schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
stringlengths 20
20
⌀ | aliases
stringlengths 2
20
| summary
stringlengths 8
154
| details
stringlengths 31
19.1k
| severity
stringlengths 2
92
| affected
stringlengths 75
28.5k
| references
stringlengths 79
7.48k
| database_specific
stringlengths 131
196
|
---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0
|
GHSA-7cr9-rmqr-fpqp
|
2022-03-28T22:34:57Z
|
2022-03-12T00:00:37Z
| null |
['CVE-2022-25511']
|
Path traversal in FreeTAKServer-UI
|
An issue in the ?filename= argument of the route /DataPackageTable in FreeTAKServer-UI v1.9.8 allows attackers to place arbitrary files anywhere on the system.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'FreeTAKServer-UI'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.9.8'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25511'}, {'type': 'WEB', 'url': 'https://github.com/FreeTAKTeam/UI/issues/29'}, {'type': 'PACKAGE', 'url': 'https://github.com/FreeTAKTeam/UI'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T23:14:05Z', 'nvd_published_at': '2022-03-11T00:15:00Z'}
|
1.4.0
|
GHSA-25f2-wgxj-ph29
|
2022-11-30T20:53:30Z
|
2022-03-30T00:00:23Z
| null |
['CVE-2022-28151']
|
Missing permission check in Jenkins Job and Node ownership Plugin
|
A missing permission check in Jenkins Job and Node ownership Plugin 0.13.0 and earlier allows attackers with Item/Read permission to change the owners and item-specific permissions of a job.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.synopsys.jenkinsci:ownership'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.13.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28151'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ownership-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2062%20(1)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/03/29/1'}]
|
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:53:30Z', 'nvd_published_at': '2022-03-29T13:15:00Z'}
|
1.4.0
|
GHSA-4c7h-f2j9-9c46
|
2022-04-05T19:50:57Z
|
2022-03-30T00:00:21Z
| null |
['CVE-2022-28158']
|
Missing permission Phoenix AutoTest Plugin
|
A missing permission check in Jenkins Pipeline: Phoenix AutoTest Plugin 1.3 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.surenpi.jenkins:phoenix-autotest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28158'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/phoenix-autotest-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2685'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/03/29/1'}]
|
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-05T19:50:57Z', 'nvd_published_at': '2022-03-29T13:15:00Z'}
|
1.4.0
|
GHSA-v4rr-65x6-g69f
|
2022-05-03T20:56:05Z
|
2022-03-30T00:00:25Z
| null |
['CVE-2022-28140']
|
XXE vulnerability in Jenkins Flaky Test Handler Plugin
|
Jenkins Flaky Test Handler Plugin 1.2.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:flaky-test-handler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28140'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/flaky-test-handler-plugin/commit/c4ab38fef3658a02315a00288b934bdd9981b3a4'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/flaky-test-handler-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-1896'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/03/29/1'}]
|
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-03T20:56:05Z', 'nvd_published_at': '2022-03-29T13:15:00Z'}
|
1.4.0
|
GHSA-mhfv-8rc9-w38c
|
2022-03-26T00:06:00Z
|
2022-03-26T00:06:00Z
| null |
[]
|
Arbitrary shell execution
|
Uses of shell_exec() and exec() were not escaping filenames and configuration settings in most cases
|
[]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'squizlabs/php_codesniffer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '2.8.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/squizlabs/php_codesniffer/2017-03-01.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/squizlabs/PHP_CodeSniffer'}, {'type': 'WEB', 'url': 'https://github.com/squizlabs/PHP_CodeSniffer/releases/tag/2.8.1'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-26T00:06:00Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-6h3m-36w8-hv68
|
2022-03-24T00:21:10Z
|
2022-03-10T22:07:30Z
| null |
['CVE-2022-26652']
|
Arbitrary file write in nats-server
|
(This document is canonically: <https://advisories.nats.io/CVE/CVE-2022-26652.txt>)
## Background
NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing.
JetStream is the optional RAFT-based resilient persistent feature of NATS.
## Problem Description
The JetStream streams can be backed up and restored via NATS. The backup format is a tar archive file. Inadequate checks on the filenames within the archive file permit a so-called "Zip Slip" attack in the stream restore.
NATS nats-server through 2022-03-09 (fixed in release 2.7.4) did not correctly sanitize elements of the archive file, thus a user of NATS
could cause the NATS server to write arbitrary content to an attacker-controlled filename.
## Affected versions
NATS Server:
* 2.2.0 up to and including 2.7.3.
+ Introduced with JetStream Restore functionality
* Fixed with nats-io/nats-server: 2.7.4
* Docker image: nats <https://hub.docker.com/_/nats>
* NB users of OS package files from our releases: a change in goreleaser defaults, discovered late in the release process, moved the install directory from /usr/local/bin to /usr/bin; we are evaluating the correct solution for subsequent releases, but not recutting this release.
NATS Streaming Server
* 0.15.0 up to and including 0.24.2
* Fixed with nats-io/nats-streaming-server: 0.24.3
* Embeds a nats-server, but this server is the old approach which JetStream replaces, so unlikely (but not impossible) to be
configured with JS support
## Workarounds
* Disable JetStream for untrusted users.
* If only one NATS account uses JetStream, such that cross-user attacks are not an issue, and any user in that account with access to the JetStream API is fully trusted anyway, then appropriate sandboxing techniques will prevent exploit.
+ Eg, with systemd, the supplied util/nats-server-hardened.service example configuration demonstrates that NATS runs fine as an unprivileged user under ProtectSystem=strict and PrivateTmp=true restrictions; by only opening a ReadWritePaths hole for the JetStream storage area, the impact of this vulnerability is limited.
## Solution
Upgrade the NATS server to at least 2.7.4.
We fully support the util/nats-server-hardened.service configuration for running a NATS server and encourage this approach.
## Credits
This issue was reported (on 2022-03-07) to the NATS Maintainers by
Yiming Xiang, TIANJI LAB of NSFOCUS.
Thank you / 谢谢你!
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/nats-io/nats-server/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.7.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/nats-io/nats-streaming-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.15.0'}, {'fixed': '0.24.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/nats-io/nats-server/security/advisories/GHSA-6h3m-36w8-hv68'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26652'}, {'type': 'WEB', 'url': 'https://github.com/nats-io/nats-server/pull/2917'}, {'type': 'WEB', 'url': 'https://advisories.nats.io/CVE/CVE-2022-26652.txt'}, {'type': 'PACKAGE', 'url': 'https://github.com/nats-io/nats-server'}, {'type': 'WEB', 'url': 'https://github.com/nats-io/nats-server/releases'}, {'type': 'WEB', 'url': 'https://github.com/nats-io/nats-server/releases/tag/v2.7.4'}, {'type': 'WEB', 'url': 'https://github.com/nats-io/nats-streaming-server/releases/tag/v0.24.3'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/03/10/1'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-10T22:07:30Z', 'nvd_published_at': '2022-03-10T17:47:00Z'}
|
1.4.0
|
GHSA-446w-rrm4-r47f
|
2022-03-18T20:06:07Z
|
2022-03-03T19:26:11Z
| null |
['CVE-2022-24725']
|
Exposure of home directory through shescape on Unix with Bash
|
### Impact
The issue allows for exposure of the home directory on Unix systems when using Bash with the `escape` or `escapeAll` functions from the _shescape_ API with the `interpolation` option set to `true`. Other tested shells, Dash and Zsh, are not affected.
```javascript
const cp = require("child_process");
const shescape = require("shescape");
const payload = "home_directory=~";
const options = { interpolation: true };
console.log(cp.execSync(`echo ${shescape.escape(payload, options)}`));
// home_directory=/home/user
```
Depending on how the output of _shescape_ is used, directory traversal may be possible in the application using _shescape_.
### Patches
The issue was patched in `v1.5.1`.
### Workarounds
Manually escape all instances of the tilde character (`~`) using `arg.replace(/~/g, "\\~")`.
### References
See GitHub issue https://github.com/ericcornelissen/shescape/issues/169.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'shescape'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.5.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/ericcornelissen/shescape/security/advisories/GHSA-446w-rrm4-r47f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24725'}, {'type': 'WEB', 'url': 'https://github.com/ericcornelissen/shescape/issues/169'}, {'type': 'WEB', 'url': 'https://github.com/ericcornelissen/shescape/pull/170'}, {'type': 'PACKAGE', 'url': 'https://github.com/ericcornelissen/shescape'}]
|
{'cwe_ids': ['CWE-200', 'CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-03T19:26:11Z', 'nvd_published_at': '2022-03-03T22:15:00Z'}
|
1.4.0
|
GHSA-qf2g-q4mc-w7rr
|
2022-03-30T21:04:25Z
|
2022-03-25T00:00:34Z
| null |
['CVE-2022-0145']
|
Cross-site Scripting in Fork CMS
|
Fork CMS prior to 5.11.1 is vulnerable to stored cross-site scripting. When uploading a new module, the description of the module can contain JavaScript code. The JavaScript code may be executed after uploading the new module and looking at the `Details` page.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'forkcms/forkcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.11.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0145'}, {'type': 'WEB', 'url': 'https://github.com/forkcms/forkcms/commit/981730f1a3d59b423ca903b1f4bf79b848a1766e'}, {'type': 'PACKAGE', 'url': 'https://github.com/forkcms/forkcms'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b5b8c680-3cd9-4477-bcd9-3a29657ba7ba'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T20:36:53Z', 'nvd_published_at': '2022-03-24T11:15:00Z'}
|
1.4.0
|
GHSA-9j59-75qj-795w
|
2023-09-04T17:06:16Z
|
2022-03-11T23:10:32Z
| null |
['CVE-2022-24303']
|
Path traversal in Pillow
|
Pillow before 9.0.1 allows attackers to delete files because spaces in temporary pathnames are mishandled.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24303'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/3450'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/427221ef5f19157001bf8b1ad7cfe0b905ca8c26'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9j59-75qj-795w'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2022-168.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/W4ZUXPKEX72O3E5IHBPVY5ZCPMJ4GHHV/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/XR6UP2XONXOVXI4446VY72R63YRO2YTP/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/9.0.1.html#security'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202211-10'}]
|
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-11T23:10:32Z', 'nvd_published_at': '2022-03-28T02:15:00Z'}
|
1.4.0
|
GHSA-83vp-6jqg-6cmr
|
2022-03-18T20:15:32Z
|
2022-03-10T18:02:14Z
| null |
['CVE-2022-24748']
|
Incorrect Authentication in shopware
|
### Impact
Modify Customers, create Orders without App Permission
## Patches
We recommend updating to the current version 6.4.8.2. You can get the update to 6.4.8.2 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
## Workarounds
For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.8.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.8.1'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-83vp-6jqg-6cmr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24748'}, {'type': 'WEB', 'url': 'https://github.com/shopware/core/commit/329e4d7e028dd8081496cf8bd3acc822000b0ec0'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-03-2022?_ga=2.27683580.172848620.1646933022-368790926.1646933022'}, {'type': 'PACKAGE', 'url': 'https://github.com/shopware/platform'}]
|
{'cwe_ids': ['CWE-287', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-10T18:02:14Z', 'nvd_published_at': '2022-03-09T23:15:00Z'}
|
1.4.0
|
GHSA-xvch-5gv4-984h
|
2023-02-27T14:47:14Z
|
2022-03-18T00:01:09Z
| null |
['CVE-2021-44906']
|
Prototype Pollution in minimist
|
Minimist prior to 1.2.6 and 0.2.4 is vulnerable to Prototype Pollution via file `index.js`, function `setKey()` (lines 69-95).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'minimist'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.2.6'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'minimist'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44906'}, {'type': 'WEB', 'url': 'https://github.com/minimistjs/minimist/issues/11'}, {'type': 'WEB', 'url': 'https://github.com/substack/minimist/issues/164'}, {'type': 'WEB', 'url': 'https://github.com/minimistjs/minimist/pull/24'}, {'type': 'WEB', 'url': 'https://github.com/minimistjs/minimist/commit/34e20b8461118608703d6485326abbb8e35e1703'}, {'type': 'WEB', 'url': 'https://github.com/minimistjs/minimist/commit/bc8ecee43875261f4f17eb20b1243d3ed15e70eb'}, {'type': 'WEB', 'url': 'https://github.com/minimistjs/minimist/commit/c2b981977fa834b223b408cfb860f933c9811e4d'}, {'type': 'WEB', 'url': 'https://github.com/minimistjs/minimist/commit/ef9153fc52b6cea0744b2239921c5dcae4697f11'}, {'type': 'WEB', 'url': 'https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/minimist%20PoC.zip'}, {'type': 'WEB', 'url': 'https://github.com/minimistjs/minimist/commits/v0.2.4'}, {'type': 'PACKAGE', 'url': 'https://github.com/substack/minimist'}, {'type': 'WEB', 'url': 'https://github.com/substack/minimist/blob/master/index.js#L69'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MINIMIST-559764'}, {'type': 'WEB', 'url': 'https://stackoverflow.com/questions/8588563/adding-custom-properties-to-a-function/20278068#20278068'}]
