schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-wq8g-hm94-5rqq
2022-11-22T19:02:55Z
2022-04-23T00:40:48Z
null
['CVE-2012-1094']
JBoss AS may expose root content if excluded-contexts list is mismatched
JBoss AS 7 prior to 7.1.1 and mod_cluster do not handle default hostname in the same way, which can cause the excluded-contexts list to be mismatched and the root context to be exposed.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jboss.as:jboss-as-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0.Alpha1'}, {'fixed': '7.1.1.Final'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-1094'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2012-1094'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-1094'}]
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:02:55Z', 'nvd_published_at': '2020-03-10T17:15:00Z'}
1.4.0
GHSA-frxg-hf44-q765
2022-04-22T20:39:47Z
2022-04-22T20:39:47Z
null
['CVE-2022-24849']
Exposure of Sensitive Information to an Unauthorized Actor in DisCatSharp
### Impact Users of versions 9.8.5, 9.8.6, 9.9.0 and previously published prereleases of 10.0.0 who have used either one of the two `RequireDisCatSharpDeveloperAttribute`s or the `BaseDiscordClient.LibraryDeveloperTeam` have potentially had their bot token sent to a web server not affiliated with Discord. This server is owned and operated by DisCatSharp's development team. The tokens were not logged, yet it is still advisable to reset the tokens of potentially affected bots. ### Patches 9.9.1 has been released to patch the issue for the current stable release and the current 10.0.0 prereleases are also no longer affected. ### Workarounds Remove all uses of the two `RequireDisCatSharpDeveloperAttribute`s and all direct calls to `BaseDiscordClient.LibraryDeveloperTeam`. ### Details The `HttpClient` responsible for sending requests to the Discord API was erroneously reused to send requests to our website when DisCatSharp's team members were to be fetched. ### For more information If you have any questions or comments about this advisory: * Join our [Discord server](https://discord.gg/GGYSywkxwN) * Email us at [[email protected]](mailto:[email protected])
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'DisCatSharp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.8.5'}, {'fixed': '9.9.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Aiko-IT-Systems/DisCatSharp/security/advisories/GHSA-frxg-hf44-q765'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24849'}, {'type': 'PACKAGE', 'url': 'https://github.com/Aiko-IT-Systems/DisCatSharp'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:39:47Z', 'nvd_published_at': '2022-04-14T22:15:00Z'}
1.4.0
GHSA-mcq2-w56r-5w2w
2022-04-08T22:09:23Z
2022-04-08T22:09:23Z
null
[]
Daemon panics when processing certain blocks
### Impact go-ipfs nodes with versions 0.10.0, 0.11.0, 0.12.0, or 0.12.1 can crash when trying to traverse certain malformed graphs due to an issue in the go-codec-dagpb dependency. Vulnerable nodes that work with these malformed graphs may crash leading to denial-of-service risks. This particularly impacts nodes that download or export data that is controlled by external user input as there is the possibility that a malicious user of those services could (intentionally or unintentionally) cause the node to traverse a malformed graph. Some notable use cases include public gateways and pinning services which fetch data on behalf of users, as well as applications such as IPFS Companion which load data based on a user visiting a website with links to IPFS URLs. ### Patches Versions v0.11.1 and v0.12.2 both resolve this issue. This should make it easy to upgrade, even if you have not yet performed the v0.12.0 migration. For those running on forked versions of go-ipfs or who are on v0.10.0 and are having trouble with the v0.11.0 breaking changes, simply updating the version of `go-codec-dagpb` you are using to >=v1.3.2 should resolve the issue. Any users of libraries within the go-ipfs ecosystem, even if not the go-ipfs package or binary itself, may be affected and should upgrade their dependency on go-codec-dagpb. You can check if your Go module has a dependency on `go-codec-dagpb` by running a command such as `go mod graph | grep go-codec-dagpb` in your module root. ### Workarounds The best way to workaround this issue is to control exposure to any endpoints that allow for arbitrary IPLD traversals. This primarily includes the HTTP RPC API (https://docs.ipfs.io/reference/http/api ) and the Gateway API. If you are exposing those APIs, then do so within an environment where only trusted users and applications you control have access to it. You should be safe as long as your users and applications do not create malformed graphs, which should not happen using standard `go-ipfs` tooling. If you previously had a more open access environment, then closing off access will only be sufficient if both of the following are true: * The experimental GraphSync feature is disabled (https://github.com/ipfs/go-ipfs/blob/master/docs/experimental-features.md#graphsync) * The only data being accessed is non-malformed data ### References See also the [go-codec-dagpb security advisory](https://github.com/ipld/go-codec-dagpb/security/advisories/GHSA-g3vv-g2j5-45f2). ### For more information If you have any questions or comments about this advisory: * Ask in [IPFS Discord #ipfs-chatter](https://discord.gg/ipfs) * Open an issue in [go-ipfs](https://github.com/ipld/go-ipfs)
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ipld/go-ipfs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.12.0'}, {'fixed': '0.12.2'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/ipld/go-ipfs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ipfs/go-ipfs/security/advisories/GHSA-mcq2-w56r-5w2w'}, {'type': 'PACKAGE', 'url': 'github.com/ipld/go-ipfs'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-08T22:09:23Z', 'nvd_published_at': None}
1.4.0
GHSA-jv64-2m3x-6v4q
2022-07-26T21:29:36Z
2022-04-30T00:00:36Z
null
['CVE-2021-41948']
Subrion CMS Cross-site Scripting (XSS) vulnerability in the `contact us` plugin
A cross-site scripting (XSS) vulnerability exists in the `contact us` plugin for Subrion CMS <= 4.2.1 version via `List of subjects`. This can be exploited by someone with administrative privileges when they log in to the admin panel.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'intelliants/subrion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41948'}, {'type': 'WEB', 'url': 'https://github.com/intelliants/subrion-plugin-contact_us/issues/8'}, {'type': 'PACKAGE', 'url': 'https://github.com/intelliants/subrion-plugin-contact_us/'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-04T18:10:42Z', 'nvd_published_at': '2022-04-29T14:15:00Z'}
1.4.0
GHSA-6q9g-3vfq-q2qj
2022-05-24T22:20:25Z
2022-04-30T00:00:36Z
null
['CVE-2022-0985']
Improper Authentication in moodle
Insufficient capability checks could allow users with the moodle/site:uploadusers capability to delete users, without having the necessary moodle/user:delete capability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11.0'}, {'fixed': '3.11.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10.0'}, {'fixed': '3.10.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.9'}, {'fixed': '3.9.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0985'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/addd4f894d8173ec8ff0ae2212d51a1977e7bcad'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2064117'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}]
{'cwe_ids': ['CWE-287', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:20:25Z', 'nvd_published_at': '2022-04-29T16:15:00Z'}
1.4.0
GHSA-fcr6-6cph-vmcm
2022-04-29T04:21:07Z
2022-04-13T00:00:17Z
null
['CVE-2022-29040']
Stored XSS vulnerability in Jenkins Git Parameter Plugin
Jenkins Git Parameter Plugin 0.9.15 and earlier does not escape the name and description of Git parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:git-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.16'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29040'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/git-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-29T04:21:07Z', 'nvd_published_at': '2022-04-12T20:15:00Z'}
1.4.0
GHSA-3v5x-qjrp-q2hq
2022-04-22T21:02:44Z
2022-04-13T00:00:24Z
null
['CVE-2022-27260']
Unrestricted Upload of File with Dangerous Type in ButterCMS
An arbitrary file upload vulnerability in the file upload component of ButterCMS v1.2.8 allows attackers to execute arbitrary code via a crafted SVG file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'buttercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27260'}, {'type': 'PACKAGE', 'url': 'https://github.com/ButterCMS/buttercms-js'}, {'type': 'WEB', 'url': 'https://www.youtube.com/watch?v=Tw8OhtVd-mE'}]
{'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T21:02:44Z', 'nvd_published_at': '2022-04-12T17:15:00Z'}
1.4.0
GHSA-cqxx-66wh-8pjw
2022-04-13T01:15:56Z
2022-04-01T13:59:17Z
null
['CVE-2022-24798']
Improper Removal of Sensitive Information Before Storage or Transfer in irrd
IRRd did not always filter password hashes in query responses relating to `mntner` objects and database exports. This may have allowed adversaries to retrieve some of these hashes, perform a brute-force search for the clear-text passphrase, and use these to make unauthorised changes to affected IRR objects. This issue only affected instances that process password hashes, which means it is limited to IRRd instances that serve authoritative databases. IRRd instances operating solely as mirrors of other IRR databases are not affected. The issue occurred: * For `mntner` objects where all password hash names (`MD5-PW` and `CRYPT-PW`) were in lower or mixed case in the `auth` attribute. For these objects, hashes remained in the output of all queries of any method and all database exports made with the `export_destination` setting. Fortunately, objects in the common public IRR database virtually all use uppercase hash names which means very few of those objects were affected. * For any GraphQL queries that queried the `auth` field on `mntner` objects. * For any GraphQL queries that queried the `objectText` field on the `journal` field on `mntner` objects, if the `nrtm_access_list` setting permitted journal access. The two GraphQL cases are visible in logs, allowing users to determine whether any existing objects had their hashes exposed. This has been fixed in IRRd 4.2.3 and the main branch. Versions in the 4.1.x series never were affected. Users of the 4.2.x series are strongly recommended to upgrade. All users running a more recent version from the main branch should update to the latest version. Alternatively, but not recommended, apply the patch manually [for 4.2.x]
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'irrd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/irrdnet/irrd/security/advisories/GHSA-cqxx-66wh-8pjw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24798'}, {'type': 'WEB', 'url': 'https://github.com/irrdnet/irrd/commit/0e41bae8d3d27316381a2fc7b466597230e35ec6'}, {'type': 'WEB', 'url': 'https://github.com/irrdnet/irrd/commit/fdffaf8dd71713f06e99dff417e6aa1e6fa84b70'}, {'type': 'PACKAGE', 'url': 'https://github.com/irrdnet/irrd'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/irrd/PYSEC-2022-178.yaml'}, {'type': 'WEB', 'url': 'https://irrd.readthedocs.io/en/stable/releases/4.2.3/'}]
{'cwe_ids': ['CWE-212'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T13:59:17Z', 'nvd_published_at': '2022-03-31T23:15:00Z'}
1.4.0
GHSA-vp37-2f9p-3vr3
2022-05-04T03:59:45Z
2022-04-23T00:03:04Z
null
['CVE-2022-29577']
Cross-site Scripting in OWASP AntiSamy
AntiSamy is a library for performing fast, configurable cleansing of HTML coming from untrusted sources. OWASP AntiSamy before 1.6.7 allows XSS via HTML tag smuggling on STYLE content with crafted input. The output serializer does not properly encode the supposed Cascading Style Sheets (CSS) content. NOTE: this issue exists because of an incomplete fix for CVE-2022-28367.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.owasp.antisamy:antisamy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29577'}, {'type': 'WEB', 'url': 'https://github.com/nahsra/antisamy/commit/32e273507da0e964b58c50fd8a4c94c9d9363af0'}, {'type': 'PACKAGE', 'url': 'https://github.com/nahsra/antisamy'}, {'type': 'WEB', 'url': 'https://github.com/nahsra/antisamy/releases/tag/v1.6.7'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-26T17:47:34Z', 'nvd_published_at': '2022-04-21T23:15:00Z'}
1.4.0
GHSA-c5hf-mc85-2hx4
2022-05-24T22:05:22Z
2022-04-30T00:00:35Z
null
['CVE-2022-0984']
Missing authorization in Moodle
Users with the capability to configure badge criteria (teachers and managers by default) were able to configure course badges with profile field criteria, which should only be available for site badges.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11.0'}, {'fixed': '3.11.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10.0'}, {'fixed': '3.10.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0984'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/cdc78a16a5da95a17fb10bf1c66689237f5a3f7d'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2064118'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2064125'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}]
{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:05:22Z', 'nvd_published_at': '2022-04-29T17:15:00Z'}
1.4.0
GHSA-9qrh-qjmc-5w2p
2022-05-03T02:24:25Z
2022-04-28T20:25:23Z
null
['CVE-2022-21227']
Denial-of-Service when binding invalid parameters in sqlite3
Affected versions of sqlite3 will experience a fatal error when supplying a specific object in the parameter array. This error causes the application to crash and could not be caught. Users of `sqlite3` v5.0.0, v5.0.1 and v5.0.2 are affected by this. This issue is fixed in v5.0.3. All users are recommended to upgrade to v5.0.3 or later. Ensure there is sufficient sanitization in the parent application to protect against invalid values being supplied to binding parameters as a workaround.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'sqlite3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/TryGhost/node-sqlite3/security/advisories/GHSA-9qrh-qjmc-5w2p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21227'}, {'type': 'WEB', 'url': 'https://github.com/TryGhost/node-sqlite3/issues/1440'}, {'type': 'WEB', 'url': 'https://github.com/TryGhost/node-sqlite3/issues/1449'}, {'type': 'WEB', 'url': 'https://github.com/TryGhost/node-sqlite3/commit/593c9d498be2510d286349134537e3bf89401c4a'}, {'type': 'PACKAGE', 'url': 'https://github.com/TryGhost/node-sqlite3'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-SQLITE3-2388645'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2805470'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SQLITE3-2388645'}]
{'cwe_ids': ['CWE-248'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T20:25:23Z', 'nvd_published_at': '2022-05-01T16:15:00Z'}
1.4.0
GHSA-qpmc-wprv-x746
2022-04-12T21:31:26Z
2022-04-12T21:31:26Z
null
['CVE-2019-15160']
Inline DTD allows XML bomb attack
The SweetXml (aka sweet_xml) package through 0.6.6 for Erlang and Elixir allows attackers to cause a denial of service (resource consumption) via an XML entity expansion attack with an inline DTD.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Hex', 'name': 'sweet_xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15160'}, {'type': 'WEB', 'url': 'https://github.com/kbrw/sweet_xml/issues/71'}, {'type': 'PACKAGE', 'url': 'https://github.com/kbrw/sweet_xml'}, {'type': 'WEB', 'url': 'https://hex.pm/packages/sweet_xml'}]
{'cwe_ids': ['CWE-611', 'CWE-776'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-12T21:31:26Z', 'nvd_published_at': None}
1.4.0
GHSA-xw7v-qrhc-jjg2
2022-04-18T22:21:50Z
2022-04-01T00:00:41Z
null
['CVE-2021-37517']
Access Control vulnerability in Dolibarr
