schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
stringlengths 20
20
⌀ | aliases
stringlengths 2
20
| summary
stringlengths 8
154
| details
stringlengths 31
19.1k
| severity
stringlengths 2
92
| affected
stringlengths 75
28.5k
| references
stringlengths 79
7.48k
| database_specific
stringlengths 131
196
|
---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0
|
GHSA-373r-9mg8-3jc4
|
2022-10-27T18:34:41Z
|
2022-10-25T19:00:27Z
| null |
['CVE-2022-34870']
|
Apache Geode vulnerable to Cross-Site Scripting
|
Apache Geode versions up to 1.15.0 are vulnerable to a Cross-Site Scripting (XSS) via data injection when using Pulse web application to view Region entries.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.geode:geode-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34870'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/geode'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/zltlr7f2ymr2m6jj54k4z0c4foos5fwx'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/24/3'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T22:40:48Z', 'nvd_published_at': '2022-10-25T17:15:00Z'}
|
1.4.0
|
GHSA-99j5-fvg3-54pm
|
2022-10-25T20:50:27Z
|
2022-10-20T12:00:17Z
| null |
['CVE-2022-3327']
|
Rdiffweb is missing authentication for critical function
|
Missing Authentication for Critical Function in GitHub repository ikus060/rdiffweb prior to 2.5.0.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3327'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/f2a32f2a9f3fb8be1a9432ac3d81d3aacdb13095'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/rdiffweb/PYSEC-2022-42977.yaml'}, {'type': 'WEB', 'url': 'https://gitlab.com/ikus-soft/rdiffweb#next-release-250'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/02207c8f-2b15-4a31-a86a-74fd2fca0ed1'}]
|
{'cwe_ids': ['CWE-306'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-20T18:40:19Z', 'nvd_published_at': '2022-10-20T00:15:00Z'}
|
1.4.0
|
GHSA-682j-2p53-xp5f
|
2022-12-16T19:48:51Z
|
2022-10-19T19:00:22Z
| null |
['CVE-2022-43423']
|
Agent-to-controller security bypass vulnerability in Jenkins BMC Compuware Source Code Download for Endevor, PDS, and ISPW Plugin
|
BMC Compuware Source Code Download for Endevor, PDS, and ISPW Plugin 2.0.12 and earlier implements an agent/controller message that does not limit where it can be executed.
It allows attackers able to control agent processes to obtain the values of Java system properties from the Jenkins controller process.
This vulnerability is only exploitable in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier. See the [LTS upgrade guide](https://www.jenkins.io/doc/upgrade-guide/2.303/#upgrading-to-jenkins-lts-2-303-3).
BMC Compuware Source Code Download for Endevor, PDS, and ISPW Plugin 2.0.13 restricts execution of the agent/controller message to agents.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.compuware.jenkins:compuware-scm-downloader'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.13'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43423'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/compuware-scm-downloader-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2622'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/19/3'}]
|
{'cwe_ids': ['CWE-693'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T22:01:36Z', 'nvd_published_at': '2022-10-19T16:15:00Z'}
|
1.4.0
|
GHSA-633r-r4p8-pw3w
|
2022-10-12T20:11:41Z
|
2022-10-11T19:00:26Z
| null |
['CVE-2022-41376']
|
Cross site scripting in Metro UI
|
Metro UI v4.4.0 to v4.5.1 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the Javascript function. User input is not properly sanitized before rendering in the `textarea` component.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'metro4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'last_affected': '4.5.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41376'}, {'type': 'WEB', 'url': 'https://alicangonullu.org/konu/138'}, {'type': 'PACKAGE', 'url': 'https://github.com/olton/Metro-UI-CSS'}, {'type': 'WEB', 'url': 'https://youtu.be/_wzGVpX54Rc'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-12T20:11:41Z', 'nvd_published_at': '2022-10-11T17:15:00Z'}
|
1.4.0
|
GHSA-c942-mfmp-p4fh
|
2022-10-25T19:58:53Z
|
2022-10-19T19:00:17Z
| null |
['CVE-2022-41709']
|
Markdownify subject to Remote Code Execution via malicious markdown file
|
Markdownify version 1.4.1 allows an external attacker to execute arbitrary code remotely on any client attempting to view a malicious markdown file through Markdownify. This is possible because the application has the "nodeIntegration" option enabled. There are currently no patched versions and no known workarounds.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'electron-markdownify'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41709'}, {'type': 'WEB', 'url': 'https://fluidattacks.com/advisories/adams/'}, {'type': 'PACKAGE', 'url': 'https://github.com/amitmerchant1990/electron-markdownify'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T19:58:53Z', 'nvd_published_at': '2022-10-19T17:15:00Z'}
|
1.4.0
|
GHSA-c27j-76xg-6x4f
|
2022-10-18T21:16:27Z
|
2022-10-18T21:16:27Z
| null |
['CVE-2022-39315']
|
Kirby CMS vulnerable to user enumeration in the brute force protection
|
### TL;DR
This vulnerability affects all Kirby sites with user accounts (unless Kirby's API and Panel are disabled in the config). It can only be exploited for targeted attacks because the attack does not scale to brute force.
----
### Introduction
User enumeration is a type of vulnerability that allows attackers to confirm which users are registered in a Kirby installation. This information can be abused for social engineering attacks against users of the site or to find out the organizational structure of the company.
User enumeration attacks are performed by entering an existing and a non-existing user into the email address field of the login form. If the system returns a different response or behaves differently depending on whether the user exists, the attacker can enter unknown email addresses and use the different behavior as a clue for the (non-)existing user.
### Impact
Kirby comes with a built-in brute force protection. By default, it will prevent further login attempts after 10 failed logins from a single IP address or of a single existing user. After every failed login attempt, Kirby inserts a random delay between one millisecond and two seconds to make automated attacks harder and to avoid leaking whether the user exists. Unfortunately, this random delay was not inserted after the brute force limit was reached.
Because Kirby only tracks failed login attempts per email address for existing users but always tracks failed login attempts per IP address, this behavior could be abused by attackers for user enumeration. For this to work, an attacker would need to create login requests beyond the trials limit (which is 10 by default) from two or more IP addresses. After the trials limit was reached, the login form immediately blocked further requests for existing users, but not for invalid users.
This exploit does not scale to brute force attacks because of the delay during the first 10 requests per user, the faint difference between the responses for valid and invalid users and the fact that code-based logins would send an email for every login attempt, which makes the attack easy to spot. The vulnerability is therefore only relevant for targeted attacks.
### Patches
The problem has been patched in [Kirby 3.5.8.2](https://github.com/getkirby/kirby/releases/tag/3.5.8.2), [Kirby 3.6.6.2](https://github.com/getkirby/kirby/releases/tag/3.6.6.2), [Kirby 3.7.5.1](https://github.com/getkirby/kirby/releases/tag/3.7.5.1) and [Kirby 3.8.1](https://github.com/getkirby/kirby/releases/tag/3.8.1). Please update to one of these or a [later version](https://github.com/getkirby/kirby/releases) to fix the vulnerability.
In all of the mentioned releases, we have rewritten the affected code so that the delay is also inserted after the brute force limit is reached.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'getkirby/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.8.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'getkirby/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.6.0'}, {'fixed': '3.6.6.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'getkirby/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.0'}, {'fixed': '3.7.5.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'getkirby/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.8.0'}, {'fixed': '3.8.1'}]}], 'versions': ['3.8.0']}]
|
[{'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/security/advisories/GHSA-c27j-76xg-6x4f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39315'}, {'type': 'PACKAGE', 'url': 'https://github.com/getkirby/kirby'}, {'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/releases/tag/3.5.8.2'}, {'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/releases/tag/3.6.6.2'}, {'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/releases/tag/3.7.5.1'}, {'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/releases/tag/3.8.1'}]
|
{'cwe_ids': ['CWE-204', 'CWE-209', 'CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-18T21:16:27Z', 'nvd_published_at': '2022-10-25T17:15:00Z'}
|
1.4.0
|
GHSA-whpx-q3rq-w8jc
|
2022-10-20T18:38:35Z
|
2022-10-20T18:38:35Z
| null |
[]
|
Hardening of TypedArrays with non-canonical numeric property names in SES
|
### Impact
_What kind of vulnerability is it? Who is impacted?_
In Hardened JavaScript, programs can `harden` objects to safely share objects with co-tenant programs without risk of these other programs tampering with their API surface. Hardening does not guarantee that objects are pure or immutable, so a hardened `Map`, for example is superficially tamper-proof, but any party holding a reference to the object can both read and write its contents. Based on this precedent, and because `TypedArray` instances cannot be frozen with `Object.isFrozen`, `harden` does not `freeze` `TypedArrays` and instead makes them non-extensible and makes all non-indexed properties non-writable and non-configurable. This is consistent with the treatment of `Map` because the indexed properties represent mutable content and non-indexed properties represent the API.
Due to a defect in `harden`, properties that have names that parse as numbers but are not the same as the canonical representation of those numbers, as in `"+0"` and `""` which are both equivalent to their canonical number `"0"`, remain writable after hardening.
Any program treating one of these properties as part of its API and relying on `harden` to prevent modifications would be vulnerable to an API pollution attack, affecting only instances shared by mutually suspicious parties.
Unlike a `Map`, a hardened `TypedArray` can only have numbers for content. Any program that is sharing hardened `TypedArrays` between co-tentant programs and relying on harden to only allow these programs to communicate exclusively by changing numbers within the bounds of the TypedArray, may inadvertently have arranged for a mechanism for a pair of third-parties to communicate arbitrary objects on these other properties.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
SES version 0.16.0 patches this issue, causing `harden` to recognize properties with non-canonical numeric representations and ensuring that these properties are non-configurable.
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
Users should avoid sharing `TypedArrays` between co-tenant programs and instead create wrapper objects that produce a read-only view of the underlying data. We allow `harden` to succeed for `TypedArrays` because the treatment is in fact consistent with the behavior of collections like `Map`, but all collections shared between co-tentant programs should probably be attenuated to either read- or write-only facets and probably close over only part of the content of the collection. However, the motivation for allowing `TypedArrays` to be hardened in practice is to allow certain legacy modules to function under Hardened JavaScript with LavaMoat, since they export `TypedArrays`, even though they would ideally export read-only facets of these.
### References
_Are there any links users can visit to find out more?_
Not at this time.
### For more information
If you have any questions or comments about this advisory:
* Email us at [[email protected]](mailto:[email protected])
|
[]
|
[{'package': {'ecosystem': 'npm', 'name': 'ses'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.16.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/endojs/endo/security/advisories/GHSA-whpx-q3rq-w8jc'}, {'type': 'WEB', 'url': 'https://github.com/endojs/endo/commit/88cab0be4cf816dc578f2ff441fd9bcda0aa5cf5'}, {'type': 'PACKAGE', 'url': 'https://github.com/endojs/endo'}]
|
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-10-20T18:38:35Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-j5v3-363p-g843
|
2022-10-24T18:51:43Z
|
2022-10-20T19:00:30Z
| null |
['CVE-2022-40084']
|
OpenCRX vulnerable to password enumeration via error messages in password reset
|
OpenCRX before v5.2.2 was discovered to be vulnerable to password enumeration due to the difference in error messages received during a password reset which could enable an attacker to determine if a username, email or ID is valid.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.opencrx:opencrx-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40084'}, {'type': 'WEB', 'url': 'https://cwe.mitre.org/data/definitions/204.html'}, {'type': 'WEB', 'url': 'https://github.com/ciph0x01/OpenCRX-CVE/blob/main/CVE-2022-40084.md'}]
|
{'cwe_ids': ['CWE-203'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-24T18:51:43Z', 'nvd_published_at': '2022-10-20T14:15:00Z'}
|
1.4.0
|
GHSA-9w72-2f23-57gm
|
2022-10-05T13:59:42Z
|
2022-10-01T00:00:25Z
| null |
['CVE-2022-2922']
|
DNN vulnerable to Relative Path Traversal
|
DNN (GitHub repository dnnsoftware/dnn.platform) prior to 9.11.0 is vulnerable to Relative Path Traversal. Version 9.11.0 contains a patch for this issue.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'NuGet', 'name': 'DotNetNuke.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.11.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'DotNetNuke.Web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.11.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2922'}, {'type': 'WEB', 'url': 'https://github.com/dnnsoftware/Dnn.Platform/commit/3697c5344cef8d49214230f0cc2efcd9e93a00a8'}, {'type': 'WEB', 'url': 'https://github.com/dnnsoftware/dnn.platform/commit/9b17351592fbde376506ba6705dbcc7a74a2a195'}, {'type': 'PACKAGE', 'url': 'https://github.com/dnnsoftware/dnn.platform'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/74918f40-dc11-4218-abef-064eb71a0703'}]
|
{'cwe_ids': ['CWE-22', 'CWE-23'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-03T22:21:19Z', 'nvd_published_at': '2022-09-30T07:15:00Z'}
|
1.4.0
|
GHSA-7wr6-fj4x-893v
|
2022-10-12T18:16:54Z
|
2022-10-06T18:52:04Z
| null |
['CVE-2022-3376']
|
rdiffweb allows a new password to be the same as the previous password
|
rdiffweb prior to 2.5.0a4 allows users to set their new password to be the same as the old password during a password reset. Version 2.5.0a4 enforces a password policy in which a new password cannot be the same as the old one.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3376'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/2ffc2af65c8f8113b06e0b89929c604bcdf844b9'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a9021e93-6d18-4ac1-98ce-550c4697a4ed'}]
|
{'cwe_ids': ['CWE-521'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-06T20:10:38Z', 'nvd_published_at': '2022-10-06T18:16:00Z'}
|
1.4.0
|
GHSA-w596-4wvx-j9j6
|
2023-08-08T12:52:37Z
|
2022-10-16T12:00:23Z
| null |
['CVE-2022-42969']
|
ReDoS in py library when used with subversion
|
The py library through 1.11.0 for Python allows remote attackers to conduct a ReDoS (Regular expression Denial of Service) attack via a Subversion repository with crafted info data, because the InfoSvnCommand argument is mishandled.
The particular codepath in question is the regular expression at `py._path.svnurl.InfoSvnCommand.lspattern` and is only relevant when dealing with subversion (svn) projects. Notably the codepath is not used in the popular pytest project. The developers of the pytest package have released version `7.2.0` which removes their dependency on `py`. Users of `pytest` seeing alerts relating to this advisory may update to version `7.2.0` of `pytest` to resolve this issue. See https://github.com/pytest-dev/py/issues/287#issuecomment-1290407715 for additional context.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'py'}, 'ecosystem_specific': {'affected_functions': ['py._path.svnurl.InfoSvnCommand.lspattern', 'py._path.svnurl.InfoSvnCommand']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.11.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42969'}, {'type': 'WEB', 'url': 'https://github.com/pytest-dev/py/issues/287'}, {'type': 'WEB', 'url': 'https://github.com/pytest-dev/py/issues/288'}, {'type': 'WEB', 'url': 'https://github.com/pytest-dev/pytest/issues/10392'}, {'type': 'PACKAGE', 'url': 'https://github.com/pytest-dev/py'}, {'type': 'WEB', 'url': 'https://github.com/pytest-dev/py/blob/cb87a83960523a2367d0f19226a73aed4ce4291d/py/_path/svnurl.py#L316'}, {'type': 'WEB', 'url': 'https://news.ycombinator.com/item?id=34163710'}, {'type': 'WEB', 'url': 'https://pypi.org/project/py'}]
|
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-18T18:03:13Z', 'nvd_published_at': '2022-10-16T06:15:00Z'}
|
1.4.0
|
GHSA-r8gm-v65f-c973
|
2022-10-31T22:42:57Z
|
2022-10-31T22:42:57Z
| null |
['CVE-2022-39366']
|
acryl-datahub missing JWT signature check
|
# Missing JWT signature check (`GHSL-2022-078`)
The [`StatelessTokenService`](https://github.com/datahub-project/datahub/blob/aa146db611e3a4ca3aa17bb740783f789d4444d3/metadata-service/auth-impl/src/main/java/com/datahub/authentication/token/StatelessTokenService.java#L30) of the DataHub metadata service (GMS) does not verify the signature of JWT tokens. This allows an attacker to connect to DataHub instances as any user if Metadata Service authentication is enabled. This vulnerability occurs because the `StatelessTokenService` of the Metadata service uses the [`parse`](https://github.com/datahub-project/datahub/blob/aa146db611e3a4ca3aa17bb740783f789d4444d3/metadata-service/auth-impl/src/main/java/com/datahub/authentication/token/StatelessTokenService.java#L134) method of `io.jsonwebtoken.JwtParser`, which does not perform a verification of the cryptographic token signature. This means that JWTs are accepted regardless of the used algorithm.
#### Impact
This issue may lead to an authentication bypass.
#### Resources
* [CodeQL: Missing JWT signature check](https://codeql.github.com/codeql-query-help/java/java-missing-jwt-signature-check/)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:L'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'acryl-datahub'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.45'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/datahub-project/datahub/security/advisories/GHSA-r8gm-v65f-c973'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39366'}, {'type': 'WEB', 'url': 'https://codeql.github.com/codeql-query-help/java/java-missing-jwt-signature-check/'}, {'type': 'PACKAGE', 'url': 'https://github.com/datahub-project/datahub'}, {'type': 'WEB', 'url': 'https://github.com/datahub-project/datahub/blob/aa146db611e3a4ca3aa17bb740783f789d4444d3/metadata-service/auth-impl/src/main/java/com/datahub/authentication/token/StatelessTokenService.java#L134'}, {'type': 'WEB', 'url': 'https://github.com/datahub-project/datahub/blob/aa146db611e3a4ca3aa17bb740783f789d4444d3/metadata-service/auth-impl/src/main/java/com/datahub/authentication/token/StatelessTokenService.java#L30'}, {'type': 'WEB', 'url': 'https://github.com/datahub-project/datahub/releases/tag/v0.8.45'}]
|
{'cwe_ids': ['CWE-347'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-31T22:42:57Z', 'nvd_published_at': '2022-10-28T17:15:00Z'}
|
1.4.0
|
GHSA-m5m3-46gj-wch8
|
2023-01-10T16:09:12Z
|
2022-10-06T19:54:55Z
| null |
['CVE-2022-39237']
|
SIF's Digital Signature Hash Algorithms Not Validated
|
### Impact
The `github.com/sylabs/sif/v2/pkg/integrity` package does not verify that the hash algorithm(s) used are cryptographically secure when verifying digital signatures.
### Patches
A patch is available in version >= v2.8.1 of the module. Users are encouraged to upgrade.
The patch is commit https://github.com/sylabs/sif/commit/07fb86029a12e3210f6131e065570124605daeaa
### Workarounds
Users may independently validate that the hash algorithm(s) used for metadata digest(s) and signature hash are cryptographically secure.