|
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T23:13:40Z', 'nvd_published_at': '2022-03-17T16:15:00Z'}
|
1.4.0
|
GHSA-hf4q-52x6-4p57
|
2022-03-28T22:23:29Z
|
2022-03-11T00:02:36Z
| null |
['CVE-2022-0906']
|
Unrestricted file upload leads to stored cross-site scripting in Microweber
|
Microweber prior to version 1.2.12 allows unrestricted file upload, which could lead to stored cross-site scripting.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.12'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0906'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/d9bae9df873c2d2a13a2eb08d512019d49ebca68'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/87ed3b42-9824-49b0-91a5-fd908a0601e8'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-28T22:23:29Z', 'nvd_published_at': '2022-03-10T15:15:00Z'}
|
1.4.0
|
GHSA-rf54-44jr-q5vf
|
2022-03-28T22:33:07Z
|
2022-03-12T00:00:26Z
| null |
['CVE-2022-25839']
|
Improper Input Validation in url-js
|
The package url-js before 2.1.0 is vulnerable to Improper Input Validation due to improper parsing, which makes it is possible for the hostname to be spoofed. http://\\\\\\\\localhost and http://localhost are the same URL. However, the hostname is not parsed as localhost, and the backslash is reflected as it is.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'url-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25839'}, {'type': 'WEB', 'url': 'https://github.com/duzun/URL.js/commit/9dc9fcc99baa4cbda24403d81a589e9b0f4121d0'}, {'type': 'PACKAGE', 'url': 'https://github.com/duzun/URL.js'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-URLJS-2414030'}]
|
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T23:28:46Z', 'nvd_published_at': '2022-03-11T20:15:00Z'}
|
1.4.0
|
GHSA-2rmm-87v7-34rj
|
2022-03-15T21:34:09Z
|
2022-03-06T00:00:17Z
| null |
['CVE-2022-25312']
|
Improper Restriction of XML External Entity Reference in Any23
|
An XML external entity (XXE) injection vulnerability was discovered in the Any23 RDFa XSLTStylesheet extractor and is known to affect Any23 versions < 2.7. XML external entity injection (also known as XXE) is a web security vulnerability that allows an attacker to interfere with an application's processing of XML data. It often allows an attacker to view files on the application server filesystem, and to interact with any back-end or external systems that the application itself can access. This issue is fixed in Apache Any23 2.7.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.any23:apache-any23'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25312'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/any23'}, {'type': 'WEB', 'url': 'https://github.com/apache/any23/blob/any23-2.7/RELEASE-NOTES.md'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/y6cm5n3ksohsrhzqknqhzy7p3mtkyk23'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/03/04/2'}]
|
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-07T20:09:23Z', 'nvd_published_at': '2022-03-05T00:15:00Z'}
|
1.4.0
|
GHSA-vpwq-6cp4-ffqc
|
2022-03-28T18:40:15Z
|
2022-03-16T00:00:49Z
| null |
['CVE-2022-0945']
|
Stored Cross-site Scripting in ShowDoc
|
ShowDoc prior to version 2.10.4 is vulnerable to stored cross-site scripting viva `axd` and `cshtml` file upload.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0945'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/ba45d19e1d77a7eea866dab30eff5da552694891'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8702e2bf-4af2-4391-b651-c8c89e7d089e'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-28T18:40:15Z', 'nvd_published_at': '2022-03-15T04:15:00Z'}
|
1.4.0
|
GHSA-wfxp-4qgw-qp3c
|
2022-03-18T17:52:43Z
|
2022-03-18T17:52:43Z
| null |
['CVE-2021-21656']
|
XML external entity (XXE) attacks in Jenkins Xcode integration Plugin
|
Jenkins Xcode integration Plugin 2.0.14 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:xcode-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.15'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21656'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2335'}]
|
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T19:20:58Z', 'nvd_published_at': '2021-05-11T15:15:00Z'}
|
1.4.0
|
GHSA-j6jg-w79c-7p8v
|
2022-03-28T19:36:26Z
|
2022-03-16T00:00:48Z
| null |
['CVE-2022-0951']
|
File Upload Restriction Bypass leading to Cross-site Scripting in ShowDoc
|
ShowDoc prior to 2.10.4 is vulnerable to a file upload restriction bypass leading to stored cross-site scripting.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0951'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/237ac6d43bf3728bf3587c486a23b4a48ea7acb3'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b3a983a3-17f9-4aa8-92d7-8a0c92a93932'}]
|
{'cwe_ids': ['CWE-434', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-28T19:36:26Z', 'nvd_published_at': '2022-03-15T09:15:00Z'}
|
1.4.0
|
GHSA-62hc-f8qj-5xc3
|
2022-04-05T19:49:14Z
|
2022-03-30T00:00:22Z
| null |
['CVE-2022-28157']
|
Path traversal in Phoenix AutoTest Plugin
|
Jenkins Pipeline: Phoenix AutoTest Plugin 1.3 and earlier allows attackers with Item/Configure permission to upload arbitrary files from the Jenkins controller via FTP to an attacker-specified FTP server.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.surenpi.jenkins:phoenix-autotest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28157'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/phoenix-autotest-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2684'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/03/29/1'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-05T19:49:14Z', 'nvd_published_at': '2022-03-29T13:15:00Z'}
|
1.4.0
|
GHSA-6qcc-whgp-pjj2
|
2022-03-11T20:37:01Z
|
2022-03-05T00:00:45Z
| null |
['CVE-2022-0832']
|
Cross-site Scripting in Pimcore
|
Pimcore version 10.3.2 and prior is vulnerable to stored cross-site scripting. A patch is available and anticipated to be part of version 10.3.3.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.3.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.3.2'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0832'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/8ab06bfbb5a05a1b190731d9c7476ec45f5ee878'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/be450b60-bc8f-4585-96a5-3c4069f1186a'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-11T20:37:01Z', 'nvd_published_at': '2022-03-04T14:15:00Z'}
|
1.4.0
|
GHSA-3988-h75v-hwf6
|
2022-03-26T00:06:45Z
|
2022-03-26T00:06:45Z
| null |
[]
|
Arbitrary shell execution
|
A properly crafted filename would allow for arbitrary code execution when using the --filter=gitmodified command line option
|
[]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'squizlabs/php_codesniffer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/squizlabs/php_codesniffer/2017-05-18.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/squizlabs/PHP_CodeSniffer'}, {'type': 'WEB', 'url': 'https://github.com/squizlabs/PHP_CodeSniffer/releases/tag/3.0.1'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-26T00:06:45Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-5mc7-m686-p6jg
|
2022-03-18T17:57:32Z
|
2022-03-18T17:57:32Z
| null |
['CVE-2021-30179']
|
Deserialization of Untrusted Data in Apache Dubbo
|
Apache Dubbo prior to 2.6.9 and 2.7.10 by default supports generic calls to arbitrary methods exposed by provider interfaces. These invocations are handled by the GenericFilter which will find the service and method specified in the first arguments of the invocation and use the Java Reflection API to make the final call. The signature for the $invoke or $invokeAsync methods is Ljava/lang/String;[Ljava/lang/String;[Ljava/lang/Object; where the first argument is the name of the method to invoke, the second one is an array with the parameter types for the method being invoked and the third one is an array with the actual call arguments. In addition, the caller also needs to set an RPC attachment specifying that the call is a generic call and how to decode the arguments. The possible values are: - true - raw.return - nativejava - bean - protobuf-json An attacker can control this RPC attachment and set it to nativejava to force the java deserialization of the byte array located in the third argument.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.7.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.alibaba:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.6.9'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30179'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rccbcbdd6593e42ea3a1e8fedd12807cb111375c9c40edb005ef36f67%40%3Cdev.dubbo.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rccbcbdd6593e42ea3a1e8fedd12807cb111375c9c40edb005ef36f67@%3Cdev.dubbo.apache.org%3E'}]
|
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-02T20:18:30Z', 'nvd_published_at': '2021-06-01T14:15:00Z'}
|
1.4.0
|
GHSA-fhhx-r983-44xc
|
2022-11-29T23:03:10Z
|
2022-03-30T00:00:27Z
| null |
['CVE-2022-28142']
|
SSL/TLS certificate validation globally disabled by Jenkins Proxmox Plugin
|
Jenkins Proxmox Plugin 0.6.0 and earlier disables SSL/TLS certificate validation globally for the Jenkins controller JVM when configured to ignore SSL/TLS issues.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:proxmox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28142'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/proxmox-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2081'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/03/29/1'}]
|
{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T23:03:10Z', 'nvd_published_at': '2022-03-29T13:15:00Z'}
|
1.4.0
|
GHSA-3mpp-xfvh-qh37
|
2022-03-16T23:54:35Z
|
2022-03-16T23:54:35Z
| null |
[]
|
node-ipc behavior change
|
node-ipc version 11.0.0 and newer include a message from the maintainer that is written to the user’s desktop. Please review the version changes before proceeding.
|
[]
|
[{'package': {'ecosystem': 'npm', 'name': 'node-ipc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}]}]}]
|
[{'type': 'PACKAGE', 'url': 'https://github.com/RIAEvangelist/node-ipc'}, {'type': 'WEB', 'url': 'https://github.com/RIAEvangelist/node-ipc/releases/tag/v11.0.0'}]
|
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-03-16T23:54:35Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-4pww-fqgh-36hj
|
2022-03-28T15:00:56Z
|
2022-03-11T00:02:02Z
| null |
['CVE-2021-44673']
|
Unrestricted Upload of File with Dangerous Type in Croogo
|
A Remote Code Execution (RCE) vulnerability exists in Croogo 3.0.2 via admin/file-manager/attachments, which lets a malicious user upload a web shell script.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'croogo/croogo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44673'}, {'type': 'WEB', 'url': 'https://github.com/3erk1n/Vulnerabilities/blob/main/Croogo%203.0.2%20-%20Arbitrary%20File%20Upload-Remote%20Code%20Execution%20(Authenticated).txt'}, {'type': 'PACKAGE', 'url': 'https://github.com/croogo/croogo'}]
|
{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-28T15:00:56Z', 'nvd_published_at': '2022-03-10T18:15:00Z'}
|
1.4.0
|
GHSA-2r2c-g63r-vccr
|
2022-03-18T23:10:48Z
|
2022-03-18T23:10:48Z
| null |
['CVE-2022-24773']
|
Improper Verification of Cryptographic Signature in `node-forge`
|
### Impact
RSA PKCS#1 v1.5 signature verification code is not properly checking `DigestInfo` for a proper ASN.1 structure. This can lead to successful verification with signatures that contain invalid structures but a valid digest.
### Patches
The issue has been addressed in `node-forge` `1.3.0`.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [forge](https://github.com/digitalbazaar/forge)
* Email us at [example email address](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'node-forge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/digitalbazaar/forge/security/advisories/GHSA-2r2c-g63r-vccr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24773'}, {'type': 'WEB', 'url': 'https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1'}, {'type': 'WEB', 'url': 'https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2'}, {'type': 'PACKAGE', 'url': 'https://github.com/digitalbazaar/forge'}]
|
{'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T23:10:48Z', 'nvd_published_at': '2022-03-18T14:15:00Z'}
|
1.4.0
|
GHSA-4r8q-gv9j-3xx6
|
2022-03-18T17:55:07Z
|
2022-03-18T17:55:07Z
| null |
['CVE-2021-32645']
|
Open Redirect
|
### Impact
In some situations, it is possible to have open redirects where users can be redirected from your site to any other site using a specially crafted URL.
This is only the case for installations where the default Hostname Identification is used and the environment uses tenants that have `force_https` set to `true` (default: `false`)
### Patches
Version 5.7.2 contains the relevant patches to fix this bug. Stripping the URL from special characters to prevent specially crafted URL's from being redirected to.
