schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
stringlengths 20
20
⌀ | aliases
stringlengths 2
20
| summary
stringlengths 8
154
| details
stringlengths 31
19.1k
| severity
stringlengths 2
92
| affected
stringlengths 75
28.5k
| references
stringlengths 79
7.48k
| database_specific
stringlengths 131
196
|
---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0
|
GHSA-wq8g-hm94-5rqq
|
2022-11-22T19:02:55Z
|
2022-04-23T00:40:48Z
| null |
['CVE-2012-1094']
|
JBoss AS may expose root content if excluded-contexts list is mismatched
|
JBoss AS 7 prior to 7.1.1 and mod_cluster do not handle default hostname in the same way, which can cause the excluded-contexts list to be mismatched and the root context to be exposed.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jboss.as:jboss-as-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0.Alpha1'}, {'fixed': '7.1.1.Final'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-1094'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2012-1094'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-1094'}]
|
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:02:55Z', 'nvd_published_at': '2020-03-10T17:15:00Z'}
|
1.4.0
|
GHSA-frxg-hf44-q765
|
2022-04-22T20:39:47Z
|
2022-04-22T20:39:47Z
| null |
['CVE-2022-24849']
|
Exposure of Sensitive Information to an Unauthorized Actor in DisCatSharp
|
### Impact
Users of versions 9.8.5, 9.8.6, 9.9.0 and previously published prereleases of 10.0.0 who have used either one of the two `RequireDisCatSharpDeveloperAttribute`s or the `BaseDiscordClient.LibraryDeveloperTeam` have potentially had their bot token sent to a web server not affiliated with Discord. This server is owned and operated by DisCatSharp's development team. The tokens were not logged, yet it is still advisable to reset the tokens of potentially affected bots.
### Patches
9.9.1 has been released to patch the issue for the current stable release and the current 10.0.0 prereleases are also no longer affected.
### Workarounds
Remove all uses of the two `RequireDisCatSharpDeveloperAttribute`s and all direct calls to `BaseDiscordClient.LibraryDeveloperTeam`.
### Details
The `HttpClient` responsible for sending requests to the Discord API was erroneously reused to send requests to our website when DisCatSharp's team members were to be fetched.
### For more information
If you have any questions or comments about this advisory:
* Join our [Discord server](https://discord.gg/GGYSywkxwN)
* Email us at [[email protected]](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'NuGet', 'name': 'DisCatSharp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.8.5'}, {'fixed': '9.9.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/Aiko-IT-Systems/DisCatSharp/security/advisories/GHSA-frxg-hf44-q765'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24849'}, {'type': 'PACKAGE', 'url': 'https://github.com/Aiko-IT-Systems/DisCatSharp'}]
|
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:39:47Z', 'nvd_published_at': '2022-04-14T22:15:00Z'}
|
1.4.0
|
GHSA-mcq2-w56r-5w2w
|
2022-04-08T22:09:23Z
|
2022-04-08T22:09:23Z
| null |
[]
|
Daemon panics when processing certain blocks
|
### Impact
go-ipfs nodes with versions 0.10.0, 0.11.0, 0.12.0, or 0.12.1 can crash when trying to traverse certain malformed graphs due to an issue in the go-codec-dagpb dependency. Vulnerable nodes that work with these malformed graphs may crash leading to denial-of-service risks.
This particularly impacts nodes that download or export data that is controlled by external user input as there is the possibility that a malicious user of those services could (intentionally or unintentionally) cause the node to traverse a malformed graph. Some notable use cases include public gateways and pinning services which fetch data on behalf of users, as well as applications such as IPFS Companion which load data based on a user visiting a website with links to IPFS URLs.
### Patches
Versions v0.11.1 and v0.12.2 both resolve this issue. This should make it easy to upgrade, even if you have not yet performed the v0.12.0 migration.
For those running on forked versions of go-ipfs or who are on v0.10.0 and are having trouble with the v0.11.0 breaking changes, simply updating the version of `go-codec-dagpb` you are using to >=v1.3.2 should resolve the issue.
Any users of libraries within the go-ipfs ecosystem, even if not the go-ipfs package or binary itself, may be affected and should upgrade their dependency on go-codec-dagpb. You can check if your Go module has a dependency on `go-codec-dagpb` by running a command such as `go mod graph | grep go-codec-dagpb` in your module root.
### Workarounds
The best way to workaround this issue is to control exposure to any endpoints that allow for arbitrary IPLD traversals. This primarily includes the HTTP RPC API (https://docs.ipfs.io/reference/http/api ) and the Gateway API. If you are exposing those APIs, then do so within an environment where only trusted users and applications you control have access to it. You should be safe as long as your users and applications do not create malformed graphs, which should not happen using standard `go-ipfs` tooling.
If you previously had a more open access environment, then closing off access will only be sufficient if both of the following are true:
* The experimental GraphSync feature is disabled (https://github.com/ipfs/go-ipfs/blob/master/docs/experimental-features.md#graphsync)
* The only data being accessed is non-malformed data
### References
See also the [go-codec-dagpb security advisory](https://github.com/ipld/go-codec-dagpb/security/advisories/GHSA-g3vv-g2j5-45f2).
### For more information
If you have any questions or comments about this advisory:
* Ask in [IPFS Discord #ipfs-chatter](https://discord.gg/ipfs)
* Open an issue in [go-ipfs](https://github.com/ipld/go-ipfs)
|
[]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ipld/go-ipfs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.12.0'}, {'fixed': '0.12.2'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/ipld/go-ipfs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/ipfs/go-ipfs/security/advisories/GHSA-mcq2-w56r-5w2w'}, {'type': 'PACKAGE', 'url': 'github.com/ipld/go-ipfs'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-08T22:09:23Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-jv64-2m3x-6v4q
|
2022-07-26T21:29:36Z
|
2022-04-30T00:00:36Z
| null |
['CVE-2021-41948']
|
Subrion CMS Cross-site Scripting (XSS) vulnerability in the `contact us` plugin
|
A cross-site scripting (XSS) vulnerability exists in the `contact us` plugin for Subrion CMS <= 4.2.1 version via `List of subjects`. This can be exploited by someone with administrative privileges when they log in to the admin panel.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'intelliants/subrion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.2.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41948'}, {'type': 'WEB', 'url': 'https://github.com/intelliants/subrion-plugin-contact_us/issues/8'}, {'type': 'PACKAGE', 'url': 'https://github.com/intelliants/subrion-plugin-contact_us/'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-04T18:10:42Z', 'nvd_published_at': '2022-04-29T14:15:00Z'}
|
1.4.0
|
GHSA-6q9g-3vfq-q2qj
|
2022-05-24T22:20:25Z
|
2022-04-30T00:00:36Z
| null |
['CVE-2022-0985']
|
Improper Authentication in moodle
|
Insufficient capability checks could allow users with the moodle/site:uploadusers capability to delete users, without having the necessary moodle/user:delete capability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11.0'}, {'fixed': '3.11.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10.0'}, {'fixed': '3.10.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.9'}, {'fixed': '3.9.13'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0985'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/addd4f894d8173ec8ff0ae2212d51a1977e7bcad'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2064117'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}]
|
{'cwe_ids': ['CWE-287', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:20:25Z', 'nvd_published_at': '2022-04-29T16:15:00Z'}
|
1.4.0
|
GHSA-fcr6-6cph-vmcm
|
2022-04-29T04:21:07Z
|
2022-04-13T00:00:17Z
| null |
['CVE-2022-29040']
|
Stored XSS vulnerability in Jenkins Git Parameter Plugin
|
Jenkins Git Parameter Plugin 0.9.15 and earlier does not escape the name and description of Git parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:git-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.16'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29040'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/git-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-29T04:21:07Z', 'nvd_published_at': '2022-04-12T20:15:00Z'}
|
1.4.0
|
GHSA-3v5x-qjrp-q2hq
|
2022-04-22T21:02:44Z
|
2022-04-13T00:00:24Z
| null |
['CVE-2022-27260']
|
Unrestricted Upload of File with Dangerous Type in ButterCMS
|
An arbitrary file upload vulnerability in the file upload component of ButterCMS v1.2.8 allows attackers to execute arbitrary code via a crafted SVG file.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'buttercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.8'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27260'}, {'type': 'PACKAGE', 'url': 'https://github.com/ButterCMS/buttercms-js'}, {'type': 'WEB', 'url': 'https://www.youtube.com/watch?v=Tw8OhtVd-mE'}]
|
{'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T21:02:44Z', 'nvd_published_at': '2022-04-12T17:15:00Z'}
|
1.4.0
|
GHSA-cqxx-66wh-8pjw
|
2022-04-13T01:15:56Z
|
2022-04-01T13:59:17Z
| null |
['CVE-2022-24798']
|
Improper Removal of Sensitive Information Before Storage or Transfer in irrd
|
IRRd did not always filter password hashes in query responses relating to `mntner` objects and database exports. This may have allowed adversaries to retrieve some of these hashes, perform a brute-force search for the clear-text passphrase, and use these to make unauthorised changes to affected IRR objects. This issue only affected instances that process password hashes, which means it is limited to IRRd instances that serve authoritative databases. IRRd instances operating solely as mirrors of other IRR databases are not affected.
The issue occurred:
* For `mntner` objects where all password hash names (`MD5-PW` and `CRYPT-PW`) were in lower or mixed case in the `auth` attribute. For these objects, hashes remained in the output of all queries of any method and all database exports made with the `export_destination` setting. Fortunately, objects in the common public IRR database virtually all use uppercase hash names which means very few of those objects were affected.
* For any GraphQL queries that queried the `auth` field on `mntner` objects.
* For any GraphQL queries that queried the `objectText` field on the `journal` field on `mntner` objects, if the `nrtm_access_list` setting permitted journal access.
The two GraphQL cases are visible in logs, allowing users to determine whether any existing objects had their hashes exposed.
This has been fixed in IRRd 4.2.3 and the main branch. Versions in the 4.1.x series never were affected. Users of the 4.2.x series are strongly recommended to upgrade. All users running a more recent version from the main branch should update to the latest version. Alternatively, but not recommended, apply the patch manually [for 4.2.x]
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'irrd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/irrdnet/irrd/security/advisories/GHSA-cqxx-66wh-8pjw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24798'}, {'type': 'WEB', 'url': 'https://github.com/irrdnet/irrd/commit/0e41bae8d3d27316381a2fc7b466597230e35ec6'}, {'type': 'WEB', 'url': 'https://github.com/irrdnet/irrd/commit/fdffaf8dd71713f06e99dff417e6aa1e6fa84b70'}, {'type': 'PACKAGE', 'url': 'https://github.com/irrdnet/irrd'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/irrd/PYSEC-2022-178.yaml'}, {'type': 'WEB', 'url': 'https://irrd.readthedocs.io/en/stable/releases/4.2.3/'}]
|
{'cwe_ids': ['CWE-212'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T13:59:17Z', 'nvd_published_at': '2022-03-31T23:15:00Z'}
|
1.4.0
|
GHSA-vp37-2f9p-3vr3
|
2022-05-04T03:59:45Z
|
2022-04-23T00:03:04Z
| null |
['CVE-2022-29577']
|
Cross-site Scripting in OWASP AntiSamy
|
AntiSamy is a library for performing fast, configurable cleansing of HTML coming from untrusted sources. OWASP AntiSamy before 1.6.7 allows XSS via HTML tag smuggling on STYLE content with crafted input. The output serializer does not properly encode the supposed Cascading Style Sheets (CSS) content. NOTE: this issue exists because of an incomplete fix for CVE-2022-28367.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.owasp.antisamy:antisamy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.7'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29577'}, {'type': 'WEB', 'url': 'https://github.com/nahsra/antisamy/commit/32e273507da0e964b58c50fd8a4c94c9d9363af0'}, {'type': 'PACKAGE', 'url': 'https://github.com/nahsra/antisamy'}, {'type': 'WEB', 'url': 'https://github.com/nahsra/antisamy/releases/tag/v1.6.7'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-26T17:47:34Z', 'nvd_published_at': '2022-04-21T23:15:00Z'}
|
1.4.0
|
GHSA-c5hf-mc85-2hx4
|
2022-05-24T22:05:22Z
|
2022-04-30T00:00:35Z
| null |
['CVE-2022-0984']
|
Missing authorization in Moodle
|
Users with the capability to configure badge criteria (teachers and managers by default) were able to configure course badges with profile field criteria, which should only be available for site badges.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11.0'}, {'fixed': '3.11.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10.0'}, {'fixed': '3.10.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.13'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0984'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/cdc78a16a5da95a17fb10bf1c66689237f5a3f7d'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2064118'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2064125'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}]
|
{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:05:22Z', 'nvd_published_at': '2022-04-29T17:15:00Z'}
|
1.4.0
|
GHSA-9qrh-qjmc-5w2p
|
2022-05-03T02:24:25Z
|
2022-04-28T20:25:23Z
| null |
['CVE-2022-21227']
|
Denial-of-Service when binding invalid parameters in sqlite3
|
Affected versions of sqlite3 will experience a fatal error when supplying a specific object in the parameter array. This error causes the application to crash and could not be caught. Users of `sqlite3` v5.0.0, v5.0.1 and v5.0.2 are affected by this. This issue is fixed in v5.0.3. All users are recommended to upgrade to v5.0.3 or later. Ensure there is sufficient sanitization in the parent application to protect against invalid values being supplied to binding parameters as a workaround.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'sqlite3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/TryGhost/node-sqlite3/security/advisories/GHSA-9qrh-qjmc-5w2p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21227'}, {'type': 'WEB', 'url': 'https://github.com/TryGhost/node-sqlite3/issues/1440'}, {'type': 'WEB', 'url': 'https://github.com/TryGhost/node-sqlite3/issues/1449'}, {'type': 'WEB', 'url': 'https://github.com/TryGhost/node-sqlite3/commit/593c9d498be2510d286349134537e3bf89401c4a'}, {'type': 'PACKAGE', 'url': 'https://github.com/TryGhost/node-sqlite3'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-SQLITE3-2388645'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2805470'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SQLITE3-2388645'}]
|
{'cwe_ids': ['CWE-248'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T20:25:23Z', 'nvd_published_at': '2022-05-01T16:15:00Z'}
|
1.4.0
|
GHSA-qpmc-wprv-x746
|
2022-04-12T21:31:26Z
|
2022-04-12T21:31:26Z
| null |
['CVE-2019-15160']
|
Inline DTD allows XML bomb attack
|
The SweetXml (aka sweet_xml) package through 0.6.6 for Erlang and Elixir allows attackers to cause a denial of service (resource consumption) via an XML entity expansion attack with an inline DTD.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Hex', 'name': 'sweet_xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15160'}, {'type': 'WEB', 'url': 'https://github.com/kbrw/sweet_xml/issues/71'}, {'type': 'PACKAGE', 'url': 'https://github.com/kbrw/sweet_xml'}, {'type': 'WEB', 'url': 'https://hex.pm/packages/sweet_xml'}]
|
{'cwe_ids': ['CWE-611', 'CWE-776'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-12T21:31:26Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-xw7v-qrhc-jjg2
|
2022-04-18T22:21:50Z
|
2022-04-01T00:00:41Z
| null |
['CVE-2021-37517']
|
Access Control vulnerability in Dolibarr
|
An Access Control vulnerability exists in Dolibarr ERP/CRM 13.0.2, fixed version is 14.0.1, in the forgot-password function becuase the application allows email addresses as usernames, which can cause a Denial of Service.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '14.0.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37517'}, {'type': 'WEB', 'url': 'https://github.com/Dolibarr/dolibarr/commit/b57eb8284e830e30eefb26e3c5ede076ea24037c'}, {'type': 'PACKAGE', 'url': 'https://github.com/Dolibarr/dolibarr'}, {'type': 'WEB', 'url': 'https://github.com/Dolibarr/dolibarr/releases/tag/14.0.1'}]
|
{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T19:38:58Z', 'nvd_published_at': '2022-03-31T19:15:00Z'}
|
1.4.0
|
GHSA-27rq-4943-qcwp
|
2022-06-02T17:38:26Z
|
2022-04-28T00:00:35Z
| null |
['CVE-2022-29810']
|
Insertion of Sensitive Information into Log File in Hashicorp go-getter
|
The Hashicorp go-getter library before 1.5.11 could write SSH credentials into its logfile, exposing sensitive credentials to local users able to read the logfile.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/go-getter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.11'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29810'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/go-getter/pull/348'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/go-getter/commit/36b68b2f68a3ed10ee7ecbb0cb9f6b1dc5da49cc'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/go-getter'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/go-getter/releases/tag/v1.5.11'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0438'}]
|
{'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-03T20:19:26Z', 'nvd_published_at': '2022-04-27T06:15:00Z'}
|
1.4.0
|
GHSA-86r3-4gq8-xw8q
|
2022-08-22T16:34:29Z
|
2022-04-09T00:00:25Z
|
2022-08-22T16:34:29Z
|
['CVE-2021-43503']
|
Remote Code Execution in Laravel
|
## Withdrawn
This advisory has been withdrawn because it is not a security issue and the CVE has been revoked.