An Access Control vulnerability exists in Dolibarr ERP/CRM 13.0.2, fixed version is 14.0.1, in the forgot-password function becuase the application allows email addresses as usernames, which can cause a Denial of Service.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '14.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37517'}, {'type': 'WEB', 'url': 'https://github.com/Dolibarr/dolibarr/commit/b57eb8284e830e30eefb26e3c5ede076ea24037c'}, {'type': 'PACKAGE', 'url': 'https://github.com/Dolibarr/dolibarr'}, {'type': 'WEB', 'url': 'https://github.com/Dolibarr/dolibarr/releases/tag/14.0.1'}]
{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T19:38:58Z', 'nvd_published_at': '2022-03-31T19:15:00Z'}
1.4.0
GHSA-27rq-4943-qcwp
2022-06-02T17:38:26Z
2022-04-28T00:00:35Z
null
['CVE-2022-29810']
Insertion of Sensitive Information into Log File in Hashicorp go-getter
The Hashicorp go-getter library before 1.5.11 could write SSH credentials into its logfile, exposing sensitive credentials to local users able to read the logfile.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/go-getter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29810'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/go-getter/pull/348'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/go-getter/commit/36b68b2f68a3ed10ee7ecbb0cb9f6b1dc5da49cc'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/go-getter'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/go-getter/releases/tag/v1.5.11'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0438'}]
{'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-03T20:19:26Z', 'nvd_published_at': '2022-04-27T06:15:00Z'}
1.4.0
GHSA-86r3-4gq8-xw8q
2022-08-22T16:34:29Z
2022-04-09T00:00:25Z
2022-08-22T16:34:29Z
['CVE-2021-43503']
Remote Code Execution in Laravel
## Withdrawn This advisory has been withdrawn because it is not a security issue and the CVE has been revoked. ## Original Description A Remote Code Execution (RCE) vulnerability exists in h laravel 5.8.38 via an unserialize pop chain in (1) __destruct in \Routing\PendingResourceRegistration.php, (2) __cal in Queue\Capsule\Manager.php, and (3) __invoke in mockery\library\Mockery\ClosureWrapper.php.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'laravel/laravel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.8.38'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43503'}, {'type': 'WEB', 'url': 'https://github.com/1nhann/vulns/issues/1#issuecomment-1213126338'}, {'type': 'WEB', 'url': 'https://github.com/guoyanan1g/Laravel-vul/issues/2#issue-1045655892'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-12T20:32:12Z', 'nvd_published_at': '2022-04-08T18:15:00Z'}
1.4.0
GHSA-4gr9-99j3-vqxv
2023-09-18T21:59:42Z
2022-04-30T18:15:08Z
null
['CVE-2000-1210']
Apache Tomcat Directory Traversal
Directory traversal vulnerability in source.jsp of Apache Tomcat before 3.1 allows remote attackers to read arbitrary files via a `..` (dot dot) in the argument to source.jsp.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2000-1210'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20020818015647/http://www.iss.net/security_center/static/4205.php'}, {'type': 'WEB', 'url': 'http://marc.info/?l=bugtraq&m=95371672300045&w=2'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T21:59:42Z', 'nvd_published_at': '2002-03-22T05:00:00Z'}
1.4.0
GHSA-xg75-q3q5-cqmv
2022-04-22T20:55:52Z
2022-04-22T20:55:52Z
null
['CVE-2022-24863']
Denial of Service in http-swagger
### Impact Allows an attacker to perform a DOS attack consisting of memory exhaustion on the host system. ### Patches Yes. Please upgrade to v1.2.6. ### Workarounds A workaround is to restrict the path prefix to the "GET" method. As shown below ``` func main() { r := mux.NewRouter() r.PathPrefix("/swagger/").Handler(httpSwagger.Handler( httpSwagger.URL("http://localhost:1323/swagger/doc.json"), //The url pointing to API definition httpSwagger.DeepLinking(true), httpSwagger.DocExpansion("none"), httpSwagger.DomID("#swagger-ui"), )).Methods(http.MethodGet) ``` ### References Reporter dongguangli from https://www.huoxian.cn/ company ### For more information If you have any questions or comments about this advisory: * Open an issue in [http-swagger](https://github.com/swaggo/http-swagger/issues)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/swaggo/http-swagger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/swaggo/http-swagger/security/advisories/GHSA-xg75-q3q5-cqmv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24863'}, {'type': 'WEB', 'url': 'https://github.com/swaggo/http-swagger/pull/62'}, {'type': 'WEB', 'url': 'https://github.com/swaggo/http-swagger/commit/b7d83e8fba85a7a51aa7e45e8244b4173f15049e'}, {'type': 'PACKAGE', 'url': 'https://github.com/swaggo/http-swagger'}, {'type': 'WEB', 'url': 'https://github.com/swaggo/http-swagger/releases/tag/v1.2.6'}]
{'cwe_ids': ['CWE-400', 'CWE-755'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:55:52Z', 'nvd_published_at': '2022-04-18T19:15:00Z'}
1.4.0
GHSA-h6xx-pmxh-3wgp
2023-08-30T11:13:45Z
2022-04-12T22:41:32Z
null
['CVE-2018-16886']
go.etcd.io/etcd Authentication Bypass
etcd versions 3.2.x before 3.2.26 and 3.3.x before 3.3.11 are vulnerable to an improper authentication issue when role-based access control (RBAC) is used and client-cert-auth is enabled. If an etcd client server TLS certificate contains a Common Name (CN) which matches a valid RBAC username, a remote attacker may authenticate as that user with any valid (trusted) client certificate in a REST API request to the gRPC-gateway.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'go.etcd.io/etcd/v3'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.26'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'go.etcd.io/etcd/v3'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.0'}, {'fixed': '3.3.11'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'go.etcd.io/etcd'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0-alpha.5.0.20190108173120-83c051b701d3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16886'}, {'type': 'WEB', 'url': 'https://github.com/etcd-io/etcd/pull/10366'}, {'type': 'WEB', 'url': 'https://github.com/etcd-io/etcd/commit/0191509637546621d6f2e18e074e955ab8ef374d'}, {'type': 'WEB', 'url': 'https://github.com/etcd-io/etcd/commit/bf9d0d8291dc71ecbfb2690612954e1a298154b2'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0237'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1352'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16886'}, {'type': 'PACKAGE', 'url': 'https://github.com/etcd-io/etcd'}, {'type': 'WEB', 'url': 'https://github.com/etcd-io/etcd/blob/1eee465a43720d713bb69f7b7f5e120135fdb1ac/CHANGELOG-3.2.md#security-authentication'}, {'type': 'WEB', 'url': 'https://github.com/etcd-io/etcd/blob/1eee465a43720d713bb69f7b7f5e120135fdb1ac/CHANGELOG-3.3.md#security-authentication'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/JX7QTIT465BQGRGNCE74RATRQLKT2QE4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/UPGYHMSKDPW5GAMI7BEP3XQRVRLLBJKS/'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0077'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106540'}]
{'cwe_ids': ['CWE-285', 'CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T21:49:34Z', 'nvd_published_at': None}
1.4.0
GHSA-6w39-qhmq-g8cp
2022-05-04T20:56:35Z
2022-04-13T00:00:16Z
null
['CVE-2022-29050']
CSRF vulnerability in Jenkins Publish Over FTP Plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins Publish Over FTP Plugin 1.16 and earlier allows attackers to connect to an FTP server using attacker-specified credentials.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:publish-over-ftp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.17'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29050'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/publish-over-ftp-plugin/commit/b265201428557ab91304e06199ad38221efc23e7'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/publish-over-ftp-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2321'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-04T20:56:35Z', 'nvd_published_at': '2022-04-12T20:15:00Z'}
1.4.0
GHSA-vx9g-377x-xwxq
2022-06-01T22:20:04Z
2022-04-26T00:00:41Z
null
['CVE-2022-27311']
Server side request forgery in gibbon
Gibbon v3.4.3 and below allows attackers to execute a Server-Side Request Forgery (SSRF) via a crafted URL. This issue has been resolved in version 3.4.4
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'gibbon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27311'}, {'type': 'WEB', 'url': 'https://github.com/amro/gibbon/pull/321'}, {'type': 'WEB', 'url': 'https://github.com/amro/gibbon/pull/321#issuecomment-1113147155'}, {'type': 'WEB', 'url': 'https://github.com/amro/gibbon/commit/b2eb99ed304d7491a6d348a5bbdc83a008fc6e0b'}, {'type': 'WEB', 'url': 'https://github.com/amro/gibbon/commit/cade20ca2438cd1b182dad70cbb77fb895779d10'}, {'type': 'PACKAGE', 'url': 'https://github.com/amro/gibbon'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/gibbon/CVE-2022-27311.yml'}]
{'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-27T18:48:09Z', 'nvd_published_at': '2022-04-25T13:15:00Z'}
1.4.0
GHSA-689x-x68p-fph3
2022-04-08T22:08:10Z
2022-04-01T00:00:41Z
null
['CVE-2022-0350']
Cross-site Scripting in vditor
Cross-site Scripting (XSS) - Stored in GitHub repository vanessa219/vditor prior to 3.8.13.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'vditor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0350'}, {'type': 'WEB', 'url': 'https://github.com/vanessa219/vditor/commit/e912e36ea98251d700499b1ac7702708d3398476'}, {'type': 'PACKAGE', 'url': 'https://github.com/vanessa219/vditor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8202aa06-4b49-45ff-aa0f-00982f62005c'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-08T22:08:10Z', 'nvd_published_at': '2022-03-31T16:15:00Z'}
1.4.0
GHSA-qf9q-q4hh-qph3
2022-04-29T21:07:16Z
2022-04-22T00:00:36Z
null
['CVE-2022-29498']
SQL injection in blazer
Blazer before 2.6.0 allows SQL Injection. In certain circumstances, an attacker could get a user to run a query they would not have normally run.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'blazer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29498'}, {'type': 'WEB', 'url': 'https://github.com/ankane/blazer/issues/391'}, {'type': 'WEB', 'url': 'https://github.com/ankane/blazer/issues/392'}, {'type': 'WEB', 'url': 'https://github.com/ankane/blazer/commit/f49fbfed7b9e406a69eb78c463c3aa5d35006d8d"'}, {'type': 'PACKAGE', 'url': 'https://github.com/ankane/blazer'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/blazer/CVE-2022-29498.yml'}]
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-29T21:07:16Z', 'nvd_published_at': '2022-04-21T05:15:00Z'}
1.4.0
GHSA-g27j-74fp-xfpr
2023-01-10T00:37:19Z
2022-04-05T18:31:22Z
null
['CVE-2022-26969']
Insecure default value for CORS configuration
### Impact The default value for the `CORS_ENABLED` and `CORS_ORIGIN` configuration was set to be very permissive by default. This could lead to unauthorized access in uncontrolled environments when the configuration hasn't been changed. ### Patches The default values for CORS have been changed in https://github.com/directus/directus/pull/12022 which is released under 9.7.0 ### Workarounds Configure the CORS environment variables to match your project's usage, rather than leaving them at the (permissive) defaults. ### For more information If you have any questions or comments about this advisory: * Open an issue in [directus/directus](https://github.com/directus/directus) * Email us at [[email protected]](mailto:[email protected])
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'directus'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.7.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/directus/directus/security/advisories/GHSA-g27j-74fp-xfpr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26969'}, {'type': 'WEB', 'url': 'https://github.com/directus/directus/pull/12022'}, {'type': 'WEB', 'url': 'https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS'}, {'type': 'PACKAGE', 'url': 'https://github.com/directus/directus'}, {'type': 'WEB', 'url': 'https://github.com/directus/directus/blob/8daed9c41baeaf1d08c1e292bf9f0dcef65e48fb/docs/configuration/config-options.md'}, {'type': 'WEB', 'url': 'https://github.com/directus/directus/releases/tag/v9.7.0'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-DIRECTUS-2441822'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-05T18:31:22Z', 'nvd_published_at': '2022-12-26T06:15:00Z'}
1.4.0
GHSA-x752-qjv4-c4hc
2022-04-15T16:49:27Z
2022-04-04T00:00:55Z
null
['CVE-2022-28368']
Remote code injection in dompdf/dompdf
Dompdf is an HTML to PDF converter. Dompdf before 1.2.1 allows remote code execution via a .php file in the src:url field of an @font-face Cascading Style Sheets (CSS) statement (within an HTML input file).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'dompdf/dompdf'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28368'}, {'type': 'WEB', 'url': 'https://github.com/dompdf/dompdf/issues/2598'}, {'type': 'WEB', 'url': 'https://github.com/dompdf/dompdf/pull/2808'}, {'type': 'WEB', 'url': 'https://github.com/dompdf/dompdf/commit/4c70e1025bcd9b7694b95dd552499bd83cd6141d'}, {'type': 'PACKAGE', 'url': 'https://github.com/dompdf/dompdf'}, {'type': 'WEB', 'url': 'https://github.com/snyk-labs/php-goof'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/dompdf/dompdf#v1.2.1'}, {'type': 'WEB', 'url': 'https://snyk.io/blog/security-alert-php-pdf-library-dompdf-rce/'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/171738/Dompdf-1.2.1-Remote-Code-Execution.html'}]
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-05T18:00:16Z', 'nvd_published_at': '2022-04-03T03:15:00Z'}
1.4.0
GHSA-8xpj-9j9g-fc9r
2022-04-18T22:19:44Z
2022-04-08T22:43:17Z
null
['CVE-2022-24827']
SQL Injection in elide-datastore-aggregation
### Impact When leveraging the following together: - Elide Aggregation Data Store for Analytic Queries - Parameterized Columns (A column that requires a client provided parameter) - A parameterized column of type TEXT There is the potential for a hacker to provide a carefully crafted query that would bypass server side authorization filters through SQL injection. A recent patch to Elide 6.1.2 allowed the '-' character to be included in parameterized TEXT columns. This character can be interpreted as SQL comments ('--') and allow the attacker to remove the WHERE clause from the generated query and bypass authorization filters. ### Patches A [fix](https://github.com/yahoo/elide/pull/2581) is provided in [Elide 6.1.4](https://github.com/yahoo/elide/releases/tag/6.1.4). ### Workarounds The vulnerability only exists for parameterized columns of type TEXT and only for analytic queries (CRUD is not impacted). Workarounds include leveraging a different type of parameterized column (TIME, MONEY, etc) or not leveraging parameterized columns. ### For more information If you have any questions or comments about this advisory: * Open an issue in [elide](https://github.com/yahoo/elide) * Contact us in [Discord](https://discord.com/invite/3vh8ac57cc)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.yahoo.elide:elide-datastore-aggregation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.3'}, {'fixed': '6.1.4'}]}], 'versions': ['6.1.3']}]
[{'type': 'WEB', 'url': 'https://github.com/yahoo/elide/security/advisories/GHSA-8xpj-9j9g-fc9r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24827'}, {'type': 'WEB', 'url': 'https://github.com/yahoo/elide/pull/2581'}, {'type': 'PACKAGE', 'url': 'https://github.com/yahoo/elide'}, {'type': 'WEB', 'url': 'https://github.com/yahoo/elide/releases/tag/6.1.4'}]
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-08T22:43:17Z', 'nvd_published_at': '2022-04-11T21:15:00Z'}
1.4.0
GHSA-cvx5-m8vg-vxgc
2022-04-28T21:16:40Z
2022-04-28T21:16:40Z
null
['CVE-2022-24897']
Arbitrary filesystem write access from velocity.
