schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
stringlengths 20
20
⌀ | aliases
stringlengths 2
20
| summary
stringlengths 20
140
| details
stringlengths 56
37.2k
| severity
stringlengths 2
92
| affected
stringlengths 88
7.07k
| references
stringlengths 139
4.72k
| database_specific
stringlengths 131
185
|
---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0
|
GHSA-qf34-f43r-gv9p
|
2023-04-05T19:38:24Z
|
2023-03-29T15:30:17Z
| null |
['CVE-2023-28158']
|
Apache Archiva vulnerable to privilege escalation via stored cross-site scripting (XSS)
|
Apache Archiva is vulnerable to privilege escalation vua stored cross-site-scripting using the file upload service to upload malicious content. The issue can be exploited only by authenticated users which can create directory name to inject some XSS content and gain some privileges, such as an admin user.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.archiva:archiva'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.10'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28158'}, {'type': 'WEB', 'url': 'https://github.com/apache/archiva/commit/d62e81c7e75f617cf01d2a75952a2c857758f8c4'}, {'type': 'WEB', 'url': 'https://github.com/apache/archiva/commit/e7f7e70992d361d8b7a3298ddcdf49dda2fdc842'}, {'type': 'WEB', 'url': 'https://github.com/apache/archiva/commit/ee3ee0a18977b67b6997ea8cd023816201059f96'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/archiva'}, {'type': 'WEB', 'url': 'https://github.com/apache/archiva/releases/tag/archiva-2.2.10'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/8pm6d5y9cptznm0bdny3n8voovmm0dtt'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/04/18/2'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-05T19:38:24Z', 'nvd_published_at': '2023-03-29T13:15:00Z'}
|
1.4.0
|
GHSA-7jvm-xxmr-v5cw
|
2023-03-27T21:58:27Z
|
2023-03-24T21:58:31Z
| null |
['CVE-2023-25662']
|
TensorFlow vulnerable to integer overflow in EditDistance
|
### Impact
TFversion 2.11.0 //tensorflow/core/ops/array_ops.cc:1067 const Tensor* hypothesis_shape_t = c->input_tensor(2); std::vector<DimensionHandle> dims(hypothesis_shape_t->NumElements() - 1); for (int i = 0; i < dims.size(); ++i) { dims[i] = c->MakeDim(std::max(h_values(i), t_values(i))); }
if hypothesis_shape_t is empty, hypothesis_shape_t->NumElements() - 1 will be integer overflow, and the it will deadlock
```python
import tensorflow as tf
para={
'hypothesis_indices': [[]],
'hypothesis_values': ['tmp/'],
'hypothesis_shape': [],
'truth_indices': [[]],
'truth_values': [''],
'truth_shape': [],
'normalize': False
}
tf.raw_ops.EditDistance(**para)
```
### Patches
We have patched the issue in GitHub commit [08b8e18643d6dcde00890733b270ff8d9960c56c](https://github.com/tensorflow/tensorflow/commit/08b8e18643d6dcde00890733b270ff8d9960c56c).
The fix will be included in TensorFlow 2.12.0. We will also cherrypick this commit on TensorFlow 2.11.1
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by r3pwnx
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7jvm-xxmr-v5cw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25662'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/08b8e18643d6dcde00890733b270ff8d9960c56c'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]
|
{'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-24T21:58:31Z', 'nvd_published_at': '2023-03-25T00:15:00Z'}
|
1.4.0
|
GHSA-rmhg-2cvv-q7vx
|
2023-03-13T15:28:08Z
|
2023-03-06T06:30:18Z
| null |
['CVE-2023-26106']
|
dot-lens vulnerable to Prototype Pollution
|
All versions of the package dot-lens are vulnerable to Prototype Pollution via the `set()` function in `index.js` file.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'dot-lens'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26106'}, {'type': 'PACKAGE', 'url': 'https://github.com/jb55/dot-lens'}, {'type': 'WEB', 'url': 'https://github.com/jb55/dot-lens/blob/465ef2088e4065b7be1c4372eedd2215c3820bc4/index.js#23L70'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-DOTLENS-3227646'}]
|
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-07T20:32:03Z', 'nvd_published_at': '2023-03-06T05:15:00Z'}
|
1.4.0
|
GHSA-4pqp-69m3-f8pp
|
2023-05-11T20:58:55Z
|
2023-03-23T21:30:19Z
| null |
['CVE-2023-24788']
|
NotrinosERP vulnerable to SQL Injection
|
NotrinosERP v0.7 was discovered to contain a SQL injection vulnerability via the OrderNumber parameter at `/NotrinosERP/sales/customer_delivery.php`.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'notrinos/notrinos-erp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.7'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24788'}, {'type': 'WEB', 'url': 'https://github.com/arvandy/CVE/blob/main/CVE-2023-24788/CVE-2023-24788.md'}, {'type': 'WEB', 'url': 'https://github.com/arvandy/CVE/blob/main/CVE-2023-24788/CVE-2023-24788.py'}, {'type': 'WEB', 'url': 'https://github.com/arvandy/CVE/blob/main/NotrinosERP/POC.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/notrinos/NotrinosERP'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/171804/NotrinosERP-0.7-SQL-Injection.html'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-23T23:10:33Z', 'nvd_published_at': '2023-03-23T21:15:00Z'}
|
1.4.0
|
GHSA-3738-p9x3-mv9r
|
2023-03-03T22:48:40Z
|
2023-03-03T22:48:40Z
| null |
['CVE-2023-26474']
|
XWiki Platform vulnerable to privilege escalation via properties with wiki syntax that are executed with wrong author
|
### Impact
It's possible to use the right of an existing document content author to execute a text area property.
To reproduce:
* As an admin with programming rights, create a new user without script or programming right.
* Login with the freshly created user.
* Insert the following text in source mode in the about section:
```
{{groovy}}println("hello from groovy!"){{/groovy}}
```
* Click "Save & View"
### Patches
This has been patched in XWiki 14.10, 14.4.7, and 13.10.11.
### Workarounds
No known workaround.
### References
https://jira.xwiki.org/browse/XWIKI-20373
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira](http://jira.xwiki.org/)
* Email us at [Security ML](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '13.10'}, {'fixed': '13.10.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-legacy-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '13.10'}, {'fixed': '13.10.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0'}, {'fixed': '14.4.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-legacy-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0'}, {'fixed': '14.4.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-legacy-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.10'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-3738-p9x3-mv9r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26474'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20373'}]
|
{'cwe_ids': ['CWE-284'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T22:48:40Z', 'nvd_published_at': '2023-03-02T19:15:00Z'}
|
1.4.0
|
GHSA-rcf8-g8jv-vg6p
|
2023-03-30T22:16:24Z
|
2023-03-24T21:56:53Z
| null |
['CVE-2023-25669']
|
TensorFlow has Floating Point Exception in AvgPoolGrad with XLA
|
### Impact
If the stride and window size are not positive for `tf.raw_ops.AvgPoolGrad`, it can give an FPE.
```python
import tensorflow as tf
import numpy as np
@tf.function(jit_compile=True)
def test():
y = tf.raw_ops.AvgPoolGrad(orig_input_shape=[1,0,0,0], grad=[[[[0.39117979]]]], ksize=[1,0,0,0], strides=[1,0,0,0], padding="SAME", data_format="NCHW")
return y
print(test())
```
### Patches
We have patched the issue in GitHub commit [1295ae4dbb52fe06b19733b0257e2340d7b63b8d](https://github.com/tensorflow/tensorflow/commit/1295ae4dbb52fe06b19733b0257e2340d7b63b8d).
The fix will be included in TensorFlow 2.12. We will also cherrypick this commit on TensorFlow 2.11.1.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by r3pwnx of 360 AIVul Team
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rcf8-g8jv-vg6p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25669'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/1295ae4dbb52fe06b19733b0257e2340d7b63b8d'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]
|
{'cwe_ids': ['CWE-697'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-24T21:56:53Z', 'nvd_published_at': '2023-03-25T00:15:00Z'}
|
1.4.0
|
GHSA-7rqg-hjwc-6mjf
|
2023-03-02T20:41:57Z
|
2023-03-01T20:56:49Z
| null |
['CVE-2023-22462']
|
Grafana vulnerable to Stored Cross-site Scripting in Text plugin
|
### Description
On 2023-01-01 during an internal audit of Grafana, a member of the security team found a stored XSS vulnerability affecting the core plugin "Text".
The stored XSS vulnerability requires several user interactions in order to be fully exploited. The vulnerability was possible due to React's render cycle that will pass though the unsanitized HTML code, but in the next cycle the HTML is cleaned up and saved in Grafana's database.
### Impact
An attacker needs to have the Editor role in order to change a Text panel to include JavaScript. later, an another user needs to edit the same Text panel, and click on "Markdown" or "HTML" for the code to be executed. This means that vertical privilege escalation is possible, where a user with Editor role can change to a known password for a user having Admin role if the user with Admin role executes malicious JavaScript viewing a dashboard.
### Impacted versions
Grafana versions between 9.2.0 and 9.2.10. and between 9.3.0 and 9.3.4
### Solutions and mitigations
Update your Grafana instance.
## Reporting security issues
If you think you have found a security vulnerability, please send a report to [email protected]. This address can be used for all of Grafana Labs' open source and commercial products (including, but not limited to Grafana, Grafana Cloud, Grafana Enterprise, and grafana.com). We can accept only vulnerability reports at this address. We would prefer that you encrypt your message to us by using our PGP key. The key fingerprint is
F988 7BEA 027A 049F AE8E 5CAA D125 8932 BE24 C5CA
The key is available from keyserver.ubuntu.com.
## Security announcements
We maintain a [security category](https://community.grafana.com/c/support/security-announcements) on our blog, where we will always post a summary, remediation, and mitigation details for any patch containing security fixes.
You can also subscribe to our [RSS feed](https://grafana.com/tags/security/index.xml).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.2.0'}, {'fixed': '9.2.10'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.3.0'}, {'fixed': '9.3.4'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/grafana/grafana/security/advisories/GHSA-7rqg-hjwc-6mjf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22462'}, {'type': 'WEB', 'url': 'https://github.com/grafana/grafana/commit/db83d5f398caffe35c5846cfa7727d1a2a414165'}, {'type': 'PACKAGE', 'url': 'https://github.com/grafana/grafana'}, {'type': 'WEB', 'url': 'https://grafana.com/blog/2023/02/28/grafana-security-release-new-versions-with-security-fixes-for-cve-2023-0594-cve-2023-0507-and-cve-2023-22462/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230413-0004/'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-01T20:56:49Z', 'nvd_published_at': '2023-03-02T01:15:00Z'}
|
1.4.0
|
GHSA-8648-h559-8h42
|
2023-03-27T21:48:40Z
|
2023-03-27T21:48:40Z
| null |
['CVE-2023-28604']
|
Fluid Components TYPO3 extension vulnerable to Cross-Site Scripting
|
All versions of Fluid Components before 3.5.0 were susceptible to Cross-Site Scripting. Version 3.5.0 of the extension fixes this issue. Due to the nature of the problem, some changes in your project's Fluid templates might be necessary to prevent unwanted double-escaping of HTML markup.
|
[]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'sitegeist/fluid-components'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/sitegeist/fluid-components/CVE-2023-28604.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/sitegeist/fluid-components'}, {'type': 'WEB', 'url': 'https://github.com/sitegeist/fluid-components/blob/master/Documentation/XssIssue.md'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2023-003'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-27T21:48:40Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-6wfh-89q8-44jq
|
2023-03-27T21:24:13Z
|
2023-03-24T21:54:04Z
| null |
['CVE-2023-25676']
|
TensorFlow has null dereference on ParallelConcat with XLA
|
### Impact
When running with XLA, `tf.raw_ops.ParallelConcat` segfaults with a nullptr dereference when given a parameter `shape` with rank that is not greater than zero.
```python
import tensorflow as tf
func = tf.raw_ops.ParallelConcat
para = {'shape': 0, 'values': [1]}
@tf.function(jit_compile=True)
def test():
y = func(**para)
return y
test()
```
### Patches
We have patched the issue in GitHub commit [da66bc6d5ff466aee084f9e7397980a24890cd15](https://github.com/tensorflow/tensorflow/commit/da66bc6d5ff466aee084f9e7397980a24890cd15).
The fix will be included in TensorFlow 2.12. We will also cherrypick this commit on TensorFlow 2.11.1.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by r3pwnx of 360 AIVul Team
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6wfh-89q8-44jq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25676'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/da66bc6d5ff466aee084f9e7397980a24890cd15'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]
|
{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-24T21:54:04Z', 'nvd_published_at': '2023-03-25T00:15:00Z'}
|
1.4.0
|
GHSA-f5v5-ccqc-6w36
|
2023-03-24T21:59:53Z
|
2023-03-24T21:59:53Z
| null |
[]
|
async-nats vulnerable to TLS certificate common name validation bypass
|
The NATS official Rust clients are vulnerable to MitM when using TLS.
The common name of the server's TLS certificate is validated against the `host`name provided by the server's plaintext `INFO` message during the initial connection setup phase. A MitM proxy can tamper with the `host` field's value by substituting it with the common name of a valid certificate it controls, fooling the client into accepting it.