### References
* [CVE-2004-2761](https://nvd.nist.gov/vuln/detail/cve-2004-2761)
* [CVE-2005-4900](https://nvd.nist.gov/vuln/detail/cve-2005-4900)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [github.com/sylabs/sif](https://github.com/sylabs/sif/issues/new)
* Email us at [[email protected]](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/sylabs/sif/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/sylabs/sif/security/advisories/GHSA-m5m3-46gj-wch8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39237'}, {'type': 'WEB', 'url': 'https://github.com/sylabs/sif/commit/07fb86029a12e3210f6131e065570124605daeaa'}, {'type': 'PACKAGE', 'url': 'https://github.com/sylabs/sif'}, {'type': 'WEB', 'url': 'https://github.com/sylabs/sif/releases/tag/v2.8.1'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/cve-2004-2761'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/cve-2005-4900'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-1045'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202210-19'}]
|
{'cwe_ids': ['CWE-327', 'CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-06T19:54:55Z', 'nvd_published_at': '2022-10-06T18:16:00Z'}
|
1.4.0
|
GHSA-47xc-9rr2-q7p4
|
2023-06-27T21:56:04Z
|
2022-10-25T19:56:51Z
| null |
['CVE-2022-39327']
|
Improper Control of Generation of Code ('Code Injection') in Azure CLI
|
# Description
In versions previous to 2.40.0, Azure CLI contains a vulnerability for potential code injection. Critical scenarios are where a hosting machine runs an Azure CLI command where parameter values have been provided by an external source.
For example: Application X is a web application with a feature that allows users to create Secrets in an Azure KeyVault. Instead of constructing API calls based on user input, Application X uses Azure CLI commands to create the secrets. Application X has input fields presented to the user and the Azure CLI command parameter values are filled based on the user input fields. This input, when formed correctly, could potentially be run as system commands. Below is an example of the resulting Azure CLI command run on the web app's hosting machine.
```bash
az keyvault secret set --vault-name SomeVault --name foobar --value "abc123|whoami"
```
The above command could potentially run the `whoami` command on the hosting machine.
Interactive, in-terminal use and automation/pipeline scenarios have not been identified as critical risk scenarios.
## Code injection prerequisites
The vulnerability is only applicable when the Azure CLI command is run on a Windows machine **_and_** with any version of PowerShell **_and_**when the parameter value contains the `&` or `|` symbols. If any of these prerequisites are not met, this vulnerability is not applicable.
### 1. The command has to be run on Windows
The Azure CLI has an entry script that, when run on Windows, calls cmd.exe to then call Python. This leads into the next prerequisite.
### 2. The command has to be executed by PowerShell.
PowerShell has input parsing designs that strip out the quotation marks of input with the expectation that it will be taken as a string. When used in a PowerShell environment, the command is input like the above command. However, when it passes through PowerShell into cmd.exe, it looks like the following.
```powershell
az keyvault secret set --vault-name SomeVault --name foobar --value abc123|whoami
```
This leads to the 3rd prerequisite as it won’t just try to run any parameter value as a command.
### 3. The parameter value has to contain a `&` or `|` symbols
In cmd.exe, the `&` and `|` symbols invoke command execution. When a string containing this symbols is passed directly to cmd.exe, quotes are kept and command execution is invoked. However, When a string is passed into PowerShell, the quotes are stripped and passed into cmd.exe making it open to execution.
So, in the `keyvault` example above, the `abc123` portion of the value will be accepted correctly but the value after the `|` symbol will be interpreted as a command.
# Impact
## Code injection
As mentioned in the above scenario where the value is being provided by and outside source to run an Azure CLI command, system commands or even scripts could be run on a hosting machine.
# Patches
Upgrade to Azure CLI 2.40.0 or greater.
As of Azure CLI 2.40.0, a new .ps1 entry script is used as the entry point to call Python rather than cmd.exe. This removes the opportunity for cmd.exe to interpret input as a command invocation. Using this approach has introduced new issues however that you can read about in the "More information" section.
Upgrade to 2.41.0 or greater and manually call the azps.ps1 entry script in identified critical scenarios.
In Azure CLI 2.41.0 we have [reverted back](https://github.com/Azure/azure-cli/pull/24015) to using the cmd.exe entry script as the default while keeping the azps.ps1 entry script for manual Azure CLI calls if users require it.
```powershell
C:\Program Files (x86)\Microsoft SDKs\Azure\CLI2\wbin\azps.ps1 keyvault secret set --vault-name SomeVault --name foobar --value "abc123|whoami"
```
## More information
### PowerShell Parsing with Azure CLI
PowerShell’s input parsing design has caused regressions and issues in Azure CLI’s behavior resulting in broken scripts and pipelines. Below are the known issues and links to GitHub issues. This should not be taken as a complete list since these are **_only the reported_** issues. Users should verify command effectiveness before use in production environments.
1. [PowerShell arrays can't be passed to Azure CLI](https://github.com/Azure/azure-cli/issues/23797)
2. [Argument passthrough token (`--`) doesn't work with Azure CLI in PowerShell](https://github.com/Azure/azure-cli/issues/24034)
3. [Stop parsing token (`--%`) no longer works with Azure CLI in PowerShell](https://github.com/Azure/azure-cli/issues/24114)
4. [stdin passing is interrupted for Azure CLI in PowerShell](https://github.com/Azure/azure-cli/issues/2388)
5. [Azure CLI returns 0 when failing in PowerShell](https://github.com/Azure/azure-cli/issues/23880)
6. [Azure CLI can no longer be invoked by `Start-Process`](https://github.com/Azure/azure-cli/pull/24015)
To avoid these breaking changes, in Azure CLI 2.41.0 we have [reverted back](https://github.com/Azure/azure-cli/pull/24015) to using the cmd.exe entry script as the default while keeping the azps.ps1 entry script for manual Azure CLI calls if users require it.
> 🗒️ The .ps1 entry script is only required for similarly identified scenarios like the example above. Interactive use and automation scenarios have not been identified as high risk.
If the azps.ps1 script is needed, you can call it like this:
```powershell
C:\Program Files (x86)\Microsoft SDKs\Azure\CLI2\wbin\azps.ps1 vm create
```
If you have any questions or comments about this advisory:
* Open an issue in [Azure CLI GitHub repo](https://github.com/Azure/azure-cli)
* Email us at [[email protected]](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'azure-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.40.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/Azure/azure-cli/security/advisories/GHSA-47xc-9rr2-q7p4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39327'}, {'type': 'WEB', 'url': 'https://github.com/Azure/azure-cli/pull/23514'}, {'type': 'WEB', 'url': 'https://github.com/Azure/azure-cli/pull/24015'}, {'type': 'PACKAGE', 'url': 'https://github.com/Azure/azure-cli'}]
|
{'cwe_ids': ['CWE-78', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T19:56:51Z', 'nvd_published_at': '2022-10-25T17:15:00Z'}
|
1.4.0
|
GHSA-7rrj-hqv6-fvpp
|
2022-12-16T20:01:51Z
|
2022-10-19T19:00:18Z
| null |
['CVE-2022-43435']
|
Content-Security-Policy protection for user content can be disabled in Jenkins 360 FireLine Plugin
|
Jenkins sets the Content-Security-Policy header to static files served by Jenkins (specifically `DirectoryBrowserSupport`), such as workspaces, `/userContent`, or archived artifacts, unless a Resource Root URL is specified.
360 FireLine Plugin 1.7.2 and earlier globally disables the `Content-Security-Policy` header for static files served by Jenkins whenever the 'Execute FireLine' build step is executed, if the option 'Open access to HTML with JS or CSS' is checked. This allows cross-site scripting (XSS) attacks by users with the ability to control files in workspaces, archived artifacts, etc.
Jenkins instances with [Resource Root URL](https://www.jenkins.io/doc/book/security/user-content/#resource-root-url) configured are unaffected.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.plugin:fireline'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.7.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43435'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/fireline-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2866'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/19/3'}]
|
{'cwe_ids': ['CWE-693'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T20:27:57Z', 'nvd_published_at': '2022-10-19T16:15:00Z'}
|
1.4.0
|
GHSA-998r-j9rx-qm8m
|
2022-10-22T01:05:56Z
|
2022-10-19T12:00:18Z
| null |
['CVE-2022-42467']
|
Apache Isis webconsole module may directly query the database in prototype mode
|
When running in prototype mode, the h2 webconsole module (accessible from the Prototype menu) is automatically made available with the ability to directly query the database. It was felt that it is safer to require the developer to explicitly enable this capability. As of 2.0.0-M8, this can now be done using the `isis.prototyping.h2-console.web-allow-remote-access` configuration property; the web console will be unavailable without setting this configuration. As an additional safeguard, the new `isis.prototyping.h2-console.generate-random-web-admin-password` configuration parameter (enabled by default) requires that the administrator use a randomly generated password to use the console. The password is printed to the log, as `webAdminPass: xxx` (where `xxx`) is the password. To revert to the original behaviour, the administrator would therefore need to set these configuration parameter: `isis.prototyping.h2-console.web-allow-remote-access=true isis.prototyping.h2-console.generate-random-web-admin-password=false` Note also that the h2 webconsole is never available in production mode, so these safeguards are only to ensure that the webconsole is secured by default also in prototype mode.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.isis.core:isis-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0-M8'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42467'}, {'type': 'WEB', 'url': 'https://github.com/apache/isis/commit/9fcab9816dac37e0f07ffe3f5c4f47df9cec8694'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/isis'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/jbv2ddt00h7ntlbm6vkk4wdmb31pm8q3'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/19/1'}]
|
{'cwe_ids': ['CWE-1188'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T18:48:29Z', 'nvd_published_at': '2022-10-19T08:15:00Z'}
|
1.4.0
|
GHSA-rwqr-m72q-v6cm
|
2022-10-31T15:41:33Z
|
2022-10-25T19:00:29Z
| null |
['CVE-2022-42890']
|
Untrusted code execution in Apache XML Graphics Batik
|
A vulnerability in Batik of Apache XML Graphics allows an attacker to run Java code from untrusted SVG via JavaScript. This issue affects Apache XML Graphics prior to 1.16. Users are recommended to upgrade to version 1.16.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.xmlgraphics:batik'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42890'}, {'type': 'WEB', 'url': 'https://github.com/apache/xmlgraphics-batik/commit/401aa8595f52d085d40ff5b6b4ac0dd372423082'}, {'type': 'WEB', 'url': 'https://github.com/apache/xmlgraphics-batik/commit/52f7a1ad6e3110ec295a35ffc94410eef085707a'}, {'type': 'WEB', 'url': 'https://github.com/apache/xmlgraphics-batik/commit/eada57c716a2757579d53017f8b2aeadaad20edd'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/BATIK-1345'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/pkvhy0nsj1h1mlon008wtzhosbtxjwly'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/10/msg00038.html'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5264'}, {'type': 'WEB', 'url': 'https://xmlgraphics.apache.org/security.html'}, {'type': 'PACKAGE', 'url': 'http://svn.apache.org/repos/asf/xmlgraphics/batik/trunk/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/25/3'}]
|
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T23:10:03Z', 'nvd_published_at': '2022-10-25T17:15:00Z'}
|
1.4.0
|
GHSA-455w-c45v-86rg
|
2022-10-11T13:45:14Z
|
2022-10-11T13:45:14Z
| null |
['CVE-2022-39288']
|
fastify vulnerable to denial of service via malicious Content-Type
|
### Impact
An attacker can send an invalid `Content-Type` header that can cause the application to crash, leading to a possible Denial of Service attack. Only the v4.x line is affected.
(This was updated: upon a close inspection, v3.x is not affected after all).
### Patches
Yes, update to `> v4.8.0`.
### Workarounds
You can reject the malicious content types before the body parser enters in action.
```js
const badNames = Object.getOwnPropertyNames({}.__proto__)
fastify.addHook('onRequest', async (req, reply) => {
for (const badName of badNames) {
if (req.headers['content-type'].indexOf(badName) > -1) {
reply.code(415)
throw new Error('Content type not supported')
}
}
})
```
### References
See the HackerOne report [#1715536](https://hackerone.com/bugs?report_id=1715536&subject=fastify)
### For more information
[Fastify security policy](https://github.com/fastify/fastify/security/policy)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'fastify'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.8.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/fastify/fastify/security/advisories/GHSA-455w-c45v-86rg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39288'}, {'type': 'WEB', 'url': 'https://github.com/fastify/fastify/commit/fbb07e8dfad74c69cd4cd2211aedab87194618e3'}, {'type': 'PACKAGE', 'url': 'https://github.com/fastify/fastify'}, {'type': 'WEB', 'url': 'https://github.com/fastify/fastify/security/policy'}, {'type': 'WEB', 'url': 'https://hackerone.com/bugs?report_id=1715536&subject=fastify'}]
|
{'cwe_ids': ['CWE-754'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-11T13:45:14Z', 'nvd_published_at': '2022-10-10T21:15:00Z'}
|
1.4.0
|
GHSA-f42p-vc8p-7x54
|
2022-10-20T20:11:34Z
|
2022-10-18T19:00:33Z
| null |
['CVE-2022-41547']
|
MobSF allows attackers to read arbitrary files via a crafted HTTP request
|
Mobile Security Framework (MobSF) v0.9.2 and below was discovered to contain a local file inclusion (LFI) vulnerability in the `StaticAnalyzer/views.py` script. This vulnerability allows attackers to read arbitrary files via a crafted HTTP request.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'mobsf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41547'}, {'type': 'WEB', 'url': 'https://github.com/MobSF/Mobile-Security-Framework-MobSF/pull/166'}, {'type': 'WEB', 'url': 'https://github.com/MobSF/Mobile-Security-Framework-MobSF/commit/b9cdd1f52bdf127cf33bb1be369e374a2855f8e6#diff-69d2e38f6bba208c333da6a09a83ca65056fcb60f4e10d23f67c01bcc1ffb58c'}, {'type': 'PACKAGE', 'url': 'https://github.com/MobSF/Mobile-Security-Framework-MobSF'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-18T21:17:22Z', 'nvd_published_at': '2022-10-18T15:15:00Z'}
|
1.4.0
|
GHSA-vj4m-83m8-xpw5
|
2023-06-27T21:55:53Z
|
2022-10-25T20:21:45Z
| null |
['CVE-2022-39341']
|
OpenFGA Authorization Bypass via tupleset wildcard
|
### Overview
During our internal security assessment, it was discovered that OpenFGA versions `v0.2.3` and prior are vulnerable to authorization bypass under certain conditions.
### Am I affected?
You are affected by this vulnerability if you are using `openfga/openfga` version `v0.2.3` and you added a tuple with a wildcard (*) assigned to a tupleset relation (the right hand side of a ‘from’ statement).
### How to fix that?
Upgrade to version `v0.2.4`.
### Backward Compatibility
This update is not backward compatible with any authorization model that uses wildcard on a tupleset relation.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/openfga/openfga'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.2.3'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/openfga/openfga/security/advisories/GHSA-vj4m-83m8-xpw5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39341'}, {'type': 'WEB', 'url': 'https://github.com/openfga/openfga/commit/b466769cc100b2065047786578718d313f52695b'}, {'type': 'PACKAGE', 'url': 'https://github.com/openfga/openfga'}, {'type': 'WEB', 'url': 'https://github.com/openfga/openfga/releases/tag/v0.2.4'}]
|
{'cwe_ids': ['CWE-285', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T20:21:45Z', 'nvd_published_at': '2022-10-25T17:15:00Z'}
|
1.4.0
|
GHSA-pc6f-259w-w3j6
|
2022-10-05T13:57:07Z
|
2022-10-04T00:00:25Z
| null |
['CVE-2022-36551']
|
Heartex - Label Studio Community Edition vulnerable to SSRF in the Data Import module
|
A Server Side Request Forgery (SSRF) in the Data Import module in Heartex - Label Studio Community Edition versions 1.5.0 and earlier allows an authenticated user to access arbitrary files on the system. Furthermore, self-registration is enabled by default in these versions of Label Studio enabling a remote attacker to create a new account and then exploit the SSRF. This issue is fixed in version 1.6.0.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'label-studio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36551'}, {'type': 'WEB', 'url': 'https://github.com/heartexlabs/label-studio/pull/2840'}, {'type': 'WEB', 'url': 'https://github.com/heartexlabs/label-studio/commit/501142cb815ac964b0c600c491885b67386870c2'}, {'type': 'PACKAGE', 'url': 'https://github.com/heartexlabs/label-studio'}, {'type': 'WEB', 'url': 'https://github.com/heartexlabs/label-studio/releases/tag/1.6.0'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/label-studio/PYSEC-2022-300.yaml'}, {'type': 'WEB', 'url': 'http://heartex.com'}, {'type': 'WEB', 'url': 'http://labelstud.io'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/171548/Label-Studio-1.5.0-Server-Side-Request-Forgery.html'}]
|
{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-04T21:57:17Z', 'nvd_published_at': '2022-10-03T12:15:00Z'}
|
1.4.0
|
GHSA-m974-647v-whv7
|
2022-10-18T03:11:22Z
|
2022-10-12T22:05:41Z
| null |
['CVE-2022-39299']
|
Signature bypass via multiple root elements
|
### Impact
A remote attacker may be able to bypass SAML authentication on a website using passport-saml. A successful attack requires that the attacker is in possession of an arbitrary IDP signed XML element. Depending on the IDP used, fully unauthenticated attacks (e.g without access to a valid user) might also be feasible if generation of a signed message can be triggered.
### Patches
Users should upgrade to passport-saml 3.2.2 or newer. The issue was also present in the beta releases of `node-saml` before v4.0.0-beta.5.
### Workarounds
Disable SAML authentication.