### Impact The velocity scripts is not properly sandboxed against using the Java File API to perform read or write operations on the filesystem. Now writing an attacking script in velocity requires the Script rights in XWiki so not all users can use it, and it also requires finding an XWiki API which returns a File. ### Patches The problem has been patched on versions 12.6.7, 12.10.3 and 13.0RC1. ### Workarounds There's no easy workaround for fixing this vulnerability other than upgrading and being careful when giving Script rights. ### References https://jira.xwiki.org/browse/XWIKI-5168 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki](https://jira.xwiki.org) * Email us at [XWiki Security mailing-list](mailto:[email protected])
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.commons:xwiki-commons-velocity'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '12.6.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.commons:xwiki-commons-velocity'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.7.0'}, {'fixed': '12.10.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-cvx5-m8vg-vxgc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24897'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-commons/pull/127'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-commons/commit/215951cfb0f808d0bf5b1097c9e7d1e503449ab8'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-commons'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-5168'}]
{'cwe_ids': ['CWE-22', 'CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T21:16:40Z', 'nvd_published_at': '2022-05-02T22:15:00Z'}
1.4.0
GHSA-j33m-2537-86jm
2023-08-29T20:04:11Z
2022-04-23T00:40:51Z
null
['CVE-2012-20001']
PrestaShop XSS Vulnerability
PrestaShop before 1.5.2.0 allows XSS via the `<object data='data:text/html` substring in the message field.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-20001'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2012/Nov/1'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20140803034142/http://forge.prestashop.com/browse/PSCFV-5204'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160305224628/http://davidsopas.com/labs/prestashop_xss.txt'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T20:04:11Z', 'nvd_published_at': '2021-12-21T16:15:00Z'}
1.4.0
GHSA-w24h-v9qh-8gxj
2023-09-05T19:20:10Z
2022-04-13T00:00:33Z
null
['CVE-2022-28347']
SQL Injection in Django
A SQL injection issue was discovered in `QuerySet.explain()` in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. This occurs by passing a crafted dictionary (with dictionary expansion) as the `**options` argument, and placing the injection payload in an option name.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ecosystem_specific': {'affected_functions': ['django.db.models.QuerySet.explain']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixed': '2.2.28'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ecosystem_specific': {'affected_functions': ['django.db.models.QuerySet.explain']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2'}, {'fixed': '3.2.13'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ecosystem_specific': {'affected_functions': ['django.db.models.QuerySet.explain']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0'}, {'fixed': '4.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28347'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/00b0fc50e1738c7174c495464a5ef069408a4402'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/29a6c98b4c13af82064f993f0acc6e8fafa4d3f5'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/6723a26e59b0b5429a0c5873941e01a2e1bdbb81'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/9e19accb6e0a00ba77d5a95a91675bf18877c72d'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/4.0/releases/security/'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-w24h-v9qh-8gxj'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2022-191.yaml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!forum/django-announce'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5254'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2022/apr/11/security-releases/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/04/11/1'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:32:48Z', 'nvd_published_at': '2022-04-12T05:15:00Z'}
1.4.0
GHSA-w8xh-93qh-35vw
2022-04-22T20:28:59Z
2022-04-13T00:00:22Z
null
['CVE-2022-27952']
Unrestricted Upload of File with Dangerous Type in Payload
An arbitrary file upload vulnerability in the file upload module of PayloadCMS v0.15.0 allows attackers to execute arbitrary code via a crafted SVG file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'payload'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.15.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27952'}, {'type': 'PACKAGE', 'url': 'https://github.com/payloadcms/payload'}, {'type': 'WEB', 'url': 'https://www.youtube.com/watch?v=6CfhAxA3xdQ'}]
{'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:28:59Z', 'nvd_published_at': '2022-04-12T17:15:00Z'}
1.4.0
GHSA-j383-35pm-c5h4
2022-04-26T21:51:41Z
2022-04-13T00:00:16Z
null
['CVE-2022-0436']
Path Traversal in Grunt
Grunt prior to version 1.5.2 is vulnerable to path traversal.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'grunt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0436'}, {'type': 'WEB', 'url': 'https://github.com/gruntjs/grunt/pull/1743'}, {'type': 'WEB', 'url': 'https://github.com/gruntjs/grunt/commit/aad3d4521c3098fb255fb2db8f2e1d691a033665'}, {'type': 'WEB', 'url': 'https://github.com/gruntjs/grunt/commit/b0ec6e12426fc8d5720dee1702f6a67455c5986c'}, {'type': 'PACKAGE', 'url': 'https://github.com/gruntjs/grunt'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/f55315e9-9f6d-4dbb-8c40-bae50c1ae92b'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/04/msg00008.html'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-26T21:51:41Z', 'nvd_published_at': '2022-04-12T21:15:00Z'}
1.4.0
GHSA-v98r-gjgc-m9pf
2022-12-01T23:59:34Z
2022-04-13T00:00:16Z
null
['CVE-2022-29045']
Stored Cross-site Scripting vulnerability in Jenkins Promoted Builds Plugin
Jenkins promoted builds Plugin 873.v6149db_d64130 and earlier, except 3.10.1, does not escape the name and description of Promoted Build parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. Exploitation of these vulnerabilities requires that parameters are listed on another page, like the \"Build With Parameters\" and \"Parameters\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \"Build With Parameters\" and \"Parameters\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:promoted-builds'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.10.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:promoted-builds'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11'}, {'fixed': '876.v99d29788b'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29045'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T21:07:38Z', 'nvd_published_at': '2022-04-12T20:15:00Z'}
1.4.0
GHSA-x446-3xhq-5xfp
2022-04-26T13:03:51Z
2022-04-15T00:00:40Z
null
['CVE-2022-27814']
Exposure of Resource to Wrong Sphere in Simple-Wayland-HotKey-Daemon
SWHKD 1.1.5 allows arbitrary file-existence tests via the -c option.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'Simple-Wayland-HotKey-Daemon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27814'}, {'type': 'PACKAGE', 'url': 'https://github.com/waycrate/swhkd'}, {'type': 'WEB', 'url': 'https://github.com/waycrate/swhkd/releases'}, {'type': 'WEB', 'url': 'https://github.com/waycrate/swhkd/releases/tag/1.2.0'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2022/04/14/1'}]
{'cwe_ids': ['CWE-668'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-04-26T13:03:51Z', 'nvd_published_at': '2022-04-14T17:15:00Z'}
1.4.0
GHSA-wcwp-r3fj-mm3p
2023-09-18T22:27:55Z
2022-04-30T18:12:54Z
null
['CVE-2000-0062']
Zope DTML implementation Improper Authentication
The DTML implementation in the Z Object Publishing Environment (Zope) allows remote attackers to conduct unauthorized activities.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'zope'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'last_affected': '2.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2000-0062'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20010218085743/http://www.securityfocus.com/bid/922'}]
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T22:27:55Z', 'nvd_published_at': '2000-01-04T05:00:00Z'}
1.4.0
GHSA-qffw-8wg7-h665
2022-04-29T17:22:43Z
2022-04-23T00:03:01Z
null
['CVE-2022-1440']
Command injection in git-interface
A command injection vulnerability exists in git-interface in the GitHub repository yarkeev/git-interface prior to 2.1.2. If both the git remote and destination directory are provided by user input, then the use of an `--upload-pack` command-line argument feature of git is also supported for `git clone`, which would then allow for any operating system command to be spawned by the attacker.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'git-interface'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1440'}, {'type': 'WEB', 'url': 'https://github.com/yarkeev/git-interface/commit/f828aa790016fee3aa667f7b44cf94bf0aa8c60d'}, {'type': 'PACKAGE', 'url': 'https://github.com/yarkeev/git-interface'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/cdc25408-d3c1-4a9d-bb45-33b12a715ca1'}]
{'cwe_ids': ['CWE-78', 'CWE-88'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-26T13:06:52Z', 'nvd_published_at': '2022-04-22T18:15:00Z'}
1.4.0
GHSA-pv7p-c7cp-vrh3
2022-12-02T21:17:54Z
2022-04-13T00:00:16Z
null
['CVE-2022-29044']
Stored Cross-site Scripting in Jenkins Node and Label parameter Plugin
Jenkins Node and Label parameter Plugin 1.10.3 and earlier does not escape the name and description of Node and Label parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. Exploitation of this vulnerability requires that parameters are listed on another page, like the \"Build With Parameters\" and \"Parameters\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \"Build With Parameters\" and \"Parameters\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:nodelabelparameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29044'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/nodelabelparameter-plugin/commit/b8a95cbf678e18dd1f936fd38f23b8cb0695ded7'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/nodelabelparameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T21:17:54Z', 'nvd_published_at': '2022-04-12T20:15:00Z'}
1.4.0
GHSA-q6h7-4qgw-2j9p
2022-12-27T00:58:20Z
2022-04-20T00:00:33Z
null
['CVE-2022-29153']
Hashicorp Consul HTTP health check endpoints returning an HTTP redirect may be abused as SSRF vector
A vulnerability was identified in Consul and Consul Enterprise (“Consul”) such that HTTP health check endpoints returning an HTTP redirect may be abused as a vector for server-side request forgery (SSRF). This vulnerability, CVE-2022-29153, was fixed in Consul 1.9.17, 1.10.10, and 1.11.5.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.17'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.10.10'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29153'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2022-10-consul-s-http-health-check-may-allow-server-side-request-forgery/'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2022-10-consul-s-http-health-check-may-allow-server-side-request-forgery/38393'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/consul'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RBODKZL7HQE5XXS3SA2VIDVL4LAA5RWH/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/RBODKZL7HQE5XXS3SA2VIDVL4LAA5RWH/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202208-09'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220602-0005/'}]
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T21:13:56Z', 'nvd_published_at': '2022-04-19T16:17:00Z'}
1.4.0
GHSA-6v6p-g8cg-2hgg
2022-04-01T12:56:28Z
2022-04-01T12:56:28Z
null
[]
Improper Certificate Validation in node-sass affects eZ Platform
Certificate validation in node-sass 2.0.0 to 4.14.1 is disabled when requesting binaries even if the user is not specifying an alternative download path. This affects eZ Platform v2.5 only. The maintainers resolved it by replacing node-sass 4.11 with sass 1.32.13. This issue also affects ezsystems/ezplatform and ezsystems/ezplatform-page-builder.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezplatform-admin-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.27'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezplatform-admin-ui/security/advisories/GHSA-6v6p-g8cg-2hgg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24025'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-002-vulnerability-in-node-sass'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-r8f7-9pfq-mjmv'}, {'type': 'PACKAGE', 'url': 'https://github.com/ezsystems/ezplatform-admin-ui'}, {'type': 'WEB', 'url': 'https://github.com/ezsystems/ezplatform-admin-ui/releases/tag/v1.5.27'}]
{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T12:56:28Z', 'nvd_published_at': None}
1.4.0
GHSA-m87f-39q9-6f55
2022-04-05T17:47:26Z
2022-04-05T17:47:26Z
null
['CVE-2022-24758']
Sensitive Auth & Cookie data stored in Jupyter server logs
Anytime a 5xx error is triggered, the auth cookie and other header values are recorded in Jupyter server logs by default. Considering these logs do not require root access, an attacker can monitor these logs, steal sensitive auth/cookie information, and gain access to the Jupyter server. Upgrade to notebook version 6.4.10 ### For more information If you have any questions or comments about this advisory, or vulnerabilities to report, please email our security list [[email protected]](mailto:[email protected]). Credit: @3coins for reporting. Thank you!
