'url': 'https://github.com/flarum/framework/commit/d0a2b95dca57d3dae9a0d77b610b1cb1d0b1766a'}, {'type': 'PACKAGE', 'url': 'https://github.com/flarum/framework'}, {'type': 'WEB', 'url': 'https://github.com/flarum/framework/releases/tag/v1.6.3'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-10T22:27:13Z', 'nvd_published_at': '2023-01-12T20:15:00Z'}
1.4.0
GHSA-7p8m-22h4-9pj7
2023-01-20T22:38:04Z
2023-01-20T22:38:04Z
null
['CVE-2022-23538']
scs-library-client may leak user credentials to third-party service via HTTP redirect
### Impact When the scs-library-client is used to pull a container image, with authentication, the HTTP Authorization header sent by the client to the library service may be incorrectly leaked to an S3 backing storage provider. This occurs in a specific flow, where the library service redirects the client to a backing S3 storage server, to perform a multi-part concurrent download. Depending on site configuration, the S3 service may be provided by a third party. An attacker with access to the S3 service may be able to extract user credentials, allowing them to impersonate the user. The vulnerable multi-part concurrent download flow, with redirect to S3, is only used when communicating with a Singularity Enterprise 1.x installation, or third party server implementing this flow. Interaction with Singularity Enterprise 2.x, and Singularity Container Services (cloud.sylabs.io), does not trigger the vulnerable flow. We encourage all users to update. Users who interact with a Singularity Enterprise 1.x installation, using a 3rd party S3 storage service, are advised to revoke and recreate their authentication tokens within Singularity Enterprise. ### Patches The security issue was identified after the integration of a bug-fix commit 68ac4ca into the previously released scs-library-client 1.3.4. This commit fixes the security issue in the 1.3 series. scs-library-client 1.4.2 contains a fix for the same vulnerability in the 1.4 series, as commit eebd7ca. ### Workarounds There is no workaround available at this time. As above, access to Singularity Enterprise 2.x, or Singularity Container Services (cloud.sylabs.io), does not trigger the vulnerable flow. ### References https://cwe.mitre.org/data/definitions/522.html
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/sylabs/scs-library-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.2'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/sylabs/scs-library-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/sylabs/scs-library-client/security/advisories/GHSA-7p8m-22h4-9pj7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23538'}, {'type': 'WEB', 'url': 'https://github.com/sylabs/scs-library-client/commit/68ac4cab5cda0afd8758ff5b5e2e57be6a22fcfa'}, {'type': 'WEB', 'url': 'https://github.com/sylabs/scs-library-client/commit/b5db2aacba6bf1231f42dd475cc32e6355ab47b2'}, {'type': 'WEB', 'url': 'https://github.com/sylabs/scs-library-client/commit/eebd7caaab310b1fa803e55b8fc1acd9dcd2d00c'}, {'type': 'PACKAGE', 'url': 'https://github.com/sylabs/scs-library-client'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1497'}]
{'cwe_ids': ['CWE-522', 'CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T22:38:04Z', 'nvd_published_at': '2023-01-17T21:15:00Z'}
1.4.0
GHSA-v3cg-7r9h-r2g6
2023-01-24T20:54:28Z
2023-01-24T20:54:28Z
null
['CVE-2023-23613']
Field-level security issue with .keyword fields in OpenSearch
### Advisory title: Field-level security issue with .keyword fields ### Affected versions: OpenSearch 1.0.0-1.3.7 and 2.0.0-2.4.1 ### Patched versions: OpenSearch 1.3.8 and 2.5.0 ### Impact: There is an issue in the implementation of field-level security (FLS) and field masking where rules written to explicitly exclude fields are not correctly applied for certain queries that rely on their auto-generated .keyword fields. This issue is only present for authenticated users with read access to the indexes containing the restricted fields. ### Workaround: FLS rules that use explicit exclusions can be written to grant explicit access instead. Policies authored in this way are not subject to this issue. ### Patches: OpenSearch versions 1.3.8 and 2.5.0 contain a fix for this issue. ### For more information: If you have any questions or comments about this advisory, please contact AWS/Amazon Security via our issue reporting page (https://aws.amazon.com/security/vulnerability-reporting/) or directly via email to [[email protected]](mailto:[email protected]). Please do not create a public GitHub issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.opensearch:opensearch-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.opensearch:opensearch-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.5.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/opensearch-project/security/security/advisories/GHSA-v3cg-7r9h-r2g6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23613'}, {'type': 'WEB', 'url': 'https://github.com/opensearch-project/OpenSearch/releases/tag/2.5.0'}, {'type': 'PACKAGE', 'url': 'https://github.com/opensearch-project/security'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-24T20:54:28Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}
1.4.0
GHSA-64wp-jh9p-5cg2
2023-01-23T22:17:31Z
2023-01-11T22:04:44Z
null
['CVE-2023-22493']
RSSHub SSRF vulnerability
## Summary RSSHub is vulnerable to Server-Side Request Forgery (SSRF) attacks. This vulnerability allows an attacker to send arbitrary HTTP requests from the server to other servers or resources on the network. ## Description An attacker can exploit this vulnerability by sending a request to the affected routes with a malicious URL. For example, if an attacker controls the `ATTACKER.HOST` domain, they can send a request to affected routes with the value set to `ATTACKER.HOST%2F%23`. The `%2F` and `%23` characters are URL-encoded versions of the forward-slash (`/`) and pound (`#`) characters, respectively. In this context, an attacker could use those characters to append the base URL (i.e. `https://${input}.defined.host`) to be modified to `https://ATTACKER.HOST/#.defined.host`. This will cause the server to send a request to the attacker-controlled domain, allowing the attacker to potentially gain access to sensitive information or perform further attacks on the server. ## Impact An attacker could use this vulnerability to send requests to internal or any other servers or resources on the network, potentially gain access to sensitive information that would not normally be accessible and amplifying the impact of the attack. ## Reference Fixing PR: https://github.com/DIYgod/RSSHub/pull/11588
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'rsshub'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0-master.a66cbcf'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/DIYgod/RSSHub/security/advisories/GHSA-64wp-jh9p-5cg2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22493'}, {'type': 'WEB', 'url': 'https://github.com/DIYgod/RSSHub/pull/11588'}, {'type': 'WEB', 'url': 'https://github.com/DIYgod/RSSHub/commit/a66cbcf6eebc700bf97ab097f404f16ab415506a'}, {'type': 'WEB', 'url': 'https://advisory.dw1.io/56'}, {'type': 'PACKAGE', 'url': 'https://github.com/DIYgod/RSSHub'}]
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-11T22:04:44Z', 'nvd_published_at': '2023-01-13T15:15:00Z'}
1.4.0
GHSA-8ph8-9q2j-c3rq
2023-01-12T23:41:46Z
2023-01-06T12:31:34Z
null
['CVE-2018-25066']
nodebatis SQL Injection vulnerability
A vulnerability was found in PeterMu nodebatis up to 2.1.x. It has been classified as critical. Affected is an unknown function. The manipulation leads to sql injection. Upgrading to version 2.2.0 can address this issue. The name of the patch is 6629ff5b7e3d62ad8319007a54589ec1f62c7c35. It is recommended to upgrade the affected component. VDB-217554 is the identifier assigned to this vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'nodebatis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25066'}, {'type': 'WEB', 'url': 'https://github.com/PeterMu/nodebatis/commit/6629ff5b7e3d62ad8319007a54589ec1f62c7c35'}, {'type': 'PACKAGE', 'url': 'https://github.com/PeterMu/nodebatis'}, {'type': 'WEB', 'url': 'https://github.com/PeterMu/nodebatis/releases/tag/v2.2.0'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217554'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217554'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-12T23:41:46Z', 'nvd_published_at': '2023-01-06T11:15:00Z'}
1.4.0
GHSA-3p73-mm7v-4f6m
2023-01-28T00:31:24Z
2023-01-27T00:55:11Z
null
['CVE-2023-23617']
DoS vulnerability in MaliciousCode filter
### Impact Infinite loop in malicious code filter in certain conditions. ### Workarounds None
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.4.22'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '20.0.0'}, {'fixed': '20.0.19'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/security/advisories/GHSA-3p73-mm7v-4f6m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23617'}, {'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/commit/494027785bdb7db53e60c11ef03c144b61cd3172'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenMage/magento-lts'}, {'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22'}, {'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19'}]
{'cwe_ids': ['CWE-835'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T00:55:11Z', 'nvd_published_at': '2023-01-28T00:15:00Z'}
1.4.0
GHSA-9h7x-9pmh-7gg8
2023-01-12T16:49:06Z
2023-01-07T06:30:19Z
null
['CVE-2023-0112']
usememos/memos vulnerable to stored Cross-site Scripting
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.10.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0112'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/46c13a4b7f675b92d297df6dabb4441f13c7cd9c'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ec2a29dc-79a3-44bd-a58b-15f676934af6'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T21:51:50Z', 'nvd_published_at': '2023-01-07T04:15:00Z'}
1.4.0
GHSA-chgc-rqjr-46gg
2023-01-25T02:56:08Z
2023-01-17T09:30:24Z
null
['CVE-2010-10008']
Cross Site Scripting in simplesamlphp-module-openidprovider
A vulnerability was found in simplesamlphp simplesamlphp-module-openidprovider up to 0.8.x. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file templates/trust.tpl.php. The manipulation of the argument StateID leads to cross site scripting. The attack can be launched remotely. Upgrading to version 0.9.0 is able to address this issue. The name of the patch is 8365d48c863cf06ccf1465cc0a161cefae29d69d. It is recommended to upgrade the affected component. The identifier VDB-218473 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'simplesamlphp/simplesamlphp-module-openidprovider'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-10008'}, {'type': 'WEB', 'url': 'https://github.com/simplesamlphp/simplesamlphp-module-openidprovider/commit/8365d48c863cf06ccf1465cc0a161cefae29d69d'}, {'type': 'PACKAGE', 'url': 'https://github.com/simplesamlphp/simplesamlphp-module-openidprovider'}, {'type': 'WEB', 'url': 'https://github.com/simplesamlphp/simplesamlphp-module-openidprovider/releases/tag/v0.9.0'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.218473'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.218473'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-25T02:56:08Z', 'nvd_published_at': '2023-01-17T08:15:00Z'}
1.4.0
GHSA-g298-59pg-93h7
2023-01-28T01:20:05Z
2023-01-19T18:30:19Z
null
['CVE-2023-0406']
Cross-Site Request Forgery in modoboa
Cross-Site Request Forgery (CSRF) in GitHub repository modoboa/modoboa prior to 2.0.4.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'modoboa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0406'}, {'type': 'WEB', 'url': 'https://github.com/modoboa/modoboa/commit/7f0573e917227686d2cc127be1364e2908740807'}, {'type': 'PACKAGE', 'url': 'https://github.com/modoboa/modoboa'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d7007f76-3dbc-48a7-a2fb-377040fe100c'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-28T01:20:05Z', 'nvd_published_at': '2023-01-19T18:15:00Z'}
1.4.0
GHSA-fpjc-cxr6-w6h8
2023-01-12T16:49:23Z
2023-01-07T06:30:19Z
null
['CVE-2023-0108']
usememos/memos vulnerable to stored Cross-site Scripting
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.10.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0108'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/46c13a4b7f675b92d297df6dabb4441f13c7cd9c'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/f66d33df-6588-4ab4-80a0-847451517944'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T21:53:46Z', 'nvd_published_at': '2023-01-07T04:15:00Z'}
1.4.0
GHSA-8xww-x3g3-6jcv
2023-05-16T15:48:14Z
2023-01-18T18:20:51Z
null
['CVE-2023-22795']
ReDoS based DoS vulnerability in Action Dispatch
There is a possible regular expression based DoS vulnerability in Action Dispatch related to the If-None-Match header. This vulnerability has been assigned the CVE identifier CVE-2023-22795. Versions Affected: All Not affected: None Fixed Versions: 5.2.8.15 (Rails LTS), 6.1.7.1, 7.0.4.1 Impact A specially crafted HTTP If-None-Match header can cause the regular expression engine to enter a state of catastrophic backtracking, when on a version of Ruby below 3.2.0. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately. Releases The FIXED releases are available at the normal locations. Workarounds We recommend that all users upgrade to one of the FIXED versions. In the meantime, users can mitigate this vulnerability by using a load balancer or other device to filter out malicious If-None-Match headers before they reach the application. Users on Ruby 3.2.0 or greater are not affected by this vulnerability. Patches To aid users who aren’t able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset. 6-1-Avoid-regex-backtracking-on-If-None-Match-header.patch - Patch for 6.1 series 7-0-Avoid-regex-backtracking-on-If-None-Match-header.patch - Patch for 7.0 series Please note that only the 7.0.Z and 6.1.Z series are supported at present, and 6.0.Z for severe vulnerabilities. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.1.7.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22795'}, {'type': 'WEB', 'url': 'https://discuss.rubyonrails.org/t/cve-2023-22795-possible-redos-based-dos-vulnerability-in-action-dispatch/82118'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/releases/tag/v7.0.4.1'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2023-22795.yml'}, {'type': 'WEB', 'url': 'https://rubyonrails.org/2023/1/17/Rails-Versions-6-0-6-1-6-1-7-1-7-0-4-1-have-been-released'}]
{'cwe_ids': ['CWE-1333'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-01-18T18:20:51Z', 'nvd_published_at': '2023-02-09T20:15:00Z'}
1.4.0
GHSA-g3j5-mpp2-2fqm
2023-01-26T19:53:12Z
2023-01-26T19:53:11Z
null
[]
symfont/process typosquatting malware spoofs symfony/process
In September 2021, security researchers discovered a malicious Composer package called `symfont/process`, a typosquat targeting users of `symfony/process`. The malicious package has since been removed from Packagist.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'symfont/process'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfont/process/2021-09-10.yaml'}, {'type': 'WEB', 'url': 'https://www.kernelmode.blog/typosquatting-malware-found-in-composer-repository/'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-26T19:53:11Z', 'nvd_published_at': None}
1.4.0
GHSA-79wq-g4v9-gfj4
2023-01-20T23:36:16Z
2023-01-14T15:30:24Z
null
['CVE-2022-2815']
Publify Core does not strip metadata from images
Insecure Storage of Sensitive Information in GitHub repository publify/publify prior to 9.2.10.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'publify_core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.2.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2815'}, {'type': 'WEB', 'url': 'https://github.com/publify/publify/commit/af69097d349f4c00f244c51cd3c3e937fd3387cd'}, {'type': 'WEB', 'url': 'https://github.com/publify/publify_core/commit/33f897c12b6efdcdfd8cf9df924deba0f878b71e'}, {'type': 'PACKAGE', 'url': 'https://github.com/publify/publify'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/publify_core/CVE-2022-2815.yml'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/22fdcc39-8c1a-4e4c-8eae-be3fd764f8b4'}]
{'cwe_ids': ['CWE-922'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T23:36:16Z', 'nvd_published_at': '2023-01-14T14:15:00Z'}
1.4.0
GHSA-m4ch-rfv5-x5g3
2023-01-20T23:36:41Z
2023-01-20T23:36:41Z
null
[]
git2-rs fails to verify SSH keys by default
The git2 and libgit2-sys crates are Rust wrappers around the [libgit2](https://libgit2.org/) C library. It was discovered that libgit2 1.5.0 and below did not verify SSH host keys when establishing an SSH connection, exposing users of the library to Man-In-the-Middle attacks. The libgit2 team assigned [CVE-2023-22742](https://github.com/libgit2/libgit2/security/advisories/GHSA-8643-3wh5-rmjq) to this vulnerability. The following versions of the libgit2-sys Rust crate have been released: * libgit2-sys 0.14.2, updating the underlying libgit2 C library to version 1.5.1. * libgit2-sys 0.13.5, updating the underlying libgit2 C library to version 1.4.5. A new git2 crate version has also been released, 0.16.1. This version only bumps its libgit2-sys dependency to ensure no vulnerable libgit2-sys versions are used, but contains no code changes: if you update the libgit2-sys version there is no need to also update the git2 crate version. [You can learn more about this vulnerability in libgit2's advisory](https://github.com/libgit2/libgit2/security/advisories/GHSA-8643-3wh5-rmjq)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'libgit2-sys'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.14.0'}, {'fixed': '0.14.2'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'libgit2-sys'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.5'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'git2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.16.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/libgit2/libgit2/security/advisories/GHSA-8643-3wh5-rmjq'}, {'type': 'WEB', 'url': 'https://github.com/rust-lang/git2-rs/security/advisories/GHSA-m4ch-rfv5-x5g3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22742'}, {'type': 'WEB', 'url': 'https://github.com/rust-lang/git2-rs/commit/87934f87d36753ed702792ec063be7246444a8e1'}, {'type': 'PACKAGE', 'url': 'https://github.com/rust-lang/git2-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0003.html'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T23:36:41Z', 'nvd_published_at': None}