### References
_Are there any links users can visit to find out more?_
### For more information
If you have any questions or comments about this advisory:
* Open a discussion in the [node-saml repo](https://github.com/node-saml/node-saml/discussions)
### Credits
* Felix Wilhelm of Google Project Zero
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'passport-saml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'node-saml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0-beta.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@node-saml/node-saml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0-beta.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@node-saml/passport-saml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0-beta.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/node-saml/passport-saml/security/advisories/GHSA-m974-647v-whv7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39299'}, {'type': 'WEB', 'url': 'https://github.com/node-saml/passport-saml/commit/8b7e3f5a91c8e5ac7e890a0c90bc7491ce33155e'}, {'type': 'PACKAGE', 'url': 'https://github.com/node-saml/passport-saml'}, {'type': 'WEB', 'url': 'https://github.com/node-saml/passport-saml/releases/tag/v3.2.2'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/169826/Node-saml-Root-Element-Signature-Bypass.html'}]
|
{'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-12T22:05:41Z', 'nvd_published_at': '2022-10-12T21:15:00Z'}
|
1.4.0
|
GHSA-7fvj-g3wp-29g8
|
2022-10-25T20:34:31Z
|
2022-10-19T19:00:22Z
| null |
['CVE-2022-43429']
|
Jenkins Compuware Topaz for Total Test Plugin vulnerable to Protection Mechanism Failure
|
Jenkins Compuware Topaz for Total Test Plugin 2.4.8 and earlier implements an agent/controller message that does not limit where it can be executed, allowing attackers able to control agent processes to read arbitrary files on the Jenkins controller file system.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.compuware.jenkins:compuware-topaz-for-total-test'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4.8'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43429'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2624'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/19/3'}]
|
{'cwe_ids': ['CWE-693'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T22:01:59Z', 'nvd_published_at': '2022-10-19T16:15:00Z'}
|
1.4.0
|
GHSA-5hw4-m7f3-hhx8
|
2022-10-06T19:53:20Z
|
2022-10-06T19:53:20Z
| null |
['CVE-2018-17057']
|
TCPDF vulnerable to attackers triggering deserialization of arbitrary data
|
An issue was discovered in TCPDF before 6.2.22. Attackers can trigger deserialization of arbitrary data via the `phar://` wrapper.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'tecnickcom/tcpdf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.2.22'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17057'}, {'type': 'WEB', 'url': 'https://github.com/LimeSurvey/LimeSurvey/commit/1cdd78d27697b3150bb44aaa7af1a81062a591a5'}, {'type': 'WEB', 'url': 'https://github.com/tecnickcom/TCPDF/commit/1861e33fe05f653b67d070f7c106463e7a5c26ed'}, {'type': 'WEB', 'url': 'https://contao.org/en/news/security-vulnerability-cve-2018-17057.html'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/wallabag/tcpdf/CVE-2018-17057.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/tecnickcom/TCPDF'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/46634/'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/152200/TCPDF-6.2.19-Deserialization-Remote-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/152360/LimeSurvey-Deserialization-Remote-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2019/Mar/36'}]
|
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-06T19:53:20Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-8g9m-vv69-7j99
|
2022-10-11T19:39:32Z
|
2022-10-10T19:00:18Z
| null |
['CVE-2022-3438']
|
rdiffweb vulnerable to Open Redirect
|
A lack of user input validation leads to an open redirect vulnerability in rdiffweb prior to 2.5.0a4.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0a4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3438'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/4d464b467f14b8eb9103d7f5f0774e49995527c7'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/bc5689e4-221a-4200-a8ab-42c659f89f67'}]
|
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-10T21:35:54Z', 'nvd_published_at': '2022-10-10T12:15:00Z'}
|
1.4.0
|
GHSA-3fhq-72hw-jqwv
|
2022-10-05T14:01:18Z
|
2022-10-01T00:00:21Z
| null |
['CVE-2022-3371']
|
rdiffweb's lack of token name length limit can result in DoS or memory corruption
|
rdiffweb prior to 2.5.0a3 is vulnerable to Allocation of Resources Without Limits or Throttling. A lack of limit in the length of the `Token name` parameter can result in denial of service or memory corruption. Version 2.5.0a3 fixes this issue.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0a3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3371'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/b62c479ff6979563c7c23e7182942bc4f460a2c7'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/rdiffweb/PYSEC-2022-299.yaml'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/4e8f6136-50c7-4fa1-ac98-699bcb7b35ce'}]
|
{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-03T22:19:03Z', 'nvd_published_at': '2022-09-30T14:15:00Z'}
|
1.4.0
|
GHSA-95x7-mh78-7w2r
|
2022-10-27T18:35:10Z
|
2022-10-25T20:13:38Z
| null |
['CVE-2022-39340']
|
OpenFGA subject to Information Disclosure via streamed-list-objects endpoint
|
### Overview
During our internal security assessment, it was discovered that `streamed-list-objects` endpoint was not validating the authorization header resulting in the disclosure of objects in the store.
### Am I Affected?
You are affected by this vulnerability if you are using `openfga/openfga` version `v0.2.3` or prior and you are exposing the OpenFGA service to the internet.
### How to fix that?
Upgrade to version `v0.2.4`.
### Backward Compatibility
This update is backward compatible.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/openfga/openfga'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.2.3'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/openfga/openfga/security/advisories/GHSA-95x7-mh78-7w2r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39340'}, {'type': 'WEB', 'url': 'https://github.com/openfga/openfga/commit/779d73d4b6d067ee042ec9b59fec707eed71e42f'}, {'type': 'PACKAGE', 'url': 'https://github.com/openfga/openfga'}, {'type': 'WEB', 'url': 'https://github.com/openfga/openfga/releases/tag/v0.2.4'}]
|
{'cwe_ids': ['CWE-285', 'CWE-862', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T20:13:38Z', 'nvd_published_at': '2022-10-25T17:15:00Z'}
|
1.4.0
|
GHSA-cpx3-93w7-457x
|
2023-08-31T21:28:27Z
|
2022-10-28T19:00:38Z
| null |
['CVE-2022-3697']
|
Ansible leaks password to logs
|
A flaw was found in Ansible in the amazon.aws collection when using the `tower_callback` parameter from the `amazon.aws.ec2_instance` module. This flaw allows an attacker to take advantage of this issue as the module is handling the parameter insecurely, leading to the password leaking in the logs.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '7.0.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3697'}, {'type': 'WEB', 'url': 'https://github.com/ansible-collections/amazon.aws/pull/1199'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/35749'}, {'type': 'WEB', 'url': 'https://github.com/ansible-community/ansible-build-data/blob/main/6/CHANGELOG-v6.rst'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}]
|
{'cwe_ids': ['CWE-233'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-24T23:11:22Z', 'nvd_published_at': '2022-10-28T16:15:00Z'}
|
1.4.0
|
GHSA-c6w8-7mp3-34j9
|
2022-10-18T21:46:08Z
|
2022-10-18T21:46:08Z
| null |
['CVE-2022-24512']
|
.NET Remote Code Execution Vulnerability
|
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 6.0, .NET 5.0, and .NET Core 3.1. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.
A Remote Code Execution vulnerability exists in .NET 6.0, .NET 5.0, and .NET Core 3.1 where a stack buffer overrun occurs in .NET Double Parse routine.
### Patches
* Any .NET 6.0 application running on .NET 6.0.2 or lower
* Any .NET 5.0 application running on .NET 5.0.14 or lower
* Any .NET Core 3.1 application running on .NET Core 3.1.22 or lower
To fix the issue, please install the latest version of .NET 6.0, .NET 5.0, or .NET Core 3.1. If you have installed one or more .NET Core SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET Core SDKs.
* If you're using .NET 6.0, you should download and install Runtime 6.0.3 or SDK 6.0.103 (for Visual Studio 2019 v17.0) or SDK 6.0.201 (for Visual Studio 2019 V17.1) from https://dotnet.microsoft.com/download/dotnet-core/5.0.
* If you're using .NET 5.0, you should download and install Runtime 5.0.15 or SDK 5.0.406 (for Visual Studio 2019 v16.11) or SDK 5.0.212 (for Visual Studio 2019 V16.9) from https://dotnet.microsoft.com/download/dotnet-core/5.0.
* If you're using .NET Core 3.1, you should download and install Runtime 3.1.23 or SDK 3.1.417 (for Visual Studio 2019 v16.7) from https://dotnet.microsoft.com/download/dotnet-core/3.1.
.NET 6.0, .NET 5.0, and .NET Core 3.1 updates are also available from Microsoft Update. To access this either type "Check for updates" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates.
### Other Details
- Announcement for this issue can be found at dotnet/announcements#213
- An Issue for this can be found at https://github.com/dotnet/runtime/issues/66348
- MSRC details for this can be found at https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-24512
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.linux-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.23'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.linux-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.23'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.linux-musl-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.23'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.linux-musl-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.23'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.linux-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.23'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.osx-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.23'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.win-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.23'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.win-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.23'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.23'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.win-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.23'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.linux-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.15'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.linux-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.15'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.linux-musl-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.15'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.linux-musl-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.15'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.linux-musl-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.15'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.linux-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.15'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.linux-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.15'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.linux-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.15'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.linux-musl-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.15'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.linux-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.15'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.LLVM.AOT.linux-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.15'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.LLVM.AOT.linux-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.15'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.LLVM.AOT.osx-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.15'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.LLVM.linux-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.15'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.LLVM.linux-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.15'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.LLVM.osx-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.15'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.osx-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.15'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.osx-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.15'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.win-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.15'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.win-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.15'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.15'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.win-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.15'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.AOT.linux-x64.Cross.android-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.AOT.linux-x64.Cross.android-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.AOT.linux-x64.Cross.android-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.AOT.linux-x64.Cross.android-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.AOT.linux-x64.Cross.browser-wasm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.android-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.android-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.android-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.android-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.browser-wasm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.ios-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.ios-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.iossimulator-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.iossimulator-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.iossimulator-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.maccatalyst-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.maccatalyst-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.tvos-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.tvossimulator-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.AOT.osx-x64.Cross.tvossimulator-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.AOT.win-x64.Cross.android-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.AOT.win-x64.Cross.android-arm.Msi.x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.AOT.win-x64.Cross.android-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.AOT.win-x64.Cross.android-arm64.Msi.x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.AOT.win-x64.Cross.android-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.AOT.win-x64.Cross.android-x64.Msi.x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.AOT.win-x64.Cross.android-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.AOT.win-x64.Cross.android-x86.Msi.x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.AOT.win-x64.Cross.browser-wasm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.AOT.win-x64.Cross.browser-wasm.Msi.x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.linux-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.linux-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.linux-musl-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.linux-musl-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.linux-musl-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.linux-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.android-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.android-arm.Msi.arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.android-arm.Msi.x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.android-arm.Msi.x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.android-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.android-arm64.Msi.arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.android-arm64.Msi.x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.android-arm64.Msi.x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.android-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.android-x64.Msi.arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.android-x64.Msi.x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.android-x64.Msi.x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.android-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.android-x86.Msi.arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.android-x86.Msi.x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.android-x86.Msi.x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.browser-wasm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.browser-wasm.Msi.arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.browser-wasm.Msi.x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.browser-wasm.Msi.x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.ios-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.ios-arm.Msi.arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.ios-arm.Msi.x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.ios-arm.Msi.x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.ios-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.ios-arm64.Msi.arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.ios-arm64.Msi.x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.ios-arm64.Msi.x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.iossimulator-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.iossimulator-arm64.Msi.arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.iossimulator-arm64.Msi.x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.iossimulator-arm64.Msi.x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.iossimulator-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.iossimulator-x64.Msi.arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.iossimulator-x64.Msi.x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.iossimulator-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.iossimulator-x86.Msi.arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.iossimulator-x86.Msi.x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.iossimulator-x86.Msi.x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.linux-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.linux-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.linux-musl-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.linux-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.LLVM.AOT.linux-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.LLVM.AOT.linux-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.LLVM.AOT.osx-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.LLVM.linux-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.LLVM.linux-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.LLVM.osx-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.maccatalyst-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.maccatalyst-arm64.Msi.arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.maccatalyst-arm64.Msi.x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.maccatalyst-arm64.Msi.x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.maccatalyst-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.maccatalyst-x64.Msi.arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.maccatalyst-x64.Msi.x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.maccatalyst-x64.Msi.x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.osx-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.osx-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.tvos-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.tvos-arm64.Msi.arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.tvos-arm64.Msi.x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.tvos-arm64.Msi.x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.tvossimulator-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.tvossimulator-arm64.Msi.arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.tvossimulator-arm64.Msi.x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.tvossimulator-arm64.Msi.x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.tvossimulator-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.tvossimulator-x64.Msi.arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.tvossimulator-x64.Msi.x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.tvossimulator-x64.Msi.x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.Mono.win-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.osx-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.osx-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.win-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.win-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.win-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/dotnet/runtime/security/advisories/GHSA-c6w8-7mp3-34j9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24512'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/213'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/4TOGTZ2ZWDH662ZNFFSZVL3M5AJXV6JF/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/CIJGCVKLHVNLFBTEYJGWS43QG5DYJFBL/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/MQLM7ABVCYJLF6JRPF3M3EBXW63GNC27/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/MRGSPXMZY4RM2L35FYHCXBFROLC23B2V/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/OS2Q4NPRSARP7GHLKFLIYHFOPSYDO6MK/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/ZXEQ3GQVELA2T4HNZG7VPMS2HDVXMJRG/'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24512'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-18T21:46:08Z', 'nvd_published_at': '2022-03-09T17:15:00Z'}
|
1.4.0
|
GHSA-2c6m-6gqh-6qg3
|
2022-10-25T19:54:27Z
|
2022-10-25T19:54:27Z
| null |
['CVE-2022-39321']
|
Docker Command Escaping in the GitHub Actions Runner
|
### Impact
The actions runner invokes the docker cli directly in order to run job containers, service containers, or container actions. A bug in the logic for how the environment is encoded into these docker commands was discovered that allows an input to escape the environment variable and modify that docker command invocation directly. Jobs that use [container actions](https://docs.github.com/en/actions/creating-actions/creating-a-docker-container-action), [job containers](https://docs.github.com/en/actions/using-jobs/running-jobs-in-a-container), or [service containers](https://docs.github.com/en/actions/using-containerized-services/about-service-containers) alongside untrusted user inputs in environment variables may be vulnerable.
### Patches
The Actions Runner has been patched, both on `github.com` and hotfixes for GHES and GHAE customers. Please update to one of the following versions of the runner:
- 2.296.2
- 2.293.1
- 2.289.4
- 2.285.2
- 2.283.4
GHES and GHAE customers may want to patch their instance in order to have their runners automatically upgrade to these new runner versions.
### Workarounds
You may want to consider removing any container actions, job containers, or service containers from your jobs until you are able to upgrade your runner versions.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the actions runner](https://github.com/actions/runner)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'GitHub Actions', 'name': 'actions/runner'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.294.0'}, {'fixed': '2.296.2'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.296.1'}}, {'package': {'ecosystem': 'GitHub Actions', 'name': 'actions/runner'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.290.0'}, {'fixed': '2.293.1'}]}]}, {'package': {'ecosystem': 'GitHub Actions', 'name': 'actions/runner'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.286.0'}, {'fixed': '2.289.4'}]}]}, {'package': {'ecosystem': 'GitHub Actions', 'name': 'actions/runner'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.284.0'}, {'fixed': '2.285.2'}]}]}, {'package': {'ecosystem': 'GitHub Actions', 'name': 'actions/runner'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.283.4'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/actions/runner/security/advisories/GHSA-2c6m-6gqh-6qg3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39321'}, {'type': 'WEB', 'url': 'https://github.com/actions/runner/pull/2107'}, {'type': 'WEB', 'url': 'https://github.com/actions/runner/pull/2108'}, {'type': 'PACKAGE', 'url': 'https://github.com/actions/runner'}]
|
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T19:54:27Z', 'nvd_published_at': '2022-10-25T17:15:00Z'}
|
1.4.0
|
GHSA-hhc4-47rh-cr34
|
2022-10-25T22:27:21Z
|
2022-10-25T22:27:21Z
| null |
['CVE-2022-39354']
|
Incorrect is_static parameter for custom stateful precompiles in SputnikVM (evm)
|
### Impact
A custom stateful precompile can use the `is_static` parameter to determine if the call is executed in a static context (via `STATICCALL`), and thus decide if stateful operations should be done. Previously, the passed `is_static` parameter was incorrect -- it was only set to `true` if the call comes from a **direct** `STATICCALL` opcode. However, once a static call context is entered, it should stay static.
The issue only impacts custom precompiles that actually uses `is_static`. The maintainers estimate the usage is low. However, for those affected, it can lead to possible incorrect state transitions.
### Patches
PR: https://github.com/rust-blockchain/evm/pull/133
Released in v0.36.0.
Older patch versions can be released on request if anyone needs them. Simply contact @sorpaas by email to request it.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [evm repo](https://github.com/rust-blockchain/evm)
* Email Wei at [[email protected]](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'evm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.36.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.35.0'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/rust-blockchain/evm/security/advisories/GHSA-hhc4-47rh-cr34'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39354'}, {'type': 'WEB', 'url': 'https://github.com/rust-blockchain/evm/pull/133'}, {'type': 'PACKAGE', 'url': 'https://github.com/rust-blockchain/evm'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0083.html'}]
|
{'cwe_ids': ['CWE-670'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T22:27:21Z', 'nvd_published_at': '2022-10-25T19:15:00Z'}
|
1.4.0
|
GHSA-5hq7-j5wq-p227
|
2022-10-31T19:24:51Z
|
2022-10-26T12:00:28Z
| null |
['CVE-2022-29822']
|
feathers-sequelize vulnerable to SQL injection due to improper parameter filtering
|
feathers-sequelize is vulnerable to improper parameter filtering in the Feathers js library, which may ultimately lead to SQL injection.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'feathers-sequelize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.3.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29822'}, {'type': 'WEB', 'url': 'https://github.com/feathersjs-ecosystem/feathers-sequelize/commit/0f2d85f0b2d556f2b6c70423dcebdbd29d95e3dc'}, {'type': 'WEB', 'url': 'https://csirt.divd.nl/CVE-2022-29822/'}, {'type': 'WEB', 'url': 'https://csirt.divd.nl/DIVD-2022-00020'}, {'type': 'WEB', 'url': 'https://csirt.divd.nl/cases/DIVD-2022-00020'}, {'type': 'WEB', 'url': 'https://csirt.divd.nl/cves/CVE-2022-29822/'}, {'type': 'PACKAGE', 'url': 'https://github.com/feathersjs-ecosystem/feathers-sequelize'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-31T19:24:51Z', 'nvd_published_at': '2022-10-26T10:15:00Z'}
|
1.4.0
|
GHSA-x8j7-vxh9-p67g
|
2022-12-16T19:43:43Z
|
2022-10-19T19:00:18Z
| null |
['CVE-2022-43418']
|
CSRF vulnerability in Jenkins Katalon Plugin allows capturing credentials
|
Katalon Plugin 1.0.33 and earlier does not require POST requests for several HTTP endpoints, resulting in cross-site request forgery (CSRF) vulnerabilities.
This vulnerability allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Katalon Plugin 1.0.34 requires POST requests for the affected HTTP endpoints.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:katalon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.34'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43418'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/katalon-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2845%20(2)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/19/3'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T21:23:52Z', 'nvd_published_at': '2022-10-19T16:15:00Z'}
|
1.4.0
|
GHSA-q4qq-jhjv-7rh2
|
2022-10-25T20:31:45Z
|
2022-10-18T18:05:36Z
| null |
['CVE-2022-39312']
|
MySQL JDBC deserialization vulnerability
|
### Impact
In Dataease, the Mysql data source in the data source function can customize the JDBC connection parameters and the Mysql server target to be connected.

In `backend/src/main/java/io/dataease/provider/datasource/JdbcProvider.java`, MysqlConfiguration class don't filter any parameters, directly concat user input.
```java
@Getter
@Setter
public class MysqlConfiguration extends JdbcConfiguration {
private String driver = "com.mysql.jdbc.Driver";
private String extraParams = "characterEncoding=UTF-8&connectTimeout=5000&useSSL=false&allowPublicKeyRetrieval=true&zeroDateTimeBehavior=convertToNull";
public String getJdbc() {
if(StringUtils.isEmpty(extraParams.trim())){
return "jdbc:mysql://HOSTNAME:PORT/DATABASE"
.replace("HOSTNAME", getHost().trim())
.replace("PORT", getPort().toString().trim())
.replace("DATABASE", getDataBase().trim());
}else {
return "jdbc:mysql://HOSTNAME:PORT/DATABASE?EXTRA_PARAMS"
.replace("HOSTNAME", getHost().trim())
.replace("PORT", getPort().toString().trim())
.replace("DATABASE", getDataBase().trim())
.replace("EXTRA_PARAMS", getExtraParams().trim());
}
}
}
```
So, if the attack add some parameters in JDBC url, and connect to evil mysql server, he can trigger the mysql jdbc deserialization vulnerability, and eventually the attacker can execute through the deserialization vulnerability system commands and obtain server privileges.