### Workarounds
There is a simple way to work around the security issue
- Set the `force_https` to every tenant to `false`
### References
https://nvd.nist.gov/vuln/detail/CVE-2018-11784
### For more information
If you have any questions or comments about this advisory:
* Contact us in Discord: https://tenancy.dev/chat
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'hyn/multi-tenant'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.6.0'}, {'fixed': '5.7.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/tenancy/multi-tenant/security/advisories/GHSA-4r8q-gv9j-3xx6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32645'}, {'type': 'WEB', 'url': 'https://github.com/tenancy/multi-tenant/commit/9c837a21bccce9bcaeb90033ef200d84f0d9e164'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/hyn/multi-tenant'}, {'type': 'WEB', 'url': 'https://webmasters.googleblog.com/2009/01/open-redirect-urls-is-your-site-being.html'}]
|
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-27T20:40:11Z', 'nvd_published_at': '2021-05-27T17:15:00Z'}
|
1.4.0
|
GHSA-8v3j-jfg3-v3fv
|
2022-09-06T19:45:27Z
|
2022-03-18T00:01:11Z
| null |
['CVE-2021-44908']
|
Prototype Pollution in Sails.js
|
Sails.js <= 1.5.2 is vulnerable to Prototype Pollution via controller/load-action-modules.js, function loadActionModules(). A [patch](https://github.com/balderdashy/sails/commit/7c5379a656bb305c958df1dcc2b51a9668830358) is available in the `master` branch of Sails.js's GItHub repository.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'sails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44908'}, {'type': 'WEB', 'url': 'https://github.com/balderdashy/sails/issues/7209'}, {'type': 'WEB', 'url': 'https://github.com/balderdashy/sails/commit/7c5379a656bb305c958df1dcc2b51a9668830358'}, {'type': 'WEB', 'url': 'https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/sailsJS%20PoC.zip'}, {'type': 'PACKAGE', 'url': 'https://github.com/balderdashy/sails'}, {'type': 'WEB', 'url': 'https://github.com/balderdashy/sails/blob/master/lib/app/private/controller/load-action-modules.js#L32'}]
|
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T23:04:49Z', 'nvd_published_at': '2022-03-17T12:15:00Z'}
|
1.4.0
|
GHSA-42qm-c3cf-9wv2
|
2022-03-10T15:55:03Z
|
2022-03-03T00:00:49Z
| null |
['CVE-2022-0819']
|
Code injection in dolibarr/dolibarr
|
Improper php function sanitization, lead to an ability to inject arbitrary PHP code and run arbitrary commands on file system. In the function "dol_eval" in file "dolibarr/htdocs/core/lib/functions.lib.php" dangerous PHP functions are sanitized using "str_replace" and can be bypassed using following code in $s parameter
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '15.0.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0819'}, {'type': 'WEB', 'url': 'https://github.com/dolibarr/dolibarr/commit/2a48dd349e7de0d4a38e448b0d2ecbe25e968075'}, {'type': 'PACKAGE', 'url': 'https://github.com/dolibarr/dolibarr'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b03d4415-d4f9-48c8-9ae2-d3aa248027b5'}]
|
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-03T19:12:38Z', 'nvd_published_at': '2022-03-02T16:15:00Z'}
|
1.4.0
|
GHSA-vmf7-hmh6-vv57
|
2022-03-18T20:06:58Z
|
2022-03-05T00:00:46Z
| null |
['CVE-2022-23328']
|
Denial of Service in Go-Ethereum
|
A design flaw in all versions of Go-Ethereum allows an attacker node to send 5120 pending transactions of a high gas price from one account that all fully spend the full balance of the account to a victim Geth node, which can purge all of pending transactions in a victim node's memory pool and then occupy the memory pool to prevent new transactions from entering the pool, resulting in a denial of service (DoS).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ethereum/go-ethereum'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.10.16'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23328'}, {'type': 'WEB', 'url': 'https://dl.acm.org/doi/pdf/10.1145/3460120.3485369'}, {'type': 'PACKAGE', 'url': 'https://github.com/ethereum/go-ethereum'}, {'type': 'WEB', 'url': 'https://tristartom.github.io/docs/ccs21.pdf'}, {'type': 'WEB', 'url': 'http://ethereum.com'}, {'type': 'WEB', 'url': 'http://go-ethereum.com'}]
|
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-09T19:20:00Z', 'nvd_published_at': '2022-03-04T12:15:00Z'}
|
1.4.0
|
GHSA-66ww-999q-mffq
|
2022-03-25T14:29:33Z
|
2022-03-18T00:01:11Z
| null |
['CVE-2022-0748']
|
Arbitrary code execution in post-loader
|
post-loader is webpack loader for blog posts written in Markdown. The package post-loader from 0.0.0 is vulnerable to Arbitrary Code Execution which uses a markdown parser in an unsafe way so that any javascript code inside the markdown input files gets evaluated and executed. At this time, there is no known workaround or patch available.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'post-loader'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0748'}, {'type': 'PACKAGE', 'url': 'https://github.com/egoist/post-loader'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-POSTLOADER-2403737'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T23:01:29Z', 'nvd_published_at': '2022-03-17T12:15:00Z'}
|
1.4.0
|
GHSA-h2g5-2rhx-ffgj
|
2022-03-14T23:12:25Z
|
2022-03-05T00:00:44Z
| null |
['CVE-2022-24727']
|
Command injection in Weblate
|
Weblate is a web based localization tool with tight version control integration. Prior to version 4.11.1, Weblate didn't properly sanitize some arguments passed to Git and Mercurial, allowing them to change their behavior in an unintended way. Instances where untrusted users cannot create new components are not affected. The issues were fixed in the 4.11.1 release.
|
[]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'Weblate'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.11.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/WeblateOrg/weblate/security/advisories/GHSA-3872-f48p-pxqj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24727'}, {'type': 'WEB', 'url': 'https://github.com/WeblateOrg/weblate/commit/35d59f1f040541c358cece0a8d4a63183ca919b8'}, {'type': 'WEB', 'url': 'https://github.com/WeblateOrg/weblate/commit/d83672a3e7415da1490334e2c9431e5da1966842'}, {'type': 'PACKAGE', 'url': 'https://github.com/WeblateOrg/weblate'}]
|
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T23:12:25Z', 'nvd_published_at': '2022-03-04T17:15:00Z'}
|
1.4.0
|
GHSA-p4jg-pccf-h82c
|
2022-04-06T23:57:05Z
|
2022-03-31T00:00:24Z
| null |
['CVE-2022-27815']
|
Insecure Temporary File in SWHKD
|
SWHKD is a display protocol-independent hotkey daemon made in Rust. In SWHKD versions 1.1.5 and prior, SWHKD uses the /tmp/swhkd.pid pathname. As /tmp is accessible to all users, there can be an information leak or denial of service. No known workarounds exist. A patch is available on the `1.1.0` branch of the repository.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'Simple-Wayland-HotKey-Daemon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27815'}, {'type': 'WEB', 'url': 'https://github.com/waycrate/swhkd/commit/e661a4940df78fbb7b52c622ac4ae6a3a7f7d8aa'}, {'type': 'PACKAGE', 'url': 'https://github.com/waycrate/swhkd'}, {'type': 'WEB', 'url': 'https://github.com/waycrate/swhkd/releases'}, {'type': 'WEB', 'url': 'https://github.com/waycrate/swhkd/releases/tag/1.2.0'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/04/14/1'}]
|
{'cwe_ids': ['CWE-377', 'CWE-59'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T15:15:36Z', 'nvd_published_at': '2022-03-30T00:15:00Z'}
|
1.4.0
|
GHSA-chr6-386q-4m3v
|
2022-11-30T20:28:46Z
|
2022-03-16T00:00:44Z
| null |
['CVE-2022-27200']
|
Stored Cross-site Scripting vulnerability in Jenkins Folder-based Authorization Strategy Plugin
|
Jenkins Folder-based Authorization Strategy Plugin 1.3 and earlier does not escape the names of roles shown on the configuration form, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Overall/Administer permission.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:folder-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27200'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/folder-auth-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2646'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/03/15/2'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:28:46Z', 'nvd_published_at': '2022-03-15T17:15:00Z'}
|
1.4.0
|
GHSA-pq37-4c4g-v38c
|
2022-03-23T13:54:04Z
|
2022-03-15T00:01:02Z
| null |
['CVE-2022-0341']
|
Cross-site Scripting in vditor
|
vditor prior to version 3.8.11 is vulnerable to cross-site scripting.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'vditor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.11'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0341'}, {'type': 'WEB', 'url': 'https://github.com/Vanessa219/vditor/issues/1102'}, {'type': 'WEB', 'url': 'https://github.com/vanessa219/vditor/commit/219f8a9e272aba3cbc0096a82cac776532dbb9e5'}, {'type': 'PACKAGE', 'url': 'https://github.com/vanessa219/vditor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/fa546b57-bc15-4705-824e-9474b616f628'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-23T13:54:04Z', 'nvd_published_at': '2022-03-14T04:15:00Z'}
|
1.4.0
|
GHSA-2j6v-xpf3-xvrv
|
2022-03-10T15:59:41Z
|
2022-03-01T18:58:23Z
| null |
['CVE-2021-41193']
|
Use of Externally-Controlled Format String in wire-avs
|
### Impact
A remote format string vulnerability allowed an attacker to cause a denial of service or possibly execute arbitrary code.
### Patches
* The issue has been fixed in wire-avs 7.1.12 and is already included on all Wire products (currently used version is 8.0.x)
### Workarounds
* No workaround known
### References
* Fixed in commit https://github.com/wireapp/wire-avs/commit/40d373ede795443ae6f2f756e9fb1f4f4ae90bbe
### For more information
If you have any questions or comments about this advisory feel free to email us at [[email protected]](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.wire:avs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.1.12'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/wireapp/wire-avs/security/advisories/GHSA-2j6v-xpf3-xvrv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41193'}, {'type': 'WEB', 'url': 'https://github.com/wireapp/wire-avs/commit/40d373ede795443ae6f2f756e9fb1f4f4ae90bbe'}, {'type': 'PACKAGE', 'url': 'https://github.com/wireapp/wire-avs/'}]
|
{'cwe_ids': ['CWE-134'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T18:58:23Z', 'nvd_published_at': '2022-03-01T19:15:00Z'}
|
1.4.0
|
GHSA-8g9w-5jv6-7m4x
|
2022-11-30T18:45:18Z
|
2022-03-16T00:00:42Z
| null |
['CVE-2022-27218']
|
Personal tokens stored in plain text by Jenkins incapptic connect uploader Plugin
|
Jenkins incapptic connect uploader Plugin 1.15 and earlier stores tokens unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.incapptic.plugins:incapptic-connect-uploader'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.15'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27218'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/incapptic-connect-uploader-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2273'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/03/15/2'}]
|
{'cwe_ids': ['CWE-256', 'CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T18:45:18Z', 'nvd_published_at': '2022-03-15T17:15:00Z'}
|
1.4.0
|
GHSA-xpgc-j48j-jwv9
|
2022-03-30T14:53:34Z
|
2022-03-26T00:00:31Z
| null |
['CVE-2021-20323']
|
Cross-site Scripting in Keycloak
|
A POST based reflected Cross Site Scripting vulnerability on has been identified in Keycloak version 15. The issue was fixed in version 17.0.0.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0.0'}, {'fixed': '17.0.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20323'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2013577'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-30T14:53:34Z', 'nvd_published_at': '2022-03-25T19:15:00Z'}
|
1.4.0
|
GHSA-2877-693q-pj33
|
2022-03-14T21:30:21Z
|
2022-03-07T00:00:40Z
| null |
['CVE-2021-46704']
|
OS Command Injection in GenieACS
|
In GenieACS 1.2.x before 1.2.8, the UI interface API is vulnerable to unauthenticated OS command injection via the ping host argument (lib/ui/api.ts and lib/ping.ts). The vulnerability arises from insufficient input validation combined with a missing authorization check.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'genieacs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.8'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46704'}, {'type': 'WEB', 'url': 'https://github.com/genieacs/genieacs/commit/7f295beeecc1c1f14308a93c82413bb334045af6'}, {'type': 'PACKAGE', 'url': 'https://github.com/genieacs/genieacs'}, {'type': 'WEB', 'url': 'https://github.com/genieacs/genieacs/releases/tag/v1.2.8'}]
|
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-07T20:11:56Z', 'nvd_published_at': '2022-03-06T07:15:00Z'}
|
1.4.0
|
GHSA-jr9c-h74f-2v28
|
2023-06-30T20:12:44Z
|
2022-03-11T00:02:35Z
| null |
['CVE-2022-0905']
|
Gitea Missing Authorization vulnerability
|
Gitea 1.16.3 and prior is vulnerable to missing authorization. A patch is available as part of the 1.16.4 release.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'code.gitea.io/gitea'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.16.3'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0905'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/commit/1314f38b59748397b3429fb9bc9f9d6bac85d2f2'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/commit/3e5c844a7758fa29126d201f4f98bf21bca6d314'}, {'type': 'PACKAGE', 'url': 'https://github.com/go-gitea/gitea'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8d221f92-b2b1-4878-bc31-66ff272e5ceb'}]
|
{'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-11T20:32:37Z', 'nvd_published_at': '2022-03-10T15:15:00Z'}
|
1.4.0
|
GHSA-vxrc-68xx-x48g
|
2023-09-21T19:49:03Z
|
2022-03-26T00:25:25Z
| null |
['CVE-2019-9942']
|
Twig Sandbox Information Disclosure
|
A sandbox information disclosure exists in Twig before 1.38.0 and 2.x before 2.7.0 because, under some circumstances, it is possible to call the `__toString()` method on an object even if not allowed by the security policy in place.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'twig/twig'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.38.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'twig/twig'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.7.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-9942'}, {'type': 'WEB', 'url': 'https://github.com/twigphp/Twig/commit/eac5422956e1dcca89a3669a03a3ff32f0502077'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/twig/twig/CVE-2019-9942.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/twigphp/Twig'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Mar/60'}, {'type': 'WEB', 'url': 'https://symfony.com/blog/twig-sandbox-information-disclosure'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4419'}]
|
{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-03-26T00:25:25Z', 'nvd_published_at': '2019-03-23T15:29:00Z'}
|
1.4.0
|
GHSA-4fc4-4p5g-6w89
|
2022-03-30T20:05:59Z
|
2022-03-16T22:47:55Z
| null |
['CVE-2022-24728']
|
Cross-site Scripting in CKEditor4
|
### Affected packages
The vulnerability has been discovered in the core HTML processing module and may affect all plugins used by CKEditor 4.