1.4.0
GHSA-6rrr-78xp-5jp8
2023-01-24T18:55:45Z
2023-01-11T18:27:48Z
null
['CVE-2023-22492']
Zitadel RefreshToken invalidation vulnerability
### Impact RefreshTokens is an OAuth 2.0 feature that allows applications to retrieve new access tokens and refresh the user's session without the need for interacting with a UI. RefreshTokens were not invalidated when a user was locked or deactivated. The deactivated or locked user was able to obtain a valid access token only through a refresh token grant. When the locked or deactivated user’s session was already terminated (“logged out”) then it was not possible to create a new session. Renewal of access token through a refresh token grant is limited to the configured amount of time (RefreshTokenExpiration). ### Patches 2.x versions are fixed on >= [2.17.3](https://github.com/zitadel/zitadel/releases/tag/v2.17.3) 2.16.x versions are fixed on >= [2.16.4](https://github.com/zitadel/zitadel/releases/tag/v2.16.4) ZITADEL recommends upgrading to the latest versions available in due course. ### Workarounds Ensure the RefreshTokenExpiration in the OIDC settings of your instance is set according to your security requirements. ### References https://zitadel.com/docs/guides/manage/console/instance-settings#oidc-token-lifetimes-and-expiration
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/zitadel/zitadel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.17.0'}, {'fixed': '2.17.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/zitadel/zitadel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.16.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/zitadel/zitadel/security/advisories/GHSA-6rrr-78xp-5jp8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22492'}, {'type': 'WEB', 'url': 'https://github.com/zitadel/zitadel/commit/301e22c4956ead6014a8179463c37263f7301a83'}, {'type': 'WEB', 'url': 'https://github.com/zitadel/zitadel/commit/fc892c52a10cd4ffdac395747494f3a93a7494c2'}, {'type': 'PACKAGE', 'url': 'https://github.com/zitadel/zitadel'}, {'type': 'WEB', 'url': 'https://github.com/zitadel/zitadel/releases/tag/v2.16.4'}, {'type': 'WEB', 'url': 'https://github.com/zitadel/zitadel/releases/tag/v2.17.3'}]
{'cwe_ids': ['CWE-613'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-11T18:27:48Z', 'nvd_published_at': '2023-01-11T20:15:00Z'}
1.4.0
GHSA-5v8v-gwmw-qw97
2023-01-24T18:06:35Z
2023-01-13T21:28:46Z
null
['CVE-2022-23532']
org.neo4j.procedure:apoc Path Traversal Vulnerability
### Impact A Path Traversal Vulnerability found in the apoc.export.* procedures of apoc plugins in Neo4j Graph database. The issue allows a malicious actor to potentially break out of the expected directory. The vulnerability is such that files could only be created but not overwritten. For the vulnerability to be exploited, an attacker would need access to execute an arbitrary query, either by having access to an authenticated Neo4j client, or a Cypher injection vulnerability in an application. The procedure would need to have been allow listed in the neo4j configuration as well as having the apoc config `apoc.export.file.enabled` set to true. On a UNIX based system the following query allows arbitrary write access to the tmp folder: CALL apoc.export.csv.query('RETURN 1', 'file:///..//..//..//..//tmp/test.txt', {}) ### Patches The users should aim to use the latest released version compatible with their Neo4j version. The minimum versions containing patch for this vulnerability are 4.4.0.12 and 4.3.0.12. ### Workarounds If you cannot upgrade the library, you can control the [allowlist of the ](https://neo4j.com/docs/operations-manual/current/reference/configuration-settings/#config_dbms.security.procedures.allowlist)procedures that can be used in your system, and/or turn off local file access by setting apoc.export.file.enabled=false ### For more information If you have any questions or comments about this advisory: * Open an issue in [neo4j-apoc-procedures](https://github.com/neo4j-contrib/neo4j-apoc-procedures) * Email us at [[email protected]](mailto:[email protected]) ### Credits We want to publicly recognise the contribution Adam Reziouk - Airbus.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.neo4j.procedure:apoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.0.12'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.neo4j.procedure:apoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0.0'}, {'fixed': '4.4.0.12'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/neo4j-contrib/neo4j-apoc-procedures/security/advisories/GHSA-5v8v-gwmw-qw97'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23532'}, {'type': 'WEB', 'url': 'https://github.com/neo4j-contrib/neo4j-apoc-procedures/commit/01e63ed2d187cd2a8aa1d78bf831ef0fdd69b522'}, {'type': 'PACKAGE', 'url': 'https://github.com/neo4j-contrib/neo4j-apoc-procedures'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-13T21:28:46Z', 'nvd_published_at': '2023-01-14T01:15:00Z'}
1.4.0
GHSA-7vcx-v65q-9wpg
2023-01-11T23:53:34Z
2023-01-11T23:53:34Z
null
[]
XML-RPC for PHP's `Wrapper::buildClientWrapperCode` method allows code injection via malicious `$client` argument
In order for this weakness to be exploited, the following conditions have to apply, at the same time: - method `Wrapper::buildClientWrapperCode`, or any methods which depend on it, such as `Wrapper::wrapXmlrpcServer`, `Wrapper::wrapXmlrpcMethod` or `Wrapper::buildWrapMethodSource` must be in use. Note that they are _not_ used by default in either the Client or Server classes provided by the library; the developer has to specifically make use of them in his/her own code - the `$client` argument to either of those methods should have been built with malicious data, ie. data controlled by a 3rd party, passed to its constructor call This is most likely an uncommon usage scenario, and as such the chances of exploitation may be low. *NB* the graphical debugger which is shipped as part of the library is vulnerable to this, when used with the option "Generate stub for method call" selected. In that case, the debugger will _display_ but not _execute_ the malicious code, which would have to be provided via carefully crafted values for the "Address" and "Path" inputs. The attack scenario in this case is that a developer copies into his/her own source code the php snippet generated by the debugger, in a situation where the debugger is used with "Address"/"Path" input values supplied by a 3rd party. The malicious payload in the "Address"/"Path" input values should be easily recognized as suspicious by any barely proficient developer, as it resembles a bog-standard injection attack. It goes without saying that a responsible developer should not blindly copy and paste into his/her own code anything generated by a 3rd party tool, such as the phpxmlrpc debugger, without giving it at least a cursory scan. Originally reported as issue #80
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpxmlrpc/phpxmlrpc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.9.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/gggeek/phpxmlrpc/security/advisories/GHSA-7vcx-v65q-9wpg'}, {'type': 'WEB', 'url': 'https://github.com/gggeek/phpxmlrpc/issues/80'}, {'type': 'WEB', 'url': 'https://github.com/gggeek/phpxmlrpc/commit/cf6e605e09d001ce520bfa8e7b168cfa514e663b'}, {'type': 'PACKAGE', 'url': 'https://github.com/gggeek/phpxmlrpc'}]
{'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-11T23:53:34Z', 'nvd_published_at': None}
1.4.0
GHSA-h857-2g56-468g
2023-01-05T12:18:35Z
2023-01-05T12:18:35Z
null
['CVE-2023-22461']
@mattkrick/sanitize-svg vulnerable to Cross-Site Scripting (XSS)
### Impact The *sanitize-svg* package uses a deny-list-pattern to sanitize SVGs to prevent cross-site scripting (XSS). In doing so, literal `<script>`-tags and on-event handlers were detected: ```typescript [...] const svgEl = div.firstElementChild! const attributes = Array.from(svgEl.attributes).map(({ name }) => name) const hasScriptAttr = !!attributes.find((attr) => attr.startsWith('on')) const scripts = svgEl.getElementsByTagName('script') return scripts.length === 0 && !hasScriptAttr ? svg : null [...] ``` There are more ways to embed JavaScript in XML files. **Anchor Tag** (requires user to click link): ```xml <svg viewBox="0 0 100 100" xmlns="http://www.w3.org/2000/svg"> <a href="javascript:alert(document.domain)"> <text x="50" y="50" text-anchor="middle">Lauritz</text> </a> </svg> ``` **Foreign Object Tag** (no user interaction required): ```xml <svg width="500" height="500" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink"> <text x="20" y="35">Lauritz</text> <foreignObject width="500" height="500"> <iframe xmlns="http://www.w3.org/1999/xhtml" src="javascript:confirm(document.domain);" width="400" height="250"/> </foreignObject> </svg> ``` As a result, downstream software that relies on `sanitize-svg` and expects resulting SVGs to be safe, may be vulnerable to XSS. We are aware of at least one downstream project for which this vulnerability had security implications. ### Patches This vulnerability was addressed in v0.4.0. ### Workarounds N/A
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@mattkrick/sanitize-svg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.3.1'}}]
[{'type': 'WEB', 'url': 'https://github.com/mattkrick/sanitize-svg/security/advisories/GHSA-h857-2g56-468g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22461'}, {'type': 'WEB', 'url': 'https://github.com/mattkrick/sanitize-svg/commit/b107e453ede7b58adcccae74a3e474c012eec85d'}, {'type': 'PACKAGE', 'url': 'https://github.com/mattkrick/sanitize-svg'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-05T12:18:35Z', 'nvd_published_at': '2023-01-04T15:15:00Z'}
1.4.0
GHSA-9mq4-9556-6qxq
2023-02-07T23:23:31Z
2023-01-29T00:30:34Z
null
['CVE-2021-4315']
NYUCCL psiTurk IS vulnerable to Improper Neutralization of Special Elements
A vulnerability has been found in NYUCCL psiTurk up to 3.2.0 and classified as critical. This vulnerability affects unknown code of the file psiturk/experiment.py. The manipulation of the argument mode leads to improper neutralization of special elements used in a template engine. The exploit has been disclosed to the public and may be used. Upgrading to version 3.2.1 is able to address this issue. The name of the patch is 47787e15cecd66f2aa87687bf852ae0194a4335f. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-219676.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'psiTurk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4315'}, {'type': 'WEB', 'url': 'https://github.com/NYUCCL/psiTurk/pull/517'}, {'type': 'WEB', 'url': 'https://github.com/NYUCCL/psiTurk/commit/47787e15cecd66f2aa87687bf852ae0194a4335f'}, {'type': 'PACKAGE', 'url': 'https://github.com/NYUCCL/psiTurk'}, {'type': 'WEB', 'url': 'https://github.com/NYUCCL/psiTurk/releases/tag/v3.2.1'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.219676'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.219676'}]
{'cwe_ids': ['CWE-1336', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-31T22:53:23Z', 'nvd_published_at': '2023-01-28T23:15:00Z'}
1.4.0
GHSA-xgv7-pqqh-h2w9
2023-01-24T16:38:33Z
2023-01-19T17:51:27Z
null
['CVE-2009-4123']
jruby-openssl gem for JRuby fails to do proper certificate validation
A security problem involving peer certificate verification was found where failed verification silently did nothing, making affected applications vulnerable to attackers. Attackers could lead a client application to believe that a secure connection to a rogue SSL server is legitimate. Attackers could also penetrate client-validated SSL server applications with a dummy certificate.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'jruby-openssl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6'}]}]}]
[{'type': 'PACKAGE', 'url': 'https://github.com/jruby/jruby-openssl/'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jruby-openssl/CVE-2009-4123.yml'}, {'type': 'WEB', 'url': 'http://jruby.org/2009/12/07/vulnerability-in-jruby-openssl'}]
{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-19T17:51:27Z', 'nvd_published_at': None}
1.4.0
GHSA-vjhf-8vqx-vqpq
2023-01-06T17:37:58Z
2023-01-06T17:37:58Z
null
['CVE-2023-22463']
KubePi allows malicious actor to login with a forged JWT token via Hardcoded Jwtsigkeys
### Summary The jwt authentication function of kubepi <= v1.6.2 uses hard-coded Jwtsigkeys, resulting in the same Jwtsigkeys for all online projects. This means that an attacker can forge any jwt token to take over the administrator account of any online project. ### Details [`session.go`](https://github.com/KubeOperator/KubePi/blob/da784f5532ea2495b92708cacb32703bff3a45a3/internal/api/v1/session/session.go#L35), the use of hard-coded JwtSigKey allows an attacker to use this value to forge jwt tokens arbitrarily. The JwtSigKey is confidential and should not be hard-coded in the code. ```golang var JwtSigKey = []byte("signature_hmac_secret_shared_key") var jwtMaxAge = 10 * time.Minute type Handler struct { userService user.Service roleService role.Service clusterService cluster.Service rolebindingService rolebinding.Service ldapService ldap.Service jwtSigner *jwt.Signer } ``` ### Affected Version <= v1.6.2 ### Patches The vulnerability has been fixed in [v1.6.3](https://github.com/KubeOperator/KubePi/releases/tag/v1.6.3). https://github.com/KubeOperator/KubePi/commit/3be58b8df5bc05d2343c30371dd5fcf6a9fbbf8b : JWT key can be specified in app.yml, if leave it blank a random key will be used. ### Workarounds It is recommended to upgrade the version to [v1.6.3](https://github.com/KubeOperator/KubePi/releases/tag/v1.6.3). ### For more information If you have any questions or comments about this advisory, please [open an issue](https://github.com/KubeOperator/KubePi/issues).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/KubeOperator/kubepi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.6.2'}}]
[{'type': 'WEB', 'url': 'https://github.com/KubeOperator/KubePi/security/advisories/GHSA-vjhf-8vqx-vqpq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22463'}, {'type': 'WEB', 'url': 'https://github.com/KubeOperator/KubePi/commit/3be58b8df5bc05d2343c30371dd5fcf6a9fbbf8b'}, {'type': 'PACKAGE', 'url': 'https://github.com/KubeOperator/KubePi'}, {'type': 'WEB', 'url': 'https://github.com/KubeOperator/KubePi/blob/da784f5532ea2495b92708cacb32703bff3a45a3/internal/api/v1/session/session.go#L35'}, {'type': 'WEB', 'url': 'https://github.com/KubeOperator/KubePi/releases/tag/v1.6.3'}]
{'cwe_ids': ['CWE-798'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-06T17:37:58Z', 'nvd_published_at': '2023-01-04T16:15:00Z'}
1.4.0
GHSA-65f5-mfpf-vfhj
2023-06-23T19:40:01Z
2023-01-18T18:19:33Z
null
['CVE-2022-44570']
Denial of service via header parsing in Rack
There is a possible denial of service vulnerability in the Range header parsing component of Rack. This vulnerability has been assigned the CVE identifier CVE-2022-44570. Versions Affected: >= 1.5.0 Not affected: None. Fixed Versions: 2.0.9.2, 2.1.4.2, 2.2.6.2, 3.0.0.1 Impact Carefully crafted input can cause the Range header parsing component in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. Any applications that deal with Range requests (such as streaming applications, or applications that serve files) may be impacted. Releases The fixed releases are available at the normal locations. Workarounds There are no feasible workarounds for this issue. Patches To aid users who aren’t able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset. 2-0-Fix-ReDoS-in-Rack-Utils.get_byte_ranges.patch - Patch for 2.0 series 2-1-Fix-ReDoS-in-Rack-Utils.get_byte_ranges.patch - Patch for 2.1 series 2-2-Fix-ReDoS-in-Rack-Utils.get_byte_ranges.patch - Patch for 2.2 series 3-0-Fix-ReDoS-in-Rack-Utils.get_byte_ranges.patch - Patch for 3.0 series
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '2.0.9.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0.0'}, {'fixed': '2.1.4.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0.0'}, {'fixed': '2.2.6.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0.0'}, {'fixed': '3.0.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-44570'}, {'type': 'WEB', 'url': 'https://discuss.rubyonrails.org/t/cve-2022-44570-possible-denial-of-service-vulnerability-in-racks-range-header-parsing/82125'}, {'type': 'PACKAGE', 'url': 'https://github.com/rack/rack'}, {'type': 'WEB', 'url': 'https://github.com/rack/rack/releases/tag/v3.0.4.1'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2022-44570.yml'}]
{'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-18T18:19:33Z', 'nvd_published_at': '2023-02-09T20:15:00Z'}
1.4.0
GHSA-4jqw-vfmj-9rmh
2023-02-21T20:04:34Z
2023-01-26T21:30:29Z
null
['CVE-2021-36686']
Cross-site Scripting in yapi-vendor