Affected versions: < 1.15.2
### Patches
The vulnerability has been fixed in v1.15.2.
https://github.com/dataease/dataease/blob/6c3a011955c5c753ffd616d030bea5db4793c51c/backend/src/main/java/io/dataease/dto/datasource/MysqlConfiguration.java#L19
the MysqlConfiguration class use `illegalParameters` filter illegal parameters to fix this vulnerability.
```
@Getter
@Setter
public class MysqlConfiguration extends JdbcConfiguration {
private String driver = "com.mysql.jdbc.Driver";
private String extraParams = "characterEncoding=UTF-8&connectTimeout=5000&useSSL=false&allowPublicKeyRetrieval=true&zeroDateTimeBehavior=convertToNull";
private List<String> illegalParameters = Arrays.asList("autoDeserialize", "queryInterceptors", "statementInterceptors", "detectCustomCollations");
public String getJdbc() {
if (StringUtils.isEmpty(extraParams.trim())) {
return "jdbc:mysql://HOSTNAME:PORT/DATABASE"
.replace("HOSTNAME", getHost().trim())
.replace("PORT", getPort().toString().trim())
.replace("DATABASE", getDataBase().trim());
} else {
for (String illegalParameter : illegalParameters) {
if (getExtraParams().contains(illegalParameter)) {
throw new RuntimeException("Illegal parameter: " + illegalParameter);
}
}
return "jdbc:mysql://HOSTNAME:PORT/DATABASE?EXTRA_PARAMS"
.replace("HOSTNAME", getHost().trim())
.replace("PORT", getPort().toString().trim())
.replace("DATABASE", getDataBase().trim())
.replace("EXTRA_PARAMS", getExtraParams().trim());
}
}
}
```
### Workarounds
It is recommended to upgrade the version to v1.15.2.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [https://github.com/dataease/dataease](https://github.com/dataease/dataease)
* Email us at [[email protected]](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'io.dataease:dataease-plugin-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/dataease/dataease/security/advisories/GHSA-q4qq-jhjv-7rh2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39312'}, {'type': 'WEB', 'url': 'https://github.com/dataease/dataease/pull/3328'}, {'type': 'WEB', 'url': 'https://github.com/dataease/dataease/commit/956ee2d6c9e81349a60aef435efc046888e10a6d'}, {'type': 'PACKAGE', 'url': 'https://github.com/dataease/dataease'}, {'type': 'WEB', 'url': 'https://github.com/dataease/dataease/releases/tag/v1.15.2'}]
|
{'cwe_ids': ['CWE-20', 'CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-18T18:05:36Z', 'nvd_published_at': '2022-10-25T17:15:00Z'}
|
1.4.0
|
GHSA-px4x-hjm5-w8x3
|
2022-12-16T19:57:55Z
|
2022-10-19T19:00:22Z
| null |
['CVE-2022-43432']
|
Content-Security-Policy protection for user content disabled by Jenkins XFramium Builder Plugin
|
Jenkins sets the Content-Security-Policy header to static files served by Jenkins (specifically `DirectoryBrowserSupport`), such as workspaces, `/userContent`, or archived artifacts, unless a Resource Root URL is specified.
XFramium Builder Plugin 1.0.22 and earlier globally disables the `Content-Security-Policy` header for static files served by Jenkins as soon as it is loaded. This allows cross-site scripting (XSS) attacks by users with the ability to control files in workspaces, archived artifacts, etc.
Jenkins instances with [Resource Root URL](https://www.jenkins.io/doc/book/security/user-content/#resource-root-url) configured are unaffected.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:xframium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.22'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43432'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/xframium-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2863'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/19/3'}]
|
{'cwe_ids': ['CWE-693'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T22:03:44Z', 'nvd_published_at': '2022-10-19T16:15:00Z'}
|
1.4.0
|
GHSA-6mhr-52mv-6v6f
|
2022-10-18T17:12:46Z
|
2022-10-18T17:12:46Z
| null |
['CVE-2022-39322']
|
Field-level access-control bypass for multiselect field
|
#### Impact
`@keystone-6/[email protected] || 2.3.0` users who are using the `multiselect` field, and provided field-level access control - are vulnerable to their field-level access control not being used.
List-level access control is **NOT** affected.
Field-level access control for fields other than `multiselect` are **NOT** affected.
Example, **you are vulnerable if** you are using field-level access control on a `multiselect` like the following:
```ts
const yourList = list({
access: {
// this is list-level access control, this is NOT impacted
},
fields: {
yourFieldName: multiselect({
// this is field-level access control, for multiselect fields
// this is vulnerable
access: {
create: ({ session }) => session?.data.isAdmin,
update: ({ session }) => session?.data.isAdmin,
},
options: [
{ value: 'apples', label: 'Apples' },
{ value: 'oranges', label: 'Oranges' },
],
// ...
}),
// ...
},
// ...
});
```
#### Mitigation
Please upgrade to `@keystone-6/core >= 2.3.1`, where this vulnerability has been closed.
#### Workarounds
If for some reason you cannot upgrade your dependencies, you should stop using the `multiselect` field.
#### Credits
Thanks to [Marek R](https://github.com/marekryb) for reporting and submitting the pull request to fix this problem.
If you have any questions around this security advisory, please don't hesitate to contact us at [[email protected]](mailto:[email protected]), or [open an issue on GitHub](https://github.com/keystonejs/keystone/issues/new/choose).
If you have a security flaw to report for any software in this repository, please see our [SECURITY policy](https://github.com/keystonejs/keystone/blob/main/SECURITY.md).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@keystone-6/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.3.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/security/advisories/GHSA-6mhr-52mv-6v6f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39322'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/commit/65c6ee3deef23605fc72b80230908696a7a65e7c'}, {'type': 'PACKAGE', 'url': 'https://github.com/keystonejs/keystone'}]
|
{'cwe_ids': ['CWE-285', 'CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-18T17:12:46Z', 'nvd_published_at': '2022-10-25T17:15:00Z'}
|
1.4.0
|
GHSA-398j-f7m7-795j
|
2023-02-15T19:34:00Z
|
2022-10-06T21:25:46Z
| null |
['CVE-2012-0796']
|
PHPMailer vulnerable to email header injection
|
### Impact
Arbitrary additional email headers can be injected via crafted From or Sender headers.
### Patches
Fixed in 2.2.1
### Workarounds
Filter user-supplied values prior to using them in From or Sender properties.
### References
https://nvd.nist.gov/vuln/detail/CVE-2012-0796
### For more information
If you have any questions or comments about this advisory:
* Open a private issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer)
|
[]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'phpmailer/phpmailer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-398j-f7m7-795j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-0796'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=783532'}, {'type': 'PACKAGE', 'url': 'https://github.com/PHPMailer/PHPMailer'}, {'type': 'WEB', 'url': 'http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=62988bf0bbc73df655f51884aaf1f523928abff9'}, {'type': 'WEB', 'url': 'http://moodle.org/mod/forum/discuss.php?d=194015'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2012/dsa-2421'}]
|
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-06T21:25:46Z', 'nvd_published_at': '2012-07-17T10:20:00Z'}
|
1.4.0
|
GHSA-vqvm-qrwh-69h7
|
2022-11-01T20:37:27Z
|
2022-10-31T19:00:34Z
| null |
['CVE-2022-3771']
|
easyii CMS's File Upload Management vulnerable to unrestricted upload
|
This issue affects the function file of the file helpers/Upload.php of the component File Upload Management. The manipulation leads to unrestricted upload. The attack may be initiated remotely.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'noumo/easyii'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3771'}, {'type': 'PACKAGE', 'url': 'https://github.com/noumo/easyii'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.212501'}]
|
{'cwe_ids': ['CWE-284', 'CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-31T22:56:47Z', 'nvd_published_at': '2022-10-31T14:15:00Z'}
|
1.4.0
|
GHSA-485p-mrj5-8w2v
|
2022-10-21T20:50:24Z
|
2022-10-21T20:50:24Z
| null |
['CVE-2022-23267']
|
.NET Denial of Service Vulnerability
|
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 6.0, .NET 5.0 and .NET Core 3.1. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.
A vulnerability exists in .NET 6.0, .NET 5.0 and .NET Core 3.1 where a malicious client can cause a Denial of Service via excess memory allocations through HttpClient.
### Affected software
* Any .NET 6.0 application running on .NET 6.0.4 or earlier.
* Any .NET 5.0 application running .NET 5.0.16 or earlier.
* Any .NET Core 3.1 applicaiton running on .NET Core 3.1.24 or earlier.
### Patches
* If you're using .NET Core 6.0, you should download and install Runtime 6.0.5 or SDK 6.0.105 (for Visual Studio 2022 v17.0) or SDK 6.0.203 (for Visual Studio 2022 v17.1) from https://dotnet.microsoft.com/download/dotnet-core/6.0.
* If you're using .NET 5.0, you should download and install Runtime 5.0.17 or SDK 5.0.214 (for Visual Studio 2019 v16.9) or SDK 5.0.408 (for Visual Studio 2011 v16.11) from https://dotnet.microsoft.com/download/dotnet-core/5.0.
* If you're using .NET Core 3.1, you should download and install Runtime 3.1.25 or SDK 3.1.419 (for Visual Studio 2019 v16.9 or Visual Studio 2011 16.11 or Visual Studio 2022 17.0 or Visual Studio 2022 17.1 ) from https://dotnet.microsoft.com/download/dotnet-core/3.1.
.NET 6.0, .NET 5.0 and .NET Core 3.1 updates are also available from Microsoft Update. To access this either type "Check for updates" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates.
### Other Details
Announcement for this issue can be found at https://github.com/dotnet/announcements/issues/221
An Issue for this can be found at https://github.com/dotnet/runtime/issues/69149
MSRC details for this can be found at https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-23267
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.25'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.25'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-musl-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.25'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-musl-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.25'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.25'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.osx-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.25'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.25'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.25'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.25'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.25'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.17'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.17'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.17'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.osx-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.17'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-musl-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.17'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.17'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.17'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.17'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.17'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-musl-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.17'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-musl-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.1'}, {'fixed': '5.0.17'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.5'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.5'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-musl-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.5'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-musl-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.5'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-musl-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.5'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.5'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.osx-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.5'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.osx-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.5'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.5'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.5'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.5'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.5'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/dotnet/runtime/security/advisories/GHSA-485p-mrj5-8w2v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23267'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/221'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/GNXQL7EZORGU4PZCPJ5EPQ4P7IEY3ZZO/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/IBYSBUDJYQ76HK4TULXVIIPCKK2U6WDB/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/W5FPEQ6BTYRGTS6IYCDTZW6YF5HLQ3BY/'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23267'}]
|
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-21T20:50:24Z', 'nvd_published_at': '2022-05-10T21:15:00Z'}
|
1.4.0
|
GHSA-g66m-fqxf-3w35
|
2022-12-16T17:10:18Z
|
2022-10-19T19:00:22Z
| null |
['CVE-2022-43407']
|
CSRF protection for any URL can be bypassed in Jenkins Pipeline: Input Step Plugin
|
Pipeline: Input Step Plugin 451.vf1a_a_4f405289 and earlier does not restrict or sanitize the optionally specified ID of the `input` step. This ID is used for the URLs that process user interactions for the given `input` step (proceed or abort) and is not correctly encoded.
This allows attackers able to configure Pipelines to have Jenkins build URLs from `input` step IDs that would bypass the CSRF protection of any target URL in Jenkins when the `input` step is interacted with.
Pipeline: Input Step Plugin 456.vd8a_957db_5b_e9 limits the characters that can be used for the ID of `input` steps in Pipelines to alphanumeric characters and URL-safe punctuation. Pipelines with `input` steps having IDs with prohibited characters will fail with an error.
This includes Pipelines that have already been started but not finished before Jenkins is restarted to apply this update.
[Pipeline: Declarative Plugin](https://plugins.jenkins.io/pipeline-model-definition/) provides an `input` directive that is internally using the `input` step, and specifies a non-default ID if not user-defined. Pipeline: Declarative Plugin 2.2114.v2654ca_721309 and earlier may specify values incompatible with this new restriction on legal values: `input` directives in a `stage` use the stage name (which may include prohibited characters) and `input` directives in a `matrix` will use a value generated from the matrix axis values (which always includes prohibited characters). Administrators are advised to update Pipeline: Input Step Plugin and Pipeline: Declarative Plugin at the same time, ideally while no Pipelines are running.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:pipeline-input-step'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '456.vd8a_957db_5b_e9'}]}], 'database_specific': {'last_known_affected_version_range': '< 456.vd8a'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43407'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/pipeline-input-step-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2880'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/19/3'}]
|
{'cwe_ids': ['CWE-838'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T21:21:29Z', 'nvd_published_at': '2022-10-19T16:15:00Z'}
|
1.4.0
|
GHSA-3f3w-gmqf-4hj3
|
2022-10-31T15:53:33Z
|
2022-10-26T19:00:38Z
| null |
['CVE-2022-39944']
|
Apache Linkis subject to Remote Code Execution via deserialization
|
In Apache Linkis <=1.2.0 when used with the MySQL Connector/J, a deserialization vulnerability with possible remote code execution impact exists when an attacker has write access to a database and configures a JDBC EC with a MySQL data source and malicious parameters. Therefore, the parameters in the jdbc url should be blacklisted. This issue is patched in version 1.3.0, and users are recommended to upgrade.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.linkis:linkis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39944'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/incubator-linkis'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/rxytj48q17304snonjtyt5lnlw64gccc'}]
|
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-27T18:40:10Z', 'nvd_published_at': '2022-10-26T16:15:00Z'}
|
1.4.0
|
GHSA-mwwc-3jv2-62j3
|
2022-10-13T18:05:31Z
|
2022-10-11T19:00:29Z
| null |
['CVE-2022-32175']
|
AdGuardHome vulnerable to Cross-Site Request Forgery
|
In AdGuardHome, versions v0.95 through v0.108.0-b.13 are vulnerable to Cross-Site Request Forgery (CSRF), in the custom filtering rules functionality. An attacker can persuade an authorized user to follow a malicious link, resulting in deleting/modifying the custom filtering rules.
The file that contains the vulnerable code is no longer present as of v0.108.0-b.16.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/AdguardTeam/AdGuardHome'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.95'}, {'fixed': '0.108.0-b.16'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32175'}, {'type': 'PACKAGE', 'url': 'https://github.com/AdguardTeam/AdGuardHome'}, {'type': 'WEB', 'url': 'https://github.com/AdguardTeam/AdGuardHome/blob/v0.108.0-b.13/internal/home/controlfiltering.go#L265'}, {'type': 'WEB', 'url': 'https://github.com/AdguardTeam/AdGuardHome/blob/v0.108.0-b.15/internal/home/controlfiltering.go'}, {'type': 'WEB', 'url': 'https://github.com/AdguardTeam/AdGuardHome/blob/v0.108.0-b.16/internal/home/controlfiltering.go'}, {'type': 'WEB', 'url': 'https://www.mend.io/vulnerability-database/CVE-2022-32175'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-11T21:25:02Z', 'nvd_published_at': '2022-10-11T15:15:00Z'}
|
1.4.0
|
GHSA-pmw9-567p-68pc
|
2022-10-31T19:23:29Z
|
2022-10-31T18:45:43Z
| null |
['CVE-2022-3616']
|
OctoRPKI crashes when max iterations is reached
|
### Impact
Attackers can create long chains of CAs that would lead to OctoRPKI exceeding its max iterations parameter that would cause the program to crash and not finish the validation and thus a denial of service.
### Patches
This issue is fixed in v1.4.4
### Workarounds
None.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cloudflare/cfrpki/cmd/octorpki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.3'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/security/advisories/GHSA-pmw9-567p-68pc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3616'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/commit/5f64bcd13477b29cd7ddff6fff3c65dfac3423ca'}, {'type': 'PACKAGE', 'url': 'https://github.com/cloudflare/cfrpki'}]
|
{'cwe_ids': ['CWE-754', 'CWE-834'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-31T18:45:43Z', 'nvd_published_at': '2022-10-28T07:15:00Z'}
|
1.4.0
|
GHSA-7w4x-4h67-pgmv
|
2022-10-22T00:56:34Z
|
2022-10-20T12:00:17Z
| null |
['CVE-2022-31684']
|
Invalid HTTP requests in Reactor Netty HTTP Server may reveal access tokens
|
Reactor Netty HTTP Server, in versions 1.0.11 - 1.0.23, may request log headers in some cases of invalid HTTP requests. The logged headers may reveal valid access tokens to those with access to server logs. This may affect only invalid HTTP requests where logging at WARN level is enabled.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'io.projectreactor.netty:reactor-netty-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.11'}, {'fixed': '1.0.24'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31684'}, {'type': 'PACKAGE', 'url': 'https://search.maven.org/artifact/io.projectreactor.netty/reactor-netty-http'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2022-31684'}]
|
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-20T18:40:50Z', 'nvd_published_at': '2022-10-19T22:15:00Z'}
|
1.4.0
|
GHSA-qv37-mfjf-42h8
|
2022-10-31T16:00:21Z
|
2022-10-25T19:00:22Z
| null |
['CVE-2022-3644']
|
Plaintext storage of tokens in pulp_ansible
|
The collection remote for pulp_ansible stores tokens in plaintext instead of using pulp's encrypted field and exposes them in read/write mode via the API () instead of marking it as write only.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'pulp-ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3644'}, {'type': 'WEB', 'url': 'https://github.com/pulp/pulp_ansible/issues/1221'}, {'type': 'WEB', 'url': 'https://github.com/pulp/pulp_ansible/commit/d13c427b09482a7f598d8ee597d17a8a34888665'}, {'type': 'PACKAGE', 'url': 'https://github.com/pulp/pulp_ansible'}, {'type': 'WEB', 'url': 'https://github.com/pulp/pulp_ansible/blob/main/pulp_ansible/app/models.py#L234'}]
|
{'cwe_ids': ['CWE-256', 'CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T22:28:13Z', 'nvd_published_at': '2022-10-25T18:15:00Z'}
|
1.4.0
|
GHSA-xqv2-3vvq-qg6r
|
2022-10-31T19:22:54Z
|
2022-10-27T19:00:38Z
| null |
['CVE-2022-36182']
|
Hashicorp Boundary vulnerable to clickjacking
|
Hashicorp Boundary is vulnerable to Clickjacking which allow for the interception of login credentials, re-direction of users to malicious sites, or causing users to perform malicious actions on the site.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/boundary'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.11.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36182'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/boundary'}, {'type': 'WEB', 'url': 'https://owasp.org/www-community/attacks/Clickjacking'}, {'type': 'WEB', 'url': 'https://packetstormsecurity.com/files/168654/Hashicorp-Boundary-Clickjacking.html'}]
|
{'cwe_ids': ['CWE-1021'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-28T19:18:55Z', 'nvd_published_at': '2022-10-27T13:15:00Z'}
|
1.4.0
|
GHSA-9398-5ghf-7pr6
|
2022-10-31T18:44:47Z
|
2022-10-31T18:44:47Z
| null |
['CVE-2022-39294']
|
conduit-hyper vulnerable to Denial of Service from unchecked request length
|
Prior to version 0.4.2, `conduit-hyper` did not check any limit on a request's length before calling [`hyper::body::to_bytes`](https://docs.rs/hyper/latest/hyper/body/fn.to_bytes.html). An attacker could send a malicious request with an abnormally large `Content-Length`, which could lead to a panic if memory allocation failed for that request.