## Reproduction steps
1. The NATS Rust client tries to establish a new connection
2. The connection is intercepted by a MitM proxy
3. The proxy makes a separate connection to the NATS server
4. The NATS server replies with an `INFO` message
5. The proxy reads the `INFO`, alters the `host` JSON field and passes the tampered `INFO` back to the client
6. The proxy upgrades the client connection to TLS, presenting a certificate issued by a certificate authority present in the client's keychain. In the previous step the `host` was set to the common name of said certificate
7. `rustls` accepts the certificate, having verified that the common name matches the attacker-controlled value it was given
8. The client has been fooled by the MitM proxy into accepting the attacker-controlled certificate
|
[]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'async-nats'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.29.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/nats-io/nats.rs/commit/817a7b942c462fa9d9938dcb62124173634132fb#diff-767d442397fcaaf2f83e8f924d4a70317a2ce4703a49964d6007707949cfa5f5L303-R304'}, {'type': 'PACKAGE', 'url': 'https://github.com/nats-io/nats.rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0027.html'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-24T21:59:53Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-3x8x-79m2-3w2w
|
2023-03-23T18:23:19Z
|
2023-03-19T00:30:25Z
| null |
['CVE-2021-46877']
|
jackson-databind possible Denial of Service if using JDK serialization to serialize JsonNode
|
jackson-databind 2.10.x through 2.12.x before 2.12.6 and 2.13.x before 2.13.1 allows attackers to cause a denial of service (2 GB transient heap usage per read) in uncommon situations involving JsonNode JDK serialization.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.10.0'}, {'fixed': '2.12.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.13.0'}, {'fixed': '2.13.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46877'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/3328'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/3ccde7d938fea547e598fdefe9a82cff37fed5cb'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.12.6'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.13.1'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/jackson-user/c/OsBsirPM_Vw'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-20T21:14:14Z', 'nvd_published_at': '2023-03-18T22:15:00Z'}
|
1.4.0
|
GHSA-9f45-9qrw-pp4v
|
2023-03-29T19:10:48Z
|
2023-03-23T21:30:18Z
| null |
['CVE-2023-28332']
|
Moodle vulnerable to Cross-site Scripting when algebra filter enabled but not functional
|
If the algebra filter was enabled but not functional (eg the necessary binaries were missing from the server), it presented an XSS risk.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11.0'}, {'fixed': '3.11.13'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.20'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28332'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/9f178c1f816e78ec024ab16a10192c81305b2624'}, {'type': 'WEB', 'url': 'https://git.moodle.org/gw?p=moodle.git;a=commitdiff;h=9f178c1f816e78ec024ab16a10192c81305b2624'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/3QZN34VSF4HTCW3C3ZP2OZYSLYUKADPF/'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=445064'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-23T23:09:05Z', 'nvd_published_at': '2023-03-23T21:15:00Z'}
|
1.4.0
|
GHSA-4grc-q4fj-45p8
|
2023-03-22T19:54:06Z
|
2023-03-15T15:30:22Z
| null |
['CVE-2023-0100']
|
Improper Input Validation In Eclipse BIRT
|
In Eclipse BIRT, starting from version 2.6.2, the default configuration allowed to retrieve a report from the same host using an absolute HTTP path for the report parameter (e.g. __report=http://xyz.com/report.rptdesign). If the host indicated in the __report parameter matched the HTTP Host header value, the report would be retrieved. However, the Host header can be tampered with on some configurations where no virtual hosts are put in place (e.g. in the default configuration of Apache Tomcat) or when the default host points to the BIRT server. This vulnerability was patched on Eclipse BIRT 4.13.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.birt:org.eclipse.birt.report.viewer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.2'}, {'fixed': '4.13'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0100'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/birt/pull/1165'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=580391'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/birt'}]
|
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-16T13:26:41Z', 'nvd_published_at': '2023-03-15T15:15:00Z'}
|
1.4.0
|
GHSA-7j4m-f87g-5r9r
|
2023-03-31T22:21:07Z
|
2023-03-27T18:30:26Z
| null |
['CVE-2023-1069']
|
Complianz WordPress plugin vulnerable to cross-site scripting
|
The Complianz Premium WordPress plugin before 6.4.2 did not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'really-simple-plugins/complianz-gdpr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1069'}, {'type': 'WEB', 'url': 'https://github.com/Really-Simple-Plugins/complianz-gdpr/commit/e6c2c386cadb78f8cdcded1b000cbd38bd9ff043'}, {'type': 'WEB', 'url': 'https://wpscan.com/vulnerability/caacc50c-822e-46e9-bc0b-681349fd0dda'}, {'type': 'PACKAGE', 'url': 'www.github.com/Really-Simple-Plugins/complianz-gdpr/'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-31T22:21:07Z', 'nvd_published_at': '2023-03-27T16:15:00Z'}
|
1.4.0
|
GHSA-rrgp-c2w8-6vg6
|
2023-05-23T20:28:36Z
|
2023-03-10T21:30:19Z
| null |
['CVE-2023-27904']
|
Information disclosure through error stack traces related to agents
|
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier, and prior to LTS 2.387.1 prints an error stack trace on agent-related pages when agent connections are broken, potentially revealing information about Jenkins configuration that is otherwise inaccessible to attackers.
Jenkins 2.394, LTS 2.375.4, and LTS 2.387.1 does not display error stack traces when agent connections are broken.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.376'}, {'fixed': '2.387.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.375.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.388'}, {'fixed': '2.394'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27904'}, {'type': 'WEB', 'url': 'https://github.com/CVEProject/cvelist/blob/master/2023/27xxx/CVE-2023-27904.json'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-03-08/#SECURITY-2120'}]
|
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-03-16T16:02:10Z', 'nvd_published_at': '2023-03-10T21:15:00Z'}
|
1.4.0
|
GHSA-67j4-2mh6-8627
|
2023-03-13T19:15:49Z
|
2023-03-05T21:30:15Z
| null |
['CVE-2021-4329']
|
json-logic-js Command Injection vulnerability
|
A vulnerability, which was classified as critical, has been found in json-logic-js 2.0.0. Affected by this issue is some unknown functionality of the file logic.js. The manipulation leads to command injection. Upgrading to version 2.0.1 is able to address this issue. The name of the patch is c1dd82f5b15d8a553bb7a0cfa841ab8a11a9c227. It is recommended to upgrade the affected component. VDB-222266 is the identifier assigned to this vulnerability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'json-logic-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4329'}, {'type': 'WEB', 'url': 'https://github.com/jwadhams/json-logic-js/pull/98'}, {'type': 'WEB', 'url': 'https://github.com/jwadhams/json-logic-js/commit/c1dd82f5b15d8a553bb7a0cfa841ab8a11a9c227'}, {'type': 'PACKAGE', 'url': 'https://github.com/jwadhams/json-logic-js'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.222266'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.222266'}]
|
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-07T20:14:07Z', 'nvd_published_at': '2023-03-05T19:15:00Z'}
|
1.4.0
|
GHSA-7x45-phmr-9wqp
|
2023-03-30T22:19:50Z
|
2023-03-30T20:16:33Z
| null |
['CVE-2022-23522']
|
Arbitrary file write in mindsdb when Extracting Tarballs retrieved from a remote location
|
### Summary
An unsafe extraction is being performed using `shutil.unpack_archive()` from a remotely retrieved tarball. Which may lead to the writing of the extracted files to an unintended location. This vulnerability is sometimes called a **TarSlip** or a **ZipSlip variant**.
### Details
Unpacking files using the high-level function `shutil.unpack_archive()` from a potentially malicious tarball without validating that the destination file path remained within the intended destination directory may cause files to be overwritten outside the destination directory.
As can be seen in the vulnerable snippet code source, an archive is being retrieved using the `download_file()` function from a remote location which is a user-provided permanent storage bucket `s3`. Immediately after being retrieved, the tarball is unsafely unpacked using the function `shutil.unpack_archive()`.
The vulnerable code is [L128..L129](https://github.com/mindsdb/mindsdb/blob/69c76e727b8067f32b06ab83bb835a8c416c4f21/mindsdb/interfaces/storage/fs.py#L128..L129) in [fs.py](https://github.com/mindsdb/mindsdb/blob/69c76e727b8067f32b06ab83bb835a8c416c4f21/mindsdb/interfaces/storage/fs.py) file.
```python3
def __init__(self):
super().__init__()
if 's3_credentials' in self.config['permanent_storage']:
self.s3 = boto3.client('s3', **self.config['permanent_storage']['s3_credentials'])
else:
self.s3 = boto3.client('s3')
# User provided remote storage!
self.bucket = self.config['permanent_storage']['bucket']
def get(self, local_name, base_dir):
remote_name = local_name
remote_ziped_name = f'{remote_name}.tar.gz'
local_ziped_name = f'{local_name}.tar.gz'
local_ziped_path = os.path.join(base_dir, local_ziped_name)
os.makedirs(base_dir, exist_ok=True)
# Retrieve a potentially malicious tarball
self.s3.download_file(self.bucket, remote_ziped_name, local_ziped_path)
# Perform an unsafe extraction
shutil.unpack_archive(local_ziped_path, base_dir)
os.system(f'chmod -R 777 {base_dir}')
os.remove(local_ziped_path)
```
### PoC
The following PoC is provided for illustration purposes only. It showcases the risk of extracting a non-harmless text file `sim4n6.txt` to one of the parent locations rather than the intended current folder.
```bash
> tar --list -f archive.tar
tar: Removing leading "../../../" from member names
../../../sim4n6.txt
> python3
Python 3.10.6 (main, Nov 2 2022, 18:53:38) [GCC 11.3.0] on linux
Type "help", "copyright", "credits" or "license" for more information.
>>> import shutil
>>> shutil.unpack_archive("archive.tar")
>>> exit()
> test -f ../../../sim4n6.txt && echo "sim4n6.txt exists"
sim4n6.txt exists
```
### Attack Scenario
An attacker could craft a malicious tarball with a filename path, such as `../../../../../../../../etc/passwd`, and then serve the archive remotely using a personal bucket `s3`, thus, retrieve the tarball through **mindsdb** and overwrite the system files of the hosting server.
### Mitigation
Potential mitigation could be to:
- Use a safer module, like `zipfile`.
- Validate the location of the extracted files and discard those with malicious paths such as relative path `..` or absolute path such as `/etc/password`.
- Perform a checksum verification for the retrieved archive, but hard-coding the hashes may be cumbersome and difficult to manage.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'mindsdb'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.11.4.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/mindsdb/mindsdb/security/advisories/GHSA-7x45-phmr-9wqp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23522'}, {'type': 'PACKAGE', 'url': 'https://github.com/mindsdb/mindsdb'}, {'type': 'WEB', 'url': 'https://github.com/mindsdb/mindsdb/blob/69c76e727b8067f32b06ab83bb835a8c416c4f21/mindsdb/interfaces/storage/fs.py'}, {'type': 'WEB', 'url': 'https://github.com/mindsdb/mindsdb/blob/69c76e727b8067f32b06ab83bb835a8c416c4f21/mindsdb/interfaces/storage/fs.py#L128..L129'}, {'type': 'WEB', 'url': 'https://github.com/mindsdb/mindsdb/releases/tag/v22.11.4.3'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-30T20:16:33Z', 'nvd_published_at': '2023-03-30T19:15:00Z'}
|
1.4.0
|
GHSA-wg4w-5m5r-w3p8
|
2023-04-07T22:45:23Z
|
2023-03-31T21:30:38Z
| null |
['CVE-2023-27162']
|
OpenAPI Generator vulnerable to Server-Side Request Forgery
|
openapi-generator up to v6.4.0 was discovered to contain a Server-Side Request Forgery (SSRF) via the component `/api/gen/clients/{language}`. This vulnerability allows attackers to access network resources and sensitive information via a crafted API request.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.openapitools:openapi-generator-project'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.4.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27162'}, {'type': 'WEB', 'url': 'https://gist.github.com/b33t1e/6121210ebd9efd4f693c73b830d8ab08'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenAPITools/openapi-generator'}, {'type': 'WEB', 'url': 'https://notes.sjtu.edu.cn/s/2_yki_2Xq'}, {'type': 'WEB', 'url': 'http://openapi-generator.com'}]
|
{'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-31T22:44:19Z', 'nvd_published_at': '2023-03-31T20:15:00Z'}
|
1.4.0
|
GHSA-ppjr-267j-5p9x
|
2023-07-19T19:19:42Z
|
2023-03-20T21:11:58Z
| null |
[]
|
NULL pointer derefernce in `stb_image`
|
A bug in error handling in the `stb_image` C library could cause a NULL pointer dereference when attempting to load an invalid or unsupported image file. This is fixed in version 0.2.5 and later of the `stb_image` Rust crate, by patching the C code to correctly handle NULL pointers.
|
[]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'stb_image'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.5'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/servo/rust-stb-image/pull/102'}, {'type': 'PACKAGE', 'url': 'https://github.com/servo/rust-stb-imag'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0021.html'}]
|
{'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-20T21:11:58Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-vq59-5x26-h639
|
2023-03-17T14:43:12Z
|
2023-03-17T14:43:12Z
| null |
['CVE-2023-28109']
|
Authorization Bypass Through User-Controlled Key play-with-docker
|
Impact
Give that CORS configuration was not correct, an attacker could use [play-with-docker.com](http://play-with-docker.com/) as an example, set origin header in http request as [evil-play-with-docker.com](http://evil-play-with-docker.com/), it will be echo in response header, which successfully bypass the CORS policy and retrieves basic user information.
Patches
It has been fixed in lastest version, Please upgrade to latest version
Workarounds
No, users have to upgrade version.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/play-with-docker/play-with-docker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/play-with-docker/play-with-docker/security/advisories/GHSA-vq59-5x26-h639'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28109'}, {'type': 'WEB', 'url': 'https://github.com/play-with-docker/play-with-docker/commit/ed82247c9ab7990ad76ec2bf1498c2b2830b6f1a'}, {'type': 'PACKAGE', 'url': 'https://github.com/play-with-docker/play-with-docker'}]
|
{'cwe_ids': ['CWE-639'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-17T14:43:12Z', 'nvd_published_at': '2023-03-16T17:15:00Z'}
|
1.4.0
|
GHSA-5fqv-mpj8-h7gm
|
2023-03-01T18:05:56Z
|
2023-03-01T18:05:56Z
| null |
[]
|
Lemur subject to insecure random generation
|
### Overview
Lemur was using insecure random generation for its example configuration file, as well as for some utilities.
