schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-7cr9-rmqr-fpqp
2022-03-28T22:34:57Z
2022-03-12T00:00:37Z
null
['CVE-2022-25511']
Path traversal in FreeTAKServer-UI
An issue in the ?filename= argument of the route /DataPackageTable in FreeTAKServer-UI v1.9.8 allows attackers to place arbitrary files anywhere on the system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'FreeTAKServer-UI'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.9.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25511'}, {'type': 'WEB', 'url': 'https://github.com/FreeTAKTeam/UI/issues/29'}, {'type': 'PACKAGE', 'url': 'https://github.com/FreeTAKTeam/UI'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T23:14:05Z', 'nvd_published_at': '2022-03-11T00:15:00Z'}
1.4.0
GHSA-25f2-wgxj-ph29
2022-11-30T20:53:30Z
2022-03-30T00:00:23Z
null
['CVE-2022-28151']
Missing permission check in Jenkins Job and Node ownership Plugin
A missing permission check in Jenkins Job and Node ownership Plugin 0.13.0 and earlier allows attackers with Item/Read permission to change the owners and item-specific permissions of a job.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.synopsys.jenkinsci:ownership'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.13.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28151'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ownership-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2062%20(1)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/03/29/1'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:53:30Z', 'nvd_published_at': '2022-03-29T13:15:00Z'}
1.4.0
GHSA-4c7h-f2j9-9c46
2022-04-05T19:50:57Z
2022-03-30T00:00:21Z
null
['CVE-2022-28158']
Missing permission Phoenix AutoTest Plugin
A missing permission check in Jenkins Pipeline: Phoenix AutoTest Plugin 1.3 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.surenpi.jenkins:phoenix-autotest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28158'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/phoenix-autotest-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2685'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/03/29/1'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-05T19:50:57Z', 'nvd_published_at': '2022-03-29T13:15:00Z'}
1.4.0
GHSA-v4rr-65x6-g69f
2022-05-03T20:56:05Z
2022-03-30T00:00:25Z
null
['CVE-2022-28140']
XXE vulnerability in Jenkins Flaky Test Handler Plugin
Jenkins Flaky Test Handler Plugin 1.2.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:flaky-test-handler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28140'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/flaky-test-handler-plugin/commit/c4ab38fef3658a02315a00288b934bdd9981b3a4'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/flaky-test-handler-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-1896'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/03/29/1'}]
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-03T20:56:05Z', 'nvd_published_at': '2022-03-29T13:15:00Z'}
1.4.0
GHSA-mhfv-8rc9-w38c
2022-03-26T00:06:00Z
2022-03-26T00:06:00Z
null
[]
Arbitrary shell execution
Uses of shell_exec() and exec() were not escaping filenames and configuration settings in most cases
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'squizlabs/php_codesniffer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '2.8.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/squizlabs/php_codesniffer/2017-03-01.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/squizlabs/PHP_CodeSniffer'}, {'type': 'WEB', 'url': 'https://github.com/squizlabs/PHP_CodeSniffer/releases/tag/2.8.1'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-26T00:06:00Z', 'nvd_published_at': None}
1.4.0
GHSA-6h3m-36w8-hv68
2022-03-24T00:21:10Z
2022-03-10T22:07:30Z
null
['CVE-2022-26652']
Arbitrary file write in nats-server
(This document is canonically: <https://advisories.nats.io/CVE/CVE-2022-26652.txt>) ## Background NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing. JetStream is the optional RAFT-based resilient persistent feature of NATS. ## Problem Description The JetStream streams can be backed up and restored via NATS. The backup format is a tar archive file. Inadequate checks on the filenames within the archive file permit a so-called "Zip Slip" attack in the stream restore. NATS nats-server through 2022-03-09 (fixed in release 2.7.4) did not correctly sanitize elements of the archive file, thus a user of NATS could cause the NATS server to write arbitrary content to an attacker-controlled filename. ## Affected versions NATS Server: * 2.2.0 up to and including 2.7.3. + Introduced with JetStream Restore functionality * Fixed with nats-io/nats-server: 2.7.4 * Docker image: nats <https://hub.docker.com/_/nats> * NB users of OS package files from our releases: a change in goreleaser defaults, discovered late in the release process, moved the install directory from /usr/local/bin to /usr/bin; we are evaluating the correct solution for subsequent releases, but not recutting this release. NATS Streaming Server * 0.15.0 up to and including 0.24.2 * Fixed with nats-io/nats-streaming-server: 0.24.3 * Embeds a nats-server, but this server is the old approach which JetStream replaces, so unlikely (but not impossible) to be configured with JS support ## Workarounds * Disable JetStream for untrusted users. * If only one NATS account uses JetStream, such that cross-user attacks are not an issue, and any user in that account with access to the JetStream API is fully trusted anyway, then appropriate sandboxing techniques will prevent exploit. + Eg, with systemd, the supplied util/nats-server-hardened.service example configuration demonstrates that NATS runs fine as an unprivileged user under ProtectSystem=strict and PrivateTmp=true restrictions; by only opening a ReadWritePaths hole for the JetStream storage area, the impact of this vulnerability is limited. ## Solution Upgrade the NATS server to at least 2.7.4. We fully support the util/nats-server-hardened.service configuration for running a NATS server and encourage this approach. ## Credits This issue was reported (on 2022-03-07) to the NATS Maintainers by Yiming Xiang, TIANJI LAB of NSFOCUS. Thank you / 谢谢你!
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/nats-io/nats-server/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.7.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/nats-io/nats-streaming-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.15.0'}, {'fixed': '0.24.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/nats-io/nats-server/security/advisories/GHSA-6h3m-36w8-hv68'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26652'}, {'type': 'WEB', 'url': 'https://github.com/nats-io/nats-server/pull/2917'}, {'type': 'WEB', 'url': 'https://advisories.nats.io/CVE/CVE-2022-26652.txt'}, {'type': 'PACKAGE', 'url': 'https://github.com/nats-io/nats-server'}, {'type': 'WEB', 'url': 'https://github.com/nats-io/nats-server/releases'}, {'type': 'WEB', 'url': 'https://github.com/nats-io/nats-server/releases/tag/v2.7.4'}, {'type': 'WEB', 'url': 'https://github.com/nats-io/nats-streaming-server/releases/tag/v0.24.3'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/03/10/1'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-10T22:07:30Z', 'nvd_published_at': '2022-03-10T17:47:00Z'}
1.4.0
GHSA-446w-rrm4-r47f
2022-03-18T20:06:07Z
2022-03-03T19:26:11Z
null
['CVE-2022-24725']
Exposure of home directory through shescape on Unix with Bash
### Impact The issue allows for exposure of the home directory on Unix systems when using Bash with the `escape` or `escapeAll` functions from the _shescape_ API with the `interpolation` option set to `true`. Other tested shells, Dash and Zsh, are not affected. ```javascript const cp = require("child_process"); const shescape = require("shescape"); const payload = "home_directory=~"; const options = { interpolation: true }; console.log(cp.execSync(`echo ${shescape.escape(payload, options)}`)); // home_directory=/home/user ``` Depending on how the output of _shescape_ is used, directory traversal may be possible in the application using _shescape_. ### Patches The issue was patched in `v1.5.1`. ### Workarounds Manually escape all instances of the tilde character (`~`) using `arg.replace(/~/g, "\\~")`. ### References See GitHub issue https://github.com/ericcornelissen/shescape/issues/169.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'shescape'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.5.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ericcornelissen/shescape/security/advisories/GHSA-446w-rrm4-r47f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24725'}, {'type': 'WEB', 'url': 'https://github.com/ericcornelissen/shescape/issues/169'}, {'type': 'WEB', 'url': 'https://github.com/ericcornelissen/shescape/pull/170'}, {'type': 'PACKAGE', 'url': 'https://github.com/ericcornelissen/shescape'}]
{'cwe_ids': ['CWE-200', 'CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-03T19:26:11Z', 'nvd_published_at': '2022-03-03T22:15:00Z'}
1.4.0
GHSA-qf2g-q4mc-w7rr
2022-03-30T21:04:25Z
2022-03-25T00:00:34Z
null
['CVE-2022-0145']
Cross-site Scripting in Fork CMS
Fork CMS prior to 5.11.1 is vulnerable to stored cross-site scripting. When uploading a new module, the description of the module can contain JavaScript code. The JavaScript code may be executed after uploading the new module and looking at the `Details` page.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'forkcms/forkcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.11.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0145'}, {'type': 'WEB', 'url': 'https://github.com/forkcms/forkcms/commit/981730f1a3d59b423ca903b1f4bf79b848a1766e'}, {'type': 'PACKAGE', 'url': 'https://github.com/forkcms/forkcms'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b5b8c680-3cd9-4477-bcd9-3a29657ba7ba'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T20:36:53Z', 'nvd_published_at': '2022-03-24T11:15:00Z'}
1.4.0
GHSA-9j59-75qj-795w
2023-09-04T17:06:16Z
2022-03-11T23:10:32Z
null
['CVE-2022-24303']
Path traversal in Pillow
Pillow before 9.0.1 allows attackers to delete files because spaces in temporary pathnames are mishandled.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24303'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/3450'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/427221ef5f19157001bf8b1ad7cfe0b905ca8c26'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9j59-75qj-795w'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2022-168.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/W4ZUXPKEX72O3E5IHBPVY5ZCPMJ4GHHV/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/XR6UP2XONXOVXI4446VY72R63YRO2YTP/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/9.0.1.html#security'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202211-10'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-11T23:10:32Z', 'nvd_published_at': '2022-03-28T02:15:00Z'}
1.4.0
GHSA-83vp-6jqg-6cmr
2022-03-18T20:15:32Z
2022-03-10T18:02:14Z
null
['CVE-2022-24748']
Incorrect Authentication in shopware
### Impact Modify Customers, create Orders without App Permission ## Patches We recommend updating to the current version 6.4.8.2. You can get the update to 6.4.8.2 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ## Workarounds For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.8.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.8.1'}}]
[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-83vp-6jqg-6cmr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24748'}, {'type': 'WEB', 'url': 'https://github.com/shopware/core/commit/329e4d7e028dd8081496cf8bd3acc822000b0ec0'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-03-2022?_ga=2.27683580.172848620.1646933022-368790926.1646933022'}, {'type': 'PACKAGE', 'url': 'https://github.com/shopware/platform'}]
{'cwe_ids': ['CWE-287', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-10T18:02:14Z', 'nvd_published_at': '2022-03-09T23:15:00Z'}
1.4.0
GHSA-xvch-5gv4-984h
2023-02-27T14:47:14Z
2022-03-18T00:01:09Z
null
['CVE-2021-44906']
Prototype Pollution in minimist
Minimist prior to 1.2.6 and 0.2.4 is vulnerable to Prototype Pollution via file `index.js`, function `setKey()` (lines 69-95).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'minimist'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.2.6'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'minimist'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44906'}, {'type': 'WEB', 'url': 'https://github.com/minimistjs/minimist/issues/11'}, {'type': 'WEB', 'url': 'https://github.com/substack/minimist/issues/164'}, {'type': 'WEB', 'url': 'https://github.com/minimistjs/minimist/pull/24'}, {'type': 'WEB', 'url': 'https://github.com/minimistjs/minimist/commit/34e20b8461118608703d6485326abbb8e35e1703'}, {'type': 'WEB', 'url': 'https://github.com/minimistjs/minimist/commit/bc8ecee43875261f4f17eb20b1243d3ed15e70eb'}, {'type': 'WEB', 'url': 'https://github.com/minimistjs/minimist/commit/c2b981977fa834b223b408cfb860f933c9811e4d'}, {'type': 'WEB', 'url': 'https://github.com/minimistjs/minimist/commit/ef9153fc52b6cea0744b2239921c5dcae4697f11'}, {'type': 'WEB', 'url': 'https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/minimist%20PoC.zip'}, {'type': 'WEB', 'url': 'https://github.com/minimistjs/minimist/commits/v0.2.4'}, {'type': 'PACKAGE', 'url': 'https://github.com/substack/minimist'}, {'type': 'WEB', 'url': 'https://github.com/substack/minimist/blob/master/index.js#L69'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MINIMIST-559764'}, {'type': 'WEB', 'url': 'https://stackoverflow.com/questions/8588563/adding-custom-properties-to-a-function/20278068#20278068'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T23:13:40Z', 'nvd_published_at': '2022-03-17T16:15:00Z'}
1.4.0
GHSA-hf4q-52x6-4p57
2022-03-28T22:23:29Z
2022-03-11T00:02:36Z
null
['CVE-2022-0906']
Unrestricted file upload leads to stored cross-site scripting in Microweber
Microweber prior to version 1.2.12 allows unrestricted file upload, which could lead to stored cross-site scripting.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0906'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/d9bae9df873c2d2a13a2eb08d512019d49ebca68'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/87ed3b42-9824-49b0-91a5-fd908a0601e8'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-28T22:23:29Z', 'nvd_published_at': '2022-03-10T15:15:00Z'}
1.4.0
GHSA-rf54-44jr-q5vf
2022-03-28T22:33:07Z
2022-03-12T00:00:26Z
null
['CVE-2022-25839']
Improper Input Validation in url-js