In version 0.4.2, `conduit-hyper` sets an internal limit of 128 MiB per request, otherwise returning status 400 ("Bad Request").
This crate is part of the implementation of Rust's [crates.io](https://crates.io/), but that service is not affected due to its existing cloud infrastructure, which already drops such malicious requests. Even with the new limit in place, `conduit-hyper` is not recommended for production use, nor to directly serve the public Internet.
The vulnerability was discovered by Ori Hollander from the JFrog Security Research team.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'conduit-hyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0-alpha.3'}, {'fixed': '0.4.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/conduit-rust/conduit-hyper/security/advisories/GHSA-9398-5ghf-7pr6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39294'}, {'type': 'WEB', 'url': 'https://github.com/conduit-rust/conduit-hyper/commit/4d225a53206505d39438ec6694e15f49c038baff'}, {'type': 'PACKAGE', 'url': 'https://github.com/conduit-rust/conduit-hyper'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0066.html'}]
|
{'cwe_ids': ['CWE-1284', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-31T18:44:47Z', 'nvd_published_at': '2022-10-31T19:15:00Z'}
|
1.4.0
|
GHSA-mqxp-cjr9-c5jm
|
2022-11-16T21:12:51Z
|
2022-10-06T18:52:04Z
|
2022-11-16T21:12:51Z
|
['CVE-2022-40160']
|
JXPath Out-of-bounds Write vulnerability
|
## Withdrawn
This advisory has been withdrawn because the original report was found to be invalid. This link is maintained to preserve external references.
## Original Description
Those using JXPath to interpret XPath may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'commons-jxpath:commons-jxpath'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40160'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47053'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/commons-jxpath'}]
|
{'cwe_ids': ['CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-10T20:57:22Z', 'nvd_published_at': '2022-10-06T18:16:00Z'}
|
1.4.0
|
GHSA-8g35-prrr-gxxf
|
2022-11-01T21:38:06Z
|
2022-10-31T19:00:37Z
| null |
['CVE-2022-40487']
|
ProcessWire vulnerable to Cross-site Scripting
|
ProcessWire v3.0.200 was discovered to contain multiple cross-site scripting (XSS) vulnerabilities via the Search Users and Search Pages function. These vulnerabilities allow attackers to execute arbitrary web scripts or HTML via injection of a crafted payload.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'processwire/processwire'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.200'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40487'}, {'type': 'WEB', 'url': 'https://gist.github.com/filipaze/32ab8683af8d82827028164e361b6e86'}, {'type': 'PACKAGE', 'url': 'https://github.com/processwire/processwire'}, {'type': 'WEB', 'url': 'http://processwire.com'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T21:38:06Z', 'nvd_published_at': '2022-10-31T12:15:00Z'}
|
1.4.0
|
GHSA-599f-7c49-w659
|
2022-10-17T17:34:05Z
|
2022-10-13T19:00:17Z
| null |
['CVE-2022-42889']
|
Arbitrary code execution in Apache Commons Text
|
Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.commons:commons-text'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5'}, {'fixed': '1.10.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.guicedee.services:commons-text'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.2.1-jre17'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42889'}, {'type': 'WEB', 'url': 'https://arxiv.org/pdf/2306.05534'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/commons-text'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/n2bd4vdsgkqh2tm14l1wyc3jyol7s1om'}, {'type': 'WEB', 'url': 'https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0022'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202301-05'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20221020-0004/'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2022-018_Apache_Commons_Text'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/171003/OX-App-Suite-Cross-Site-Scripting-Server-Side-Request-Forgery.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2023/Feb/3'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/13/4'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/18/1'}]
|
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-13T20:22:17Z', 'nvd_published_at': '2022-10-13T13:15:00Z'}
|
1.4.0
|
GHSA-j7pg-863g-22p6
|
2022-12-16T17:17:55Z
|
2022-10-19T19:00:18Z
| null |
['CVE-2022-43410']
|
Webhook endpoint discloses job names to unauthorized users in Jenkins Mercurial Plugin
|
Mercurial Plugin provides a webhook endpoint at `/mercurial/notifyCommit` that can be used to notify Jenkins of changes to an SCM repository. This endpoint receives a repository URL, and Jenkins will schedule polling for all jobs configured with the specified repository. It can be accessed with GET requests and without authentication.
In Mercurial Plugin 1251.va_b_121f184902 and earlier, the output of the webhook endpoint will provide information about which jobs were triggered or scheduled for polling, including jobs the user has no permission to access. This allows attackers with knowledge of Mercurial repository URLs to obtain information about the existence of jobs configured with this Mercurial repository.
Mercurial Plugin 1260.vdfb_723cdcc81 does not provide the names of jobs for which polling is triggered unless the user has the appropriate Item/Read permission.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:mercurial'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1260.vdfb_723cdcc81'}]}], 'database_specific': {'last_known_affected_version_range': '< 1260.vdfb'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43410'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/mercurial-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2831'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/19/3'}]
|
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T20:27:28Z', 'nvd_published_at': '2022-10-19T16:15:00Z'}
|
1.4.0
|
GHSA-j92c-mmf7-j5x5
|
2022-10-18T17:27:36Z
|
2022-10-18T17:27:36Z
| null |
[]
|
Potential inter-blockchain communication (IBC) protocol compromise via "Dragonberry" vulnerability in cheqd
|
### Impact
This vulnerability affects IBC transfers due to a security vulnerability dubbed "Dragonberry" upstream in [Cosmos SDK](https://github.com/cosmos/cosmos-sdk/releases/tag/v0.45.9). The vulnerability could allow malicious attackers to compromise chain-to-chain IBC transfers.
There is no vulnerability in the DID/resource modules for cheqd-node.
### Patches
Node operators are requested to upgrade to [cheqd-node v0.6.9](https://github.com/cheqd/cheqd-node/releases/tag/0.6.9) as soon as possible. Installation instructions are in the release notes. Please do not install any beta/pre-release versions.
### Workarounds
No. The patch takes effect when more than 2/3rds of the voting power of the cheqd network has upgraded to this patch.
An emergency hotfix was released previously under v0.6.8 but this is now deprecated since [Cosmos SDK v0.45.9](https://github.com/cosmos/cosmos-sdk/releases/tag/v0.45.9) officially fixes this upstream.
### References
- [IBC Security Advisory on "Dragonberry"](https://forum.cosmos.network/t/ibc-security-advisory-dragonberry/7702/1) (and [associated security vulnerability "Dragonfruit"](https://forum.cosmos.network/t/cosmos-sdk-security-advisory-dragonfruit/7614))
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [cheqd-node repo](https://github.com/cheqd/cheqd-node/issues)
* Email us at [[email protected]](mailto:[email protected])
* Message us on our community [Slack](http://cheqd.link/join-cheqd-slack) or [Discord](http://cheqd.link/discord-github)
|
[]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cheqd/cheqd-node'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.9'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/cheqd/cheqd-node/security/advisories/GHSA-j92c-mmf7-j5x5'}, {'type': 'WEB', 'url': 'https://forum.cosmos.network/t/ibc-security-advisory-dragonberry/7702/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/cheqd/cheqd-node'}, {'type': 'WEB', 'url': 'https://github.com/cosmos/cosmos-sdk/releases/tag/v0.45.9'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-18T17:27:36Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-hcw3-6459-pwhc
|
2022-10-25T20:34:09Z
|
2022-10-19T19:00:22Z
| null |
['CVE-2022-43431']
|
Jenkins Compuware Strobe Measurement Plugin Missing Authorization vulnerability
|
Jenkins Compuware Strobe Measurement Plugin 1.0.1 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.compuware.jenkins:compuware-strobe-measurement'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43431'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2631'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/19/3'}]
|
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T22:02:50Z', 'nvd_published_at': '2022-10-19T16:15:00Z'}
|
1.4.0
|
GHSA-2w6m-q946-399r
|
2022-10-06T18:21:11Z
|
2022-10-04T00:00:25Z
| null |
['CVE-2022-38817']
|
Dapr Dashboard vulnerable to Incorrect Access Control
|
Dapr Dashboard v0.1.0 through v0.10.0 is vulnerable to Incorrect Access Control that allows attackers to obtain sensitive data.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/dapr/dashboard'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.0'}, {'last_affected': '0.10.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38817'}, {'type': 'WEB', 'url': 'https://github.com/dapr/dashboard/issues/222'}, {'type': 'PACKAGE', 'url': 'https://github.com/dapr/dashboard'}]
|
{'cwe_ids': ['CWE-306'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-04T21:59:06Z', 'nvd_published_at': '2022-10-03T13:15:00Z'}
|
1.4.0
|
GHSA-7cm4-vmf2-8wf2
|
2022-10-18T03:10:44Z
|
2022-10-12T19:00:42Z
| null |
['CVE-2022-40871']
|
Dolibarr vulnerable to Eval Injection
|
Dolibarr ERP & CRM <=15.0.3 are vulnerable to Eval injection. By default, any administrator can be added to the installation page of dolibarr, and if successfully added, malicious code can be inserted into the database and then execute it by eval.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '15.0.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40871'}, {'type': 'PACKAGE', 'url': 'https://github.com/Dolibarr/dolibarr'}, {'type': 'WEB', 'url': 'https://github.com/youncyb/dolibarr-rce'}]
|
{'cwe_ids': ['CWE-95'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-12T20:16:03Z', 'nvd_published_at': '2022-10-12T12:15:00Z'}
|
1.4.0
|
GHSA-3fh5-q6fg-w28q
|
2022-10-27T18:36:42Z
|
2022-10-27T18:36:42Z
| null |
['CVE-2022-39357']
|
Prototype pollution in Snowboard framework
|
### Impact
The Snowboard framework in affected versions is vulnerable to prototype pollution in the main Snowboard class as well as its plugin loader.
### Patches
This issue has been patched in https://github.com/wintercms/winter/commit/2a13faf99972e84c9661258f16c4750fa99d29a1 (for 1.2) and https://github.com/wintercms/winter/commit/bce4b59584abf961e9400af3d7a4fd7638e26c7f (for 1.1) and is available with Winter v1.1.10 and v1.2.1.
### Workarounds
If you have not yet upgraded, or are using the 1.1 branch of Winter (1.1.8 or above), you can avoid this issue by following some common security practices for JavaScript, including implementing a [content security policy](https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP) and auditing your scripts.
The 1.0 branch of Winter is not affected, as it does not contain the Snowboard framework.
### For more information
If you have any questions or comments about this advisory:
- Email us at [[email protected]](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'wintercms/winter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.8'}, {'fixed': '1.1.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'wintercms/winter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/wintercms/winter/security/advisories/GHSA-3fh5-q6fg-w28q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39357'}, {'type': 'WEB', 'url': 'https://github.com/wintercms/winter/commit/2a13faf99972e84c9661258f16c4750fa99d29a1'}, {'type': 'WEB', 'url': 'https://github.com/wintercms/winter/commit/bce4b59584abf961e9400af3d7a4fd7638e26c7f'}, {'type': 'PACKAGE', 'url': 'https://github.com/wintercms/winter'}, {'type': 'WEB', 'url': 'https://github.com/wintercms/winter/releases/tag/v1.1.10'}, {'type': 'WEB', 'url': 'https://github.com/wintercms/winter/releases/tag/v1.2.1'}]
|
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-27T18:36:42Z', 'nvd_published_at': '2022-10-26T15:15:00Z'}
|
1.4.0
|
GHSA-99jc-v8qm-wjvv
|
2022-11-10T22:39:31Z
|
2022-10-06T18:52:04Z
|
2022-11-10T22:39:31Z
|
['CVE-2022-40159']
|
JXPath Out-of-bounds Write vulnerability
|
## Withdrawn
This advisory has been withdrawn because the original report was found to be invalid. This link is maintained to preserve external references.
## Original Description
Those using JXPath to interpret XPath may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'commons-jxpath:commons-jxpath'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40159'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47057'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/commons-jxpath'}]
|
{'cwe_ids': ['CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-10T20:56:31Z', 'nvd_published_at': '2022-10-06T18:16:00Z'}
|
1.4.0
|
GHSA-4hjj-9gp7-4frg
|
2022-12-16T16:35:55Z
|
2022-10-19T19:00:21Z
| null |
['CVE-2022-43405']
|
Sandbox bypass vulnerability in Jenkins Pipeline: Groovy Libraries Plugin and Pipeline: Deprecated Groovy Libraries Plugin
|
Pipeline: Groovy Libraries Plugin and older releases of the Pipeline: Deprecated Groovy Libraries Plugin (formerly Pipeline: Shared Groovy Libraries Plugin) define the l`ibrary` Pipeline step, which allows Pipeline authors to dynamically load Pipeline libraries. The return value of this step can be used to instantiate classes defined in the loaded library.
In Pipeline: Groovy Libraries Plugin 612.v84da_9c54906d and earlier and in Pipeline: Deprecated Groovy Libraries Plugin 583.vf3b_454e43966 and earlier, the `library` step can be used to invoke sandbox-generated synthetic constructors in crafted untrusted libraries and construct any subclassable type. This is similar to SECURITY-582 in the [2017-08-07 security advisory](https://www.jenkins.io/security/advisory/2017-08-07/#multiple-groovy-language-features-allowed-script-security-plugin-sandbox-bypass), but in a different plugin.
This vulnerability allows attackers with permission to define untrusted Pipeline libraries and to define and run sandboxed Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.
Pipeline: Groovy Libraries Plugin 613.v9c41a_160233f rejects improper calls to sandbox-generated synthetic constructors when using the `library` step.
Pipeline: Deprecated Groovy Libraries Plugin 588.v576c103a_ff86 no longer contains the `library` step. It has been moved into the Pipeline: Groovy Libraries Plugin.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:pipeline-groovy-lib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '613.v9c41a_160233f'}]}], 'database_specific': {'last_known_affected_version_range': '< 613.v9c41a'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.workflow:workflow-cps-global-lib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '588.v576c103a_ff86'}]}], 'database_specific': {'last_known_affected_version_range': '<= 583.vf3b'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43405'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(2)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/19/3'}]
|
{'cwe_ids': ['CWE-693'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T22:04:27Z', 'nvd_published_at': '2022-10-19T16:15:00Z'}
|
1.4.0
|
GHSA-jc69-hjw2-fm86
|
2022-10-12T18:23:36Z
|
2022-10-12T18:23:36Z
| null |
['CVE-2022-41828']
|
com.amazon.redshift:redshift-jdbc42 vulnerable to remote command execution
|
### Impact
A potential remote command execution issue exists within `redshift-jdbc42` versions 2.1.0.7 and below. When plugins are used with the driver, it instantiates plugin instances based on Java class names provided via the `sslhostnameverifier`, `socketFactory`, `sslfactory`, and `sslpasswordcallback` connection properties. In affected versions, the driver does not verify if a plugin class implements the expected interface before instantiatiaton. This can lead to loading of arbitrary Java classes, which a knowledgeable attacker with control over the JDBC URL can use to achieve remote code execution.
### Patches
This issue is patched within `redshift-jdbc-42` 2.1.0.8 and above.
### Workarounds
We advise customers using plugins to upgrade to `redshift-jdbc42` version 2.1.0.8 or above. There are no known workarounds for this issue.
### For more information
If you have any questions or comments about this advisory, please contact AWS Security at [[email protected]](mailto:[email protected]).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.amazon.redshift:redshift-jdbc42'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0.8'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/aws/amazon-redshift-jdbc-driver/security/advisories/GHSA-jc69-hjw2-fm86'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41828'}, {'type': 'WEB', 'url': 'https://github.com/aws/amazon-redshift-jdbc-driver/commit/40b143b4698faf90c788ffa89f2d4d8d2ad068b5'}, {'type': 'WEB', 'url': 'https://github.com/aws/amazon-redshift-jdbc-driver/commit/9999659bbc9f3d006fb02a0bf39d5bcf3b503605'}, {'type': 'PACKAGE', 'url': 'https://github.com/aws/amazon-redshift-jdbc-driver'}]
|
{'cwe_ids': ['CWE-704'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-12T18:23:36Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-33c9-rppf-m7fq
|
2023-01-18T06:13:30Z
|
2022-10-07T18:15:39Z
| null |
['CVE-2022-42092']
|
Backdrop CMS Unrestricted File Upload vulnerability
|
Backdrop CMS 1.22.0 has Unrestricted File Upload vulnerability via `themes` that allows attackers to achieve Remote Code Execution.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'backdrop/backdrop'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.22.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42092'}, {'type': 'PACKAGE', 'url': 'https://github.com/backdrop-ops/backdrop-composer'}, {'type': 'WEB', 'url': 'https://grimthereaperteam.medium.com/backdrop-cms-1-22-0-unrestricted-file-upload-themes-ad42a599561c'}]
|
{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-18T06:13:30Z', 'nvd_published_at': '2022-10-07T18:15:00Z'}
|
1.4.0
|
GHSA-x5gv-5rqv-654m
|
2022-10-25T20:35:04Z
|
2022-10-19T19:00:18Z
| null |
['CVE-2022-43427']
|
Jenkins Compuware Topaz for Total Test Plugin allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins
|
Jenkins Compuware Topaz for Total Test Plugin 2.4.8 and earlier does not perform permission checks in several HTTP endpoints, allowing attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.compuware.jenkins:compuware-topaz-for-total-test'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4.8'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43427'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2623'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/19/3'}]
|
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T21:22:17Z', 'nvd_published_at': '2022-10-19T16:15:00Z'}
|
1.4.0
|
GHSA-hw4q-585g-f92x
|
2022-11-10T22:39:08Z
|
2022-10-06T18:52:04Z
|
2022-11-10T22:39:08Z
|
['CVE-2022-40161']
|
JXPath Out-of-bounds Write vulnerability
|
## Withdrawn
This advisory has been withdrawn because the original report was found to be invalid. This link is maintained to preserve external references.