### Impact
The potentially affected generated items include:
| Configuration item | Config option name (if applicable) | Documentation link (if applicable) | Rotation option | Code reference(s) |
| ----------- | ----------- | ----------- | ----------- |----------- |
| Flask session secret | `SECRET_KEY` | [Flask documentation](https://flask.palletsprojects.com/en/2.2.x/config/#SECRET_KEY) | Generate a new secret and place in config; all existing sessions will be invalidated | N/A, internal to Flask |
| Lemur token secret | `LEMUR_TOKEN_SECRET` | [Lemur's configuration documentation](https://lemur.readthedocs.io/en/latest/administration.html#configuration) | Generate a new secret and place in config; all existing JWTs will be invalidated and must be regenerated (including API keys) | [1](https://github.com/Netflix/lemur/blob/1b61194a936240103f3c23299f9512c2b7e0fd36/lemur/auth/service.py#L79), [2](https://github.com/Netflix/lemur/blob/1b61194a936240103f3c23299f9512c2b7e0fd36/lemur/auth/service.py#L105) |
| Lemur database encryption key | `LEMUR_ENCRYPTION_KEYS` | [Lemur's configuration documentation](https://lemur.readthedocs.io/en/latest/administration.html#configuration) | A new key can be generated and added to this list, but existing data encrypted with prior keys cannot be re-encrypted unless you write a custom re-encryption process | [1](https://github.com/Netflix/lemur/blob/3783fbeaa1645bbee022827f4f53ffb12dd65a61/lemur/utils.py#L58) |
| OAuth2 state token secret key | `OAUTH_STATE_TOKEN_SECRET` | [Lemur's configuration documentation](https://lemur.readthedocs.io/en/latest/administration.html#configuration) | Generate a new secret and place in config | [1](https://github.com/Netflix/lemur/blob/4b03baaf5544f167e78055bab15a903b1badf22b/lemur/auth/views.py#L267) |
| Randomly generated passphrases for openssl keystores | N/A, generated at runtime but persisted |N/A | Re-export all openssl keystores and replace them wherever they're in use | [1](https://github.com/Netflix/lemur/blob/2603776e5c0ac25fa0103ff1357dea391d880160/lemur/plugins/lemur_openssl/plugin.py#L129) |
| Initial password for LDAP users | N/A, generated at runtime but persisted | N/A | N/A, cannot be rotated* | [1](https://github.com/Netflix/lemur/blob/3783fbeaa1645bbee022827f4f53ffb12dd65a61/lemur/auth/ldap.py#L66) |
| Initial password for Ping/OAuth2 users | N/A, generated at runtime but persisted |N/A | N/A, cannot be rotated* | [1](https://github.com/Netflix/lemur/blob/4b03baaf5544f167e78055bab15a903b1badf22b/lemur/auth/views.py#L234) |
| Oauth2 nonce | N/A, short-lived runtime secret |N/A | N/A, rotation is not required (these are short-lived) | [1](https://github.com/Netflix/lemur/blob/4b03baaf5544f167e78055bab15a903b1badf22b/lemur/auth/views.py#L668) |
| Verisign certificate enrollment challenges | N/A, short-lived runtime secret | N/A | N/A, rotation is not required (these are short-lived) | [1](https://github.com/Netflix/lemur/blob/d4af5af99cd51016579f015d79df649c68a6ad15/lemur/plugins/lemur_verisign/plugin.py#L107) |
If your deployment of Lemur is using any of the above config secrets that were _generated by Lemur's example config_ (i.e., generated using insecure randomness), you should rotate those config secrets. If you generated your config secrets in a more secure way, they are not known to be compromised, but you should still upgrade Lemur to ensure that you receive code fixes for the runtime-generated secrets.
For general information and guidance on Lemur secret configuration, see [Lemur's configuration documentation](https://lemur.readthedocs.io/en/latest/administration.html#configuration), which includes information on many of the configuration options listed above.
*For the user passwords: Even though these users are configured to use SSO, they do get generated with valid database passwords that can be used to log in. Since Lemur doesn't have an option to change passwords (#3888), one option for rotating them would be to directly modify the value in the database to some other unguessable string (you do not need to know the plaintext password since it won't be used).
### Patches
The patch is available in v1.3.2.
### Workarounds
No workarounds are available.
### References
N/A
|
[]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'lemur'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/Netflix/lemur/security/advisories/GHSA-5fqv-mpj8-h7gm'}, {'type': 'WEB', 'url': 'https://github.com/Netflix/lemur/issues/3888'}, {'type': 'WEB', 'url': 'https://github.com/Netflix/lemur/commit/666d853212174ee7f4e6f8b3b4b389ede1872238'}, {'type': 'PACKAGE', 'url': 'https://github.com/Netflix/lemur'}, {'type': 'WEB', 'url': 'https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2023-001.md'}]
|
{'cwe_ids': ['CWE-330'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-03-01T18:05:56Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-p8p7-x288-28g6
|
2023-08-14T20:53:46Z
|
2023-03-16T15:30:19Z
| null |
['CVE-2023-28155']
|
Server-Side Request Forgery in Request
|
The `request` package through 2.88.2 for Node.js and the `@cypress/request` package prior to 3.0.0 allow a bypass of SSRF mitigations via an attacker-controller server that does a cross-protocol redirect (HTTP to HTTPS, or HTTPS to HTTP).
NOTE: The `request` package is no longer supported by the maintainer.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'request'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.88.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@cypress/request'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.88.12'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28155'}, {'type': 'WEB', 'url': 'https://github.com/request/request/issues/3442'}, {'type': 'WEB', 'url': 'https://github.com/cypress-io/request/pull/28'}, {'type': 'WEB', 'url': 'https://github.com/github/advisory-database/pull/2500'}, {'type': 'WEB', 'url': 'https://github.com/request/request/pull/3444'}, {'type': 'WEB', 'url': 'https://github.com/cypress-io/request/commit/c5bcf21d40fb61feaff21a0e5a2b3934a440024f'}, {'type': 'WEB', 'url': 'https://doyensec.com/resources/Doyensec_Advisory_RequestSSRF_Q12023.pdf'}, {'type': 'WEB', 'url': 'https://github.com/cypress-io/request/blob/master/lib/redirect.js#L116'}, {'type': 'WEB', 'url': 'https://github.com/cypress-io/request/releases/tag/v3.0.0'}, {'type': 'PACKAGE', 'url': 'https://github.com/request/request'}, {'type': 'WEB', 'url': 'https://github.com/request/request/blob/master/lib/redirect.js#L111'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230413-0007/'}]
|
{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-16T18:33:48Z', 'nvd_published_at': '2023-03-16T15:15:00Z'}
|
1.4.0
|
GHSA-j3rg-3rgm-537h
|
2023-03-06T01:44:06Z
|
2023-03-03T23:07:35Z
| null |
['CVE-2023-26492']
|
Directus vulnerable to Server-Side Request Forgery On File Import
|
### Summary
Directus versions <=9.22.4 is vulnerable to Server-Side Request Forgery (SSRF) when importing a file from a remote web server (POST to `/files/import`). An attacker can bypass the security controls that were implemented to patch vulnerability [CVE-2022-23080](https://security.snyk.io/vuln/SNYK-JS-DIRECTUS-2934713) by performing a [DNS rebinding attack](https://en.wikipedia.org/wiki/DNS_rebinding) and view sensitive data from internal servers or perform a local port scan (eg. can access internal metadata API for AWS at `http://169.254.169.254` event if `169.254.169.254` is in the deny IP list).
### Details
DNS rebinding attacks work by running a DNS name server that resolves two different IP addresses when a domain is resolved simultaneously. This type of attack can be exploited to bypass the IP address deny list validation that was added to [`/api/src/services/file.ts`](https://github.com/directus/directus/blob/main/api/src/services/files.ts) for the function `importOne` to mitigate the previous SSRF vulnerability [CVE-2022-23080](https://security.snyk.io/vuln/SNYK-JS-DIRECTUS-2934713). The validation in [`/api/src/services/file.ts`](https://github.com/directus/directus/blob/main/api/src/services/files.ts) first checks if the resolved IP address for a domain name does not a resolve to an IP address in the deny list:
```js
let ip = resolvedUrl.hostname;
if (net.isIP(ip) === 0) {
try {
ip = (await lookupDNS(ip)).address;
} catch (err: any) {
logger.warn(err, `Couldn't lookup the DNS for url ${importURL}`);
throw new ServiceUnavailableException(`Couldn't fetch file from url "${importURL}"`, {
service: 'external-file',
});
}
}
if (env.IMPORT_IP_DENY_LIST.includes('0.0.0.0')) {
const networkInterfaces = os.networkInterfaces();
for (const networkInfo of Object.values(networkInterfaces)) {
if (!networkInfo) continue;
for (const info of networkInfo) {
if (info.address === ip) {
logger.warn(`Requested URL ${importURL} resolves to localhost.`);
throw new ServiceUnavailableException(`Couldn't fetch file from url "${importURL}"`, {
service: 'external-file',
});
}
}
}
}
if (env.IMPORT_IP_DENY_LIST.includes(ip)) {
logger.warn(`Requested URL ${importURL} resolves to a denied IP address.`);
throw new ServiceUnavailableException(`Couldn't fetch file from url "${importURL}"`, {
service: 'external-file',
});
}
```
Once it validates that the resolved IP address is not in the deny list, then it uses `axios` to `GET` the url and saves the response content.
```js
try {
fileResponse = await axios.get<Readable>(encodeURL(importURL), {
responseType: 'stream',
});
} catch (err: any) {
logger.warn(err, `Couldn't fetch file from url "${importURL}"`);
throw new ServiceUnavailableException(`Couldn't fetch file from url "${importURL}"`, {
service: 'external-file',
});
}
```
However, this validation check and fetching the web resource causes to DNS queries that enable a DNS rebinding attack. On the first DNS query, an attacker controlled name server can be configured to resolve to an external IP address that is not in the deny list to bypass the validation. Then when `axios` is called, the name server resolves the domain name to a local IP address.
### PoC
To demonstrate we will be using an online tool named [rebinder](https://lock.cmpxchg8b.com/rebinder.html). Rebinder randomly changes the IP address it resolves to depending on the subdomain. For an example, `7f000001.8efa468e.rbndr.us` can resolve to either `142.250.70.142` (google.com) or **`127.0.0.1`**. Sending multiple `POST` requests to `/files/import` using this domain will eventually cause a resolution to `142.250.70.142` first to bypass the validation then fetch the sensitive from an internal server when `axios` is called.
The following screenshots show what it looks like when a successful attack occurs.
*Downloading a file named `secret.txt` from a webserver running from `http://127.0.0.1/secret.txt`*

*Receiving the request from the internal server. Note that the incoming connection is from **127.0.0.1**.*

*After downloading the file it leaks the content of the secret file.*

### Impact
An attacker can exploit this vulnerability to access highly sensitive internal server and steal sensitive information. An example is on Cloud Environments that utilise internal APIs for managing machine and privileges. For an example, if `directus` is hosted on AWS EC2 instance and has an IAM role assigned to the EC2 instance then an attacker can exploit this vulnerability to steal the AWS access keys to impersonate the EC2 instance using the AWS API.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'directus'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.23.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/directus/directus/security/advisories/GHSA-j3rg-3rgm-537h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26492'}, {'type': 'WEB', 'url': 'https://github.com/directus/directus/commit/ff53d3e69a602d05342e15d9bb616884833ddbff'}, {'type': 'PACKAGE', 'url': 'https://github.com/directus/directus'}, {'type': 'WEB', 'url': 'https://github.com/directus/directus/releases/tag/v9.23.0'}]
|
{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T23:07:35Z', 'nvd_published_at': '2023-03-03T22:15:00Z'}
|
1.4.0
|
GHSA-hp8m-g55r-9cfq
|
2023-04-06T22:56:41Z
|
2023-03-31T03:30:31Z
| null |
['CVE-2023-1755']
|
phpMyFAQ Cross-site Scripting vulnerability
|
Cross-site Scripting (XSS) - Generic in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.12'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1755'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/2156573100fd3abf4c65270def77aed20ffc8994'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpmyfaq'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/882ffa07-5397-4dbb-886f-4626859d711a'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-31T22:42:53Z', 'nvd_published_at': '2023-03-31T01:15:00Z'}
|
1.4.0
|
GHSA-493p-pfq6-5258
|
2023-07-06T19:35:56Z
|
2023-03-23T20:32:03Z
| null |
['CVE-2023-1370']
|
json-smart Uncontrolled Recursion vulnerabilty
|
### Impact
Affected versions of [net.minidev:json-smart](https://github.com/netplex/json-smart-v1) are vulnerable to Denial of Service (DoS) due to a StackOverflowError when parsing a deeply nested JSON array or object.
When reaching a ‘[‘ or ‘{‘ character in the JSON input, the code parses an array or an object respectively. It was discovered that the 3PP does not have any limit to the nesting of such arrays or objects. Since the parsing of nested arrays and objects is done recursively, nesting too many of them can cause stack exhaustion (stack overflow) and crash the software.
### Patches
This vulnerability was fixed in json-smart version 2.4.9, but the maintainer recommends upgrading to 2.4.10, due to a remaining bug.
### Workarounds
N/A
### References
- https://www.cve.org/CVERecord?id=CVE-2023-1370
- https://nvd.nist.gov/vuln/detail/CVE-2023-1370
- https://security.snyk.io/vuln/SNYK-JAVA-NETMINIDEV-3369748
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'net.minidev:json-smart'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.9'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/oswaldobapvicjr/jsonmerge/security/advisories/GHSA-493p-pfq6-5258'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1370'}, {'type': 'WEB', 'url': 'https://github.com/netplex/json-smart-v2/issues/137'}, {'type': 'WEB', 'url': 'https://github.com/netplex/json-smart-v2/commit/5b3205d051952d3100aa0db1535f6ba6226bd87a'}, {'type': 'WEB', 'url': 'https://github.com/netplex/json-smart-v2/commit/e2791ae506a57491bc856b439d706c81e45adcf8'}, {'type': 'PACKAGE', 'url': 'https://github.com/oswaldobapvicjr/jsonmerge'}, {'type': 'WEB', 'url': 'https://research.jfrog.com/vulnerabilities/stack-exhaustion-in-json-smart-leads-to-denial-of-service-when-parsing-malformed-json-xray-427633/'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JAVA-NETMINIDEV-3369748'}, {'type': 'WEB', 'url': 'https://www.cve.org/CVERecord?id=CVE-2023-1370'}]
|
{'cwe_ids': ['CWE-674'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-23T20:32:03Z', 'nvd_published_at': '2023-03-22T06:15:00Z'}
|
1.4.0
|
GHSA-8gg8-wr4j-v2wr
|
2023-03-28T02:42:24Z
|
2023-03-22T21:30:16Z
| null |
['CVE-2022-45003']
|
Gophish vulnerable to Denial of Service via crafted payload involving autofocus
|
Gophish through 0.12.1 allows attackers to cause a Denial of Service (DoS) via a crafted payload involving autofocus.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/gophish/gophish'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.12.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45003'}, {'type': 'PACKAGE', 'url': 'https://github.com/gophish/gophish'}, {'type': 'WEB', 'url': 'https://github.com/gophish/gophish/releases/tag/v0.12.1'}, {'type': 'WEB', 'url': 'https://pastebin.com/z5MD3z8c'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-22T22:22:07Z', 'nvd_published_at': '2023-03-22T21:15:00Z'}
|
1.4.0
|
GHSA-cqvm-j2r2-hwpg
|
2023-03-17T14:42:45Z
|
2023-03-17T14:42:45Z
| null |
['CVE-2023-28113']
|
russh may use insecure Diffie-Hellman keys
|
### Summary
Diffie-Hellman key validation is insufficient, which can lead to insecure shared secrets and therefore breaks confidentiality.