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'notebook'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.10'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/jupyter/notebook/security/advisories/GHSA-m87f-39q9-6f55'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24758'}, {'type': 'PACKAGE', 'url': 'https://github.com/jupyter/notebook'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/notebook/PYSEC-2022-180.yaml'}]
{'cwe_ids': ['CWE-532'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-05T17:47:26Z', 'nvd_published_at': '2022-03-31T23:15:00Z'}
1.4.0
GHSA-5x4f-7xgq-r42x
2022-04-29T15:39:18Z
2022-04-29T15:39:18Z
null
[]
Object state limitation has no effect
Object state limitation is a policy you can use in your roles to limit access to content based on specific object state values. Due to a flawed earlier update, these limitations were ineffective in releases made since February 16th 2022. They would grant access to the given content regardless of the object state. Depending on how your frontent is designed, knowing the URL to the content may or may not be required to access it. If you are using object state limitations in your roles, this issue is critical. Please apply the fix as soon as possible.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezpublish-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.5.0'}, {'fixed': '7.5.28'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezpublish-kernel/security/advisories/GHSA-5x4f-7xgq-r42x'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-004-ineffective-object-state-limitation-and-unauthenticated-fastly-purge'}, {'type': 'PACKAGE', 'url': 'https://github.com/ezsystems/ezpublish-kernel'}]
{'cwe_ids': ['CWE-281'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-29T15:39:18Z', 'nvd_published_at': None}
1.4.0
GHSA-4hj2-r2pm-3hc6
2022-04-28T18:10:23Z
2022-04-22T20:42:46Z
null
['CVE-2022-27652']
Incorrect Default Permissions in CRI-O
### Impact A bug was found in CRI-O where containers were incorrectly started with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during `execve(2)`. Normally, when executable programs have specified permitted file capabilities, otherwise unprivileged users and processes can execute those programs and gain the specified file capabilities up to the bounding set. Due to this bug, containers which included executable programs with inheritable file capabilities allowed otherwise unprivileged users and processes to additionally gain these inheritable file capabilities up to the container's bounding set. Containers which use Linux users and groups to perform privilege separation inside the container are most directly impacted. This bug did not affect the container security sandbox as the inheritable set never contained more capabilities than were included in the container's bounding set. ### Patches This bug will been fixed in the following versions of CRI-O: - v1.24.0 Users should update to the version corresponding to their minor release as soon as possible. Running containers should be stopped, deleted, and recreated for the inheritable capabilities to be reset. This fix changes CRI-O behavior such that containers are started with a more typical Linux environment. Refer to `capabilities(7)` for a description of how capabilities work. Note that permitted file capabilities continue to allow for privileges to be raised up to the container's bounding set and that processes may add capabilities to their own inheritable set up to the container's bounding set per the rules described in the manual page. In all cases the container's bounding set provides an upper bound on the capabilities that can be assumed and provides for the container security sandbox. ### Workarounds The entrypoint of a container can be modified to use a utility like `capsh(1)` to drop inheritable capabilities prior to the primary process starting. ### Credits CRI-O would like to thank [Andrew G. Morgan](https://github.com/AndrewGMorgan) for responsibly disclosing this issue, as well as the Moby (Docker Engine) project for working with the other container engines in coordinating a fix. ### For more information If you have any questions or comments about this advisory: * [Open an issue](https://github.com/cri-o/cri-o/issues/new) * Email us at [[email protected]]([email protected]) if you think you’ve found a security bug ------------------ https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L 4.8/Medium |Metric |Value |Comments | |--- |--- |--- | |Attack Vector (AV) |Local |An attacker requires local control to launch a container with files that have inheritable capabilities. | |Attack Complexity (AC) |Low |Modifying a file to have inheritable capabilities is not difficult. | |Privileges Required (PR) |Low |An attacker requires enough privilege to cause a container to be launched with a compromised image. Moby's API is typically bound to a local Unix domain socket and requires calls to be made from a process that is either UID 0 or present in the configured group. | |User Interaction (UI) |Required |An attacker must cause the compromised image to be run. | |Scope (S) |Unchanged |The container boundary set by Moby, including the bounding capability set, is not modified. A successful attack gains access to privileges and resources within the boundary, not outside of it. | |Confidentiality (C) |Low |An attacker may gain access to some confidential information through elevation of CAP_CHOWN, CAP_DAC_OVERRIDE, CAP_FOWNER, CAP_SETFCAP, or CAP_SETPCAP, but the exposed information is limited to that which is already inside the container. | |Integrity (I) |Low |An attacker may be able to tamper with data inside the container through elevation of CAP_CHOWN, CAP_DAC_OVERRIDE, CAP_FOWNER, CAP_SETFCAP, or CAP_SETPCAP, or spoof packets with CAP_NET_RAW, but the tampered data is limited to that which is already inside the container. | |Availability (A) |Low |An attacker may be able to affect the availability of an application running inside the container through elevation of CAP_KILL or CAP_NET_RAW, or may be able to affect availability through tampering with file dependencies. |
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cri-o/cri-o'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.24.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/cri-o/cri-o/security/advisories/GHSA-4hj2-r2pm-3hc6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27652'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2066839'}, {'type': 'PACKAGE', 'url': 'https://github.com/cri-o/cri-o'}]
{'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:42:46Z', 'nvd_published_at': '2022-04-18T17:15:00Z'}
1.4.0
GHSA-pxpf-v376-7xx5
2022-05-26T19:48:28Z
2022-04-30T00:00:33Z
null
['CVE-2022-25854']
tagify can pass a malicious placeholder to initiate the cross-site scripting (XSS) payload
This affects the package @yaireo/tagify before 4.9.8. The package is used for rendering UI components inside the input or text fields, and an attacker can pass a malicious placeholder value to it to fire the cross-site scripting (XSS) payload.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@yaireo/tagify'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.9.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25854'}, {'type': 'WEB', 'url': 'https://github.com/yairEO/tagify/issues/988'}, {'type': 'WEB', 'url': 'https://github.com/yairEO/tagify/commit/198c0451fad188390390395ccfc84ab371def4c7'}, {'type': 'WEB', 'url': 'https://bsg.tech/blog/cve-2022-25854-stored-xss-in-yaireo-tagify-npm-module/'}, {'type': 'PACKAGE', 'url': 'https://github.com/yairEO/tagify'}, {'type': 'WEB', 'url': 'https://github.com/yairEO/tagify/releases/tag/v4.9.8'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-YAIREOTAGIFY-2404358'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-03T04:55:32Z', 'nvd_published_at': '2022-04-29T20:15:00Z'}
1.4.0
GHSA-74w3-2r77-fw5h
2022-04-18T22:21:17Z
2022-04-03T00:00:58Z
null
['CVE-2022-27177']
Use of Externally-Controlled Format String in consoleme
A Python format string issue leading to information disclosure and potentially remote code execution in ConsoleMe for all versions prior to 1.2.2
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'consoleme'}, 'ecosystem_specific': {'affected_functions': ['consoleme.lib.defaults.SELF_SERVICE_IAM_DEFAULTS', 'consoleme.lib.generic.iterate_and_format_dict']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27177'}, {'type': 'WEB', 'url': 'https://github.com/Netflix/consoleme/commit/2a3c84eee524d77c427b3329a8419cbbce9e1d16'}, {'type': 'PACKAGE', 'url': 'https://github.com/Netflix/ConsoleMe'}, {'type': 'WEB', 'url': 'https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2022-001.md'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/consoleme/PYSEC-2022-189.yaml'}]
{'cwe_ids': ['CWE-134'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-05T17:54:33Z', 'nvd_published_at': '2022-04-01T23:15:00Z'}
1.4.0
GHSA-5pv7-hx9m-8jh3
2022-05-05T15:29:45Z
2022-04-13T00:00:16Z
null
['CVE-2022-29051']
Missing permission checks in Jenkins Publish Over FTP Plugin
Missing permission checks in Jenkins Publish Over FTP Plugin prior to 1.17 allow attackers with Overall/Read permission to connect to an FTP server using attacker-specified credentials.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:publish-over-ftp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.17'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29051'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/publish-over-ftp-plugin/commit/b265201428557ab91304e06199ad38221efc23e7'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/publish-over-ftp-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2321'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-05T15:29:45Z', 'nvd_published_at': '2022-04-12T20:15:00Z'}
1.4.0
GHSA-p2vw-f87c-q597
2023-06-30T20:10:46Z
2022-04-29T00:00:23Z
null
['CVE-2022-1511']
Improper Access Control in snipe/snipe-it
Snipe-IT prior to 5.4.4 is vulnerable to Missing Authorization.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.4.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1511'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/pull/10991'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/2e9cf8fa87a025c0eac9f79f4864b3fdd33a950c'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/4a1723e9-5bc4-4c4b-bceb-1c45964cc71d'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T21:13:53Z', 'nvd_published_at': '2022-04-28T15:15:00Z'}
1.4.0
GHSA-72cx-5ff9-4hhc
2022-04-26T20:29:02Z
2022-04-21T01:54:03Z
null
['CVE-2009-3724']
Cross-site scripting in markdown2 for python
python-markdown2 before 1.0.1.14 has multiple cross-site scripting (XSS) issues.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'markdown2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1.14'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.1.13'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-3724'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-72cx-5ff9-4hhc'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/markdown2/PYSEC-2020-235.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/trentm/python-markdown2'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-PYRAD-40000'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2009/10/29/5'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-26T20:29:02Z', 'nvd_published_at': '2020-01-15T21:15:00Z'}
1.4.0
GHSA-2q6v-32mr-8p8x
2022-04-12T21:20:20Z
2022-04-12T21:20:20Z
null
['CVE-2017-1000052']
Null Byte Injection in Plug.Static
Plug.Static is used for serving static assets, and is vulnerable to null byte injection. If file upload functionality is provided, this can allow users to bypass filetype restrictions. We recommend all applications that provide file upload functionality and serve those uploaded files locally with Plug.Static to upgrade immediately or include the fix below. If uploaded files are rather stored and served from S3 or any other cloud storage, you are not affected.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Hex', 'name': 'plug'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'Hex', 'name': 'plug'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.7'}]}]}, {'package': {'ecosystem': 'Hex', 'name': 'plug'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.3'}]}]}, {'package': {'ecosystem': 'Hex', 'name': 'plug'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000052'}, {'type': 'WEB', 'url': 'https://elixirforum.com/t/security-releases-for-plug/3913'}, {'type': 'PACKAGE', 'url': 'https://github.com/elixir-plug/plug'}]
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-12T21:20:20Z', 'nvd_published_at': None}
1.4.0
GHSA-wh73-hpcg-v32j
2023-08-31T15:47:48Z
2022-04-14T00:00:14Z
null
['CVE-2022-27479']
SQL injection in apache-superset
Apache Superset before 1.4.2 is vulnerable to SQL injection in chart data requests. Users should update to 1.4.2 or higher which addresses this issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27479'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wh73-hpcg-v32j'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/superset'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/apache-superset/PYSEC-2022-188.yaml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/94th50j5d0y2fw7ysx0g7w3t6jk3z7q6'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/ztb9b6jd9rngoxwvq8r4fhpp401o613y'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/04/13/3'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T19:34:57Z', 'nvd_published_at': '2022-04-13T19:15:00Z'}
1.4.0
GHSA-7mfr-774f-w5r9
2022-04-12T00:07:34Z
2022-04-12T00:07:34Z
null
['CVE-2017-11770']
Improper Certificate Validation
.NET Core 1.0, 1.1, and 2.0 allow an unauthenticated attacker to remotely cause a denial of service attack against a .NET Core web application by improperly parsing certificate data. A denial of service vulnerability exists when .NET Core improperly handles parsing certificate data, aka ".NET CORE Denial Of Service Vulnerability".
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'System.Security.Cryptography.X509Certificates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '2.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11770'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3248'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11770'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/101710'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1039787'}]
{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-12T00:07:34Z', 'nvd_published_at': None}
1.4.0
GHSA-6gm7-j668-w6h9
2022-04-22T20:42:11Z
2022-04-09T00:00:30Z
null
['CVE-2022-1219']
SQL Injection in Pimcore
Pimcore prior to version 10.3.5 is vulnerable SQL injection in RecyclebinController.php. This vulnerability affects data confidentiality.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.3.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1219'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/a697830359df06246acca502ee2455614de68017'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/f700bd18-1fd3-4a05-867f-07176aebc7f6'}]
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:42:11Z', 'nvd_published_at': '2022-04-08T09:15:00Z'}
1.4.0
GHSA-9cmq-pj6p-hgwf
2023-09-18T22:28:17Z
2022-04-30T18:14:11Z
null
['CVE-2000-0725']
Zope does not properly restrict access to the getRoles method
Zope before 2.2.1 does not properly restrict access to the getRoles method, which allows users who can edit DTML to add or modify roles by modifying the roles list that is included in a request.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'zope'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2000-0725'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20010219192346/http://archives.neohapsis.com/archives/bugtraq/2000-08/0198.html'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20010219192441/http://archives.neohapsis.com/archives/bugtraq/2000-08/0259.html'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20010228172804/http://www.securityfocus.com/bid/1577'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2000/20000821'}, {'type': 'WEB', 'url': 'http://www.redhat.com/support/errata/RHSA-2000-052.html'}, {'type': 'WEB', 'url': 'http://www.zope.org/Products/Zope/Hotfix_08_09_2000/security_alert'}]
{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T22:28:17Z', 'nvd_published_at': '2000-10-20T04:00:00Z'}
1.4.0
GHSA-4822-jvwx-w47h
2022-11-28T16:18:30Z
2022-04-01T18:16:42Z
null
['CVE-2022-41952']
Uncontrolled Resource Consumption in Matrix Synapse
### Impact Synapse before 1.52.0 with URL preview functionality enabled will attempt to generate URL previews for media stream URLs without properly limiting connection time. Connections will only be terminated after `max_spider_size` (default: 10M) bytes have been downloaded, which can in some cases lead to long-lived connections towards the streaming media server (for instance, Icecast). This can cause excessive traffic and connections toward such servers if their stream URL is, for example, posted to a large room with many Synapse instances with URL preview enabled. ### Patches 1.52.0 implements a timeout mechanism which will terminate URL preview connections after 30 seconds. Since generating URL previews for media streams is not supported and always fails, 1.53.0 additionally implements an allow list for content types for which Synapse will even attempt to generate a URL preview. We recommend upgrading to 1.53.0 to fully resolve the issue. ### Workarounds Turn off URL preview functionality by setting `url_preview_enabled: false` in the Synapse configuration file. ### References - Patch (timeout): https://github.com/matrix-org/synapse/pull/11784 - Patch (content type allow list): https://github.com/matrix-org/synapse/pull/11936 ### For more information If you have any questions or comments about this advisory, e-mail us at [email protected].