Cross Site Scripting (XSS) vulnerability in yapi 1.9.1 allows attackers to execute arbitrary code via the /interface/api edit page.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'yapi-vendor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.9.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36686'}, {'type': 'WEB', 'url': 'https://github.com/YMFE/yapi/issues/2190'}, {'type': 'WEB', 'url': 'https://github.com/YMFE/yapi/issues/2240'}, {'type': 'PACKAGE', 'url': 'https://github.com/YMFE/yapi'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:04:11Z', 'nvd_published_at': '2023-01-26T21:15:00Z'}
1.4.0
GHSA-x2h8-4mhh-5hwh
2023-01-24T18:06:00Z
2023-01-16T00:30:24Z
null
['CVE-2023-0313']
phpMyFAQ Stored Cross-site Scripting vulnerability
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.10.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0313'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/1123c0872314fa68d7d0d8136939f62270fb4b7b'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpmyfaq'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/bc27e84b-1f91-4e1b-a78c-944edeba8256'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T22:01:39Z', 'nvd_published_at': '2023-01-15T22:15:00Z'}
1.4.0
GHSA-93pm-5p5f-3ghx
2023-02-10T00:20:39Z
2023-01-18T18:24:40Z
null
['CVE-2022-44571']
Denial of Service Vulnerability in Rack Content-Disposition parsing
There is a denial of service vulnerability in the Content-Disposition parsing component of Rack. This vulnerability has been assigned the CVE identifier CVE-2022-44571. Versions Affected: >= 2.0.0 Not affected: None. Fixed Versions: 2.0.9.2, 2.1.4.2, 2.2.6.1, 3.0.0.1 Impact Carefully crafted input can cause Content-Disposition header parsing in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. This header is used typically used in multipart parsing. Any applications that parse multipart posts using Rack (virtually all Rails applications) are impacted. Releases The fixed releases are available at the normal locations. Workarounds There are no feasible workarounds for this issue. Patches To aid users who aren’t able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset. 2-0-Fix-ReDoS-vulnerability-in-multipart-parser - Patch for 2.0 series 2-1-Fix-ReDoS-vulnerability-in-multipart-parser - Patch for 2.1 series 2-2-Fix-ReDoS-vulnerability-in-multipart-parser - Patch for 2.2 series 3-0-Fix-ReDoS-vulnerability-in-multipart-parser - Patch for 3.0 series
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.9.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.4.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.6.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0.0'}, {'fixed': '3.0.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-44571'}, {'type': 'WEB', 'url': 'https://discuss.rubyonrails.org/t/cve-2022-44571-possible-denial-of-service-vulnerability-in-rack-content-disposition-parsing/82126'}, {'type': 'PACKAGE', 'url': 'https://github.com/rack/rack'}, {'type': 'WEB', 'url': 'https://github.com/rack/rack/releases/tag/v3.0.4.1'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2022-44571.yml'}]
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-01-18T18:24:40Z', 'nvd_published_at': '2023-02-09T20:15:00Z'}
1.4.0
GHSA-5pm2-9mr2-3frq
2023-04-13T17:39:27Z
2023-01-18T00:30:16Z
null
['CVE-2023-21893']
Component takeover in Oracle Data Provider for .NET
Vulnerability in the Oracle Data Provider for .NET component of Oracle Database Server. Supported versions that are affected are 19c and 21c. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TCPS to compromise Oracle Data Provider for .NET. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Oracle Data Provider for .NET. Note: Applies also to Database client-only on Windows platform. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H). See the readme.txt files inside the `.nupkg` packages for a reference to the fix.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Oracle.ManagedDataAccess'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '21.0.0'}, {'fixed': '21.9.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Oracle.ManagedDataAccess.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.21.0'}, {'fixed': '3.21.90'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Oracle.ManagedDataAccess'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '19.0.0'}, {'fixed': '19.18.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Oracle.ManagedDataAccess.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.19.0'}, {'fixed': '2.19.180'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-21893'}, {'type': 'WEB', 'url': 'https://www.nuget.org/packages/Oracle.ManagedDataAccess.Core/3.21.90'}, {'type': 'WEB', 'url': 'https://www.nuget.org/packages/Oracle.ManagedDataAccess/21.9.0'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2023.html'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-12T23:07:14Z', 'nvd_published_at': '2023-01-18T00:15:00Z'}
1.4.0
GHSA-j9q2-f9q7-jhgq
2023-01-20T23:22:09Z
2023-01-20T23:22:09Z
null
[]
CakePHP SecurityComponent cross form submission issue
Prior to versions 2.4.8 and 1.3.18, forms secured by SecurityComponent could be submitted to any action without triggering SecurityComponent’s tampering protection. If an application contained multiple POST forms to manipulate the same models, it could be vulnerable to mass assignment issues.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.4.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.18'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/cakephp/cakephp/commit/f23d811ff59c50ef278e98bb75f4ec1e7e54a5b3'}, {'type': 'WEB', 'url': 'https://bakery.cakephp.org/2014/04/29/CakePHP-1-3-18-and-2-4-8-released.html'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/cakephp/cakephp/2014-04-29.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/cakephp/cakephp'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T23:22:09Z', 'nvd_published_at': None}
1.4.0
GHSA-c732-xvv8-g94c
2023-02-01T09:17:22Z
2023-01-21T15:30:18Z
null
['CVE-2023-22884']
Command Injection in Apache Airflow and Apache Airflow MySQL Provider
Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Apache Software Foundation Apache Airflow, Apache Software Foundation Apache Airflow MySQL Provider.This issue affects Apache Airflow: before 2.5.1; Apache Airflow MySQL Provider: before 4.0.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow-providers-mysql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22884'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/28811'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/0l0j3nt0t7fzrcjl2ch0jgj6c58kxs5h'}]
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-23T20:42:27Z', 'nvd_published_at': '2023-01-21T14:15:00Z'}
1.4.0
GHSA-4p88-cfhq-f3vg
2023-01-23T18:50:41Z
2023-01-16T00:30:25Z
null
['CVE-2023-0307']
phpMyFAQ has Weak Password Requirements
Weak Password Requirements in GitHub repository thorsten/phpmyfaq prior to 3.1.10
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0307'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/8beed2fca5b0b82c6ba866d0ffd286d0c1fbf596'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpmyfaq'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/fac01e9f-e3e5-4985-94ad-59a76485f215'}]
{'cwe_ids': ['CWE-521'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T22:46:36Z', 'nvd_published_at': '2023-01-15T22:15:00Z'}
1.4.0
GHSA-6m7c-45ff-3328
2023-01-10T22:28:54Z
2023-01-03T09:30:25Z
null
['CVE-2015-10012']
FrameworkUserBundle Generates Error Message Containing Sensitive Information
A vulnerability was found in sumocoders FrameworkUserBundle up to 1.3.x. It has been rated as problematic. Affected by this issue is some unknown functionality of the file Resources/views/Security/login.html.twig. The manipulation leads to information exposure through error message. Upgrading to version 1.4.0 can address this issue. The name of the patch is abe4993390ba9bd7821ab12678270556645f94c8. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217268. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'sumocoders/framework-user-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-10012'}, {'type': 'WEB', 'url': 'https://github.com/sumocoders/FrameworkUserBundle/commit/abe4993390ba9bd7821ab12678270556645f94c8'}, {'type': 'PACKAGE', 'url': 'https://github.com/sumocoders/FrameworkUserBundle'}, {'type': 'WEB', 'url': 'https://github.com/sumocoders/FrameworkUserBundle/releases/tag/v1.4.0'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217268'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217268'}]
{'cwe_ids': ['CWE-209'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-10T22:28:54Z', 'nvd_published_at': '2023-01-03T09:15:00Z'}
1.4.0
GHSA-jqh6-9574-5x22
2023-02-28T20:40:27Z
2023-01-23T22:05:28Z
null
['CVE-2023-24057']
MITM based Zip Slip in `ca.uhn.hapi.fhir:org.hl7.fhir.core`
### Impact MITM can enable Zip-Slip. ### Vulnerability #### Vulnerability 1: `Scanner.java` There is no validation that the zip file being unpacked has entries that are not maliciously writing outside of the intended destination directory. https://github.com/hapifhir/org.hl7.fhir.core/blob/8c43e21094af971303131efd081503e5a112db4b/org.hl7.fhir.validation/src/main/java/org/hl7/fhir/validation/Scanner.java#L335-L357 This zip archive is downloaded over HTTP instead of HTTPS, leaving it vulnerable to compromise in-flight. https://github.com/hapifhir/org.hl7.fhir.core/blob/8c43e21094af971303131efd081503e5a112db4b/org.hl7.fhir.validation/src/main/java/org/hl7/fhir/validation/Scanner.java#L136 ##### Vulnerability 2: `TerminologyCacheManager.java` **Note:** While these links point to only one implementation, both implementations of `TerminologyCacheManager.java` are vulnerable to this as their code seems to be duplicated. - https://github.com/hapifhir/org.hl7.fhir.core/blob/f58b7acfb5e393cac52cc5bbb170bdb669c2880e/org.hl7.fhir.r5/src/main/java/org/hl7/fhir/r5/terminologies/TerminologyCacheManager.java - https://github.com/hapifhir/org.hl7.fhir.core/blob/f58b7acfb5e393cac52cc5bbb170bdb669c2880e/org.hl7.fhir.r4b/src/main/java/org/hl7/fhir/r4b/terminologies/TerminologyCacheManager.java While there is validation in this bit of logic that attempts to validate that the zip file doesn't contain malicious entries that escape the destination directory, the guard is insufficient. https://github.com/hapifhir/org.hl7.fhir.core/blob/f58b7acfb5e393cac52cc5bbb170bdb669c2880e/org.hl7.fhir.r5/src/main/java/org/hl7/fhir/r5/terminologies/TerminologyCacheManager.java#L97-L113 This is because the `Utilities.path(String... path)` method does not normalize the path, although it seems to be attempting to do so. https://github.com/hapifhir/org.hl7.fhir.core/blob/f58b7acfb5e393cac52cc5bbb170bdb669c2880e/org.hl7.fhir.utilities/src/main/java/org/hl7/fhir/utilities/Utilities.java#L617-L675 The normalization only occurs if the path element starts with a path traversal payload. As an example, calling `Utilities.path("/base", "/child/../test")` will return the string `"/base/child/../test"`. This guard logic can, thus, be easily bypassed: https://github.com/hapifhir/org.hl7.fhir.core/blob/f58b7acfb5e393cac52cc5bbb170bdb669c2880e/org.hl7.fhir.r5/src/main/java/org/hl7/fhir/r5/terminologies/TerminologyCacheManager.java#L100-L104 Assuming an attacker can control the return value of `ze.getName()`, they can supply a value like `/anything/../../../../zipsip-protection-bypass.txt`. Similarly, an attacker can control the contents of the Zip file via a MITM attack as this logic is used with resources not downloaded over HTTPS. https://github.com/hapifhir/org.hl7.fhir.core/blob/f58b7acfb5e393cac52cc5bbb170bdb669c2880e/org.hl7.fhir.r5/src/main/java/org/hl7/fhir/r5/terminologies/TerminologyCacheManager.java#L66-L73 ### Patches Unknown ### Workarounds Unknown ### References - https://snyk.io/research/zip-slip-vulnerability
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'ca.uhn.hapi.fhir:org.hl7.fhir.core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.92'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'ca.uhn.hapi.fhir:org.hl7.fhir.convertors'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.92'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'ca.uhn.hapi.fhir:org.hl7.fhir.r4b'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.92'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'ca.uhn.hapi.fhir:org.hl7.fhir.r5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.92'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'ca.uhn.hapi.fhir:org.hl7.fhir.utilities'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.92'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'ca.uhn.hapi.fhir:org.hl7.fhir.validation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.92'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/HL7/fhir-ig-publisher/security/advisories/GHSA-xr8x-pxm6-prjg'}, {'type': 'WEB', 'url': 'https://github.com/hapifhir/org.hl7.fhir.core/security/advisories/GHSA-jqh6-9574-5x22'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24057'}, {'type': 'WEB', 'url': 'https://github.com/hapifhir/org.hl7.fhir.core/commit/b50aec59124416b7315a49220cfc3999223414cc'}, {'type': 'PACKAGE', 'url': 'https://github.com/hapifhir/org.hl7.fhir.core'}]
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-23T22:05:28Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}
1.4.0
GHSA-f259-h6m8-hm8m
2023-01-12T16:49:52Z
2023-01-06T06:30:25Z
null
['CVE-2022-25923']
exec-local-bin vulnerable to Command Injection
Versions of the package exec-local-bin before 1.2.0 are vulnerable to Command Injection via the `theProcess()` functionality due to improper user-input sanitization.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'exec-local-bin'}, 'ecosystem_specific': {'affected_functions': ['exec-local-bin']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25923'}, {'type': 'WEB', 'url': 'https://github.com/saeedseyfi/exec-local-bin/commit/d425866375c85038133a6f79db2aac66c0a72624'}, {'type': 'PACKAGE', 'url': 'https://github.com/saeedseyfi/exec-local-bin'}, {'type': 'WEB', 'url': 'https://github.com/saeedseyfi/exec-local-bin/blob/92db00bde9d6e2d83410849f898df12f075b73b0/index.js%23L9'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-EXECLOCALBIN-3157956'}]
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T20:11:57Z', 'nvd_published_at': '2023-01-06T05:15:00Z'}
1.4.0
GHSA-xrh7-m5pp-39r6
2023-02-08T22:37:39Z
2023-01-31T22:39:40Z
null
['CVE-2023-23630']
XSS Attack with Express API
### Impact XSS attack - anyone using the Express API is impacted ### Patches The problem has been resolved. Users should upgrade to version 2.0.0. ### Workarounds Don't pass user supplied data directly to `res.renderFile`. ### References _Are there any links users can visit to find out more?_ See https://github.com/eta-dev/eta/releases/tag/v2.0.0
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'eta'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/eta-dev/eta/security/advisories/GHSA-xrh7-m5pp-39r6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23630'}, {'type': 'WEB', 'url': 'https://github.com/eta-dev/eta/commit/5651392462ee0ff19d77c8481081a99e5b9138dd'}, {'type': 'PACKAGE', 'url': 'https://github.com/eta-dev/eta'}, {'type': 'WEB', 'url': 'https://github.com/eta-dev/eta/releases/tag/v2.0.0'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-31T22:39:40Z', 'nvd_published_at': '2023-02-01T01:15:00Z'}
1.4.0
GHSA-88p8-4vv5-82j7
2023-01-26T23:51:40Z
2023-01-26T23:51:40Z
null
['CVE-2015-2179']
xaviershay-dm-rails Gem for Ruby exposes sensitive information via the process table
xaviershay-dm-rails Gem for Ruby contains a flaw in the `execute()` function in `/datamapper/dm-rails/blob/master/lib/dm-rails/storage.rb`. The issue is due to the function exposing sensitive information via the process table. This may allow a local attack to gain access to MySQL credential information.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'xaviershay-dm-rails'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-2179'}, {'type': 'PACKAGE', 'url': 'https://github.com/datamapper/dm-rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/xaviershay-dm-rails/CVE-2015-2179.yml'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-26T23:51:40Z', 'nvd_published_at': None}
1.4.0
GHSA-h632-p764-pjqm
2023-02-07T04:10:00Z
2023-01-27T00:56:58Z
null
['CVE-2021-41231']
DataFlow upload remote code execution vulnerability
### Impact An administrator with the permissions to upload files via DataFlow and to create products was able to execute arbitrary code via the convert profile.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.4.22'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '20.0.0'}, {'fixed': '20.0.19'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/security/advisories/GHSA-h632-p764-pjqm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41231'}, {'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/commit/d16fc6c5a1e66c6f0d9f82020f11702a7ddd78e4'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenMage/magento-lts'}, {'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22'}, {'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19'}]
{'cwe_ids': ['CWE-434', 'CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T00:56:58Z', 'nvd_published_at': '2023-01-27T19:15:00Z'}
1.4.0
GHSA-jm3m-wr3p-hjrq
2023-02-02T17:16:19Z
2023-01-27T00:30:18Z
null
['CVE-2023-0519']
Cross-site Scripting in modoboa
Cross-site Scripting (XSS) - Stored in GitHub repository modoboa/modoboa prior to 2.0.4.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'modoboa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0519'}, {'type': 'WEB', 'url': 'https://github.com/modoboa/modoboa/commit/eef9ab72b5305578a3ad7a7463bd284aa645e98b'}, {'type': 'PACKAGE', 'url': 'https://github.com/modoboa/modoboa'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/891ad0cb-d12f-4c5e-aac8-d7326caf2129'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:05:12Z', 'nvd_published_at': '2023-01-26T23:15:00Z'}