### Details
Russh does not validate Diffie-Hellman keys.
It accepts received DH public keys $e$ where $e<0$, $e=1$, or $e \geq p-1$ from a misbehaving peer annd successfully performs key exchange.
This is a violation of [RFC 4253, section 8](https://www.rfc-editor.org/rfc/rfc4253#section-8) and [RFC 8268, section 4](https://www.rfc-editor.org/rfc/rfc8268#section-4), which state that:
>DH Public Key values MUST be checked and both conditions:
>
> - $1 < e < p-1$
> - $1 < f < p-1$
>
> MUST be true. Values not within these bounds MUST NOT be sent or
> accepted by either side. If either one of these conditions is
> violated, then the key exchange fails.
For example, a DH client public key $e=1$ would mean that the shared secret that the server calculates is always $K = e^y \mod{p} = 1^y \mod{p} = 1$.
In other cases, an insecure order-2 subgroup may be used.
Also, the code does not look like it ensures that the generated secret key $y$ is in the valid interval $0 < y < q$ (or, if russh is the client, that the secret key $x$ satisfies $1 < x < q$):
https://github.com/warp-tech/russh/blob/master/russh/src/kex/dh/groups.rs#L72-L76
For example, `rng.gen_biguint()` might return a number consisting of zeroes, so that $y = 0$.
The public key is not validated either:
https://github.com/warp-tech/russh/blob/master/russh/src/kex/dh/groups.rs#L78-L81
### Impact
Due to the issues in the DH key generation, I think any connection that uses Diffie-Hellman key exchange is affected.
Connections between a russh client and server or those of a russh peer with some other misbehaving peer are most likely to be problematic. These may vulnerable to eavesdropping.
Most other implementations reject such keys, so this is mainly an interoperability issue in such a case.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'russh'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.36.2'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'russh'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.37.0'}, {'fixed': '0.37.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/warp-tech/russh/security/advisories/GHSA-cqvm-j2r2-hwpg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28113'}, {'type': 'WEB', 'url': 'https://github.com/warp-tech/russh/commit/45d2d82930bf4a675bd57abfafec8fe4065befcd'}, {'type': 'WEB', 'url': 'https://github.com/warp-tech/russh/commit/d831a3716d3719dc76f091fcea9d94bd4ef97c6e'}, {'type': 'PACKAGE', 'url': 'https://github.com/warp-tech/russh'}, {'type': 'WEB', 'url': 'https://github.com/warp-tech/russh/blob/master/russh/src/kex/dh/groups.rs#L72-L76'}, {'type': 'WEB', 'url': 'https://github.com/warp-tech/russh/blob/master/russh/src/kex/dh/groups.rs#L78-L81'}, {'type': 'WEB', 'url': 'https://github.com/warp-tech/russh/releases/tag/v0.36.2'}, {'type': 'WEB', 'url': 'https://github.com/warp-tech/russh/releases/tag/v0.37.1'}]
|
{'cwe_ids': ['CWE-20', 'CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-17T14:42:45Z', 'nvd_published_at': '2023-03-16T21:15:00Z'}
|
1.4.0
|
GHSA-933g-v89r-x8pf
|
2023-03-14T19:59:10Z
|
2023-03-08T12:30:16Z
| null |
['CVE-2023-23638']
|
Apache Dubbo vulnerable to Deserialization of Untrusted Data
|
A deserialization vulnerability existed when dubbo generic invoke, which could lead to malicious code execution. This issue affects Apache Dubbo 2.7.x version 2.7.21 and prior versions; Apache Dubbo 3.0.x version 3.0.13 and prior versions; Apache Dubbo 3.1.x version 3.1.5 and prior versions.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.22'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.7.21'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.13'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.5'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23638'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/8h6zscfzj482z512d2v5ft63hdhzm0cb'}]
|
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-08T17:23:36Z', 'nvd_published_at': '2023-03-08T11:15:00Z'}
|
1.4.0
|
GHSA-vfgq-g5x8-g595
|
2023-03-23T22:09:19Z
|
2023-03-23T19:58:23Z
| null |
['CVE-2023-28436']
|
Non-interactive Tailscale SSH sessions on FreeBSD may use the effective group ID of the tailscaled process
|
A vulnerability identified in the implementation of Tailscale SSH in FreeBSD allowed commands to be run with a higher privilege group ID than that specified by Tailscale SSH access rules.
**Affected platforms**: FreeBSD
**Patched Tailscale client versions**: v1.38.2 or later
### What happened?
A difference in the behavior of the FreeBSD `setgroups` system call from POSIX meant that the Tailscale client running on a FreeBSD-based operating system did not appropriately restrict groups on the host when using Tailscale SSH. When accessing a FreeBSD host over Tailscale SSH, the egid of the tailscaled process was used instead of that of the user specified in Tailscale SSH access rules.
### Who is affected?
9 tailnets with 22 FreeBSD nodes running Tailscale SSH since Tailscale v1.34 (released on 2022-12-04) may have had Tailscale SSH sessions with a higher privilege group ID than that specified in Tailscale SSH access rules.
We have notified the affected organizations where we have [security contacts](https://tailscale.com/kb/1224/contact-preferences/#setting-the-security-issues-email).
### What is the impact?
Tailscale SSH commands may have been run with a higher privilege group ID than that specified in Tailscale SSH access rules if they met all of the following criteria:
* The destination node was a FreeBSD device with Tailscale SSH enabled;
* Tailscale SSH access rules permitted access for non-root users; and
* A non-interactive SSH session was used.
### What do I need to do?
If you are running Tailscale on FreeBSD, upgrade to v1.38.2 or later to remediate the issue. Admins of a tailnet can view [FreeBSD nodes with unpatched versions](https://login.tailscale.com/admin/machines?q=version%3A%3C1.38.2+freebsd) in the admin console.
To update the local ports tree in advance of what's available upstream, you can:
1. `cd /usr/ports/security/tailscale`
2. edit the Makefile to set `PORTVERSION` to `1.38.2`
3. `make makesum`
4. `make install`
Tailscale SSH on other platforms is not affected.
### Credits
We would like to thank [Ryan Belgrave](https://www.linkedin.com/in/rbelgrave/) for reporting this issue.
### References
* [TS-2023-003](https://tailscale.com/security-bulletins/#ts-2023-003)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:A/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'tailscale.com'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.34.0'}, {'fixed': '1.38.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/tailscale/tailscale/security/advisories/GHSA-vfgq-g5x8-g595'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28436'}, {'type': 'WEB', 'url': 'https://github.com/tailscale/tailscale/commit/d00c046b723dff6e3775d7d35f891403ac21a47d'}, {'type': 'PACKAGE', 'url': 'https://github.com/tailscale/tailscale'}, {'type': 'WEB', 'url': 'https://github.com/tailscale/tailscale/releases/tag/v1.38.2'}, {'type': 'WEB', 'url': 'https://tailscale.com/security-bulletins/#ts-2023-003'}]
|
{'cwe_ids': ['CWE-269'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-23T19:58:23Z', 'nvd_published_at': '2023-03-23T20:15:00Z'}
|
1.4.0
|
GHSA-h2wg-83fc-xvm9
|
2023-03-27T22:10:46Z
|
2023-03-21T06:30:17Z
| null |
['CVE-2023-1541']
|
Answer vulnerable to Business Logic Errors
|
Business Logic Errors in GitHub repository answerdev/answer prior to 1.0.6.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.6'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1541'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/15390adbfcd5fd37af4661f992f8873ae5a6b840'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8fd891c6-b04e-4dac-818f-9ea30861cd92'}]
|
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-03-21T22:32:42Z', 'nvd_published_at': '2023-03-21T05:15:00Z'}
|
1.4.0
|
GHSA-gf97-q72m-7579
|
2023-03-30T22:19:29Z
|
2023-03-24T21:54:31Z
| null |
['CVE-2023-25674']
|
TensorFlow has Null Pointer Error in RandomShuffle with XLA enable
|
### Impact
NPE in RandomShuffle with XLA enable
```python
import tensorflow as tf
func = tf.raw_ops.RandomShuffle
para = {'value': 1e+20, 'seed': -4294967297, 'seed2': -2147483649}
@tf.function(jit_compile=True)
def test():
y = func(**para)
return y
test()
```
### Patches
We have patched the issue in GitHub commit [728113a3be690facad6ce436660a0bc1858017fa](https://github.com/tensorflow/tensorflow/commit/728113a3be690facad6ce436660a0bc1858017fa).
The fix will be included in TensorFlow 2.12.0. We will also cherrypick this commit on TensorFlow 2.11.1
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by r3pwnx
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gf97-q72m-7579'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25674'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/728113a3be690facad6ce436660a0bc1858017fa'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]
|
{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-24T21:54:31Z', 'nvd_published_at': '2023-03-25T00:15:00Z'}
|
1.4.0
|
GHSA-fxgc-95xx-grvq
|
2023-09-01T15:23:50Z
|
2023-03-27T21:05:10Z
| null |
['CVE-2023-25661']
|
TensorFlow Denial of Service vulnerability
|
### Impact
A malicious invalid input crashes a tensorflow model (Check Failed) and can be used to trigger a denial of service attack.
To minimize the bug, we built a simple single-layer TensorFlow model containing a Convolution3DTranspose layer, which works well with expected inputs and can be deployed in real-world systems. However, if we call the model with a malicious input which has a zero dimension, it gives Check Failed failure and crashes.
```python
import tensorflow as tf
class MyModel(tf.keras.Model):
def __init__(self):
super().__init__()
self.conv = tf.keras.layers.Convolution3DTranspose(2, [3,3,3], padding="same")
def call(self, input):
return self.conv(input)
model = MyModel() # Defines a valid model.
x = tf.random.uniform([1, 32, 32, 32, 3], minval=0, maxval=0, dtype=tf.float32) # This is a valid input.
output = model.predict(x)
print(output.shape) # (1, 32, 32, 32, 2)
x = tf.random.uniform([1, 32, 32, 0, 3], dtype=tf.float32) # This is an invalid input.
output = model(x) # crash
```
This Convolution3DTranspose layer is a very common API in modern neural networks. The ML models containing such vulnerable components could be deployed in ML applications or as cloud services. This failure could be potentially used to trigger a denial of service attack on ML cloud services.
### Patches
We have patched the issue in
- GitHub commit [948fe6369a5711d4b4568ea9bbf6015c6dfb77e2](https://github.com/tensorflow/tensorflow/commit/948fe6369a5711d4b4568ea9bbf6015c6dfb77e2)
- GitHub commit [85db5d07db54b853484bfd358c3894d948c36baf](https://github.com/keras-team/keras/commit/85db5d07db54b853484bfd358c3894d948c36baf).
The fix will be included in TensorFlow 2.12.0. We will also cherrypick this commit on TensorFlow 2.11.1
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fxgc-95xx-grvq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25661'}, {'type': 'WEB', 'url': 'https://github.com/keras-team/keras/commit/85db5d07db54b853484bfd358c3894d948c36baf'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/948fe6369a5711d4b4568ea9bbf6015c6dfb77e2'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]
|
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-27T21:05:10Z', 'nvd_published_at': '2023-03-27T20:15:00Z'}
|
1.4.0
|
GHSA-859x-p6jp-rc2w
|
2023-03-03T22:54:19Z
|
2023-03-03T22:54:19Z
| null |
['CVE-2023-26056']
|
xwiki contains Incorrect Authorization
|
### Impact
It's possible to execute a script with the right of another user (provided the target user does not have programming right).
For example, the following:
```
{{context document="xwiki:XWiki.userwithscriptright" transformationContext="document"}}{{velocity}}Hello from Velocity!{{/velocity}}{{/context}}
```
written by a user not having script right (for example in the user's profile) should produce an error (the user is not allowed to write scripts). However, because of the vulnerability, if the author of the document "xwiki:XWiki.userwithscriptright" has script right (but not programming right) the script will be executed with as if it was written by the target user.
### Patches
The problem has been patched in XWiki 14.8RC1, 14.4.5 and 13.10.10.
### Workarounds
There's no workaround for this issue.
### References
https://jira.xwiki.org/browse/XWIKI-19856
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [JIRA](https://jira.xwiki.org)
* Email us at [security ML](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-rendering-macro-context'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0-milestone-1'}, {'fixed': '13.10.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-rendering-macro-context'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0-rc-1'}, {'fixed': '14.4.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-rendering-macro-context'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.8-rc-1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-859x-p6jp-rc2w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26056'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/4b75f212c2dd2dfc5fb5726c7830c6dbc9a425c6'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/bd34ad6710ed72304304a3d5fec38b7cc050ef3b'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/dd3f4735b41971b3afc3f3aedf6664b4e8be4894'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-19856'}]
|
{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T22:54:19Z', 'nvd_published_at': '2023-03-02T19:15:00Z'}
|
1.4.0
|
GHSA-hc6q-2mpp-qw7j
|
2023-03-14T15:03:08Z
|
2023-03-13T03:30:15Z
| null |
['CVE-2023-28154']
|
Cross-realm object access in Webpack 5
|
Webpack 5 before 5.76.0 does not avoid cross-realm object access. ImportParserPlugin.js mishandles the magic comment feature. An attacker who controls a property of an untrusted object can obtain access to the real global object.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'webpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.76.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28154'}, {'type': 'WEB', 'url': 'https://github.com/webpack/webpack/pull/16500'}, {'type': 'WEB', 'url': 'https://github.com/webpack/webpack/compare/v5.75.0...v5.76.0'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-14T15:03:08Z', 'nvd_published_at': '2023-03-13T01:15:00Z'}
|
1.4.0
|
GHSA-ff4p-7xrq-q5r8
|
2023-03-09T00:10:53Z
|
2023-03-09T00:10:53Z
| null |
['CVE-2023-26489']
|
wasmtime vulnerable to guest-controlled out-of-bounds read/write on x86_64
|
### Impact
Wasmtime's code generator, Cranelift, has a bug on x86_64 targets where address-mode computation mistakenly would calculate a 35-bit effective address instead of WebAssembly's defined 33-bit effective address. This bug means that, with default codegen settings, a wasm-controlled load/store operation could read/write addresses up to 35 bits away from the base of linear memory. Wasmtime's default sandbox settings provide up to 6G of protection from the base of linear memory to guarantee that any memory access in that range will be semantically correct. Due to this bug, however, addresses up to `0xffffffff * 8 + 0x7ffffffc = 36507222004 = ~34G` bytes away from the base of linear memory are possible from guest code. This means that the virtual memory 6G away from the base of linear memory up to ~34G away can be read/written by a malicious module.