## Original Description
A Remote Code Execution (RCE) vulnerability exists in h laravel 5.8.38 via an unserialize pop chain in (1) __destruct in \Routing\PendingResourceRegistration.php, (2) __cal in Queue\Capsule\Manager.php, and (3) __invoke in mockery\library\Mockery\ClosureWrapper.php.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'laravel/laravel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.8.38'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43503'}, {'type': 'WEB', 'url': 'https://github.com/1nhann/vulns/issues/1#issuecomment-1213126338'}, {'type': 'WEB', 'url': 'https://github.com/guoyanan1g/Laravel-vul/issues/2#issue-1045655892'}]
|
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-12T20:32:12Z', 'nvd_published_at': '2022-04-08T18:15:00Z'}
|
1.4.0
|
GHSA-4gr9-99j3-vqxv
|
2023-09-18T21:59:42Z
|
2022-04-30T18:15:08Z
| null |
['CVE-2000-1210']
|
Apache Tomcat Directory Traversal
|
Directory traversal vulnerability in source.jsp of Apache Tomcat before 3.1 allows remote attackers to read arbitrary files via a `..` (dot dot) in the argument to source.jsp.
|
[]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2000-1210'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20020818015647/http://www.iss.net/security_center/static/4205.php'}, {'type': 'WEB', 'url': 'http://marc.info/?l=bugtraq&m=95371672300045&w=2'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T21:59:42Z', 'nvd_published_at': '2002-03-22T05:00:00Z'}
|
1.4.0
|
GHSA-xg75-q3q5-cqmv
|
2022-04-22T20:55:52Z
|
2022-04-22T20:55:52Z
| null |
['CVE-2022-24863']
|
Denial of Service in http-swagger
|
### Impact
Allows an attacker to perform a DOS attack consisting of memory exhaustion on the host system.
### Patches
Yes. Please upgrade to v1.2.6.
### Workarounds
A workaround is to restrict the path prefix to the "GET" method. As shown below
```
func main() {
r := mux.NewRouter()
r.PathPrefix("/swagger/").Handler(httpSwagger.Handler(
httpSwagger.URL("http://localhost:1323/swagger/doc.json"), //The url pointing to API definition
httpSwagger.DeepLinking(true),
httpSwagger.DocExpansion("none"),
httpSwagger.DomID("#swagger-ui"),
)).Methods(http.MethodGet)
```
### References
Reporter dongguangli from https://www.huoxian.cn/ company
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [http-swagger](https://github.com/swaggo/http-swagger/issues)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/swaggo/http-swagger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.6'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/swaggo/http-swagger/security/advisories/GHSA-xg75-q3q5-cqmv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24863'}, {'type': 'WEB', 'url': 'https://github.com/swaggo/http-swagger/pull/62'}, {'type': 'WEB', 'url': 'https://github.com/swaggo/http-swagger/commit/b7d83e8fba85a7a51aa7e45e8244b4173f15049e'}, {'type': 'PACKAGE', 'url': 'https://github.com/swaggo/http-swagger'}, {'type': 'WEB', 'url': 'https://github.com/swaggo/http-swagger/releases/tag/v1.2.6'}]
|
{'cwe_ids': ['CWE-400', 'CWE-755'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:55:52Z', 'nvd_published_at': '2022-04-18T19:15:00Z'}
|
1.4.0
|
GHSA-h6xx-pmxh-3wgp
|
2023-08-30T11:13:45Z
|
2022-04-12T22:41:32Z
| null |
['CVE-2018-16886']
|
go.etcd.io/etcd Authentication Bypass
|
etcd versions 3.2.x before 3.2.26 and 3.3.x before 3.3.11 are vulnerable to an improper authentication issue when role-based access control (RBAC) is used and client-cert-auth is enabled. If an etcd client server TLS certificate contains a Common Name (CN) which matches a valid RBAC username, a remote attacker may authenticate as that user with any valid (trusted) client certificate in a REST API request to the gRPC-gateway.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'go.etcd.io/etcd/v3'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.26'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'go.etcd.io/etcd/v3'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.0'}, {'fixed': '3.3.11'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'go.etcd.io/etcd'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0-alpha.5.0.20190108173120-83c051b701d3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16886'}, {'type': 'WEB', 'url': 'https://github.com/etcd-io/etcd/pull/10366'}, {'type': 'WEB', 'url': 'https://github.com/etcd-io/etcd/commit/0191509637546621d6f2e18e074e955ab8ef374d'}, {'type': 'WEB', 'url': 'https://github.com/etcd-io/etcd/commit/bf9d0d8291dc71ecbfb2690612954e1a298154b2'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0237'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1352'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16886'}, {'type': 'PACKAGE', 'url': 'https://github.com/etcd-io/etcd'}, {'type': 'WEB', 'url': 'https://github.com/etcd-io/etcd/blob/1eee465a43720d713bb69f7b7f5e120135fdb1ac/CHANGELOG-3.2.md#security-authentication'}, {'type': 'WEB', 'url': 'https://github.com/etcd-io/etcd/blob/1eee465a43720d713bb69f7b7f5e120135fdb1ac/CHANGELOG-3.3.md#security-authentication'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/JX7QTIT465BQGRGNCE74RATRQLKT2QE4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/UPGYHMSKDPW5GAMI7BEP3XQRVRLLBJKS/'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0077'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106540'}]
|
{'cwe_ids': ['CWE-285', 'CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T21:49:34Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-6w39-qhmq-g8cp
|
2022-05-04T20:56:35Z
|
2022-04-13T00:00:16Z
| null |
['CVE-2022-29050']
|
CSRF vulnerability in Jenkins Publish Over FTP Plugin
|
A cross-site request forgery (CSRF) vulnerability in Jenkins Publish Over FTP Plugin 1.16 and earlier allows attackers to connect to an FTP server using attacker-specified credentials.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:publish-over-ftp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.17'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29050'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/publish-over-ftp-plugin/commit/b265201428557ab91304e06199ad38221efc23e7'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/publish-over-ftp-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2321'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-04T20:56:35Z', 'nvd_published_at': '2022-04-12T20:15:00Z'}
|
1.4.0
|
GHSA-vx9g-377x-xwxq
|
2022-06-01T22:20:04Z
|
2022-04-26T00:00:41Z
| null |
['CVE-2022-27311']
|
Server side request forgery in gibbon
|
Gibbon v3.4.3 and below allows attackers to execute a Server-Side Request Forgery (SSRF) via a crafted URL. This issue has been resolved in version 3.4.4
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'RubyGems', 'name': 'gibbon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27311'}, {'type': 'WEB', 'url': 'https://github.com/amro/gibbon/pull/321'}, {'type': 'WEB', 'url': 'https://github.com/amro/gibbon/pull/321#issuecomment-1113147155'}, {'type': 'WEB', 'url': 'https://github.com/amro/gibbon/commit/b2eb99ed304d7491a6d348a5bbdc83a008fc6e0b'}, {'type': 'WEB', 'url': 'https://github.com/amro/gibbon/commit/cade20ca2438cd1b182dad70cbb77fb895779d10'}, {'type': 'PACKAGE', 'url': 'https://github.com/amro/gibbon'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/gibbon/CVE-2022-27311.yml'}]
|
{'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-27T18:48:09Z', 'nvd_published_at': '2022-04-25T13:15:00Z'}
|
1.4.0
|
GHSA-689x-x68p-fph3
|
2022-04-08T22:08:10Z
|
2022-04-01T00:00:41Z
| null |
['CVE-2022-0350']
|
Cross-site Scripting in vditor
|
Cross-site Scripting (XSS) - Stored in GitHub repository vanessa219/vditor prior to 3.8.13.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'vditor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.13'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0350'}, {'type': 'WEB', 'url': 'https://github.com/vanessa219/vditor/commit/e912e36ea98251d700499b1ac7702708d3398476'}, {'type': 'PACKAGE', 'url': 'https://github.com/vanessa219/vditor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8202aa06-4b49-45ff-aa0f-00982f62005c'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-08T22:08:10Z', 'nvd_published_at': '2022-03-31T16:15:00Z'}
|
1.4.0
|
GHSA-qf9q-q4hh-qph3
|
2022-04-29T21:07:16Z
|
2022-04-22T00:00:36Z
| null |
['CVE-2022-29498']
|
SQL injection in blazer
|
Blazer before 2.6.0 allows SQL Injection. In certain circumstances, an attacker could get a user to run a query they would not have normally run.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'RubyGems', 'name': 'blazer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29498'}, {'type': 'WEB', 'url': 'https://github.com/ankane/blazer/issues/391'}, {'type': 'WEB', 'url': 'https://github.com/ankane/blazer/issues/392'}, {'type': 'WEB', 'url': 'https://github.com/ankane/blazer/commit/f49fbfed7b9e406a69eb78c463c3aa5d35006d8d"'}, {'type': 'PACKAGE', 'url': 'https://github.com/ankane/blazer'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/blazer/CVE-2022-29498.yml'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-29T21:07:16Z', 'nvd_published_at': '2022-04-21T05:15:00Z'}
|
1.4.0
|
GHSA-g27j-74fp-xfpr
|
2023-01-10T00:37:19Z
|
2022-04-05T18:31:22Z
| null |
['CVE-2022-26969']
|
Insecure default value for CORS configuration
|
### Impact
The default value for the `CORS_ENABLED` and `CORS_ORIGIN` configuration was set to be very permissive by default. This could lead to unauthorized access in uncontrolled environments when the configuration hasn't been changed.
### Patches
The default values for CORS have been changed in https://github.com/directus/directus/pull/12022 which is released under 9.7.0
### Workarounds
Configure the CORS environment variables to match your project's usage, rather than leaving them at the (permissive) defaults.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [directus/directus](https://github.com/directus/directus)
* Email us at [[email protected]](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'directus'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.7.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/directus/directus/security/advisories/GHSA-g27j-74fp-xfpr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26969'}, {'type': 'WEB', 'url': 'https://github.com/directus/directus/pull/12022'}, {'type': 'WEB', 'url': 'https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS'}, {'type': 'PACKAGE', 'url': 'https://github.com/directus/directus'}, {'type': 'WEB', 'url': 'https://github.com/directus/directus/blob/8daed9c41baeaf1d08c1e292bf9f0dcef65e48fb/docs/configuration/config-options.md'}, {'type': 'WEB', 'url': 'https://github.com/directus/directus/releases/tag/v9.7.0'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-DIRECTUS-2441822'}]
|
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-05T18:31:22Z', 'nvd_published_at': '2022-12-26T06:15:00Z'}
|
1.4.0
|
GHSA-x752-qjv4-c4hc
|
2022-04-15T16:49:27Z
|
2022-04-04T00:00:55Z
| null |
['CVE-2022-28368']
|
Remote code injection in dompdf/dompdf
|
Dompdf is an HTML to PDF converter. Dompdf before 1.2.1 allows remote code execution via a .php file in the src:url field of an @font-face Cascading Style Sheets (CSS) statement (within an HTML input file).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'dompdf/dompdf'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28368'}, {'type': 'WEB', 'url': 'https://github.com/dompdf/dompdf/issues/2598'}, {'type': 'WEB', 'url': 'https://github.com/dompdf/dompdf/pull/2808'}, {'type': 'WEB', 'url': 'https://github.com/dompdf/dompdf/commit/4c70e1025bcd9b7694b95dd552499bd83cd6141d'}, {'type': 'PACKAGE', 'url': 'https://github.com/dompdf/dompdf'}, {'type': 'WEB', 'url': 'https://github.com/snyk-labs/php-goof'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/dompdf/dompdf#v1.2.1'}, {'type': 'WEB', 'url': 'https://snyk.io/blog/security-alert-php-pdf-library-dompdf-rce/'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/171738/Dompdf-1.2.1-Remote-Code-Execution.html'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-05T18:00:16Z', 'nvd_published_at': '2022-04-03T03:15:00Z'}
|
1.4.0
|
GHSA-8xpj-9j9g-fc9r
|
2022-04-18T22:19:44Z
|
2022-04-08T22:43:17Z
| null |
['CVE-2022-24827']
|
SQL Injection in elide-datastore-aggregation
|
### Impact
When leveraging the following together:
- Elide Aggregation Data Store for Analytic Queries
- Parameterized Columns (A column that requires a client provided parameter)
- A parameterized column of type TEXT
There is the potential for a hacker to provide a carefully crafted query that would bypass server side authorization filters through SQL injection. A recent patch to Elide 6.1.2 allowed the '-' character to be included in parameterized TEXT columns. This character can be interpreted as SQL comments ('--') and allow the attacker to remove the WHERE clause from the generated query and bypass authorization filters.
### Patches
A [fix](https://github.com/yahoo/elide/pull/2581) is provided in [Elide 6.1.4](https://github.com/yahoo/elide/releases/tag/6.1.4).