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.53.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/security/advisories/GHSA-4822-jvwx-w47h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41952'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/11784'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/11936'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/synapse'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/releases/tag/v1.52.0'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/releases/tag/v1.53.0'}]
{'cwe_ids': ['CWE-400', 'CWE-772'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T18:16:42Z', 'nvd_published_at': '2022-11-22T16:15:00Z'}
1.4.0
GHSA-558x-2xjg-6232
2023-03-28T22:26:10Z
2022-04-03T00:01:00Z
null
['CVE-2022-22950']
Allocation of Resources Without Limits or Throttling in Spring Framework
In Spring Framework versions 5.3.0 - 5.3.16, 5.2.0.RELEASE - 5.2.19.RELEASE, and older unsupported versions, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial of service condition.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-expression'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3.0'}, {'fixed': '5.3.17'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-expression'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.20.RELEASE'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22950'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-framework/issues/28145'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-framework/issues/28257'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-framework/commit/83ac65915871067c39a4fb255e0d484c785c0c11'}, {'type': 'PACKAGE', 'url': 'https://github.com/spring-projects/spring-framework'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-framework/releases/tag/v5.2.20.RELEASE'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-framework/releases/tag/v5.3.17'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2022-22950'}]
{'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-05T18:46:34Z', 'nvd_published_at': '2022-04-01T23:15:00Z'}
1.4.0
GHSA-3qrq-r688-vvh4
2022-04-28T21:02:17Z
2022-04-28T21:02:17Z
null
['CVE-2022-24892']
Multiple valid tokens for password reset in Shopware
### Impact Multiple tokens for password reset could be requested. All tokens could be used to change the password. This makes it possible for an attacker to take over the victims account if s/he gains access to the victims email account and finds unused password reset token in the emails within the time frame of two hours. ### Patches We recommend updating to the current version 5.7.9. You can get the update to 5.7.9 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/changelog-sw5/#5-7-9 For older versions you can use the Security Plugin: https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html ### References https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-04-2022
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/shopware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.4'}, {'fixed': '5.7.9'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/shopware/shopware/security/advisories/GHSA-3qrq-r688-vvh4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24892'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-04-2022'}, {'type': 'PACKAGE', 'url': 'https://github.com/shopware/shopware'}, {'type': 'WEB', 'url': 'https://www.shopware.com/en/changelog-sw5/#5-7-9'}]
{'cwe_ids': ['CWE-640'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T21:02:17Z', 'nvd_published_at': '2022-04-28T15:15:00Z'}
1.4.0
GHSA-w8qp-hmh5-4v9v
2022-04-29T16:22:58Z
2022-04-29T16:22:58Z
null
[]
Object state limitation has no effect
Object state limitation is a policy you can use in your roles to limit access to content based on specific object state values. Due to a flawed earlier update, these limitations were ineffective in releases made since February 16th 2022. They would grant access to the given content regardless of the object state. Depending on how your frontent is designed, knowing the URL to the content may or may not be required to access it. If you are using object state limitations in your roles, this issue is critical. Please apply the fix as soon as possible.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezplatform-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.17'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezplatform-kernel/security/advisories/GHSA-w8qp-hmh5-4v9v'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-004-ineffective-object-state-limitation-and-unauthenticated-fastly-purge'}, {'type': 'PACKAGE', 'url': 'https://github.com/ezsystems/ezplatform-kernel'}]
{'cwe_ids': ['CWE-281'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-29T16:22:58Z', 'nvd_published_at': None}
1.4.0
GHSA-vmp5-c5hp-6c65
2022-05-26T19:48:38Z
2022-04-30T00:00:33Z
null
['CVE-2022-29947']
Woodpecker allows cross-site scripting (XSS) via build logs
Woodpecker before 0.15.1 allows XSS via build logs because web/src/components/repo/build/BuildLog.vue lacks escaping.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/woodpecker-ci/woodpecker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29947'}, {'type': 'WEB', 'url': 'https://github.com/woodpecker-ci/woodpecker/pull/879'}, {'type': 'PACKAGE', 'url': 'https://github.com/woodpecker-ci/woodpecker/'}, {'type': 'WEB', 'url': 'https://github.com/woodpecker-ci/woodpecker/releases/tag/v0.15.1'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-03T20:18:08Z', 'nvd_published_at': '2022-04-29T21:15:00Z'}
1.4.0
GHSA-3pqg-4rqg-pg9g
2022-05-04T04:00:41Z
2022-04-23T00:03:04Z
null
['CVE-2022-28367']
Cross-site Scripting in OWASP AntiSamy
OWASP AntiSamy is a library for performing fast, configurable cleansing of HTML coming from untrusted sources. AntiSamy before 1.6.6 allows XSS via HTML tag smuggling on STYLE content with crafted input. The output serializer does not properly encode the supposed Cascading Style Sheets (CSS) content.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.owasp.antisamy:antisamy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28367'}, {'type': 'WEB', 'url': 'https://github.com/nahsra/antisamy/commit/0199e7e194dba5e7d7197703f43ebe22401e61ae'}, {'type': 'PACKAGE', 'url': 'https://github.com/nahsra/antisamy'}, {'type': 'WEB', 'url': 'https://github.com/nahsra/antisamy/releases/tag/v1.6.6'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-26T19:45:44Z', 'nvd_published_at': '2022-04-21T23:15:00Z'}
1.4.0
GHSA-3r7g-wrpr-j5g4
2022-05-26T20:18:03Z
2022-04-22T20:48:28Z
null
['CVE-2022-24857']
Improper Authentication in django-mfa3
### Impact django-mfa3 is a library that implements multi factor authentication for the django web framework. It achieves this by modifying the regular login view. Django however has a second login view for its admin area. This second login view was not modified, so the multi factor authentication can be bypassed. You are affected if you have activated both django-mfa3 (< 0.5.0) and django.contrib.admin and have not taken any other measures to prevent users from accessing the admin login view. ### Patches The issue has been fixed in django-mfa3 0.5.0. ### Workarounds It is possible to work around the issue by overwriting the admin login route, e.g. by adding the following URL definition *before* the admin routes: url('admin/login/', lambda request: redirect(settings.LOGIN_URL) ### References - [django-mfa3 changelog](https://github.com/xi/django-mfa3/blob/main/CHANGES.md#050-2022-04-15)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django-mfa3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/xi/django-mfa3/security/advisories/GHSA-3r7g-wrpr-j5g4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24857'}, {'type': 'WEB', 'url': 'https://github.com/xi/django-mfa3/commit/32f656e22df120b84bdf010e014bb19bd97971de'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/django-mfa3/PYSEC-2022-192.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/xi/django-mfa3'}, {'type': 'WEB', 'url': 'https://github.com/xi/django-mfa3/blob/main/CHANGES.md#050-2022-04-15'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220609-0003/'}]
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:48:28Z', 'nvd_published_at': '2022-04-15T19:15:00Z'}
1.4.0
GHSA-7vrm-3jc8-5wwm
2022-04-06T17:39:02Z
2022-04-04T21:40:45Z
null
[]
Incorrect Comparison in Vyper
### Impact bytestrings can have dirty bytes in them, resulting in the word-for-word comparison to give incorrect results, e.g. ```vyper b1: Bytes[32] = b"abcdef" b1 = slice(b1, 0, 1) b2: Bytes[32] = b"abcdef" t: bool = b1 == b2 # incorrectly evaluates to True ``` even without dirty nonzero bytes, because there is no comparison of the length, two bytestrings can compare to equal if one ends with `"\x00"`. ```vyper b1: Bytes[32] = b"abc\0" b2: Bytes[32] = b"abc" t: bool = b1 == b2 # incorrectly evaluates to True ``` ### Patches fixed in https://github.com/vyperlang/vyper/commit/2c73f8352635c0a433423a5b94740de1a118e508
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'vyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/security/advisories/GHSA-7vrm-3jc8-5wwm'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/commit/2c73f8352635c0a433423a5b94740de1a118e508'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/vyper/PYSEC-2022-196.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/vyperlang/vyper'}]
{'cwe_ids': ['CWE-697'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-04T21:40:45Z', 'nvd_published_at': None}
1.4.0
GHSA-gvj8-4cj4-h776
2022-04-29T15:40:48Z
2022-04-29T15:40:48Z
null
[]
Object state limitation has no effect
Object state limitation is a policy you can use in your roles to limit access to content based on specific object state values. Due to a flawed earlier update, these limitations were ineffective in releases made since February 16th 2022. They would grant access to the given content regardless of the object state. Depending on how your frontent is designed, knowing the URL to the content may or may not be required to access it. If you are using object state limitations in your roles, this issue is critical. Please apply the fix as soon as possible.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'ibexa/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'ibexa/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ibexa/core/security/advisories/GHSA-gvj8-4cj4-h776'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-004-ineffective-object-state-limitation-and-unauthenticated-fastly-purge'}, {'type': 'PACKAGE', 'url': 'https://github.com/ibexa/core'}]
{'cwe_ids': ['CWE-281'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-29T15:40:48Z', 'nvd_published_at': None}
1.4.0
GHSA-7r87-cj48-wj45
2022-04-26T21:19:52Z
2022-04-26T21:19:52Z
null
['CVE-2022-24880']
Potential Captcha Validate Bypass in flask-session-captcha
### Impact flask-session-captcha is a package which allows users to extend Flask by adding an image based captcha stored in a server side session. The `captcha.validate()` function would return `None` if passed no value (e.g. by submitting a request with an empty form). If implementing users were checking the return value to be **False**, the captcha verification check could be bypassed. Sample vulnerable code: ```python if captcha.validate() == False: ... # abort else: ... # do stuff ``` ### Patches A new version (1.2.1) is available that fixes the issue. ### Workarounds Users can workaround the issue by not explicitly checking that the value is False. Checking the return value less explicitly should still work. ```python if not captcha.validate(): ... # abort else: ... # do stuff ``` ```python if captcha.validate(): ... # do stuff else: ... # abort ``` ### References https://github.com/Tethik/flask-session-captcha/pull/27 ### For more information If you have any questions or comments about this advisory: * Open an issue in [the github repo](https://github.com/Tethik/flask-session-captcha)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'flask-session-captcha'}, 'ecosystem_specific': {'affected_functions': ['flask_session_captcha.FlaskSessionCaptcha.validate']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Tethik/flask-session-captcha/security/advisories/GHSA-7r87-cj48-wj45'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24880'}, {'type': 'WEB', 'url': 'https://github.com/Tethik/flask-session-captcha/pull/27'}, {'type': 'WEB', 'url': 'https://github.com/Tethik/flask-session-captcha/commit/2811ae23a38d33b620fb7a07de8837c6d65c13e4'}, {'type': 'PACKAGE', 'url': 'https://github.com/Tethik/flask-session-captcha'}, {'type': 'WEB', 'url': 'https://github.com/Tethik/flask-session-captcha/releases/tag/v1.2.1'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/flask-session-captcha/PYSEC-2022-193.yaml'}]
{'cwe_ids': ['CWE-253', 'CWE-394', 'CWE-754'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-26T21:19:52Z', 'nvd_published_at': '2022-04-25T22:15:00Z'}
1.4.0
GHSA-97jg-43c9-q6pf
2022-04-19T15:25:47Z
2022-04-08T21:53:38Z
null
['CVE-2022-24819']
Unauthenticated user can retrieve the list of users through uorgsuggest.vm
A guest user without the right to view pages of the wiki can still list documents related to users of the wiki. The problem has been patched in XWiki versions 12.10.11, 13.4.4, and 13.9-rc-1. There is no known workaround for this problem.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.10.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '13.0.0'}, {'fixed': '13.4.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '13.5.0'}, {'fixed': '13.9'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-97jg-43c9-q6pf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24819'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-18850'}]
{'cwe_ids': ['CWE-359'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-08T21:53:38Z', 'nvd_published_at': '2022-04-08T20:15:00Z'}
1.4.0
GHSA-crjr-9rc5-ghw8
2023-07-06T16:02:37Z
2022-04-11T21:18:06Z
null
['CVE-2022-24836']
Nokogiri Inefficient Regular Expression Complexity
## Summary Nokogiri `< v1.13.4` contains an inefficient regular expression that is susceptible to excessive backtracking when attempting to detect encoding in HTML documents. ## Mitigation Upgrade to Nokogiri `>= 1.13.4`. ## Severity The Nokogiri maintainers have evaluated this as [**High Severity** 7.5 (CVSS3.1)](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). ## References [CWE-1333](https://cwe.mitre.org/data/definitions/1333.html) Inefficient Regular Expression Complexity ## Credit This vulnerability was reported by HackerOne user ooooooo_q (ななおく).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-crjr-9rc5-ghw8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24836'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/commit/e444525ef1634b675cd1cf52d39f4320ef0aecfd'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2022-24836.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/sparklemotion/nokogiri'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ?utm_medium=email&utm_source=footer'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/05/msg00013.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/10/msg00018.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/6DHCOWMA5PQTIQIMDENA7R2Y5BDYAIYM/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/OUPLBUZVM4WPFSXBEP2JS3R6LMKRTLFC/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/XMDCWRQXJQ3TFSETPCEFMQ6RR6ME5UA3/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202208-29'}, {'type': 'WEB', 'url': 'https://support.apple.com/kb/HT213532'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2022/Dec/23'}]
{'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-11T21:18:06Z', 'nvd_published_at': '2022-04-11T22:15:00Z'}