This out of bounds read/write is not semantically correct and poses a threat as an arbitrary read/write within ~34G of linear memory away from the base of a wasm module's linear memory. A guest module can, without the knowledge of the embedder, read/write memory in this region. The memory may belong to other WebAssembly instances when using the pooling allocator, for example. The memory may also belong to the embedder, depending on address layout.
Embedders do not have a necessarily reliable means of detecting when this happens. Wasm loads/stores are allowed to cause machine segfaults meaning that an invalid read/write would be translated to a nominal WebAssembly trap. This means that a malicious module in the worst case silently reads/writes memory outside its bounds and in the "best" case looks like a normal "something trapped here" during its execution. This makes it difficult to retroactively determine whether this bug has been exploited on hosts. Affected embedders are recommended to analyze preexisting wasm modules to see if they're affected by the incorrect codegen rules and possibly correlate that with an anomalous number of traps during historical execution to locate possibly suspicious modules.
The specific bug in Cranelift's x86_64 backend is that a WebAssembly address which is left-shifted by a constant amount from 1 to 3 will get folded into x86_64's addressing modes which perform shifts. For example `(i32.load (i32.shl (local.get 0) (i32.const 3)))` loads from the WebAssembly address `$local0 << 3`. When translated to Cranelift the `$local0 << 3` computation, a 32-bit value, is zero-extended to a 64-bit value and then added to the base address of linear memory. Cranelift would generate an instruction of the form `movl (%base, %local0, 8), %dst` which calculates `%base + %local0 << 3`. The bug here, however, is that the address computation happens with 64-bit values, where the `$local0 << 3` computation was supposed to be truncated to a 32-bit value. This means that `%local0`, which can use up to 32-bits for an address, gets 3 extra bits of address space to be accessible via this `movl` instruction.
The fix in Cranelift is to remove the erroneous lowering rules in the backend which handle these zero-extended expressions. The above example is then translated to `movl %local0, %temp; shl $3, %temp; movl (%base, %temp), %dst` which correctly truncates the intermediate computation of `%local0 << 3` to 32-bits inside the `%temp` register which is then added to the `%base` value.
### Patches
Wasmtime version 4.0.1, 5.0.1, and 6.0.1 have been released and have all been patched to no longer contain the erroneous lowering rules.
### Workarounds
While updating Wasmtime is recommended, there are a number of possible workarounds that embedders can employ to mitigate this issue if updating is not possible. Note that none of these workarounds are on-by-default and require explicit configuration:
* The `Config::static_memory_maximum_size(0)` option can be used to force all accesses to linear memory to be explicitly bounds-checked. This will perform a bounds check separately from the address-mode computation which correctly calculates the effective address of a load/store. Note that this can have a large impact on the execution performance of WebAssembly modules.
* The `Config::static_memory_guard_size(1 << 36)` option can be used to greatly increase the guard pages placed after linear memory. This will guarantee that memory accesses up-to-34G away are guaranteed to be semantically correct by reserving unmapped memory for the instance. Note that this reserves a very large amount of virtual memory per-instances and can greatly reduce the maximum number of concurrent instances being run.
* If using a non-x86_64 host is possible, then that will also work around this bug. This bug does not affect Wasmtime's or Cranelift's AArch64 backend, for example.
### References
* [`Config::static_memory_maximum_size`](https://docs.rs/wasmtime/latest/wasmtime/struct.Config.html#method.static_memory_maximum_size)
* [`Config::static_memory_guard_size`](https://docs.rs/wasmtime/latest/wasmtime/struct.Config.html#method.static_memory_guard_size)
* [Mailing list announcement](https://groups.google.com/a/bytecodealliance.org/g/sec-announce/c/Mov-ItrNJsQ)
* [GitHub advisory](https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-ff4p-7xrq-q5r8)
* [Commit to fix this issue on Wasmtime's `main` branch](https://github.com/bytecodealliance/wasmtime/commit/63fb30e4b4415455d47b3da5a19d79c12f4f2d1f)
### For more information
If you have any questions or comments about this advisory:
* Reach out to us on [the Bytecode Alliance Zulip chat](https://bytecodealliance.zulipchat.com/#narrow/stream/217126-wasmtime)
* Open an issue in [the bytecodealliance/wasmtime repository](https://github.com/bytecodealliance/wasmtime/)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'wasmtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.37.0'}, {'fixed': '4.0.1'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'wasmtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.1'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'wasmtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.1'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'cranelift-codegen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.84.0'}, {'fixed': '0.91.1'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'cranelift-codegen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.92.0'}, {'fixed': '0.92.1'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'cranelift-codegen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.93.0'}, {'fixed': '0.93.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-ff4p-7xrq-q5r8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26489'}, {'type': 'WEB', 'url': 'https://github.com/bytecodealliance/wasmtime/commit/63fb30e4b4415455d47b3da5a19d79c12f4f2d1f'}, {'type': 'WEB', 'url': 'https://docs.rs/wasmtime/latest/wasmtime/struct.Config.html#method.static_memory_guard_size'}, {'type': 'WEB', 'url': 'https://docs.rs/wasmtime/latest/wasmtime/struct.Config.html#method.static_memory_maximum_size'}, {'type': 'PACKAGE', 'url': 'https://github.com/bytecodealliance/wasmtime'}, {'type': 'WEB', 'url': 'https://groups.google.com/a/bytecodealliance.org/g/sec-announce/c/Mov-ItrNJsQ'}]
|
{'cwe_ids': ['CWE-125', 'CWE-787'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-09T00:10:53Z', 'nvd_published_at': '2023-03-08T20:15:00Z'}
|
1.4.0
|
GHSA-47pj-q2vm-46xc
|
2023-03-24T19:40:25Z
|
2023-03-18T06:30:15Z
| null |
['CVE-2023-26113']
|
Collection.js vulnerable to Prototype Pollution
|
Versions of the package collection.js before 6.8.1 are vulnerable to Prototype Pollution via the `extend` function in `Collection.js/dist/node/iterators/extend.js`.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'collection.js'}, 'ecosystem_specific': {'affected_functions': ['collection.js.extend']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.8.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26113'}, {'type': 'WEB', 'url': 'https://github.com/kobezzza/Collection/issues/27'}, {'type': 'WEB', 'url': 'https://github.com/kobezzza/Collection/commit/d3d937645f62f37d3115d6aa90bb510fd856e6a2'}, {'type': 'PACKAGE', 'url': 'https://github.com/kobezzza/Collection'}, {'type': 'WEB', 'url': 'https://github.com/kobezzza/Collection/blob/be32c48e68f49d3be48a58e929d1ab8ff1d2d19c/dist/node/iterators/extend.js%23L324'}, {'type': 'WEB', 'url': 'https://github.com/kobezzza/Collection/releases/tag/v6.8.1'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-COLLECTIONJS-3185148'}]
|
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-20T21:19:22Z', 'nvd_published_at': '2023-03-18T05:15:00Z'}
|
1.4.0
|
GHSA-69fc-v223-6rjw
|
2023-03-31T17:11:30Z
|
2023-03-29T18:30:29Z
|
2023-03-31T17:11:30Z
|
[]
|
Duplicate Advisory: Pimcore Cross-site scripting in Predefined Asset Metadata module in Settings
|
## Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of [GHSA-6qjm-39vh-729w](https://github.com/advisories/GHSA-6qjm-39vh-729w). This link is maintained ot preserve external references.
## Original Description
Cross-site Scripting (XSS) - Generic in GitHub repository pimcore/pimcore prior to 10.5.20.
|
[]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.20'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1702'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/2b997737dd6a60be2239a51dd6d9ef5881568e6d'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d8a47f29-3297-4fce-b534-e1d95a2b3e19'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-30T21:27:33Z', 'nvd_published_at': '2023-03-29T16:15:00Z'}
|
1.4.0
|
GHSA-2wcr-87wf-cf9j
|
2023-03-30T20:18:29Z
|
2023-03-30T20:18:29Z
| null |
['CVE-2023-27489']
|
Kiwi TCMS Stored Cross-site Scripting via SVG file
|
### Impact
Kiwi TCMS accepts SVG files uploaded by users which could potentially contain JavaScript code. If SVG images are viewed directly, i.e. not rendered in an HTML page, this JavaScript code could execute.
### Patches
This vulnerability has been fixed by configuring Kiwi TCMS to serve with the Content-Security-Policy HTTP header which blocks inline JavaScript in all modern browsers.
### Workarounds
Configure Content-Security-Policy header, see [commit 6617cee0](https://github.com/kiwitcms/Kiwi/commit/6617cee0fb70cc394b7be6bbc86ef84e6e9de077).
### References
You can visit https://digi.ninja/blog/svg_xss.php for more technical details.
Independently disclosed by [Antonio Spataro](https://huntr.dev/bounties/bf99001b-a0a2-4f7d-98cd-983bc7f14a69/) and [@1d8](https://huntr.dev/bounties/f8c73bcc-02f3-4c65-a92b-1caa4d67c2fd/).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'kiwitcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/kiwitcms/Kiwi/security/advisories/GHSA-2wcr-87wf-cf9j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27489'}, {'type': 'WEB', 'url': 'https://github.com/kiwitcms/Kiwi/commit/6617cee0fb70cc394b7be6bbc86ef84e6e9de077'}, {'type': 'PACKAGE', 'url': 'https://github.com/kiwitcms/Kiwi'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-30T20:18:29Z', 'nvd_published_at': '2023-03-29T19:15:00Z'}
|
1.4.0
|
GHSA-p756-rfxh-x63h
|
2023-03-07T20:07:27Z
|
2023-03-07T20:07:27Z
| null |
['CVE-2023-23939']
|
Azure/setup-kubectl: Escalation of privilege vulnerability for v3 and lower
|
### Impact
This vulnerability only impacts versions `v2` and lower. An insecure temporary creation of a file allows other actors on the Actions runner to replace the Kubectl binary created by this action because it is world writable. This Kubectl tool installer runs `fs.chmodSync(kubectlPath, 777)` to set permissions on the Kubectl binary, however, this allows any local user to replace the Kubectl binary. This allows privilege escalation to the user that can also run kubectl, most likely root. This attack is only possible if an attacker somehow breached the GitHub actions runner or if a user is utilizing an Action that maliciously executes this attack.
No impacted customers have been reported.
### Patches
This has been fixed and released in all versions `v3` and later. 755 permissions are used instead.
### Workarounds
If users absolutely cannot upgrade to `v3` or higher than they should be extra diligent of the other GitHub actions they are using in a workflow and ensure that their GitHub actions runner is secure.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'GitHub Actions', 'name': 'Azure/setup-kubectl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/Azure/setup-kubectl/security/advisories/GHSA-p756-rfxh-x63h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23939'}, {'type': 'WEB', 'url': 'https://github.com/Azure/setup-kubectl/commit/d449d75495d2b9d1463555bb00ca3dca77a42ab6'}, {'type': 'PACKAGE', 'url': 'https://github.com/Azure/setup-kubectl'}]
|
{'cwe_ids': ['CWE-732'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-03-07T20:07:27Z', 'nvd_published_at': '2023-03-06T19:15:00Z'}
|
1.4.0
|
GHSA-5mqj-xc49-246p
|
2023-03-22T21:49:43Z
|
2023-03-22T21:23:25Z
| null |
['CVE-2023-28119']
|
crewjam/saml vulnerable to Denial Of Service Via Deflate Decompression Bomb
|
Our use of flate.NewReader does not limit the size of the input. The user could pass more than 1 MB of data in the HTTP request to the processing functions, which will be decompressed server-side using the Deflate algorithm. Therefore, after repeating the same request multiple times, it is possible to achieve a reliable crash since the operating system kills the process.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/crewjam/saml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.13'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/crewjam/saml/security/advisories/GHSA-5mqj-xc49-246p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28119'}, {'type': 'WEB', 'url': 'https://github.com/crewjam/saml/commit/8e9236867d176ad6338c870a84e2039aef8a5021'}, {'type': 'PACKAGE', 'url': 'https://github.com/crewjam/saml'}]
|
{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-22T21:23:25Z', 'nvd_published_at': '2023-03-22T20:15:00Z'}
|
1.4.0
|
GHSA-6g43-88cp-w5gv
|
2023-03-29T19:34:25Z
|
2023-03-29T19:34:25Z
| null |
['CVE-2023-28103']
|
Prototype pollution in matrix-react-sdk
|
### Impact
In certain configurations, data sent by remote servers containing special strings in key locations could cause modifications of the `Object.prototype`, disrupting matrix-react-sdk functionality, causing denial of service and potentially affecting program logic.
(This is part 2, where [CVE-2022-36060](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36060) / [GHSA-2x9c-qwgf-94xr](https://github.com/matrix-org/matrix-react-sdk/security/advisories/GHSA-2x9c-qwgf-94xr) is part 1. Part 2 covers remaining vectors not covered by part 1, found in a codebase audit scheduled after part 1.)
### Patches
This is fixed in matrix-react-sdk 3.69.0
### Workarounds
None.