### Workarounds
The vulnerability only exists for parameterized columns of type TEXT and only for analytic queries (CRUD is not impacted). Workarounds include leveraging a different type of parameterized column (TIME, MONEY, etc) or not leveraging parameterized columns.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [elide](https://github.com/yahoo/elide)
* Contact us in [Discord](https://discord.com/invite/3vh8ac57cc)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.yahoo.elide:elide-datastore-aggregation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.3'}, {'fixed': '6.1.4'}]}], 'versions': ['6.1.3']}]
|
[{'type': 'WEB', 'url': 'https://github.com/yahoo/elide/security/advisories/GHSA-8xpj-9j9g-fc9r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24827'}, {'type': 'WEB', 'url': 'https://github.com/yahoo/elide/pull/2581'}, {'type': 'PACKAGE', 'url': 'https://github.com/yahoo/elide'}, {'type': 'WEB', 'url': 'https://github.com/yahoo/elide/releases/tag/6.1.4'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-08T22:43:17Z', 'nvd_published_at': '2022-04-11T21:15:00Z'}
|
1.4.0
|
GHSA-cvx5-m8vg-vxgc
|
2022-04-28T21:16:40Z
|
2022-04-28T21:16:40Z
| null |
['CVE-2022-24897']
|
Arbitrary filesystem write access from velocity.
|
### Impact
The velocity scripts is not properly sandboxed against using the Java File API to perform read or write operations on the filesystem. Now writing an attacking script in velocity requires the Script rights in XWiki so not all users can use it, and it also requires finding an XWiki API which returns a File.
### Patches
The problem has been patched on versions 12.6.7, 12.10.3 and 13.0RC1.
### Workarounds
There's no easy workaround for fixing this vulnerability other than upgrading and being careful when giving Script rights.
### References
https://jira.xwiki.org/browse/XWIKI-5168
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki](https://jira.xwiki.org)
* Email us at [XWiki Security mailing-list](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.commons:xwiki-commons-velocity'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '12.6.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.commons:xwiki-commons-velocity'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.7.0'}, {'fixed': '12.10.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-cvx5-m8vg-vxgc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24897'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-commons/pull/127'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-commons/commit/215951cfb0f808d0bf5b1097c9e7d1e503449ab8'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-commons'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-5168'}]
|
{'cwe_ids': ['CWE-22', 'CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T21:16:40Z', 'nvd_published_at': '2022-05-02T22:15:00Z'}
|
1.4.0
|
GHSA-j33m-2537-86jm
|
2023-08-29T20:04:11Z
|
2022-04-23T00:40:51Z
| null |
['CVE-2012-20001']
|
PrestaShop XSS Vulnerability
|
PrestaShop before 1.5.2.0 allows XSS via the `<object data='data:text/html` substring in the message field.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.2.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-20001'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2012/Nov/1'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20140803034142/http://forge.prestashop.com/browse/PSCFV-5204'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160305224628/http://davidsopas.com/labs/prestashop_xss.txt'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T20:04:11Z', 'nvd_published_at': '2021-12-21T16:15:00Z'}
|
1.4.0
|
GHSA-w24h-v9qh-8gxj
|
2023-09-05T19:20:10Z
|
2022-04-13T00:00:33Z
| null |
['CVE-2022-28347']
|
SQL Injection in Django
|
A SQL injection issue was discovered in `QuerySet.explain()` in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. This occurs by passing a crafted dictionary (with dictionary expansion) as the `**options` argument, and placing the injection payload in an option name.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ecosystem_specific': {'affected_functions': ['django.db.models.QuerySet.explain']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixed': '2.2.28'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ecosystem_specific': {'affected_functions': ['django.db.models.QuerySet.explain']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2'}, {'fixed': '3.2.13'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ecosystem_specific': {'affected_functions': ['django.db.models.QuerySet.explain']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0'}, {'fixed': '4.0.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28347'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/00b0fc50e1738c7174c495464a5ef069408a4402'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/29a6c98b4c13af82064f993f0acc6e8fafa4d3f5'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/6723a26e59b0b5429a0c5873941e01a2e1bdbb81'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/9e19accb6e0a00ba77d5a95a91675bf18877c72d'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/4.0/releases/security/'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-w24h-v9qh-8gxj'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2022-191.yaml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!forum/django-announce'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5254'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2022/apr/11/security-releases/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/04/11/1'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:32:48Z', 'nvd_published_at': '2022-04-12T05:15:00Z'}
|
1.4.0
|
GHSA-w8xh-93qh-35vw
|
2022-04-22T20:28:59Z
|
2022-04-13T00:00:22Z
| null |
['CVE-2022-27952']
|
Unrestricted Upload of File with Dangerous Type in Payload
|
An arbitrary file upload vulnerability in the file upload module of PayloadCMS v0.15.0 allows attackers to execute arbitrary code via a crafted SVG file.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'payload'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.15.0'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27952'}, {'type': 'PACKAGE', 'url': 'https://github.com/payloadcms/payload'}, {'type': 'WEB', 'url': 'https://www.youtube.com/watch?v=6CfhAxA3xdQ'}]
|
{'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:28:59Z', 'nvd_published_at': '2022-04-12T17:15:00Z'}
|
1.4.0
|
GHSA-j383-35pm-c5h4
|
2022-04-26T21:51:41Z
|
2022-04-13T00:00:16Z
| null |
['CVE-2022-0436']
|
Path Traversal in Grunt
|
Grunt prior to version 1.5.2 is vulnerable to path traversal.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'grunt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0436'}, {'type': 'WEB', 'url': 'https://github.com/gruntjs/grunt/pull/1743'}, {'type': 'WEB', 'url': 'https://github.com/gruntjs/grunt/commit/aad3d4521c3098fb255fb2db8f2e1d691a033665'}, {'type': 'WEB', 'url': 'https://github.com/gruntjs/grunt/commit/b0ec6e12426fc8d5720dee1702f6a67455c5986c'}, {'type': 'PACKAGE', 'url': 'https://github.com/gruntjs/grunt'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/f55315e9-9f6d-4dbb-8c40-bae50c1ae92b'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/04/msg00008.html'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-26T21:51:41Z', 'nvd_published_at': '2022-04-12T21:15:00Z'}
|
1.4.0
|
GHSA-v98r-gjgc-m9pf
|
2022-12-01T23:59:34Z
|
2022-04-13T00:00:16Z
| null |
['CVE-2022-29045']
|
Stored Cross-site Scripting vulnerability in Jenkins Promoted Builds Plugin
|
Jenkins promoted builds Plugin 873.v6149db_d64130 and earlier, except 3.10.1, does not escape the name and description of Promoted Build parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Exploitation of these vulnerabilities requires that parameters are listed on another page, like the \"Build With Parameters\" and \"Parameters\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \"Build With Parameters\" and \"Parameters\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:promoted-builds'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.10.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:promoted-builds'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11'}, {'fixed': '876.v99d29788b'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29045'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T21:07:38Z', 'nvd_published_at': '2022-04-12T20:15:00Z'}
|
1.4.0
|
GHSA-x446-3xhq-5xfp
|
2022-04-26T13:03:51Z
|
2022-04-15T00:00:40Z
| null |
['CVE-2022-27814']
|
Exposure of Resource to Wrong Sphere in Simple-Wayland-HotKey-Daemon
|
SWHKD 1.1.5 allows arbitrary file-existence tests via the -c option.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'Simple-Wayland-HotKey-Daemon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27814'}, {'type': 'PACKAGE', 'url': 'https://github.com/waycrate/swhkd'}, {'type': 'WEB', 'url': 'https://github.com/waycrate/swhkd/releases'}, {'type': 'WEB', 'url': 'https://github.com/waycrate/swhkd/releases/tag/1.2.0'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2022/04/14/1'}]
|
{'cwe_ids': ['CWE-668'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-04-26T13:03:51Z', 'nvd_published_at': '2022-04-14T17:15:00Z'}
|
1.4.0
|
GHSA-wcwp-r3fj-mm3p
|
2023-09-18T22:27:55Z
|
2022-04-30T18:12:54Z
| null |
['CVE-2000-0062']
|
Zope DTML implementation Improper Authentication
|
The DTML implementation in the Z Object Publishing Environment (Zope) allows remote attackers to conduct unauthorized activities.
|
[]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'zope'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'last_affected': '2.2.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2000-0062'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20010218085743/http://www.securityfocus.com/bid/922'}]
|
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T22:27:55Z', 'nvd_published_at': '2000-01-04T05:00:00Z'}
|
1.4.0
|
GHSA-qffw-8wg7-h665
|
2022-04-29T17:22:43Z
|
2022-04-23T00:03:01Z
| null |
['CVE-2022-1440']
|
Command injection in git-interface
|
A command injection vulnerability exists in git-interface in the GitHub repository yarkeev/git-interface prior to 2.1.2. If both the git remote and destination directory are provided by user input, then the use of an `--upload-pack` command-line argument feature of git is also supported for `git clone`, which would then allow for any operating system command to be spawned by the attacker.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'git-interface'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1440'}, {'type': 'WEB', 'url': 'https://github.com/yarkeev/git-interface/commit/f828aa790016fee3aa667f7b44cf94bf0aa8c60d'}, {'type': 'PACKAGE', 'url': 'https://github.com/yarkeev/git-interface'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/cdc25408-d3c1-4a9d-bb45-33b12a715ca1'}]
|
{'cwe_ids': ['CWE-78', 'CWE-88'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-26T13:06:52Z', 'nvd_published_at': '2022-04-22T18:15:00Z'}
|
1.4.0
|
GHSA-pv7p-c7cp-vrh3
|
2022-12-02T21:17:54Z
|
2022-04-13T00:00:16Z
| null |
['CVE-2022-29044']
|
Stored Cross-site Scripting in Jenkins Node and Label parameter Plugin
|
Jenkins Node and Label parameter Plugin 1.10.3 and earlier does not escape the name and description of Node and Label parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Exploitation of this vulnerability requires that parameters are listed on another page, like the \"Build With Parameters\" and \"Parameters\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \"Build With Parameters\" and \"Parameters\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:nodelabelparameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.3.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29044'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/nodelabelparameter-plugin/commit/b8a95cbf678e18dd1f936fd38f23b8cb0695ded7'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/nodelabelparameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T21:17:54Z', 'nvd_published_at': '2022-04-12T20:15:00Z'}
|
1.4.0
|
GHSA-q6h7-4qgw-2j9p
|
2022-12-27T00:58:20Z
|
2022-04-20T00:00:33Z
| null |
['CVE-2022-29153']
|
Hashicorp Consul HTTP health check endpoints returning an HTTP redirect may be abused as SSRF vector
|
A vulnerability was identified in Consul and Consul Enterprise (“Consul”) such that HTTP health check endpoints returning an HTTP redirect may be abused as a vector for server-side request forgery (SSRF). This vulnerability, CVE-2022-29153, was fixed in Consul 1.9.17, 1.10.10, and 1.11.5.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.17'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.10.10'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.5'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29153'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2022-10-consul-s-http-health-check-may-allow-server-side-request-forgery/'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2022-10-consul-s-http-health-check-may-allow-server-side-request-forgery/38393'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/consul'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RBODKZL7HQE5XXS3SA2VIDVL4LAA5RWH/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/RBODKZL7HQE5XXS3SA2VIDVL4LAA5RWH/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202208-09'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220602-0005/'}]
|
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T21:13:56Z', 'nvd_published_at': '2022-04-19T16:17:00Z'}
|
1.4.0
|
GHSA-6v6p-g8cg-2hgg
|
2022-04-01T12:56:28Z
|
2022-04-01T12:56:28Z
| null |
[]
|
Improper Certificate Validation in node-sass affects eZ Platform
|
Certificate validation in node-sass 2.0.0 to 4.14.1 is disabled when requesting binaries even if the user is not specifying an alternative download path. This affects eZ Platform v2.5 only. The maintainers resolved it by replacing node-sass 4.11 with sass 1.32.13. This issue also affects ezsystems/ezplatform and ezsystems/ezplatform-page-builder.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezplatform-admin-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.27'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezplatform-admin-ui/security/advisories/GHSA-6v6p-g8cg-2hgg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24025'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-002-vulnerability-in-node-sass'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-r8f7-9pfq-mjmv'}, {'type': 'PACKAGE', 'url': 'https://github.com/ezsystems/ezplatform-admin-ui'}, {'type': 'WEB', 'url': 'https://github.com/ezsystems/ezplatform-admin-ui/releases/tag/v1.5.27'}]
|
{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T12:56:28Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-m87f-39q9-6f55
|
2022-04-05T17:47:26Z
|
2022-04-05T17:47:26Z
| null |
['CVE-2022-24758']
|
Sensitive Auth & Cookie data stored in Jupyter server logs
|
Anytime a 5xx error is triggered, the auth cookie and other header values are recorded in Jupyter server logs by default. Considering these logs do not require root access, an attacker can monitor these logs, steal sensitive auth/cookie information, and gain access to the Jupyter server.
Upgrade to notebook version 6.4.10
### For more information
If you have any questions or comments about this advisory, or vulnerabilities to report, please email our security list [[email protected]](mailto:[email protected]).
Credit: @3coins for reporting. Thank you!
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'notebook'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.10'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/jupyter/notebook/security/advisories/GHSA-m87f-39q9-6f55'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24758'}, {'type': 'PACKAGE', 'url': 'https://github.com/jupyter/notebook'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/notebook/PYSEC-2022-180.yaml'}]
|
{'cwe_ids': ['CWE-532'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-05T17:47:26Z', 'nvd_published_at': '2022-03-31T23:15:00Z'}
|
1.4.0
|
GHSA-5x4f-7xgq-r42x
|
2022-04-29T15:39:18Z
|
2022-04-29T15:39:18Z
| null |
[]
|
Object state limitation has no effect
|
Object state limitation is a policy you can use in your roles to limit access to content based on specific object state values. Due to a flawed earlier update, these limitations were ineffective in releases made since February 16th 2022. They would grant access to the given content regardless of the object state. Depending on how your frontent is designed, knowing the URL to the content may or may not be required to access it. If you are using object state limitations in your roles, this issue is critical. Please apply the fix as soon as possible.
|
[]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezpublish-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.5.0'}, {'fixed': '7.5.28'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezpublish-kernel/security/advisories/GHSA-5x4f-7xgq-r42x'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-004-ineffective-object-state-limitation-and-unauthenticated-fastly-purge'}, {'type': 'PACKAGE', 'url': 'https://github.com/ezsystems/ezpublish-kernel'}]
|
{'cwe_ids': ['CWE-281'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-29T15:39:18Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-4hj2-r2pm-3hc6
|
2022-04-28T18:10:23Z
|
2022-04-22T20:42:46Z
| null |
['CVE-2022-27652']
|
Incorrect Default Permissions in CRI-O
|
### Impact
A bug was found in CRI-O where containers were incorrectly started with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during `execve(2)`. Normally, when executable programs have specified permitted file capabilities, otherwise unprivileged users and processes can execute those programs and gain the specified file capabilities up to the bounding set. Due to this bug, containers which included executable programs with inheritable file capabilities allowed otherwise unprivileged users and processes to additionally gain these inheritable file capabilities up to the container's bounding set. Containers which use Linux users and groups to perform privilege separation inside the container are most directly impacted.