1.4.0
GHSA-6xwr-q98w-rvg7
2022-04-22T20:32:05Z
2022-04-13T00:00:30Z
null
['CVE-2022-21803']
Prototype Pollution in nconf
nconf before 0.11.4. When using the memory engine, it is possible to store a nested JSON representation of the configuration. The .set() function, that is responsible for setting the configuration properties, is vulnerable to Prototype Pollution. By providing a crafted property, it is possible to modify the properties on the Object.prototype.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'nconf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21803'}, {'type': 'WEB', 'url': 'https://github.com/indexzero/nconf/pull/397'}, {'type': 'PACKAGE', 'url': 'https://github.com/indexzero/nconf'}, {'type': 'WEB', 'url': 'https://github.com/indexzero/nconf/releases/tag/v0.11.4'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NCONF-2395478'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:31:22Z', 'nvd_published_at': '2022-04-12T16:15:00Z'}
1.4.0
GHSA-34hv-f45p-4qfq
2022-04-19T14:13:44Z
2022-04-06T00:01:29Z
null
['CVE-2022-27463']
Open redirect in wwbn/avideo
Open redirect vulnerability in objects/login.json.php in WWBN AVideo through 11.6, allows attackers to arbitrarily redirect users from a crafted url to the login page. A patch is available on the `master` branch of the repository.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'wwbn/avideo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '11.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27463'}, {'type': 'WEB', 'url': 'https://github.com/WWBN/AVideo/commit/77e9aa6411ff4b97571eb82e587139ec05ff894c'}, {'type': 'WEB', 'url': 'https://avideo.tube/'}, {'type': 'PACKAGE', 'url': 'https://github.com/WWBN/AVideo'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T22:15:39Z', 'nvd_published_at': '2022-04-05T16:15:00Z'}
1.4.0
GHSA-6xvq-2gj8-4276
2022-04-15T03:05:55Z
2022-04-06T00:01:29Z
null
['CVE-2020-28847']
Cross site scripting in valine
valine is a fast, simple & powerful comment system. Cross Site Scripting (XSS) vulnerability in xCss Valine v1.4.14 via the nick parameter to /classes/Comment. A fix was released in version 1.4.15.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'valine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.15'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28847'}, {'type': 'WEB', 'url': 'https://github.com/xCss/Valine/issues/348'}, {'type': 'PACKAGE', 'url': 'https://github.com/xCss/Valine'}, {'type': 'WEB', 'url': 'https://github.com/xCss/Valine/releases/tag/v1.4.15'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T18:16:52Z', 'nvd_published_at': '2022-04-05T16:15:00Z'}
1.4.0
GHSA-9wrv-g75h-8ccc
2022-05-04T03:52:17Z
2022-04-22T21:04:27Z
null
['CVE-2022-24872']
Improper Access Control in Shopware
Shopware 6 is an open commerce platform based on Symfony Framework and Vue and supported by a worldwide community and more than 1.500 community extensions. Permissions set to sales channel context by admin-api are still useable within normal user session. We recommend updating to the current version 6.4.10.1. You can get the update to 6.4.10.1 regularly via the Auto-Updater or directly via the download overview. For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.10.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.4.0'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.10.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.4.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-9wrv-g75h-8ccc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24872'}, {'type': 'WEB', 'url': 'https://github.com/shopware/platform/commit/083765e2d64a00315050c4891800c9e98ba0c77c'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2022'}, {'type': 'PACKAGE', 'url': 'https://github.com/shopware/platform'}]
{'cwe_ids': ['CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T21:04:27Z', 'nvd_published_at': '2022-04-20T20:15:00Z'}
1.4.0
GHSA-5653-437f-5hmc
2022-04-12T21:29:30Z
2022-04-12T21:29:30Z
null
['CVE-2019-16764']
Denial of service
The use of `String.to_atom/1` in PowAssent is susceptible to denial of service attacks. In `PowAssent.Phoenix.AuthorizationController` a value is fetched from the user provided params, and `String.to_atom/1` is used to convert the binary value to an atom so it can be used to fetch the provider configuration value. This is unsafe as it is user provided data, and can be used to fill up the whole atom table of ~1M which will cause the app to crash.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Hex', 'name': 'pow_assent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pow-auth/pow_assent/security/advisories/GHSA-368c-xvrv-x986'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16764'}, {'type': 'WEB', 'url': 'https://github.com/pow-auth/pow_assent/commit/026105eeecc0e3c2f807e7109e745ea93c0fd9cf'}, {'type': 'PACKAGE', 'url': 'https://github.com/pow-auth/pow_assent'}, {'type': 'WEB', 'url': 'https://hex.pm/packages/pow_assent'}, {'type': 'WEB', 'url': 'http://erlang.org/doc/efficiency_guide/commoncaveats.html#list_to_atom-1'}]
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-12T21:29:30Z', 'nvd_published_at': None}
1.4.0
GHSA-mm33-5vfq-3mm3
2022-06-08T18:05:30Z
2022-04-27T22:28:59Z
null
['CVE-2022-22577']
Cross-site Scripting Vulnerability in Action Pack
There is a possible XSS vulnerability in Rails / Action Pack. This vulnerability has been assigned the CVE identifier CVE-2022-22577. Versions Affected: >= 5.2.0 Not affected: < 5.2.0 Fixed Versions: 7.0.2.4, 6.1.5.1, 6.0.4.8, 5.2.7.1 ## Impact CSP headers were only sent along with responses that Rails considered as "HTML" responses. This left API requests without CSP headers, which could possibly expose users to XSS attacks. ## Releases The FIXED releases are available at the normal locations. ## Workarounds Set a CSP for your API responses manually.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.0'}, {'fixed': '5.2.7.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.7.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.4.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.4.7'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.0'}, {'fixed': '6.1.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.1.5.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.2.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.2.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22577'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/pull/44635'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/2b820a2a69fa50cffa74b4aedc57bf92ed6910ec'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/5299b57d596ea274f77f5ffee2b79c6ee0255508'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/8198d7c4accad0b6ba956b9d59528534a289866b'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/d2253115ac2b30f5f7210670af906cebf79cf809'}, {'type': 'WEB', 'url': 'https://discuss.rubyonrails.org/t/cve-2022-22577-possible-xss-vulnerability-in-action-pack/80533'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2022-22577.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/ruby-security-ann/c/NuFRKaN5swI'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/09/msg00002.html'}, {'type': 'WEB', 'url': 'https://rubyonrails.org/2022/4/26/Rails-7-0-2-4-6-1-5-1-6-0-4-8-and-5-2-7-1-have-been-released'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20221118-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5372'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-27T22:28:59Z', 'nvd_published_at': '2022-05-26T17:15:00Z'}
1.4.0
GHSA-cf4q-4cqr-7g7w
2022-04-22T20:25:53Z
2022-04-22T20:25:53Z
null
[]
SVG with embedded scripts can lead to cross-site scripting attacks in xml2rfc
xml2rfc allows `script` elements in SVG sources. In HTML output having these script elements can lead to XSS attacks. Sample XML snippet: ``` <artwork type="svg" src="data:image/svg+xml,%3Csvg viewBox='0 0 10 10' xmlns='http://www.w3.org/2000/svg'%3E%3Cscript%3E window.alert('Test Alert'); %3C/script%3E%3C/svg%3E"> </artwork> ``` ### Impact This vulnerability impacts website that publish HTML drafts and RFCs. ### Patches This has been fixed in version [3.12.4](https://github.com/ietf-tools/xml2rfc/releases/tag/v3.12.4). ### Workarounds If SVG source is self-contained within the XML, scraping `script` elements from SVG files. ### References * https://developer.mozilla.org/en-US/docs/Web/SVG/Element/script ### For more information If you have any questions or comments about this advisory: * Open an issue in [xml2rfc](https://github.com/ietf-tools/xml2rfc/) * Email us at [[email protected]](mailto:[email protected]) * [Infrastructure and Services Vulnerability Disclosure](https://www.ietf.org/about/administration/policies-procedures/vulnerability-disclosure/)
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'xml2rfc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.12.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ietf-tools/xml2rfc/security/advisories/GHSA-cf4q-4cqr-7g7w'}, {'type': 'PACKAGE', 'url': 'https://github.com/ietf-tools/xml2rfc'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:25:53Z', 'nvd_published_at': None}
1.4.0
GHSA-v2wf-c3j6-wpvw
2022-04-12T21:27:49Z
2022-04-12T21:27:49Z
null
['CVE-2020-5205']
Session fixation
### Impact The use of `Plug.Session` in `Pow.Plug.Session` is susceptible to session fixation attacks if a persistent session store is used for `Plug.Session`, such as Redis or a database. Cookie store, which is used in most Phoenix apps, doesn't have this vulnerability. ### Workarounds Call `Plug.Conn.configure_session(conn, renew: true)` periodically and after privilege change. A custom authorization plug can be written where the `create/3` method should return the `conn` only after `Plug.Conn.configure_session/2` have been called on it. ### References https://github.com/danschultzer/pow/commit/578ffd3d8bb8e8a26077b644222186b108da474f https://www.owasp.org/index.php/Session_fixation
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Hex', 'name': 'pow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.16'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/danschultzer/pow/security/advisories/GHSA-v2wf-c3j6-wpvw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5205'}, {'type': 'WEB', 'url': 'https://github.com/danschultzer/pow/commit/578ffd3d8bb8e8a26077b644222186b108da474f'}, {'type': 'PACKAGE', 'url': 'https://github.com/danschultzer/pow'}, {'type': 'WEB', 'url': 'https://github.com/danschultzer/pow/blob/master/CHANGELOG.md#v1016-2020-01-07'}]
{'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-12T21:27:49Z', 'nvd_published_at': None}
1.4.0
GHSA-6635-c626-vj4r
2022-04-18T21:47:33Z
2022-04-01T14:05:33Z
null
['CVE-2022-21235']
Command Injection Vulnerability with Mercurial in VCS
URLs and local file paths passed to the Mercurial (hg) APIs that are specially crafted can contain commands which are executed by Mercurial if it is installed on the host operating system. The `vcs` package uses the underly version control system, in this case `hg`, to implement the needed functionality. When `hg` is executed, argument strings are passed to `hg` in a way that additional flags can be set. The additional flags can be used to perform a command injection. Other version control systems with an implemented interface may also be vulnerable. The issue has been fixed in version 1.13.2. A work around is to sanitize data passed to the `vcs` package APIs to ensure it does not contain commands or unexpected data. This is important for user input data that is passed directly to the package APIs.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/Masterminds/vcs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Masterminds/vcs/security/advisories/GHSA-6635-c626-vj4r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21235'}, {'type': 'WEB', 'url': 'https://github.com/Masterminds/vcs/pull/105'}, {'type': 'WEB', 'url': 'https://github.com/Masterminds/vcs/commit/922a5122330ea8fbe56352a0172ddb6bf019cd22'}, {'type': 'PACKAGE', 'url': 'https://github.com/Masterminds/vcs'}, {'type': 'WEB', 'url': 'https://github.com/Masterminds/vcs/releases/tag/v1.13.2'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMMASTERMINDSVCS-2437078'}]
{'cwe_ids': ['CWE-77', 'CWE-88'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T14:05:33Z', 'nvd_published_at': '2022-04-01T16:15:00Z'}
1.4.0
GHSA-9qgm-w87q-hx89
2022-04-22T21:03:44Z
2022-04-13T00:00:25Z
null
['CVE-2022-27263']
Unrestricted Upload of File with Dangerous Type in Strapi
An arbitrary file upload vulnerability in the file upload module of Strapi v4.1.5 allows attackers to execute arbitrary code via a crafted file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'strapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.1.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27263'}, {'type': 'PACKAGE', 'url': 'https://github.com/strapi/strapi'}, {'type': 'WEB', 'url': 'https://www.youtube.com/watch?v=LEeabouqRrg'}]
{'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T21:03:44Z', 'nvd_published_at': '2022-04-12T17:15:00Z'}
1.4.0
GHSA-vpgw-ffh3-648h
2022-04-22T20:20:55Z
2022-04-12T00:00:38Z
null
['CVE-2022-1295']
Prototype Pollution in fullpage.js
fullPage utils are available to developers using window.fp_utils. They can use these utils for their own use-case (other than fullPage) as well. However, one of the utils deepExtend is vulnerable to Prototype Pollution vulnerability. Javascript is "prototype" language which means when a new "object" is created, it carries the predefined properties and methods of an "object" with itself like toString, constructor etc. By using prototype-pollution vulnerability, an attacker can overwrite/create the property of that "object" type. If the victim developer has used that property anywhere in the code, then it will have severe effect on the application.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'fullpage.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1295'}, {'type': 'WEB', 'url': 'https://github.com/alvarotrigo/fullpage.js/commit/bf62492a22e5d296e63c3ed918a42fc5645a0d48'}, {'type': 'PACKAGE', 'url': 'https://github.com/alvarotrigo/fullpage.js'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3b9d450c-24ac-4037-b04d-4d4dafbf593a'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:20:05Z', 'nvd_published_at': '2022-04-11T12:15:00Z'}
1.4.0
GHSA-5jfw-35xp-5m42
2022-04-05T17:53:22Z
2022-04-05T17:53:22Z
null
[]
Buffer length underflow in LoginPacket causing unchecked exceptions to be thrown