The package url-js before 2.1.0 is vulnerable to Improper Input Validation due to improper parsing, which makes it is possible for the hostname to be spoofed. http://\\\\\\\\localhost and http://localhost are the same URL. However, the hostname is not parsed as localhost, and the backslash is reflected as it is.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'url-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25839'}, {'type': 'WEB', 'url': 'https://github.com/duzun/URL.js/commit/9dc9fcc99baa4cbda24403d81a589e9b0f4121d0'}, {'type': 'PACKAGE', 'url': 'https://github.com/duzun/URL.js'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-URLJS-2414030'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T23:28:46Z', 'nvd_published_at': '2022-03-11T20:15:00Z'}
1.4.0
GHSA-2rmm-87v7-34rj
2022-03-15T21:34:09Z
2022-03-06T00:00:17Z
null
['CVE-2022-25312']
Improper Restriction of XML External Entity Reference in Any23
An XML external entity (XXE) injection vulnerability was discovered in the Any23 RDFa XSLTStylesheet extractor and is known to affect Any23 versions < 2.7. XML external entity injection (also known as XXE) is a web security vulnerability that allows an attacker to interfere with an application's processing of XML data. It often allows an attacker to view files on the application server filesystem, and to interact with any back-end or external systems that the application itself can access. This issue is fixed in Apache Any23 2.7.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.any23:apache-any23'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25312'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/any23'}, {'type': 'WEB', 'url': 'https://github.com/apache/any23/blob/any23-2.7/RELEASE-NOTES.md'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/y6cm5n3ksohsrhzqknqhzy7p3mtkyk23'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/03/04/2'}]
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-07T20:09:23Z', 'nvd_published_at': '2022-03-05T00:15:00Z'}
1.4.0
GHSA-vpwq-6cp4-ffqc
2022-03-28T18:40:15Z
2022-03-16T00:00:49Z
null
['CVE-2022-0945']
Stored Cross-site Scripting in ShowDoc
ShowDoc prior to version 2.10.4 is vulnerable to stored cross-site scripting viva `axd` and `cshtml` file upload.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0945'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/ba45d19e1d77a7eea866dab30eff5da552694891'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8702e2bf-4af2-4391-b651-c8c89e7d089e'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-28T18:40:15Z', 'nvd_published_at': '2022-03-15T04:15:00Z'}
1.4.0
GHSA-wfxp-4qgw-qp3c
2022-03-18T17:52:43Z
2022-03-18T17:52:43Z
null
['CVE-2021-21656']
XML external entity (XXE) attacks in Jenkins Xcode integration Plugin
Jenkins Xcode integration Plugin 2.0.14 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:xcode-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.15'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21656'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2335'}]
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T19:20:58Z', 'nvd_published_at': '2021-05-11T15:15:00Z'}
1.4.0
GHSA-j6jg-w79c-7p8v
2022-03-28T19:36:26Z
2022-03-16T00:00:48Z
null
['CVE-2022-0951']
File Upload Restriction Bypass leading to Cross-site Scripting in ShowDoc
ShowDoc prior to 2.10.4 is vulnerable to a file upload restriction bypass leading to stored cross-site scripting.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0951'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/237ac6d43bf3728bf3587c486a23b4a48ea7acb3'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b3a983a3-17f9-4aa8-92d7-8a0c92a93932'}]
{'cwe_ids': ['CWE-434', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-28T19:36:26Z', 'nvd_published_at': '2022-03-15T09:15:00Z'}
1.4.0
GHSA-62hc-f8qj-5xc3
2022-04-05T19:49:14Z
2022-03-30T00:00:22Z
null
['CVE-2022-28157']
Path traversal in Phoenix AutoTest Plugin
Jenkins Pipeline: Phoenix AutoTest Plugin 1.3 and earlier allows attackers with Item/Configure permission to upload arbitrary files from the Jenkins controller via FTP to an attacker-specified FTP server.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.surenpi.jenkins:phoenix-autotest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28157'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/phoenix-autotest-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2684'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/03/29/1'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-05T19:49:14Z', 'nvd_published_at': '2022-03-29T13:15:00Z'}
1.4.0
GHSA-6qcc-whgp-pjj2
2022-03-11T20:37:01Z
2022-03-05T00:00:45Z
null
['CVE-2022-0832']
Cross-site Scripting in Pimcore
Pimcore version 10.3.2 and prior is vulnerable to stored cross-site scripting. A patch is available and anticipated to be part of version 10.3.3.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.3.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.3.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0832'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/8ab06bfbb5a05a1b190731d9c7476ec45f5ee878'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/be450b60-bc8f-4585-96a5-3c4069f1186a'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-11T20:37:01Z', 'nvd_published_at': '2022-03-04T14:15:00Z'}
1.4.0
GHSA-3988-h75v-hwf6
2022-03-26T00:06:45Z
2022-03-26T00:06:45Z
null
[]
Arbitrary shell execution
A properly crafted filename would allow for arbitrary code execution when using the --filter=gitmodified command line option
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'squizlabs/php_codesniffer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/squizlabs/php_codesniffer/2017-05-18.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/squizlabs/PHP_CodeSniffer'}, {'type': 'WEB', 'url': 'https://github.com/squizlabs/PHP_CodeSniffer/releases/tag/3.0.1'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-26T00:06:45Z', 'nvd_published_at': None}
1.4.0
GHSA-5mc7-m686-p6jg
2022-03-18T17:57:32Z
2022-03-18T17:57:32Z
null
['CVE-2021-30179']
Deserialization of Untrusted Data in Apache Dubbo
Apache Dubbo prior to 2.6.9 and 2.7.10 by default supports generic calls to arbitrary methods exposed by provider interfaces. These invocations are handled by the GenericFilter which will find the service and method specified in the first arguments of the invocation and use the Java Reflection API to make the final call. The signature for the $invoke or $invokeAsync methods is Ljava/lang/String;[Ljava/lang/String;[Ljava/lang/Object; where the first argument is the name of the method to invoke, the second one is an array with the parameter types for the method being invoked and the third one is an array with the actual call arguments. In addition, the caller also needs to set an RPC attachment specifying that the call is a generic call and how to decode the arguments. The possible values are: - true - raw.return - nativejava - bean - protobuf-json An attacker can control this RPC attachment and set it to nativejava to force the java deserialization of the byte array located in the third argument.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.7.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.alibaba:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.6.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30179'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rccbcbdd6593e42ea3a1e8fedd12807cb111375c9c40edb005ef36f67%40%3Cdev.dubbo.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rccbcbdd6593e42ea3a1e8fedd12807cb111375c9c40edb005ef36f67@%3Cdev.dubbo.apache.org%3E'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-02T20:18:30Z', 'nvd_published_at': '2021-06-01T14:15:00Z'}
1.4.0
GHSA-fhhx-r983-44xc
2022-11-29T23:03:10Z
2022-03-30T00:00:27Z
null
['CVE-2022-28142']
SSL/TLS certificate validation globally disabled by Jenkins Proxmox Plugin
Jenkins Proxmox Plugin 0.6.0 and earlier disables SSL/TLS certificate validation globally for the Jenkins controller JVM when configured to ignore SSL/TLS issues.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:proxmox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28142'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/proxmox-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2081'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/03/29/1'}]
{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T23:03:10Z', 'nvd_published_at': '2022-03-29T13:15:00Z'}
1.4.0
GHSA-3mpp-xfvh-qh37
2022-03-16T23:54:35Z
2022-03-16T23:54:35Z
null
[]
node-ipc behavior change
node-ipc version 11.0.0 and newer include a message from the maintainer that is written to the user’s desktop. Please review the version changes before proceeding.
[]
[{'package': {'ecosystem': 'npm', 'name': 'node-ipc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}]}]}]
[{'type': 'PACKAGE', 'url': 'https://github.com/RIAEvangelist/node-ipc'}, {'type': 'WEB', 'url': 'https://github.com/RIAEvangelist/node-ipc/releases/tag/v11.0.0'}]
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-03-16T23:54:35Z', 'nvd_published_at': None}
1.4.0
GHSA-4pww-fqgh-36hj
2022-03-28T15:00:56Z
2022-03-11T00:02:02Z
null
['CVE-2021-44673']
Unrestricted Upload of File with Dangerous Type in Croogo
A Remote Code Execution (RCE) vulnerability exists in Croogo 3.0.2 via admin/file-manager/attachments, which lets a malicious user upload a web shell script.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'croogo/croogo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44673'}, {'type': 'WEB', 'url': 'https://github.com/3erk1n/Vulnerabilities/blob/main/Croogo%203.0.2%20-%20Arbitrary%20File%20Upload-Remote%20Code%20Execution%20(Authenticated).txt'}, {'type': 'PACKAGE', 'url': 'https://github.com/croogo/croogo'}]
{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-28T15:00:56Z', 'nvd_published_at': '2022-03-10T18:15:00Z'}
1.4.0
GHSA-2r2c-g63r-vccr
2022-03-18T23:10:48Z
2022-03-18T23:10:48Z
null
['CVE-2022-24773']
Improper Verification of Cryptographic Signature in `node-forge`
### Impact RSA PKCS#1 v1.5 signature verification code is not properly checking `DigestInfo` for a proper ASN.1 structure. This can lead to successful verification with signatures that contain invalid structures but a valid digest. ### Patches The issue has been addressed in `node-forge` `1.3.0`. ### For more information If you have any questions or comments about this advisory: * Open an issue in [forge](https://github.com/digitalbazaar/forge) * Email us at [example email address](mailto:[email protected])
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'node-forge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/digitalbazaar/forge/security/advisories/GHSA-2r2c-g63r-vccr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24773'}, {'type': 'WEB', 'url': 'https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1'}, {'type': 'WEB', 'url': 'https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2'}, {'type': 'PACKAGE', 'url': 'https://github.com/digitalbazaar/forge'}]
{'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T23:10:48Z', 'nvd_published_at': '2022-03-18T14:15:00Z'}
1.4.0
GHSA-4r8q-gv9j-3xx6
2022-03-18T17:55:07Z
2022-03-18T17:55:07Z
null
['CVE-2021-32645']
Open Redirect
### Impact In some situations, it is possible to have open redirects where users can be redirected from your site to any other site using a specially crafted URL. This is only the case for installations where the default Hostname Identification is used and the environment uses tenants that have `force_https` set to `true` (default: `false`) ### Patches Version 5.7.2 contains the relevant patches to fix this bug. Stripping the URL from special characters to prevent specially crafted URL's from being redirected to. ### Workarounds There is a simple way to work around the security issue - Set the `force_https` to every tenant to `false` ### References https://nvd.nist.gov/vuln/detail/CVE-2018-11784 ### For more information If you have any questions or comments about this advisory: * Contact us in Discord: https://tenancy.dev/chat
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'hyn/multi-tenant'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.6.0'}, {'fixed': '5.7.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/tenancy/multi-tenant/security/advisories/GHSA-4r8q-gv9j-3xx6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32645'}, {'type': 'WEB', 'url': 'https://github.com/tenancy/multi-tenant/commit/9c837a21bccce9bcaeb90033ef200d84f0d9e164'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/hyn/multi-tenant'}, {'type': 'WEB', 'url': 'https://webmasters.googleblog.com/2009/01/open-redirect-urls-is-your-site-being.html'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-27T20:40:11Z', 'nvd_published_at': '2021-05-27T17:15:00Z'}
1.4.0
GHSA-8v3j-jfg3-v3fv
2022-09-06T19:45:27Z
2022-03-18T00:01:11Z
null
['CVE-2021-44908']
Prototype Pollution in Sails.js
Sails.js <= 1.5.2 is vulnerable to Prototype Pollution via controller/load-action-modules.js, function loadActionModules(). A [patch](https://github.com/balderdashy/sails/commit/7c5379a656bb305c958df1dcc2b51a9668830358) is available in the `master` branch of Sails.js's GItHub repository.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'sails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44908'}, {'type': 'WEB', 'url': 'https://github.com/balderdashy/sails/issues/7209'}, {'type': 'WEB', 'url': 'https://github.com/balderdashy/sails/commit/7c5379a656bb305c958df1dcc2b51a9668830358'}, {'type': 'WEB', 'url': 'https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/sailsJS%20PoC.zip'}, {'type': 'PACKAGE', 'url': 'https://github.com/balderdashy/sails'}, {'type': 'WEB', 'url': 'https://github.com/balderdashy/sails/blob/master/lib/app/private/controller/load-action-modules.js#L32'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T23:04:49Z', 'nvd_published_at': '2022-03-17T12:15:00Z'}
1.4.0
GHSA-42qm-c3cf-9wv2
2022-03-10T15:55:03Z
2022-03-03T00:00:49Z
null
['CVE-2022-0819']
Code injection in dolibarr/dolibarr
Improper php function sanitization, lead to an ability to inject arbitrary PHP code and run arbitrary commands on file system. In the function "dol_eval" in file "dolibarr/htdocs/core/lib/functions.lib.php" dangerous PHP functions are sanitized using "str_replace" and can be bypassed using following code in $s parameter
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '15.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0819'}, {'type': 'WEB', 'url': 'https://github.com/dolibarr/dolibarr/commit/2a48dd349e7de0d4a38e448b0d2ecbe25e968075'}, {'type': 'PACKAGE', 'url': 'https://github.com/dolibarr/dolibarr'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b03d4415-d4f9-48c8-9ae2-d3aa248027b5'}]