This bug did not affect the container security sandbox as the inheritable set never contained more capabilities than were included in the container's bounding set.
### Patches
This bug will been fixed in the following versions of CRI-O:
- v1.24.0
Users should update to the version corresponding to their minor release as soon as possible. Running containers should be stopped, deleted, and recreated for the inheritable capabilities to be reset.
This fix changes CRI-O behavior such that containers are started with a more typical Linux environment. Refer to `capabilities(7)` for a description of how capabilities work. Note that permitted file capabilities continue to allow for privileges to be raised up to the container's bounding set and that processes may add capabilities to their own inheritable set up to the container's bounding set per the rules described in the manual page. In all cases the container's bounding set provides an upper bound on the capabilities that can be assumed and provides for the container security sandbox.
### Workarounds
The entrypoint of a container can be modified to use a utility like `capsh(1)` to drop inheritable capabilities prior to the primary process starting.
### Credits
CRI-O would like to thank [Andrew G. Morgan](https://github.com/AndrewGMorgan) for responsibly disclosing this issue, as well as the Moby (Docker Engine) project for working with the other container engines in coordinating a fix.
### For more information
If you have any questions or comments about this advisory:
* [Open an issue](https://github.com/cri-o/cri-o/issues/new)
* Email us at [[email protected]]([email protected]) if you think you’ve found a security bug
------------------
https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
4.8/Medium
|Metric |Value |Comments |
|--- |--- |--- |
|Attack Vector (AV) |Local |An attacker requires local control to launch a container with files that have inheritable capabilities. |
|Attack Complexity (AC) |Low |Modifying a file to have inheritable capabilities is not difficult. |
|Privileges Required (PR) |Low |An attacker requires enough privilege to cause a container to be launched with a compromised image. Moby's API is typically bound to a local Unix domain socket and requires calls to be made from a process that is either UID 0 or present in the configured group. |
|User Interaction (UI) |Required |An attacker must cause the compromised image to be run. |
|Scope (S) |Unchanged |The container boundary set by Moby, including the bounding capability set, is not modified. A successful attack gains access to privileges and resources within the boundary, not outside of it. |
|Confidentiality (C) |Low |An attacker may gain access to some confidential information through elevation of CAP_CHOWN, CAP_DAC_OVERRIDE, CAP_FOWNER, CAP_SETFCAP, or CAP_SETPCAP, but the exposed information is limited to that which is already inside the container. |
|Integrity (I) |Low |An attacker may be able to tamper with data inside the container through elevation of CAP_CHOWN, CAP_DAC_OVERRIDE, CAP_FOWNER, CAP_SETFCAP, or CAP_SETPCAP, or spoof packets with CAP_NET_RAW, but the tampered data is limited to that which is already inside the container. |
|Availability (A) |Low |An attacker may be able to affect the availability of an application running inside the container through elevation of CAP_KILL or CAP_NET_RAW, or may be able to affect availability through tampering with file dependencies. |
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cri-o/cri-o'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.24.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/cri-o/cri-o/security/advisories/GHSA-4hj2-r2pm-3hc6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27652'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2066839'}, {'type': 'PACKAGE', 'url': 'https://github.com/cri-o/cri-o'}]
|
{'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:42:46Z', 'nvd_published_at': '2022-04-18T17:15:00Z'}
|
1.4.0
|
GHSA-pxpf-v376-7xx5
|
2022-05-26T19:48:28Z
|
2022-04-30T00:00:33Z
| null |
['CVE-2022-25854']
|
tagify can pass a malicious placeholder to initiate the cross-site scripting (XSS) payload
|
This affects the package @yaireo/tagify before 4.9.8. The package is used for rendering UI components inside the input or text fields, and an attacker can pass a malicious placeholder value to it to fire the cross-site scripting (XSS) payload.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@yaireo/tagify'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.9.8'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25854'}, {'type': 'WEB', 'url': 'https://github.com/yairEO/tagify/issues/988'}, {'type': 'WEB', 'url': 'https://github.com/yairEO/tagify/commit/198c0451fad188390390395ccfc84ab371def4c7'}, {'type': 'WEB', 'url': 'https://bsg.tech/blog/cve-2022-25854-stored-xss-in-yaireo-tagify-npm-module/'}, {'type': 'PACKAGE', 'url': 'https://github.com/yairEO/tagify'}, {'type': 'WEB', 'url': 'https://github.com/yairEO/tagify/releases/tag/v4.9.8'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-YAIREOTAGIFY-2404358'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-03T04:55:32Z', 'nvd_published_at': '2022-04-29T20:15:00Z'}
|
1.4.0
|
GHSA-74w3-2r77-fw5h
|
2022-04-18T22:21:17Z
|
2022-04-03T00:00:58Z
| null |
['CVE-2022-27177']
|
Use of Externally-Controlled Format String in consoleme
|
A Python format string issue leading to information disclosure and potentially remote code execution in ConsoleMe for all versions prior to 1.2.2
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'consoleme'}, 'ecosystem_specific': {'affected_functions': ['consoleme.lib.defaults.SELF_SERVICE_IAM_DEFAULTS', 'consoleme.lib.generic.iterate_and_format_dict']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27177'}, {'type': 'WEB', 'url': 'https://github.com/Netflix/consoleme/commit/2a3c84eee524d77c427b3329a8419cbbce9e1d16'}, {'type': 'PACKAGE', 'url': 'https://github.com/Netflix/ConsoleMe'}, {'type': 'WEB', 'url': 'https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2022-001.md'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/consoleme/PYSEC-2022-189.yaml'}]
|
{'cwe_ids': ['CWE-134'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-05T17:54:33Z', 'nvd_published_at': '2022-04-01T23:15:00Z'}
|
1.4.0
|
GHSA-5pv7-hx9m-8jh3
|
2022-05-05T15:29:45Z
|
2022-04-13T00:00:16Z
| null |
['CVE-2022-29051']
|
Missing permission checks in Jenkins Publish Over FTP Plugin
|
Missing permission checks in Jenkins Publish Over FTP Plugin prior to 1.17 allow attackers with Overall/Read permission to connect to an FTP server using attacker-specified credentials.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:publish-over-ftp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.17'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29051'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/publish-over-ftp-plugin/commit/b265201428557ab91304e06199ad38221efc23e7'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/publish-over-ftp-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2321'}]
|
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-05T15:29:45Z', 'nvd_published_at': '2022-04-12T20:15:00Z'}
|
1.4.0
|
GHSA-p2vw-f87c-q597
|
2023-06-30T20:10:46Z
|
2022-04-29T00:00:23Z
| null |
['CVE-2022-1511']
|
Improper Access Control in snipe/snipe-it
|
Snipe-IT prior to 5.4.4 is vulnerable to Missing Authorization.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.4.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1511'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/pull/10991'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/2e9cf8fa87a025c0eac9f79f4864b3fdd33a950c'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/4a1723e9-5bc4-4c4b-bceb-1c45964cc71d'}]
|
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T21:13:53Z', 'nvd_published_at': '2022-04-28T15:15:00Z'}
|
1.4.0
|
GHSA-72cx-5ff9-4hhc
|
2022-04-26T20:29:02Z
|
2022-04-21T01:54:03Z
| null |
['CVE-2009-3724']
|
Cross-site scripting in markdown2 for python
|
python-markdown2 before 1.0.1.14 has multiple cross-site scripting (XSS) issues.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'markdown2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1.14'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.1.13'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-3724'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-72cx-5ff9-4hhc'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/markdown2/PYSEC-2020-235.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/trentm/python-markdown2'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-PYRAD-40000'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2009/10/29/5'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-26T20:29:02Z', 'nvd_published_at': '2020-01-15T21:15:00Z'}
|
1.4.0
|
GHSA-2q6v-32mr-8p8x
|
2022-04-12T21:20:20Z
|
2022-04-12T21:20:20Z
| null |
['CVE-2017-1000052']
|
Null Byte Injection in Plug.Static
|
Plug.Static is used for serving static assets, and is vulnerable to null
byte injection. If file upload functionality is provided, this can allow
users to bypass filetype restrictions.
We recommend all applications that provide file upload functionality and
serve those uploaded files locally with Plug.Static to upgrade immediately
or include the fix below. If uploaded files are rather stored and served
from S3 or any other cloud storage, you are not affected.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Hex', 'name': 'plug'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'Hex', 'name': 'plug'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.7'}]}]}, {'package': {'ecosystem': 'Hex', 'name': 'plug'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.3'}]}]}, {'package': {'ecosystem': 'Hex', 'name': 'plug'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000052'}, {'type': 'WEB', 'url': 'https://elixirforum.com/t/security-releases-for-plug/3913'}, {'type': 'PACKAGE', 'url': 'https://github.com/elixir-plug/plug'}]
|
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-12T21:20:20Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-wh73-hpcg-v32j
|
2023-08-31T15:47:48Z
|
2022-04-14T00:00:14Z
| null |
['CVE-2022-27479']
|
SQL injection in apache-superset
|
Apache Superset before 1.4.2 is vulnerable to SQL injection in chart data requests. Users should update to 1.4.2 or higher which addresses this issue.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27479'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wh73-hpcg-v32j'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/superset'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/apache-superset/PYSEC-2022-188.yaml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/94th50j5d0y2fw7ysx0g7w3t6jk3z7q6'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/ztb9b6jd9rngoxwvq8r4fhpp401o613y'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/04/13/3'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T19:34:57Z', 'nvd_published_at': '2022-04-13T19:15:00Z'}
|
1.4.0
|
GHSA-7mfr-774f-w5r9
|
2022-04-12T00:07:34Z
|
2022-04-12T00:07:34Z
| null |
['CVE-2017-11770']
|
Improper Certificate Validation
|
.NET Core 1.0, 1.1, and 2.0 allow an unauthenticated attacker to remotely cause a denial of service attack against a .NET Core web application by improperly parsing certificate data. A denial of service vulnerability exists when .NET Core improperly handles parsing certificate data, aka ".NET CORE Denial Of Service Vulnerability".
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'NuGet', 'name': 'System.Security.Cryptography.X509Certificates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '2.0.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11770'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3248'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11770'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/101710'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1039787'}]
|
{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-12T00:07:34Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-6gm7-j668-w6h9
|
2022-04-22T20:42:11Z
|
2022-04-09T00:00:30Z
| null |
['CVE-2022-1219']
|
SQL Injection in Pimcore
|
Pimcore prior to version 10.3.5 is vulnerable SQL injection in RecyclebinController.php. This vulnerability affects data confidentiality.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.3.5'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1219'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/a697830359df06246acca502ee2455614de68017'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/f700bd18-1fd3-4a05-867f-07176aebc7f6'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:42:11Z', 'nvd_published_at': '2022-04-08T09:15:00Z'}
|
1.4.0
|
GHSA-9cmq-pj6p-hgwf
|
2023-09-18T22:28:17Z
|
2022-04-30T18:14:11Z
| null |
['CVE-2000-0725']
|
Zope does not properly restrict access to the getRoles method
|
Zope before 2.2.1 does not properly restrict access to the getRoles method, which allows users who can edit DTML to add or modify roles by modifying the roles list that is included in a request.
|
[]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'zope'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2000-0725'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20010219192346/http://archives.neohapsis.com/archives/bugtraq/2000-08/0198.html'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20010219192441/http://archives.neohapsis.com/archives/bugtraq/2000-08/0259.html'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20010228172804/http://www.securityfocus.com/bid/1577'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2000/20000821'}, {'type': 'WEB', 'url': 'http://www.redhat.com/support/errata/RHSA-2000-052.html'}, {'type': 'WEB', 'url': 'http://www.zope.org/Products/Zope/Hotfix_08_09_2000/security_alert'}]
|
{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T22:28:17Z', 'nvd_published_at': '2000-10-20T04:00:00Z'}
|
1.4.0
|
GHSA-4822-jvwx-w47h
|
2022-11-28T16:18:30Z
|
2022-04-01T18:16:42Z
| null |
['CVE-2022-41952']
|
Uncontrolled Resource Consumption in Matrix Synapse
|
### Impact
Synapse before 1.52.0 with URL preview functionality enabled will attempt to generate URL previews for media stream URLs without properly limiting connection time. Connections will only be terminated after `max_spider_size` (default: 10M) bytes have been downloaded, which can in some cases lead to long-lived connections towards the streaming media server (for instance, Icecast).
This can cause excessive traffic and connections toward such servers if their stream URL is, for example, posted to a large room with many Synapse instances with URL preview enabled.
### Patches
1.52.0 implements a timeout mechanism which will terminate URL preview connections after 30 seconds. Since generating URL previews for media streams is not supported and always fails, 1.53.0 additionally implements an allow list for content types for which Synapse will even attempt to generate a URL preview.
We recommend upgrading to 1.53.0 to fully resolve the issue.
### Workarounds
Turn off URL preview functionality by setting `url_preview_enabled: false` in the Synapse configuration file.
### References
- Patch (timeout): https://github.com/matrix-org/synapse/pull/11784
- Patch (content type allow list): https://github.com/matrix-org/synapse/pull/11936
### For more information
If you have any questions or comments about this advisory, e-mail us at [email protected].
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.53.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/security/advisories/GHSA-4822-jvwx-w47h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41952'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/11784'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/11936'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/synapse'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/releases/tag/v1.52.0'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/releases/tag/v1.53.0'}]
|
{'cwe_ids': ['CWE-400', 'CWE-772'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T18:16:42Z', 'nvd_published_at': '2022-11-22T16:15:00Z'}
|
1.4.0
|
GHSA-558x-2xjg-6232
|
2023-03-28T22:26:10Z
|
2022-04-03T00:01:00Z
| null |
['CVE-2022-22950']
|
Allocation of Resources Without Limits or Throttling in Spring Framework
|
In Spring Framework versions 5.3.0 - 5.3.16, 5.2.0.RELEASE - 5.2.19.RELEASE, and older unsupported versions, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial of service condition.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-expression'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3.0'}, {'fixed': '5.3.17'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-expression'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.20.RELEASE'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22950'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-framework/issues/28145'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-framework/issues/28257'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-framework/commit/83ac65915871067c39a4fb255e0d484c785c0c11'}, {'type': 'PACKAGE', 'url': 'https://github.com/spring-projects/spring-framework'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-framework/releases/tag/v5.2.20.RELEASE'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-framework/releases/tag/v5.3.17'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2022-22950'}]
|
{'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-05T18:46:34Z', 'nvd_published_at': '2022-04-01T23:15:00Z'}
|
1.4.0
|
GHSA-3qrq-r688-vvh4
|
2022-04-28T21:02:17Z
|
2022-04-28T21:02:17Z
| null |
['CVE-2022-24892']
|
Multiple valid tokens for password reset in Shopware
|
### Impact
Multiple tokens for password reset could be requested. All tokens could be used to change the password.