### Impact
A potential vulnerability has been discovered in CKEditor 4 HTML processing core module. The vulnerability allowed to inject malformed HTML bypassing content sanitization, which could result in executing JavaScript code. It affects all users using the CKEditor 4 at version < 4.18.0.
### Patches
The problem has been recognized and patched. The fix will be available in version 4.18.0.
### For more information
Email us at [email protected] if you have any questions or comments about this advisory.
### Acknowledgements
The CKEditor 4 team would like to thank GHSL team member Kevin Backhouse ([@kevinbackhouse](https://github.com/kevinbackhouse)) for recognizing and reporting this vulnerability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'ckeditor4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.18.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-4fc4-4p5g-6w89'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24728'}, {'type': 'WEB', 'url': 'https://github.com/ckeditor/ckeditor4/commit/d158413449692d920a778503502dcb22881bc949'}, {'type': 'WEB', 'url': 'https://ckeditor.com/cke4/release/CKEditor-4.18.0'}, {'type': 'PACKAGE', 'url': 'https://github.com/ckeditor/ckeditor4'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/VR76VBN5GW5QUBJFHVXRX36UZ6YTCMW6/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/WOZGMCYDB2OKKULFXZKM6V7JJW4ZZHJP/'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2022-009_ckeditor4/'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2022-005'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-16T22:47:55Z', 'nvd_published_at': '2022-03-16T16:15:00Z'}
|
1.4.0
|
GHSA-v2rg-8cwr-75g8
|
2022-03-18T17:56:08Z
|
2022-03-18T17:56:08Z
| null |
['CVE-2021-25641']
|
Deserializer tampering in Apache Dubbo
|
Each Apache Dubbo server will set a serialization id to tell the clients which serialization protocol it is working on. But for Dubbo versions before 2.7.8 or 2.6.9, an attacker can choose which serialization id the Provider will use by tampering with the byte preamble flags, aka, not following the server's instruction. This means that if a weak deserializer such as the Kryo and FST are somehow in code scope (e.g. if Kryo is somehow a part of a dependency), a remote unauthenticated attacker can tell the Provider to use the weak deserializer, and then proceed to exploit it.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.7.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.alibaba:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.6.9'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25641'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r99ef7fa35585d3a68762de07e8d2b2bc48b8fa669a03e8d84b9673f3%40%3Cdev.dubbo.apache.org%3E'}]
|
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-02T19:44:59Z', 'nvd_published_at': '2021-06-01T14:15:00Z'}
|
1.4.0
|
GHSA-4f7p-27jc-3c36
|
2022-03-18T19:00:59Z
|
2022-03-18T19:00:59Z
| null |
['CVE-2022-24761']
|
HTTP Request Smuggling in waitress
|
### Impact
When using Waitress behind a proxy that does not properly validate the incoming HTTP request matches the RFC7230 standard, Waitress and the frontend proxy may disagree on where one request starts and where it ends.
This would allow requests to be smuggled via the front-end proxy to waitress and later behavior.
There are two classes of vulnerability that may lead to request smuggling that are addressed by this advisory:
- The use of Python's `int()` to parse strings into integers, leading to `+10` to be parsed as `10`, or `0x01` to be parsed as `1`, where as the standard specifies that the string should contain only digits or hex digits.
- Waitress does not support chunk extensions, however it was discarding them without validating that they did not contain illegal characters
### Patches
This has been fixed in Waitress 2.1.1
### Workarounds
When deploying a proxy in front of waitress, turning on any and all functionality to make sure that the request matches the RFC7230 standard. Certain proxy servers may not have this functionality though and users are encouraged to upgrade to the latest version of waitress instead.
### References
- https://portswigger.net/research/http-desync-attacks-request-smuggling-reborn
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the Github issue tracker](https://github.com/Pylons/waitress/issues) (if not security related/sensitive)
* Email us at [[email protected]](mailto:[email protected]) (If security related or sensitive)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'waitress'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/security/advisories/GHSA-4f7p-27jc-3c36'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24761'}, {'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/commit/9e0b8c801e4d505c2ffc91b891af4ba48af715e0'}, {'type': 'PACKAGE', 'url': 'https://github.com/Pylons/waitress'}, {'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/releases/tag/v2.1.1'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/05/msg00011.html'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5138'}]
|
{'cwe_ids': ['CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T19:00:59Z', 'nvd_published_at': '2022-03-17T13:15:00Z'}
|
1.4.0
|
GHSA-9fcc-7g44-mxrj
|
2022-03-29T17:30:52Z
|
2022-03-16T00:00:47Z
| null |
['CVE-2022-0942']
|
Cross-site Scripting in ShowDoc
|
ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via uploading files with files in `.xsd`, `.asa`, and `.aspx` formats.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0942'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a412707c-18da-4c84-adc0-9801ed8068c9'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T17:30:52Z', 'nvd_published_at': '2022-03-15T14:15:00Z'}
|
1.4.0
|
GHSA-vc5r-xfc4-4x22
|
2022-03-30T21:03:02Z
|
2022-03-25T00:00:33Z
| null |
['CVE-2022-0955']
|
Cross-site Scripting in Pimcore Datahub
|
Pimcore Datahub prior to 1.2.4 is vulnerable to stored cross-site scripting. An admin user accessing Datahub triggers the attack, which may result in the user's cookie being stolen.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/data-hub'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0955'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/data-hub/commit/15d5b57af2466eebd3bbc531ead5dafa35d0a36e'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/data-hub'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/708971a6-1e6c-4c51-a411-255caeba51df'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-30T21:03:02Z', 'nvd_published_at': '2022-03-24T15:15:00Z'}
|
1.4.0
|
GHSA-57j2-w4cx-62h2
|
2022-03-25T21:37:08Z
|
2022-03-12T00:00:36Z
| null |
['CVE-2020-36518']
|
Deeply nested json in jackson-databind
|
jackson-databind is a data-binding package for the Jackson Data Processor. jackson-databind allows a Java stack overflow exception and denial of service via a large depth of nested objects.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.13.0'}, {'fixed': '2.13.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.13.2.0'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.12.6.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.12.6.0'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36518'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2816'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/fcfc4998ec23f0b1f7f8a9521c2b317b6c25892b'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.12'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.13'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/05/msg00001.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/11/msg00035.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220506-0004/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5283'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]
|
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-22T14:36:44Z', 'nvd_published_at': '2022-03-11T07:15:00Z'}
|
1.4.0
|
GHSA-jc36-42cf-vqwj
|
2023-06-23T21:37:14Z
|
2022-03-26T00:00:33Z
| null |
['CVE-2018-25032']
|
Nokogiri affected by zlib's Out-of-bounds Write vulnerability
|
zlib 1.2.11 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.4'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25032'}, {'type': 'WEB', 'url': 'https://github.com/madler/zlib/issues/605'}, {'type': 'WEB', 'url': 'https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf'}, {'type': 'WEB', 'url': 'https://github.com/madler/zlib/compare/v1.2.11...v1.2.12'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2018-25032.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202210-42'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220526-0009/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220729-0004/'}, {'type': 'WEB', 'url': 'https://support.apple.com/kb/HT213255'}, {'type': 'WEB', 'url': 'https://support.apple.com/kb/HT213256'}, {'type': 'WEB', 'url': 'https://support.apple.com/kb/HT213257'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5111'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2022/03/24/1'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2022/03/28/1'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2022/03/28/3'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2022/May/33'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2022/May/35'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2022/May/38'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/03/25/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/03/26/1'}]
|
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-23T21:37:14Z', 'nvd_published_at': '2022-03-25T09:15:00Z'}
|
1.4.0
|
GHSA-h2fw-93qx-vrcq
|
2022-04-01T18:03:23Z
|
2022-03-26T00:00:29Z
| null |
['CVE-2022-0983']
|
SQL Injection in Moodle
|
An SQL injection risk was identified in Badges code relating to configuring criteria. Access to the relevant capability was limited to teachers and managers by default.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11.0'}, {'fixed': '3.11.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10.0'}, {'fixed': '3.10.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.13'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0983'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/c2794752ea3cdda2d64a0651da08b2cdf730d9f1'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2064119'}, {'type': 'WEB', 'url': 'https://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-74074'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/G4GRMWBGHOJMFXMTORECQNULJK7ZJJ6Y/'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T18:03:23Z', 'nvd_published_at': '2022-03-25T19:15:00Z'}
|
1.4.0
|
GHSA-3f95-r44v-8mrg
|
2022-03-17T21:46:01Z
|
2022-03-12T00:00:33Z
| null |
['CVE-2022-24433']
|
Command injection in simple-git
|
The package simple-git before 3.3.0 is vulnerable to Command Injection via argument injection. When calling the .fetch(remote, branch, handlerFn) function, both the remote and branch parameters are passed to the git fetch subcommand. By injecting some git options, it was possible to get arbitrary command execution.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'simple-git'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24433'}, {'type': 'WEB', 'url': 'https://github.com/steveukx/git-js/pull/767'}, {'type': 'PACKAGE', 'url': 'https://github.com/steveukx/git-js'}, {'type': 'WEB', 'url': 'https://github.com/steveukx/git-js/releases/tag/simple-git%403.3.0'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2421245'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SIMPLEGIT-2421199'}]
|
{'cwe_ids': ['CWE-74', 'CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T23:30:00Z', 'nvd_published_at': '2022-03-11T17:16:00Z'}
|
1.4.0
|
GHSA-2ccw-7px8-vmpf
|
2022-04-07T00:09:48Z
|
2022-03-25T19:27:39Z
| null |
['CVE-2022-24776']
|
Open Redirect in Flask-AppBuilder
|
Flask-AppBuilder is an application development framework built on top of Flask. Versions prior to 3.4.5 contain an open redirect vulnerability when using the database authentication login page. There are no known workarounds. Users are recommended to upgrade to version 3.4.5 or later.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Flask-AppBuilder](https://github.com/dpgaspar/Flask-AppBuilder)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'Flask-AppBuilder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.5'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder/security/advisories/GHSA-2ccw-7px8-vmpf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24776'}, {'type': 'WEB', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder/pull/1804'}, {'type': 'WEB', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder/pull/1804/commits/5214d975ebad2ff32057443d2cc20fef1c04d0ea'}, {'type': 'PACKAGE', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder'}, {'type': 'WEB', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder/releases/tag/v3.4.5'}]
|
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-25T19:27:39Z', 'nvd_published_at': '2022-03-24T20:15:00Z'}
|
1.4.0
|
GHSA-6fg4-36v7-xv32
|
2022-11-30T20:39:49Z
|
2022-03-16T00:00:45Z
| null |
['CVE-2022-27197']
|
Stored Cross-site Scripting vulnerability in Jenkins Dashboard View Plugin
|
Jenkins Dashboard View Plugin 2.18 and earlier does not perform URL validation for the Iframe Portlet's Iframe source URL, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to configure views.
Dashboard View Plugin 2.18.1 performs URL validation for the Iframe Portlet’s Iframe source URL.
Additionally, Dashboard View Plugin 2.18.1 sets the sandbox attribute for the iframe to restrict the included page.