### Impact `LoginPacket` uses `BinaryStream->getLInt()` to read the lengths of JSON payloads it wants to decode. Unfortunately, `BinaryStream->getLInt()` returns a signed integer, meaning that a malicious client can craft a packet with a large uint32 value for payload buffer size (which would be interpreted as a negative signed int32), causing `BinaryStream->get()` to throw an exception. In the context of PocketMine-MP, this leads to a server crash when the vulnerability is exploited. ### Patches e3fce7632b94e83fd6a518a87dcaf6a11681c4ac ### Workarounds This can be worked around by registering a custom `LoginPacket` implementation into `PacketPool` which overrides [this code](https://github.com/pmmp/BedrockProtocol/blob/47532c95ea37d5f0365b23f734d70d943ff95295/src/LoginPacket.php#L54) to patch it. ### For more information * Email us at [[email protected]](mailto:[email protected])
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pocketmine/bedrock-protocol'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.0.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pmmp/BedrockProtocol/security/advisories/GHSA-5jfw-35xp-5m42'}, {'type': 'WEB', 'url': 'https://github.com/pmmp/BedrockProtocol/commit/e3fce7632b94e83fd6a518a87dcaf6a11681c4ac'}, {'type': 'PACKAGE', 'url': 'https://github.com/pmmp/BedrockProtocol'}]
{'cwe_ids': ['CWE-124'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-05T17:53:22Z', 'nvd_published_at': None}
1.4.0
GHSA-gx7g-wjxg-jwwj
2022-04-18T22:17:42Z
2022-04-04T00:00:55Z
null
['CVE-2022-0088']
Cross-Site Request Forgery in YOURLS
YOURLS versions 1.8.2 and prior are vulnerable to Cross-Site Request Forgery.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'yourls/yourls'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.8.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0088'}, {'type': 'WEB', 'url': 'https://github.com/YOURLS/YOURLS/issues/3170'}, {'type': 'WEB', 'url': 'https://github.com/YOURLS/YOURLS/pull/3264'}, {'type': 'WEB', 'url': 'https://github.com/yourls/yourls/commit/1de256d8694b0ec7d4df2ac1d5976d4055e09d59'}, {'type': 'PACKAGE', 'url': 'https://github.com/yourls/yourls'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d01f0726-1a0f-4575-ae17-4b5319b11c29'}]
{'cwe_ids': ['CWE-352'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-04-05T18:02:00Z', 'nvd_published_at': '2022-04-03T09:15:00Z'}
1.4.0
GHSA-6rw3-3whw-jvjj
2022-04-22T20:13:21Z
2022-04-22T20:13:21Z
null
['CVE-2022-24826']
Git LFS can execute a binary from the current directory on Windows
### Impact On Windows, if Git LFS operates on a malicious repository with a `..exe` file as well as a file named `git.exe`, and `git.exe` is not found in `PATH`, the `..exe` program will be executed, permitting the attacker to execute arbitrary code. This does not affect Unix systems. Similarly, if the malicious repository contains files named `..exe` and `cygpath.exe`, and `cygpath.exe` is not found in `PATH`, the `..exe` program will be executed when certain Git LFS commands are run. More generally, if the current working directory contains any file with a base name of `.` and a file extension from `PATHEXT` (except `.bat` and `.cmd`), and also contains another file with the same base name as a program Git LFS intends to execute (such as `git`, `cygpath`, or `uname`) and any file extension from `PATHEXT` (including `.bat` and `.cmd`), then, on Windows, when Git LFS attempts to execute the intended program the `..exe`, `..com`, etc., file will be executed instead, but only if the intended program is not found in any directory listed in `PATH`. The vulnerability occurs because when Git LFS detects that the program it intends to run does not exist in any directory listed in `PATH` then Git LFS passes an empty string as the executable file path to the Go `os/exec` package, which contains a bug such that, on Windows, it prepends the name of the current working directory (i.e., `.`) to the empty string without adding a path separator, and as a result searches in that directory for a file with the base name `.` combined with any file extension from `PATHEXT`, executing the first one it finds. (The reason `..bat` and `..cmd` files are not executed in the same manner is that, although the Go `os/exec` package tries to execute them just as it does a `..exe` file, the Microsoft Win32 API `CreateProcess()` family of functions have an undocumented feature in that they apparently recognize when a caller is attempting to execute a batch script file and instead run the `cmd.exe` command interpreter, passing the full set of command line arguments as parameters. These are unchanged from the command line arguments set by Git LFS, and as such, the intended program's name is the first, resulting in a command line like `cmd.exe /c git`, which then fails.) Git LFS has resolved this vulnerability by always reporting an error when a program is not found in any directory listed in `PATH` rather than passing an empty string to the Go `os/exec` package in this case. The bug in the Go `os/exec` package has been reported to the Go project and is expected to be patched after this security advisory is published. ### Patches The problem was introduced in v2.12.1 and is patched in v3.1.3 and v3.1.4. Users of affected versions should upgrade to v3.1.4. ### Workarounds There are no known workarounds at this time. ### References * https://github.com/git-lfs/git-lfs/security/advisories/GHSA-6rw3-3whw-jvjj * https://nvd.nist.gov/vuln/detail/CVE-2022-24826 * https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24826 * https://github.com/git-lfs/git-lfs/releases/tag/v3.1.4 * [git-lfs/git-lfs@762ccd4a49](https://github.com/git-lfs/git-lfs/commit/762ccd4a498f5c17723b91d56b9304434ada5540) ### For more information If you have any questions or comments about this advisory: * For general questions, start a discussion in the Git LFS [discussion forum](https://github.com/git-lfs/git-lfs/discussions). * For reports of additional vulnerabilities, please follow the Git LFS [security reporting policy](https://github.com/git-lfs/git-lfs/blob/main/SECURITY.md).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/git-lfs/git-lfs/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/git-lfs/git-lfs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.12.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/git-lfs/git-lfs/security/advisories/GHSA-6rw3-3whw-jvjj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24826'}, {'type': 'PACKAGE', 'url': 'https://github.com/git-lfs/git-lfs'}]
{'cwe_ids': ['CWE-426'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:13:21Z', 'nvd_published_at': '2022-04-20T00:16:00Z'}
1.4.0
GHSA-f3jq-9c79-j65m
2022-12-02T21:23:16Z
2022-04-13T00:00:17Z
null
['CVE-2022-29042']
Stored Cross-site Scripting vulnerability in Jenkins Job Generator Plugin
Jenkins Job Generator Plugin 1.22 and earlier does not escape the name and description of Generator Parameter and Generator Choice parameters on Job Generator jobs' Build With Parameters views, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. Exploitation of this vulnerability requires that parameters are listed on another page, like the \"Build With Parameters\" and \"Parameters\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \"Build With Parameters\" and \"Parameters\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:jobgenerator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.22'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29042'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jobgenerator-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T21:23:16Z', 'nvd_published_at': '2022-04-12T20:15:00Z'}
1.4.0
GHSA-cjw5-f2x5-r4q5
2022-04-19T14:12:53Z
2022-04-06T00:01:29Z
null
['CVE-2022-0602']
Cross-site Scripting in TastyIgniter
TastyIgniter prior to version 3.3.0 is vulnerable to Document Object Model (DOM) based Cross-site Scripting (XSS).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'tastyigniter/tastyigniter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0602'}, {'type': 'WEB', 'url': 'https://github.com/tastyigniter/tastyigniter/commit/992d4ce6444805c3132e3635a01b6fd222063554'}, {'type': 'PACKAGE', 'url': 'https://github.com/tastyigniter/TastyIgniter'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/615f1788-d474-4580-b0ef-5edd50274010'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T15:51:17Z', 'nvd_published_at': '2022-04-05T16:15:00Z'}
1.4.0
GHSA-q77q-vx4q-xx6q
2022-05-10T15:44:45Z
2022-04-27T21:09:46Z
null
['CVE-2022-24891']
Cross-site Scripting in org.owasp.esapi:esapi
### Impact There is a potential for an XSS vulnerability in ESAPI caused by a incorrect regular expression for "onsiteURL" in the **antisamy-esapi.xml** configuration file that can cause URLs with the "javascript:" scheme to NOT be sanitized. See the reference below for full details. ### Patches Patched in ESAPI 2.3.0.0 and later. See important remediation details in the reference given below. ### Workarounds Manually edit your **antisamy-esapi.xml** configuration files to change the "onsiteURL" regular expression as per remediation instructions in the reference below. ### References [Security Bulletin 8](https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/ESAPI-security-bulletin8.pdf) ### For more information If you have any questions or comments about this advisory: * Email one of the project co-leaders. See email addresses listed on the [OWASP ESAPI wiki](https://owasp.org/www-project-enterprise-security-api/) page, under "Leaders". * Send email to one of the two ESAPI related Google Groups listed under [Where to Find More Information on ESAPI](https://github.com/ESAPI/esapi-java-legacy#where-to-find-more-information-on-esapi) on our [README.md](https://github.com/ESAPI/esapi-java-legacy#readme) page.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.owasp.esapi:esapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.3.1'}}]
[{'type': 'WEB', 'url': 'https://github.com/ESAPI/esapi-java-legacy/security/advisories/GHSA-q77q-vx4q-xx6q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24891'}, {'type': 'PACKAGE', 'url': 'https://github.com/ESAPI/esapi-java-legacy'}, {'type': 'WEB', 'url': 'https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/ESAPI-security-bulletin8.pdf'}, {'type': 'WEB', 'url': 'https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/esapi4java-core-2.3.0.0-release-notes.txt'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230127-0014/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-27T21:09:46Z', 'nvd_published_at': '2022-04-27T21:15:00Z'}
1.4.0
GHSA-455j-8hg5-8576
2022-12-02T21:28:46Z
2022-04-13T00:00:19Z
null
['CVE-2022-29039']
Stored Cross-site Scripting vulnerability in Jenkins Gerrit Trigger Plugin
Jenkins Gerrit Trigger Plugin 2.35.2 and earlier does not escape the name and description of parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. Exploitation of these vulnerabilities requires that parameters are listed on another page, like the \"Build With Parameters\" and \"Parameters\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \"Build With Parameters\" and \"Parameters\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.sonyericsson.hudson.plugins.gerrit:gerrit-trigger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.35.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29039'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/gerrit-trigger-plugin/commit/8b1d59645725e6f01057c1cf87170e321f99f6be'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/gerrit-trigger-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T21:28:46Z', 'nvd_published_at': '2022-04-12T20:15:00Z'}
1.4.0
GHSA-vhxq-9mpv-gj87
2022-12-01T23:42:49Z
2022-04-13T00:00:15Z
null
['CVE-2022-29052']
Private key stored in plain text by Jenkins Google Compute Engine Plugin
Jenkins Google Compute Engine Plugin 4.3.8 and earlier stores private keys unencrypted in cloud agent `config.xml` files on the Jenkins controller where they can be viewed by users with Agent/Extended Read permission, or access to the Jenkins controller file system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:google-compute-engine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29052'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/google-compute-engine-plugin/commit/16d2ae71a1b34c81db1d74f83c41577536e5256f'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2045'}]
{'cwe_ids': ['CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-01T23:42:49Z', 'nvd_published_at': '2022-04-12T20:15:00Z'}
1.4.0
GHSA-3hjg-vc7r-rcrw
2022-04-07T15:20:23Z
2022-04-07T15:20:23Z
null
['CVE-2022-24822']
Denial of Service vulnerability in @podium/layout and @podium/proxy
### Impact An attacker using the `Trailer` header as part of the request against proxy endpoints has the ability to take down the server. All Podium layouts that include podlets with proxy endpoints are affected. ### Patches `@podium/layout` which is the main way developers/users are vulnerable to this exploit, has been patched in version `4.6.110`. All earlier versions are vulnerable. `@podium/proxy` which is the source of the vulnerability and is used by `@podium/layout` has been patched in version `4.2.74`. All earlier versions are vulnerable. ### Workarounds It is not easily possible to work around this issue without upgrading. We recommend upgrading `@podium/layout` and/or `@podium/proxy` as soon as possible. ### For more information If you have any questions or comments about this advisory: * Open an issue in [podium-lib/issues](https://github.com/podium-lib/issues) ### Credits The vulnerability was reported by [krynos](https://hackerone.com/krynos) from [Ercoli Consulting](https://www.ercoliconsulting.eu/) via FINN.no's private bug bounty program
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': '@podium/layout'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.110'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@podium/proxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.74'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/podium-lib/proxy/security/advisories/GHSA-3hjg-vc7r-rcrw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24822'}, {'type': 'WEB', 'url': 'https://github.com/podium-lib/layout/commit/fe43e655432b0a5f07b6475f67babcc2588fb039'}, {'type': 'WEB', 'url': 'https://github.com/podium-lib/proxy/commit/9698a40df081217ce142d4de71f929baaa339cdf'}, {'type': 'WEB', 'url': 'https://github.com/podium-lib/layout/releases/tag/v4.6.110'}, {'type': 'WEB', 'url': 'https://github.com/podium-lib/proxy/releases/tag/v4.2.74'}]
{'cwe_ids': ['CWE-248'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T15:20:23Z', 'nvd_published_at': '2022-04-06T18:15:00Z'}
1.4.0
GHSA-82rm-28q9-435p
2023-09-18T22:38:47Z
2022-04-29T01:25:43Z
null
['CVE-2003-0038']
Mailman Cross-site scripting (XSS) vulnerability
Cross-site scripting (XSS) vulnerability in options.py for Mailman 2.1 allows remote attackers to inject script or HTML into web pages via the (1) email or (2) language parameters.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'mailman'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2003-0038'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/11152'}, {'type': 'WEB', 'url': 'http://marc.info/?l=bugtraq&m=104342745916111'}, {'type': 'WEB', 'url': 'http://telia.dl.sourceforge.net/sourceforge/mailman/xss-2.1.0-patch.txt'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2004/dsa-436'}, {'type': 'WEB', 'url': 'http://www.osvdb.org/9205'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/6677'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id?1005987'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T22:38:47Z', 'nvd_published_at': '2003-02-07T05:00:00Z'}
1.4.0
GHSA-x445-mmpw-7r4f
2023-09-18T22:36:52Z
2022-04-30T18:16:22Z
null
['CVE-2001-0590']
Apache Tomcat Allows Source Disclosure
Apache Software Foundation Tomcat Servlet prior to 3.2.2 allows a remote attacker to read the source code to arbitrary 'jsp' files via a malformed URL request which does not end with an HTTP protocol specification (i.e. HTTP/1.0).