### References
- [Release blog post](https://matrix.org/blog/2023/03/28/security-releases-matrix-js-sdk-24-0-0-and-matrix-react-sdk-3-69-0)
- The advisory [GHSA-2x9c-qwgf-94xr](https://github.com/matrix-org/matrix-react-sdk/security/advisories/GHSA-2x9c-qwgf-94xr) ([CVE-2022-36060](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36060)) refers to an initial set of vulnerable locations discovered and patched in matrix-react-sdk 3.53.0. We opted not to disclose that advisory while we performed an audit of the codebase and are now disclosing it jointly with this one.
### For more information
If you have any questions or comments about this advisory please email us at [security at matrix.org](mailto:[email protected]).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'matrix-react-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.69.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-react-sdk/security/advisories/GHSA-2x9c-qwgf-94xr'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-react-sdk/security/advisories/GHSA-6g43-88cp-w5gv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28103'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/matrix-react-sdk'}, {'type': 'WEB', 'url': 'https://matrix.org/blog/2023/03/28/security-releases-matrix-js-sdk-24-0-0-and-matrix-react-sdk-3-69-0'}]
|
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-29T19:34:25Z', 'nvd_published_at': '2023-03-28T21:15:00Z'}
|
1.4.0
|
GHSA-r8qr-wwg3-2r85
|
2023-03-03T22:46:04Z
|
2023-03-03T22:46:04Z
| null |
['CVE-2023-26051']
|
Saleor has Staff-Authenticated Error Message Information Disclosure Vulnerability via Python Exceptions
|
### Impact
Some internal Python exceptions are not handled properly and thus are returned in API as error messages. Some messages might contain sensitive information like user email address in staff-authenticated requests.
This issue has been patched in versions 3.1.48, 3.7.59, 3.8.30, 3.9.27, 3.10.14 and 3.11.12.
### Workarounds
None
### For more information
If you have any questions or comments about this advisory:
* Open a discussion at https://github.com/saleor/saleor/discussions
* Email us at [[email protected]](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'Saleor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '3.1.48'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Saleor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11.0'}, {'fixed': '3.11.12'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Saleor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10.0'}, {'fixed': '3.10.14'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Saleor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.9.0'}, {'fixed': '3.9.27'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Saleor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.8.0'}, {'fixed': '3.8.30'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Saleor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.0'}, {'fixed': '3.7.59'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/saleor/saleor/security/advisories/GHSA-r8qr-wwg3-2r85'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26051'}, {'type': 'WEB', 'url': 'https://github.com/saleor/saleor/commit/31bce881ccccf0d79a9b14ecb6ca3138d1edeec1'}, {'type': 'PACKAGE', 'url': 'https://github.com/saleor/saleor'}, {'type': 'WEB', 'url': 'https://github.com/saleor/saleor/releases/tag/3.1.48'}, {'type': 'WEB', 'url': 'https://github.com/saleor/saleor/releases/tag/3.10.14'}, {'type': 'WEB', 'url': 'https://github.com/saleor/saleor/releases/tag/3.11.12'}, {'type': 'WEB', 'url': 'https://github.com/saleor/saleor/releases/tag/3.7.59'}, {'type': 'WEB', 'url': 'https://github.com/saleor/saleor/releases/tag/3.8.30'}, {'type': 'WEB', 'url': 'https://github.com/saleor/saleor/releases/tag/3.9.27'}]
|
{'cwe_ids': ['CWE-209'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T22:46:04Z', 'nvd_published_at': '2023-03-02T19:15:00Z'}
|
1.4.0
|
GHSA-35wf-3wq2-r3hx
|
2023-03-13T19:15:56Z
|
2023-03-07T00:30:25Z
| null |
['CVE-2021-36400']
|
Moodle has Incorrect Default Permissions
|
In Moodle, insufficient capability checks made it possible to remove other users' calendar URL subscriptions.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11.0-beta'}, {'fixed': '3.11.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10.0-beta'}, {'fixed': '3.10.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.8'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36400'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=424806'}]
|
{'cwe_ids': ['CWE-276', 'CWE-639'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-08T00:20:15Z', 'nvd_published_at': '2023-03-06T22:15:00Z'}
|
1.4.0
|
GHSA-8ccw-f83g-v7g3
|
2023-03-09T21:58:23Z
|
2023-03-05T21:30:14Z
| null |
['CVE-2023-0734']
|
Wallabag Improper Authorization vulnerability
|
Improper Authorization in GitHub repository wallabag/wallabag prior to 2.5.4.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'wallabag/wallabag'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0734'}, {'type': 'WEB', 'url': 'https://github.com/wallabag/wallabag/commit/acd285dcbb71b595e6320bb1d0d3a44cdf646ac0'}, {'type': 'PACKAGE', 'url': 'https://github.com/wallabag/wallabag/'}, {'type': 'WEB', 'url': 'https://github.com/wallabag/wallabag/releases/tag/2.5.4'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a296324c-6925-4f5f-a729-39b0d73d5b8b'}]
|
{'cwe_ids': ['CWE-285'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-07T20:13:40Z', 'nvd_published_at': '2023-03-05T21:15:00Z'}
|
1.4.0
|
GHSA-xc9p-r5qj-8xm9
|
2023-03-17T14:44:05Z
|
2023-03-17T14:44:05Z
| null |
['CVE-2023-28108']
|
Improper quoting of columns when calling methods "getByUuid" & "exists" on UUID Model
|
### Impact
The quoting is not done properly in UUID DAO model, so there's the theoretical possibility to inject custom SQL if the developer is using this methods with input data and not doing proper input validation in advance and so relies on the auto-quoting being done by the DAO class.
### Patches
Update to version 10.5.19 or apply this patch manually https://github.com/pimcore/pimcore/commit/08e7ba56ae983c3c67ec563b6989b16ef8f35275.patch
### Workarounds
Apply https://github.com/pimcore/pimcore/commit/08e7ba56ae983c3c67ec563b6989b16ef8f35275.patch manually.
### References
#14633
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.19'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-xc9p-r5qj-8xm9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28108'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/14633'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/08e7ba56ae983c3c67ec563b6989b16ef8f35275.patch'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-17T14:44:05Z', 'nvd_published_at': '2023-03-16T17:15:00Z'}
|
1.4.0
|
GHSA-6gc3-crp7-25w5
|
2023-03-13T19:16:19Z
|
2023-03-02T23:12:47Z
| null |
['CVE-2023-26483']
|
gosaml2 vulnerable to Denial Of Service Via Deflate Decompression Bomb
|
### Impact
SAML Service Providers using this library for SAML authentication support are likely susceptible to Denial of Service attacks. A bug in this library enables attackers to craft a `deflate`-compressed request which will consume significantly more memory during processing than the size of the original request. This may eventually lead to memory exhaustion and the process being killed.
### Mitigation
The maximum compression ratio achievable with `deflate` is 1032:1, so by limiting the size of bodies passed to gosaml2, limiting the rate and concurrency of calls, and ensuring that lots of memory is available to the process it _may_ be possible to help Go's garbage collector "keep up".
Implementors are encouraged not to rely on this.
### Patches
This issue is addressed in v0.9.0
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/russellhaering/gosaml2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/russellhaering/gosaml2/security/advisories/GHSA-6gc3-crp7-25w5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26483'}, {'type': 'WEB', 'url': 'https://github.com/russellhaering/gosaml2/commit/f9d66040241093e8702649baff50cc70d2c683c0'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6gc3-crp7-25w5'}, {'type': 'PACKAGE', 'url': 'https://github.com/russellhaering/gosaml2'}, {'type': 'WEB', 'url': 'https://github.com/russellhaering/gosaml2/releases/tag/v0.9.0'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1602'}]
|
{'cwe_ids': ['CWE-409'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-02T23:12:47Z', 'nvd_published_at': '2023-03-03T23:15:00Z'}
|
1.4.0
|
GHSA-255r-3prx-mf99
|
2023-03-22T22:21:49Z
|
2023-03-22T22:21:49Z
| null |
[]
|
`rmp-serde` `Raw` and `RawRef` may crash when receiving invalid UTF-8
|
It was found that `Raw::from_utf8` expects valid UTF-8. If invalid UTF-8 is received it can cause the process to crash.
|
[]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'rmp-serde'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/3Hren/msgpack-rust/issues/305'}, {'type': 'PACKAGE', 'url': 'https://github.com/3Hren/msgpack-rust'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0092.html'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-22T22:21:49Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-jhjm-5xjg-mpqp
|
2023-03-24T22:20:38Z
|
2023-03-21T21:30:19Z
| null |
['CVE-2023-27087']
|
Xuxueli xxl-job allows attacker to obtain sensitive information via the pageList parameter
|
Permissions vulnerabiltiy found in Xuxueli xxl-job v2.2.0, v 2.3.0 and v.2.3.1 allows attacker to obtain sensitive information via the pageList parameter.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.xuxueli:xxl-job'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'last_affected': '2.3.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27087'}, {'type': 'WEB', 'url': 'https://github.com/xuxueli/xxl-job/issues/3096'}, {'type': 'PACKAGE', 'url': 'https://github.com/xuxueli/xxl-job'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-21T22:41:55Z', 'nvd_published_at': '2023-03-21T19:15:00Z'}
|
1.4.0
|
GHSA-9cqm-5wf7-wcj7
|
2023-03-03T22:49:37Z
|
2023-03-03T22:49:37Z
| null |
['CVE-2023-26471']
|
XWiki Platform users may execute anything with superadmin right through comments and async macro
|
### Impact
Comments are supposed to be executed with the right of superadmin but in restricted mode (anything dangerous is disabled) but the async macro is not taking into account the restricted mode.
This means that any user with comment right can use the async macro to make it execute any wiki content with the right of superadmin as in:
{{async}}
{{groovy}}println "it works !"{{/groovy}}
{{/async}}
### Patches
This has been patched in XWiki 14.9, 14.4.6, and 13.10.10.
### Workarounds
The only known workaround consists in applying [the following patch](https://github.com/xwiki/xwiki-platform/commit/00532d9f1404287cf3ec3a05056640d809516006) and rebuilding and redeploying `org.xwiki.platform:xwiki-platform-rendering-async-macro`.
### References
* https://jira.xwiki.org/browse/XWIKI-20234
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira](http://jira.xwiki.org)
* Email us at [Security ML](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-rendering-async-macro'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.6-rc-1'}, {'fixed': '13.10.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-rendering-async-macro'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0'}, {'fixed': '14.4.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-rendering-async-macro'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.9'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-9cqm-5wf7-wcj7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26471'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/00532d9f1404287cf3ec3a05056640d809516006'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20234'}]
|
{'cwe_ids': ['CWE-284'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T22:49:37Z', 'nvd_published_at': '2023-03-02T19:15:00Z'}
|
1.4.0
|
GHSA-xww4-w6ff-5q3g
|
2023-04-07T15:15:02Z
|
2023-03-31T03:30:30Z
| null |
['CVE-2023-1762']
|
thorsten/phpmyfaq vulnerable privilege escalation from improper privilege management
|
thorsten/phpmyfaq prior to 3.1.12 is vulnerable to privilege escalation from improper privilege management. Any user with the ability to add a new user can create a user with super admin rights. This has been fixed in 3.1.12.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.12'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1762'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/ae6c1d8c3eab05d6e2227c7a9998707f4f891514'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpmyfaq'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3c2374cc-7082-44b7-a6a6-ccff7a650a3a'}]
|
{'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-07T15:15:02Z', 'nvd_published_at': '2023-03-31T02:15:00Z'}
|
1.4.0
|
GHSA-p4g9-c9qr-wmg5
|
2023-03-16T13:26:21Z
|
2023-03-10T03:30:15Z
| null |
['CVE-2017-20182']
|
Cross-site Scripting in django-ajax-utilities
|
A vulnerability was found in Mobile Vikings Django AJAX Utilities and classified as problematic. This issue affects the function Pagination of the file django_ajax/static/ajax-utilities/js/pagination.js of the component Backslash Handler. The manipulation of the argument url leads to cross site scripting. The attack may be initiated remotely. The patch is on commit 329eb1dd1580ca1f9d4f95bc69939833226515c9 which has been inclused in release 1.2.8. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-222611.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'django-ajax-utilities'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.8'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-20182'}, {'type': 'WEB', 'url': 'https://github.com/vikingco/django-ajax-utilities/commit/329eb1dd1580ca1f9d4f95bc69939833226515c9'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.222611'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.222611'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-16T13:26:21Z', 'nvd_published_at': '2023-03-10T02:15:00Z'}
|
1.4.0
|
GHSA-8jv7-vwrc-mv4g
|
2023-03-15T19:18:07Z
|
2023-03-09T12:30:16Z
| null |
['CVE-2023-1286']
|
Cross-site Scripting (XSS) in pimcore/pimcore
|
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.19.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.19'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1286'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/82cca7f4a7560b160336cce2610481098ca52c18'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/31d97442-3f87-439f-83f0-1c7862ef0c7c'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-09T20:23:32Z', 'nvd_published_at': '2023-03-09T11:15:00Z'}
|
1.4.0
|
GHSA-564r-hj7v-mcr5
|
2023-03-28T18:04:53Z
|
2023-03-23T21:30:19Z
| null |
['CVE-2023-20861']
|
Spring Framework vulnerable to denial of service via specially crafted SpEL expression
|
In Spring Framework versions 6.0.0 - 6.0.6, 5.3.0 - 5.3.25, 5.2.0.RELEASE - 5.2.22.RELEASE, and older unsupported versions, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial-of-service (DoS) condition.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3.0'}, {'fixed': '5.3.26'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.23.RELEASE'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-20861'}, {'type': 'PACKAGE', 'url': 'https://github.com/spring-projects/spring-framework'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230420-0007/'}, {'type': 'WEB', 'url': 'https://spring.io/security/cve-2023-20861'}]
|
{'cwe_ids': ['CWE-917'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-23T23:10:59Z', 'nvd_published_at': '2023-03-23T21:15:00Z'}
|
1.4.0
|
GHSA-77jm-f3vj-xvx2
|
2023-03-28T02:40:54Z
|
2023-03-23T21:30:18Z
| null |
['CVE-2023-28331']
|
Moodle vulnerable to Cross-site Scripting
|
Content output by the database auto-linking filter required additional sanitizing to prevent an XSS risk.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11.0'}, {'fixed': '3.11.13'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.20'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28331'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/1899e0397350c4c2bb3e73773981f66f16f8f2fc'}, {'type': 'WEB', 'url': 'https://git.moodle.org/gw?p=moodle.git;a=commitdiff;h=1899e0397350c4c2bb3e73773981f66f16f8f2fc'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/3QZN34VSF4HTCW3C3ZP2OZYSLYUKADPF/'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=445063'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-23T23:08:58Z', 'nvd_published_at': '2023-03-23T21:15:00Z'}
|
1.4.0
|
GHSA-p7mj-xvxg-grff
|
2023-03-13T20:49:24Z
|
2023-03-13T20:49:24Z
| null |
[]
|
`out_reference::Out::from_raw` should be `unsafe`
|
`Out::from_raw` in affected versions allows writing a value to invalid memory address without requiring `unsafe`.