In case of problems, the [Java system property](https://www.jenkins.io/doc/book/managing/system-properties/) `hudson.plugins.view.dashboard.core.IframePortlet.sandboxAttributeValue` can be used to customize the sandbox attribute value. The Java system property `hudson.plugins.view.dashboard.core.IframePortlet.doNotUseSandbox` can be used to disable the sandbox completely.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:dashboard-view'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.18.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27197'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/dashboard-view-plugin/commit/942c5c78fa834a6be242f144adc2b7f045ccdbc3'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/dashboard-view-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2559'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/03/15/2'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:39:49Z', 'nvd_published_at': '2022-03-15T17:15:00Z'}
|
1.4.0
|
GHSA-vhxc-fhm5-qcp9
|
2022-03-18T22:56:29Z
|
2022-03-18T00:01:11Z
| null |
['CVE-2022-25296']
|
Prototype Pollution in bodymen
|
The package bodymen from 0.0.0 are vulnerable to Prototype Pollution via the handler function which could be tricked into adding or modifying properties of Object.prototype using a __proto__ payload. **Note:** This vulnerability derives from an incomplete fix to [CVE-2019-10792](https://security.snyk.io/vuln/SNYK-JS-BODYMEN-548897)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'bodymen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25296'}, {'type': 'PACKAGE', 'url': 'https://github.com/diegohaz/bodymen'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-BODYMEN-2342623'}]
|
{'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T22:56:29Z', 'nvd_published_at': '2022-03-17T12:15:00Z'}
|
1.4.0
|
GHSA-v94v-pxqp-5qgj
|
2022-03-28T19:27:08Z
|
2022-03-16T00:00:48Z
| null |
['CVE-2022-0950']
|
Cross-site Scripting in ShowDoc
|
The upload feature of ShowDoc prior to version 2.10.4 allows files with the extension `.*html`, which leads to stored cross-site scripting.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0950'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/237ac6d43bf3728bf3587c486a23b4a48ea7acb3'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/acc23996-bd57-448f-9eb4-05a8a046c2dc'}]
|
{'cwe_ids': ['CWE-434', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-28T19:27:08Z', 'nvd_published_at': '2022-03-15T09:15:00Z'}
|
1.4.0
|
GHSA-mqvp-7rrg-9jxc
|
2022-03-29T19:10:58Z
|
2022-03-05T00:00:44Z
| null |
['CVE-2022-26336']
|
Improper Input Validation and Allocation of Resources Without Limits or Throttling in poi-scratchpad
|
A shortcoming in the HMEF package of poi-scratchpad (Apache POI) allows an attacker to cause an Out of Memory exception. This package is used to read TNEF files (Microsoft Outlook and Microsoft Exchange Server). If an application uses poi-scratchpad to parse TNEF files and the application allows untrusted users to supply them, then a carefully crafted file can cause an Out of Memory exception. This issue affects poi-scratchpad version 5.2.0 and prior versions. Users are recommended to upgrade to poi-scratchpad 5.2.1.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.poi:poi-scratchpad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26336'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/sprg0kq986pc2271dc3v2oxb1f9qx09j'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20221028-0006/'}]
|
{'cwe_ids': ['CWE-20', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-07T16:12:37Z', 'nvd_published_at': '2022-03-04T16:15:00Z'}
|
1.4.0
|
GHSA-gv9j-4w24-q7vx
|
2022-03-01T21:03:11Z
|
2022-03-01T21:03:11Z
| null |
[]
|
Improper random number generation in github.com/coredns/coredns
|
### Impact
CoreDNS before 1.6.6 (using go DNS package < 1.1.25) improperly generates random numbers because math/rand is used. The TXID becomes predictable, leading to response forgeries.
### Patches
The problem has been fixed in 1.6.6+.
### References
- [CVE-2019-19794](https://nvd.nist.gov/vuln/detail/CVE-2019-19794)
### For more information
Please consult [our security guide](https://github.com/coredns/coredns/blob/master/.github/SECURITY.md) for more information regarding our security process.
|
[]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/coredns/coredns'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.6'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/coredns/coredns/security/advisories/GHSA-gv9j-4w24-q7vx'}, {'type': 'PACKAGE', 'url': 'github.com/coredns/coredns'}]
|
{'cwe_ids': ['CWE-330'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T21:03:11Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-p93v-m2r2-4387
|
2022-03-01T21:05:01Z
|
2022-03-01T21:05:01Z
| null |
[]
|
Denial of service via insufficient metadata validation
|
The PAM module for `fscrypt` through v0.3.2 doesn't adequately validate `fscrypt` metadata files, allowing users to create malicious metadata files that prevent other users from logging in. A local user can cause a denial of service by creating a `fscrypt` metadata file that prevents other users from logging into the system. We recommend upgrading to v0.3.3 or above.
For more details, see [CVE-2022-25327](https://www.cve.org/CVERecord?id=CVE-2022-25327).
|
[]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/google/fscrypt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/google/fscrypt/security/advisories/GHSA-p93v-m2r2-4387'}, {'type': 'PACKAGE', 'url': 'github.com/google/fscrypt'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T21:05:01Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-4v37-24gm-h554
|
2022-03-01T21:47:28Z
|
2022-03-01T21:47:28Z
| null |
['CVE-2022-24712']
|
Cross-Site Request Forgery (CSRF) Protection Bypass Vulnerability in CodeIgniter4
|
### Impact
This vulnerability might allow remote attackers to bypass the CodeIgniter4 CSRF protection mechanism.
### Patches
Upgrade to v4.1.9 or later.
### Workarounds
These are workarounds for this vulnerability, but **you will still need to code as these after upgrading to v4.1.9**.
Otherwise, the CSRF protection may be bypassed.
#### When Auto-Routing is Enabled
1. Check the request method in the controller method before processing.
E.g.:
```php
if (strtolower($this->request->getMethod()) !== 'post') {
return $this->response->setStatusCode(405)->setBody('Method Not Allowed');
}
```
#### When Auto-Routing is Disabled
Do one of the following:
1. Do not use `$routes->add()`, and [use HTTP verbs in routes](https://codeigniter4.github.io/userguide/incoming/routing.html#using-http-verbs-in-routes).
2. Check the request method in the controller method before processing.
E.g.:
```php
if (strtolower($this->request->getMethod()) !== 'post') {
return $this->response->setStatusCode(405)->setBody('Method Not Allowed');
}
```
### References
- [CodeIgniter4 CSRF protection](https://codeigniter4.github.io/userguide/libraries/security.html#cross-site-request-forgery-csrf)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [codeigniter4/CodeIgniter4](https://github.com/codeigniter4/CodeIgniter4/issues)
* Email us at [SECURITY.md](https://github.com/codeigniter4/CodeIgniter4/blob/develop/SECURITY.md)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:L'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'codeigniter4/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.9'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/codeigniter4/CodeIgniter4/security/advisories/GHSA-4v37-24gm-h554'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24712'}, {'type': 'WEB', 'url': 'https://github.com/codeigniter4/CodeIgniter4/blob/7dc2ece32401ebde67122f7d2460efcaee7c352e/user_guide_src/source/changelogs/v4.1.9.rst'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T21:47:28Z', 'nvd_published_at': '2022-02-28T16:15:00Z'}
|
1.4.0
|
GHSA-gjh6-wvhq-h4qx
|
2022-03-29T19:04:44Z
|
2022-03-12T00:00:37Z
| null |
['CVE-2022-25507']
|
Cross-site Scripting in FreeTAKServer-UI
|
FreeTAKServer-UI v1.9.8 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Callsign parameter.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'FreeTAKServer-UI'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.9.8'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25507'}, {'type': 'WEB', 'url': 'https://github.com/FreeTAKTeam/UI/issues/28'}, {'type': 'PACKAGE', 'url': 'https://github.com/FreeTAKTeam/UI'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T19:04:44Z', 'nvd_published_at': '2022-03-11T00:15:00Z'}
|
1.4.0
|
GHSA-x75r-g63m-82wj
|
2022-11-30T18:55:24Z
|
2022-03-16T00:00:43Z
| null |
['CVE-2022-27216']
|
Passwords stored in plain text by Jenkins dbCharts Plugin
|
Jenkins dbCharts Plugin 0.5.2 and earlier stores JDBC connection passwords unencrypted in its global configuration file `hudson.plugins.dbcharts.DbChartPublisher.xml` on the Jenkins controller as part of its configuration.
These passwords can be viewed by users with access to the Jenkins controller file system.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:dbCharts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.5.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27216'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/dbCharts-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2159'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/03/15/2'}]
|
{'cwe_ids': ['CWE-522'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T18:55:24Z', 'nvd_published_at': '2022-03-15T17:15:00Z'}
|
1.4.0
|
GHSA-h3q4-vmw4-cpr5
|
2022-03-28T22:26:45Z
|
2022-03-16T00:00:38Z
| null |
['CVE-2021-29134']
|
Path Traversal in Gitea
|
The avatar middleware in Gitea before 1.13.6 allows Directory Traversal via a crafted URL.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'code.gitea.io/gitea'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.6'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29134'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/15125/files'}, {'type': 'PACKAGE', 'url': 'https://github.com/go-gitea/gitea'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/releases'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/releases/tag/v1.13.6'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T23:27:37Z', 'nvd_published_at': '2022-03-15T21:15:00Z'}
|
1.4.0
|
GHSA-mw75-qvfr-hpmr
|
2022-03-23T15:38:52Z
|
2022-03-15T00:01:01Z
| null |
['CVE-2022-0938']
|
Cross-site Scripting in ShowDoc
|
ShowDoc is vulnerable to stored cross-site scripting through file upload in versions 2.10.3 and prior. A patch is available and anticipated to be part of version 2.10.4.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.10.3'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0938'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/830c89a4c2c5fd0dd491422bf8e97b4eb5713f55'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3eb5a8f9-24e3-4eae-a212-070b2fbc237e'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-23T14:09:09Z', 'nvd_published_at': '2022-03-14T08:15:00Z'}
|
1.4.0
|
GHSA-vrcc-g6vj-mh5w
|
2022-03-30T20:05:12Z
|
2022-03-18T00:01:13Z
| null |
['CVE-2021-42219']
|
Denial of service in go-ethereum
|
Go-Ethereum v1.10.9 was discovered to contain an issue which allows attackers to cause a denial of service (DoS) via sending an excessive amount of messages to a node. This is caused by missing memory in the component /ethash/algorithm.go.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ethereum/go-ethereum'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.10.9'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42219'}, {'type': 'WEB', 'url': 'https://docs.google.com/document/d/1dYFSpNZPC0OV-n1mMqdc269u9yYU1XQy/edit?usp=sharing&ouid=112110745137218798745&rtpof=true&sd=true'}]
|
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T22:37:32Z', 'nvd_published_at': '2022-03-17T00:15:00Z'}
|
1.4.0
|
GHSA-fmx4-26r3-wxpf
|
2022-03-03T20:28:47Z
|
2022-03-03T20:28:47Z
| null |
[]
|
Integer overflow in cmark-gfm table parsing extension leads to heap memory corruption
|
### Impact
CommonMarker uses `cmark-gfm` for rendering [Github Flavored Markdown](https://github.github.com/gfm/). An [integer overflow in `cmark-gfm`'s table row parsing](https://github.com/github/cmark-gfm/security/advisories/GHSA-mc3g-88wq-6f4x) may lead to heap memory corruption when parsing tables who's marker rows contain more than UINT16_MAX columns. The impact of this heap corruption ranges from Information Leak to Arbitrary Code Execution.
If affected versions of CommonMarker are used for rendering remote user controlled markdown, this vulnerability may lead to Remote Code Execution (RCE).
### Patches
This vulnerability has been patched in the following CommonMarker release:
- v0.23.4
### Workarounds
The vulnerability exists in the table markdown extensions of `cmark-gfm`. Disabling any use of the table extension will prevent this vulnerability from being triggered.