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-03T19:12:38Z', 'nvd_published_at': '2022-03-02T16:15:00Z'}
1.4.0
GHSA-vmf7-hmh6-vv57
2022-03-18T20:06:58Z
2022-03-05T00:00:46Z
null
['CVE-2022-23328']
Denial of Service in Go-Ethereum
A design flaw in all versions of Go-Ethereum allows an attacker node to send 5120 pending transactions of a high gas price from one account that all fully spend the full balance of the account to a victim Geth node, which can purge all of pending transactions in a victim node's memory pool and then occupy the memory pool to prevent new transactions from entering the pool, resulting in a denial of service (DoS).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ethereum/go-ethereum'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.10.16'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23328'}, {'type': 'WEB', 'url': 'https://dl.acm.org/doi/pdf/10.1145/3460120.3485369'}, {'type': 'PACKAGE', 'url': 'https://github.com/ethereum/go-ethereum'}, {'type': 'WEB', 'url': 'https://tristartom.github.io/docs/ccs21.pdf'}, {'type': 'WEB', 'url': 'http://ethereum.com'}, {'type': 'WEB', 'url': 'http://go-ethereum.com'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-09T19:20:00Z', 'nvd_published_at': '2022-03-04T12:15:00Z'}
1.4.0
GHSA-66ww-999q-mffq
2022-03-25T14:29:33Z
2022-03-18T00:01:11Z
null
['CVE-2022-0748']
Arbitrary code execution in post-loader
post-loader is webpack loader for blog posts written in Markdown. The package post-loader from 0.0.0 is vulnerable to Arbitrary Code Execution which uses a markdown parser in an unsafe way so that any javascript code inside the markdown input files gets evaluated and executed. At this time, there is no known workaround or patch available.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'post-loader'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0748'}, {'type': 'PACKAGE', 'url': 'https://github.com/egoist/post-loader'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-POSTLOADER-2403737'}]
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T23:01:29Z', 'nvd_published_at': '2022-03-17T12:15:00Z'}
1.4.0
GHSA-h2g5-2rhx-ffgj
2022-03-14T23:12:25Z
2022-03-05T00:00:44Z
null
['CVE-2022-24727']
Command injection in Weblate
Weblate is a web based localization tool with tight version control integration. Prior to version 4.11.1, Weblate didn't properly sanitize some arguments passed to Git and Mercurial, allowing them to change their behavior in an unintended way. Instances where untrusted users cannot create new components are not affected. The issues were fixed in the 4.11.1 release.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'Weblate'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.11.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/WeblateOrg/weblate/security/advisories/GHSA-3872-f48p-pxqj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24727'}, {'type': 'WEB', 'url': 'https://github.com/WeblateOrg/weblate/commit/35d59f1f040541c358cece0a8d4a63183ca919b8'}, {'type': 'WEB', 'url': 'https://github.com/WeblateOrg/weblate/commit/d83672a3e7415da1490334e2c9431e5da1966842'}, {'type': 'PACKAGE', 'url': 'https://github.com/WeblateOrg/weblate'}]
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T23:12:25Z', 'nvd_published_at': '2022-03-04T17:15:00Z'}
1.4.0
GHSA-p4jg-pccf-h82c
2022-04-06T23:57:05Z
2022-03-31T00:00:24Z
null
['CVE-2022-27815']
Insecure Temporary File in SWHKD
SWHKD is a display protocol-independent hotkey daemon made in Rust. In SWHKD versions 1.1.5 and prior, SWHKD uses the /tmp/swhkd.pid pathname. As /tmp is accessible to all users, there can be an information leak or denial of service. No known workarounds exist. A patch is available on the `1.1.0` branch of the repository.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'Simple-Wayland-HotKey-Daemon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27815'}, {'type': 'WEB', 'url': 'https://github.com/waycrate/swhkd/commit/e661a4940df78fbb7b52c622ac4ae6a3a7f7d8aa'}, {'type': 'PACKAGE', 'url': 'https://github.com/waycrate/swhkd'}, {'type': 'WEB', 'url': 'https://github.com/waycrate/swhkd/releases'}, {'type': 'WEB', 'url': 'https://github.com/waycrate/swhkd/releases/tag/1.2.0'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/04/14/1'}]
{'cwe_ids': ['CWE-377', 'CWE-59'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T15:15:36Z', 'nvd_published_at': '2022-03-30T00:15:00Z'}
1.4.0
GHSA-chr6-386q-4m3v
2022-11-30T20:28:46Z
2022-03-16T00:00:44Z
null
['CVE-2022-27200']
Stored Cross-site Scripting vulnerability in Jenkins Folder-based Authorization Strategy Plugin
Jenkins Folder-based Authorization Strategy Plugin 1.3 and earlier does not escape the names of roles shown on the configuration form, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Overall/Administer permission.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:folder-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27200'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/folder-auth-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2646'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/03/15/2'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:28:46Z', 'nvd_published_at': '2022-03-15T17:15:00Z'}
1.4.0
GHSA-pq37-4c4g-v38c
2022-03-23T13:54:04Z
2022-03-15T00:01:02Z
null
['CVE-2022-0341']
Cross-site Scripting in vditor
vditor prior to version 3.8.11 is vulnerable to cross-site scripting.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'vditor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0341'}, {'type': 'WEB', 'url': 'https://github.com/Vanessa219/vditor/issues/1102'}, {'type': 'WEB', 'url': 'https://github.com/vanessa219/vditor/commit/219f8a9e272aba3cbc0096a82cac776532dbb9e5'}, {'type': 'PACKAGE', 'url': 'https://github.com/vanessa219/vditor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/fa546b57-bc15-4705-824e-9474b616f628'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-23T13:54:04Z', 'nvd_published_at': '2022-03-14T04:15:00Z'}
1.4.0
GHSA-2j6v-xpf3-xvrv
2022-03-10T15:59:41Z
2022-03-01T18:58:23Z
null
['CVE-2021-41193']
Use of Externally-Controlled Format String in wire-avs
### Impact A remote format string vulnerability allowed an attacker to cause a denial of service or possibly execute arbitrary code. ### Patches * The issue has been fixed in wire-avs 7.1.12 and is already included on all Wire products (currently used version is 8.0.x) ### Workarounds * No workaround known ### References * Fixed in commit https://github.com/wireapp/wire-avs/commit/40d373ede795443ae6f2f756e9fb1f4f4ae90bbe ### For more information If you have any questions or comments about this advisory feel free to email us at [[email protected]](mailto:[email protected])
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.wire:avs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.1.12'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/wireapp/wire-avs/security/advisories/GHSA-2j6v-xpf3-xvrv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41193'}, {'type': 'WEB', 'url': 'https://github.com/wireapp/wire-avs/commit/40d373ede795443ae6f2f756e9fb1f4f4ae90bbe'}, {'type': 'PACKAGE', 'url': 'https://github.com/wireapp/wire-avs/'}]
{'cwe_ids': ['CWE-134'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T18:58:23Z', 'nvd_published_at': '2022-03-01T19:15:00Z'}
1.4.0
GHSA-8g9w-5jv6-7m4x
2022-11-30T18:45:18Z
2022-03-16T00:00:42Z
null
['CVE-2022-27218']
Personal tokens stored in plain text by Jenkins incapptic connect uploader Plugin
Jenkins incapptic connect uploader Plugin 1.15 and earlier stores tokens unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.incapptic.plugins:incapptic-connect-uploader'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.15'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27218'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/incapptic-connect-uploader-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2273'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/03/15/2'}]
{'cwe_ids': ['CWE-256', 'CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T18:45:18Z', 'nvd_published_at': '2022-03-15T17:15:00Z'}
1.4.0
GHSA-xpgc-j48j-jwv9
2022-03-30T14:53:34Z
2022-03-26T00:00:31Z
null
['CVE-2021-20323']
Cross-site Scripting in Keycloak
A POST based reflected Cross Site Scripting vulnerability on has been identified in Keycloak version 15. The issue was fixed in version 17.0.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0.0'}, {'fixed': '17.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20323'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2013577'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-30T14:53:34Z', 'nvd_published_at': '2022-03-25T19:15:00Z'}
1.4.0
GHSA-2877-693q-pj33
2022-03-14T21:30:21Z
2022-03-07T00:00:40Z
null
['CVE-2021-46704']
OS Command Injection in GenieACS
In GenieACS 1.2.x before 1.2.8, the UI interface API is vulnerable to unauthenticated OS command injection via the ping host argument (lib/ui/api.ts and lib/ping.ts). The vulnerability arises from insufficient input validation combined with a missing authorization check.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'genieacs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46704'}, {'type': 'WEB', 'url': 'https://github.com/genieacs/genieacs/commit/7f295beeecc1c1f14308a93c82413bb334045af6'}, {'type': 'PACKAGE', 'url': 'https://github.com/genieacs/genieacs'}, {'type': 'WEB', 'url': 'https://github.com/genieacs/genieacs/releases/tag/v1.2.8'}]
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-07T20:11:56Z', 'nvd_published_at': '2022-03-06T07:15:00Z'}
1.4.0
GHSA-jr9c-h74f-2v28
2023-06-30T20:12:44Z
2022-03-11T00:02:35Z
null
['CVE-2022-0905']
Gitea Missing Authorization vulnerability
Gitea 1.16.3 and prior is vulnerable to missing authorization. A patch is available as part of the 1.16.4 release.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'code.gitea.io/gitea'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.16.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0905'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/commit/1314f38b59748397b3429fb9bc9f9d6bac85d2f2'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/commit/3e5c844a7758fa29126d201f4f98bf21bca6d314'}, {'type': 'PACKAGE', 'url': 'https://github.com/go-gitea/gitea'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8d221f92-b2b1-4878-bc31-66ff272e5ceb'}]
{'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-11T20:32:37Z', 'nvd_published_at': '2022-03-10T15:15:00Z'}
1.4.0
GHSA-vxrc-68xx-x48g
2023-09-21T19:49:03Z
2022-03-26T00:25:25Z
null
['CVE-2019-9942']
Twig Sandbox Information Disclosure
A sandbox information disclosure exists in Twig before 1.38.0 and 2.x before 2.7.0 because, under some circumstances, it is possible to call the `__toString()` method on an object even if not allowed by the security policy in place.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'twig/twig'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.38.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'twig/twig'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.7.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-9942'}, {'type': 'WEB', 'url': 'https://github.com/twigphp/Twig/commit/eac5422956e1dcca89a3669a03a3ff32f0502077'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/twig/twig/CVE-2019-9942.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/twigphp/Twig'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Mar/60'}, {'type': 'WEB', 'url': 'https://symfony.com/blog/twig-sandbox-information-disclosure'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4419'}]
{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-03-26T00:25:25Z', 'nvd_published_at': '2019-03-23T15:29:00Z'}
1.4.0
GHSA-4fc4-4p5g-6w89
2022-03-30T20:05:59Z
2022-03-16T22:47:55Z
null
['CVE-2022-24728']
Cross-site Scripting in CKEditor4
### Affected packages The vulnerability has been discovered in the core HTML processing module and may affect all plugins used by CKEditor 4. ### Impact A potential vulnerability has been discovered in CKEditor 4 HTML processing core module. The vulnerability allowed to inject malformed HTML bypassing content sanitization, which could result in executing JavaScript code. It affects all users using the CKEditor 4 at version < 4.18.0. ### Patches The problem has been recognized and patched. The fix will be available in version 4.18.0. ### For more information Email us at [email protected] if you have any questions or comments about this advisory. ### Acknowledgements The CKEditor 4 team would like to thank GHSL team member Kevin Backhouse ([@kevinbackhouse](https://github.com/kevinbackhouse)) for recognizing and reporting this vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'ckeditor4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.18.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-4fc4-4p5g-6w89'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24728'}, {'type': 'WEB', 'url': 'https://github.com/ckeditor/ckeditor4/commit/d158413449692d920a778503502dcb22881bc949'}, {'type': 'WEB', 'url': 'https://ckeditor.com/cke4/release/CKEditor-4.18.0'}, {'type': 'PACKAGE', 'url': 'https://github.com/ckeditor/ckeditor4'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/VR76VBN5GW5QUBJFHVXRX36UZ6YTCMW6/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/WOZGMCYDB2OKKULFXZKM6V7JJW4ZZHJP/'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2022-009_ckeditor4/'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2022-005'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-16T22:47:55Z', 'nvd_published_at': '2022-03-16T16:15:00Z'}
1.4.0
GHSA-v2rg-8cwr-75g8
2022-03-18T17:56:08Z
2022-03-18T17:56:08Z
null
['CVE-2021-25641']
Deserializer tampering in Apache Dubbo
Each Apache Dubbo server will set a serialization id to tell the clients which serialization protocol it is working on. But for Dubbo versions before 2.7.8 or 2.6.9, an attacker can choose which serialization id the Provider will use by tampering with the byte preamble flags, aka, not following the server's instruction. This means that if a weak deserializer such as the Kryo and FST are somehow in code scope (e.g. if Kryo is somehow a part of a dependency), a remote unauthenticated attacker can tell the Provider to use the weak deserializer, and then proceed to exploit it.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.7.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.alibaba:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.6.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25641'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r99ef7fa35585d3a68762de07e8d2b2bc48b8fa669a03e8d84b9673f3%40%3Cdev.dubbo.apache.org%3E'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-02T19:44:59Z', 'nvd_published_at': '2021-06-01T14:15:00Z'}