This makes it possible for an attacker to take over the victims account if s/he gains access to the victims email account and finds unused password reset token in the emails within the time frame of two hours.
### Patches
We recommend updating to the current version 5.7.9. You can get the update to 5.7.9 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/changelog-sw5/#5-7-9
For older versions you can use the Security Plugin:
https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html
### References
https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-04-2022
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/shopware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.4'}, {'fixed': '5.7.9'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/shopware/shopware/security/advisories/GHSA-3qrq-r688-vvh4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24892'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-04-2022'}, {'type': 'PACKAGE', 'url': 'https://github.com/shopware/shopware'}, {'type': 'WEB', 'url': 'https://www.shopware.com/en/changelog-sw5/#5-7-9'}]
|
{'cwe_ids': ['CWE-640'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T21:02:17Z', 'nvd_published_at': '2022-04-28T15:15:00Z'}
|
1.4.0
|
GHSA-w8qp-hmh5-4v9v
|
2022-04-29T16:22:58Z
|
2022-04-29T16:22:58Z
| null |
[]
|
Object state limitation has no effect
|
Object state limitation is a policy you can use in your roles to limit access to content based on specific object state values. Due to a flawed earlier update, these limitations were ineffective in releases made since February 16th 2022. They would grant access to the given content regardless of the object state. Depending on how your frontent is designed, knowing the URL to the content may or may not be required to access it. If you are using object state limitations in your roles, this issue is critical. Please apply the fix as soon as possible.
|
[]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezplatform-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.17'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezplatform-kernel/security/advisories/GHSA-w8qp-hmh5-4v9v'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-004-ineffective-object-state-limitation-and-unauthenticated-fastly-purge'}, {'type': 'PACKAGE', 'url': 'https://github.com/ezsystems/ezplatform-kernel'}]
|
{'cwe_ids': ['CWE-281'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-29T16:22:58Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-vmp5-c5hp-6c65
|
2022-05-26T19:48:38Z
|
2022-04-30T00:00:33Z
| null |
['CVE-2022-29947']
|
Woodpecker allows cross-site scripting (XSS) via build logs
|
Woodpecker before 0.15.1 allows XSS via build logs because web/src/components/repo/build/BuildLog.vue lacks escaping.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/woodpecker-ci/woodpecker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29947'}, {'type': 'WEB', 'url': 'https://github.com/woodpecker-ci/woodpecker/pull/879'}, {'type': 'PACKAGE', 'url': 'https://github.com/woodpecker-ci/woodpecker/'}, {'type': 'WEB', 'url': 'https://github.com/woodpecker-ci/woodpecker/releases/tag/v0.15.1'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-03T20:18:08Z', 'nvd_published_at': '2022-04-29T21:15:00Z'}
|
1.4.0
|
GHSA-3pqg-4rqg-pg9g
|
2022-05-04T04:00:41Z
|
2022-04-23T00:03:04Z
| null |
['CVE-2022-28367']
|
Cross-site Scripting in OWASP AntiSamy
|
OWASP AntiSamy is a library for performing fast, configurable cleansing of HTML coming from untrusted sources. AntiSamy before 1.6.6 allows XSS via HTML tag smuggling on STYLE content with crafted input. The output serializer does not properly encode the supposed Cascading Style Sheets (CSS) content.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.owasp.antisamy:antisamy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.6'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28367'}, {'type': 'WEB', 'url': 'https://github.com/nahsra/antisamy/commit/0199e7e194dba5e7d7197703f43ebe22401e61ae'}, {'type': 'PACKAGE', 'url': 'https://github.com/nahsra/antisamy'}, {'type': 'WEB', 'url': 'https://github.com/nahsra/antisamy/releases/tag/v1.6.6'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-26T19:45:44Z', 'nvd_published_at': '2022-04-21T23:15:00Z'}
|
1.4.0
|
GHSA-3r7g-wrpr-j5g4
|
2022-05-26T20:18:03Z
|
2022-04-22T20:48:28Z
| null |
['CVE-2022-24857']
|
Improper Authentication in django-mfa3
|
### Impact
django-mfa3 is a library that implements multi factor authentication for the django web framework. It achieves this by modifying the regular login view. Django however has a second login view for its admin area. This second login view was not modified, so the multi factor authentication can be bypassed.
You are affected if you have activated both django-mfa3 (< 0.5.0) and django.contrib.admin and have not taken any other measures to prevent users from accessing the admin login view.
### Patches
The issue has been fixed in django-mfa3 0.5.0.
### Workarounds
It is possible to work around the issue by overwriting the admin login route, e.g. by adding the following URL definition *before* the admin routes:
url('admin/login/', lambda request: redirect(settings.LOGIN_URL)
### References
- [django-mfa3 changelog](https://github.com/xi/django-mfa3/blob/main/CHANGES.md#050-2022-04-15)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'django-mfa3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xi/django-mfa3/security/advisories/GHSA-3r7g-wrpr-j5g4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24857'}, {'type': 'WEB', 'url': 'https://github.com/xi/django-mfa3/commit/32f656e22df120b84bdf010e014bb19bd97971de'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/django-mfa3/PYSEC-2022-192.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/xi/django-mfa3'}, {'type': 'WEB', 'url': 'https://github.com/xi/django-mfa3/blob/main/CHANGES.md#050-2022-04-15'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220609-0003/'}]
|
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:48:28Z', 'nvd_published_at': '2022-04-15T19:15:00Z'}
|
1.4.0
|
GHSA-7vrm-3jc8-5wwm
|
2022-04-06T17:39:02Z
|
2022-04-04T21:40:45Z
| null |
[]
|
Incorrect Comparison in Vyper
|
### Impact
bytestrings can have dirty bytes in them, resulting in the word-for-word comparison to give incorrect results, e.g.
```vyper
b1: Bytes[32] = b"abcdef"
b1 = slice(b1, 0, 1)
b2: Bytes[32] = b"abcdef"
t: bool = b1 == b2 # incorrectly evaluates to True
```
even without dirty nonzero bytes, because there is no comparison of the length, two bytestrings can compare to equal if one ends with `"\x00"`.
```vyper
b1: Bytes[32] = b"abc\0"
b2: Bytes[32] = b"abc"
t: bool = b1 == b2 # incorrectly evaluates to True
```
### Patches
fixed in https://github.com/vyperlang/vyper/commit/2c73f8352635c0a433423a5b94740de1a118e508
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'vyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/security/advisories/GHSA-7vrm-3jc8-5wwm'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/commit/2c73f8352635c0a433423a5b94740de1a118e508'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/vyper/PYSEC-2022-196.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/vyperlang/vyper'}]
|
{'cwe_ids': ['CWE-697'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-04T21:40:45Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-gvj8-4cj4-h776
|
2022-04-29T15:40:48Z
|
2022-04-29T15:40:48Z
| null |
[]
|
Object state limitation has no effect
|
Object state limitation is a policy you can use in your roles to limit access to content based on specific object state values. Due to a flawed earlier update, these limitations were ineffective in releases made since February 16th 2022. They would grant access to the given content regardless of the object state. Depending on how your frontent is designed, knowing the URL to the content may or may not be required to access it. If you are using object state limitations in your roles, this issue is critical. Please apply the fix as soon as possible.
|
[]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'ibexa/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'ibexa/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/ibexa/core/security/advisories/GHSA-gvj8-4cj4-h776'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-004-ineffective-object-state-limitation-and-unauthenticated-fastly-purge'}, {'type': 'PACKAGE', 'url': 'https://github.com/ibexa/core'}]
|
{'cwe_ids': ['CWE-281'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-29T15:40:48Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-7r87-cj48-wj45
|
2022-04-26T21:19:52Z
|
2022-04-26T21:19:52Z
| null |
['CVE-2022-24880']
|
Potential Captcha Validate Bypass in flask-session-captcha
|
### Impact
flask-session-captcha is a package which allows users to extend Flask by adding an image based captcha stored in a server side session.
The `captcha.validate()` function would return `None` if passed no value (e.g. by submitting a request with an empty form).
If implementing users were checking the return value to be **False**, the captcha verification check could be bypassed.
Sample vulnerable code:
```python
if captcha.validate() == False:
... # abort
else:
... # do stuff
```
### Patches
A new version (1.2.1) is available that fixes the issue.
### Workarounds
Users can workaround the issue by not explicitly checking that the value is False.
Checking the return value less explicitly should still work.
```python
if not captcha.validate():
... # abort
else:
... # do stuff
```
```python
if captcha.validate():
... # do stuff
else:
... # abort
```
### References
https://github.com/Tethik/flask-session-captcha/pull/27
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the github repo](https://github.com/Tethik/flask-session-captcha)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'flask-session-captcha'}, 'ecosystem_specific': {'affected_functions': ['flask_session_captcha.FlaskSessionCaptcha.validate']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/Tethik/flask-session-captcha/security/advisories/GHSA-7r87-cj48-wj45'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24880'}, {'type': 'WEB', 'url': 'https://github.com/Tethik/flask-session-captcha/pull/27'}, {'type': 'WEB', 'url': 'https://github.com/Tethik/flask-session-captcha/commit/2811ae23a38d33b620fb7a07de8837c6d65c13e4'}, {'type': 'PACKAGE', 'url': 'https://github.com/Tethik/flask-session-captcha'}, {'type': 'WEB', 'url': 'https://github.com/Tethik/flask-session-captcha/releases/tag/v1.2.1'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/flask-session-captcha/PYSEC-2022-193.yaml'}]
|
{'cwe_ids': ['CWE-253', 'CWE-394', 'CWE-754'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-26T21:19:52Z', 'nvd_published_at': '2022-04-25T22:15:00Z'}
|
1.4.0
|
GHSA-97jg-43c9-q6pf
|
2022-04-19T15:25:47Z
|
2022-04-08T21:53:38Z
| null |
['CVE-2022-24819']
|
Unauthenticated user can retrieve the list of users through uorgsuggest.vm
|
A guest user without the right to view pages of the wiki can still list documents related to users of the wiki. The problem has been patched in XWiki versions 12.10.11, 13.4.4, and 13.9-rc-1. There is no known workaround for this problem.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.10.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '13.0.0'}, {'fixed': '13.4.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '13.5.0'}, {'fixed': '13.9'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-97jg-43c9-q6pf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24819'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-18850'}]
|
{'cwe_ids': ['CWE-359'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-08T21:53:38Z', 'nvd_published_at': '2022-04-08T20:15:00Z'}
|
1.4.0
|
GHSA-crjr-9rc5-ghw8
|
2023-07-06T16:02:37Z
|
2022-04-11T21:18:06Z
| null |
['CVE-2022-24836']
|
Nokogiri Inefficient Regular Expression Complexity
|
## Summary
Nokogiri `< v1.13.4` contains an inefficient regular expression that is susceptible to excessive backtracking when attempting to detect encoding in HTML documents.
## Mitigation
Upgrade to Nokogiri `>= 1.13.4`.
## Severity
The Nokogiri maintainers have evaluated this as [**High Severity** 7.5 (CVSS3.1)](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
## References
[CWE-1333](https://cwe.mitre.org/data/definitions/1333.html) Inefficient Regular Expression Complexity
## Credit
This vulnerability was reported by HackerOne user ooooooo_q (ななおく).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.4'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-crjr-9rc5-ghw8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24836'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/commit/e444525ef1634b675cd1cf52d39f4320ef0aecfd'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2022-24836.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/sparklemotion/nokogiri'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ?utm_medium=email&utm_source=footer'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/05/msg00013.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/10/msg00018.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/6DHCOWMA5PQTIQIMDENA7R2Y5BDYAIYM/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/OUPLBUZVM4WPFSXBEP2JS3R6LMKRTLFC/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/XMDCWRQXJQ3TFSETPCEFMQ6RR6ME5UA3/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202208-29'}, {'type': 'WEB', 'url': 'https://support.apple.com/kb/HT213532'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2022/Dec/23'}]
|
{'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-11T21:18:06Z', 'nvd_published_at': '2022-04-11T22:15:00Z'}
|
1.4.0
|
GHSA-6xwr-q98w-rvg7
|
2022-04-22T20:32:05Z
|
2022-04-13T00:00:30Z
| null |
['CVE-2022-21803']
|
Prototype Pollution in nconf
|
nconf before 0.11.4. When using the memory engine, it is possible to store a nested JSON representation of the configuration. The .set() function, that is responsible for setting the configuration properties, is vulnerable to Prototype Pollution. By providing a crafted property, it is possible to modify the properties on the Object.prototype.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'nconf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21803'}, {'type': 'WEB', 'url': 'https://github.com/indexzero/nconf/pull/397'}, {'type': 'PACKAGE', 'url': 'https://github.com/indexzero/nconf'}, {'type': 'WEB', 'url': 'https://github.com/indexzero/nconf/releases/tag/v0.11.4'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NCONF-2395478'}]
|
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:31:22Z', 'nvd_published_at': '2022-04-12T16:15:00Z'}
|
1.4.0
|
GHSA-34hv-f45p-4qfq
|
2022-04-19T14:13:44Z
|
2022-04-06T00:01:29Z
| null |
['CVE-2022-27463']
|
Open redirect in wwbn/avideo
|
Open redirect vulnerability in objects/login.json.php in WWBN AVideo through 11.6, allows attackers to arbitrarily redirect users from a crafted url to the login page. A patch is available on the `master` branch of the repository.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'wwbn/avideo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '11.6'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27463'}, {'type': 'WEB', 'url': 'https://github.com/WWBN/AVideo/commit/77e9aa6411ff4b97571eb82e587139ec05ff894c'}, {'type': 'WEB', 'url': 'https://avideo.tube/'}, {'type': 'PACKAGE', 'url': 'https://github.com/WWBN/AVideo'}]
|
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T22:15:39Z', 'nvd_published_at': '2022-04-05T16:15:00Z'}
|
1.4.0
|
GHSA-6xvq-2gj8-4276
|
2022-04-15T03:05:55Z
|
2022-04-06T00:01:29Z
| null |
['CVE-2020-28847']
|
Cross site scripting in valine
|
valine is a fast, simple & powerful comment system. Cross Site Scripting (XSS) vulnerability in xCss Valine v1.4.14 via the nick parameter to /classes/Comment. A fix was released in version 1.4.15.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'valine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.15'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28847'}, {'type': 'WEB', 'url': 'https://github.com/xCss/Valine/issues/348'}, {'type': 'PACKAGE', 'url': 'https://github.com/xCss/Valine'}, {'type': 'WEB', 'url': 'https://github.com/xCss/Valine/releases/tag/v1.4.15'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T18:16:52Z', 'nvd_published_at': '2022-04-05T16:15:00Z'}
|
1.4.0
|
GHSA-9wrv-g75h-8ccc
|
2022-05-04T03:52:17Z
|
2022-04-22T21:04:27Z
| null |
['CVE-2022-24872']
|
Improper Access Control in Shopware
|
Shopware 6 is an open commerce platform based on Symfony Framework and Vue and supported by a worldwide community and more than 1.500 community extensions. Permissions set to sales channel context by admin-api are still useable within normal user session. We recommend updating to the current version 6.4.10.1. You can get the update to 6.4.10.1 regularly via the Auto-Updater or directly via the download overview. For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.10.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.4.0'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.10.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.4.0'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-9wrv-g75h-8ccc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24872'}, {'type': 'WEB', 'url': 'https://github.com/shopware/platform/commit/083765e2d64a00315050c4891800c9e98ba0c77c'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2022'}, {'type': 'PACKAGE', 'url': 'https://github.com/shopware/platform'}]
|
{'cwe_ids': ['CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T21:04:27Z', 'nvd_published_at': '2022-04-20T20:15:00Z'}
|
1.4.0
|
GHSA-5653-437f-5hmc
|
2022-04-12T21:29:30Z
|
2022-04-12T21:29:30Z
| null |
['CVE-2019-16764']
|
Denial of service
|
The use of `String.to_atom/1` in PowAssent is susceptible to denial of service attacks. In `PowAssent.Phoenix.AuthorizationController` a value is fetched from the user provided params, and `String.to_atom/1` is used to convert the binary value to an atom so it can be used to fetch the provider configuration value. This is unsafe as it is user provided data, and can be used to fill up the whole atom table of ~1M which will cause the app to crash.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Hex', 'name': 'pow_assent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.4'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pow-auth/pow_assent/security/advisories/GHSA-368c-xvrv-x986'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16764'}, {'type': 'WEB', 'url': 'https://github.com/pow-auth/pow_assent/commit/026105eeecc0e3c2f807e7109e745ea93c0fd9cf'}, {'type': 'PACKAGE', 'url': 'https://github.com/pow-auth/pow_assent'}, {'type': 'WEB', 'url': 'https://hex.pm/packages/pow_assent'}, {'type': 'WEB', 'url': 'http://erlang.org/doc/efficiency_guide/commoncaveats.html#list_to_atom-1'}]
|
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-12T21:29:30Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-mm33-5vfq-3mm3
|
2022-06-08T18:05:30Z
|
2022-04-27T22:28:59Z
| null |
['CVE-2022-22577']
|
Cross-site Scripting Vulnerability in Action Pack
|
There is a possible XSS vulnerability in Rails / Action Pack. This vulnerability has been
assigned the CVE identifier CVE-2022-22577.