## Original Description
Those using JXPath to interpret XPath may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'commons-jxpath:commons-jxpath'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40161'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47097'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/commons-jxpath'}]
|
{'cwe_ids': ['CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-10T20:57:48Z', 'nvd_published_at': '2022-10-06T18:16:00Z'}
|
1.4.0
|
GHSA-jjjh-jjxp-wpff
|
2023-03-31T14:46:13Z
|
2022-10-03T00:00:31Z
| null |
['CVE-2022-42003']
|
Uncontrolled Resource Consumption in Jackson-databind
|
In FasterXML jackson-databind 2.4.0-rc1 until 2.12.7.1 and in 2.13.x before 2.13.4.2 resource exhaustion can occur because of a lack of a check in primitive value deserializers to avoid deep wrapper array nesting, when the UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled. This was patched in 2.12.7.1, 2.13.4.2, and 2.14.0.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0-rc1'}, {'fixed': '2.12.7.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.13.0'}, {'fixed': '2.13.4.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42003'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/3590'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/3627'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/0e37a39502439ecbaa1a5b5188387c01bf7f7fa1'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/7ba9ac5b87a9d6ac0d2815158ecbeb315ad4dcdc'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/cd090979b7ea78c75e4de8a4aed04f7e9fa8deea'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/d499f2e7bbc5ebd63af11e1f5cf1989fa323aa45'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/d78d00ee7b5245b93103fef3187f70543d67ca33'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=51020'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/blob/2.13/release-notes/VERSION-2.x'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commits/jackson-databind-2.4.0-rc1?after=75b97b8519f0d50c62523ad85170d80a197a2c86+174&branch=jackson-databind-2.4.0-rc1&qualified_name=refs%2Ftags%2Fjackson-databind-2.4.0-rc1'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/compare/jackson-databind-2.13.4.1...jackson-databind-2.13.4.2'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/11/msg00035.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202210-21'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20221124-0004/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5283'}]
|
{'cwe_ids': ['CWE-400', 'CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-04T21:55:46Z', 'nvd_published_at': '2022-10-02T05:15:00Z'}
|
1.4.0
|
GHSA-vpgf-fgm8-gxr2
|
2022-11-01T13:29:32Z
|
2022-10-28T12:00:33Z
| null |
['CVE-2022-26884']
|
Apache DolphinScheduler vulnerable to Path Traversal
|
Users can read any files by log server, Apache DolphinScheduler users should upgrade to version 2.0.6 or higher.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dolphinscheduler:dolphinscheduler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.6'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26884'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/dolphinscheduler'}, {'type': 'WEB', 'url': 'https://github.com/apache/dolphinscheduler/releases/tag/2.0.6'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/xfdst5y4hnrm2ntmc5jzrgmw2htyyb9c'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/28/2'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-31T19:37:13Z', 'nvd_published_at': '2022-10-28T08:15:00Z'}
|
1.4.0
|
GHSA-p5m3-27vh-52j4
|
2022-10-31T19:25:00Z
|
2022-10-26T12:00:28Z
| null |
['CVE-2022-29823']
|
Feather-Sequelize cleanQuery method vulnerable to Prototype Pollution
|
Feather-Sequelize cleanQuery method uses insecure recursive logic to filter unsupported keys from the query object. This results in a Remote Code Execution (RCE) with privileges of application.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'feathers-sequelize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.3.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29823'}, {'type': 'WEB', 'url': 'https://github.com/feathersjs-ecosystem/feathers-sequelize/commit/0b7beaa773dc313fdb27edd9ee8115064d7cf114'}, {'type': 'WEB', 'url': 'https://csirt.divd.nl/CVE-2022-29823/'}, {'type': 'WEB', 'url': 'https://csirt.divd.nl/DIVD-2022-00020'}, {'type': 'WEB', 'url': 'https://csirt.divd.nl/cases/DIVD-2022-00020'}, {'type': 'WEB', 'url': 'https://csirt.divd.nl/cves/CVE-2022-29823/'}, {'type': 'PACKAGE', 'url': 'https://github.com/feathersjs-ecosystem/feathers-sequelize'}]
|
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-31T19:25:00Z', 'nvd_published_at': '2022-10-26T10:15:00Z'}
|
1.4.0
|
GHSA-2jxx-2x93-2q2f
|
2022-12-16T17:24:07Z
|
2022-10-19T19:00:22Z
| null |
['CVE-2022-43412']
|
Non-constant time webhook token comparison in Jenkins Generic Webhook Trigger Plugin
|
Generic Webhook Trigger Plugin 1.84.1 and earlier does not use a constant-time comparison when checking whether the provided and expected webhook token are equal.
This could potentially allow attackers to use statistical methods to obtain a valid webhook token.
Generic Webhook Trigger Plugin 1.84.2 uses a constant-time comparison when validating the webhook token.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:generic-webhook-trigger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.84.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43412'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/generic-webhook-trigger-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2874'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/19/3'}]
|
{'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T22:23:54Z', 'nvd_published_at': '2022-10-19T16:15:00Z'}
|
1.4.0
|
GHSA-9rpw-2h95-666c
|
2022-10-01T15:52:23Z
|
2022-10-01T15:52:23Z
| null |
['CVE-2022-2529']
|
Cloudflare GoFlow vulnerable to a Denial of Service in the sflow packet handling package
|
### Impact
The sflow decode package prior to version 3.4.4 is vulnerable to a denial of service attack. Attackers can craft malformed packets causing the process to consume huge amounts of memory resulting in a denial of service.
### Patches
Version 3.4.4 contains patches fixing this.
### Workarounds
A possible workaround is to not have your goflow collector publicly reachable.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [goflow repo](https://github.com/cloudflare/goflow)
* Email us [netdev[@]cloudflare.com ](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cloudflare/goflow/v3/decoders/sflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.4'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/cloudflare/goflow/security/advisories/GHSA-9rpw-2h95-666c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2529'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/goflow/commit/2b94619a6204443e3ca1769f4e459f9f57039c51'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/goflow/commit/c829ccd2c0aafdc9b886b20bf6f28095607f4998'}, {'type': 'PACKAGE', 'url': 'https://github.com/cloudflare/goflow'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/goflow/releases/tag/v3.4.4'}]
|
{'cwe_ids': ['CWE-20', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-01T15:52:23Z', 'nvd_published_at': '2022-09-30T11:15:00Z'}
|
1.4.0
|
GHSA-pj2c-h76w-vv6f
|
2022-10-07T21:23:18Z
|
2022-10-07T21:23:18Z
| null |
['CVE-2022-39287']
|
tiny-csrf has openly visible CSRF tokens
|
### Impact
Weak encryption on CSRF so tokens can be read by malicious attackers.
### Patches
Problems have been patched as of v1.1.0
### Workarounds
Upgrade to v1.1.0
### References
https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html
### For more information
Submit an issue at [the github repo](https://github.com/valexandersaulys/tiny-csrf)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'tiny-csrf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/valexandersaulys/tiny-csrf/security/advisories/GHSA-pj2c-h76w-vv6f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39287'}, {'type': 'WEB', 'url': 'https://github.com/valexandersaulys/tiny-csrf/commit/8eead6da3b56e290512bbe8d20c2c5df3be317ba'}, {'type': 'PACKAGE', 'url': 'https://github.com/valexandersaulys/tiny-csrf'}]
|
{'cwe_ids': ['CWE-319'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-07T21:23:18Z', 'nvd_published_at': '2022-10-07T20:15:00Z'}
|
1.4.0
|
GHSA-cvxj-4745-843x
|
2022-12-16T19:59:12Z
|
2022-10-19T19:00:22Z
| null |
['CVE-2022-43433']
|
Content-Security-Policy protection for user content disabled by Jenkins ScreenRecorder Plugin
|
Jenkins sets the `Content-Security-Policy` header to static files served by Jenkins (specifically `DirectoryBrowserSupport`), such as workspaces, `/userContent`, or archived artifacts, unless a Resource Root URL is specified.
ScreenRecorder Plugin 0.7 and earlier programmatically updates [the Java system property](https://www.jenkins.io/doc/book/managing/system-properties/#hudson-model-directorybrowsersupport-csp) allowing administrators to customize the `Content-Security-Policy` header for static files served by Jenkins to include `media-src: 'self'`. On a Jenkins instance with default configuration, this effectively disables all other directives in the default rule set, including `script-src`. This allows cross-site scripting (XSS) attacks by users with the ability to control files in workspaces, archived artifacts, etc.
Jenkins instances with [Resource Root URL](https://www.jenkins.io/doc/book/security/user-content/#resource-root-url) configured are unaffected.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:screenrecorder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.7'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43433'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/screenrecorder-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2864'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/19/3'}]
|
{'cwe_ids': ['CWE-693'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T22:03:54Z', 'nvd_published_at': '2022-10-19T16:15:00Z'}
|
1.4.0
|
GHSA-c33w-pm52-mqvf
|
2022-10-25T20:22:01Z
|
2022-10-25T20:22:01Z
| null |
['CVE-2022-39350']
|
@dependencytrack/frontend vulnerable to Persistent Cross-Site-Scripting via Vulnerability Details
|
### Description
Due to the common practice of providing vulnerability details in markdown format, the Dependency-Track frontend renders them using the JavaScript library [Showdown](https://github.com/showdownjs/showdown). Showdown [does not have any XSS countermeasures built in](https://github.com/showdownjs/showdown/wiki/Markdown's-XSS-Vulnerability-(and-how-to-mitigate-it)), and versions before 4.6.1 of the Dependency-Track frontend did not encode or sanitize Showdown's output. This made it possible for arbitrary JavaScript included in vulnerability details via HTML attributes to be executed in context of the frontend.
### Impact
Actors with the `VULNERABILITY_MANAGEMENT` permission can exploit this weakness by creating or editing a custom vulnerability and providing XSS payloads in any of the following fields:
* Description
* Details
* Recommendation
* References
The payload will be executed for users with the `VIEW_PORTFOLIO` permission when browsing to the modified vulnerability's page, for example:
```
https://dtrack.example.com/vulnerabilities/INTERNAL/INT-jd8u-e8tl-8lwu
```
Alternatively, malicious JavaScript could be introduced via any of the vulnerability databases mirrored by Dependency-Track (NVD, GitHub Advisories, OSV, OSS Index, VulnDB). However, this attack vector is highly unlikely, and the team is not aware of any occurrence of this happening.
> **Note**
> The *Vulnerability Details* element of the *Audit Vulnerabilities* tab in the project view is **not** affected.
### Patches
The issue has been fixed in frontend version 4.6.1.
### Credit
Thanks to GitHub user **Waterstraal** for finding and responsibly disclosing the issue.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@dependencytrack/frontend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/DependencyTrack/frontend/security/advisories/GHSA-c33w-pm52-mqvf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39350'}, {'type': 'WEB', 'url': 'https://docs.dependencytrack.org/changelog/'}, {'type': 'PACKAGE', 'url': 'https://github.com/DependencyTrack/frontend'}, {'type': 'WEB', 'url': "https://github.com/showdownjs/showdown/wiki/Markdown's-XSS-Vulnerability-(and-how-to-mitigate-it)"}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T20:22:01Z', 'nvd_published_at': '2022-10-25T17:15:00Z'}
|
1.4.0
|
GHSA-5fvg-h778-jjjx
|
2022-12-16T17:27:51Z
|
2022-10-19T19:00:18Z
| null |
['CVE-2022-43417']
|
Missing permission checks in Jenkins Katalon Plugin allow capturing credentials
|
Katalon Plugin 1.0.32 and earlier does not perform permission checks in several HTTP endpoints.
This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Katalon Plugin 1.0.33 properly performs permission checks when accessing the affected HTTP endpoints.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:katalon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.33'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43417'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/katalon-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2845%20(1)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/19/3'}]
|
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T21:24:04Z', 'nvd_published_at': '2022-10-19T16:15:00Z'}
|
1.4.0
|
GHSA-wmfh-h3vm-rcxm
|
2022-12-16T20:00:32Z
|
2022-10-19T19:00:18Z
| null |
['CVE-2022-43434']
|
Content-Security-Policy protection for user content disabled by Jenkins NeuVector Vulnerability Scanner Plugin
|
Jenkins sets the Content-Security-Policy header to static files served by Jenkins (specifically `DirectoryBrowserSupport`), such as workspaces, `/userContent`, or archived artifacts, unless a Resource Root URL is specified.
NeuVector Vulnerability Scanner Plugin 1.20 and earlier globally disables the `Content-Security-Policy` header for static files served by Jenkins whenever the 'NeuVector Vulnerability Scanner' build step is executed. This allows cross-site scripting (XSS) attacks by users with the ability to control files in workspaces, archived artifacts, etc.
Jenkins instances with [Resource Root URL](https://www.jenkins.io/doc/book/security/user-content/#resource-root-url) configured are unaffected.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:neuvector-vulnerability-scanner'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.22'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.20'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43434'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/neuvector-vulnerability-scanner-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2865'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/19/3'}]
|
{'cwe_ids': ['CWE-693'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T21:21:50Z', 'nvd_published_at': '2022-10-19T16:15:00Z'}
|
1.4.0
|
GHSA-hpqj-7cj6-hfj8
|
2022-10-06T18:20:46Z
|
2022-10-04T00:00:22Z
| null |
['CVE-2022-40764']
|
Snyk CLI affected by Command Injection vulnerability
|
Snyk CLI before 1.996.0 allows arbitrary command execution, affecting Snyk IDE plugins and the snyk npm package. Exploitation could follow from the common practice of viewing untrusted files in the Visual Studio Code editor, for example. The original demonstration was with shell metacharacters in the vendor.json ignore field, affecting snyk-go-plugin before 1.19.1. This affects, for example, the Snyk TeamCity plugin (which does not update automatically) before 20220930.142957.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'snyk'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.996.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'snyk-go-plugin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.19.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40764'}, {'type': 'PACKAGE', 'url': 'https://github.com/snyk/cli'}, {'type': 'WEB', 'url': 'https://github.com/snyk/cli/releases/tag/v1.996.0'}, {'type': 'WEB', 'url': 'https://github.com/snyk/snyk-go-plugin/releases/tag/v1.19.1'}, {'type': 'WEB', 'url': 'https://support.snyk.io/hc/en-us/articles/7015908293789-CVE-2022-40764-Command-Injection-vulnerability-affecting-Snyk-CLI-versions-prior-to-1-996-0'}, {'type': 'WEB', 'url': 'https://www.imperva.com/blog/how-scanning-your-projects-for-security-issues-can-lead-to-remote-code-execution/'}]
|
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-05T21:28:25Z', 'nvd_published_at': '2022-10-03T15:15:00Z'}
|
1.4.0
|
GHSA-vpwh-qmwc-2phg
|
2022-11-01T21:38:30Z
|
2022-10-31T19:00:37Z
| null |
['CVE-2022-40488']
|
ProcessWire vulnerable to Cross-Site Request Forgery
|
ProcessWire v3.0.200 was discovered to contain a Cross-Site Request Forgery (CSRF).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'processwire/processwire'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.200'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40488'}, {'type': 'WEB', 'url': 'https://gist.github.com/filipaze/76138289ded98aa45dfcd939a8afd331'}, {'type': 'PACKAGE', 'url': 'https://github.com/processwire/processwire'}, {'type': 'WEB', 'url': 'http://processwire.com'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T21:38:30Z', 'nvd_published_at': '2022-10-31T12:15:00Z'}
|
1.4.0
|
GHSA-rgv9-q543-rqg4
|
2022-11-15T22:14:42Z
|
2022-10-03T00:00:31Z
| null |
['CVE-2022-42004']
|
Uncontrolled Resource Consumption in FasterXML jackson-databind
|
In FasterXML jackson-databind before 2.12.7.1 and in 2.13.x before 2.13.4, resource exhaustion can occur because of a lack of a check in BeanDeserializer._deserializeFromArray to prevent use of deeply nested arrays. An application is vulnerable only with certain customized choices for deserialization.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.12.7.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.13.0'}, {'fixed': '2.13.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42004'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/3582'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/063183589218fec19a9293ed2f17ec53ea80ba88'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50490'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/11/msg00035.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202210-21'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20221118-0008/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5283'}]
|
{'cwe_ids': ['CWE-400', 'CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-04T21:56:21Z', 'nvd_published_at': '2022-10-02T05:15:00Z'}
|
1.4.0
|
GHSA-2j79-8pqc-r7x6
|
2023-04-12T20:46:47Z
|
2022-10-01T00:00:24Z
| null |
['CVE-2022-24373']
|
react-native-reanimated vulnerable to ReDoS
|
The package react-native-reanimated before 2.10.0 is vulnerable to Regular Expression Denial of Service (ReDoS) due to improper usage of regular expression in the parser of Colors.js.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'react-native-reanimated'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24373'}, {'type': 'WEB', 'url': 'https://github.com/software-mansion/react-native-reanimated/pull/3382'}, {'type': 'WEB', 'url': 'https://github.com/software-mansion/react-native-reanimated/pull/3382/commits/7adf06d0c59382d884a04be86a96eede3d0432fa'}, {'type': 'WEB', 'url': 'https://github.com/software-mansion/react-native-reanimated/commit/8a927904366fa2d02df7a11553f8b0aa93471279'}, {'type': 'PACKAGE', 'url': 'https://github.com/software-mansion/react-native-reanimated'}, {'type': 'WEB', 'url': 'https://github.com/software-mansion/react-native-reanimated/compare/2.9.1...2.10.0'}, {'type': 'WEB', 'url': 'https://github.com/software-mansion/react-native-reanimated/releases/tag/3.0.0-rc.1'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-REACTNATIVEREANIMATED-2949507'}]
|
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-04T21:16:38Z', 'nvd_published_at': '2022-09-30T05:15:00Z'}
|
1.4.0
|
GHSA-p28h-cc7q-c4fg
|
2022-10-04T21:11:32Z
|
2022-10-01T00:00:24Z
| null |
['CVE-2022-21222']
|
css-what vulnerable to ReDoS due to use of insecure regular expression
|
The package css-what before 2.1.3 is vulnerable to Regular Expression Denial of Service (ReDoS) due to the use of insecure regular expression in the `re_attr` variable of index.js. The exploitation of this vulnerability could be triggered via the parse function.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'css-what'}, 'ecosystem_specific': {'affected_functions': ['css-what.parse']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21222'}, {'type': 'WEB', 'url': 'https://github.com/fb55/css-what/commit/dc510929790da6617e7aa93a616498b22f6a6b72'}, {'type': 'PACKAGE', 'url': 'https://github.com/fb55/css-what'}, {'type': 'WEB', 'url': 'https://github.com/fb55/css-what/blob/a38effd5a8f5506d75c7f8f13cbd8c76248a3860/index.js#23L12'}, {'type': 'WEB', 'url': 'https://github.com/fb55/css-what/blob/a38effd5a8f5506d75c7f8f13cbd8c76248a3860/index.js%23L12'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/03/msg00001.html'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-CSSWHAT-3035488'}]
|
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-04T21:11:32Z', 'nvd_published_at': '2022-09-30T05:15:00Z'}
|
1.4.0
|
GHSA-5gg9-gwj4-mqmj
|
2022-10-04T21:53:28Z
|
2022-10-04T00:00:20Z
| null |
['CVE-2022-32173']
|
OrchardCore vulnerable to HTML injection
|
OrchardCore versions starting with 1.0.0-rc1-11259 and prior to 1.4.0 are vulnerable to HTML injection. The vulnerability allows an authenticated user with an editor security role to inject a persistent HTML modal dialog component into the dashboard that will affect admin users. Version 1.4.0 contains a patch.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'NuGet', 'name': 'OrchardCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0-rc1-11259'}, {'fixed': '1.4.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32173'}, {'type': 'WEB', 'url': 'https://github.com/OrchardCMS/OrchardCore/pull/11729'}, {'type': 'WEB', 'url': 'https://github.com/OrchardCMS/OrchardCore/commit/0163c88ddeaca39815d7e6e5ea1c8391085cc136'}, {'type': 'PACKAGE', 'url': 'https://github.com/OrchardCMS/OrchardCore'}, {'type': 'WEB', 'url': 'https://www.mend.io/vulnerability-database/CVE-2022-32173'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-04T21:53:28Z', 'nvd_published_at': '2022-10-03T13:15:00Z'}
|
1.4.0
|
GHSA-wr74-2v66-57pp
|
2022-11-01T20:36:37Z
|
2022-10-31T12:00:18Z
| null |
['CVE-2022-3765']
|
phpMyFAQ vulnerable to stored Cross-site Scripting
|
phpMyFAQ prior to version 3.1.8 is vulnerable to stored Cross-site Scripting.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.8'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3765'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/372428d02a08e90b3a253ba5c506cda84581a5af'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpmyfaq'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/613143a1-8e51-449a-b214-12458308835d'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-31T19:25:22Z', 'nvd_published_at': '2022-10-31T11:15:00Z'}
|
1.4.0
|
GHSA-f9qj-7gh3-mhj4
|
2022-10-25T20:30:47Z
|
2022-10-19T18:54:28Z
| null |
['CVE-2022-39326']
|
run-terraform allows for RCE via terraform plan
|
### Impact
_What kind of vulnerability is it? Who is impacted?_
All users of the `run-terraform` reusable workflow from the kartverket/github-workflows repo are affected. A malicious actor could potentially send a PR with a malicious payload leading to execution of arbitrary JavaScript code in the context of the workflow.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
Upgrade to at least 2.7.5 to resolve the issue.