1.4.0
GHSA-7rrj-xr53-82p7
2023-01-06T21:40:58Z
2023-01-06T21:40:58Z
null
['CVE-2023-22466']
Tokio reject_remote_clients configuration may get dropped when creating a Windows named pipe
### Impact When configuring a Windows named pipe server, setting `pipe_mode` will reset `reject_remote_clients` to `false`. If the application has previously configured `reject_remote_clients` to `true`, this effectively undoes the configuration. This also applies if `reject_remote_clients` is not explicitly set as this is the default configuration and is cleared by calling `pipe_mode`. Remote clients may only access the named pipe if the named pipe's associated path is accessible via a publically shared folder (SMB). ### Patches The following versions have been patched: * 1.23.1 * 1.20.3 * 1.18.4 The fix will also be present in all releases starting from version 1.24.0. Named pipes were introduced to Tokio in version 1.7.0, so releases older than 1.7.0 are not affected. ### Workarounds Ensure that `pipe_mode` is set **first** after initializing a `ServerOptions`. For example: ```rust let mut opts = ServerOptions::new(); opts.pipe_mode(PipeMode::Message); opts.reject_remote_clients(true); ``` ### References https://learn.microsoft.com/en-us/windows/win32/api/winbase/nf-winbase-createnamedpipea#pipe_reject_remote_clients
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'tokio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.18.4'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'tokio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.19.0'}, {'fixed': '1.20.3'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'tokio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.21.0'}, {'fixed': '1.23.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/tokio-rs/tokio/security/advisories/GHSA-7rrj-xr53-82p7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22466'}, {'type': 'WEB', 'url': 'https://github.com/tokio-rs/tokio/pull/5336'}, {'type': 'PACKAGE', 'url': 'https://github.com/tokio-rs/tokio'}, {'type': 'WEB', 'url': 'https://github.com/tokio-rs/tokio/releases/tag/tokio-1.23.1'}, {'type': 'WEB', 'url': 'https://learn.microsoft.com/en-us/windows/win32/api/winbase/nf-winbase-createnamedpipea#pipe_reject_remote_clients'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0001.html'}]
{'cwe_ids': ['CWE-665'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-06T21:40:58Z', 'nvd_published_at': '2023-01-04T22:15:00Z'}
1.4.0
GHSA-fhg7-m89q-25r3
2023-06-21T18:10:46Z
2023-01-24T15:36:32Z
null
['CVE-2022-25927']
ReDoS Vulnerability in ua-parser-js version
### Description: A regular expression denial of service (ReDoS) vulnerability has been discovered in `ua-parser-js`. ### Impact: This vulnerability bypass the library's `MAX_LENGTH` input limit prevention. By crafting a very-very-long user-agent string with specific pattern, an attacker can turn the script to get stuck processing for a very long time which results in a denial of service (DoS) condition. ### Affected Versions: All versions of the library prior to version `0.7.33` / `1.0.33`. ### Patches: A patch has been released to remove the vulnerable regular expression, update to version `0.7.33` / `1.0.33` or later. ### References: [Regular expression Denial of Service - ReDoS](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS) ### Credits: Thanks to @Snyk who first reported the issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'ua-parser-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.33'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ua-parser-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8.0'}, {'fixed': '1.0.33'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/faisalman/ua-parser-js/security/advisories/GHSA-fhg7-m89q-25r3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25927'}, {'type': 'WEB', 'url': 'https://github.com/faisalman/ua-parser-js/commit/a6140a17dd0300a35cfc9cff999545f267889411'}, {'type': 'PACKAGE', 'url': 'https://github.com/faisalman/ua-parser-js'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-UAPARSERJS-3244450'}]
{'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-24T15:36:32Z', 'nvd_published_at': '2023-01-26T21:15:00Z'}
1.4.0
GHSA-58h4-9m7m-j9m4
2023-01-31T01:47:43Z
2023-01-09T20:06:02Z
null
['CVE-2022-3145']
@okta/oidc-middlewareOpen Redirect vulnerability
An open redirect vulnerability exists in Okta OIDC Middleware prior to version 5.0.0 allowing an attacker to redirect a user to an arbitrary URL. **Affected products and versions** Okta OIDC Middleware prior to version 5.0.0. **Resolution** The vulnerability is fixed in OIDC Middleware 5.0.0. To remediate this vulnerability, upgrade Okta OIDC Middleware to this version or later. **CVE details** **CVE ID:** [CVE-2022-3145](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-3145) **Published Date:** 01/05/2023 **Vulnerability Type:** Open Redirect **CWE:** CWE-601 **CVSS v3.1 Score:** 4.3 **Severity:** Medium **Vector string:** AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N **Severity Details** To exploit this issue, an attacker would need to send a victim a malformed URL containing a target server that they control. Once a user successfully completed the login process, the victim user would then be redirected to the attacker controlled site. **References** https://github.com/okta/okta-oidc-middleware
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@okta/oidc-middleware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/okta/okta-oidc-middleware/security/advisories/GHSA-58h4-9m7m-j9m4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3145'}, {'type': 'WEB', 'url': 'https://github.com/okta/okta-oidc-middleware/commit/5d10b3ccdd5d6893de4d8b58696094267d30c113'}, {'type': 'PACKAGE', 'url': 'https://github.com/okta/okta-oidc-middleware'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T20:06:02Z', 'nvd_published_at': '2023-01-12T19:15:00Z'}
1.4.0
GHSA-6p4m-hw2h-6gmw
2023-01-25T19:39:03Z
2023-01-25T19:39:03Z
null
['CVE-2023-22736']
Controller reconciles apps outside configured namespaces when sharding is enabled
### Impact All Argo CD versions starting with 2.5.0-rc1 are vulnerable to an authorization bypass bug which allows a malicious Argo CD user to deploy Applications outside the configured allowed namespaces. #### Description of exploit Reconciled Application namespaces are specified as a comma-delimited list of glob patterns. When sharding is enabled on the Application controller, it does not enforce that list of patterns when reconciling Applications. For example, if Application namespaces are configured to be `argocd-*`, the Application controller may reconcile an Application installed in a namespace called `other`, even though it does not start with `argocd-`. Reconciliation of the out-of-bounds Application is only triggered when the Application is updated, so the attacker must be able to cause an update operation on the Application resource. #### Limitations This bug only applies to users who have explicitly enabled the "apps-in-any-namespace" feature by setting `application.namespaces` in the argocd-cmd-params-cm ConfigMap or otherwise setting the `--application-namespaces` flags on the Application controller and API server components. The apps-in-any-namespace feature is in beta as of this Security Advisory's publish date. The bug is also limited to Argo CD instances where sharding is enabled by increasing the `replicas` count for the Application controller. Finally, the AppProjects' `sourceNamespaces` field acts as a secondary check against this exploit. To cause reconciliation of an Application in an out-of-bounds namespace, an AppProject must be available which permits Applications in the out-of-bounds namespace. ### Patches A patch for this vulnerability has been released in the following Argo CD versions: * v2.5.8 * v2.6.0-rc5 ### Workarounds Running only one replica of the Application controller will prevent exploitation of this bug. Making sure all AppProjects' `sourceNamespaces` are restricted within the confines of the configured Application namespaces will also prevent exploitation of this bug. ### Credits Thanks to ChangZhuo Chen (@czchen) for finding the issue and for contributing the fix! ### References * [Documentation for apps-in-any-namespace](https://argo-cd--10678.org.readthedocs.build/en/10678/operator-manual/app-any-namespace/) ### For more information * Open an issue in [the Argo CD issue tracker](https://github.com/argoproj/argo-cd/issues) or [discussions](https://github.com/argoproj/argo-cd/discussions) * Join us on [Slack](https://argoproj.github.io/community/join-slack) in channel #argo-cd
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0-rc1'}, {'fixed': '2.5.8'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0-rc4'}, {'fixed': '2.6.0-rc5'}]}], 'versions': ['2.6.0-rc4']}]
[{'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/security/advisories/GHSA-6p4m-hw2h-6gmw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22736'}, {'type': 'PACKAGE', 'url': 'https://github.com/argoproj/argo-cd'}]
{'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-25T19:39:03Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}
1.4.0
GHSA-w9mr-4mfr-499f
2023-01-11T23:00:55Z
2023-01-05T12:30:27Z
null
['CVE-2017-20162']
Vercel ms Inefficient Regular Expression Complexity vulnerability
A vulnerability, which was classified as problematic, has been found in vercel ms up to 1.x. This issue affects the function parse of the file index.js. The manipulation of the argument str leads to inefficient regular expression complexity. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.0.0 is able to address this issue. The name of the patch is caae2988ba2a37765d055c4eee63d383320ee662. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217451.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'ms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-20162'}, {'type': 'WEB', 'url': 'https://github.com/vercel/ms/pull/89'}, {'type': 'WEB', 'url': 'https://github.com/vercel/ms/commit/caae2988ba2a37765d055c4eee63d383320ee662'}, {'type': 'PACKAGE', 'url': 'https://github.com/vercel/ms'}, {'type': 'WEB', 'url': 'https://github.com/vercel/ms/releases/tag/2.0.0'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217451'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217451'}]
{'cwe_ids': ['CWE-1333'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-10T21:45:33Z', 'nvd_published_at': '2023-01-05T12:15:00Z'}
1.4.0
GHSA-v9gj-5rgp-w33r
2023-01-20T23:06:48Z
2023-01-19T09:30:16Z
null
['CVE-2023-0398']
Modoboa is vulnerable to Cross-Site Request Forgery
Modoboa 2.0.3 and prior is vulnerable to Cross-Site Request Forgery. A patch is available and anticipated to be part of version 2.0.4.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'modoboa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0398'}, {'type': 'WEB', 'url': 'https://github.com/modoboa/modoboa/commit/8e14ac93669df4f35fcdebd55dc9d2f0fed3ed48'}, {'type': 'PACKAGE', 'url': 'https://github.com/modoboa/modoboa'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0a852351-00ed-44d2-a650-9055b7beed58'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T23:06:48Z', 'nvd_published_at': '2023-01-19T09:15:00Z'}
1.4.0
GHSA-m589-mv4q-p7rj
2023-01-23T18:49:42Z
2023-01-13T21:30:26Z
null
['CVE-2022-45299']
webbrowser-rs allows attackers to access arbitrary files via supplying a crafted URL
An issue in the IpFile argument of rust-lang webbrowser-rs v0.8.2 allows attackers to access arbitrary files via supplying a crafted URL.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'webbrowser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45299'}, {'type': 'WEB', 'url': 'https://github.com/amodm/webbrowser-rs/commit/431b5139e274b7e456bea27e768aaa121b97be4c'}, {'type': 'PACKAGE', 'url': 'https://github.com/amodm/webbrowser-rs'}, {'type': 'WEB', 'url': 'https://github.com/amodm/webbrowser-rs/releases/tag/v0.8.3'}, {'type': 'WEB', 'url': 'https://github.com/offalltn/CVE-2022-45299'}]
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-14T05:18:53Z', 'nvd_published_at': '2023-01-13T21:15:00Z'}
1.4.0
GHSA-685j-36qx-3vp2
2023-02-06T16:43:39Z
2023-01-26T21:30:18Z
null
['CVE-2023-24428']
Cross-site request forgery vulnerability in Jenkins Bitbucket OAuth Plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins Bitbucket OAuth Plugin 0.12 and earlier allows attackers to trick users into logging in to the attacker's account.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:bitbucket-oauth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24428'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/bitbucket-oauth-plugin/commit/a927a8ff2e069afebb97f33f6798033ef4451e4f'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/bitbucket-oauth-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2981'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:08:12Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}
1.4.0
GHSA-h6p3-p4vx-wr8q
2023-01-11T23:47:24Z
2023-01-11T23:47:24Z
null
[]
dompurify vulnerable to Cross-site Scripting
dompurify prior to version 2.2.3 is vulnerable to a cross-site scripting problem caused by nested headlines.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'dompurify'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.3'}]}]}]
[{'type': 'PACKAGE', 'url': 'https://github.com/cure53/DOMPurify'}, {'type': 'WEB', 'url': 'https://github.com/cure53/DOMPurify/releases/tag/2.2.3'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-DOMPURIFY-2863266'}, {'type': 'WEB', 'url': 'https://www.vidocsecurity.com/blog/hacking-swagger-ui-from-xss-to-account-takeovers/'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-11T23:47:24Z', 'nvd_published_at': None}
1.4.0
GHSA-r3c9-9j5q-pwv4
2023-02-07T21:54:06Z
2023-01-26T19:51:48Z
null
['CVE-2021-21395']
magento-lts Reset Password not protected against well-timed CSRF
### Impact Password reset form is vulnerable to CSRF between time reset password link is clicked and user submits new password. ### Patches PR forthcoming ### Workarounds None
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.4.22'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '20.0.0'}, {'fixed': '20.0.19'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/security/advisories/GHSA-r3c9-9j5q-pwv4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21395'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1086752'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenMage/magento-lts'}, {'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/releases/tag/v19.4.22'}, {'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/releases/tag/v20.0.19'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/openmage/magento-lts'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-26T19:51:48Z', 'nvd_published_at': '2023-01-27T16:15:00Z'}
1.4.0
GHSA-2phw-rgr7-5pvh
2023-01-13T21:05:41Z
2023-01-09T09:30:25Z
null
['CVE-2010-10004']
Information Cards Module vulnerable to Cross-site Scripting
A vulnerability was found in Information Cards Module and classified as problematic. This issue affects some unknown processing. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 1.0 is able to address this issue. The name of the patch is f6bfea49ae16dc6e179df8306d39c3694f1ef186. It is recommended to upgrade the affected component. The identifier VDB-217661 was assigned to this vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'simplesamlphp/simplesamlphp-module-infocard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-10004'}, {'type': 'WEB', 'url': 'https://github.com/simplesamlphp/simplesamlphp-module-infocard/commit/f6bfea49ae16dc6e179df8306d39c3694f1ef186'}, {'type': 'PACKAGE', 'url': 'https://github.com/simplesamlphp/simplesamlphp-module-infocard'}, {'type': 'WEB', 'url': 'https://github.com/simplesamlphp/simplesamlphp-module-infocard/releases/tag/v1.0'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217661'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217661'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-13T21:05:41Z', 'nvd_published_at': '2023-01-09T08:15:00Z'}
1.4.0
GHSA-5465-xc2j-6p84
2023-02-08T21:36:10Z
2023-01-26T21:30:20Z
null
['CVE-2023-0229']
github.com/openshift/apiserver-library-go Improper Input Validation vulnerability
A flaw was found in github.com/openshift/apiserver-library-go, used in OpenShift 4.12 and 4.11, that contains an issue that can allow low-privileged users to set the seccomp profile for pods they control to "unconfined." By default, the seccomp profile used in the restricted-v2 Security Context Constraint (SCC) is "runtime/default," allowing users to disable seccomp for pods they can create and modify.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/openshift/apiserver-library-go'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20230120221150-cefee9e0162b'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0229'}, {'type': 'WEB', 'url': 'https://github.com/openshift/apiserver-library-go/pull/97'}, {'type': 'WEB', 'url': 'https://github.com/openshift/apiserver-library-go/commit/30f75d79e424ca462c6de53ee8b93f91183763e6'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2160349'}, {'type': 'PACKAGE', 'url': 'github.com/openshift/apiserver-library-go'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T21:36:10Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}
1.4.0
GHSA-5qq4-m6c3-xxmf
2023-01-30T18:17:38Z
2023-01-26T21:30:28Z
null
['CVE-2022-21192']
Directory Traversal vulnerability in serve-lite
All versions of the package serve-lite are vulnerable to Directory Traversal due to missing input sanitization or other checks and protections employed to the req.url passed as-is to path.join().