Versions Affected: >= 5.2.0
Not affected: < 5.2.0
Fixed Versions: 7.0.2.4, 6.1.5.1, 6.0.4.8, 5.2.7.1
## Impact
CSP headers were only sent along with responses that Rails considered as
"HTML" responses. This left API requests without CSP headers, which could
possibly expose users to XSS attacks.
## Releases
The FIXED releases are available at the normal locations.
## Workarounds
Set a CSP for your API responses manually.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.0'}, {'fixed': '5.2.7.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.7.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.4.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.4.7'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.0'}, {'fixed': '6.1.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.1.5.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.2.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.2.3'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22577'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/pull/44635'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/2b820a2a69fa50cffa74b4aedc57bf92ed6910ec'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/5299b57d596ea274f77f5ffee2b79c6ee0255508'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/8198d7c4accad0b6ba956b9d59528534a289866b'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/d2253115ac2b30f5f7210670af906cebf79cf809'}, {'type': 'WEB', 'url': 'https://discuss.rubyonrails.org/t/cve-2022-22577-possible-xss-vulnerability-in-action-pack/80533'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2022-22577.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/ruby-security-ann/c/NuFRKaN5swI'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/09/msg00002.html'}, {'type': 'WEB', 'url': 'https://rubyonrails.org/2022/4/26/Rails-7-0-2-4-6-1-5-1-6-0-4-8-and-5-2-7-1-have-been-released'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20221118-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5372'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-27T22:28:59Z', 'nvd_published_at': '2022-05-26T17:15:00Z'}
|
1.4.0
|
GHSA-cf4q-4cqr-7g7w
|
2022-04-22T20:25:53Z
|
2022-04-22T20:25:53Z
| null |
[]
|
SVG with embedded scripts can lead to cross-site scripting attacks in xml2rfc
|
xml2rfc allows `script` elements in SVG sources.
In HTML output having these script elements can lead to XSS attacks.
Sample XML snippet:
```
<artwork type="svg" src="data:image/svg+xml,%3Csvg viewBox='0 0 10 10' xmlns='http://www.w3.org/2000/svg'%3E%3Cscript%3E window.alert('Test Alert'); %3C/script%3E%3C/svg%3E">
</artwork>
```
### Impact
This vulnerability impacts website that publish HTML drafts and RFCs.
### Patches
This has been fixed in version [3.12.4](https://github.com/ietf-tools/xml2rfc/releases/tag/v3.12.4).
### Workarounds
If SVG source is self-contained within the XML, scraping `script` elements from SVG files.
### References
* https://developer.mozilla.org/en-US/docs/Web/SVG/Element/script
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [xml2rfc](https://github.com/ietf-tools/xml2rfc/)
* Email us at [[email protected]](mailto:[email protected])
* [Infrastructure and Services Vulnerability Disclosure](https://www.ietf.org/about/administration/policies-procedures/vulnerability-disclosure/)
|
[]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'xml2rfc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.12.4'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/ietf-tools/xml2rfc/security/advisories/GHSA-cf4q-4cqr-7g7w'}, {'type': 'PACKAGE', 'url': 'https://github.com/ietf-tools/xml2rfc'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:25:53Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-v2wf-c3j6-wpvw
|
2022-04-12T21:27:49Z
|
2022-04-12T21:27:49Z
| null |
['CVE-2020-5205']
|
Session fixation
|
### Impact
The use of `Plug.Session` in `Pow.Plug.Session` is susceptible to session fixation attacks if a persistent session store is used for `Plug.Session`, such as Redis or a database. Cookie store, which is used in most Phoenix apps, doesn't have this vulnerability.
### Workarounds
Call `Plug.Conn.configure_session(conn, renew: true)` periodically and after privilege change. A custom authorization plug can be written where the `create/3` method should return the `conn` only after `Plug.Conn.configure_session/2` have been called on it.
### References
https://github.com/danschultzer/pow/commit/578ffd3d8bb8e8a26077b644222186b108da474f
https://www.owasp.org/index.php/Session_fixation
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Hex', 'name': 'pow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.16'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/danschultzer/pow/security/advisories/GHSA-v2wf-c3j6-wpvw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5205'}, {'type': 'WEB', 'url': 'https://github.com/danschultzer/pow/commit/578ffd3d8bb8e8a26077b644222186b108da474f'}, {'type': 'PACKAGE', 'url': 'https://github.com/danschultzer/pow'}, {'type': 'WEB', 'url': 'https://github.com/danschultzer/pow/blob/master/CHANGELOG.md#v1016-2020-01-07'}]
|
{'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-12T21:27:49Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-6635-c626-vj4r
|
2022-04-18T21:47:33Z
|
2022-04-01T14:05:33Z
| null |
['CVE-2022-21235']
|
Command Injection Vulnerability with Mercurial in VCS
|
URLs and local file paths passed to the Mercurial (hg) APIs that are specially crafted can contain commands which are executed by Mercurial if it is installed on the host operating system. The `vcs` package uses the underly version control system, in this case `hg`, to implement the needed functionality. When `hg` is executed, argument strings are passed to `hg` in a way that additional flags can be set. The additional flags can be used to perform a command injection. Other version control systems with an implemented interface may also be vulnerable. The issue has been fixed in version 1.13.2. A work around is to sanitize data passed to the `vcs` package APIs to ensure it does not contain commands or unexpected data. This is important for user input data that is passed directly to the package APIs.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/Masterminds/vcs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/Masterminds/vcs/security/advisories/GHSA-6635-c626-vj4r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21235'}, {'type': 'WEB', 'url': 'https://github.com/Masterminds/vcs/pull/105'}, {'type': 'WEB', 'url': 'https://github.com/Masterminds/vcs/commit/922a5122330ea8fbe56352a0172ddb6bf019cd22'}, {'type': 'PACKAGE', 'url': 'https://github.com/Masterminds/vcs'}, {'type': 'WEB', 'url': 'https://github.com/Masterminds/vcs/releases/tag/v1.13.2'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMMASTERMINDSVCS-2437078'}]
|
{'cwe_ids': ['CWE-77', 'CWE-88'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T14:05:33Z', 'nvd_published_at': '2022-04-01T16:15:00Z'}
|
1.4.0
|
GHSA-9qgm-w87q-hx89
|
2022-04-22T21:03:44Z
|
2022-04-13T00:00:25Z
| null |
['CVE-2022-27263']
|
Unrestricted Upload of File with Dangerous Type in Strapi
|
An arbitrary file upload vulnerability in the file upload module of Strapi v4.1.5 allows attackers to execute arbitrary code via a crafted file.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'strapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.1.5'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27263'}, {'type': 'PACKAGE', 'url': 'https://github.com/strapi/strapi'}, {'type': 'WEB', 'url': 'https://www.youtube.com/watch?v=LEeabouqRrg'}]
|
{'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T21:03:44Z', 'nvd_published_at': '2022-04-12T17:15:00Z'}
|
1.4.0
|
GHSA-vpgw-ffh3-648h
|
2022-04-22T20:20:55Z
|
2022-04-12T00:00:38Z
| null |
['CVE-2022-1295']
|
Prototype Pollution in fullpage.js
|
fullPage utils are available to developers using window.fp_utils. They can use these utils for their own use-case (other than fullPage) as well. However, one of the utils deepExtend is vulnerable to Prototype Pollution vulnerability.
Javascript is "prototype" language which means when a new "object" is created, it carries the predefined properties and methods of an "object" with itself like toString, constructor etc. By using prototype-pollution vulnerability, an attacker can overwrite/create the property of that "object" type. If the victim developer has used that property anywhere in the code, then it will have severe effect on the application.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'fullpage.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1295'}, {'type': 'WEB', 'url': 'https://github.com/alvarotrigo/fullpage.js/commit/bf62492a22e5d296e63c3ed918a42fc5645a0d48'}, {'type': 'PACKAGE', 'url': 'https://github.com/alvarotrigo/fullpage.js'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3b9d450c-24ac-4037-b04d-4d4dafbf593a'}]
|
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:20:05Z', 'nvd_published_at': '2022-04-11T12:15:00Z'}
|
1.4.0
|
GHSA-5jfw-35xp-5m42
|
2022-04-05T17:53:22Z
|
2022-04-05T17:53:22Z
| null |
[]
|
Buffer length underflow in LoginPacket causing unchecked exceptions to be thrown
|
### Impact
`LoginPacket` uses `BinaryStream->getLInt()` to read the lengths of JSON payloads it wants to decode. Unfortunately, `BinaryStream->getLInt()` returns a signed integer, meaning that a malicious client can craft a packet with a large uint32 value for payload buffer size (which would be interpreted as a negative signed int32), causing `BinaryStream->get()` to throw an exception.
In the context of PocketMine-MP, this leads to a server crash when the vulnerability is exploited.
### Patches
e3fce7632b94e83fd6a518a87dcaf6a11681c4ac
### Workarounds
This can be worked around by registering a custom `LoginPacket` implementation into `PacketPool` which overrides [this code](https://github.com/pmmp/BedrockProtocol/blob/47532c95ea37d5f0365b23f734d70d943ff95295/src/LoginPacket.php#L54) to patch it.
### For more information
* Email us at [[email protected]](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pocketmine/bedrock-protocol'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.0.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pmmp/BedrockProtocol/security/advisories/GHSA-5jfw-35xp-5m42'}, {'type': 'WEB', 'url': 'https://github.com/pmmp/BedrockProtocol/commit/e3fce7632b94e83fd6a518a87dcaf6a11681c4ac'}, {'type': 'PACKAGE', 'url': 'https://github.com/pmmp/BedrockProtocol'}]
|
{'cwe_ids': ['CWE-124'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-05T17:53:22Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-gx7g-wjxg-jwwj
|
2022-04-18T22:17:42Z
|
2022-04-04T00:00:55Z
| null |
['CVE-2022-0088']
|
Cross-Site Request Forgery in YOURLS
|
YOURLS versions 1.8.2 and prior are vulnerable to Cross-Site Request Forgery.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'yourls/yourls'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.8.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0088'}, {'type': 'WEB', 'url': 'https://github.com/YOURLS/YOURLS/issues/3170'}, {'type': 'WEB', 'url': 'https://github.com/YOURLS/YOURLS/pull/3264'}, {'type': 'WEB', 'url': 'https://github.com/yourls/yourls/commit/1de256d8694b0ec7d4df2ac1d5976d4055e09d59'}, {'type': 'PACKAGE', 'url': 'https://github.com/yourls/yourls'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d01f0726-1a0f-4575-ae17-4b5319b11c29'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-04-05T18:02:00Z', 'nvd_published_at': '2022-04-03T09:15:00Z'}
|
1.4.0
|
GHSA-6rw3-3whw-jvjj
|
2022-04-22T20:13:21Z
|
2022-04-22T20:13:21Z
| null |
['CVE-2022-24826']
|
Git LFS can execute a binary from the current directory on Windows
|
### Impact
On Windows, if Git LFS operates on a malicious repository with a `..exe` file as well as a file named `git.exe`, and `git.exe` is not found in `PATH`, the `..exe` program will be executed, permitting the attacker to execute arbitrary code. This does not affect Unix systems.
Similarly, if the malicious repository contains files named `..exe` and `cygpath.exe`, and `cygpath.exe` is not found in `PATH`, the `..exe` program will be executed when certain Git LFS commands are run.
More generally, if the current working directory contains any file with a base name of `.` and a file extension from `PATHEXT` (except `.bat` and `.cmd`), and also contains another file with the same base name as a program Git LFS intends to execute (such as `git`, `cygpath`, or `uname`) and any file extension from `PATHEXT` (including `.bat` and `.cmd`), then, on Windows, when Git LFS attempts to execute the intended program the `..exe`, `..com`, etc., file will be executed instead, but only if the intended program is not found in any directory listed in `PATH`.
The vulnerability occurs because when Git LFS detects that the program it intends to run does not exist in any directory listed in `PATH` then Git LFS passes an empty string as the executable file path to the Go `os/exec` package, which contains a bug such that, on Windows, it prepends the name of the current working directory (i.e., `.`) to the empty string without adding a path separator, and as a result searches in that directory for a file with the base name `.` combined with any file extension from `PATHEXT`, executing the first one it finds.
(The reason `..bat` and `..cmd` files are not executed in the same manner is that, although the Go `os/exec` package tries to execute them just as it does a `..exe` file, the Microsoft Win32 API `CreateProcess()` family of functions have an undocumented feature in that they apparently recognize when a caller is attempting to execute a batch script file and instead run the `cmd.exe` command interpreter, passing the full set of command line arguments as parameters. These are unchanged from the command line arguments set by Git LFS, and as such, the intended program's name is the first, resulting in a command line like `cmd.exe /c git`, which then fails.)