### References
- https://github.com/github/cmark-gfm/security/advisories/GHSA-mc3g-88wq-6f4x
### Acknowledgements
We would like to thank Felix Wilhelm of Google's Project Zero for reporting this vulnerability
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [CommonMarker](http://github.com/gjtorikian/commonmarker)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'RubyGems', 'name': 'commonmarker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.23.4'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/github/cmark-gfm/security/advisories/GHSA-mc3g-88wq-6f4x'}, {'type': 'WEB', 'url': 'https://github.com/gjtorikian/commonmarker/security/advisories/GHSA-fmx4-26r3-wxpf'}, {'type': 'WEB', 'url': 'https://github.com/gjtorikian/commonmarker/commit/ab4504fd17460627a6ab255bc3c63e8e5fc6aed3'}, {'type': 'PACKAGE', 'url': 'https://github.com/gjtorikian/commonmarker'}]
|
{'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-03T20:28:47Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-85f9-w9cx-h363
|
2022-11-30T20:54:57Z
|
2022-03-30T00:00:23Z
| null |
['CVE-2022-28150']
|
Cross site request forgery in Jenkins Job and Node ownership Plugin
|
Job and Node ownership Plugin 0.13.0 and earlier does not perform a permission check in several HTTP endpoints. This allows attackers with Item/Read permission to change the owners and item-specific permissions of a job. Additionally, this endpoint does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.synopsys.jenkinsci:ownership'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.13.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28150'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ownership-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2062%20(1)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/03/29/1'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T15:35:41Z', 'nvd_published_at': '2022-03-29T13:15:00Z'}
|
1.4.0
|
GHSA-vx8q-j7h9-vf6q
|
2022-03-17T21:43:51Z
|
2022-03-11T00:02:24Z
| null |
['CVE-2022-0813']
|
Exposure of Sensitive Information to an Unauthorized Actor in PhpMyAdmin
|
PhpMyAdmin before 5.1.3 allows an attacker to retrieve potentially sensitive information by creating invalid requests. This affects the lang parameter, the pma_parameter, and the cookie section.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0813'}, {'type': 'WEB', 'url': 'https://www.incibe-cert.es/en/early-warning/security-advisories/phpmyadmin-exposure-sensitive-information'}, {'type': 'WEB', 'url': 'https://www.phpmyadmin.net/news/2022/2/11/phpmyadmin-4910-and-513-are-released/'}]
|
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T22:48:02Z', 'nvd_published_at': '2022-03-10T17:44:00Z'}
|
1.4.0
|
GHSA-x4jg-mjrx-434g
|
2022-03-30T20:07:56Z
|
2022-03-18T23:10:28Z
| null |
['CVE-2022-24772']
|
Improper Verification of Cryptographic Signature in node-forge
|
### Impact
RSA PKCS#1 v1.5 signature verification code does not check for tailing garbage bytes after decoding a `DigestInfo` ASN.1 structure. This can allow padding bytes to be removed and garbage data added to forge a signature when a low public exponent is being used.
### Patches
The issue has been addressed in `node-forge` `1.3.0`.
### References
For more information, please see
["Bleichenbacher's RSA signature forgery based on implementation error"](https://mailarchive.ietf.org/arch/msg/openpgp/5rnE9ZRN1AokBVj3VqblGlP63QE/)
by Hal Finney.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [forge](https://github.com/digitalbazaar/forge)
* Email us at [example email address](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'node-forge'}, 'ecosystem_specific': {'affected_functions': ['forge.pki.rsa']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/digitalbazaar/forge/security/advisories/GHSA-x4jg-mjrx-434g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24772'}, {'type': 'WEB', 'url': 'https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1'}, {'type': 'WEB', 'url': 'https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2'}, {'type': 'PACKAGE', 'url': 'https://github.com/digitalbazaar/forge'}]
|
{'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T23:10:28Z', 'nvd_published_at': '2022-03-18T14:15:00Z'}
|
1.4.0
|
GHSA-9hcj-449v-9234
|
2022-11-30T20:51:57Z
|
2022-03-30T00:00:23Z
| null |
['CVE-2022-28152']
|
CSRF vulnerability in Jenkins Job and Node ownership Plugin
|
A cross-site request forgery (CSRF) vulnerability in Jenkins Job and Node ownership Plugin 0.13.0 and earlier allows attackers to restore the default ownership of a job.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.synopsys.jenkinsci:ownership'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.13.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28152'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ownership-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2062%20(2)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/03/29/1'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:51:57Z', 'nvd_published_at': '2022-03-29T13:15:00Z'}
|
1.4.0
|
GHSA-78fm-qhh8-8858
|
2023-07-12T00:02:18Z
|
2022-03-12T00:00:32Z
| null |
['CVE-2021-32478']
|
Moodle reflected XSS
|
The redirect URI in the LTI authorization endpoint required extra sanitizing to prevent reflected XSS and open redirect risks. Moodle versions 3.10 to 3.10.3, 3.9 to 3.9.6, 3.8 to 3.8.8 and earlier unsupported versions are affected.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10'}, {'fixed': '3.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.10.3'}}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.9'}, {'fixed': '3.9.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.9.6'}}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.8'}, {'fixed': '3.8.9'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.8.8'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32478'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/752ad3d8eb4f9ac22dbf1461aa69d6e0baee503e'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=422314'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T00:02:18Z', 'nvd_published_at': '2022-03-11T18:15:00Z'}
|
1.4.0
|
GHSA-qwh6-xwj4-9cjg
|
2022-03-14T22:46:48Z
|
2022-03-05T00:00:41Z
| null |
['CVE-2021-46384']
|
Remote code execution in net.mingsoft:ms-mcms
|
net.mingsoft:ms-mcms <=5.2.5 is affected by: RCE. The impact is: execute arbitrary code (remote). The attack vector is: ${"freemarker.template.utility.Execute"?new()("calc")}. ¶¶ MCMS has a pre-auth RCE vulnerability through which allows unauthenticated attacker with network access via http to compromise MCMS. Successful attacks of this vulnerability can result in takeover of MCMS.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.6'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46384'}, {'type': 'WEB', 'url': 'https://gitee.com/mingSoft/MCMS/issues/I4QZ1O'}]
|
{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T22:46:48Z', 'nvd_published_at': '2022-03-04T22:15:00Z'}
|
1.4.0
|
GHSA-x63v-prhc-xx6f
|
2022-11-30T20:56:10Z
|
2022-03-30T00:00:23Z
| null |
['CVE-2022-28149']
|
Stored Cross-site Scripting vulnerability in Jenkins Job and Node ownership Plugin
|
Jenkins Job and Node ownership Plugin 0.13.0 and earlier does not escape the names of the secondary owners, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.synopsys.jenkinsci:ownership'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.13.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28149'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ownership-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2285'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/03/29/1'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:56:10Z', 'nvd_published_at': '2022-03-29T13:15:00Z'}
|
1.4.0
|
GHSA-mg5h-9rhq-4cqx
|
2022-03-23T15:40:15Z
|
2022-03-15T00:01:02Z
| null |
['CVE-2022-0937']
|
Cross-site Scripting in ShowDoc
|
ShowDoc is vulnerable to stored cross-site scripting through file upload in versions 2.10.3 and prior. A patch is available and anticipated to be part of version 2.10.4.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.10.3'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0937'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/42c0d9813df3035728b36116a6ce9116e6fa8ed3'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/6127739d-f4f2-44cd-ae3d-e3ccb7f0d7b5'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-23T13:57:41Z', 'nvd_published_at': '2022-03-14T03:15:00Z'}
|
1.4.0
|
GHSA-r7c9-c69m-rph8
|
2022-04-19T20:16:49Z
|
2022-03-26T00:19:30Z
| null |
['CVE-2017-9841']
|
Code Injection in PHPUnit
|
Util/PHP/eval-stdin.php in PHPUnit starting with 4.8.19 and before 4.8.28, as well as 5.x before 5.6.3, allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a `<?php ` substring, as demonstrated by an attack on a site with an exposed /vendor folder, i.e., external access to the /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php URI.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'phpunit/phpunit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.8.19'}, {'fixed': '4.8.28'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'phpunit/phpunit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.6.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-9841'}, {'type': 'WEB', 'url': 'https://github.com/sebastianbergmann/phpunit/pull/1955'}, {'type': 'WEB', 'url': 'https://github.com/sebastianbergmann/phpunit/pull/1956'}, {'type': 'WEB', 'url': 'https://github.com/sebastianbergmann/phpunit/commit/284a69fb88a2d0845d23f42974a583d8f59bf5a5'}, {'type': 'WEB', 'url': 'https://github.com/sebastianbergmann/phpunit/commit/3aaddb1c5bd9b9b8d070b4cf120e71c36fd08412'}, {'type': 'PACKAGE', 'url': 'https://github.com/sebastianbergmann/phpunit'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201711-15'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://web.archive.org/web/20170701212357/http://phpunit.vulnbusters.com/'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/101798'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1039812'}]
|
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-26T00:19:30Z', 'nvd_published_at': '2017-06-27T17:29:00Z'}
|
1.4.0
|
GHSA-5p9j-w2wx-qx4c
|
2022-03-14T21:19:27Z
|
2022-03-07T00:00:40Z
| null |
['CVE-2022-0869']
|
Open Redirect in django-spirit
|
django-spirit prior to version 0.12.3 is vulnerable to open redirect. In the /user/login endpoint, it doesn't check the value of the next parameter when the user is logged in and passes it directly to redirect which result to open redirect. This also affects /user/logout, /user/register, /user/login, /user/resend-activation.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'django-spirit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0869'}, {'type': 'WEB', 'url': 'https://github.com/nitely/spirit/commit/8f32f89654d6c30d56e0dd167059d32146fb32ef'}, {'type': 'PACKAGE', 'url': 'https://github.com/nitely/spirit'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ed335a88-f68c-4e4d-ac85-f29a51b03342'}]
|
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-07T20:17:27Z', 'nvd_published_at': '2022-03-06T10:15:00Z'}
|
1.4.0
|
GHSA-j3ff-xp6c-6gcc
|
2022-03-18T18:57:53Z
|
2022-03-18T18:57:53Z
| null |
['CVE-2022-24759']
|
Failure to validate signature during handshake
|
### Impact
`@chainsafe/libp2p-noise` before 4.1.2 and 5.0.3 was not correctly validating signatures during the handshake process.
This may allow a man-in-the-middle to pose as other peers and get those peers banned.
### Patches
Users should upgrade to 4.1.2 or 5.0.3
### Workarounds
No workarounds, just patch upgrade
### References
https://github.com/ChainSafe/js-libp2p-noise/pull/130
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@chainsafe/libp2p-noise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@chainsafe/libp2p-noise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/ChainSafe/js-libp2p-noise/security/advisories/GHSA-j3ff-xp6c-6gcc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24759'}, {'type': 'WEB', 'url': 'https://github.com/ChainSafe/js-libp2p-noise/pull/130'}, {'type': 'PACKAGE', 'url': 'https://github.com/ChainSafe'}, {'type': 'WEB', 'url': 'https://github.com/ChainSafe/js-libp2p-noise/releases/tag/v5.0.3'}]
|
{'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T18:57:53Z', 'nvd_published_at': '2022-03-17T17:15:00Z'}
|
1.4.0
|
GHSA-wg8p-w946-c482
|
2022-03-29T16:42:37Z
|
2022-03-16T00:00:47Z
| null |
['CVE-2022-0956']
|
Cross-site Scripting in ShowDoc
|
ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via file upload.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0956'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/56e450c3adf75c707500d7231a78c9fc894c7f13'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/5b0e3f02-309f-4b59-8020-d7ac0f1999f2'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T16:42:37Z', 'nvd_published_at': '2022-03-15T13:15:00Z'}
|
1.4.0
|
GHSA-7f63-h6g3-7cwm
|
2022-03-10T15:59:12Z
|
2022-03-01T22:09:25Z
| null |
['CVE-2022-24717']
|
Cross Site Scripting (XSS) in @finastra/ssr-pages
|
A cross site scripting (XSS) issue can occur when providing untrusted input to the `redirect.link` property as an argument to the `build(MessagePageOptions)` function.
### References
- https://github.com/Finastra/ssr-pages/pull/2
- https://github.com/Finastra/ssr-pages/pull/2/commits/133606ffaec2edd9918d9fba5771ed21da7876a5
- https://github.com/Finastra/ssr-pages/commit/98abc59e28fec48246be0d59ac144675d6361073
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@finastra/ssr-pages'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.5'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/Finastra/ssr-pages/security/advisories/GHSA-7f63-h6g3-7cwm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24717'}, {'type': 'WEB', 'url': 'https://github.com/Finastra/ssr-pages/pull/2'}, {'type': 'WEB', 'url': 'https://github.com/Finastra/ssr-pages/pull/2/commits/133606ffaec2edd9918d9fba5771ed21da7876a5'}, {'type': 'WEB', 'url': 'https://github.com/Finastra/ssr-pages/commit/98abc59e28fec48246be0d59ac144675d6361073'}, {'type': 'PACKAGE', 'url': 'https://github.com/Finastra/ssr-pages'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T22:09:25Z', 'nvd_published_at': '2022-03-01T19:15:00Z'}
|
1.4.0
|
GHSA-rwg2-w82x-v57j
|
2022-11-30T20:49:11Z
|
2022-03-30T00:00:26Z
| null |
['CVE-2022-28155']
|
XML External Entity Reference vulnerability in Jenkins Pipeline: Phoenix AutoTest Plugin
|
Jenkins Pipeline: Phoenix AutoTest Plugin 1.3 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
This allows attackers able to control the input files for the `readXml` or `writeXml` build step to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.surenpi.jenkins:phoenix-autotest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28155'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/phoenix-autotest-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-1897'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/03/29/1'}]
|
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:49:11Z', 'nvd_published_at': '2022-03-29T13:15:00Z'}
|
1.4.0
|
GHSA-322v-p3jc-7hrg
|
2022-03-30T18:05:15Z
|
2022-03-26T00:00:34Z
| null |
['CVE-2022-25576']
|
Cross-Site Request Forgery in Anchor CMS
|
Anchor CMS v0.12.7 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component anchor/routes/posts.php. This vulnerability allows attackers to arbitrarily delete posts.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'anchorcms/anchor-cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.12.7'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25576'}, {'type': 'PACKAGE', 'url': 'https://github.com/anchorcms/anchor-cms'}, {'type': 'WEB', 'url': 'https://github.com/butterflyhack/anchorcms-0.12.7-CSRF'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-30T18:05:15Z', 'nvd_published_at': '2022-03-24T23:15:00Z'}
|
1.4.0
|
GHSA-j34v-3552-5r7j
|
2022-03-01T22:04:17Z
|
2022-03-01T22:04:17Z
| null |
[]
|
Multiple security issues in Pomerium's embedded envoy
|
Envoy, which Pomerium is based on, has issued multiple CVEs impacting stability and security.