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'serve-lite'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21192'}, {'type': 'WEB', 'url': 'https://gist.github.com/lirantal/9ccdfda0edcb95e36d07a04b0b6c2db0'}, {'type': 'PACKAGE', 'url': 'https://github.com/beenotung/serve-lite'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-SERVELITE-3149916'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-30T18:17:38Z', 'nvd_published_at': '2023-01-26T21:15:00Z'}
1.4.0
GHSA-g25r-gvq3-wrq7
2023-02-07T15:49:33Z
2023-01-25T19:36:09Z
null
['CVE-2022-21953']
Authenticated user can gain unauthorized shell pod and kubectl access in the local cluster
### Impact An issue was discovered in Rancher where an authorization logic flaw allows an authenticated user on any downstream cluster to (1) open a shell pod in the Rancher `local` cluster and (2) have limited `kubectl` access to it. The expected behavior is that a user does not have such access in the Rancher `local` cluster unless explicitly granted. This issue does not allow the user to escalate privileges in the `local` cluster directly (this would require another vulnerability to be exploited). The security issue happens in two different ways: 1. Shell pod access - This is when a user opens a shell pod in the Rancher UI to a downstream cluster that the user has permission to access. The web request can be intercepted using the browser's web inspector/network console or a proxy tool to change the shell's destination to the Rancher `local` cluster instead of the desired downstream cluster. - This flaw cannot be exploited to access a downstream cluster that the user has no permissions to. - The shell pod runs with a limited non-root user, reducing the severity of this issue. However, even as a non-root user, it is still possible download and run binaries inside the shell pod. - The blast radius of this issue can increase based on the configuration of the `local` cluster. For example: - If the `local` cluster has unlimited network access, e.g. to the Internet, the user can open a reverse network connection to the shell pod. - Or access the cloud metadata API of the underlying cloud infrastructure, where the user can extract the credentials associated with the `local` cluster and use them to interact with the cloud environment (this will be limited by the permissions granted to the cloud credentials in question). - Check further recommendations about liming access to the cloud metadata API in Rancher's [security best practices](https://ranchermanager.docs.rancher.com/reference-guides/rancher-security/kubernetes-security-best-practices). 2. Kubectl access - When downloading the kubeconfig file of a downstream cluster that the user has access to, the `server` cluster address in the kubeconfig file can be changed to point to the Rancher `local` cluster instead of the intended downstream cluster. - This can also be achieved by crafting a kubeconfig using a Rancher token instead of using the kubeconfig from an active cluster. - This flaw cannot be exploited to access a downstream cluster that the user has no permissions to. Notes: - Rancher `local` cluster means the cluster where Rancher is installed. It is named as `local` inside the list of clusters in the Rancher UI. - Audit logs in Rancher can be used to identify possible abuses of this issue, by tracking API requests to the user ID of the user that performed the action. API audit logs can be enabled as described in the [documentation](https://ranchermanager.docs.rancher.com/how-to-guides/advanced-user-guides/enable-api-audit-log) when set to level `1` or above. ### Workarounds There is no workaround or direct mitigation besides updating to a patched Rancher version. ### Patches Patched versions include releases 2.5.17, 2.6.10, 2.7.1 and later versions. ### For more information If you have any questions or comments about this advisory: * Reach out to [SUSE Rancher Security team](https://github.com/rancher/rancher/security/policy) for security related inquiries. * Open an issue in [Rancher](https://github.com/rancher/rancher/issues/new/choose) repository. * Verify our [support matrix](https://www.suse.com/suse-rancher/support-matrix/all-supported-versions/) and [product support lifecycle](https://www.suse.com/lifecycle/).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.17'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.10'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/rancher/rancher/security/advisories/GHSA-g25r-gvq3-wrq7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21953'}, {'type': 'WEB', 'url': 'https://bugzilla.suse.com/show_bug.cgi?id=1199731'}, {'type': 'PACKAGE', 'url': 'https://github.com/rancher/rancher'}]
{'cwe_ids': ['CWE-284', 'CWE-285', 'CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-25T19:36:09Z', 'nvd_published_at': '2023-02-07T13:15:00Z'}
1.4.0
GHSA-j94p-hv25-rm5g
2023-01-03T12:28:06Z
2023-01-03T12:28:06Z
null
['CVE-2022-47551']
Apiman has potential permissions bypass
### Impact Incorrect default permissions for certain read-only resources in the Apiman 1.5.7.Final through 2.2.3.Final in the Apiman Manager REST API allows a remote authenticated attacker to access information and resources in an Apiman Organizations they are not a member of and/or do not have permissions for. For example, an attacker may be able to craft an HTTP request to discover APIs that are private to organizations they are not members of, via fuzzing, search, and other similar mechanisms. If the attacker has sufficient permissions in their own organization, they may also be able to sign up to the private APIs they have discovered by crafting a tailored HTTP request, thereby gaining access to an API Management protected resource that they should have access to. * A malicious account-holder may be able to see information about APIs they do not have permission for. * A malicious account-holder may be able to sign up to APIs they do not have permission for, and hence access API Management-protected resources they are not authorized to access. * This does NOT relate to the Apiman Gateway. ### Patches * Upgrade to Apiman 3.0.0.Final (or later). The issue is fixed in this version. * If you are using an older version of Apiman, contact to your [Apiman support provider](https://www.apiman.io/support.html) for advice/long-term support. ### References * https://www.apiman.io/blog/permissions-bypass-disclosure/ * https://github.com/advisories/GHSA-54r5-wr8x-x5v3 * https://nvd.nist.gov/vuln/detail/CVE-2022-47551 * https://github.com/orgs/apiman/discussions/2409
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.apiman:apiman-manager-api-rest-impl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.7'}, {'fixed': '3.0.0.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.3.Final'}}]
[{'type': 'WEB', 'url': 'https://github.com/apiman/apiman/security/advisories/GHSA-j94p-hv25-rm5g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-47551'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-54r5-wr8x-x5v3'}, {'type': 'PACKAGE', 'url': 'https://github.com/apiman/apiman'}, {'type': 'WEB', 'url': 'https://github.com/orgs/apiman/discussions/2409'}, {'type': 'WEB', 'url': 'https://www.apiman.io/blog/permissions-bypass-disclosure/'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-03T12:28:06Z', 'nvd_published_at': None}
1.4.0
GHSA-2x48-p6cq-5xcw
2023-01-31T01:59:08Z
2023-01-23T06:30:20Z
null
['CVE-2022-46959']
Path Traversal in github.com/go-sonic/sonic
An issue in the component /admin/backups/work-dir of Sonic v1.0.4 allows attackers to execute a directory traversal.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/go-sonic/sonic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46959'}, {'type': 'WEB', 'url': 'https://github.com/go-sonic/sonic/issues/56'}, {'type': 'WEB', 'url': 'https://github.com/go-sonic/sonic/pull/61/commits/3b00266a13fa69284f4b3f4b37d29be8f8e02f31'}, {'type': 'PACKAGE', 'url': 'https://github.com/go-sonic/sonic'}, {'type': 'WEB', 'url': 'https://github.com/go-sonic/sonic/releases/tag/v1.0.5'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-23T20:37:57Z', 'nvd_published_at': '2023-01-23T05:15:00Z'}
1.4.0
GHSA-6mjp-2rm6-9g85
2023-01-10T21:42:55Z
2023-01-06T17:15:47Z
null
['CVE-2023-22457']
XWiki CKEditor.HTMLConverter vulnerable to Remote Code Execution via Cross-Site Request Forgery
### Impact The `CKEditor.HTMLConverter` document lacked a protection against Cross-Site Request Forgery (CSRF), allowing to execute macros with the rights of the current user. If a privileged user with programming rights was tricked into executing a GET request to this document with certain parameters (e.g., via an image with a corresponding URL embedded in a comment or via a redirect), this would allow arbitrary remote code execution and the attacker could gain rights, access private information or impact the availability of the wiki. The attack can be demonstrated by accessing the URL `<server>/xwiki/bin/view/Main?sheet=CKEditor.HTMLConverter&language=en&sourceSyntax=xwiki%2F2.1&stripHTMLEnvelope=true&fromHTML=false&toHTML=true&text=%7B%7Bgroovy%7D%7Dprintln%28%22Hello+from+Groovy%21%22%29%7B%7B%2Fgroovy%7D%7D` where `<server>` is the URL of the XWiki installation as a user with programming rights. If this displays the text "Hello from Groovy!", the installation is vulnerable. ### Patches The issue has been patched in the CKEditor Integration version 1.64.3. This has also been patched in the version of the CKEditor integration that is bundled starting with XWiki 14.6 RC1. ### Workarounds There are no known workarounds for this other than upgrading the CKEditor integration to a fixed version. ### References * https://github.com/xwiki-contrib/application-ckeditor/commit/6b1053164386aefc526df7512bc664918aa6849b * https://jira.xwiki.org/browse/CKEDITOR-475 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:[email protected])
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.contrib:application-ckeditor-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.64.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/xwiki-contrib/application-ckeditor/security/advisories/GHSA-6mjp-2rm6-9g85'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22457'}, {'type': 'WEB', 'url': 'https://github.com/xwiki-contrib/application-ckeditor/commit/6b1053164386aefc526df7512bc664918aa6849b'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki-contrib/application-ckeditor'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/CKEDITOR-475'}]
{'cwe_ids': ['CWE-352'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-06T17:15:47Z', 'nvd_published_at': '2023-01-04T15:15:00Z'}
1.4.0
GHSA-8686-4cr3-76wj
2023-01-12T16:49:30Z
2023-01-07T06:30:20Z
null
['CVE-2023-0106']
usememos/memos vulnerable to stored Cross-site Scripting
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.10.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0106'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/0f8ce3dd1696722f951d7195ad1f88b39a5d15d7'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/5c0809cb-f4ff-4447-bed6-b5625fb374bb'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T21:53:55Z', 'nvd_published_at': '2023-01-07T04:15:00Z'}
1.4.0
GHSA-v436-q368-hvgg
2023-01-23T18:47:54Z
2023-01-12T23:39:39Z
null
['CVE-2023-0091']
Keycloak has lack of validation of access token on client registrations endpoint
When a service account with the create-client or manage-clients role can use the client-registration endpoints to create/manage clients with an access token. If the access token is leaked, there is an option to revoke the specific token. However, the check is not performed in client-registration endpoints.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20.0.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 20.0.2'}}]
[{'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/security/advisories/GHSA-v436-q368-hvgg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0091'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2023-0091'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}]
{'cwe_ids': ['CWE-284', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-12T23:39:39Z', 'nvd_published_at': '2023-01-13T06:15:00Z'}
1.4.0
GHSA-prcg-mc23-hgjh
2023-02-02T22:19:25Z
2023-01-26T21:30:29Z
null
['CVE-2020-22452']
phpmyadmin contains SQL Injection vulnerability
SQL Injection vulnerability in function getTableCreationQuery in CreateAddField.php in phpMyAdmin 5.x before 5.0.2 via the tbl_storage_engine or tbl_collation parameters to tbl_create.php.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-22452'}, {'type': 'WEB', 'url': 'https://github.com/phpmyadmin/phpmyadmin/issues/15898'}, {'type': 'WEB', 'url': 'https://github.com/phpmyadmin/phpmyadmin/pull/16004'}, {'type': 'WEB', 'url': 'https://github.com/phpmyadmin/phpmyadmin/commit/bc982466f08ddccad4804ba928f84ff8e25107cb'}, {'type': 'PACKAGE', 'url': 'https://github.com/phpmyadmin/phpmyadmin'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-02T22:19:25Z', 'nvd_published_at': '2023-01-26T21:15:00Z'}
1.4.0
GHSA-r4hg-4cpq-q57c
2023-02-07T21:17:31Z
2023-01-31T06:30:26Z
null
['CVE-2022-25979']
jSuites subect to Cross-site Scripting
Versions of the package jsuites before 5.0.1 are vulnerable to Cross-site Scripting (XSS) due to improper user-input sanitization in the Editor() function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'jsuites'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25979'}, {'type': 'WEB', 'url': 'https://github.com/jsuites/jsuites/issues/134'}, {'type': 'WEB', 'url': 'https://github.com/jsuites/jsuites/commit/b31770d5fe91684a00177f629aab933139c32d9f'}, {'type': 'PACKAGE', 'url': 'https://github.com/jsuites/jsuites'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3253331'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-JSUITES-3226764'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-01T20:58:02Z', 'nvd_published_at': '2023-01-31T05:15:00Z'}
1.4.0
GHSA-c467-5c2g-jp86
2023-01-27T01:16:04Z
2023-01-27T00:30:18Z
null
['CVE-2023-0470']
Cross-site Scripting in modoboa
Cross-site Scripting (XSS) - Stored in GitHub repository modoboa/modoboa prior to 2.0.4.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'modoboa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0470'}, {'type': 'WEB', 'url': 'https://github.com/modoboa/modoboa/commit/354ab6884019009249097a7f3a1881d81ecd2fd2'}, {'type': 'PACKAGE', 'url': 'https://github.com/modoboa/modoboa'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/baae3180-b63b-4880-b2af-1a3f30056c2b'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:16:04Z', 'nvd_published_at': '2023-01-26T22:15:00Z'}
1.4.0
GHSA-r894-5r7v-7rx3
2023-01-12T23:40:22Z
2023-01-07T09:30:17Z
null
['CVE-2014-125055']
easy-scrypt Observable Timing Discrepancy vulnerability
A vulnerability, which was classified as problematic, was found in agnivade easy-scrypt. Affected is the function `VerifyPassphrase` of the file `scrypt.go`. The manipulation leads to observable timing discrepancy. Upgrading to version 1.0.0 can address this issue. The name of the patch is 477c10cf3b144ddf96526aa09f5fdea613f21812. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217596.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/agnivade/easy-scrypt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-125055'}, {'type': 'WEB', 'url': 'https://github.com/agnivade/easy-scrypt/commit/477c10cf3b144ddf96526aa09f5fdea613f21812'}, {'type': 'PACKAGE', 'url': 'https://github.com/agnivade/easy-scrypt'}, {'type': 'WEB', 'url': 'https://github.com/agnivade/easy-scrypt/releases/tag/v1.0.0'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217596'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217596'}]
{'cwe_ids': ['CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-12T23:40:22Z', 'nvd_published_at': '2023-01-07T09:15:00Z'}
1.4.0
GHSA-x9vc-5q77-m7x4
2023-01-23T20:40:08Z
2023-01-22T03:30:28Z
null
['CVE-2023-0434']
Improper Input Validation in pyload-ng
Improper Input Validation in GitHub repository pyload/pyload prior to 0.5.0b3.dev40.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:P/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pyload-ng'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0b3.dev40'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0434'}, {'type': 'WEB', 'url': 'https://github.com/pyload/pyload/commit/a2b1eb1028f45ac58dea5f58593c1d3db2b4a104'}, {'type': 'PACKAGE', 'url': 'https://github.com/pyload/pyload'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/7d9332d8-6997-483b-9fb9-bcf2ae01dad4'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-23T20:40:08Z', 'nvd_published_at': '2023-01-22T01:15:00Z'}
1.4.0
GHSA-8mmh-h4jh-2g34
2023-02-03T20:34:57Z
2023-01-26T21:30:18Z
null
['CVE-2023-24455']
Path Traversal in Jenkins visualexpert Plugin
Jenkins visualexpert Plugin 1.3 and earlier does not restrict the names of files in methods implementing form validation, allowing attackers with Item/Configure permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:visualexpert'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24455'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2709'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T00:56:07Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}
1.4.0
GHSA-9jwh-qvg7-gr59
2023-01-27T01:26:59Z
2023-01-26T21:30:18Z
null
['CVE-2023-24432']
CSRF vulnerability in Jenkins Orka Plugin allow capturing credentials
A cross-site request forgery (CSRF) vulnerability in Jenkins Orka by MacStadium Plugin 1.31 and earlier allows attackers to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:macstadium-orka'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.32'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24432'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2772%20(2)'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:26:59Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}
1.4.0
GHSA-g7mw-9pf9-p2pm
2023-01-12T23:40:45Z
2023-01-07T21:30:39Z
null
['CVE-2014-125064']
gosqljson SQL Injection vulnerability
A vulnerability, which was classified as critical, has been found in elgs gosqljson. This issue affects the function `QueryDbToArray/QueryDbToMap/ExecDb` of the file `gosqljson.go`. The manipulation of the argument sqlStatement leads to sql injection. The name of the patch is 2740b331546cb88eb61771df4c07d389e9f0363a. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217631.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/elgs/gosqljson'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20220916234230-750f26ee23c7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-125064'}, {'type': 'WEB', 'url': 'https://github.com/elgs/gosqljson/commit/2740b331546cb88eb61771df4c07d389e9f0363a'}, {'type': 'PACKAGE', 'url': 'https://github.com/elgs/gosqljson'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1494'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217631'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217631'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-12T23:40:45Z', 'nvd_published_at': '2023-01-07T20:15:00Z'}
1.4.0
GHSA-6c25-cxcc-pmc4
2023-02-08T22:20:19Z
2023-01-31T18:30:23Z
null
['CVE-2023-24163']
Dromara hutool vulnerable to SQL Injection
SQL Inection vulnerability in Dromara hutool v5.8.11 allows attacker to execute arbitrary code via the aviator template engine.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'cn.hutool:hutool-all'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.8.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24163'}, {'type': 'PACKAGE', 'url': 'https://gitee.com/dromara/hutool'}, {'type': 'WEB', 'url': 'https://gitee.com/dromara/hutool/issues/I6AJWJ#note_15801868'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T22:20:19Z', 'nvd_published_at': '2023-01-31T16:15:00Z'}
1.4.0
GHSA-5xpc-c4xv-7w62
2023-02-03T20:39:19Z
2023-01-26T21:30:18Z
null
['CVE-2023-24449']
Path traversal vulnerability in Jenkins PWauth Security Realm Plugin
Jenkins PWauth Security Realm Plugin 0.4 and earlier does not restrict the names of files in methods implementing form validation, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jvnet.hudson.plugins:pwauth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24449'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2985'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:28:27Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}
1.4.0
GHSA-g5mj-c26g-vmpm
2023-02-03T20:36:33Z
2023-01-26T21:30:18Z
null
['CVE-2023-24443']
XML Entity Expansion in Jenkins TestComplete support Plugin
Jenkins TestComplete support Plugin 2.8.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:TestComplete'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.8.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24443'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2741'}]
{'cwe_ids': ['CWE-611', 'CWE-776'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:00:03Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}
1.4.0
GHSA-v4w5-r2xc-7f8h
2023-07-21T18:02:01Z
2023-01-09T21:57:10Z
null
['CVE-2023-22479']
KubePi session fixation attack allows an attacker to hijack a legitimate user session.