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
Until you are able to upgrade, make sure to review any PRs from exernal users for malicious payloads before allowing them to trigger a build.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [kartverket/github-workflows](https://github.com/kartverket/github-workflows)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'GitHub Actions', 'name': 'kartverket/github-workflows'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.5'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/kartverket/github-workflows/security/advisories/GHSA-f9qj-7gh3-mhj4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39326'}, {'type': 'WEB', 'url': 'https://github.com/kartverket/github-workflows/pull/19'}, {'type': 'PACKAGE', 'url': 'https://github.com/kartverket/github-workflows'}, {'type': 'WEB', 'url': 'https://github.com/kartverket/github-workflows/releases/tag/v2.7.5'}]
|
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T18:54:28Z', 'nvd_published_at': '2022-10-25T17:15:00Z'}
|
1.4.0
|
GHSA-5qwq-g2hx-r6f7
|
2022-10-20T20:11:26Z
|
2022-10-19T12:00:22Z
| null |
['CVE-2022-39198']
|
Hessian Lite for Apache Dubbo deserialization vulnerability
|
A deserialization vulnerability existed in dubbo hessian-lite 3.2.12 and its earlier versions, which could lead to malicious code execution. This issue affects Apache Dubbo 2.7.x version 2.7.17 and prior versions; Apache Dubbo 3.0.x version 3.0.11 and prior versions; Apache Dubbo 3.1.x version 3.1.0 and prior versions.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.alibaba:hessian-lite'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.13'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.12'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.17'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.12'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.11'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.1'}]}], 'versions': ['3.1.0']}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39198'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/dubbo-hessian-lite'}, {'type': 'WEB', 'url': 'https://github.com/apache/dubbo-hessian-lite/releases/tag/v3.2.13'}, {'type': 'WEB', 'url': 'https://github.com/apache/dubbo/releases/tag/dubbo-2.7.18'}, {'type': 'WEB', 'url': 'https://github.com/apache/dubbo/releases/tag/dubbo-3.0.12'}, {'type': 'WEB', 'url': 'https://github.com/apache/dubbo/releases/tag/dubbo-3.1.1'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/8d3zqrkoy4jh8dy37j4rd7g9jodzlvkk'}]
|
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T18:53:09Z', 'nvd_published_at': '2022-10-18T19:15:00Z'}
|
1.4.0
|
GHSA-3r7j-8mqh-6qhx
|
2022-10-25T20:37:53Z
|
2022-10-20T18:20:28Z
| null |
['CVE-2022-39259']
|
Jadx-gui vulnerable to swing HTML Denial of Service (DoS) attack
|
### Impact
Using jadx-gui to open a special zip file with entry containing HTML sequence like `<html><frame>` will cause interface to get stuck and throw exceptions like:
```
java.lang.RuntimeException: Can't build aframeset, BranchElement(frameset) 1,3
:no ROWS or COLS defined.
at java.desktop/javax.swing.text.html.HTMLEditorKit$HTMLFactory.create(HTMLEditorKit.java:1387)
at java.desktop/javax.swing.plaf.basic.BasicHTML$BasicHTMLViewFactory.create(BasicHTML.java:379)
at java.desktop/javax.swing.text.CompositeView.loadChildren(CompositeView.java:112)
```
### References
https://www.oracle.com/java/technologies/javase/seccodeguide.html
Guideline 3-7 / INJECT-7: Disable HTML display in Swing components:
Many Swing pluggable look-and-feels interpret text in certain components starting with <html> as HTML. If the text is from an untrusted source, an adversary may craft the HTML such that other components appear to be present or to perform inclusion attacks.
To disable the HTML render feature, set the "html.disable" client property of each component to Boolean.TRUE (no other Boolean true instance will do).
```java
label.putClientProperty("html.disable", true);
```
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'io.github.skylot:jadx-plugins-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.4'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/skylot/jadx/security/advisories/GHSA-3r7j-8mqh-6qhx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39259'}, {'type': 'PACKAGE', 'url': 'https://github.com/skylot/jadx'}, {'type': 'WEB', 'url': 'https://github.com/skylot/jadx/releases/tag/v1.4.5'}, {'type': 'WEB', 'url': 'https://www.oracle.com/java/technologies/javase/seccodeguide.html'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-20T18:20:28Z', 'nvd_published_at': '2022-10-21T23:15:00Z'}
|
1.4.0
|
GHSA-67x4-qr35-qvrm
|
2023-02-14T21:25:03Z
|
2022-10-05T21:26:26Z
| null |
['CVE-2022-39273']
|
FlyteAdmin's Default OAuth Authorization Server secret must be rotated
|
### Impact
Users who enable the default [Flyte’s authorization server](https://docs.flyte.org/en/latest/deployment/cluster_config/auth_setup.html#oauth2-authorization-server) without changing the default clientid hashes will be exposed to the public internet.
In an effort to make enabling authentication easier for Flyte administrators, the default configuration for Flyte Admin allows access for Flyte Propeller even after turning on authentication via a hardcoded hashed password. This password is also set on the default Flyte Propeller configmap in the various Flyte Helm charts. Users who enable auth but do not override this setting in Flyte Admin’s configuration may unknowingly allow public traffic in by way of this default password with attackers effectively impersonating propeller. This only applies to users who have not specified the ExternalAuthorizationServer setting. Using an external auth server automatically turns off this default configuration is not susceptible to this vulnerability.
### Patches
1.1.44
### Workarounds
Users should manually set the staticClients in the selfAuthServer section of their configuration if they intend to rely on Admin’s internal auth server.
### References
https://github.com/flyteorg/flyteadmin/pull/478
https://docs.flyte.org/en/latest/deployment/cluster_config/auth_setup.html#oauth2-authorization-server
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Flyte](https://github.com/flyteorg/flyte/issues)
* Email us [here](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/flyteorg/flyteadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.44'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/flyteorg/flyteadmin/security/advisories/GHSA-67x4-qr35-qvrm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39273'}, {'type': 'WEB', 'url': 'https://github.com/flyteorg/flyteadmin/pull/478'}, {'type': 'WEB', 'url': 'https://docs.flyte.org/en/latest/deployment/cluster_config/auth_setup.html#oauth2-authorization-server'}, {'type': 'PACKAGE', 'url': 'https://github.com/flyteorg/flyteadmin'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-1043'}]
|
{'cwe_ids': ['CWE-798'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-05T21:26:26Z', 'nvd_published_at': '2022-10-06T18:16:00Z'}
|
1.4.0
|
GHSA-rm2x-hgr8-w343
|
2022-10-06T19:56:22Z
|
2022-10-01T00:00:18Z
| null |
['CVE-2022-40923']
|
LIEF vulnerable to denial of service through segmentation fault
|
A vulnerability in the LIEF::MachO::SegmentCommand::virtual_address function of LIEF v0.12.1 allows attackers to cause a denial of service (DOS) through a segmentation fault via a crafted MachO file. A [patch](https://github.com/lief-project/LIEF/commit/24935f654f6df700a9a062298258b9485f584502) is available at commit number 24935f654f6df700a9a062298258b9485f584502.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'lief'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.12.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40923'}, {'type': 'WEB', 'url': 'https://github.com/lief-project/LIEF/issues/784'}, {'type': 'WEB', 'url': 'https://github.com/lief-project/LIEF/commit/24935f654f6df700a9a062298258b9485f584502'}, {'type': 'PACKAGE', 'url': 'https://github.com/lief-project/LIEF'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-06T19:56:22Z', 'nvd_published_at': '2022-09-30T19:15:00Z'}
|
1.4.0
|
GHSA-f6mq-6fx5-w2ch
|
2022-10-22T01:13:01Z
|
2022-10-19T19:00:21Z
| null |
['CVE-2022-43403']
|
Jenkins Script Security Plugin sandbox bypass vulnerability
|
A sandbox bypass vulnerability involving casting an array-like value to an array type in Jenkins Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM. Script Security Plugin 1184.v85d16b_d851b_3 intercepts per-element casts when casting array-like values to array types.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:script-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1184.v85d16b_d851b_3'}]}], 'database_specific': {'last_known_affected_version_range': '< 1184.v85d16b'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43403'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(1)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/19/3'}]
|
{'cwe_ids': ['CWE-693'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T22:04:08Z', 'nvd_published_at': '2022-10-19T16:15:00Z'}
|
1.4.0
|
GHSA-9g3v-v24q-jj5p
|
2022-10-10T19:41:07Z
|
2022-10-06T18:52:04Z
| null |
['CVE-2022-3273']
|
rdiffweb does not have a rate limit on incorrect password attempts to prevent brute force attacks
|
rdiffweb prior to 2.5.0a4 does not have a rate limit to prevent attackers attempting brute force attacks to guess passwords. Version 2.5.0a4 limits the number of incorrect password attempts.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3273'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/b5e3bb0a98268d18ceead36ab9b2b7eaacd659a8'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a6df4bad-3382-4add-8918-760d885690f6'}]
|
{'cwe_ids': ['CWE-326', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-06T20:06:51Z', 'nvd_published_at': '2022-10-06T18:16:00Z'}
|
1.4.0
|
GHSA-hff2-x2j9-gxgv
|
2022-11-28T21:07:03Z
|
2022-10-28T19:19:42Z
| null |
['CVE-2022-3500']
|
Keylime: unhandled exceptions could lead to invalid attestation states
|
### Impact
This vulnerability creates a false sense of security for keylime users -- i.e. a user could query keylime and conclude that a parcitular node/agent is correctly attested, while attestations are not in fact taking place.
**Short explanation**: the keylime verifier creates periodic reports on the state of each attested agent. The keylime verifier runs a set of python asynchronous processes to challenge attested nodes and create reports on the outcome.
The vulnerability consists of the above named python asynchronous processes failing silently, i.e. quitting without leaving behind a database entry, raising an error or producing even a mention of an error in a log. The silent failure can be triggered by a small set of transient network failure conditions; recoverable device driver crashes being one such condition we saw in the wild.
### Patches
The problem is fixed in keylime starting with tag 6.5.1
### Workarounds
This [patch](https://github.com/keylime/keylime/pull/1128/files) can be retroactively applied to any running keylime deployment.
Only running verifiers need to be patched.
After the patch is applied, the keylime verifier needs to be restarted.
### References
The problem, as well as the proposed fix, are described in detail [here](https://github.com/keylime/keylime/pull/1128).
Further details about the system where the bug was found, and the conditions in which the bug was found, are available from @galmasi on demand.
### For more information
If you have any questions or comments about this [advisory](https://github.com/keylime/keylime/security/advisories/GHSA-hff2-x2j9-gxgv), please comment at the bottom of the advisory itself.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'Keylime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.5.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/keylime/keylime/security/advisories/GHSA-hff2-x2j9-gxgv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3500'}, {'type': 'WEB', 'url': 'https://github.com/keylime/keylime/pull/1128'}, {'type': 'WEB', 'url': 'https://github.com/keylime/keylime/pull/1128/files'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2022-3500'}, {'type': 'PACKAGE', 'url': 'https://github.com/keylime/keylime'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/PUTHMDVFNGGVPCNPOGULMJAAFEP7MEXP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/QX4XVCAUFGJ2I2NCTOKONTJGRJB2NBBT/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/ZQH5CJRX65QYMQN5WGUKKKE3IRJBWG5Z/'}]
|
{'cwe_ids': ['CWE-248'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-28T19:19:42Z', 'nvd_published_at': '2022-11-22T19:15:00Z'}
|
1.4.0
|
GHSA-x8x2-wc2h-wc48
|
2022-10-18T15:46:14Z
|
2022-10-14T19:00:44Z
| null |
['CVE-2022-3439']
|
Missing rate limit on rdiffweb
|
Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffweb prior to 2.5.0.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3439'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/b78ec09f4582e363f6f449df6f987127e126c311'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/37b86c45-b240-4626-bd53-b6f02d10e0d7'}]
|
{'cwe_ids': ['CWE-770'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-14T21:30:12Z', 'nvd_published_at': '2022-10-14T12:15:00Z'}
|
1.4.0
|
GHSA-vh7g-p26c-j2cw
|
2023-07-12T14:01:57Z
|
2022-10-03T19:12:03Z
| null |
['CVE-2022-39222']
|
Dex vulnerable to Man-in-the-Middle allowing ID token capture via intercepted authorization code
|
### Impact
Dex instances with public clients (and by extension, clients accepting tokens issued by those Dex instances) are affected by this vulnerability.
An attacker can exploit this vulnerability by making a victim navigate to a malicious website and guiding them through the OIDC flow, stealing the OAuth authorization code in the process. The authorization code then can be exchanged by the attacker for a token, gaining access to applications accepting that token.
### Steps to reproduce
1) A victim navigates to a malicious website
2) The webserver initiates a connection with a Dex instance directly - https://dexexample.com/auth/https:%252F%252Faccounts.google.com?access_type=online&client_id=example&nonce=2AaJAimQU9CbeOFsNra1d7CJTWB&redirect_uri=http%3A%2F%2Flocalhost%3A40393%2Fauth%2Fcallback&response_type=code&scope=openid+email&state=2AaJAjhpUmsB25csCo5muvorMTl. In this example, the Dex instance is hosted on `dexexample.com`, and the connector is `accounts.google.com`.
3) Dex returns a 302 Redirect to the connector IDP, https://accounts.google.com/o/oauth2/v2/auth?client_id=237800849078-hri2ndt7gdafpf34kq8crd5sik9pe3so.apps.googleusercontent.com&redirect_uri=https%3A%2F%2Fdexexample.com%2Fauth%2Fcallback&response_type=code&scope=openid+email&state=g3dkmpontsr3ugocoddjx72ef. The attacker records the state parameter value g3dkmpontsr3ugocoddjx72ef which will be used as the request ID later on.
4) The malicious website redirects the victim’s browser to the connector IDP.
5) The user authenticates to the connector IDP. If they have authenticated before, they may not be presented with an authentication challenge. The user will silently be taken through the following steps:
Authentication with the connector IDP, which redirects the browser to the Dex callback with a code - https://dexexample.com/callback?state=g3dkmpontsr3ugocoddjx72ef&code=4%2F0AX4XfWizg1PQEQNl18hmP0_YQ3iUYII2ed13n9ikKr_ZcV7uCZpZaPcIlxBzX5QwFIcs-w&scope=email+openid+https%3A%2F%[2Fwww.googleapis.com](http://2fwww.googleapis.com/)%2Fauth%2Fuserinfo.email&authuser=0&hd=[google.com](http://google.com/)&prompt=none
Dex handles the callback, fetching the user claims from the connector IDP, persisting them and generating an OAuth code. Then Dex redirects the browser to the approval endpoint https://dexexample.com/approval?req=g3dkmpontsr3ugocoddjx72ef. Note that the req parameter is the same as the attacker's recorded state parameter.
Dex uses the request ID to look up the OAuth code, and builds a redirect to the original callback with the code - http://localhost:40393/auth/callback?code=bz5p3oov2wlh5k3rboa4atxas&state=2AaJAjhpUmsB25csCo5muvorMTl.
In step 2., when the webserver initiates the connection to Dex and receives the redirect to the connector IDP, the webserver will persist the connector state parameter (`g3dkmpontsr3ugocoddjx72ef`), which is used as the request ID to later look up the OAuth code. As the user goes through the authentication flow with the connector IDP, the webserver will repeatedly request `/approval?req=<state>`. Once the user has successfully authenticated, if the webserver is able to call /approval before the victim’s browser calls `/approval`, then an attacker can fetch the Dex OAuth code which can be exchanged for an ID token using the `/token` endpoint.
Note that PKCE does not defend against this attack since the webserver initiates the request to Dex with a known code challenge.
### Fix
The request has been made unpredictable with message authentication. This was accomplished by creating an [HMAC](https://en.wikipedia.org/wiki/HMAC) using a randomly generated per-request secret. This secret is persisted between the initial login request and the approval request. Since the HMAC is derived using a secret key, its value cannot be known to an attacker, so they will be unable to poll `/approval` for the code.
### Patches
Update to 2.35.0.
### Workarounds
No known workarounds (without impacting behavior) for existing versions.
Disabling public clients is the only way to defend against attacks exploiting this vulnerability.