Though Pomerium may not be vulnerable to all of the issues, it is recommended that all users upgrade to Pomerium v0.16.4 as soon as possible to minimize risk.
### Impact
- Possible DoS or crash
- Resources available to unauthorized users
- Pomerium may trust upstream certificates that should not be trusted
### Patches
Patched in v0.16.4
### Workarounds
No
### References
[Envoy Security Announcement](https://groups.google.com/g/envoy-security-announce/c/QBGxoqZdTR4)
* [CVE-2021-43824](https://github.com/envoyproxy/envoy/security/advisories/GHSA-vj5m-rch8-5r2p) (CVSS Score 6.5, Medium): Envoy 1.21.0 and earlier - Potential null pointer dereference when using JWT filter safe_regex match
* [CVE-2021-43825](https://github.com/envoyproxy/envoy/security/advisories/GHSA-h69p-g6xg-mhhh) (CVSS Score 6.1, Medium): Envoy 1.21.0 and earlier - Use-after-free when response filters increase response data, and increased data exceeds downstream buffer limits.
* [CVE-2021-43826](https://github.com/envoyproxy/envoy/security/advisories/GHSA-cmx3-fvgf-83mf) (CVSS Score 6.1, Medium): Envoy 1.21.0 and earlier - Use-after-free when tunneling TCP over HTTP, if downstream disconnects during upstream connection establishment
* [CVE-2022-21654](https://github.com/envoyproxy/envoy/security/advisories/GHSA-5j4x-g36v-m283) (CVSS Score 7.3, High): Envoy 1.7.0 and later - Incorrect configuration handling allows mTLS session re-use without re-validation after validation settings have changed.
* [CVE-2022-21655](https://github.com/envoyproxy/envoy/security/advisories/GHSA-7r5p-7fmh-jxpg) (CVSS Score 7.5, High): Envoy 1.21 and earlier - Incorrect handling of internal redirects to routes with a direct response entry
* [CVE-2022-21657](https://github.com/envoyproxy/envoy/security/advisories/GHSA-837m-wjrv-vm5g) (CVSS Score 3.1, Low): Envoy 1.20.1 and earlier - X.509 Extended Key Usage and Trust Purposes bypass
### For more information
If you have any questions or comments about this advisory:
Open an issue in [pomerium/pomerium](https://github.com/pomerium/pomerium/issues)
Email us at [[email protected]](mailto:[email protected])
|
[]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/pomerium/pomerium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.16.4'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pomerium/pomerium/security/advisories/GHSA-j34v-3552-5r7j'}, {'type': 'PACKAGE', 'url': 'https://github.com/pomerium/pomerium'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T22:04:17Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-794j-hx96-4w3m
|
2022-11-30T20:04:51Z
|
2022-03-16T00:00:42Z
| null |
['CVE-2022-27211']
|
CSRF vulnerability and missing permission checks in Jenkins kubernetes-cd Plugin allow capturing credentials
|
A missing/An incorrect permission check in Jenkins Kubernetes Continuous Deploy Plugin 2.3.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified SSH server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:kubernetes-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27211'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/kubernetes-cd-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2681'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/03/15/2'}]
|
{'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:04:51Z', 'nvd_published_at': '2022-03-15T17:15:00Z'}
|
1.4.0
|
GHSA-fqpx-xfjr-2qr9
|
2022-11-30T20:20:51Z
|
2022-03-16T00:00:44Z
| null |
['CVE-2022-27204']
|
CSRF vulnerability and missing permission checks in Jenkins Extended Choice Parameter Plugin allow SSRF
|
Extended Choice Parameter Plugin 346.vd87693c5a_86c and earlier does not perform a permission check on form validation methods. This allows attackers with Overall/Read permission to connect to an attacker-specified URL.
Additionally, these form validation methods do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:extended-choice-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '346.vd87693c5a'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27204'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/extended-choice-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-1350'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/03/15/2'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:20:51Z', 'nvd_published_at': '2022-03-15T17:15:00Z'}
|
1.4.0
|
GHSA-97m3-w2cp-4xx6
|
2022-03-25T19:58:47Z
|
2022-03-16T23:54:32Z
| null |
['CVE-2022-23812']
|
Embedded Malicious Code in node-ipc
|
The package node-ipc versions 10.1.1 and 10.1.2 are vulnerable to embedded malicious code that was introduced by the maintainer. The malicious code was intended to overwrite arbitrary files dependent upon the geo-location of the user IP address. The maintainer removed the malicious code in version 10.1.3.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'node-ipc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.1.1'}, {'fixed': '10.1.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23812'}, {'type': 'WEB', 'url': 'https://github.com/RIAEvangelist/node-ipc/issues/233'}, {'type': 'WEB', 'url': 'https://github.com/RIAEvangelist/node-ipc/issues/236'}, {'type': 'WEB', 'url': 'https://github.com/RIAEvangelist/node-ipc/commit/847047cf7f81ab08352038b2204f0e7633449580'}, {'type': 'PACKAGE', 'url': 'https://github.com/RIAEvangelist/node-ipc'}, {'type': 'WEB', 'url': 'https://github.com/RIAEvangelist/node-ipc/blob/847047cf7f81ab08352038b2204f0e7633449580/dao/ssl-geospec.js'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220407-0005/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NODEIPC-2426370'}]
|
{'cwe_ids': ['CWE-506', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-16T23:54:32Z', 'nvd_published_at': '2022-03-16T16:15:00Z'}
|
1.4.0
|
GHSA-pgq6-ccqj-hpqr
|
2023-07-03T21:35:11Z
|
2022-03-04T00:00:15Z
| null |
['CVE-2022-23708']
|
Elasticsearch privilege escalation
|
A flaw was discovered in Elasticsearch 7.17.0’s upgrade assistant, in which upgrading from version 6.x to 7.x would disable the in-built protections on the security index, allowing authenticated users with “*” index permissions access to this index. Users running a cluster on an affected version that had previously been upgraded from 6.x, should upgrade to 7.17.1. Users that are planning to upgrade from 6.x should not perform an upgrade from 6.x to versions 7.16 through 7.17.0 and should use 7.17.1+ for upgrades from 6.x.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.16.0'}, {'fixed': '7.17.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23708'}, {'type': 'WEB', 'url': 'https://discuss.elastic.co/t/elastic-stack-7-17-1-security-update/298447'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220729-0003/'}]
|
{'cwe_ids': ['CWE-269'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-04T21:08:50Z', 'nvd_published_at': '2022-03-03T22:15:00Z'}
|
1.4.0
|
GHSA-6956-83fg-5wc5
|
2022-03-29T21:05:15Z
|
2022-03-18T00:01:11Z
| null |
['CVE-2022-25354']
|
Prototype Pollution in set-in
|
The package set-in before 2.0.3 is vulnerable to Prototype Pollution via the `setIn` method, as it allows an attacker to merge object prototypes into it. **Note:** This vulnerability derives from an incomplete fix of [CVE-2020-28273](https://security.snyk.io/vuln/SNYK-JS-SETIN-1048049)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'set-in'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25354'}, {'type': 'WEB', 'url': 'https://github.com/ahdinosaur/set-in/commit/6bad255961d379e4b1f5fbc52ef9dc8420816f24'}, {'type': 'PACKAGE', 'url': 'https://github.com/ahdinosaur/set-in'}, {'type': 'WEB', 'url': 'https://github.com/ahdinosaur/set-in/blob/dfc226d95cce8129de6708661e06e0c2c06f3490/index.js%23L5'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SETIN-2388571'}]
|
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T22:42:31Z', 'nvd_published_at': '2022-03-17T12:15:00Z'}
|
1.4.0
|
GHSA-j29f-m23h-3p8p
|
2022-03-29T15:16:19Z
|
2022-03-17T00:00:48Z
| null |
['CVE-2022-0911']
|
Cross-site Scripting in Pimcore
|
Pimcore 10.3.3 and prior is vulnerable to stored cross-site scripting. A patch is available on the 10.x branch and will likely be part of version 10.4.0.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.3.3'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0911'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/11447'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b242edb1-b036-4dca-9b53-891494dd7a77'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T15:16:19Z', 'nvd_published_at': '2022-03-16T09:15:00Z'}
|
1.4.0
|
GHSA-w749-p3v6-hccq
|
2022-06-21T15:59:23Z
|
2022-03-08T21:25:54Z
| null |
['CVE-2022-21831']
|
Possible code injection vulnerability in Rails / Active Storage
|
The Active Storage module of Rails starting with version 5.2.0 is possibly vulnerable to code injection. This issue was patched in versions 5.2.6.3, 6.0.4.7, 6.1.4.7, and 7.0.2.3. To work around this issue, applications should implement a strict allow-list on accepted transformation methods or arguments. Additionally, a strict ImageMagick security policy will help mitigate this issue.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'RubyGems', 'name': 'activestorage'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.0'}, {'fixed': '5.2.6.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.6.2'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'activestorage'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.4.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.4.6'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'activestorage'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.0'}, {'fixed': '6.1.4.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.1.4.6'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'activestorage'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.2.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.2.2'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21831'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/0a72f7d670e9aa77a0bb8584cb1411ddabb7546e'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-w749-p3v6-hccq'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activestorage/CVE-2022-21831.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rubyonrails-security/c/n-p-W1yxatI'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/09/msg00002.html'}, {'type': 'WEB', 'url': 'https://rubysec.com/advisories/CVE-2022-21831/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20221118-0001/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5372'}]
|
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-08T21:25:54Z', 'nvd_published_at': '2022-05-26T17:15:00Z'}
|
1.4.0
|
GHSA-rr8m-29g8-8cgc
|
2022-04-01T20:06:24Z
|
2022-03-26T00:00:32Z
| null |
['CVE-2022-1064']
|
SQL Injection in Fork CMS
|
Fork CMS is vulnerable to SQL injection through marking blog comments on bulk as spam in versions prior to 5.11.1.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'forkcms/forkcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.11.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1064'}, {'type': 'WEB', 'url': 'https://github.com/forkcms/forkcms/commit/6aca30e10b4181534f73f96d6e2ebeb45ec15069'}, {'type': 'PACKAGE', 'url': 'https://github.com/forkcms/forkcms'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/2f664985-c5fc-485b-b4fc-4c401be2cf40'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-30T16:42:34Z', 'nvd_published_at': '2022-03-25T12:15:00Z'}
|
1.4.0
|
GHSA-7q88-jxvp-9gp2
|
2023-07-07T19:15:57Z
|
2022-03-22T00:00:41Z
| null |
['CVE-2022-26960']
|
Path Traversal in Studio-42 elFinder through 2.1.60
|
`connector.minimal.php` in std42 elFinder through 2.1.60 is affected by path traversal. This allows unauthenticated remote attackers to read, write, and browse files outside the configured document root. This is due to improper handling of absolute file paths.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'studio-42/elfinder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.61'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.1.60'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26960'}, {'type': 'WEB', 'url': 'https://github.com/Studio-42/elFinder/commit/3b758495538a448ac8830ee3559e7fb2c260c6db'}, {'type': 'WEB', 'url': 'https://www.synacktiv.com/publications/elfinder-the-story-of-a-repwning.html'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T19:15:57Z', 'nvd_published_at': '2022-03-21T17:15:00Z'}
|
1.4.0
|
GHSA-q863-cchm-c6c6
|
2022-03-30T20:34:44Z
|
2022-03-25T00:00:33Z
| null |
['CVE-2022-0153']
|
SQL Injection in Fork CMS
|
Fork CMS contains a SQL injection vulnerability in versions prior to version 5.11.1. When deleting submissions which belong to a formular (made with module `FormBuilder`), the parameter `id[]` is vulnerable to SQL injection.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'forkcms/forkcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.11.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0153'}, {'type': 'WEB', 'url': 'https://github.com/forkcms/forkcms/commit/7a12046a67ae5d8cf04face3ee75e55f03a1a608'}, {'type': 'PACKAGE', 'url': 'https://github.com/forkcms/forkcms'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/841503dd-311c-470a-a8ec-d4579b3274eb'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T20:36:57Z', 'nvd_published_at': '2022-03-24T17:15:00Z'}
|
1.4.0
|
GHSA-5mwx-f6w6-7w5r
|
2022-03-10T22:00:31Z
|
2022-03-04T00:00:19Z
| null |
['CVE-2022-24563']
|
Cross-site Scripting in GeniXCMS
|
In Genixcms v1.1.11, a stored Cross-Site Scripting (XSS) vulnerability exists in /gxadmin/index.php?page=themes&view=options" via the intro_title and intro_image parameters.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'genix/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.11'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24563'}, {'type': 'WEB', 'url': 'https://genix.me/'}, {'type': 'PACKAGE', 'url': 'https://github.com/semplon/GeniXCMS'}, {'type': 'WEB', 'url': 'https://github.com/truonghuuphuc/CVE'}, {'type': 'WEB', 'url': 'https://github.com/truonghuuphuc/CVE/blob/main/CVE-2022-24563.pdf'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-10T22:00:31Z', 'nvd_published_at': '2022-03-03T02:15:00Z'}
|
1.4.0
|
GHSA-ph3v-2hq5-5qfq
|
2022-03-11T20:30:20Z
|
2022-03-07T00:00:41Z
| null |
['CVE-2021-46703']
|
Code injection in RazorEngine
|
In the IsolatedRazorEngine component of Antaris RazorEngine through 4.5.1-alpha001, an attacker can execute arbitrary .NET code in a sandboxed environment (if users can externally control template contents). NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
|
[]
|
[{'package': {'ecosystem': 'NuGet', 'name': 'RazorEngine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.5.1-alpha001'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46703'}, {'type': 'WEB', 'url': 'https://github.com/Antaris/RazorEngine/issues/585'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-11T20:30:20Z', 'nvd_published_at': '2022-03-06T06:15:00Z'}
|
1.4.0
|
GHSA-xm3x-787m-p66r
|
2022-03-29T17:35:55Z
|
2022-03-16T00:00:46Z
| null |
['CVE-2022-0964']
|
Cross-site Scripting in ShowDoc
|
ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via `.webmv` file upload.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0964'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/dbe39998-8eb7-46ea-997f-7b27f6f16ea0'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T17:33:31Z', 'nvd_published_at': '2022-03-15T16:15:00Z'}
|
1.4.0
|
GHSA-6x2m-w449-qwx7
|
2022-03-18T17:47:49Z
|
2022-03-15T20:13:38Z
| null |
['CVE-2022-0811']
|
Code Injection in CRI-O
|
### Impact
A flaw introduced in CRI-O version 1.19 which an attacker can use to bypass the safeguards and set arbitrary kernel parameters on the host. As a result, anyone with rights to deploy a pod on a Kubernetes cluster that uses the CRI-O runtime can abuse the `kernel.core_pattern` kernel parameter to achieve container escape and arbitrary code execution as root on any node in the cluster.