The soundness issue has been addressed by making `Out::from_raw` an unsafe function.
|
[]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'out-reference'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.0'}, {'fixed': '0.2.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/RustyYato/out-ref/issues/1'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0152.html'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-13T20:49:24Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-9654-pr4f-gh6m
|
2023-03-16T16:23:56Z
|
2023-03-10T22:15:55Z
| null |
['CVE-2023-28465']
|
HL7 FHIR Partial Path Zip Slip due to bypass of CVE-2023-24057
|
### Impact
Zip Slip protections implemented in CVE-2023-24057 (GHSA-jqh6-9574-5x22) can be bypassed due a partial path traversal vulnerability.
This issue allows a malicious actor to potentially break out of the `TerminologyCacheManager` cache directory. The impact is limited to sibling directories.
To demonstrate the vulnerability, consider `userControlled.getCanonicalPath().startsWith("/usr/out")` will allow an attacker to access a directory with a name like `/usr/outnot`.
### Why?
To demonstrate this vulnerability, consider `"/usr/outnot".startsWith("/usr/out")`.
The check is bypassed although `/outnot` is not under the `/out` directory.
It's important to understand that the terminating slash may be removed when using various `String` representations of the `File` object.
For example, on Linux, `println(new File("/var"))` will print `/var`, but `println(new File("/var", "/")` will print `/var/`;
however, `println(new File("/var", "/").getCanonicalPath())` will print `/var`.
### The Fix
Comparing paths with the `java.nio.files.Path#startsWith` will adequately protect againts this vulnerability.
For example: `file.getCanonicalFile().toPath().startsWith(BASE_DIRECTORY)` or `file.getCanonicalFile().toPath().startsWith(BASE_DIRECTORY_FILE.getCanonicalFile().toPath())`
### Other Examples
- [CVE-2022-31159](https://github.com/aws/aws-sdk-java/security/advisories/GHSA-c28r-hw5m-5gv3) - aws/aws-sdk-java
- [CVE-2022-23457](https://securitylab.github.com/advisories/GHSL-2022-008_The_OWASP_Enterprise_Security_API/) - ESAPI/esapi-java-legacy
### Vulnerability
https://github.com/hapifhir/org.hl7.fhir.core/blob/b0daf666725fa14476d147522155af1e81922aac/org.hl7.fhir.r4b/src/main/java/org/hl7/fhir/r4b/terminologies/TerminologyCacheManager.java#L99-L105
While `getAbsolutePath` will return a normalized path, because the string `path` is not slash terminated, the guard can be bypassed to write the contents of the Zip file to a sibling directory of the cache directory.
### Patches
All org.hl7.fhir.core libraries should be updated to 5.6.106.
- https://github.com/hapifhir/org.hl7.fhir.core/pull/1162
### Workarounds
Unknown
### References
* https://snyk.io/research/zip-slip-vulnerability
|
[]
|
[{'package': {'ecosystem': 'Maven', 'name': 'ca.uhn.hapi.fhir:org.hl7.fhir.core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.106'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'ca.uhn.hapi.fhir:org.hl7.fhir.convertors'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.106'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'ca.uhn.hapi.fhir:org.hl7.fhir.r4b'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.106'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'ca.uhn.hapi.fhir:org.hl7.fhir.r5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.106'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'ca.uhn.hapi.fhir:org.hl7.fhir.utilities'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.106'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'ca.uhn.hapi.fhir:org.hl7.fhir.validation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.106'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/hapifhir/org.hl7.fhir.core/security/advisories/GHSA-9654-pr4f-gh6m'}, {'type': 'WEB', 'url': 'https://github.com/hapifhir/org.hl7.fhir.core/pull/1162'}, {'type': 'PACKAGE', 'url': 'https://github.com/hapifhir/org.hl7.fhir.core'}, {'type': 'WEB', 'url': 'https://github.com/hapifhir/org.hl7.fhir.core/blob/b0daf666725fa14476d147522155af1e81922aac/org.hl7.fhir.r4b/src/main/java/org/hl7/fhir/r4b/terminologies/TerminologyCacheManager.java#L99-L105'}, {'type': 'WEB', 'url': 'https://github.com/hapifhir/org.hl7.fhir.core/releases/tag/5.6.106'}]
|
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-10T22:15:55Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-2xpm-cmvw-3jcc
|
2023-04-14T17:08:19Z
|
2023-03-16T18:34:46Z
| null |
[]
|
Reflected XSS in Application Logger module
|
### Impact
This vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites.
### Patches
Update to version 10.5.19 or apply this patch manually https://github.com/pimcore/pimcore/pull/14606.patch
### Workarounds
Apply https://github.com/pimcore/pimcore/pull/14606.patch manually.
### References
https://huntr.dev/bounties/2a64a32d-b1cc-4def-91da-18040d59f356/
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.19'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-2xpm-cmvw-3jcc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1312'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/14606'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/14606.patch'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/2a64a32d-b1cc-4def-91da-18040d59f356/'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-16T18:34:46Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-2rq5-699j-x7p6
|
2023-03-20T13:59:48Z
|
2023-03-15T21:30:25Z
| null |
['CVE-2023-25345']
|
Arbitrary local file read vulnerability during template rendering
|
Directory traversal vulnerability in swig-templates thru 2.0.4 and swig thru 1.4.2, allows attackers to read arbitrary files via the include or extends tags.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'swig-templates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'swig'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25345'}, {'type': 'WEB', 'url': 'https://github.com/node-swig/swig-templates/issues/88'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-16T13:27:03Z', 'nvd_published_at': '2023-03-15T20:15:00Z'}
|
1.4.0
|
GHSA-3hwm-922r-47hw
|
2023-04-25T23:06:52Z
|
2023-03-31T19:33:44Z
| null |
[]
|
Stud42 vulnerable to denial of service
|
A security vulnerability has been identified in the GraphQL parser used by the API of s42.app. An attacker can overload the parser and cause the API pod to crash. With a bit of threading, the attacker can bring down the entire API, resulting in an unhealthy stream. This vulnerability can be exploited by sending a specially crafted request to the API with a large payload.
An attacker can exploit this vulnerability to cause a denial of service (DoS) attack on the s42.app API, resulting in unavailability of the API for legitimate users.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'atomys.codes/stud42'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.23.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/42Atomys/stud42/security/advisories/GHSA-3hwm-922r-47hw'}, {'type': 'WEB', 'url': 'https://github.com/42Atomys/stud42/issues/412'}, {'type': 'WEB', 'url': 'https://github.com/42Atomys/stud42/commit/a70bfc72fba721917bf681d72a58093fb9deee17'}, {'type': 'PACKAGE', 'url': 'https://github.com/42Atomys/stud42'}]
|
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-31T19:33:44Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-2vrf-hf26-jrp5
|
2023-04-03T13:07:51Z
|
2023-03-30T06:30:26Z
| null |
['CVE-2023-26116']
|
angular vulnerable to regular expression denial of service via the angular.copy() utility
|
All versions of the package angular are vulnerable to Regular Expression Denial of Service (ReDoS) via the angular.copy() utility function due to the usage of an insecure regular expression. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'angular'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.8.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26116'}, {'type': 'PACKAGE', 'url': 'https://github.com/angular/angular.js'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-5406320'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-5406322'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-5406321'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-ANGULAR-3373044'}, {'type': 'WEB', 'url': 'https://stackblitz.com/edit/angularjs-vulnerability-angular-copy-redos'}]
|
{'cwe_ids': ['CWE-1333'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-03T13:07:51Z', 'nvd_published_at': '2023-03-30T05:15:00Z'}
|
1.4.0
|
GHSA-878m-3g6q-594q
|
2023-03-10T15:30:54Z
|
2023-03-03T20:02:16Z
| null |
['CVE-2023-26488']
|
OpenZeppelin Contracts contains Incorrect Calculation
|
### Impact
The ERC721Consecutive contract designed for minting NFTs in batches does not update balances when a batch has size 1 and consists of a single token. Subsequent transfers from the receiver of that token may overflow the balance as reported by `balanceOf`.
The issue exclusively presents with batches of size 1.
### Patches
The issue has been patched in 4.8.2.
<!-- ### References -->
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.8.0'}, {'fixed': '4.8.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts-upgradeable'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.8.0'}, {'fixed': '4.8.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-878m-3g6q-594q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26488'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/commit/167bf67ed3907f4a674043496019fa346cee7705'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/releases/tag/v4.8.2'}]
|
{'cwe_ids': ['CWE-682'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T20:02:16Z', 'nvd_published_at': '2023-03-03T22:15:00Z'}
|
1.4.0
|
GHSA-3cgw-hfw7-wc7j
|
2023-03-27T22:32:19Z
|
2023-03-23T09:30:25Z
|
2023-03-23T20:10:27Z
|
[]
|
Duplicate Advisory: Grafana Stored Cross-site Scripting vulnerability
|
## Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of [GHSA-qrrg-gw7w-vp76](https://github.com/advisories/GHSA-qrrg-gw7w-vp76). This link is maintained to preserve external references.
## Original Description
Grafana is an open-source platform for monitoring and observability. Grafana had a stored XSS vulnerability in the Graphite FunctionDescription tooltip. The stored XSS vulnerability was possible due the value of the Function Description was not properly sanitized. An attacker needs to have control over the Graphite data source in order to manipulate a function description and a Grafana admin needs to configure the data source, later a Grafana user needs to select a tampered function and hover over the description. Users may upgrade to version 8.5.22, 9.2.15 and 9.3.11 to receive a fix.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.22'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.2.15'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.3.0'}, {'fixed': '9.3.11'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/grafana/bugbounty/security/advisories/GHSA-qrrg-gw7w-vp76'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1410'}, {'type': 'PACKAGE', 'url': 'https://github.com/grafana/grafana'}, {'type': 'WEB', 'url': 'https://grafana.com/security/security-advisories/cve-2023-1410/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230420-0003/'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-23T20:10:27Z', 'nvd_published_at': '2023-03-23T08:15:00Z'}
|
1.4.0
|
GHSA-2w9p-xf5h-qwj3
|
2023-03-28T23:17:20Z
|
2023-03-27T03:30:16Z
|
2023-03-28T23:17:20Z
|
[]
|
Duplicate Advisory: pullit Command Injection vulnerability
|
## Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of [GHSA-8px5-63x9-5c7p](https://github.com/advisories/GHSA-8px5-63x9-5c7p). This link is maintained to preserve external references.
## Original Description
The pullit package before 1.4.0 for Node.js allows OS Command Injection because `eval()` is used on an attacker-supplied Git branch name.
|
[]
|
[{'package': {'ecosystem': 'npm', 'name': 'pullit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 1.4.0'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25083'}, {'type': 'WEB', 'url': 'https://github.com/jkup/pullit/commit/4fec455774ee08f4dce0ef2ef934ffcc37219bfb'}, {'type': 'PACKAGE', 'url': 'https://github.com/jkup/pullit'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/npm:pullit:20180214'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-27T21:20:41Z', 'nvd_published_at': '2023-03-27T03:15:00Z'}
|
1.4.0
|
GHSA-x5rv-w9pm-8qp8
|
2023-03-01T19:17:17Z
|
2023-03-01T19:17:17Z
| null |
['CVE-2023-0092']
|
Juju controller - Arbitrary file reading vulnerability
|
### Impact
An authenticated user who has read access to the juju controller model, may construct a remote request to download an arbitrary file from the controller's filesystem.
### Patches
Patched in juju 2.9.38 and juju 3.0.3
[juju/juju#ef803e2](https://github.com/juju/juju/commit/ef803e2a13692d355b784b7da8b4b1f01dab1556)
### Workarounds
Limit read access to the controller model to only trusted users.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/juju/juju'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.22'}, {'fixed': '2.9.38'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/juju/juju'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/juju/juju/security/advisories/GHSA-x5rv-w9pm-8qp8'}, {'type': 'WEB', 'url': 'https://github.com/juju/juju/commit/ef803e2a13692d355b784b7da8b4b1f01dab1556'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/juju/+bug/1999622'}, {'type': 'PACKAGE', 'url': 'https://github.com/juju/juju'}]
|
{'cwe_ids': ['CWE-73'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-01T19:17:17Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-hm7p-r324-hhf3
|
2023-03-06T21:20:42Z
|
2023-03-03T06:30:17Z
| null |
['CVE-2023-27560']
|
phpseclib Infinite Loop vulnerability
|
Math/PrimeField.php in phpseclib has an infinite loop with composite primefields. This vulnerability was introduced in version 3.0.0, and has been patched in 3.0.19. The CVE for this issue originally identified the the vulnerable version as 2.x, however, the vulnerable functionality was not introduced until version 3.
|
[]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'phpseclib/phpseclib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.19'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27560'}, {'type': 'WEB', 'url': 'https://github.com/phpseclib/phpseclib/commit/6298d1cd55c3ffa44533bd41906caec246b60440'}, {'type': 'WEB', 'url': 'https://github.com/phpseclib/phpseclib/commit/6298d1cd55c3ffa44533bd41906caec246b60440#commitcomment-103226722'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/phpseclib/phpseclib/CVE-2023-27560.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/phpseclib/phpseclib'}, {'type': 'WEB', 'url': 'https://github.com/phpseclib/phpseclib/releases/tag/3.0.19'}]
|
{'cwe_ids': ['CWE-835'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T23:01:05Z', 'nvd_published_at': '2023-03-03T06:15:00Z'}
|
1.4.0
|
GHSA-9f95-hhg4-pg4f
|
2023-03-10T15:32:35Z
|
2023-03-01T19:19:43Z
| null |
['CVE-2023-26046']
|
teler-waf subject to Bypass of Common Web Attack Threat Rule with HTML Entities Payload
|
### Description
teler-waf is a Go HTTP middleware that provides teler IDS functionality to protect against web-based attacks. Versions prior to v0.1.1 are vulnerable to bypassing common web attack rules when a specific HTML entities payload is used. This vulnerability allows an attacker to execute arbitrary JavaScript code on the victim's browser and compromise the security of the web application. The vulnerability exists due to teler-waf failure to properly sanitize and filter HTML entities in user input.