1.4.0
GHSA-4f7p-27jc-3c36
2022-03-18T19:00:59Z
2022-03-18T19:00:59Z
null
['CVE-2022-24761']
HTTP Request Smuggling in waitress
### Impact When using Waitress behind a proxy that does not properly validate the incoming HTTP request matches the RFC7230 standard, Waitress and the frontend proxy may disagree on where one request starts and where it ends. This would allow requests to be smuggled via the front-end proxy to waitress and later behavior. There are two classes of vulnerability that may lead to request smuggling that are addressed by this advisory: - The use of Python's `int()` to parse strings into integers, leading to `+10` to be parsed as `10`, or `0x01` to be parsed as `1`, where as the standard specifies that the string should contain only digits or hex digits. - Waitress does not support chunk extensions, however it was discarding them without validating that they did not contain illegal characters ### Patches This has been fixed in Waitress 2.1.1 ### Workarounds When deploying a proxy in front of waitress, turning on any and all functionality to make sure that the request matches the RFC7230 standard. Certain proxy servers may not have this functionality though and users are encouraged to upgrade to the latest version of waitress instead. ### References - https://portswigger.net/research/http-desync-attacks-request-smuggling-reborn ### For more information If you have any questions or comments about this advisory: * Open an issue in [the Github issue tracker](https://github.com/Pylons/waitress/issues) (if not security related/sensitive) * Email us at [[email protected]](mailto:[email protected]) (If security related or sensitive)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'waitress'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/security/advisories/GHSA-4f7p-27jc-3c36'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24761'}, {'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/commit/9e0b8c801e4d505c2ffc91b891af4ba48af715e0'}, {'type': 'PACKAGE', 'url': 'https://github.com/Pylons/waitress'}, {'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/releases/tag/v2.1.1'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/05/msg00011.html'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5138'}]
{'cwe_ids': ['CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T19:00:59Z', 'nvd_published_at': '2022-03-17T13:15:00Z'}
1.4.0
GHSA-9fcc-7g44-mxrj
2022-03-29T17:30:52Z
2022-03-16T00:00:47Z
null
['CVE-2022-0942']
Cross-site Scripting in ShowDoc
ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via uploading files with files in `.xsd`, `.asa`, and `.aspx` formats.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0942'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a412707c-18da-4c84-adc0-9801ed8068c9'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T17:30:52Z', 'nvd_published_at': '2022-03-15T14:15:00Z'}
1.4.0
GHSA-vc5r-xfc4-4x22
2022-03-30T21:03:02Z
2022-03-25T00:00:33Z
null
['CVE-2022-0955']
Cross-site Scripting in Pimcore Datahub
Pimcore Datahub prior to 1.2.4 is vulnerable to stored cross-site scripting. An admin user accessing Datahub triggers the attack, which may result in the user's cookie being stolen.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/data-hub'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0955'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/data-hub/commit/15d5b57af2466eebd3bbc531ead5dafa35d0a36e'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/data-hub'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/708971a6-1e6c-4c51-a411-255caeba51df'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-30T21:03:02Z', 'nvd_published_at': '2022-03-24T15:15:00Z'}
1.4.0
GHSA-57j2-w4cx-62h2
2022-03-25T21:37:08Z
2022-03-12T00:00:36Z
null
['CVE-2020-36518']
Deeply nested json in jackson-databind
jackson-databind is a data-binding package for the Jackson Data Processor. jackson-databind allows a Java stack overflow exception and denial of service via a large depth of nested objects.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.13.0'}, {'fixed': '2.13.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.13.2.0'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.12.6.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.12.6.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36518'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2816'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/fcfc4998ec23f0b1f7f8a9521c2b317b6c25892b'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.12'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.13'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/05/msg00001.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/11/msg00035.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220506-0004/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5283'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-22T14:36:44Z', 'nvd_published_at': '2022-03-11T07:15:00Z'}
1.4.0
GHSA-jc36-42cf-vqwj
2023-06-23T21:37:14Z
2022-03-26T00:00:33Z
null
['CVE-2018-25032']
Nokogiri affected by zlib's Out-of-bounds Write vulnerability
zlib 1.2.11 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25032'}, {'type': 'WEB', 'url': 'https://github.com/madler/zlib/issues/605'}, {'type': 'WEB', 'url': 'https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf'}, {'type': 'WEB', 'url': 'https://github.com/madler/zlib/compare/v1.2.11...v1.2.12'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2018-25032.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202210-42'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220526-0009/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220729-0004/'}, {'type': 'WEB', 'url': 'https://support.apple.com/kb/HT213255'}, {'type': 'WEB', 'url': 'https://support.apple.com/kb/HT213256'}, {'type': 'WEB', 'url': 'https://support.apple.com/kb/HT213257'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5111'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2022/03/24/1'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2022/03/28/1'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2022/03/28/3'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2022/May/33'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2022/May/35'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2022/May/38'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/03/25/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/03/26/1'}]
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-23T21:37:14Z', 'nvd_published_at': '2022-03-25T09:15:00Z'}
1.4.0
GHSA-h2fw-93qx-vrcq
2022-04-01T18:03:23Z
2022-03-26T00:00:29Z
null
['CVE-2022-0983']
SQL Injection in Moodle
An SQL injection risk was identified in Badges code relating to configuring criteria. Access to the relevant capability was limited to teachers and managers by default.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11.0'}, {'fixed': '3.11.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10.0'}, {'fixed': '3.10.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0983'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/c2794752ea3cdda2d64a0651da08b2cdf730d9f1'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2064119'}, {'type': 'WEB', 'url': 'https://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-74074'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/G4GRMWBGHOJMFXMTORECQNULJK7ZJJ6Y/'}]
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T18:03:23Z', 'nvd_published_at': '2022-03-25T19:15:00Z'}
1.4.0
GHSA-3f95-r44v-8mrg
2022-03-17T21:46:01Z
2022-03-12T00:00:33Z
null
['CVE-2022-24433']
Command injection in simple-git
The package simple-git before 3.3.0 is vulnerable to Command Injection via argument injection. When calling the .fetch(remote, branch, handlerFn) function, both the remote and branch parameters are passed to the git fetch subcommand. By injecting some git options, it was possible to get arbitrary command execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'simple-git'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24433'}, {'type': 'WEB', 'url': 'https://github.com/steveukx/git-js/pull/767'}, {'type': 'PACKAGE', 'url': 'https://github.com/steveukx/git-js'}, {'type': 'WEB', 'url': 'https://github.com/steveukx/git-js/releases/tag/simple-git%403.3.0'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2421245'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SIMPLEGIT-2421199'}]
{'cwe_ids': ['CWE-74', 'CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T23:30:00Z', 'nvd_published_at': '2022-03-11T17:16:00Z'}
1.4.0
GHSA-2ccw-7px8-vmpf
2022-04-07T00:09:48Z
2022-03-25T19:27:39Z
null
['CVE-2022-24776']
Open Redirect in Flask-AppBuilder
Flask-AppBuilder is an application development framework built on top of Flask. Versions prior to 3.4.5 contain an open redirect vulnerability when using the database authentication login page. There are no known workarounds. Users are recommended to upgrade to version 3.4.5 or later. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Flask-AppBuilder](https://github.com/dpgaspar/Flask-AppBuilder)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Flask-AppBuilder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder/security/advisories/GHSA-2ccw-7px8-vmpf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24776'}, {'type': 'WEB', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder/pull/1804'}, {'type': 'WEB', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder/pull/1804/commits/5214d975ebad2ff32057443d2cc20fef1c04d0ea'}, {'type': 'PACKAGE', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder'}, {'type': 'WEB', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder/releases/tag/v3.4.5'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-25T19:27:39Z', 'nvd_published_at': '2022-03-24T20:15:00Z'}
1.4.0
GHSA-6fg4-36v7-xv32
2022-11-30T20:39:49Z
2022-03-16T00:00:45Z
null
['CVE-2022-27197']
Stored Cross-site Scripting vulnerability in Jenkins Dashboard View Plugin
Jenkins Dashboard View Plugin 2.18 and earlier does not perform URL validation for the Iframe Portlet's Iframe source URL, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to configure views. Dashboard View Plugin 2.18.1 performs URL validation for the Iframe Portlet’s Iframe source URL. Additionally, Dashboard View Plugin 2.18.1 sets the sandbox attribute for the iframe to restrict the included page. In case of problems, the [Java system property](https://www.jenkins.io/doc/book/managing/system-properties/) `hudson.plugins.view.dashboard.core.IframePortlet.sandboxAttributeValue` can be used to customize the sandbox attribute value. The Java system property `hudson.plugins.view.dashboard.core.IframePortlet.doNotUseSandbox` can be used to disable the sandbox completely.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:dashboard-view'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.18.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27197'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/dashboard-view-plugin/commit/942c5c78fa834a6be242f144adc2b7f045ccdbc3'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/dashboard-view-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2559'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/03/15/2'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:39:49Z', 'nvd_published_at': '2022-03-15T17:15:00Z'}
1.4.0
GHSA-vhxc-fhm5-qcp9
2022-03-18T22:56:29Z
2022-03-18T00:01:11Z
null
['CVE-2022-25296']
Prototype Pollution in bodymen
The package bodymen from 0.0.0 are vulnerable to Prototype Pollution via the handler function which could be tricked into adding or modifying properties of Object.prototype using a __proto__ payload. **Note:** This vulnerability derives from an incomplete fix to [CVE-2019-10792](https://security.snyk.io/vuln/SNYK-JS-BODYMEN-548897)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'bodymen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25296'}, {'type': 'PACKAGE', 'url': 'https://github.com/diegohaz/bodymen'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-BODYMEN-2342623'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T22:56:29Z', 'nvd_published_at': '2022-03-17T12:15:00Z'}
1.4.0
GHSA-v94v-pxqp-5qgj
2022-03-28T19:27:08Z
2022-03-16T00:00:48Z
null
['CVE-2022-0950']
Cross-site Scripting in ShowDoc
The upload feature of ShowDoc prior to version 2.10.4 allows files with the extension `.*html`, which leads to stored cross-site scripting.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0950'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/237ac6d43bf3728bf3587c486a23b4a48ea7acb3'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/acc23996-bd57-448f-9eb4-05a8a046c2dc'}]
{'cwe_ids': ['CWE-434', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-28T19:27:08Z', 'nvd_published_at': '2022-03-15T09:15:00Z'}
1.4.0
GHSA-mqvp-7rrg-9jxc
2022-03-29T19:10:58Z
2022-03-05T00:00:44Z
null
['CVE-2022-26336']
Improper Input Validation and Allocation of Resources Without Limits or Throttling in poi-scratchpad
A shortcoming in the HMEF package of poi-scratchpad (Apache POI) allows an attacker to cause an Out of Memory exception. This package is used to read TNEF files (Microsoft Outlook and Microsoft Exchange Server). If an application uses poi-scratchpad to parse TNEF files and the application allows untrusted users to supply them, then a carefully crafted file can cause an Out of Memory exception. This issue affects poi-scratchpad version 5.2.0 and prior versions. Users are recommended to upgrade to poi-scratchpad 5.2.1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.poi:poi-scratchpad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26336'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/sprg0kq986pc2271dc3v2oxb1f9qx09j'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20221028-0006/'}]
{'cwe_ids': ['CWE-20', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-07T16:12:37Z', 'nvd_published_at': '2022-03-04T16:15:00Z'}
1.4.0
GHSA-gv9j-4w24-q7vx
2022-03-01T21:03:11Z
2022-03-01T21:03:11Z
null
[]
Improper random number generation in github.com/coredns/coredns
### Impact CoreDNS before 1.6.6 (using go DNS package < 1.1.25) improperly generates random numbers because math/rand is used. The TXID becomes predictable, leading to response forgeries. ### Patches The problem has been fixed in 1.6.6+. ### References - [CVE-2019-19794](https://nvd.nist.gov/vuln/detail/CVE-2019-19794) ### For more information Please consult [our security guide](https://github.com/coredns/coredns/blob/master/.github/SECURITY.md) for more information regarding our security process.