### Patches
The patches will be present in 1.19.6, 1.20.7, 1.21.6, 1.22.3, 1.23.2, 1.24.0
### Workarounds
- Users can set manage_ns_lifecycle to false, which causes the sysctls to be configured by the OCI runtime, which typically filter these cases. This option is available in 1.20 and 1.19. Newer versions don't have this option.
- An admission webhook could be created to deny pods that specify a `+` in the sysctl value of a pod.
- A [PodSecurityPolicy](https://kubernetes.io/docs/tasks/administer-cluster/sysctl-cluster/#podsecuritypolicy) [deprecated] could be created, specifying all sysctls as forbidden like so:
```
apiVersion: policy/v1beta1
kind: PodSecurityPolicy
metadata:
name: sysctl-psp
spec:
forbiddenSysctls:
- "*"
```
However, this option will not work if any sysctls are required by any pods in the cluster.
### Credits
Credit for finding this vulnerability goes to John Walker and Manoj Ahuje of Crowdstrike. The CRI-O community deeply thanks them for the report.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the CRI-O repo](http://github.com/cri-o/cri-o/issues)
* To make a report, email your vulnerability to the private
[[email protected]](mailto:[email protected]) list
with the security details and the details expected for [all CRI-O bug
reports](https://github.com/cri-o/cri-o/blob/main/.github/ISSUE_TEMPLATE/bug-report.yml).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cri-o/cri-o'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.19.0'}, {'fixed': '1.19.6'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/cri-o/cri-o'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.20.0'}, {'fixed': '1.20.7'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/cri-o/cri-o'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.21.0'}, {'fixed': '1.21.6'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/cri-o/cri-o'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.22.0'}, {'fixed': '1.22.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/cri-o/cri-o'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.23.0'}, {'fixed': '1.23.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/cri-o/cri-o/security/advisories/GHSA-6x2m-w449-qwx7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0811'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2022-0811'}, {'type': 'WEB', 'url': 'https://bugs.gentoo.org/835336'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2059475'}, {'type': 'PACKAGE', 'url': 'https://github.com/cri-o/cri-o'}, {'type': 'WEB', 'url': 'https://www.crowdstrike.com/blog/cr8escape-zero-day-vulnerability-discovered-in-cri-o-container-engine-cve-2022-0811/'}]
|
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-15T20:13:38Z', 'nvd_published_at': '2022-03-16T15:15:00Z'}
|
1.4.0
|
GHSA-gq77-3r6x-383w
|
2022-03-23T14:22:08Z
|
2022-03-13T00:00:54Z
| null |
['CVE-2022-0880']
|
Cross-site Scripting in ShowDoc
|
ShowDoc version 2.10.3 and prior is vulnerable to stored cross-site scripting. A patch is available and anticipated to be part of version 2.10.4.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.10.3'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0880'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/818d7fe731f452acccacf731ce47ec27ad68049c'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/df347aa9-ed9b-4f75-af99-c83b8aad3bcf'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-23T14:22:08Z', 'nvd_published_at': '2022-03-12T04:15:00Z'}
|
1.4.0
|
GHSA-hm3x-jwwf-jpr9
|
2022-03-31T20:43:24Z
|
2022-03-24T00:00:17Z
| null |
['CVE-2021-4180']
|
Exposure of Sensitive Information to an Unauthorized Actor in OpenStack tripleo-heat-templates
|
An information exposure flaw in openstack-tripleo-heat-templates allows an external user to discover the internal IP or hostname. An attacker could exploit this by checking the `www_authenticate_uri parameter` (which is visible to all end users) in configuration files. This would give sensitive information which may aid in additional system exploitation. A patch is available on the `master` branch and anticipated to be part of version 11.6.1.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'tripleo-heat-templates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.6.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 11.6.0'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4180'}, {'type': 'WEB', 'url': 'https://github.com/openstack/tripleo-heat-templates/commit/160936df134a471cfd245bd60964046027a571ea'}, {'type': 'WEB', 'url': 'https://github.com/openstack/tripleo-heat-templates/commit/2b9461e97fc5c4ceb0848d1cc4484f656bb85515'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/tripleo/+bug/1955397'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2035793'}, {'type': 'PACKAGE', 'url': 'https://github.com/openstack/tripleo-heat-templates'}]
|
{'cwe_ids': ['CWE-200', 'CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-31T20:43:24Z', 'nvd_published_at': '2022-03-23T20:15:00Z'}
|
1.4.0
|
GHSA-874r-46c6-7p4r
|
2022-11-30T20:42:25Z
|
2022-03-16T00:00:45Z
| null |
['CVE-2022-27196']
|
Stored Cross-site Scripting vulnerability in Jenkins Favorite Plugin
|
Jenkins Favorite Plugin 2.4.0 and earlier does not escape the names of jobs in the favorite column, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure or Item/Create permissions.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jvnet.hudson.plugins:favorite'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27196'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/favorite-plugin/commit/543a4d87c4fade02173f793905a99adec517bc3b'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/favorite-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2557'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/03/15/2'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:42:25Z', 'nvd_published_at': '2022-03-15T17:15:00Z'}
|
1.4.0
|
GHSA-28mg-98xm-q493
|
2022-03-18T21:19:29Z
|
2022-03-08T00:00:32Z
| null |
['CVE-2022-0697']
|
Open Redirect in archivy
|
archivy prior to version 1.7.1 is vulnerable to open redirect.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'archivy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0697'}, {'type': 'WEB', 'url': 'https://github.com/archivy/archivy/commit/2d8cb29853190d42572b36deb61127e68d6be574'}, {'type': 'PACKAGE', 'url': 'https://github.com/archivy/archivy'}, {'type': 'WEB', 'url': 'https://github.com/archivy/archivy/releases/tag/v1.7.1'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/archivy/PYSEC-2022-161.yaml'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/2d0301a2-10ff-48f4-a346-5a0e8707835b'}]
|
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-08T17:48:14Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-4jp3-q2qm-9fmw
|
2022-03-28T22:31:17Z
|
2022-03-14T21:55:33Z
| null |
['CVE-2022-24733']
|
Improper Restriction of Rendered UI Layers or Frames in Sylius
|
### Impact
It is possible for a page controlled by an attacker to load the website within an iframe. This will enable a clickjacking attack, in which the attacker's page overlays the target application's interface with a different interface provided by the attacker
### Patches
The issue is fixed in versions: 1.9.10, 1.10.11, 1.11.2, and above.
### Workarounds
Every response from app should have an X-Frame-Options header set to: ``sameorigin``. To achieve that you just need to add a new **subscriber** in your app.
```php
<?php
// src/EventListener/XFrameOptionsSubscriber.php
namespace App\EventListener
final class XFrameOptionsSubscriber implements EventSubscriberInterface
{
public static function getSubscribedEvents(): array
{
return [
KernelEvents::RESPONSE => 'onKernelResponse',
];
}
public function onKernelResponse(ResponseEvent $event): void
{
if (!$this->isMainRequest($event)) {
return;
}
$response = $event->getResponse();
$response->headers->set('X-Frame-Options', 'sameorigin');
}
private function isMainRequest(ResponseEvent $event): bool
{
if (\method_exists($event, 'isMainRequest')) {
return $event->isMainRequest();
}
return $event->isMasterRequest();
}
}
```
And register it in the container:
```yaml
# config/services.yaml
services:
# ...
App\EventListener\XFrameOptionsSubscriber:
tags: ['kernel.event_subscriber']
```
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Sylius issues](https://github.com/Sylius/Sylius/issues)
* Email us at [[email protected]](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'sylius/sylius'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/sylius'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.10.11'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/sylius'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/Sylius/Sylius/security/advisories/GHSA-4jp3-q2qm-9fmw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24733'}, {'type': 'PACKAGE', 'url': 'https://github.com/Sylius/Sylius'}, {'type': 'WEB', 'url': 'https://github.com/Sylius/Sylius/releases/tag/v1.10.11'}, {'type': 'WEB', 'url': 'https://github.com/Sylius/Sylius/releases/tag/v1.11.2'}, {'type': 'WEB', 'url': 'https://github.com/Sylius/Sylius/releases/tag/v1.9.10'}]
|
{'cwe_ids': ['CWE-1021'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T21:55:33Z', 'nvd_published_at': '2022-03-14T19:15:00Z'}
|
1.4.0
|
GHSA-m8gq-83gh-v42v
|
2022-03-18T23:52:30Z
|
2022-03-16T00:00:49Z
| null |
['CVE-2022-27193']
|
XML External Entities Vulnerability in CVRF-CSAF-Converter
|
CVRF-CSAF-Converter before 1.0.0-rc2 resolves XML External Entities (XXE). This leads to the inclusion of arbitrary (local) file content into the generated output document. An attacker can exploit this to disclose information from the system running the converter.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'cvrf2csaf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0rc2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.0rc1'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27193'}, {'type': 'PACKAGE', 'url': 'https://github.com/csaf-tools/CVRF-CSAF-Converter'}, {'type': 'WEB', 'url': 'https://github.com/csaf-tools/CVRF-CSAF-Converter/releases/tag/1.0.0-rc2'}]
|
{'cwe_ids': ['CWE-552', 'CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T23:52:30Z', 'nvd_published_at': '2022-03-15T05:15:00Z'}
|
1.4.0
|
GHSA-45v7-65q8-x294
|
2022-11-29T21:49:49Z
|
2022-03-30T00:00:26Z
| null |
['CVE-2022-28133']
|
Stored XSS vulnerability in Jenkins Bitbucket Server Integration Plugin
|
Jenkins Bitbucket Server Integration Plugin 3.1.0 and earlier does not limit URL schemes for callback URLs on OAuth consumers, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create BitBucket Server consumers.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:atlassian-bitbucket-server-integration'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '3.2.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28133'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/atlassian-bitbucket-server-integration-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2639'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/03/29/1'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T21:49:49Z', 'nvd_published_at': '2022-03-29T13:15:00Z'}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.