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat-servlet-api'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2001-0590'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/6971'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20020711002734/http://archives.neohapsis.com/archives/bugtraq/2001-04/0031.html'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T22:36:52Z', 'nvd_published_at': '2001-08-02T04:00:00Z'}
1.4.0
GHSA-rvjg-gxwx-j5gf
2022-04-28T17:13:58Z
2022-04-28T17:13:58Z
null
['CVE-2020-10734']
OIDC Logout redirect in keycloak
A flaw was found in keycloak. The OIDC logout endpoint does not have CSRF protection. The highest threat from this vulnerability is to system availability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-oidc-client-adapter-pom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '18.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/security/advisories/GHSA-rvjg-gxwx-j5gf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10734'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1831662'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}, {'type': 'WEB', 'url': 'https://issues.redhat.com/browse/KEYCLOAK-13653'}]
{'cwe_ids': ['CWE-601'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T17:13:58Z', 'nvd_published_at': '2021-02-11T18:15:00Z'}
1.4.0
GHSA-4mrx-6fxm-8jpg
2022-04-20T20:31:44Z
2022-04-20T20:31:44Z
null
['CVE-2022-24788']
Buffer Overflow in vyper
### Impact Importing a function from a JSON interface which returns `bytes` generates bytecode which does not clamp bytes length, potentially resulting in a buffer overrun. ### Patches 0.3.2 (as of https://github.com/vyperlang/vyper/commit/049dbdc647b2ce838fae7c188e6bb09cf16e470b) ### Workarounds Use .vy interfaces.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'vyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/security/advisories/GHSA-4mrx-6fxm-8jpg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24788'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/commit/049dbdc647b2ce838fae7c188e6bb09cf16e470b'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/vyper/PYSEC-2022-197.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/vyperlang/vyper'}]
{'cwe_ids': ['CWE-119', 'CWE-120'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-20T20:31:44Z', 'nvd_published_at': '2022-04-13T19:15:00Z'}
1.4.0
GHSA-4qqf-hmv6-r6wh
2022-07-13T17:29:15Z
2022-04-22T00:24:28Z
null
['CVE-2011-2487']
Use of a Broken or Risky Cryptographic Algorithm in Apache WSS4J
The implementations of PKCS#1 v1.5 key transport mechanism for XMLEncryption in JBossWS and Apache WSS4J before 1.6.5 is susceptible to a Bleichenbacher attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ws.security:wss4j'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-2487'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0191'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0192'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0193'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0194'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0195'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0196'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0197'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0198'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0221'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0533'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0953'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2011-2487'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=713539'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/81737'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210122063156/http://www.securityfocus.com/bid/57549'}, {'type': 'WEB', 'url': 'https://www.nds.ruhr-uni-bochum.de/research/publications/breaking-xml-encryption-pkcs15/'}, {'type': 'WEB', 'url': 'http://cxf.apache.org/note-on-cve-2011-2487.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0191.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0192.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0193.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0194.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0195.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0196.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0198.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0221.html'}]
{'cwe_ids': ['CWE-327'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T17:29:15Z', 'nvd_published_at': '2020-03-11T16:15:00Z'}
1.4.0
GHSA-92j7-34x9-f3jw
2023-09-18T23:29:49Z
2022-04-29T03:01:51Z
null
['CVE-2004-2650']
Apache James Denial of Service
Spooler in Apache Foundation James before 2.2.0 allows local users to cause a denial of service (memory consumption) by triggering various error conditions in the retrieve function, which prevents a lock from being released and causes a memory leak.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.james:james-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2004-2650'}, {'type': 'WEB', 'url': 'http://issues.apache.org/jira/browse/JAMES-268'}, {'type': 'WEB', 'url': 'http://james.apache.org/changelog.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/15765'}]
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T23:29:49Z', 'nvd_published_at': '2004-12-31T05:00:00Z'}
1.4.0
GHSA-fwr7-v2mv-hh25
2023-01-23T18:54:18Z
2022-04-07T00:00:17Z
null
['CVE-2021-43138']
Prototype Pollution in async
A vulnerability exists in Async through 3.2.1 for 3.x and through 2.6.3 for 2.x (fixed in 3.2.2 and 2.6.4), which could let a malicious user obtain privileges via the `mapValues()` method.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'async'}, 'ecosystem_specific': {'affected_functions': ['async.mapValues']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'async'}, 'ecosystem_specific': {'affected_functions': ['async.mapValues']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.6.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43138'}, {'type': 'WEB', 'url': 'https://github.com/caolan/async/pull/1828'}, {'type': 'WEB', 'url': 'https://github.com/caolan/async/commit/8f7f90342a6571ba1c197d747ebed30c368096d2'}, {'type': 'WEB', 'url': 'https://github.com/caolan/async/commit/e1ecdbf79264f9ab488c7799f4c76996d5dca66d'}, {'type': 'PACKAGE', 'url': 'https://github.com/caolan/async'}, {'type': 'WEB', 'url': 'https://github.com/caolan/async/blob/master/lib/internal/iterator.js'}, {'type': 'WEB', 'url': 'https://github.com/caolan/async/blob/master/lib/mapValuesLimit.js'}, {'type': 'WEB', 'url': 'https://github.com/caolan/async/blob/v2.6.4/CHANGELOG.md#v264'}, {'type': 'WEB', 'url': 'https://github.com/caolan/async/compare/v2.6.3...v2.6.4'}, {'type': 'WEB', 'url': 'https://jsfiddle.net/oz5twjd9/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/MTEUUTNIEBHGKUKKLNUZSV7IEP6IP3Q3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/UM6XJ73Q3NAM5KSGCOKJ2ZIA6GUWUJLK/'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T22:13:35Z', 'nvd_published_at': '2022-04-06T17:15:00Z'}
1.4.0
GHSA-hj4h-vqpq-95wg
2023-09-18T22:51:49Z
2022-04-29T02:57:41Z
null
['CVE-2004-0412']
Mailman Sensitive Information Disclosure
Mailman before 2.1.5 allows remote attackers to obtain user passwords via a crafted email request to the Mailman server.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'mailman'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2004-0412'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=123559'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/16256'}, {'type': 'PACKAGE', 'url': 'https://gitlab.com/mailman/'}, {'type': 'WEB', 'url': 'http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000842'}, {'type': 'WEB', 'url': 'http://mail.python.org/pipermail/mailman-announce/2004-May/000072.html'}, {'type': 'WEB', 'url': 'http://marc.info/?l=bugtraq&m=109034869927955&w=2'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/11701'}, {'type': 'WEB', 'url': 'http://security.gentoo.org/glsa/glsa-200406-04.xml'}, {'type': 'WEB', 'url': 'http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:051'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/10412'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T22:51:49Z', 'nvd_published_at': '2004-08-18T04:00:00Z'}
1.4.0
GHSA-qjmq-8hjr-qcv6
2022-04-18T22:20:12Z
2022-04-07T15:18:05Z
null
['CVE-2022-24815']
SQL Injection when creating an application with Reactive SQL backend
### Impact SQL Injection vulnerability in entities for applications generated with the option "reactive with Spring WebFlux" enabled and an SQL database using r2dbc. Applications created without "reactive with Spring WebFlux" and applications with NoSQL databases are not affected. If you have generated a microservice Gateway using the affected version, you might be impacted as Gateways are reactive by default. Currently, SQL injection is possible in the `findAllBy(Pageable pageable, Criteria criteria)` method of an entity repository class generated in these applications as the where clause using Criteria for queries are not sanitized and user input is passed on as it is by the criteria. ## Impacted applications - Monolith and microservice applications with SQL database and reactive with Spring WebFlux combination (other combinations are not affected and the issue is only present when you generate entities) - Gateway applications with SQL database (issue will appear only when generating entities) ### Patches Patched in v7.8.1 The `findAllBy(Pageable pageable, Criteria criteria)` method has been removed from the entity repositories and `org.springframework.data.relational.core.query.Criteria` support in the underlying methods has been replaced with `org.springframework.data.relational.core.sql.Condition`. This means you won't be able to do custom filtering in the generated applications. If you have existing reactive applications generated by the impacted version, we advise you to audit for use of `Criteria` and take appropriate actions. ### Workarounds The problem lies in the `EntityManager.java` class when creating the where clause via `Conditions.just(criteria.toString())`. `just` accepts the literal string provided. Criteria's `toString` method returns a plain string and this combination is vulnerable to sql injection as the string is not sanitized and will contain whatever used passed as input using any plain SQL So be careful when combining criterias and conditions. As a workaround we have removed the possibility to pass any user-provided criteria to the `createSelect` method of `EntityManager`. ### Example ```java Criteria criteria = Criteria.where("name").is("foobar';DROP TABLE example;--"); // parameter is user provided input criteria.toString(); // --> "'foobar';DROP TABLE example;--'" ``` ### References [More details in this Issue report](https://github.com/jhipster/generator-jhipster/issues/18269) ### For more information If you have any questions or comments about this advisory: * Open an issue in [JHipster issue tracker](https://github.com/jhipster/generator-jhipster/issues)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'generator-jhipster'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.8.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/jhipster/generator-jhipster/security/advisories/GHSA-qjmq-8hjr-qcv6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24815'}, {'type': 'WEB', 'url': 'https://github.com/jhipster/generator-jhipster/issues/18269'}, {'type': 'WEB', 'url': 'https://github.com/jhipster/generator-jhipster/commit/c220a210fd7742c53eea72bd5fadbb96220faa98'}, {'type': 'PACKAGE', 'url': 'https://github.com/jhipster/generator-jhipster'}]
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T15:18:05Z', 'nvd_published_at': '2022-04-11T20:15:00Z'}
1.4.0
GHSA-6wj9-77wq-jq7p
2023-03-06T23:31:46Z
2022-04-23T00:40:45Z
null
['CVE-2012-6685']
Nokogiri is vulnerable to XML External Entity (XXE) attack
Nokogiri before 1.5.4 is vulnerable to XXE attacks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-6685'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/issues/693'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1178970'}, {'type': 'PACKAGE', 'url': 'https://github.com/sparklemotion/nokogiri'}, {'type': 'WEB', 'url': 'https://nokogiri.org/CHANGELOG.html#154-2012-06-12'}]
{'cwe_ids': ['CWE-776'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-12T16:55:39Z', 'nvd_published_at': '2020-02-19T15:15:00Z'}
1.4.0
GHSA-6xj3-fhrf-rjgc
2022-04-28T21:11:45Z
2022-04-28T00:00:34Z
null
['CVE-2022-1504']
Cross-site Scripting in microweber
XSS in /demo/module/?module=HERE in GitHub repository microweber/microweber prior to 1.2.15. Typical impact of XSS attacks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.15'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1504'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/1f6a4de416a85e626dc643bb5ceb916e4802223e'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b8e5c324-3dfe-46b4-8095-1697c6b0a6d6'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T21:11:45Z', 'nvd_published_at': '2022-04-27T11:15:00Z'}
1.4.0
GHSA-358r-g2xw-7c83
2023-08-29T19:58:59Z
2022-04-23T00:40:10Z
null
['CVE-2012-1156']
Moodle backs up private files
Moodle before 2.2.2, 2.1.5, and 2.0.8 had users' private files included in course backups unnecessarily.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixed': '2.2.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.1'}}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1'}, {'fixed': '2.1.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.1.4'}}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0'}, {'fixed': '2.0.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.7'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-1156'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/37b6e7a03c77ea99fbe5224a15419e318019c570'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/ac6dc09c261219afa0191e9f2daf030bd071d272'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/f88224624dca76e1a8a2810fd8cc04292611f91c'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2012-1156'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-1156'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=198623'}, {'type': 'WEB', 'url': 'https://security-tracker.debian.org/tracker/CVE-2012-1156'}, {'type': 'WEB', 'url': 'http://docs.moodle.org/dev/Moodle_2.0.8_release_notes'}, {'type': 'WEB', 'url': 'http://docs.moodle.org/dev/Moodle_2.1.5_release_notes'}, {'type': 'WEB', 'url': 'http://docs.moodle.org/dev/Moodle_2.2.2_release_notes'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077635.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078209.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078210.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080712.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2012-May/081047.html'}]
{'cwe_ids': ['CWE-532'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T19:58:59Z', 'nvd_published_at': '2019-11-14T16:15:00Z'}
1.4.0
GHSA-6v73-fgf6-w5j7
2022-08-11T21:35:54Z
2022-04-03T00:00:59Z
null
['CVE-2022-22963']
Spring Cloud Function Code Injection with a specially crafted SpEL as a routing expression
In Spring Cloud Function versions 3.1.6, 3.2.2 and older unsupported versions, when using routing functionality it is possible for a user to provide a specially crafted SpEL as a routing-expression that may result in remote code execution and access to local resources.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.cloud:spring-cloud-function-context'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.cloud:spring-cloud-function-context'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22963'}, {'type': 'PACKAGE', 'url': 'https://github.com/spring-cloud/spring-cloud-function'}, {'type': 'WEB', 'url': 'https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0005'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2022-22963'}, {'type': 'WEB', 'url': 'https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-java-spring-scf-rce-DQrHhJxH'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/173430/Spring-Cloud-3.2.2-Remote-Command-Execution.html'}]
{'cwe_ids': ['CWE-917', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-05T18:48:10Z', 'nvd_published_at': '2022-04-01T23:15:00Z'}
1.4.0
GHSA-m7xq-8jp8-rj2c
2022-07-18T21:00:59Z
2022-04-13T00:00:33Z
null
['CVE-2022-29080']
Command injection in npm-dependency-versions
The npm-dependency-versions package through 0.3.0 for Node.js allows command injection if an attacker is able to call dependencyVersions with a JSON object in which pkgs is a key, and there are shell metacharacters in a value.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'npm-dependency-versions'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29080'}, {'type': 'WEB', 'url': 'https://github.com/barneycarroll/npm-dependency-versions/issues/6'}, {'type': 'PACKAGE', 'url': 'https://github.com/barneycarroll/npm-dependency-versions'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/npm-dependency-versions'}]
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-18T21:00:59Z', 'nvd_published_at': '2022-04-12T05:15:00Z'}
1.4.0
GHSA-gx2c-fvhc-ph4j
2022-04-19T15:09:07Z
2022-04-08T00:00:21Z
null
['CVE-2022-26612']
Path traversal in Hadoop
In Apache Hadoop, The unTar function uses unTarUsingJava function on Windows and the built-in tar utility on Unix and other OSes. As a result, a TAR entry may create a symlink under the expected extraction directory which points to an external directory. A subsequent TAR entry may extract an arbitrary file into the external directory using the symlink name. This however would be caught by the same targetDirPath check on Unix because of the getCanonicalPath call. However on Windows, getCanonicalPath doesn't resolve symbolic links, which bypasses the check. unpackEntries during TAR extraction follows symbolic links which allows writing outside expected base directory on Windows. This was addressed in Apache Hadoop 3.2.3
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26612'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/hadoop'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/hslo7wzw2449gv1jyjk8g6ttd7935fyz'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220519-0004/'}]
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-08T22:06:47Z', 'nvd_published_at': '2022-04-07T19:15:00Z'}
1.4.0
GHSA-vx8v-g3p3-88vg
2022-04-19T18:01:53Z
2022-04-06T00:01:31Z
null
['CVE-2022-1235']
Weak password hash in LiveHelperChat
The secrethash, which the application relies for multiple security measures, can be brute-forced. The hash is quite small, with only 10 characters of only hexadecimal, making 16^10 possilibities ( 1.099.511.627.776 ). The SHA1 of the secret can be obtained via a captcha string and brute-forced offline with an GPU.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.96'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1235'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/6538d6df3d8a60fee254170b08dd76a161f7bfdc'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/92f7b2d4-fa88-4c62-a2ee-721eebe01705'}]
{'cwe_ids': ['CWE-916'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T15:40:15Z', 'nvd_published_at': '2022-04-05T07:15:00Z'}
1.4.0
GHSA-qg4g-6jcq-rw93
2023-09-18T22:00:28Z
2022-04-30T18:14:15Z
null
['CVE-2000-0759']
Jakarta Apache Tomcat Reveals Physical Paths
Jakarta Tomcat 3.1 under Apache reveals physical path information when a remote attacker requests a URL that does not exist, which generates an error message that includes the physical path.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2000-0759'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T22:00:28Z', 'nvd_published_at': '2000-10-20T04:00:00Z'}
1.4.0
GHSA-xhr8-mpwq-2rr2
2022-04-01T13:39:45Z
2022-04-01T13:39:45Z
null
[]
Automatic named constructor discovery in Valinor
## Design issue - automatic constructor discovery The issue arises when upgrading from `cuyz/valinor:0.3.0` to a newer system on an existing application, which broke due to the wrong constructor being picked. Still, a bigger security concern is problematic, and it is akin to https://github.com/rails/rails/issues/5228. ## Example exploit Take following DTO example: ```php final class UserDTO { public function __construct( public int $id, public string $name ) {} public static function fromDb( PDO $connection, int $id ): self { /* ... code to fetch the DTO here ... */ } } ``` There is nothing inherently unsafe about the above `UserDTO`, but when mixed with `cuyz/valinor:^0.5.0` ( specifically https://github.com/CuyZ/Valinor/commit/718d3c1bc2ea7d28b4b1f6c062addcd1dde8660b ), it is an explosive mix: ```php // this could be coming from user input: $maliciousPayload = [ 'connection' => [ 'dsn' => 'mysql:host=some-host;database=some-database', 'username' => 'root', 'password' => 'root', 'options' => [ // PDO::MYSQL_ATTR_INIT_COMMAND === 1002 1002 => 'DROP DATABASE all-the-moneys' ] ], 'id' => 123, ]; $treeMapper->map( UserDTO::class, $maliciousPayload ); // your DB is gone :D ``` The above payload is represented in PHP form, but may as well be input JSON, HTML or x-form-urlencoded. ## Mitigation Version 0.7.0 contains a patch for this issue. Automatic named constructor resolution should be disabled - only explicitly mapped named constructors should be used/discovered.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'cuyz/valinor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.5.0'}, {'fixed': '0.7.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/CuyZ/Valinor/security/advisories/GHSA-xhr8-mpwq-2rr2'}, {'type': 'WEB', 'url': 'https://github.com/CuyZ/Valinor/commit/718d3c1bc2ea7d28b4b1f6c062addcd1dde8660b'}, {'type': 'PACKAGE', 'url': 'https://github.com/CuyZ/Valinor'}, {'type': 'WEB', 'url': 'https://github.com/CuyZ/Valinor/releases/tag/0.7.0'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T13:39:45Z', 'nvd_published_at': None}