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/coredns/coredns'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/coredns/coredns/security/advisories/GHSA-gv9j-4w24-q7vx'}, {'type': 'PACKAGE', 'url': 'github.com/coredns/coredns'}]
{'cwe_ids': ['CWE-330'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T21:03:11Z', 'nvd_published_at': None}
1.4.0
GHSA-p93v-m2r2-4387
2022-03-01T21:05:01Z
2022-03-01T21:05:01Z
null
[]
Denial of service via insufficient metadata validation
The PAM module for `fscrypt` through v0.3.2 doesn't adequately validate `fscrypt` metadata files, allowing users to create malicious metadata files that prevent other users from logging in. A local user can cause a denial of service by creating a `fscrypt` metadata file that prevents other users from logging into the system. We recommend upgrading to v0.3.3 or above. For more details, see [CVE-2022-25327](https://www.cve.org/CVERecord?id=CVE-2022-25327).
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/google/fscrypt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/google/fscrypt/security/advisories/GHSA-p93v-m2r2-4387'}, {'type': 'PACKAGE', 'url': 'github.com/google/fscrypt'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T21:05:01Z', 'nvd_published_at': None}
1.4.0
GHSA-4v37-24gm-h554
2022-03-01T21:47:28Z
2022-03-01T21:47:28Z
null
['CVE-2022-24712']
Cross-Site Request Forgery (CSRF) Protection Bypass Vulnerability in CodeIgniter4
### Impact This vulnerability might allow remote attackers to bypass the CodeIgniter4 CSRF protection mechanism. ### Patches Upgrade to v4.1.9 or later. ### Workarounds These are workarounds for this vulnerability, but **you will still need to code as these after upgrading to v4.1.9**. Otherwise, the CSRF protection may be bypassed. #### When Auto-Routing is Enabled 1. Check the request method in the controller method before processing. E.g.: ```php if (strtolower($this->request->getMethod()) !== 'post') { return $this->response->setStatusCode(405)->setBody('Method Not Allowed'); } ``` #### When Auto-Routing is Disabled Do one of the following: 1. Do not use `$routes->add()`, and [use HTTP verbs in routes](https://codeigniter4.github.io/userguide/incoming/routing.html#using-http-verbs-in-routes). 2. Check the request method in the controller method before processing. E.g.: ```php if (strtolower($this->request->getMethod()) !== 'post') { return $this->response->setStatusCode(405)->setBody('Method Not Allowed'); } ``` ### References - [CodeIgniter4 CSRF protection](https://codeigniter4.github.io/userguide/libraries/security.html#cross-site-request-forgery-csrf) ### For more information If you have any questions or comments about this advisory: * Open an issue in [codeigniter4/CodeIgniter4](https://github.com/codeigniter4/CodeIgniter4/issues) * Email us at [SECURITY.md](https://github.com/codeigniter4/CodeIgniter4/blob/develop/SECURITY.md)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'codeigniter4/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.9'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/codeigniter4/CodeIgniter4/security/advisories/GHSA-4v37-24gm-h554'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24712'}, {'type': 'WEB', 'url': 'https://github.com/codeigniter4/CodeIgniter4/blob/7dc2ece32401ebde67122f7d2460efcaee7c352e/user_guide_src/source/changelogs/v4.1.9.rst'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T21:47:28Z', 'nvd_published_at': '2022-02-28T16:15:00Z'}
1.4.0
GHSA-gjh6-wvhq-h4qx
2022-03-29T19:04:44Z
2022-03-12T00:00:37Z
null
['CVE-2022-25507']
Cross-site Scripting in FreeTAKServer-UI
FreeTAKServer-UI v1.9.8 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Callsign parameter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'FreeTAKServer-UI'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.9.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25507'}, {'type': 'WEB', 'url': 'https://github.com/FreeTAKTeam/UI/issues/28'}, {'type': 'PACKAGE', 'url': 'https://github.com/FreeTAKTeam/UI'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T19:04:44Z', 'nvd_published_at': '2022-03-11T00:15:00Z'}
1.4.0
GHSA-x75r-g63m-82wj
2022-11-30T18:55:24Z
2022-03-16T00:00:43Z
null
['CVE-2022-27216']
Passwords stored in plain text by Jenkins dbCharts Plugin
Jenkins dbCharts Plugin 0.5.2 and earlier stores JDBC connection passwords unencrypted in its global configuration file `hudson.plugins.dbcharts.DbChartPublisher.xml` on the Jenkins controller as part of its configuration. These passwords can be viewed by users with access to the Jenkins controller file system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:dbCharts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.5.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27216'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/dbCharts-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2159'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/03/15/2'}]
{'cwe_ids': ['CWE-522'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T18:55:24Z', 'nvd_published_at': '2022-03-15T17:15:00Z'}
1.4.0
GHSA-h3q4-vmw4-cpr5
2022-03-28T22:26:45Z
2022-03-16T00:00:38Z
null
['CVE-2021-29134']
Path Traversal in Gitea
The avatar middleware in Gitea before 1.13.6 allows Directory Traversal via a crafted URL.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'code.gitea.io/gitea'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29134'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/15125/files'}, {'type': 'PACKAGE', 'url': 'https://github.com/go-gitea/gitea'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/releases'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/releases/tag/v1.13.6'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T23:27:37Z', 'nvd_published_at': '2022-03-15T21:15:00Z'}
1.4.0
GHSA-mw75-qvfr-hpmr
2022-03-23T15:38:52Z
2022-03-15T00:01:01Z
null
['CVE-2022-0938']
Cross-site Scripting in ShowDoc
ShowDoc is vulnerable to stored cross-site scripting through file upload in versions 2.10.3 and prior. A patch is available and anticipated to be part of version 2.10.4.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.10.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0938'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/830c89a4c2c5fd0dd491422bf8e97b4eb5713f55'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3eb5a8f9-24e3-4eae-a212-070b2fbc237e'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-23T14:09:09Z', 'nvd_published_at': '2022-03-14T08:15:00Z'}
1.4.0
GHSA-vrcc-g6vj-mh5w
2022-03-30T20:05:12Z
2022-03-18T00:01:13Z
null
['CVE-2021-42219']
Denial of service in go-ethereum
Go-Ethereum v1.10.9 was discovered to contain an issue which allows attackers to cause a denial of service (DoS) via sending an excessive amount of messages to a node. This is caused by missing memory in the component /ethash/algorithm.go.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ethereum/go-ethereum'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.10.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42219'}, {'type': 'WEB', 'url': 'https://docs.google.com/document/d/1dYFSpNZPC0OV-n1mMqdc269u9yYU1XQy/edit?usp=sharing&ouid=112110745137218798745&rtpof=true&sd=true'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T22:37:32Z', 'nvd_published_at': '2022-03-17T00:15:00Z'}
1.4.0
GHSA-fmx4-26r3-wxpf
2022-03-03T20:28:47Z
2022-03-03T20:28:47Z
null
[]
Integer overflow in cmark-gfm table parsing extension leads to heap memory corruption
### Impact CommonMarker uses `cmark-gfm` for rendering [Github Flavored Markdown](https://github.github.com/gfm/). An [integer overflow in `cmark-gfm`'s table row parsing](https://github.com/github/cmark-gfm/security/advisories/GHSA-mc3g-88wq-6f4x) may lead to heap memory corruption when parsing tables who's marker rows contain more than UINT16_MAX columns. The impact of this heap corruption ranges from Information Leak to Arbitrary Code Execution. If affected versions of CommonMarker are used for rendering remote user controlled markdown, this vulnerability may lead to Remote Code Execution (RCE). ### Patches This vulnerability has been patched in the following CommonMarker release: - v0.23.4 ### Workarounds The vulnerability exists in the table markdown extensions of `cmark-gfm`. Disabling any use of the table extension will prevent this vulnerability from being triggered. ### References - https://github.com/github/cmark-gfm/security/advisories/GHSA-mc3g-88wq-6f4x ### Acknowledgements We would like to thank Felix Wilhelm of Google's Project Zero for reporting this vulnerability ### For more information If you have any questions or comments about this advisory: * Open an issue in [CommonMarker](http://github.com/gjtorikian/commonmarker)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'commonmarker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.23.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/github/cmark-gfm/security/advisories/GHSA-mc3g-88wq-6f4x'}, {'type': 'WEB', 'url': 'https://github.com/gjtorikian/commonmarker/security/advisories/GHSA-fmx4-26r3-wxpf'}, {'type': 'WEB', 'url': 'https://github.com/gjtorikian/commonmarker/commit/ab4504fd17460627a6ab255bc3c63e8e5fc6aed3'}, {'type': 'PACKAGE', 'url': 'https://github.com/gjtorikian/commonmarker'}]
{'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-03T20:28:47Z', 'nvd_published_at': None}
1.4.0
GHSA-85f9-w9cx-h363
2022-11-30T20:54:57Z
2022-03-30T00:00:23Z
null
['CVE-2022-28150']
Cross site request forgery in Jenkins Job and Node ownership Plugin
Job and Node ownership Plugin 0.13.0 and earlier does not perform a permission check in several HTTP endpoints. This allows attackers with Item/Read permission to change the owners and item-specific permissions of a job. Additionally, this endpoint does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.synopsys.jenkinsci:ownership'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.13.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28150'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ownership-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2062%20(1)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/03/29/1'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T15:35:41Z', 'nvd_published_at': '2022-03-29T13:15:00Z'}
1.4.0
GHSA-vx8q-j7h9-vf6q
2022-03-17T21:43:51Z
2022-03-11T00:02:24Z
null
['CVE-2022-0813']
Exposure of Sensitive Information to an Unauthorized Actor in PhpMyAdmin
PhpMyAdmin before 5.1.3 allows an attacker to retrieve potentially sensitive information by creating invalid requests. This affects the lang parameter, the pma_parameter, and the cookie section.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0813'}, {'type': 'WEB', 'url': 'https://www.incibe-cert.es/en/early-warning/security-advisories/phpmyadmin-exposure-sensitive-information'}, {'type': 'WEB', 'url': 'https://www.phpmyadmin.net/news/2022/2/11/phpmyadmin-4910-and-513-are-released/'}]
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T22:48:02Z', 'nvd_published_at': '2022-03-10T17:44:00Z'}
1.4.0
GHSA-x4jg-mjrx-434g
2022-03-30T20:07:56Z
2022-03-18T23:10:28Z
null
['CVE-2022-24772']
Improper Verification of Cryptographic Signature in node-forge
### Impact RSA PKCS#1 v1.5 signature verification code does not check for tailing garbage bytes after decoding a `DigestInfo` ASN.1 structure. This can allow padding bytes to be removed and garbage data added to forge a signature when a low public exponent is being used. ### Patches The issue has been addressed in `node-forge` `1.3.0`. ### References For more information, please see ["Bleichenbacher's RSA signature forgery based on implementation error"](https://mailarchive.ietf.org/arch/msg/openpgp/5rnE9ZRN1AokBVj3VqblGlP63QE/) by Hal Finney. ### For more information If you have any questions or comments about this advisory: * Open an issue in [forge](https://github.com/digitalbazaar/forge) * Email us at [example email address](mailto:[email protected])
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'node-forge'}, 'ecosystem_specific': {'affected_functions': ['forge.pki.rsa']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/digitalbazaar/forge/security/advisories/GHSA-x4jg-mjrx-434g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24772'}, {'type': 'WEB', 'url': 'https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1'}, {'type': 'WEB', 'url': 'https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2'}, {'type': 'PACKAGE', 'url': 'https://github.com/digitalbazaar/forge'}]
{'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T23:10:28Z', 'nvd_published_at': '2022-03-18T14:15:00Z'}
1.4.0
GHSA-9hcj-449v-9234
2022-11-30T20:51:57Z
2022-03-30T00:00:23Z
null
['CVE-2022-28152']