### Summary A session fixation attack allows an attacker to hijack a legitimate user session. The attack investigates a flaw in how the online application handles the session ID, especially the susceptible web application. ### Affected Version <= v1.6.3 ### Patches The vulnerability has been fixed in [v1.6.4](https://github.com/KubeOperator/KubePi/releases/tag/v1.6.4). https://github.com/KubeOperator/KubePi/commit/1e9c550356c1a425a742480efcf743d373e98dcb : A session fixation attack allows an attacker to hijack a legitimate user session. ### Workarounds It is recommended to upgrade the version to [v1.6.4](https://github.com/KubeOperator/KubePi/releases/tag/v1.6.4). ### For more information If you have any questions or comments about this advisory, please [open an issue](https://github.com/KubeOperator/KubePi/issues). This vulnerability is reported by [sachinh09](https://huntr.dev/users/sachinh09/) from [huntr.dev](https://huntr.dev/).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/KubeOperator/kubepi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.6.3'}}]
[{'type': 'WEB', 'url': 'https://github.com/1Panel-dev/KubePi/security/advisories/GHSA-v4w5-r2xc-7f8h'}, {'type': 'WEB', 'url': 'https://github.com/KubeOperator/KubePi/security/advisories/GHSA-v4w5-r2xc-7f8h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22479'}, {'type': 'WEB', 'url': 'https://github.com/KubeOperator/KubePi/commit/1e9c550356c1a425a742480efcf743d373e98dcb'}, {'type': 'PACKAGE', 'url': 'https://github.com/KubeOperator/KubePi'}, {'type': 'WEB', 'url': 'https://github.com/KubeOperator/KubePi/releases/tag/v1.6.4'}]
{'cwe_ids': ['CWE-384'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T21:57:10Z', 'nvd_published_at': '2023-01-10T21:15:00Z'}
1.4.0
GHSA-vf99-xw26-86g5
2023-01-11T20:54:21Z
2023-01-05T09:30:28Z
null
['CVE-2023-22626']
PgHero Allows Information Disclosure Through EXPLAIN Feature
PgHero before 3.1.0 allows Information Disclosure via EXPLAIN because query results may be present in an error message. (Depending on database user privileges, this may only be information from the database, or may be information from file contents on the database server.)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'pghero'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22626'}, {'type': 'WEB', 'url': 'https://github.com/ankane/pghero/issues/439'}, {'type': 'PACKAGE', 'url': 'https://github.com/ankane/pghero'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/pghero/CVE-2023-22626.yml'}]
{'cwe_ids': ['CWE-209'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T20:03:14Z', 'nvd_published_at': '2023-01-05T08:15:00Z'}
1.4.0
GHSA-9963-gmh8-vvm6
2023-02-03T20:35:06Z
2023-01-26T21:30:18Z
null
['CVE-2023-24456']
Session fixation vulnerability in Jenkins Keycloak Authentication Plugin
Jenkins Keycloak Authentication Plugin 2.3.0 and earlier does not invalidate the previous session on login.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:keycloak'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24456'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2987'}]
{'cwe_ids': ['CWE-384'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T00:57:52Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}
1.4.0
GHSA-w475-749h-c77m
2023-01-23T18:50:19Z
2023-01-16T00:30:25Z
null
['CVE-2023-0308']
phpMyFAQ Stored Cross-site Scripting vulnerability
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.10.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0308'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/810ee26d25c3d97664532861863099952f0e9a1f'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpmyfaq'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/83cfed62-af8b-4aaa-94f2-5a33dc0c2d69'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T22:02:26Z', 'nvd_published_at': '2023-01-15T22:15:00Z'}
1.4.0
GHSA-jjvp-wfp8-rv69
2023-01-12T20:58:04Z
2023-01-06T21:30:40Z
null
['CVE-2018-25068']
globalpom-utils has Insecure Temporary File
A vulnerability has been found in devent globalpom-utils up to 4.5.0 and classified as critical. This vulnerability affects the function `createTmpDir` of the file `globalpomutils-fileresources/src/main/java/com/anrisoftware/globalpom/fileresourcemanager/FileResourceManagerProvider.java`. The manipulation leads to insecure temporary file. The attack can be initiated remotely. Upgrading to version 4.5.1 can address this issue. The name of the patch is 77a820bac2f68e662ce261ecb050c643bd7ee560. It is recommended to upgrade the affected component. VDB-217570 is the identifier assigned to this vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.anrisoftware.globalpom:globalpomutils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25068'}, {'type': 'WEB', 'url': 'https://github.com/devent/globalpom-utils/commit/77a820bac2f68e662ce261ecb050c643bd7ee560'}, {'type': 'PACKAGE', 'url': 'https://github.com/devent/globalpom-utils'}, {'type': 'WEB', 'url': 'https://github.com/devent/globalpom-utils/releases/tag/globalpomutils-4.5.1'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217570'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217570'}]
{'cwe_ids': ['CWE-377'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-12T20:58:04Z', 'nvd_published_at': '2023-01-06T21:15:00Z'}
1.4.0
GHSA-864v-6qj7-62qj
2023-02-03T20:32:27Z
2023-01-24T20:47:19Z
null
['CVE-2023-23612']
Issue with whitespace in JWT roles in OpenSearch
### Advisory title: Issue with whitespace in JWT roles ### Affected versions: OpenSearch 1.0.0-1.3.7 and 2.0.0-2.4.1 ### Patched versions: OpenSearch 1.3.8 and 2.5.0 ### Impact: OpenSearch uses JWTs to store role claims obtained from the Identity Provider (IdP) when the authentication backend is SAML or OpenID Connect. There is an issue in how those claims are processed from the JWTs where the leading and trailing whitespace is trimmed, allowing users to potentially claim roles they are not assigned to if any role matches the whitespace-stripped version of the roles they are a member of. This issue is only present for authenticated users, and it requires either the existence of roles that match, not considering leading/trailing whitespace, or the ability for users to create said matching roles. In addition, the Identity Provider must allow leading and trailing spaces in role names. ### Patches: OpenSearch versions 1.3.8 and 2.5.0 contain a fix for this issue. ### For more information: If you have any questions or comments about this advisory, please contact AWS/Amazon Security via our issue reporting page (https://aws.amazon.com/security/vulnerability-reporting/) or directly via email to [[email protected]](mailto:[email protected]). Please do not create a public GitHub issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.opensearch:opensearch-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.opensearch:opensearch-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.5.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/opensearch-project/security/security/advisories/GHSA-864v-6qj7-62qj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23612'}, {'type': 'WEB', 'url': 'https://github.com/opensearch-project/OpenSearch/releases/tag/2.5.0'}, {'type': 'PACKAGE', 'url': 'https://github.com/opensearch-project/security'}]
{'cwe_ids': ['CWE-269', 'CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-24T20:47:19Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}
1.4.0
GHSA-3xq5-wjfh-ppjc
2023-01-09T14:10:49Z
2023-01-09T14:10:49Z
null
['CVE-2023-22467']
Luxon Inefficient Regular Expression Complexity vulnerability
# Impact Luxon's `DateTime.fromRFC2822() has quadratic (N^2) complexity on some specific inputs. This causes a noticeable slowdown for inputs with lengths above 10k characters. Users providing untrusted data to this method are therefore vulnerable to (Re)DoS attacks. This is the same bug as Moment's https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g # Workarounds Limit the length of the input. # References There is an excellent writeup of the same issue in Moment: https://github.com/moment/moment/pull/6015#issuecomment-1152961973 # Details `DateTime.fromRFC2822("(".repeat(500000))` takes a couple minutes to complete.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'luxon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.28.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'luxon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'luxon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/moment/luxon/security/advisories/GHSA-3xq5-wjfh-ppjc'}, {'type': 'WEB', 'url': 'https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22467'}, {'type': 'WEB', 'url': 'https://github.com/moment/moment/pull/6015#issuecomment-1152961973'}, {'type': 'WEB', 'url': 'https://github.com/moment/luxon/commit/5ab3bf64a10da929a437629cdb2f059bb83212bf'}, {'type': 'PACKAGE', 'url': 'https://github.com/moment/luxon'}]
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T14:10:49Z', 'nvd_published_at': '2023-01-04T22:15:00Z'}
1.4.0
GHSA-8f7f-vqg5-jrv9
2023-01-23T18:52:27Z
2023-01-10T22:43:38Z
null
['CVE-2023-21538']
.NET Denial of Service Vulnerability
# Microsoft Security Advisory CVE-2023-21538: .NET Denial of Service Vulnerability ## <a name="executive-summary"></a>Executive summary Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 6.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability. A denial of service vulnerability exists in .NET 6.0 where a malicious client could cause a stack overflow which may result in a denial of service attack when an attacker sends an invalid request to an exposed endpoint. ## Discussion Discussion for this issue can be found at https://github.com/dotnet/runtime/issues/80449 ### <a name="mitigation-factors"></a>Mitigation factors Microsoft has not identified any mitigating factors for this vulnerability. ## <a name="affected-software"></a>Affected software * Any .NET 6.0 application running on .NET 6.0.12 or earlier. If your application uses the following package versions, ensure you update to the latest version of .NET. ### <a name=".NET 6"></a>.NET 6 Package name | Affected version | Patched version ------------ | ---------------- | ------------------------- [Microsoft.NetCore.App.Runtime.linux-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-arm)|>= 6.0.0, <= 6.0.12|6.0.13 [Microsoft.NetCore.App.Runtime.linux-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-arm64)|>= 6.0.0, <= 6.0.12|6.0.13 [Microsoft.NetCore.App.Runtime.linux-musl-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-arm)|>= 6.0.0, <= 6.0.12|6.0.13 [Microsoft.NetCore.App.Runtime.linux-musl-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-arm64)|>= 6.0.0, <= 6.0.12|6.0.13 [Microsoft.NetCore.App.Runtime.linux-musl-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-musl-x64)|>= 6.0.0, <= 6.0.12|6.0.13 [Microsoft.NetCore.App.Runtime.linux-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.linux-x64)|>= 6.0.0, <= 6.0.12|6.0.13 [Microsoft.NetCore.App.Runtime.osx-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.osx-arm64)|>= 6.0.0, <= 6.0.12|6.0.13 [Microsoft.NetCore.App.Runtime.osx-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.osx-x64)|>= 6.0.0, <= 6.0.12|6.0.13 [Microsoft.NetCore.App.Runtime.win-arm](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm)|>= 6.0.0, <= 6.0.12|6.0.13 [Microsoft.NetCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-arm64)|>= 6.0.0, <= 6.0.12|6.0.13 [Microsoft.NetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x64)|>= 6.0.0, <= 6.0.12|6.0.13 [Microsoft.NetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.NetCore.App.Runtime.win-x86)|>= 6.0.0, <= 6.0.12|6.0.13 ## Advisory FAQ ### <a name="how-affected"></a>How do I know if I am affected? If you have a runtime or SDK with a version listed, or an affected package listed in [affected software](#affected-software), you're exposed to the vulnerability. ### <a name="how-fix"></a>How do I fix the issue? * To fix the issue please install the latest version of .NET 6.0. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs. * If you have .NET Core 3.1 or greater installed, you can list the versions you have installed by running the `dotnet --info` command. You will see output like the following; * If you are using one of the affected packages, please update to the patched version listed above. ``` .NET Core SDK (reflecting any global.json): Version: 6.0.300 Commit: 8473146e7d Runtime Environment: OS Name: Windows OS Version: 10.0.18363 OS Platform: Windows RID: win10-x64 Base Path: C:\Program Files\dotnet\sdk\6.0.300\ Host (useful for support): Version: 6.0.5 Commit: 8473146e7d .NET Core SDKs installed: 6.0.300 [C:\Program Files\dotnet\sdk] .NET Core runtimes installed: Microsoft.AspNetCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App] Microsoft.NETCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App] Microsoft.WindowsDesktop.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App] To install additional .NET Core runtimes or SDKs: https://aka.ms/dotnet-download ``` * If you're using .NET 6.0, you should download and install Runtime 6.0.13 or SDK 6.0.113 (for Visual Studio 2022 v17.1) from https://dotnet.microsoft.com/download/dotnet-core/6.0. .NET 6.0 and and .NET 7.0 updates are also available from Microsoft Update. To access this either type "Check for updates" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates. Once you have installed the updated runtime or SDK, restart your apps for the update to take effect. Additionally, if you've deployed [self-contained applications](https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd) targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed. ## Other Information ### Reporting Security Issues If you have found a potential security issue in .NET 6.0 or .NET 7.0, please email details to [email protected]. Reports may qualify for the Microsoft .NET Core & .NET 5 Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at <https://aka.ms/corebounty>. ### Support You can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime and https://github.com/dotnet/aspnet/. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue. ### Disclaimer The information provided in this advisory is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. ### External Links [CVE-2023-21538]( https://www.cve.org/CVERecord?id=CVE-2023-21538) ### Revisions V1.0 (January 10, 2023): Advisory published. _Version 1.0_ _Last Updated 2023-01-10_
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.linux-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.13'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.linux-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.13'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.linux-musl-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.13'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.linux-musl-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.13'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.linux-musl-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.13'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.linux-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.13'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.osx-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.13'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.osx-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.13'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.13'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.13'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.13'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.13'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/dotnet/runtime/security/advisories/GHSA-8f7f-vqg5-jrv9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-21538'}, {'type': 'PACKAGE', 'url': 'https://github.com/dotnet/runtime'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/GV5QDWYJ4C26JB7RTI55Z4O76WSH4FMV/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/ZI27LYW5C4Z4644WYIQWOXBZL7WIP2X6/'}, {'type': 'WEB', 'url': 'https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21538'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-21538'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-10T22:43:38Z', 'nvd_published_at': '2023-01-10T22:15:00Z'}
1.4.0
GHSA-8fcj-gf77-47mg
2023-02-07T15:50:58Z
2023-01-25T19:40:26Z
null
['CVE-2022-43756']
Denial of service (DoS) when processing Git credentials