Git LFS has resolved this vulnerability by always reporting an error when a program is not found in any directory listed in `PATH` rather than passing an empty string to the Go `os/exec` package in this case.
The bug in the Go `os/exec` package has been reported to the Go project and is expected to be patched after this security advisory is published.
### Patches
The problem was introduced in v2.12.1 and is patched in v3.1.3 and v3.1.4. Users of affected versions should upgrade to v3.1.4.
### Workarounds
There are no known workarounds at this time.
### References
* https://github.com/git-lfs/git-lfs/security/advisories/GHSA-6rw3-3whw-jvjj
* https://nvd.nist.gov/vuln/detail/CVE-2022-24826
* https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24826
* https://github.com/git-lfs/git-lfs/releases/tag/v3.1.4
* [git-lfs/git-lfs@762ccd4a49](https://github.com/git-lfs/git-lfs/commit/762ccd4a498f5c17723b91d56b9304434ada5540)
### For more information
If you have any questions or comments about this advisory:
* For general questions, start a discussion in the Git LFS [discussion forum](https://github.com/git-lfs/git-lfs/discussions).
* For reports of additional vulnerabilities, please follow the Git LFS [security reporting policy](https://github.com/git-lfs/git-lfs/blob/main/SECURITY.md).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/git-lfs/git-lfs/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/git-lfs/git-lfs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.12.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/git-lfs/git-lfs/security/advisories/GHSA-6rw3-3whw-jvjj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24826'}, {'type': 'PACKAGE', 'url': 'https://github.com/git-lfs/git-lfs'}]
|
{'cwe_ids': ['CWE-426'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:13:21Z', 'nvd_published_at': '2022-04-20T00:16:00Z'}
|
1.4.0
|
GHSA-f3jq-9c79-j65m
|
2022-12-02T21:23:16Z
|
2022-04-13T00:00:17Z
| null |
['CVE-2022-29042']
|
Stored Cross-site Scripting vulnerability in Jenkins Job Generator Plugin
|
Jenkins Job Generator Plugin 1.22 and earlier does not escape the name and description of Generator Parameter and Generator Choice parameters on Job Generator jobs' Build With Parameters views, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Exploitation of this vulnerability requires that parameters are listed on another page, like the \"Build With Parameters\" and \"Parameters\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \"Build With Parameters\" and \"Parameters\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:jobgenerator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.22'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29042'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jobgenerator-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T21:23:16Z', 'nvd_published_at': '2022-04-12T20:15:00Z'}
|
1.4.0
|
GHSA-cjw5-f2x5-r4q5
|
2022-04-19T14:12:53Z
|
2022-04-06T00:01:29Z
| null |
['CVE-2022-0602']
|
Cross-site Scripting in TastyIgniter
|
TastyIgniter prior to version 3.3.0 is vulnerable to Document Object Model (DOM) based Cross-site Scripting (XSS).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'tastyigniter/tastyigniter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0602'}, {'type': 'WEB', 'url': 'https://github.com/tastyigniter/tastyigniter/commit/992d4ce6444805c3132e3635a01b6fd222063554'}, {'type': 'PACKAGE', 'url': 'https://github.com/tastyigniter/TastyIgniter'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/615f1788-d474-4580-b0ef-5edd50274010'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T15:51:17Z', 'nvd_published_at': '2022-04-05T16:15:00Z'}
|
1.4.0
|
GHSA-q77q-vx4q-xx6q
|
2022-05-10T15:44:45Z
|
2022-04-27T21:09:46Z
| null |
['CVE-2022-24891']
|
Cross-site Scripting in org.owasp.esapi:esapi
|
### Impact
There is a potential for an XSS vulnerability in ESAPI caused by a incorrect regular expression for "onsiteURL" in the **antisamy-esapi.xml** configuration file that can cause URLs with the "javascript:" scheme to NOT be sanitized. See the reference below for full details.
### Patches
Patched in ESAPI 2.3.0.0 and later. See important remediation details in the reference given below.
### Workarounds
Manually edit your **antisamy-esapi.xml** configuration files to change the "onsiteURL" regular expression as per remediation instructions in the reference below.
### References
[Security Bulletin 8](https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/ESAPI-security-bulletin8.pdf)
### For more information
If you have any questions or comments about this advisory:
* Email one of the project co-leaders. See email addresses listed on the [OWASP ESAPI wiki](https://owasp.org/www-project-enterprise-security-api/) page, under "Leaders".
* Send email to one of the two ESAPI related Google Groups listed under [Where to Find More Information on ESAPI](https://github.com/ESAPI/esapi-java-legacy#where-to-find-more-information-on-esapi) on our [README.md](https://github.com/ESAPI/esapi-java-legacy#readme) page.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.owasp.esapi:esapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.3.1'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/ESAPI/esapi-java-legacy/security/advisories/GHSA-q77q-vx4q-xx6q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24891'}, {'type': 'PACKAGE', 'url': 'https://github.com/ESAPI/esapi-java-legacy'}, {'type': 'WEB', 'url': 'https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/ESAPI-security-bulletin8.pdf'}, {'type': 'WEB', 'url': 'https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/esapi4java-core-2.3.0.0-release-notes.txt'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230127-0014/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-27T21:09:46Z', 'nvd_published_at': '2022-04-27T21:15:00Z'}
|
1.4.0
|
GHSA-455j-8hg5-8576
|
2022-12-02T21:28:46Z
|
2022-04-13T00:00:19Z
| null |
['CVE-2022-29039']
|
Stored Cross-site Scripting vulnerability in Jenkins Gerrit Trigger Plugin
|
Jenkins Gerrit Trigger Plugin 2.35.2 and earlier does not escape the name and description of parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Exploitation of these vulnerabilities requires that parameters are listed on another page, like the \"Build With Parameters\" and \"Parameters\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \"Build With Parameters\" and \"Parameters\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.sonyericsson.hudson.plugins.gerrit:gerrit-trigger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.35.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29039'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/gerrit-trigger-plugin/commit/8b1d59645725e6f01057c1cf87170e321f99f6be'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/gerrit-trigger-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T21:28:46Z', 'nvd_published_at': '2022-04-12T20:15:00Z'}
|
1.4.0
|
GHSA-vhxq-9mpv-gj87
|
2022-12-01T23:42:49Z
|
2022-04-13T00:00:15Z
| null |
['CVE-2022-29052']
|
Private key stored in plain text by Jenkins Google Compute Engine Plugin
|
Jenkins Google Compute Engine Plugin 4.3.8 and earlier stores private keys unencrypted in cloud agent `config.xml` files on the Jenkins controller where they can be viewed by users with Agent/Extended Read permission, or access to the Jenkins controller file system.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:google-compute-engine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.9'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29052'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/google-compute-engine-plugin/commit/16d2ae71a1b34c81db1d74f83c41577536e5256f'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2045'}]
|
{'cwe_ids': ['CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-01T23:42:49Z', 'nvd_published_at': '2022-04-12T20:15:00Z'}
|
1.4.0
|
GHSA-3hjg-vc7r-rcrw
|
2022-04-07T15:20:23Z
|
2022-04-07T15:20:23Z
| null |
['CVE-2022-24822']
|
Denial of Service vulnerability in @podium/layout and @podium/proxy
|
### Impact
An attacker using the `Trailer` header as part of the request against proxy endpoints has the ability to take down the server.
All Podium layouts that include podlets with proxy endpoints are affected.
### Patches
`@podium/layout` which is the main way developers/users are vulnerable to this exploit, has been patched in version `4.6.110`. All earlier versions are vulnerable.
`@podium/proxy` which is the source of the vulnerability and is used by `@podium/layout` has been patched in version `4.2.74`. All earlier versions are vulnerable.
### Workarounds
It is not easily possible to work around this issue without upgrading. We recommend upgrading `@podium/layout` and/or `@podium/proxy` as soon as possible.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [podium-lib/issues](https://github.com/podium-lib/issues)
### Credits
The vulnerability was reported by [krynos](https://hackerone.com/krynos) from [Ercoli Consulting](https://www.ercoliconsulting.eu/) via FINN.no's private bug bounty program
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@podium/layout'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.110'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@podium/proxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.74'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/podium-lib/proxy/security/advisories/GHSA-3hjg-vc7r-rcrw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24822'}, {'type': 'WEB', 'url': 'https://github.com/podium-lib/layout/commit/fe43e655432b0a5f07b6475f67babcc2588fb039'}, {'type': 'WEB', 'url': 'https://github.com/podium-lib/proxy/commit/9698a40df081217ce142d4de71f929baaa339cdf'}, {'type': 'WEB', 'url': 'https://github.com/podium-lib/layout/releases/tag/v4.6.110'}, {'type': 'WEB', 'url': 'https://github.com/podium-lib/proxy/releases/tag/v4.2.74'}]
|
{'cwe_ids': ['CWE-248'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T15:20:23Z', 'nvd_published_at': '2022-04-06T18:15:00Z'}
|
1.4.0
|
GHSA-82rm-28q9-435p
|
2023-09-18T22:38:47Z
|
2022-04-29T01:25:43Z
| null |
['CVE-2003-0038']
|
Mailman Cross-site scripting (XSS) vulnerability
|
Cross-site scripting (XSS) vulnerability in options.py for Mailman 2.1 allows remote attackers to inject script or HTML into web pages via the (1) email or (2) language parameters.
|
[]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'mailman'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2003-0038'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/11152'}, {'type': 'WEB', 'url': 'http://marc.info/?l=bugtraq&m=104342745916111'}, {'type': 'WEB', 'url': 'http://telia.dl.sourceforge.net/sourceforge/mailman/xss-2.1.0-patch.txt'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2004/dsa-436'}, {'type': 'WEB', 'url': 'http://www.osvdb.org/9205'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/6677'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id?1005987'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T22:38:47Z', 'nvd_published_at': '2003-02-07T05:00:00Z'}
|
1.4.0
|
GHSA-x445-mmpw-7r4f
|
2023-09-18T22:36:52Z
|
2022-04-30T18:16:22Z
| null |
['CVE-2001-0590']
|
Apache Tomcat Allows Source Disclosure
|
Apache Software Foundation Tomcat Servlet prior to 3.2.2 allows a remote attacker to read the source code to arbitrary 'jsp' files via a malformed URL request which does not end with an HTTP protocol specification (i.e. HTTP/1.0).
|
[]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat-servlet-api'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2001-0590'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/6971'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20020711002734/http://archives.neohapsis.com/archives/bugtraq/2001-04/0031.html'}]
|
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T22:36:52Z', 'nvd_published_at': '2001-08-02T04:00:00Z'}
|
1.4.0
|
GHSA-rvjg-gxwx-j5gf
|
2022-04-28T17:13:58Z
|
2022-04-28T17:13:58Z
| null |
['CVE-2020-10734']
|
OIDC Logout redirect in keycloak
|
A flaw was found in keycloak. The OIDC logout endpoint does not have CSRF protection. The highest threat from this vulnerability is to system availability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-oidc-client-adapter-pom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '18.0.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/security/advisories/GHSA-rvjg-gxwx-j5gf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10734'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1831662'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}, {'type': 'WEB', 'url': 'https://issues.redhat.com/browse/KEYCLOAK-13653'}]
|
{'cwe_ids': ['CWE-601'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T17:13:58Z', 'nvd_published_at': '2021-02-11T18:15:00Z'}
|
1.4.0
|
GHSA-4mrx-6fxm-8jpg
|
2022-04-20T20:31:44Z
|
2022-04-20T20:31:44Z
| null |
['CVE-2022-24788']
|
Buffer Overflow in vyper
|
### Impact
Importing a function from a JSON interface which returns `bytes` generates bytecode which does not clamp bytes length, potentially resulting in a buffer overrun.
### Patches
0.3.2 (as of https://github.com/vyperlang/vyper/commit/049dbdc647b2ce838fae7c188e6bb09cf16e470b)
### Workarounds
Use .vy interfaces.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'vyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/security/advisories/GHSA-4mrx-6fxm-8jpg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24788'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/commit/049dbdc647b2ce838fae7c188e6bb09cf16e470b'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/vyper/PYSEC-2022-197.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/vyperlang/vyper'}]
|
{'cwe_ids': ['CWE-119', 'CWE-120'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-20T20:31:44Z', 'nvd_published_at': '2022-04-13T19:15:00Z'}
|
1.4.0
|
GHSA-4qqf-hmv6-r6wh
|
2022-07-13T17:29:15Z
|
2022-04-22T00:24:28Z
| null |
['CVE-2011-2487']
|
Use of a Broken or Risky Cryptographic Algorithm in Apache WSS4J
|
The implementations of PKCS#1 v1.5 key transport mechanism for XMLEncryption in JBossWS and Apache WSS4J before 1.6.5 is susceptible to a Bleichenbacher attack.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ws.security:wss4j'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.5'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-2487'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0191'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0192'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0193'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0194'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0195'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0196'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0197'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0198'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0221'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0533'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0953'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2011-2487'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=713539'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/81737'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210122063156/http://www.securityfocus.com/bid/57549'}, {'type': 'WEB', 'url': 'https://www.nds.ruhr-uni-bochum.de/research/publications/breaking-xml-encryption-pkcs15/'}, {'type': 'WEB', 'url': 'http://cxf.apache.org/note-on-cve-2011-2487.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0191.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0192.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0193.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0194.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0195.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0196.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0198.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0221.html'}]
|
{'cwe_ids': ['CWE-327'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T17:29:15Z', 'nvd_published_at': '2020-03-11T16:15:00Z'}
|
1.4.0
|
GHSA-92j7-34x9-f3jw
|
2023-09-18T23:29:49Z
|
2022-04-29T03:01:51Z
| null |
['CVE-2004-2650']
|
Apache James Denial of Service
|
Spooler in Apache Foundation James before 2.2.0 allows local users to cause a denial of service (memory consumption) by triggering various error conditions in the retrieve function, which prevents a lock from being released and causes a memory leak.