CSRF vulnerability in Jenkins Job and Node ownership Plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins Job and Node ownership Plugin 0.13.0 and earlier allows attackers to restore the default ownership of a job.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.synopsys.jenkinsci:ownership'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.13.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28152'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ownership-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2062%20(2)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/03/29/1'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:51:57Z', 'nvd_published_at': '2022-03-29T13:15:00Z'}
1.4.0
GHSA-78fm-qhh8-8858
2023-07-12T00:02:18Z
2022-03-12T00:00:32Z
null
['CVE-2021-32478']
Moodle reflected XSS
The redirect URI in the LTI authorization endpoint required extra sanitizing to prevent reflected XSS and open redirect risks. Moodle versions 3.10 to 3.10.3, 3.9 to 3.9.6, 3.8 to 3.8.8 and earlier unsupported versions are affected.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10'}, {'fixed': '3.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.10.3'}}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.9'}, {'fixed': '3.9.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.9.6'}}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.8'}, {'fixed': '3.8.9'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.8.8'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32478'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/752ad3d8eb4f9ac22dbf1461aa69d6e0baee503e'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=422314'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T00:02:18Z', 'nvd_published_at': '2022-03-11T18:15:00Z'}
1.4.0
GHSA-qwh6-xwj4-9cjg
2022-03-14T22:46:48Z
2022-03-05T00:00:41Z
null
['CVE-2021-46384']
Remote code execution in net.mingsoft:ms-mcms
net.mingsoft:ms-mcms <=5.2.5 is affected by: RCE. The impact is: execute arbitrary code (remote). The attack vector is: ${"freemarker.template.utility.Execute"?new()("calc")}. ¶¶ MCMS has a pre-auth RCE vulnerability through which allows unauthenticated attacker with network access via http to compromise MCMS. Successful attacks of this vulnerability can result in takeover of MCMS.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46384'}, {'type': 'WEB', 'url': 'https://gitee.com/mingSoft/MCMS/issues/I4QZ1O'}]
{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T22:46:48Z', 'nvd_published_at': '2022-03-04T22:15:00Z'}
1.4.0
GHSA-x63v-prhc-xx6f
2022-11-30T20:56:10Z
2022-03-30T00:00:23Z
null
['CVE-2022-28149']
Stored Cross-site Scripting vulnerability in Jenkins Job and Node ownership Plugin
Jenkins Job and Node ownership Plugin 0.13.0 and earlier does not escape the names of the secondary owners, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.synopsys.jenkinsci:ownership'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.13.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28149'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ownership-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2285'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/03/29/1'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:56:10Z', 'nvd_published_at': '2022-03-29T13:15:00Z'}
1.4.0
GHSA-mg5h-9rhq-4cqx
2022-03-23T15:40:15Z
2022-03-15T00:01:02Z
null
['CVE-2022-0937']
Cross-site Scripting in ShowDoc
ShowDoc is vulnerable to stored cross-site scripting through file upload in versions 2.10.3 and prior. A patch is available and anticipated to be part of version 2.10.4.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.10.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0937'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/42c0d9813df3035728b36116a6ce9116e6fa8ed3'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/6127739d-f4f2-44cd-ae3d-e3ccb7f0d7b5'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-23T13:57:41Z', 'nvd_published_at': '2022-03-14T03:15:00Z'}
1.4.0
GHSA-r7c9-c69m-rph8
2022-04-19T20:16:49Z
2022-03-26T00:19:30Z
null
['CVE-2017-9841']
Code Injection in PHPUnit
Util/PHP/eval-stdin.php in PHPUnit starting with 4.8.19 and before 4.8.28, as well as 5.x before 5.6.3, allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a `<?php ` substring, as demonstrated by an attack on a site with an exposed /vendor folder, i.e., external access to the /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php URI.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpunit/phpunit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.8.19'}, {'fixed': '4.8.28'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'phpunit/phpunit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.6.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-9841'}, {'type': 'WEB', 'url': 'https://github.com/sebastianbergmann/phpunit/pull/1955'}, {'type': 'WEB', 'url': 'https://github.com/sebastianbergmann/phpunit/pull/1956'}, {'type': 'WEB', 'url': 'https://github.com/sebastianbergmann/phpunit/commit/284a69fb88a2d0845d23f42974a583d8f59bf5a5'}, {'type': 'WEB', 'url': 'https://github.com/sebastianbergmann/phpunit/commit/3aaddb1c5bd9b9b8d070b4cf120e71c36fd08412'}, {'type': 'PACKAGE', 'url': 'https://github.com/sebastianbergmann/phpunit'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201711-15'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://web.archive.org/web/20170701212357/http://phpunit.vulnbusters.com/'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/101798'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1039812'}]
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-26T00:19:30Z', 'nvd_published_at': '2017-06-27T17:29:00Z'}
1.4.0
GHSA-5p9j-w2wx-qx4c
2022-03-14T21:19:27Z
2022-03-07T00:00:40Z
null
['CVE-2022-0869']
Open Redirect in django-spirit
django-spirit prior to version 0.12.3 is vulnerable to open redirect. In the /user/login endpoint, it doesn't check the value of the next parameter when the user is logged in and passes it directly to redirect which result to open redirect. This also affects /user/logout, /user/register, /user/login, /user/resend-activation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django-spirit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0869'}, {'type': 'WEB', 'url': 'https://github.com/nitely/spirit/commit/8f32f89654d6c30d56e0dd167059d32146fb32ef'}, {'type': 'PACKAGE', 'url': 'https://github.com/nitely/spirit'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ed335a88-f68c-4e4d-ac85-f29a51b03342'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-07T20:17:27Z', 'nvd_published_at': '2022-03-06T10:15:00Z'}
1.4.0
GHSA-j3ff-xp6c-6gcc
2022-03-18T18:57:53Z
2022-03-18T18:57:53Z
null
['CVE-2022-24759']
Failure to validate signature during handshake
### Impact `@chainsafe/libp2p-noise` before 4.1.2 and 5.0.3 was not correctly validating signatures during the handshake process. This may allow a man-in-the-middle to pose as other peers and get those peers banned. ### Patches Users should upgrade to 4.1.2 or 5.0.3 ### Workarounds No workarounds, just patch upgrade ### References https://github.com/ChainSafe/js-libp2p-noise/pull/130
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': '@chainsafe/libp2p-noise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@chainsafe/libp2p-noise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ChainSafe/js-libp2p-noise/security/advisories/GHSA-j3ff-xp6c-6gcc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24759'}, {'type': 'WEB', 'url': 'https://github.com/ChainSafe/js-libp2p-noise/pull/130'}, {'type': 'PACKAGE', 'url': 'https://github.com/ChainSafe'}, {'type': 'WEB', 'url': 'https://github.com/ChainSafe/js-libp2p-noise/releases/tag/v5.0.3'}]
{'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T18:57:53Z', 'nvd_published_at': '2022-03-17T17:15:00Z'}
1.4.0
GHSA-wg8p-w946-c482
2022-03-29T16:42:37Z
2022-03-16T00:00:47Z
null
['CVE-2022-0956']
Cross-site Scripting in ShowDoc
ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via file upload.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0956'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/56e450c3adf75c707500d7231a78c9fc894c7f13'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/5b0e3f02-309f-4b59-8020-d7ac0f1999f2'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T16:42:37Z', 'nvd_published_at': '2022-03-15T13:15:00Z'}
1.4.0
GHSA-7f63-h6g3-7cwm
2022-03-10T15:59:12Z
2022-03-01T22:09:25Z
null
['CVE-2022-24717']
Cross Site Scripting (XSS) in @finastra/ssr-pages
A cross site scripting (XSS) issue can occur when providing untrusted input to the `redirect.link` property as an argument to the `build(MessagePageOptions)` function. ### References - https://github.com/Finastra/ssr-pages/pull/2 - https://github.com/Finastra/ssr-pages/pull/2/commits/133606ffaec2edd9918d9fba5771ed21da7876a5 - https://github.com/Finastra/ssr-pages/commit/98abc59e28fec48246be0d59ac144675d6361073
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@finastra/ssr-pages'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Finastra/ssr-pages/security/advisories/GHSA-7f63-h6g3-7cwm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24717'}, {'type': 'WEB', 'url': 'https://github.com/Finastra/ssr-pages/pull/2'}, {'type': 'WEB', 'url': 'https://github.com/Finastra/ssr-pages/pull/2/commits/133606ffaec2edd9918d9fba5771ed21da7876a5'}, {'type': 'WEB', 'url': 'https://github.com/Finastra/ssr-pages/commit/98abc59e28fec48246be0d59ac144675d6361073'}, {'type': 'PACKAGE', 'url': 'https://github.com/Finastra/ssr-pages'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T22:09:25Z', 'nvd_published_at': '2022-03-01T19:15:00Z'}
1.4.0
GHSA-rwg2-w82x-v57j
2022-11-30T20:49:11Z
2022-03-30T00:00:26Z
null
['CVE-2022-28155']
XML External Entity Reference vulnerability in Jenkins Pipeline: Phoenix AutoTest Plugin
Jenkins Pipeline: Phoenix AutoTest Plugin 1.3 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. This allows attackers able to control the input files for the `readXml` or `writeXml` build step to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.surenpi.jenkins:phoenix-autotest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28155'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/phoenix-autotest-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-1897'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/03/29/1'}]
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:49:11Z', 'nvd_published_at': '2022-03-29T13:15:00Z'}
1.4.0
GHSA-322v-p3jc-7hrg
2022-03-30T18:05:15Z
2022-03-26T00:00:34Z
null
['CVE-2022-25576']
Cross-Site Request Forgery in Anchor CMS
Anchor CMS v0.12.7 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component anchor/routes/posts.php. This vulnerability allows attackers to arbitrarily delete posts.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'anchorcms/anchor-cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.12.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25576'}, {'type': 'PACKAGE', 'url': 'https://github.com/anchorcms/anchor-cms'}, {'type': 'WEB', 'url': 'https://github.com/butterflyhack/anchorcms-0.12.7-CSRF'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-30T18:05:15Z', 'nvd_published_at': '2022-03-24T23:15:00Z'}
1.4.0
GHSA-j34v-3552-5r7j
2022-03-01T22:04:17Z
2022-03-01T22:04:17Z
null
[]
Multiple security issues in Pomerium's embedded envoy
Envoy, which Pomerium is based on, has issued multiple CVEs impacting stability and security. Though Pomerium may not be vulnerable to all of the issues, it is recommended that all users upgrade to Pomerium v0.16.4 as soon as possible to minimize risk. ### Impact - Possible DoS or crash - Resources available to unauthorized users - Pomerium may trust upstream certificates that should not be trusted ### Patches Patched in v0.16.4 ### Workarounds No ### References [Envoy Security Announcement](https://groups.google.com/g/envoy-security-announce/c/QBGxoqZdTR4) * [CVE-2021-43824](https://github.com/envoyproxy/envoy/security/advisories/GHSA-vj5m-rch8-5r2p) (CVSS Score 6.5, Medium): Envoy 1.21.0 and earlier - Potential null pointer dereference when using JWT filter safe_regex match * [CVE-2021-43825](https://github.com/envoyproxy/envoy/security/advisories/GHSA-h69p-g6xg-mhhh) (CVSS Score 6.1, Medium): Envoy 1.21.0 and earlier - Use-after-free when response filters increase response data, and increased data exceeds downstream buffer limits. * [CVE-2021-43826](https://github.com/envoyproxy/envoy/security/advisories/GHSA-cmx3-fvgf-83mf) (CVSS Score 6.1, Medium): Envoy 1.21.0 and earlier - Use-after-free when tunneling TCP over HTTP, if downstream disconnects during upstream connection establishment * [CVE-2022-21654](https://github.com/envoyproxy/envoy/security/advisories/GHSA-5j4x-g36v-m283) (CVSS Score 7.3, High): Envoy 1.7.0 and later - Incorrect configuration handling allows mTLS session re-use without re-validation after validation settings have changed. * [CVE-2022-21655](https://github.com/envoyproxy/envoy/security/advisories/GHSA-7r5p-7fmh-jxpg) (CVSS Score 7.5, High): Envoy 1.21 and earlier - Incorrect handling of internal redirects to routes with a direct response entry * [CVE-2022-21657](https://github.com/envoyproxy/envoy/security/advisories/GHSA-837m-wjrv-vm5g) (CVSS Score 3.1, Low): Envoy 1.20.1 and earlier - X.509 Extended Key Usage and Trust Purposes bypass ### For more information If you have any questions or comments about this advisory: Open an issue in [pomerium/pomerium](https://github.com/pomerium/pomerium/issues) Email us at [[email protected]](mailto:[email protected])