### Impact A denial of services (DoS) vulnerability was discovered in Wrangler Git package affecting versions up to and including `v1.0.0`. Specially crafted Git credentials can result in a denial of service (DoS) attack on an application that uses Wrangler due to the exhaustion of the available memory and CPU resources. This is caused by a lack of input validation of Git credentials before they are used, which may lead to a denial of service in some cases. This issue can be triggered when accessing both private and public Git repositories. ### Workarounds A workaround is to sanitize input passed to the Git package to remove potential unsafe and ambiguous characters. Otherwise, the best course of action is to update to a patched Wrangler version. ### Patches Patched versions include `v1.0.1` and later and the backported tags - `v0.7.4-security1`, `v0.8.5-security1` and `v0.8.11`. ### For more information If you have any questions or comments about this advisory: * Reach out to [SUSE Rancher Security team](https://github.com/rancher/rancher/security/policy) for security related inquiries. * Open an issue in [Rancher](https://github.com/rancher/rancher/issues/new/choose) or [Wrangler](https://github.com/rancher/wrangler/issues/new) repository. * Verify our [support matrix](https://www.suse.com/suse-rancher/support-matrix/all-supported-versions/) and [product support lifecycle](https://www.suse.com/lifecycle/).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/wrangler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.4-security1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.7.3'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/wrangler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8.0'}, {'fixed': '0.8.5-security1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.8.4'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/wrangler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.1'}]}], 'versions': ['1.0.0']}, {'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/wrangler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8.6'}, {'fixed': '0.8.11'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/rancher/wrangler/security/advisories/GHSA-8fcj-gf77-47mg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43756'}, {'type': 'WEB', 'url': 'https://github.com/rancher/wrangler/commit/341018c8fef3e12867c7cb2649bd2cecac75f287'}, {'type': 'WEB', 'url': 'https://bugzilla.suse.com/show_bug.cgi?id=1205296'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8fcj-gf77-47mg'}, {'type': 'WEB', 'url': 'https://github.com/rancher/rancher/security/policy'}, {'type': 'PACKAGE', 'url': 'https://github.com/rancher/wrangler'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1515'}]
{'cwe_ids': ['CWE-150', 'CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-25T19:40:26Z', 'nvd_published_at': '2023-02-07T13:15:00Z'}
1.4.0
GHSA-h8r9-467r-vjjf
2023-01-11T20:55:13Z
2023-01-05T03:30:37Z
null
['CVE-2023-0057']
pyLoad vulnerable to Improper Restriction of Rendered UI Layers or Frames
Improper Restriction of Rendered UI Layers or Frames in GitHub repository pyload/pyload prior to 0.5.0b3.dev33.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pyload-ng'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0b3.dev33'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0057'}, {'type': 'WEB', 'url': 'https://github.com/pyload/pyload/commit/bd2a31b7de54570b919aa1581d486e6ee18c0f64'}, {'type': 'PACKAGE', 'url': 'https://github.com/pyload/pyload'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/12b64f91-d048-490c-94b0-37514b6d694d'}]
{'cwe_ids': ['CWE-1021'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T19:54:21Z', 'nvd_published_at': '2023-01-05T01:15:00Z'}
1.4.0
GHSA-46h7-vj7x-fxg2
2023-01-20T23:18:41Z
2023-01-20T23:18:41Z
null
['CVE-2023-22734']
Shopware has Improper Input Validation issue in newsletter subscription
### Impact The newsletter double opt-in validation was not checked properly, and it was possible to skip the complete double opt in process. ### Patches The problem has been fixed with 6.4.18.1 ### Workarounds For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. Or disable the newsletter registration completely. ### References https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-01-2023?category=security-updates
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.18.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.18.0'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.18.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.18.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-46h7-vj7x-fxg2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22734'}, {'type': 'WEB', 'url': 'https://github.com/shopware/platform/commit/f5a95ee2bcf1e546878450963ef1d9886e59a620'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-01-2023?category=security-updates'}, {'type': 'PACKAGE', 'url': 'https://github.com/shopware/platform'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T23:18:41Z', 'nvd_published_at': '2023-01-17T22:15:00Z'}
1.4.0
GHSA-j6gc-792m-qgm2
2023-08-18T21:10:40Z
2023-01-18T18:23:20Z
null
['CVE-2023-22796']
ReDoS based DoS vulnerability in Active Support's underscore
There is a possible regular expression based DoS vulnerability in Active Support. This vulnerability has been assigned the CVE identifier CVE-2023-22796. Versions Affected: All Not affected: None Fixed Versions: 5.2.8.15 (Rails LTS, which is a paid service and not part of the rubygem), 6.1.7.1, 7.0.4.1 Impact A specially crafted string passed to the underscore method can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability. This affects String#underscore, ActiveSupport::Inflector.underscore, String#titleize, and any other methods using these. All users running an affected release should either upgrade or use one of the workarounds immediately. Releases The FIXED releases are available at the normal locations. Workarounds There are no feasible workarounds for this issue. Users on Ruby 3.2.0 or greater may be able to reduce the impact by configuring Regexp.timeout. Patches To aid users who aren’t able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset. 6-1-Avoid-regex-backtracking-in-Inflector.underscore.patch - Patch for 6.1 series 7-0-Avoid-regex-backtracking-in-Inflector.underscore.patch - Patch for 7.0 series Please note that only the 7.0.Z and 6.1.Z series are supported at present, and 6.0.Z for severe vulnerabilities. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.1.7.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22796'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/2164d4f6a1bde74b911fe9ba3c8df1b5bf345bf8'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/a7cda7e6aa5334ab41b1f4b0f671be931be946ef'}, {'type': 'WEB', 'url': 'https://discuss.rubyonrails.org/t/cve-2023-22796-possible-redos-based-dos-vulnerability-in-active-supports-underscore/82116'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/releases/tag/v6.1.7.1'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/releases/tag/v7.0.4.1'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activesupport/CVE-2023-22796.yml'}, {'type': 'WEB', 'url': 'https://rubyonrails.org/2023/1/17/Rails-Versions-6-0-6-1-6-1-7-1-7-0-4-1-have-been-released'}]
{'cwe_ids': ['CWE-1333'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-01-18T18:23:20Z', 'nvd_published_at': '2023-02-09T20:15:00Z'}
1.4.0
GHSA-rc42-jghf-vr8f
2023-01-23T20:34:52Z
2023-01-14T15:30:25Z
null
['CVE-2022-1812']
Integer overflow in publify_core
Integer Overflow or Wraparound in GitHub repository publify/publify prior to 9.2.10 due to an unlimited length user name field.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'publify_core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.2.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1812'}, {'type': 'WEB', 'url': 'https://github.com/publify/publify/commit/29a5837c29620e33857d7a5afce01384e3f8e41a'}, {'type': 'PACKAGE', 'url': 'https://github.com/publify/publify_core'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/publify_core/CVE-2022-1812.yml'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/17d86a50-265c-4ec8-9592-0bd909ddc8f3'}]
{'cwe_ids': ['CWE-190'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-23T20:34:52Z', 'nvd_published_at': '2023-01-14T14:15:00Z'}
1.4.0
GHSA-3ppr-72x5-x67q
2023-01-27T01:03:33Z
2023-01-26T21:30:18Z
null
['CVE-2023-24441']
XML external entity vulnerability on agents in Jenkins MSTest Plugin
Jenkins MSTest Plugin 1.0.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jvnet.hudson.plugins:mstest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24441'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/mstest-plugin/releases/tag/mstest-1.0.1'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2292'}]
{'cwe_ids': ['CWE-776'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:03:33Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}
1.4.0
GHSA-798h-g4j5-5537
2023-01-19T16:38:30Z
2023-01-11T15:30:28Z
null
['CVE-2020-36649']
PapaParse Inefficient Regular Expression Complexity vulnerability
A vulnerability was found in mholt PapaParse up to 5.1.x. It has been classified as problematic. Affected is an unknown function of the file papaparse.js. The manipulation leads to inefficient regular expression complexity. Upgrading to version 5.2.0 is able to address this issue. The name of the patch is 235a12758cd77266d2e98fd715f53536b34ad621. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-218004.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'papaparse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36649'}, {'type': 'WEB', 'url': 'https://github.com/mholt/PapaParse/issues/777'}, {'type': 'WEB', 'url': 'https://github.com/mholt/PapaParse/pull/779'}, {'type': 'WEB', 'url': 'https://github.com/mholt/PapaParse/commit/235a12758cd77266d2e98fd715f53536b34ad621'}, {'type': 'PACKAGE', 'url': 'https://github.com/mholt/PapaParse'}, {'type': 'WEB', 'url': 'https://github.com/mholt/PapaParse/releases/tag/5.2.0'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.218004'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.218004'}]
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-12T20:51:49Z', 'nvd_published_at': '2023-01-11T15:15:00Z'}
1.4.0
GHSA-3g2g-rcm6-rrq2
2023-02-06T16:40:55Z
2023-01-26T21:30:18Z
null
['CVE-2023-24440']
Cleartext Transmission of Sensitive Information in Jenkins JIRA Pipeline Steps Plugin
Jenkins JIRA Pipeline Steps Plugin 2.0.165.v8846cf59f3db and earlier transmits the private key in plain text as part of the global Jenkins configuration form, potentially resulting in their exposure.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:jira-steps'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.165.v8846cf59f3db'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24440'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2774'}]
{'cwe_ids': ['CWE-319'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:19:05Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}
1.4.0
GHSA-ww43-mcvh-35p4
2023-01-12T23:43:48Z
2023-01-08T00:30:15Z
null
['CVE-2014-125029']
PaginationServiceProvider SQL Injection vulnerability
A vulnerability was found in ttskch PaginationServiceProvider up to 0.x. It has been declared as critical. This vulnerability affects unknown code of the file `demo/index.php` of the component demo. The manipulation of the argument sort/id leads to sql injection. Upgrading to version 1.0.0 can address this issue. The name of the patch is 619de478efce17ece1a3b913ab16e40651e1ea7b. It is recommended to upgrade the affected component. VDB-217150 is the identifier assigned to this vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'ttskch/pagination-service-provider'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-125029'}, {'type': 'WEB', 'url': 'https://github.com/ttskch/PaginationServiceProvider/commit/619de478efce17ece1a3b913ab16e40651e1ea7b'}, {'type': 'PACKAGE', 'url': 'https://github.com/ttskch/PaginationServiceProvider'}, {'type': 'WEB', 'url': 'https://github.com/ttskch/PaginationServiceProvider/releases/tag/1.0.0'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217150'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217150'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-12T23:43:48Z', 'nvd_published_at': '2023-01-07T22:15:00Z'}
1.4.0
GHSA-87rh-wc85-xqvc
2023-02-03T20:40:22Z
2023-01-26T21:30:18Z
null
['CVE-2023-24431']
Missing permission checks in Jenkins Orka Plugin allow enumerating credentials IDs
A missing permission check in Jenkins Orka by MacStadium Plugin 1.31 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:macstadium-orka'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.32'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24431'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2772%20(1)'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:27:22Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}
1.4.0
GHSA-cp68-42pf-6627
2023-01-24T18:05:37Z
2023-01-16T03:30:25Z
null
['CVE-2023-0315']
Froxlor vulnerable to Command Injection
Command Injection in GitHub repository froxlor/froxlor prior to 2.0.8.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'froxlor/froxlor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0315'}, {'type': 'WEB', 'url': 'https://github.com/froxlor/froxlor/commit/090cfc26f2722ac3036cc7fd1861955bc36f065a'}, {'type': 'PACKAGE', 'url': 'https://github.com/Froxlor/Froxlor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ff4e177b-ba48-4913-bbfa-ab8ce0db5943'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/171108/Froxlor-2.0.6-Remote-Command-Execution.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/171729/Froxlor-2.0.3-Stable-Remote-Code-Execution.html'}]
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-18T18:24:58Z', 'nvd_published_at': '2023-01-16T01:15:00Z'}
1.4.0
GHSA-h2ph-9r76-37v5
2023-01-12T16:47:52Z
2023-01-07T06:30:19Z
null
['CVE-2023-0111']
usememos/memos vulnerable to stored Cross-site Scripting
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.10.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0111'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/46c13a4b7f675b92d297df6dabb4441f13c7cd9c'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/70da256c-977a-487e-8a6a-9ae22caedbe3'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T21:52:08Z', 'nvd_published_at': '2023-01-07T04:15:00Z'}
1.4.0
GHSA-4jrm-c32x-w4jf
2023-02-09T17:41:49Z
2023-01-10T21:50:00Z
null
['CVE-2023-0163']
convict vulnerable to Prototype Pollution
### Impact * An attacker can inject attributes that are used in other components * An attacker can override existing attributes with ones that have incompatible type, which may lead to a crash. The main use case of Convict is for handling server-side configurations written by the admins owning the servers, and not random users. So it's unlikely that an admin would deliberately sabotage their own server. Still a situation can happen where an admin not knowledgeable about JavaScript could be tricked by an attacker into writing the malicious JavaScript code into some config files. ### Patches The problem is patched in `[email protected]`. Users should upgrade to `[email protected]`. ### Workarounds No way for users to fix or remediate the vulnerability without upgrading ### References https://github.com/mozilla/node-convict/issues/410
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'convict'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.2.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/mozilla/node-convict/security/advisories/GHSA-4jrm-c32x-w4jf'}, {'type': 'WEB', 'url': 'https://github.com/mozilla/node-convict/commit/fb602fbe1e9f14f2e88ecb8179d0f76466d21ecb'}, {'type': 'PACKAGE', 'url': 'https://github.com/mozilla/node-convict'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-10T21:50:00Z', 'nvd_published_at': None}
1.4.0
GHSA-mjgw-f2c4-f8qj
2023-01-12T23:42:27Z
2023-01-08T12:30:24Z
null
['CVE-2021-4308']
WebPA SQL Injection vulnerability
A vulnerability was found in WebPA up to 3.1.1. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to sql injection. Upgrading to version 3.1.2 can to address this issue. The name of the patch is 8836c4f549181e885a68e0e7ca561fdbcbd04bf0. It is recommended to upgrade the affected component. The identifier VDB-217637 was assigned to this vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'webpa/webpa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4308'}, {'type': 'WEB', 'url': 'https://github.com/WebPA/WebPA/pull/87'}, {'type': 'WEB', 'url': 'https://github.com/WebPA/WebPA/commit/8836c4f549181e885a68e0e7ca561fdbcbd04bf0'}, {'type': 'PACKAGE', 'url': 'https://github.com/WebPA/WebPA'}, {'type': 'WEB', 'url': 'https://github.com/WebPA/WebPA/releases/tag/v3.1.2'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217637'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217637'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-12T23:42:27Z', 'nvd_published_at': '2023-01-08T10:15:00Z'}
1.4.0
GHSA-68hv-8926-j34c
2023-01-12T23:42:44Z
2023-01-06T15:30:45Z
null
['CVE-2015-10018']
DBRisinajumi d2files SQL Injection vulnerability