|
[]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.james:james-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2004-2650'}, {'type': 'WEB', 'url': 'http://issues.apache.org/jira/browse/JAMES-268'}, {'type': 'WEB', 'url': 'http://james.apache.org/changelog.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/15765'}]
|
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T23:29:49Z', 'nvd_published_at': '2004-12-31T05:00:00Z'}
|
1.4.0
|
GHSA-fwr7-v2mv-hh25
|
2023-01-23T18:54:18Z
|
2022-04-07T00:00:17Z
| null |
['CVE-2021-43138']
|
Prototype Pollution in async
|
A vulnerability exists in Async through 3.2.1 for 3.x and through 2.6.3 for 2.x (fixed in 3.2.2 and 2.6.4), which could let a malicious user obtain privileges via the `mapValues()` method.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'async'}, 'ecosystem_specific': {'affected_functions': ['async.mapValues']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'async'}, 'ecosystem_specific': {'affected_functions': ['async.mapValues']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.6.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43138'}, {'type': 'WEB', 'url': 'https://github.com/caolan/async/pull/1828'}, {'type': 'WEB', 'url': 'https://github.com/caolan/async/commit/8f7f90342a6571ba1c197d747ebed30c368096d2'}, {'type': 'WEB', 'url': 'https://github.com/caolan/async/commit/e1ecdbf79264f9ab488c7799f4c76996d5dca66d'}, {'type': 'PACKAGE', 'url': 'https://github.com/caolan/async'}, {'type': 'WEB', 'url': 'https://github.com/caolan/async/blob/master/lib/internal/iterator.js'}, {'type': 'WEB', 'url': 'https://github.com/caolan/async/blob/master/lib/mapValuesLimit.js'}, {'type': 'WEB', 'url': 'https://github.com/caolan/async/blob/v2.6.4/CHANGELOG.md#v264'}, {'type': 'WEB', 'url': 'https://github.com/caolan/async/compare/v2.6.3...v2.6.4'}, {'type': 'WEB', 'url': 'https://jsfiddle.net/oz5twjd9/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/MTEUUTNIEBHGKUKKLNUZSV7IEP6IP3Q3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/UM6XJ73Q3NAM5KSGCOKJ2ZIA6GUWUJLK/'}]
|
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T22:13:35Z', 'nvd_published_at': '2022-04-06T17:15:00Z'}
|
1.4.0
|
GHSA-hj4h-vqpq-95wg
|
2023-09-18T22:51:49Z
|
2022-04-29T02:57:41Z
| null |
['CVE-2004-0412']
|
Mailman Sensitive Information Disclosure
|
Mailman before 2.1.5 allows remote attackers to obtain user passwords via a crafted email request to the Mailman server.
|
[]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'mailman'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.5'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2004-0412'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=123559'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/16256'}, {'type': 'PACKAGE', 'url': 'https://gitlab.com/mailman/'}, {'type': 'WEB', 'url': 'http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000842'}, {'type': 'WEB', 'url': 'http://mail.python.org/pipermail/mailman-announce/2004-May/000072.html'}, {'type': 'WEB', 'url': 'http://marc.info/?l=bugtraq&m=109034869927955&w=2'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/11701'}, {'type': 'WEB', 'url': 'http://security.gentoo.org/glsa/glsa-200406-04.xml'}, {'type': 'WEB', 'url': 'http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:051'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/10412'}]
|
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T22:51:49Z', 'nvd_published_at': '2004-08-18T04:00:00Z'}
|
1.4.0
|
GHSA-qjmq-8hjr-qcv6
|
2022-04-18T22:20:12Z
|
2022-04-07T15:18:05Z
| null |
['CVE-2022-24815']
|
SQL Injection when creating an application with Reactive SQL backend
|
### Impact
SQL Injection vulnerability in entities for applications generated with the option "reactive with Spring WebFlux" enabled and an SQL database using r2dbc. Applications created without "reactive with Spring WebFlux" and applications with NoSQL databases are not affected.
If you have generated a microservice Gateway using the affected version, you might be impacted as Gateways are reactive by default.
Currently, SQL injection is possible in the `findAllBy(Pageable pageable, Criteria criteria)` method of an entity repository class generated in these applications as the where clause using Criteria for queries are not sanitized and user input is passed on as it is by the criteria.
## Impacted applications
- Monolith and microservice applications with SQL database and reactive with Spring WebFlux combination (other combinations are not affected and the issue is only present when you generate entities)
- Gateway applications with SQL database (issue will appear only when generating entities)
### Patches
Patched in v7.8.1
The `findAllBy(Pageable pageable, Criteria criteria)` method has been removed from the entity repositories and `org.springframework.data.relational.core.query.Criteria` support in the underlying methods has been replaced with `org.springframework.data.relational.core.sql.Condition`. This means you won't be able to do custom filtering in the generated applications.
If you have existing reactive applications generated by the impacted version, we advise you to audit for use of `Criteria` and take appropriate actions.
### Workarounds
The problem lies in the `EntityManager.java` class when creating the where clause via `Conditions.just(criteria.toString())`.
`just` accepts the literal string provided. Criteria's `toString` method returns a plain string and this combination is vulnerable to sql injection as the string is not sanitized and will contain whatever used passed as input using any plain SQL
So be careful when combining criterias and conditions. As a workaround we have removed the possibility to pass any user-provided criteria to the `createSelect` method of `EntityManager`.
### Example
```java
Criteria criteria = Criteria.where("name").is("foobar';DROP TABLE example;--"); // parameter is user provided input
criteria.toString(); // --> "'foobar';DROP TABLE example;--'"
```
### References
[More details in this Issue report](https://github.com/jhipster/generator-jhipster/issues/18269)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [JHipster issue tracker](https://github.com/jhipster/generator-jhipster/issues)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'generator-jhipster'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.8.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/jhipster/generator-jhipster/security/advisories/GHSA-qjmq-8hjr-qcv6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24815'}, {'type': 'WEB', 'url': 'https://github.com/jhipster/generator-jhipster/issues/18269'}, {'type': 'WEB', 'url': 'https://github.com/jhipster/generator-jhipster/commit/c220a210fd7742c53eea72bd5fadbb96220faa98'}, {'type': 'PACKAGE', 'url': 'https://github.com/jhipster/generator-jhipster'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T15:18:05Z', 'nvd_published_at': '2022-04-11T20:15:00Z'}
|
1.4.0
|
GHSA-6wj9-77wq-jq7p
|
2023-03-06T23:31:46Z
|
2022-04-23T00:40:45Z
| null |
['CVE-2012-6685']
|
Nokogiri is vulnerable to XML External Entity (XXE) attack
|
Nokogiri before 1.5.4 is vulnerable to XXE attacks.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-6685'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/issues/693'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1178970'}, {'type': 'PACKAGE', 'url': 'https://github.com/sparklemotion/nokogiri'}, {'type': 'WEB', 'url': 'https://nokogiri.org/CHANGELOG.html#154-2012-06-12'}]
|
{'cwe_ids': ['CWE-776'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-12T16:55:39Z', 'nvd_published_at': '2020-02-19T15:15:00Z'}
|
1.4.0
|
GHSA-6xj3-fhrf-rjgc
|
2022-04-28T21:11:45Z
|
2022-04-28T00:00:34Z
| null |
['CVE-2022-1504']
|
Cross-site Scripting in microweber
|
XSS in /demo/module/?module=HERE in GitHub repository microweber/microweber prior to 1.2.15. Typical impact of XSS attacks.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.15'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1504'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/1f6a4de416a85e626dc643bb5ceb916e4802223e'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b8e5c324-3dfe-46b4-8095-1697c6b0a6d6'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T21:11:45Z', 'nvd_published_at': '2022-04-27T11:15:00Z'}
|
1.4.0
|
GHSA-358r-g2xw-7c83
|
2023-08-29T19:58:59Z
|
2022-04-23T00:40:10Z
| null |
['CVE-2012-1156']
|
Moodle backs up private files
|
Moodle before 2.2.2, 2.1.5, and 2.0.8 had users' private files included in course backups unnecessarily.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixed': '2.2.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.1'}}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1'}, {'fixed': '2.1.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.1.4'}}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0'}, {'fixed': '2.0.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.7'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-1156'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/37b6e7a03c77ea99fbe5224a15419e318019c570'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/ac6dc09c261219afa0191e9f2daf030bd071d272'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/f88224624dca76e1a8a2810fd8cc04292611f91c'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2012-1156'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-1156'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=198623'}, {'type': 'WEB', 'url': 'https://security-tracker.debian.org/tracker/CVE-2012-1156'}, {'type': 'WEB', 'url': 'http://docs.moodle.org/dev/Moodle_2.0.8_release_notes'}, {'type': 'WEB', 'url': 'http://docs.moodle.org/dev/Moodle_2.1.5_release_notes'}, {'type': 'WEB', 'url': 'http://docs.moodle.org/dev/Moodle_2.2.2_release_notes'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077635.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078209.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078210.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080712.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2012-May/081047.html'}]
|
{'cwe_ids': ['CWE-532'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T19:58:59Z', 'nvd_published_at': '2019-11-14T16:15:00Z'}
|
1.4.0
|
GHSA-6v73-fgf6-w5j7
|
2022-08-11T21:35:54Z
|
2022-04-03T00:00:59Z
| null |
['CVE-2022-22963']
|
Spring Cloud Function Code Injection with a specially crafted SpEL as a routing expression
|
In Spring Cloud Function versions 3.1.6, 3.2.2 and older unsupported versions, when using routing functionality it is possible for a user to provide a specially crafted SpEL as a routing-expression that may result in remote code execution and access to local resources.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.cloud:spring-cloud-function-context'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.cloud:spring-cloud-function-context'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.7'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22963'}, {'type': 'PACKAGE', 'url': 'https://github.com/spring-cloud/spring-cloud-function'}, {'type': 'WEB', 'url': 'https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0005'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2022-22963'}, {'type': 'WEB', 'url': 'https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-java-spring-scf-rce-DQrHhJxH'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/173430/Spring-Cloud-3.2.2-Remote-Command-Execution.html'}]
|
{'cwe_ids': ['CWE-917', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-05T18:48:10Z', 'nvd_published_at': '2022-04-01T23:15:00Z'}
|
1.4.0
|
GHSA-m7xq-8jp8-rj2c
|
2022-07-18T21:00:59Z
|
2022-04-13T00:00:33Z
| null |
['CVE-2022-29080']
|
Command injection in npm-dependency-versions
|
The npm-dependency-versions package through 0.3.0 for Node.js allows command injection if an attacker is able to call dependencyVersions with a JSON object in which pkgs is a key, and there are shell metacharacters in a value.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'npm-dependency-versions'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29080'}, {'type': 'WEB', 'url': 'https://github.com/barneycarroll/npm-dependency-versions/issues/6'}, {'type': 'PACKAGE', 'url': 'https://github.com/barneycarroll/npm-dependency-versions'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/npm-dependency-versions'}]
|
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-18T21:00:59Z', 'nvd_published_at': '2022-04-12T05:15:00Z'}
|
1.4.0
|
GHSA-gx2c-fvhc-ph4j
|
2022-04-19T15:09:07Z
|
2022-04-08T00:00:21Z
| null |
['CVE-2022-26612']
|
Path traversal in Hadoop
|
In Apache Hadoop, The unTar function uses unTarUsingJava function on Windows and the built-in tar utility on Unix and other OSes. As a result, a TAR entry may create a symlink under the expected extraction directory which points to an external directory. A subsequent TAR entry may extract an arbitrary file into the external directory using the symlink name. This however would be caught by the same targetDirPath check on Unix because of the getCanonicalPath call. However on Windows, getCanonicalPath doesn't resolve symbolic links, which bypasses the check. unpackEntries during TAR extraction follows symbolic links which allows writing outside expected base directory on Windows. This was addressed in Apache Hadoop 3.2.3
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26612'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/hadoop'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/hslo7wzw2449gv1jyjk8g6ttd7935fyz'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220519-0004/'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-08T22:06:47Z', 'nvd_published_at': '2022-04-07T19:15:00Z'}
|
1.4.0
|
GHSA-vx8v-g3p3-88vg
|
2022-04-19T18:01:53Z
|
2022-04-06T00:01:31Z
| null |
['CVE-2022-1235']
|
Weak password hash in LiveHelperChat
|
The secrethash, which the application relies for multiple security measures, can be brute-forced. The hash is quite small, with only 10 characters of only hexadecimal, making 16^10 possilibities ( 1.099.511.627.776 ). The SHA1 of the secret can be obtained via a captcha string and brute-forced offline with an GPU.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.96'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1235'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/6538d6df3d8a60fee254170b08dd76a161f7bfdc'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/92f7b2d4-fa88-4c62-a2ee-721eebe01705'}]
|
{'cwe_ids': ['CWE-916'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T15:40:15Z', 'nvd_published_at': '2022-04-05T07:15:00Z'}
|
1.4.0
|
GHSA-qg4g-6jcq-rw93
|
2023-09-18T22:00:28Z
|
2022-04-30T18:14:15Z
| null |
['CVE-2000-0759']
|
Jakarta Apache Tomcat Reveals Physical Paths
|
Jakarta Tomcat 3.1 under Apache reveals physical path information when a remote attacker requests a URL that does not exist, which generates an error message that includes the physical path.
|
[]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2000-0759'}]
|
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T22:00:28Z', 'nvd_published_at': '2000-10-20T04:00:00Z'}
|
1.4.0
|
GHSA-xhr8-mpwq-2rr2
|
2022-04-01T13:39:45Z
|
2022-04-01T13:39:45Z
| null |
[]
|
Automatic named constructor discovery in Valinor
|
## Design issue - automatic constructor discovery
The issue arises when upgrading from `cuyz/valinor:0.3.0` to a newer system on an existing application, which broke due to the wrong constructor being picked.
Still, a bigger security concern is problematic, and it is akin to https://github.com/rails/rails/issues/5228.
## Example exploit
Take following DTO example:
```php
final class UserDTO
{
public function __construct(
public int $id,
public string $name
) {}
public static function fromDb(
PDO $connection,
int $id
): self { /* ... code to fetch the DTO here ... */ }
}
```
There is nothing inherently unsafe about the above `UserDTO`, but when mixed with `cuyz/valinor:^0.5.0` ( specifically https://github.com/CuyZ/Valinor/commit/718d3c1bc2ea7d28b4b1f6c062addcd1dde8660b ), it is an explosive mix:
```php
// this could be coming from user input:
$maliciousPayload = [
'connection' => [
'dsn' => 'mysql:host=some-host;database=some-database',
'username' => 'root',
'password' => 'root',
'options' => [
// PDO::MYSQL_ATTR_INIT_COMMAND === 1002
1002 => 'DROP DATABASE all-the-moneys'
]
],
'id' => 123,
];
$treeMapper->map(
UserDTO::class,
$maliciousPayload
); // your DB is gone :D
```
The above payload is represented in PHP form, but may as well be input JSON, HTML or x-form-urlencoded.
## Mitigation
Version 0.7.0 contains a patch for this issue.
Automatic named constructor resolution should be disabled - only explicitly mapped named constructors should be used/discovered.
|
[]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'cuyz/valinor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.5.0'}, {'fixed': '0.7.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/CuyZ/Valinor/security/advisories/GHSA-xhr8-mpwq-2rr2'}, {'type': 'WEB', 'url': 'https://github.com/CuyZ/Valinor/commit/718d3c1bc2ea7d28b4b1f6c062addcd1dde8660b'}, {'type': 'PACKAGE', 'url': 'https://github.com/CuyZ/Valinor'}, {'type': 'WEB', 'url': 'https://github.com/CuyZ/Valinor/releases/tag/0.7.0'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T13:39:45Z', 'nvd_published_at': None}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.