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/pomerium/pomerium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.16.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pomerium/pomerium/security/advisories/GHSA-j34v-3552-5r7j'}, {'type': 'PACKAGE', 'url': 'https://github.com/pomerium/pomerium'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T22:04:17Z', 'nvd_published_at': None}
1.4.0
GHSA-794j-hx96-4w3m
2022-11-30T20:04:51Z
2022-03-16T00:00:42Z
null
['CVE-2022-27211']
CSRF vulnerability and missing permission checks in Jenkins kubernetes-cd Plugin allow capturing credentials
A missing/An incorrect permission check in Jenkins Kubernetes Continuous Deploy Plugin 2.3.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified SSH server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:kubernetes-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27211'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/kubernetes-cd-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2681'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/03/15/2'}]
{'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:04:51Z', 'nvd_published_at': '2022-03-15T17:15:00Z'}
1.4.0
GHSA-fqpx-xfjr-2qr9
2022-11-30T20:20:51Z
2022-03-16T00:00:44Z
null
['CVE-2022-27204']
CSRF vulnerability and missing permission checks in Jenkins Extended Choice Parameter Plugin allow SSRF
Extended Choice Parameter Plugin 346.vd87693c5a_86c and earlier does not perform a permission check on form validation methods. This allows attackers with Overall/Read permission to connect to an attacker-specified URL. Additionally, these form validation methods do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:extended-choice-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '346.vd87693c5a'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27204'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/extended-choice-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-1350'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/03/15/2'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:20:51Z', 'nvd_published_at': '2022-03-15T17:15:00Z'}
1.4.0
GHSA-97m3-w2cp-4xx6
2022-03-25T19:58:47Z
2022-03-16T23:54:32Z
null
['CVE-2022-23812']
Embedded Malicious Code in node-ipc
The package node-ipc versions 10.1.1 and 10.1.2 are vulnerable to embedded malicious code that was introduced by the maintainer. The malicious code was intended to overwrite arbitrary files dependent upon the geo-location of the user IP address. The maintainer removed the malicious code in version 10.1.3.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'node-ipc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.1.1'}, {'fixed': '10.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23812'}, {'type': 'WEB', 'url': 'https://github.com/RIAEvangelist/node-ipc/issues/233'}, {'type': 'WEB', 'url': 'https://github.com/RIAEvangelist/node-ipc/issues/236'}, {'type': 'WEB', 'url': 'https://github.com/RIAEvangelist/node-ipc/commit/847047cf7f81ab08352038b2204f0e7633449580'}, {'type': 'PACKAGE', 'url': 'https://github.com/RIAEvangelist/node-ipc'}, {'type': 'WEB', 'url': 'https://github.com/RIAEvangelist/node-ipc/blob/847047cf7f81ab08352038b2204f0e7633449580/dao/ssl-geospec.js'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220407-0005/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NODEIPC-2426370'}]
{'cwe_ids': ['CWE-506', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-16T23:54:32Z', 'nvd_published_at': '2022-03-16T16:15:00Z'}
1.4.0
GHSA-pgq6-ccqj-hpqr
2023-07-03T21:35:11Z
2022-03-04T00:00:15Z
null
['CVE-2022-23708']
Elasticsearch privilege escalation
A flaw was discovered in Elasticsearch 7.17.0’s upgrade assistant, in which upgrading from version 6.x to 7.x would disable the in-built protections on the security index, allowing authenticated users with “*” index permissions access to this index. Users running a cluster on an affected version that had previously been upgraded from 6.x, should upgrade to 7.17.1. Users that are planning to upgrade from 6.x should not perform an upgrade from 6.x to versions 7.16 through 7.17.0 and should use 7.17.1+ for upgrades from 6.x.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.16.0'}, {'fixed': '7.17.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23708'}, {'type': 'WEB', 'url': 'https://discuss.elastic.co/t/elastic-stack-7-17-1-security-update/298447'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220729-0003/'}]
{'cwe_ids': ['CWE-269'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-04T21:08:50Z', 'nvd_published_at': '2022-03-03T22:15:00Z'}
1.4.0
GHSA-6956-83fg-5wc5
2022-03-29T21:05:15Z
2022-03-18T00:01:11Z
null
['CVE-2022-25354']
Prototype Pollution in set-in
The package set-in before 2.0.3 is vulnerable to Prototype Pollution via the `setIn` method, as it allows an attacker to merge object prototypes into it. **Note:** This vulnerability derives from an incomplete fix of [CVE-2020-28273](https://security.snyk.io/vuln/SNYK-JS-SETIN-1048049)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'set-in'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25354'}, {'type': 'WEB', 'url': 'https://github.com/ahdinosaur/set-in/commit/6bad255961d379e4b1f5fbc52ef9dc8420816f24'}, {'type': 'PACKAGE', 'url': 'https://github.com/ahdinosaur/set-in'}, {'type': 'WEB', 'url': 'https://github.com/ahdinosaur/set-in/blob/dfc226d95cce8129de6708661e06e0c2c06f3490/index.js%23L5'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SETIN-2388571'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T22:42:31Z', 'nvd_published_at': '2022-03-17T12:15:00Z'}
1.4.0
GHSA-j29f-m23h-3p8p
2022-03-29T15:16:19Z
2022-03-17T00:00:48Z
null
['CVE-2022-0911']
Cross-site Scripting in Pimcore
Pimcore 10.3.3 and prior is vulnerable to stored cross-site scripting. A patch is available on the 10.x branch and will likely be part of version 10.4.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.3.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0911'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/11447'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b242edb1-b036-4dca-9b53-891494dd7a77'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T15:16:19Z', 'nvd_published_at': '2022-03-16T09:15:00Z'}
1.4.0
GHSA-w749-p3v6-hccq
2022-06-21T15:59:23Z
2022-03-08T21:25:54Z
null
['CVE-2022-21831']
Possible code injection vulnerability in Rails / Active Storage
The Active Storage module of Rails starting with version 5.2.0 is possibly vulnerable to code injection. This issue was patched in versions 5.2.6.3, 6.0.4.7, 6.1.4.7, and 7.0.2.3. To work around this issue, applications should implement a strict allow-list on accepted transformation methods or arguments. Additionally, a strict ImageMagick security policy will help mitigate this issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activestorage'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.0'}, {'fixed': '5.2.6.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.6.2'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'activestorage'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.4.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.4.6'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'activestorage'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.0'}, {'fixed': '6.1.4.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.1.4.6'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'activestorage'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.2.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.2.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21831'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/0a72f7d670e9aa77a0bb8584cb1411ddabb7546e'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-w749-p3v6-hccq'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activestorage/CVE-2022-21831.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rubyonrails-security/c/n-p-W1yxatI'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/09/msg00002.html'}, {'type': 'WEB', 'url': 'https://rubysec.com/advisories/CVE-2022-21831/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20221118-0001/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5372'}]
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-08T21:25:54Z', 'nvd_published_at': '2022-05-26T17:15:00Z'}
1.4.0
GHSA-rr8m-29g8-8cgc
2022-04-01T20:06:24Z
2022-03-26T00:00:32Z
null
['CVE-2022-1064']
SQL Injection in Fork CMS
Fork CMS is vulnerable to SQL injection through marking blog comments on bulk as spam in versions prior to 5.11.1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'forkcms/forkcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.11.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1064'}, {'type': 'WEB', 'url': 'https://github.com/forkcms/forkcms/commit/6aca30e10b4181534f73f96d6e2ebeb45ec15069'}, {'type': 'PACKAGE', 'url': 'https://github.com/forkcms/forkcms'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/2f664985-c5fc-485b-b4fc-4c401be2cf40'}]
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-30T16:42:34Z', 'nvd_published_at': '2022-03-25T12:15:00Z'}
1.4.0
GHSA-7q88-jxvp-9gp2
2023-07-07T19:15:57Z
2022-03-22T00:00:41Z
null
['CVE-2022-26960']
Path Traversal in Studio-42 elFinder through 2.1.60
`connector.minimal.php` in std42 elFinder through 2.1.60 is affected by path traversal. This allows unauthenticated remote attackers to read, write, and browse files outside the configured document root. This is due to improper handling of absolute file paths.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'studio-42/elfinder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.61'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.1.60'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26960'}, {'type': 'WEB', 'url': 'https://github.com/Studio-42/elFinder/commit/3b758495538a448ac8830ee3559e7fb2c260c6db'}, {'type': 'WEB', 'url': 'https://www.synacktiv.com/publications/elfinder-the-story-of-a-repwning.html'}]
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T19:15:57Z', 'nvd_published_at': '2022-03-21T17:15:00Z'}
1.4.0
GHSA-q863-cchm-c6c6
2022-03-30T20:34:44Z
2022-03-25T00:00:33Z
null
['CVE-2022-0153']
SQL Injection in Fork CMS
Fork CMS contains a SQL injection vulnerability in versions prior to version 5.11.1. When deleting submissions which belong to a formular (made with module `FormBuilder`), the parameter `id[]` is vulnerable to SQL injection.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'forkcms/forkcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.11.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0153'}, {'type': 'WEB', 'url': 'https://github.com/forkcms/forkcms/commit/7a12046a67ae5d8cf04face3ee75e55f03a1a608'}, {'type': 'PACKAGE', 'url': 'https://github.com/forkcms/forkcms'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/841503dd-311c-470a-a8ec-d4579b3274eb'}]
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T20:36:57Z', 'nvd_published_at': '2022-03-24T17:15:00Z'}
1.4.0
GHSA-5mwx-f6w6-7w5r
2022-03-10T22:00:31Z
2022-03-04T00:00:19Z
null
['CVE-2022-24563']
Cross-site Scripting in GeniXCMS
In Genixcms v1.1.11, a stored Cross-Site Scripting (XSS) vulnerability exists in /gxadmin/index.php?page=themes&view=options" via the intro_title and intro_image parameters.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'genix/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24563'}, {'type': 'WEB', 'url': 'https://genix.me/'}, {'type': 'PACKAGE', 'url': 'https://github.com/semplon/GeniXCMS'}, {'type': 'WEB', 'url': 'https://github.com/truonghuuphuc/CVE'}, {'type': 'WEB', 'url': 'https://github.com/truonghuuphuc/CVE/blob/main/CVE-2022-24563.pdf'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-10T22:00:31Z', 'nvd_published_at': '2022-03-03T02:15:00Z'}
1.4.0
GHSA-ph3v-2hq5-5qfq
2022-03-11T20:30:20Z
2022-03-07T00:00:41Z
null
['CVE-2021-46703']
Code injection in RazorEngine