A vulnerability has been found in DBRisinajumi d2files and classified as critical. Affected by this vulnerability is the function `actionUpload/actionDownloadFile` of the file `controllers/D2filesController.php`. The manipulation leads to sql injection. Upgrading to version 1.0.0 can address this issue. The name of the patch is b5767f2ec9d0f3cbfda7f13c84740e2179c90574. It is recommended to upgrade the affected component. The identifier VDB-217561 was assigned to this vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'dbrisinajumi/d2files'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-10018'}, {'type': 'WEB', 'url': 'https://github.com/DBRisinajumi/d2files/commit/b5767f2ec9d0f3cbfda7f13c84740e2179c90574'}, {'type': 'PACKAGE', 'url': 'https://github.com/DBRisinajumi/d2files'}, {'type': 'WEB', 'url': 'https://github.com/DBRisinajumi/d2files/releases/tag/1.0.0'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217561'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217561'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-12T23:42:44Z', 'nvd_published_at': '2023-01-06T13:15:00Z'}
1.4.0
GHSA-vqqm-c9gx-773q
2023-02-07T21:14:09Z
2023-01-30T00:30:35Z
null
['CVE-2023-0565']
Froxlor contains Business Logic Errors
Business Logic Errors in GitHub repository froxlor/froxlor prior to 2.0.10.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'froxlor/froxlor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0565'}, {'type': 'WEB', 'url': 'https://github.com/froxlor/froxlor/commit/2feb8020941a82bfb4ac68890f6ced0e5b3c4a15'}, {'type': 'PACKAGE', 'url': 'https://github.com/Froxlor/Froxlor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/12d78294-1723-4450-a239-023952666102'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-01T01:38:25Z', 'nvd_published_at': '2023-01-29T22:15:00Z'}
1.4.0
GHSA-p84v-45xj-wwqj
2023-02-10T22:06:15Z
2023-01-18T18:23:34Z
null
['CVE-2023-22792']
ReDoS based DoS vulnerability in Action Dispatch
There is a possible regular expression based DoS vulnerability in Action Dispatch. This vulnerability has been assigned the CVE identifier CVE-2023-22792. Versions Affected: >= 3.0.0 Not affected: < 3.0.0 Fixed Versions: 5.2.8.15 (Rails LTS), 6.1.7.1, 7.0.4.1 Impact Specially crafted cookies, in combination with a specially crafted X_FORWARDED_HOST header can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately. Releases The FIXED releases are available at the normal locations. Workarounds We recommend that all users upgrade to one of the FIXED versions. In the meantime, users can mitigate this vulnerability by using a load balancer or other device to filter out malicious X_FORWARDED_HOST headers before they reach the application. Patches To aid users who aren’t able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset. 6-1-Use-string-split-instead-of-regex-for-domain-parts.patch - Patch for 6.1 series 7-0-Use-string-split-instead-of-regex-for-domain-parts.patch - Patch for 7.0 series Please note that only the 7.0.Z and 6.1.Z series are supported at present, and 6.0.Z for severe vulnerabilities. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases. https://rubyonrails.org/2023/1/17/Rails-Versions-6-0-6-1-6-1-7-1-7-0-4-1-have-been-released
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '5.2.8.15'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.1.7.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22792'}, {'type': 'WEB', 'url': 'https://discuss.rubyonrails.org/t/cve-2023-22792-possible-redos-based-dos-vulnerability-in-action-dispatch/82115'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/releases/tag/v7.0.4.1'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2023-22792.yml'}, {'type': 'WEB', 'url': 'https://rubyonrails.org/2023/1/17/Rails-Versions-6-0-6-1-6-1-7-1-7-0-4-1-have-been-released'}]
{'cwe_ids': ['CWE-1333'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-01-18T18:23:34Z', 'nvd_published_at': '2023-02-09T20:15:00Z'}
1.4.0
GHSA-23c2-gwp5-pxw9
2023-09-18T20:31:36Z
2023-01-18T18:13:19Z
null
['CVE-2023-22799']
ReDoS based DoS vulnerability in GlobalID
There is a ReDoS based DoS vulnerability in the GlobalID gem. This vulnerability has been assigned the CVE identifier CVE-2023-22799. Versions Affected: >= 0.2.1 Not affected: NOTAFFECTED Fixed Versions: 1.0.1 Impact There is a possible DoS vulnerability in the model name parsing section of the GlobalID gem. Carefully crafted input can cause the regular expression engine to take an unexpected amount of time. All users running an affected release should either upgrade or use one of the workarounds immediately. Releases The FIXED releases are available at the normal locations. Workarounds There are no feasible workarounds for this issue. Patches To aid users who aren’t able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset. 1-0-model-name-redos.patch - Patch for 1.0 series
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'globalid'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.1'}, {'fixed': '1.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22799'}, {'type': 'WEB', 'url': 'https://github.com/rails/globalid/commit/4a75ecbfd73a8e92e32a1723b81a17e3136bd8fc'}, {'type': 'WEB', 'url': 'https://discuss.rubyonrails.org/t/cve-2023-22799-possible-redos-based-dos-vulnerability-in-globalid/82127'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/globalid'}, {'type': 'WEB', 'url': 'https://github.com/rails/globalid/releases/tag/v1.0.1'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/globalid/CVE-2023-22799.yml'}]
{'cwe_ids': ['CWE-1333'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-01-18T18:13:19Z', 'nvd_published_at': '2023-02-09T20:15:00Z'}
1.4.0
GHSA-ffxj-547x-5j7c
2023-02-03T20:29:55Z
2023-01-26T21:30:25Z
null
['CVE-2022-25882']
Directory Traversal in onnx
Versions of the package onnx before 1.13.0 are vulnerable to Directory Traversal as the external_data field of the tensor proto can have a path to the file which is outside the model current directory or user-provided directory, for example "../../../etc/passwd"
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'onnx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25882'}, {'type': 'WEB', 'url': 'https://github.com/onnx/onnx/issues/3991'}, {'type': 'WEB', 'url': 'https://github.com/onnx/onnx/pull/4400'}, {'type': 'WEB', 'url': 'https://github.com/onnx/onnx/commit/f369b0e859024095d721f1d1612da5a8fa38988d'}, {'type': 'WEB', 'url': 'https://gist.github.com/jnovikov/02a9aff9bf2188033e77bd91ff062856'}, {'type': 'PACKAGE', 'url': 'https://github.com/onnx/onnx'}, {'type': 'WEB', 'url': 'https://github.com/onnx/onnx/blob/96516aecd4c110b0ac57eba08ac236ebf7205728/onnx/checker.cc%23L129'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-PYTHON-ONNX-2395479'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:04:53Z', 'nvd_published_at': '2023-01-26T21:15:00Z'}
1.4.0
GHSA-fw3g-2h3j-qmm7
2023-01-28T01:17:44Z
2023-01-28T01:17:44Z
null
['CVE-2023-23627']
Improper neutralization of `noscript` element content may allow XSS in Sanitize
### Impact Using carefully crafted input, an attacker may be able to sneak arbitrary HTML through Sanitize `>= 5.0.0, < 6.0.1` when Sanitize is configured with a custom allowlist that allows `noscript` elements. This could result in XSS (cross-site scripting) or other undesired behavior when that HTML is rendered in a browser. Sanitize's default configs don't allow `noscript` elements and are not vulnerable. This issue only affects users who are using a custom config that adds `noscript` to the element allowlist. ### Patches Sanitize `>= 6.0.1` always removes `noscript` elements and their contents, even when `noscript` is in the allowlist. ### Workarounds Users who are unable to upgrade can prevent this issue by using one of Sanitize's default configs or by ensuring that their custom config does not include `noscript` in the element allowlist. ### Details The root cause of this issue is that HTML parsing rules treat the contents of a `noscript` element differently depending on whether scripting is enabled in the user agent. Nokogiri (the HTML parser Sanitize uses) doesn't support scripting so it follows the "scripting disabled" rules, but a web browser with scripting enabled will follow the "scripting enabled" rules. This means that Sanitize can't reliably make the contents of a `noscript` element safe for scripting enabled browsers. The safest thing to do is to remove the element and its contents entirely, which is now what Sanitize does in version 6.0.1 and later. ### References - [Release Notes](https://github.com/rgrove/sanitize/releases/tag/v6.0.1) ### Credit Thanks to David Klein from [TU Braunschweig](https://www.tu-braunschweig.de/en/ias) (@leeN) for reporting this issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'sanitize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '6.0.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/rgrove/sanitize/security/advisories/GHSA-fw3g-2h3j-qmm7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23627'}, {'type': 'WEB', 'url': 'https://github.com/rgrove/sanitize/commit/ec14265e530dc3fe31ce2ef773594d3a97778d22'}, {'type': 'PACKAGE', 'url': 'https://github.com/rgrove/sanitize'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/sanitize/CVE-2023-23627.yml'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-28T01:17:44Z', 'nvd_published_at': '2023-01-28T00:15:00Z'}
1.4.0
GHSA-wg99-5vrx-j2gg
2023-01-11T23:01:28Z
2023-01-05T12:30:28Z
null
['CVE-2020-36640']
bonita-connector-webservice XML External Entity vulnerability
A vulnerability, which was classified as problematic, was found in bonitasoft bonita-connector-webservice up to 1.3.0. This affects the function `TransformerConfigurationException` of the file `src/main/java/org/bonitasoft/connectors/ws/SecureWSConnector.java`. The manipulation leads to xml external entity reference. Upgrading to version 1.3.1 can address this issue. The name of the patch is a12ad691c05af19e9061d7949b6b828ce48815d5. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217443.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.bonitasoft.connectors:bonita-connector-webservice'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36640'}, {'type': 'WEB', 'url': 'https://github.com/bonitasoft/bonita-connector-webservice/pull/17'}, {'type': 'WEB', 'url': 'https://github.com/bonitasoft/bonita-connector-webservice/commit/a12ad691c05af19e9061d7949b6b828ce48815d5'}, {'type': 'PACKAGE', 'url': 'https://github.com/bonitasoft/bonita-connector-webservice'}, {'type': 'WEB', 'url': 'https://github.com/bonitasoft/bonita-connector-webservice/releases/tag/1.3.1'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.217443'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.217443'}]
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T20:04:58Z', 'nvd_published_at': '2023-01-05T10:15:00Z'}
1.4.0
GHSA-c653-6hhg-9x92
2023-01-05T12:04:09Z
2023-01-05T12:04:09Z
null
['CVE-2023-22460']
go-ipld-prime/codec/json may panic if asked to encode bytes
`go-ipld-prime` is a series of Go interfaces for manipulating IPLD data and a Go module that contains the `go-ipld-prime/codec/json` codec. ### Impact Encoding data which contains a `Bytes` kind Node will pass a `Bytes` token to the JSON encoder which will panic as it doesn't expect to receive `Bytes` tokens. Such an encoding should be treated as an error, as plain JSON should not be able to encode Bytes. **This only impacts uses of the "json" codec, "dag-json" is not impacted.** Use of "json" as a decoder is not impacted. ### Patches Fixed in v0.19.0. ### Workarounds Prefer the "dag-json" codec which has the ability to [encode bytes](https://ipld.io/specs/codecs/dag-json/spec/#bytes). ### References See fix in [#472](https://github.com/ipld/go-ipld-prime/pull/472)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ipld/go-ipld-prime'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.19.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ipld/go-ipld-prime/security/advisories/GHSA-c653-6hhg-9x92'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22460'}, {'type': 'WEB', 'url': 'https://github.com/ipld/go-ipld-prime/pull/472'}, {'type': 'WEB', 'url': 'https://github.com/ipld/go-ipld-prime/commit/146d1c8529676fe9ee0604f014656af2395505fc'}, {'type': 'PACKAGE', 'url': 'https://github.com/ipld/go-ipld-prime'}, {'type': 'WEB', 'url': 'https://github.com/ipld/go-ipld-prime/releases/tag/v0.19.0'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1269'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-05T12:04:09Z', 'nvd_published_at': '2023-01-04T15:15:00Z'}
1.4.0
GHSA-qrg7-hfx7-95c5
2023-02-08T22:37:02Z
2023-01-25T19:40:43Z
null
['CVE-2022-31249']
Command injection in Git package in Wrangler
### Impact A command injection vulnerability was discovered in Wrangler's Git package affecting versions up to and including `v1.0.0`. Wrangler's Git package uses the underlying Git binary present in the host OS or container image to execute Git operations. Specially crafted commands can be passed to Wrangler that will change their behavior and cause confusion when executed through Git, resulting in command injection in the underlying host. ### Workarounds A workaround is to sanitize input passed to the Git package to remove potential unsafe and ambiguous characters. Otherwise, the best course of action is to update to a patched Wrangler version. ### Patches Patched versions include `v1.0.1` and later and the backported tags - `v0.7.4-security1`, `v0.8.5-security1` and `v0.8.11`. ### For more information If you have any questions or comments about this advisory: * Reach out to [SUSE Rancher Security team](https://github.com/rancher/rancher/security/policy) for security related inquiries. * Open an issue in [Rancher](https://github.com/rancher/rancher/issues/new/choose) or [Wrangler](https://github.com/rancher/wrangler/issues/new) repository. * Verify our [support matrix](https://www.suse.com/suse-rancher/support-matrix/all-supported-versions/) and [product support lifecycle](https://www.suse.com/lifecycle/).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/wrangler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.4-security1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/wrangler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8.0'}, {'fixed': '0.8.5-security1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/wrangler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.1'}]}], 'versions': ['1.0.0']}, {'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/wrangler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8.6'}, {'fixed': '0.8.11'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/rancher/wrangler/security/advisories/GHSA-qrg7-hfx7-95c5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31249'}, {'type': 'WEB', 'url': 'https://github.com/rancher/wrangler/commit/12397eec50155cb2d24aa70bdf9e90c5f3b9a727'}, {'type': 'WEB', 'url': 'https://github.com/rancher/wrangler/commit/341018c8fef3e12867c7cb2649bd2cecac75f287'}, {'type': 'WEB', 'url': 'https://github.com/rancher/wrangler/commit/5a387e13e8d51e3340d9e5012a1951f0cca5fc90'}, {'type': 'WEB', 'url': 'https://github.com/rancher/wrangler/commit/8649ecc062204f28764fd80157a621cbae89c9cf'}, {'type': 'WEB', 'url': 'https://bugzilla.suse.com/show_bug.cgi?id=1200299'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qrg7-hfx7-95c5'}, {'type': 'PACKAGE', 'url': 'https://github.com/rancher/wrangler'}, {'type': 'WEB', 'url': 'https://github.com/rancher/wrangler/compare/v0.7.2...v0.7.4-security1'}, {'type': 'WEB', 'url': 'https://github.com/rancher/wrangler/compare/v0.8.4...v0.8.5-security1'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1519'}]
{'cwe_ids': ['CWE-77', 'CWE-78', 'CWE-88'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-25T19:40:43Z', 'nvd_published_at': '2023-02-07T13:15:00Z'}
1.4.0
GHSA-894c-rg7f-3c62
2023-01-24T23:28:21Z
2023-01-17T12:30:33Z
null
['CVE-2023-22298']
pgAdmin 4 Open Redirect vulnerability
Open redirect vulnerability in pgAdmin 4 versions prior to v6.14 allows a remote unauthenticated attacker to redirect a user to an arbitrary web site and conduct a phishing attack by having a user to access a specially crafted URL.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pgadmin4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.14'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22298'}, {'type': 'WEB', 'url': 'https://github.com/pgadmin-org/pgadmin4/issues/5343'}, {'type': 'PACKAGE', 'url': 'https://github.com/pgadmin-org/pgadmin4'}, {'type': 'WEB', 'url': 'https://jvn.jp/en/jp/JVN03832974/index.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/VHY2B25YHIIFQ3G44TR7NNEST7FJGJPH/'}, {'type': 'WEB', 'url': 'https://www.pgadmin.org/'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T23:17:38Z', 'nvd_published_at': '2023-01-17T10:15:00Z'}