### References
### For more information
If you have any questions or comments about this advisory:
* Start a new [discussion](https://github.com/dexidp/dex/discussions/new?category=q-a)
* Email us at [[email protected]](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/dexidp/dex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.35.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.34.0'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/dexidp/dex/security/advisories/GHSA-vh7g-p26c-j2cw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39222'}, {'type': 'WEB', 'url': 'https://github.com/dexidp/dex/commit/49471b14c8080ddb034d4855841123d378b7a634'}, {'type': 'PACKAGE', 'url': 'https://github.com/dexidp/dex'}, {'type': 'WEB', 'url': 'https://github.com/dexidp/dex/releases/tag/v2.35.0'}]
|
{'cwe_ids': ['CWE-200', 'CWE-862'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-03T19:12:03Z', 'nvd_published_at': '2022-10-06T18:16:00Z'}
|
1.4.0
|
GHSA-8r99-h8j2-rw64
|
2022-10-07T07:31:33Z
|
2022-10-07T07:31:33Z
| null |
[]
|
Twisted vulnerable to HTTP Request Smuggling Attacks
|
### Impact
Twisted Web is vulnerable to request smuggling attacks:
1. "When presented with two content-length headers, Twisted Web ignored the first header. When the second content-length was set to zero this caused Twisted Web to interpret the request body as a pipelined request. According to RFC 7230 Section 3.3.3#4, if a message is received with multiple content-length headers with differing value, then the server must reject the message with a 400 response." (Jake Miller of Bishop Fox Security)
2. " When presented with a content-length and a chunked encoding header, the content-length took precedence and the remainder of the request body was interpreted by Twisted Web as a pipelined request. According to RFC 7230 Section 3.3.3#3, if a message with both content-length and chunked encoding is accepted, transfer-encoding overrides the content-length." (Jake Miller of Bishop Fox Security)
3. ~"Twisted should not allow BWS between the filed-name and colon." (ZeddYu Lu)~ _closed in 9646_
4. "Two CL header with different values is also not allowed." (ZeddYu Lu)
5. "Only accept identity and chunked Transport-Encoding." (ZeddYu Lu)
### Patches
https://github.com/twisted/twisted/commit/20c787a14a09e7cbd5dfd8df08ceff00d1fcc081
https://github.com/twisted/twisted/commit/4a7d22e490bb8ff836892cc99a1f54b85ccb0281
### Workarounds
N/A
### References
https://portswigger.net/web-security/request-smuggling
|
[]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'twisted'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20.3.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/twisted/twisted/security/advisories/GHSA-8r99-h8j2-rw64'}, {'type': 'WEB', 'url': 'https://github.com/twisted/twisted/commit/20c787a14a09e7cbd5dfd8df08ceff00d1fcc081'}, {'type': 'WEB', 'url': 'https://github.com/twisted/twisted/commit/4a7d22e490bb8ff836892cc99a1f54b85ccb0281'}, {'type': 'PACKAGE', 'url': 'https://github.com/twisted/twisted'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-07T07:31:33Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-9w4g-fp9h-3q2v
|
2023-07-28T20:30:59Z
|
2022-10-26T19:00:38Z
| null |
['CVE-2022-42468']
|
Apache Flume vulnerable to remote code execution via deserialization of unsafe providerURL
|
Flume’s JMSSource class can be configured with a providerUrl parameter. A JNDI lookup is performed on this name without performing validation. This could result in untrusted data being deserialized, leading to remote code execution (RCE) attack when a configuration uses a JMS Source with an unsafe providerURL. This issue is fixed in version 1.11.0.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.flume.flume-ng-sources:flume-jms-source'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42468'}, {'type': 'WEB', 'url': 'https://github.com/apache/flume/commit/eee179a09df405c1ab55ae25a53b76ca1050bb97'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/flume'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/FLUME-3437'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/1ckhmp539zr2nd2rs45pocpywk2d9zvz'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/939wkx8o90bp6m2ht3t1sdyo1ncypl78'}]
|
{'cwe_ids': ['CWE-20', 'CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-27T18:39:05Z', 'nvd_published_at': '2022-10-26T16:15:00Z'}
|
1.4.0
|
GHSA-2p3c-p3qw-69r4
|
2023-07-31T20:39:03Z
|
2022-10-12T14:15:48Z
| null |
[]
|
The graphql-upload library included in Apollo Server 2 is vulnerable to CSRF mutations
|
### Impact
The [graphql-upload](https://www.npmjs.com/package/graphql-upload) npm package can execute GraphQL operations contained in `content-type: multipart/form-data` POST requests. Because they are POST requests, they can contain GraphQL mutations. Because they use `content-type: multipart/form-data`, they can be "simple requests" which are not preflighted by browsers.
If your GraphQL server uses `graphql-upload` and uses `SameSite=None` cookies for authentication, then JS on any origin can cause browsers to send cookie-authenticated mutations to your GraphQL server, which will be executed without checking your CORS policy first. (The attack won't be able to see the response to the mutation if your CORS policy is set up properly, but the side effects of the mutation will still happen.)
Additionally, if your GraphQL server uses `graphql-upload` and relies on network properties for security (whether by explicitly looking at the client's IP address or by only being available on a private network), then JS on any origin can cause browsers (which may be on a private network or have an allowed IP address) to send mutations to your GraphQL server, which will be executed without checking your CORS policy first. (This attack does not require your server to use cookies. It is in some cases prevented by some browsers such as Chrome.)
Apollo Server 2 bundled `graphql-upload` and enabled it by default, so by default, Apollo Server 2 servers are vulnerable to these CSRF attacks. (Apollo Server 1 did not bundle `graphql-upload`. Apollo Server 3 no longer bundles `graphql-upload`, although AS3's docs do document how to manually integrate with `graphql-upload`.) It is enabled even if your server makes no use of the upload functionality.
If you are running Apollo Server 2 (older than v2.25.4) and do not specify `uploads: false` to `new ApolloServer`, then you are vulnerable to this CSRF mutation attack.
We recently introduced an opt-in CSRF prevention feature in Apollo Server 3.7. This feature successfully protects against CSRF even if you have manually integrated your AS3.7 server with `graphql-upload`. However, this feature is not available for Apollo Server 2.
### Patches
If you are using Apollo Server 2 and do *not* actually use uploads in your schema (ie, the `Upload` scalar is not used as the argument to any field or in any input object definition, and you do not specify `uploads` to `new ApolloServer`), then upgrading to Apollo Server 2.25.4 will automatically disable `graphql-upload` in your server. This will fix the CSRF mutation vulnerability.
Upgrading to v2.25.4 does still leave your server vulnerable to non-mutation CSRF attacks such as timing attacks against query operations. To protect yourself against these potentially lower impact CSRF attack, we encourage upgrading to Apollo Server v3.7 and enabling CSRF prevention. See [the Apollo Server 3 migration guide](https://www.apollographql.com/docs/apollo-server/migration/) and the [CSRF prevention docs](https://www.apollographql.com/docs/apollo-server/security/cors/#preventing-cross-site-request-forgery-csrf) for details.
If you are actively using the uploads feature with Apollo Server 2, then upgrading to v2.25.4 will not disable the feature and you will still be vulnerable. You should instead upgrade to v3.7 and enable the CSRF prevention feature.
If you are manually integrating the `graphql-upload` package with any version of Apollo Server (or any Node GraphQL server) and need to continue using the feature, then you must enable some sort of CSRF prevention feature to fix this vulnerability. We recommend the CSRF prevention feature in Apollo Server 3.7.
### Workarounds
Instead of upgrading your Apollo Server 2 server, you can specify `uploads: false` to `new ApolloServer` to disable the `graphql-upload` integration and protect against CSRF mutations. (Only do this if you do not actually use the uploads feature in your server!) This will still leave your server vulnerable to non-mutation CSRF attacks such as timing attacks against query operations; you need to upgrade to v3.7 and enable CSRF prevention to protect against these attacks.
### Related work
- [PR adding a Security section to the GraphQL multipart request spec](https://github.com/jaydenseric/graphql-multipart-request-spec/pull/64)
|
[]
|
[{'package': {'ecosystem': 'npm', 'name': 'apollo-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.25.4'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/apollographql/apollo-server/security/advisories/GHSA-2p3c-p3qw-69r4'}, {'type': 'WEB', 'url': 'https://github.com/jaydenseric/graphql-multipart-request-spec/pull/64'}, {'type': 'WEB', 'url': 'https://github.com/apollographql/apollo-server/commit/82d44985ddca8e61557957d67f41e9c1a705a5ca'}, {'type': 'PACKAGE', 'url': 'https://github.com/apollographql/apollo-server'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-12T14:15:48Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-mg5h-rhjq-6v84
|
2022-11-01T20:35:47Z
|
2022-10-31T12:00:18Z
| null |
['CVE-2022-3766']
|
phpMyFAQ vulnerable to reflected Cross-site Scripting
|
phpMyFAQ prior to version 3.1.8 is vulnerable to reflected cross-site scripting.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.8'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3766'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/c7904f2236c6c0dd64c2226b90c30af0f7e5a72d'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpmyfaq'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d9666520-4ff5-43bb-aacf-50c8e5570983'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-31T19:26:04Z', 'nvd_published_at': '2022-10-31T11:15:00Z'}
|
1.4.0
|
GHSA-4993-m7g5-r9hh
|
2022-10-06T23:14:23Z
|
2022-10-06T23:14:23Z
| null |
['CVE-2020-15115']
|
etcd has no minimum password length
|
### Vulnerability type
Access Control
### Workarounds
The etcdctl and etcd API do not enforce a specific password length during user creation or user password update operations. [It is the responsibility of the administrator to enforce these requirements](https://github.com/etcd-io/etcd/blob/master/Documentation/op-guide/authentication.md#notes-on-password-strength).
### Detail
etcd does not perform any password length validation, which allows for very short passwords, such as those with a length of one. This may allow an attacker to guess or brute-force users’ passwords with little computational effort.
### References
Find out more on this vulnerability in the [security audit report](https://github.com/etcd-io/etcd/blob/master/security/SECURITY_AUDIT.pdf)
### For more information
If you have any questions or comments about this advisory:
* Contact the [etcd security committee](https://github.com/etcd-io/etcd/blob/master/security/security-release-process.md#product-security-committee-psc)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'go.etcd.io/etcd/client/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4.0'}, {'fixed': '3.4.10'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'go.etcd.io/etcd/client/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.23'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/etcd-io/etcd/security/advisories/GHSA-4993-m7g5-r9hh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15115'}, {'type': 'PACKAGE', 'url': 'https://github.com/etcd-io/etcd'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/'}]
|
{'cwe_ids': ['CWE-521'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-06T23:14:23Z', 'nvd_published_at': '2020-08-06T22:15:00Z'}
|
1.4.0
|
GHSA-2rr3-rv49-p42f
|
2022-11-01T13:29:12Z
|
2022-10-29T19:00:27Z
| null |
['CVE-2022-3754']
|
phpMyFAQ contains Weak Password Requirements
|
phpMyFAQ prior to version 3.1.8 has Weak Password Requirements. Version 3.1.8 introduces an eight-character minimum password length.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.8'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3754'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/d7a87d2646287828c70401ca8976ef531fbc77ea'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpmyfaq'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/f4711d7f-1368-48ab-9bef-45f32e356c47'}]
|
{'cwe_ids': ['CWE-521'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-31T19:26:27Z', 'nvd_published_at': '2022-10-29T13:15:00Z'}
|
1.4.0
|
GHSA-43qq-qw4x-28f8
|
2022-10-18T21:14:04Z
|
2022-10-18T21:14:04Z
| null |
['CVE-2022-39314']
|
Kirby CMS vulnerable to user enumeration in the code-based login and password reset forms
|
### TL;DR
This vulnerability only affects you if you are using the `code` or `password-reset` auth method with the `auth.methods` option. It can only be successfully exploited under server configuration conditions outside of the attacker's control.
----
### Introduction
User enumeration is a type of vulnerability that allows attackers to confirm which users are registered in a Kirby installation. This information can be abused for social engineering attacks against users of the site or to find out the organizational structure of the company.
User enumeration attacks are performed by entering an existing and a non-existing user into the email address field of the login form. If the system returns a different response or behaves differently depending on whether the user exists, the attacker can enter unknown email addresses and use the different behavior as a clue for the (non-)existing user.
### Impact
Under normal circumstances, entering an invalid email address results in a "fake" login code form that looks exactly like the one of an existing user (unless debugging is enabled). However, the code that handles the creation of a code challenge (for code-based login or password reset) didn't catch errors that occurred while the challenge request was processed:
- If the challenge itself runs into an error (e.g. if the email could not be sent), attackers could tell existing users (where the challenge code is called) from non-existing users (where the challenge code is not called and therefore does not output an error).
- If you are using the `user.login:failed` hook and any exception is thrown within the hook, attackers could see that the user does not exist.
As long as no error occurs during challenge creation and during the processing of the `user.login:failed` hook, your Kirby sites are *not* affected by this vulnerability.
### Patches
The problems have been patched in [Kirby 3.5.8.2](https://github.com/getkirby/kirby/releases/tag/3.5.8.2), [Kirby 3.6.6.2](https://github.com/getkirby/kirby/releases/tag/3.6.6.2), [Kirby 3.7.5.1](https://github.com/getkirby/kirby/releases/tag/3.7.5.1) and [Kirby 3.8.1](https://github.com/getkirby/kirby/releases/tag/3.8.1). Please update to one of these or a [later version](https://github.com/getkirby/kirby/releases) to fix the vulnerability.
All of the mentioned releases contain two patches for this vulnerability:
- All errors that occur during the creation of an auth challenge (code-based login or password reset) are swallowed by the backend and only displayed to the user if debugging is enabled.
- We added a new `auth.debug` option that can be enabled separately from the `debug` option. If disabled, auth errors are only printed to the PHP error log. This ensures that security-critical errors are only displayed if they are really necessary for debugging.
### Workarounds
We recommend to update to one of the patch releases. If you cannot update immediately, you can work around the issue by setting the `auth.methods` option to `password`, which disables the code-based login and password reset forms.
However please note that your site will still be vulnerable against [another user enumeration issue](https://github.com/getkirby/kirby/security/advisories/GHSA-c27j-76xg-6x4f) that was also fixed in the same patch releases.
### Credits
Thanks to [Florian Merz](mailto:[email protected]) (@florianmrz) of [hatchery.io](https://www.hatchery.io/) for responsibly reporting the identified issue.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'getkirby/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5.0'}, {'fixed': '3.5.8.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'getkirby/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.6.0'}, {'fixed': '3.6.6.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'getkirby/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.0'}, {'fixed': '3.7.5.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'getkirby/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.8.0'}, {'fixed': '3.8.1'}]}], 'versions': ['3.8.0']}]
|
[{'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/security/advisories/GHSA-43qq-qw4x-28f8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39314'}, {'type': 'PACKAGE', 'url': 'https://github.com/getkirby/kirby'}, {'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/releases/tag/3.5.8.2'}, {'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/releases/tag/3.6.6.2'}, {'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/releases/tag/3.7.5.1'}, {'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/releases/tag/3.8.1'}]
|
{'cwe_ids': ['CWE-204', 'CWE-307'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-18T21:14:04Z', 'nvd_published_at': '2022-10-24T14:15:00Z'}
|
1.4.0
|
GHSA-g975-f26h-93g8
|
2022-10-22T00:56:07Z
|
2022-10-19T19:00:18Z
| null |
['CVE-2022-43408']
|
Jenkins Pipeline: Stage View Plugin allows CSRF protection bypass of any target URL in Jenkins
|
Jenkins Pipeline: Stage View Plugin 2.26 and earlier does not correctly encode the ID of `input` steps when using it to generate URLs to proceed or abort Pipeline builds, allowing attackers able to configure Pipelines to specify `input` step IDs resulting in URLs that would bypass the CSRF protection of any target URL in Jenkins. Pipeline: Stage View Plugin 2.27 correctly encodes the ID of input steps when using it to generate URLs to proceed or abort Pipeline builds.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.pipeline-stage-view:pipeline-stage-view'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.25'}, {'fixed': '2.27'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.pipeline-stage-view:pipeline-stage-view'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.24.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43408'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2828'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/19/3'}]
|
{'cwe_ids': ['CWE-838'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T20:27:47Z', 'nvd_published_at': '2022-10-19T16:15:00Z'}
|
1.4.0
|
GHSA-cw98-9j8w-wxv9
|
2022-10-21T20:32:34Z
|
2022-10-21T20:32:34Z
| null |
['CVE-2022-24464']
|
.NET Denial of Service Vulnerability
|
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 6.0, .NET 5.0, and .NET CORE 3.1. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.
Microsoft is aware of a Denial of Service vulnerability, which exists in .NET 6.0, .NET 5.0, and .NET CORE 3.1 when parsing certain types of http form requests.
### Affected Software
* Any .NET 6.0 application running on .NET 6.0.2 or lower
* Any .NET 5.0 application running on .NET 5.0.14 or lower
* Any .NET Core 3.1 application running on .NET Core 3.1.22 or lower
### Patches
To fix the issue, please install the latest version of .NET 6.0 or .NET 5.0 or .NET Core 3.1.. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs.
* If you're using .NET Core 6.0, you should download and install Runtime 6.0.3 or SDK 6.0.201 (for Visual Studio 2022 v17.1) from https://dotnet.microsoft.com/download/dotnet-core/6.0.
* If you're using .NET 5.0, you should download and install Runtime 5.0.15 or SDK 5.0.406 (for Visual Studio 2019 v16.11) or SDK 5.0.212 (for Visual Studio 2011 v16.9) from https://dotnet.microsoft.com/download/dotnet-core/5.0.
* If you're using .NET Core 3.1, you should download and install Runtime 3.1.23 or SDK 3.1.417 (for Visual Studio 2019 v16.7.26) from https://dotnet.microsoft.com/download/dotnet-core/5.0.
.NET 6.0 and .NET 5.0 updates are also available from Microsoft Update. To access this either type "Check for updates" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates.
.NET 6.0 and .NET 5.0 and, .NET Core 3.1 updates are also available from Microsoft Update. To access this either type "Check for updates" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates.
#### Other Details
- Announcement for this issue can be found at https://github.com/dotnet/announcements/issues/212
- An Issue for this can be found at https://github.com/dotnet/aspnetcore/issues/40598
- MSRC details for this can be found at https://msrc.microsoft.com/update-guide/en-US/vulnerability/ CVE-2022-24464
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.23'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.23'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-musl-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.23'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-musl-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.23'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.23'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.osx-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.23'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.23'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.5'}, {'fixed': '3.1.23'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.23'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.23'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.15'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.15'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.15'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.osx-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.15'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-musl-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.15'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.15'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.15'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.15'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.15'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-musl-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.15'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-musl-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.15'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-musl-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-musl-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-musl-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.osx-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.osx-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/dotnet/aspnetcore/security/advisories/GHSA-cw98-9j8w-wxv9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24464'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/212'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/4TOGTZ2ZWDH662ZNFFSZVL3M5AJXV6JF/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/CIJGCVKLHVNLFBTEYJGWS43QG5DYJFBL/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/MQLM7ABVCYJLF6JRPF3M3EBXW63GNC27/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/MRGSPXMZY4RM2L35FYHCXBFROLC23B2V/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/OS2Q4NPRSARP7GHLKFLIYHFOPSYDO6MK/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/ZXEQ3GQVELA2T4HNZG7VPMS2HDVXMJRG/'}, {'type': 'WEB', 'url': 'https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24464'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24464'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-21T20:32:34Z', 'nvd_published_at': '2022-03-09T17:15:00Z'}
|
1.4.0
|
GHSA-2w2m-ccf8-57cq
|
2022-12-16T17:26:11Z
|
2022-10-19T19:00:18Z
| null |
['CVE-2022-43415']
|
XXE vulnerability in Jenkins REPO Plugin
|
REPO Plugin 1.15.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
This allows attackers able to control which `repo` binary is executed on agents to have Jenkins parse a crafted XML document that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.
REPO Plugin 1.16.0 disables external entity resolution for its XML parser.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:repo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43415'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/repo-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2337'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/19/3'}]
|
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T20:26:57Z', 'nvd_published_at': '2022-10-19T16:15:00Z'}
|
1.4.0
|
GHSA-gr7w-x2jp-3xgw
|
2022-10-06T22:58:56Z
|
2022-10-06T22:58:56Z
| null |
['CVE-2018-21246']
|
Caddy vulnerable to Authentication Bypass due to mishandling of TLS client authentication
|
Caddy before 0.10.13 mishandles TLS client authentication, as demonstrated by an authentication bypass caused by the lack of the StrictHostMatching mode.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/caddyserver/caddy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.13'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-21246'}, {'type': 'WEB', 'url': 'https://github.com/caddyserver/caddy/pull/2099'}, {'type': 'WEB', 'url': 'https://github.com/caddyserver/caddy/commit/4d9ee000c8d2cbcdd8284007c1e0f2da7bc3c7c3'}, {'type': 'WEB', 'url': 'https://bugs.gentoo.org/715214'}, {'type': 'PACKAGE', 'url': 'https://github.com/caddyserver/caddy'}, {'type': 'WEB', 'url': 'https://github.com/caddyserver/caddy/releases/tag/v0.10.13'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0043'}]
|
{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-06T22:58:56Z', 'nvd_published_at': None}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.