In the IsolatedRazorEngine component of Antaris RazorEngine through 4.5.1-alpha001, an attacker can execute arbitrary .NET code in a sandboxed environment (if users can externally control template contents). NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
[]
[{'package': {'ecosystem': 'NuGet', 'name': 'RazorEngine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.5.1-alpha001'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46703'}, {'type': 'WEB', 'url': 'https://github.com/Antaris/RazorEngine/issues/585'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-11T20:30:20Z', 'nvd_published_at': '2022-03-06T06:15:00Z'}
1.4.0
GHSA-xm3x-787m-p66r
2022-03-29T17:35:55Z
2022-03-16T00:00:46Z
null
['CVE-2022-0964']
Cross-site Scripting in ShowDoc
ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via `.webmv` file upload.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0964'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/dbe39998-8eb7-46ea-997f-7b27f6f16ea0'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T17:33:31Z', 'nvd_published_at': '2022-03-15T16:15:00Z'}
1.4.0
GHSA-6x2m-w449-qwx7
2022-03-18T17:47:49Z
2022-03-15T20:13:38Z
null
['CVE-2022-0811']
Code Injection in CRI-O
### Impact A flaw introduced in CRI-O version 1.19 which an attacker can use to bypass the safeguards and set arbitrary kernel parameters on the host. As a result, anyone with rights to deploy a pod on a Kubernetes cluster that uses the CRI-O runtime can abuse the `kernel.core_pattern` kernel parameter to achieve container escape and arbitrary code execution as root on any node in the cluster. ### Patches The patches will be present in 1.19.6, 1.20.7, 1.21.6, 1.22.3, 1.23.2, 1.24.0 ### Workarounds - Users can set manage_ns_lifecycle to false, which causes the sysctls to be configured by the OCI runtime, which typically filter these cases. This option is available in 1.20 and 1.19. Newer versions don't have this option. - An admission webhook could be created to deny pods that specify a `+` in the sysctl value of a pod. - A [PodSecurityPolicy](https://kubernetes.io/docs/tasks/administer-cluster/sysctl-cluster/#podsecuritypolicy) [deprecated] could be created, specifying all sysctls as forbidden like so: ``` apiVersion: policy/v1beta1 kind: PodSecurityPolicy metadata: name: sysctl-psp spec: forbiddenSysctls: - "*" ``` However, this option will not work if any sysctls are required by any pods in the cluster. ### Credits Credit for finding this vulnerability goes to John Walker and Manoj Ahuje of Crowdstrike. The CRI-O community deeply thanks them for the report. ### For more information If you have any questions or comments about this advisory: * Open an issue in [the CRI-O repo](http://github.com/cri-o/cri-o/issues) * To make a report, email your vulnerability to the private [[email protected]](mailto:[email protected]) list with the security details and the details expected for [all CRI-O bug reports](https://github.com/cri-o/cri-o/blob/main/.github/ISSUE_TEMPLATE/bug-report.yml).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cri-o/cri-o'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.19.0'}, {'fixed': '1.19.6'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/cri-o/cri-o'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.20.0'}, {'fixed': '1.20.7'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/cri-o/cri-o'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.21.0'}, {'fixed': '1.21.6'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/cri-o/cri-o'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.22.0'}, {'fixed': '1.22.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/cri-o/cri-o'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.23.0'}, {'fixed': '1.23.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/cri-o/cri-o/security/advisories/GHSA-6x2m-w449-qwx7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0811'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2022-0811'}, {'type': 'WEB', 'url': 'https://bugs.gentoo.org/835336'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2059475'}, {'type': 'PACKAGE', 'url': 'https://github.com/cri-o/cri-o'}, {'type': 'WEB', 'url': 'https://www.crowdstrike.com/blog/cr8escape-zero-day-vulnerability-discovered-in-cri-o-container-engine-cve-2022-0811/'}]
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-15T20:13:38Z', 'nvd_published_at': '2022-03-16T15:15:00Z'}
1.4.0
GHSA-gq77-3r6x-383w
2022-03-23T14:22:08Z
2022-03-13T00:00:54Z
null
['CVE-2022-0880']
Cross-site Scripting in ShowDoc
ShowDoc version 2.10.3 and prior is vulnerable to stored cross-site scripting. A patch is available and anticipated to be part of version 2.10.4.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.10.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0880'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/818d7fe731f452acccacf731ce47ec27ad68049c'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/df347aa9-ed9b-4f75-af99-c83b8aad3bcf'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-23T14:22:08Z', 'nvd_published_at': '2022-03-12T04:15:00Z'}
1.4.0
GHSA-hm3x-jwwf-jpr9
2022-03-31T20:43:24Z
2022-03-24T00:00:17Z
null
['CVE-2021-4180']
Exposure of Sensitive Information to an Unauthorized Actor in OpenStack tripleo-heat-templates
An information exposure flaw in openstack-tripleo-heat-templates allows an external user to discover the internal IP or hostname. An attacker could exploit this by checking the `www_authenticate_uri parameter` (which is visible to all end users) in configuration files. This would give sensitive information which may aid in additional system exploitation. A patch is available on the `master` branch and anticipated to be part of version 11.6.1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tripleo-heat-templates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.6.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 11.6.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4180'}, {'type': 'WEB', 'url': 'https://github.com/openstack/tripleo-heat-templates/commit/160936df134a471cfd245bd60964046027a571ea'}, {'type': 'WEB', 'url': 'https://github.com/openstack/tripleo-heat-templates/commit/2b9461e97fc5c4ceb0848d1cc4484f656bb85515'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/tripleo/+bug/1955397'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2035793'}, {'type': 'PACKAGE', 'url': 'https://github.com/openstack/tripleo-heat-templates'}]
{'cwe_ids': ['CWE-200', 'CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-31T20:43:24Z', 'nvd_published_at': '2022-03-23T20:15:00Z'}
1.4.0
GHSA-874r-46c6-7p4r
2022-11-30T20:42:25Z
2022-03-16T00:00:45Z
null
['CVE-2022-27196']
Stored Cross-site Scripting vulnerability in Jenkins Favorite Plugin
Jenkins Favorite Plugin 2.4.0 and earlier does not escape the names of jobs in the favorite column, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure or Item/Create permissions.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jvnet.hudson.plugins:favorite'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27196'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/favorite-plugin/commit/543a4d87c4fade02173f793905a99adec517bc3b'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/favorite-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2557'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/03/15/2'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:42:25Z', 'nvd_published_at': '2022-03-15T17:15:00Z'}
1.4.0
GHSA-28mg-98xm-q493
2022-03-18T21:19:29Z
2022-03-08T00:00:32Z
null
['CVE-2022-0697']
Open Redirect in archivy
archivy prior to version 1.7.1 is vulnerable to open redirect.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'archivy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0697'}, {'type': 'WEB', 'url': 'https://github.com/archivy/archivy/commit/2d8cb29853190d42572b36deb61127e68d6be574'}, {'type': 'PACKAGE', 'url': 'https://github.com/archivy/archivy'}, {'type': 'WEB', 'url': 'https://github.com/archivy/archivy/releases/tag/v1.7.1'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/archivy/PYSEC-2022-161.yaml'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/2d0301a2-10ff-48f4-a346-5a0e8707835b'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-08T17:48:14Z', 'nvd_published_at': None}
1.4.0
GHSA-4jp3-q2qm-9fmw
2022-03-28T22:31:17Z
2022-03-14T21:55:33Z
null
['CVE-2022-24733']
Improper Restriction of Rendered UI Layers or Frames in Sylius
### Impact It is possible for a page controlled by an attacker to load the website within an iframe. This will enable a clickjacking attack, in which the attacker's page overlays the target application's interface with a different interface provided by the attacker ### Patches The issue is fixed in versions: 1.9.10, 1.10.11, 1.11.2, and above. ### Workarounds Every response from app should have an X-Frame-Options header set to: ``sameorigin``. To achieve that you just need to add a new **subscriber** in your app. ```php <?php // src/EventListener/XFrameOptionsSubscriber.php namespace App\EventListener final class XFrameOptionsSubscriber implements EventSubscriberInterface { public static function getSubscribedEvents(): array { return [ KernelEvents::RESPONSE => 'onKernelResponse', ]; } public function onKernelResponse(ResponseEvent $event): void { if (!$this->isMainRequest($event)) { return; } $response = $event->getResponse(); $response->headers->set('X-Frame-Options', 'sameorigin'); } private function isMainRequest(ResponseEvent $event): bool { if (\method_exists($event, 'isMainRequest')) { return $event->isMainRequest(); } return $event->isMasterRequest(); } } ``` And register it in the container: ```yaml # config/services.yaml services: # ... App\EventListener\XFrameOptionsSubscriber: tags: ['kernel.event_subscriber'] ``` ### For more information If you have any questions or comments about this advisory: * Open an issue in [Sylius issues](https://github.com/Sylius/Sylius/issues) * Email us at [[email protected]](mailto:[email protected])
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'sylius/sylius'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/sylius'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.10.11'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/sylius'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Sylius/Sylius/security/advisories/GHSA-4jp3-q2qm-9fmw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24733'}, {'type': 'PACKAGE', 'url': 'https://github.com/Sylius/Sylius'}, {'type': 'WEB', 'url': 'https://github.com/Sylius/Sylius/releases/tag/v1.10.11'}, {'type': 'WEB', 'url': 'https://github.com/Sylius/Sylius/releases/tag/v1.11.2'}, {'type': 'WEB', 'url': 'https://github.com/Sylius/Sylius/releases/tag/v1.9.10'}]
{'cwe_ids': ['CWE-1021'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T21:55:33Z', 'nvd_published_at': '2022-03-14T19:15:00Z'}
1.4.0
GHSA-m8gq-83gh-v42v
2022-03-18T23:52:30Z
2022-03-16T00:00:49Z
null
['CVE-2022-27193']
XML External Entities Vulnerability in CVRF-CSAF-Converter
CVRF-CSAF-Converter before 1.0.0-rc2 resolves XML External Entities (XXE). This leads to the inclusion of arbitrary (local) file content into the generated output document. An attacker can exploit this to disclose information from the system running the converter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'cvrf2csaf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0rc2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.0rc1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27193'}, {'type': 'PACKAGE', 'url': 'https://github.com/csaf-tools/CVRF-CSAF-Converter'}, {'type': 'WEB', 'url': 'https://github.com/csaf-tools/CVRF-CSAF-Converter/releases/tag/1.0.0-rc2'}]
{'cwe_ids': ['CWE-552', 'CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T23:52:30Z', 'nvd_published_at': '2022-03-15T05:15:00Z'}
1.4.0
GHSA-45v7-65q8-x294
2022-11-29T21:49:49Z
2022-03-30T00:00:26Z
null
['CVE-2022-28133']
Stored XSS vulnerability in Jenkins Bitbucket Server Integration Plugin
Jenkins Bitbucket Server Integration Plugin 3.1.0 and earlier does not limit URL schemes for callback URLs on OAuth consumers, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create BitBucket Server consumers.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:atlassian-bitbucket-server-integration'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '3.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28133'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/atlassian-bitbucket-server-integration-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2639'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/03/29/1'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T21:49:49Z', 'nvd_published_at': '2022-03-29T13:15:00Z'}