### Impact
An attacker can exploit this vulnerability to bypass common web attack threat rules in teler-waf and launch cross-site scripting (XSS) attacks. The attacker can execute arbitrary JavaScript code on the victim's browser and steal sensitive information, such as login credentials and session tokens, or take control of the victim's browser and perform malicious actions.
### Patches
Version [v0.1.1](https://github.com/kitabisa/teler-waf/releases/tag/v0.1.1) includes a patch for this vulnerability.
### Workarounds
We advised updating their installations to version `v0.1.1` and frontwards immediately.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/kitabisa/teler-waf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/kitabisa/teler-waf/security/advisories/GHSA-9f95-hhg4-pg4f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26046'}, {'type': 'WEB', 'url': 'https://github.com/kitabisa/teler-waf/commit/d1d49cfddfa3ec2adad962870f14b85cd1aaf739'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9f95-hhg4-pg4f'}, {'type': 'PACKAGE', 'url': 'https://github.com/kitabisa/teler-waf'}, {'type': 'WEB', 'url': 'https://github.com/kitabisa/teler-waf/compare/v0.1.0...v0.1.1'}, {'type': 'WEB', 'url': 'https://github.com/kitabisa/teler-waf/releases/tag/v0.1.1'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1597'}]
|
{'cwe_ids': ['CWE-79', 'CWE-80'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-01T19:19:43Z', 'nvd_published_at': '2023-03-02T01:15:00Z'}
|
1.4.0
|
GHSA-w4x6-6w3r-9h2m
|
2023-03-30T22:16:44Z
|
2023-03-23T21:30:19Z
| null |
['CVE-2022-3146']
|
tripleo-ansible may disclose important configuration details from an OpenStack deployment
|
A flaw was found in tripleo-ansible. Due to an insecure default configuration, the permissions of a sensitive file are not sufficiently restricted. This flaw allows a local attacker to use brute force to explore the relevant directory and discover the file. This issue leads to information disclosure of important configuration details from the OpenStack deployment.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'tripleo-ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.0.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3146'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2022-3146'}, {'type': 'PACKAGE', 'url': 'https://github.com/openstack/tripleo-ansible'}]
|
{'cwe_ids': ['CWE-22', 'CWE-276', 'CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-23T23:11:40Z', 'nvd_published_at': '2023-03-23T21:15:00Z'}
|
1.4.0
|
GHSA-72w2-j52c-7682
|
2023-03-28T02:41:11Z
|
2023-03-23T21:30:18Z
| null |
['CVE-2023-28329']
|
Moodle SQL Injection vulnerability
|
Insufficient validation of profile field availability condition resulted in an SQL injection risk (by default only available to teachers and managers).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11.0'}, {'fixed': '3.11.13'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.20'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28329'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/81e74af17f419f7910f81279efecf5c7af09f38d'}, {'type': 'WEB', 'url': 'https://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-77046'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/3QZN34VSF4HTCW3C3ZP2OZYSLYUKADPF/'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=445061'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-23T23:08:41Z', 'nvd_published_at': '2023-03-23T21:15:00Z'}
|
1.4.0
|
GHSA-8fg8-jh2h-f2hc
|
2023-03-17T21:38:38Z
|
2023-03-17T18:22:19Z
| null |
['CVE-2023-27594']
|
Potential network policy bypass when routing IPv6 traffic
|
## Impact
Under specific conditions, Cilium may misattribute the source IP address of traffic to a cluster, identifying external traffic as coming from the host on which Cilium is running. As a consequence, network policies for that cluster might be bypassed, depending on the specific network policies enabled. Only IPv6 traffic is impacted by this vulnerability.
This issue only manifests when:
* Cilium is routing IPv6 traffic, and
* Kube-proxy is used for service handling, and
* NodePorts are used to route traffic to pods.
IPv6 is disabled by default. Cilium's kube-proxy replacement feature is not affected by this vulnerability.
## Patches
The problem has been fixed and is available on versions >=1.11.15, >=1.12.8, >=1.13.1
## Workarounds
Disable IPv6 routing (IPv6 is disabled by default).
## Acknowledgements
The Cilium community has worked together with members of Isovalent to prepare these mitigations. Special thanks to Yusuke Suzuki for both highlighting and fixing the issue.
## For more information
If you have any questions or comments about this advisory, please reach out on [Slack](https://docs.cilium.io/en/latest/community/community/#slack).
As usual, if you think you found a related vulnerability, we strongly encourage you to report security vulnerabilities to our private security mailing list: [email protected] - first, before disclosing them in any public forums. This is a private mailing list where only members of the Cilium internal security team are subscribed to, and is treated as top priority.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cilium/cilium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.15'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/cilium/cilium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.0'}, {'fixed': '1.12.8'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/cilium/cilium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.0'}, {'fixed': '1.13.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/cilium/cilium/security/advisories/GHSA-8fg8-jh2h-f2hc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27594'}, {'type': 'PACKAGE', 'url': 'https://github.com/cilium/cilium'}, {'type': 'WEB', 'url': 'https://github.com/cilium/cilium/releases/tag/v1.11.15'}, {'type': 'WEB', 'url': 'https://github.com/cilium/cilium/releases/tag/v1.12.8'}, {'type': 'WEB', 'url': 'https://github.com/cilium/cilium/releases/tag/v1.13.1'}]
|
{'cwe_ids': ['CWE-285', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-17T18:22:19Z', 'nvd_published_at': '2023-03-17T20:15:00Z'}
|
1.4.0
|
GHSA-r5x6-w42p-jhpp
|
2023-03-20T13:59:25Z
|
2023-03-17T18:22:57Z
| null |
['CVE-2023-27595']
|
Cilium eBPF filters may be temporarily removed during agent restart
|
### Impact
When Cilium is started, there is a short period when Cilium eBPF programs are not attached to the host. During this period, the host does not implement any of Cilium's featureset. This can cause disruption to newly established connections during this period due to the lack of Load Balancing, or can cause Network Policy bypass due to the lack of Network Policy enforcement during the window. This vulnerability impacts any Cilium-managed endpoints on the node (such as Kubernetes Pods), as well as the host network namespace (including Host Firewall).
### Patches
This vulnerability is fixed by https://github.com/cilium/cilium/pull/24336, included in Cilium 1.13.1 or later. Cilium releases 1.12.x, 1.11.x and earlier are not affected.
### Workarounds
There are no known workarounds.
### Acknowledgements
The Cilium community has worked together with members of Isovalent to prepare these mitigations. Special thanks to Louis DeLosSantos and Timo Beckers for investigating and fixing the issue.
### For more information
If you have any questions or comments about this advisory, please reach out on [Slack](https://docs.cilium.io/en/latest/community/community/#slack).
As usual, if you think you found a related vulnerability, we strongly encourage you to report security vulnerabilities to our private security mailing list: [email protected] - first, before disclosing them in any public forums. This is a private mailing list where only members of the Cilium internal security team are subscribed to, and is treated as top priority.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cilium/cilium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.0'}, {'fixed': '1.13.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/cilium/cilium/security/advisories/GHSA-r5x6-w42p-jhpp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27595'}, {'type': 'WEB', 'url': 'https://github.com/cilium/cilium/pull/24336'}, {'type': 'PACKAGE', 'url': 'https://github.com/cilium/cilium'}, {'type': 'WEB', 'url': 'https://github.com/cilium/cilium/releases/tag/v1.13.1'}]
|
{'cwe_ids': ['CWE-755'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-17T18:22:57Z', 'nvd_published_at': '2023-03-17T22:15:00Z'}
|
1.4.0
|
GHSA-h6g5-wqqr-3mw3
|
2023-03-17T21:36:34Z
|
2023-03-15T12:30:19Z
| null |
['CVE-2023-25695']
|
Sensitive Information in Error Messages in Apache Airflow
|
Generation of Error Message Containing Sensitive Information vulnerability in Apache Software Foundation Apache Airflow.This issue affects Apache Airflow: before 2.5.2. The traceback contains information that might be useful for a potential attacker to better target their attack (Python/Airflow version, node name). This information should not be shown if traceback is shown to unauthenticated user.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25695'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/29501'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/z8w6ckzs61ql365tv4d19k82o67r15p2'}]
|
{'cwe_ids': ['CWE-209'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-16T14:43:08Z', 'nvd_published_at': '2023-03-15T10:15:00Z'}
|
1.4.0
|
GHSA-97cp-8873-v2gf
|
2023-03-06T01:44:33Z
|
2023-03-01T23:02:55Z
| null |
['CVE-2023-1115']
|
Pimcore vulnerable to Cross Site Scripting in Documents Link Editable
|
### Impact
An attacker can use XSS to send a malicious script to any user through Document Page Link Editable -> Advanced -> Attributes
### Patches
Update to version 10.5.18 or apply this patch manually https://github.com/pimcore/pimcore/pull/14500.patch
### Workarounds
Apply https://github.com/pimcore/pimcore/pull/14500.patch manually.
### References
https://huntr.dev/bounties/cfa80332-e4cf-4d64-b3e5-e10298628d17/
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.18'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-97cp-8873-v2gf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1115'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/14500.patch'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/c6368b7cc69a3ebf2c83de7586f492ca1f404dd3'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/cfa80332-e4cf-4d64-b3e5-e10298628d17'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-01T23:02:55Z', 'nvd_published_at': '2023-03-01T14:15:00Z'}
|
1.4.0
|
GHSA-3r5c-h7g6-cqw7
|
2023-04-04T15:20:44Z
|
2023-03-29T18:30:30Z
|
2023-04-04T15:20:43Z
|
[]
|
Duplicate Advisory: pimcore is vulnerable to cross-site scripting in classes module
|
## Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of [GHSA-4f25-2x2c-vg6v](https://github.com/advisories/GHSA-4f25-2x2c-vg6v). This link is maintained to preserve external references.
## Original Description
Cross-site Scripting (XSS) - Generic in GitHub repository pimcore/pimcore prior to 10.5.20.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.20'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1703'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/765832f0dc5f6cfb296a82e089b701066f27bcef'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d12d105c-18fa-4d08-b591-b0e89e39eec1'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-30T20:24:49Z', 'nvd_published_at': '2023-03-29T16:15:00Z'}
|
1.4.0
|
GHSA-w5m3-xh75-mp55
|
2023-03-13T15:30:47Z
|
2023-03-02T23:08:21Z
| null |
['CVE-2023-26487']
|
Vega has Cross-site Scripting vulnerability in `lassoAppend` function
|
### Summary
Vega's `lassoAppend` function: `lassoAppend` accepts 3 arguments and internally invokes `push` function on the 1st argument specifying array consisting of 2nd and 3rd arguments as `push` call argument. The type of the 1st argument is supposed to be an array, but it's not enforced.
This makes it possible to specify any object with a `push` function as the 1st argument, `push` function can be set to any function that can be access via `event.view` (no all such functions can be exploited due to invalid context or signature, but some can, e.g. `console.log`).
### Details
The issue is that [`lassoAppend`](https://github.com/vega/vega/blob/7eafbbd4d53d0ce9f08e74ff96c90d411b1bb80a/packages/vega-functions/src/functions/lasso.js#L13) doesn't enforce proper types of its arguments:
```js
.....
export function lassoAppend(lasso, x, y, minDist = 5) {
const last = lasso[lasso.length - 1];
// Add point to lasso if distance to last point exceed minDist or its the first point
if (last === undefined || Math.sqrt(((last[0] - x) ** 2) + ((last[1] - y) ** 2)) > minDist) {
lasso.push([x, y]);
.....
```
### PoC
Use the following Vega snippet (depends on browser's non-built-in `event.view.setImmediate` function, feel free to replace with `event.view.console.log` or alike and observe the result in the browser's console)
```json
{
"$schema": "https://vega.github.io/schema/vega/v5.json",
"width": 350,
"height": 350,
"autosize": "none",
"description": "Toggle Button",
"signals": [
{
"name": "toggle",
"value": false,
"on": [
{
"events": {"type": "click", "markname": "circle"},
"update": "toggle ? false : true"
}
]
},
{
"name": "addFilter",
"on": [
{
"events": {"type": "mousemove", "source": "window"},
"update": "lassoAppend({'push':event.view.setImmediate},'alert(document.domain)','alert(document.cookie)')"
}
]
}
],
"marks": [
{
"name": "circle",
"type": "symbol",
"zindex": 1,
"encode": {
"enter": {
"y": {"signal": "height/2"},
"angle": {"value": 0},
"size": {"value": 400},
"shape": {"value": "circle"},
"fill": {"value": "white"},
"stroke": {"value": "white"},
"strokeWidth": {"value": 2},
"cursor": {"value": "pointer"},
"tooltip": {"signal": "{Tip: 'Click to fire XSS'}"}
},
"update": {"x": {"signal": "toggle === true ? 190 : 165"}}
}
},
{
"name": "rectangle",
"type": "rect",
"zindex": 0,
"encode": {
"enter": {
"x": {"value": 152},
"y": {"value": 162.5},
"width": {"value": 50},
"height": {"value": 25},
"cornerRadius": {"value": 20}
},
"update": {
"fill": {"signal": "toggle === true ? '#006BB4' : '#939597'"}
}
}
}
]
}
```
### Impact
This issue opens various XSS vectors, but exact impact and severity depends on the environment (e.g. Core JS `setImmediate` polyfill basically allows `eval`-like functionality).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'vega'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.23.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'vega-functions'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.13.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/vega/vega/security/advisories/GHSA-w5m3-xh75-mp55'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26487'}, {'type': 'WEB', 'url': 'https://github.com/vega/vega/commit/01adb034f24727d3bb321bbbb6696a7f4cd91689'}, {'type': 'PACKAGE', 'url': 'https://github.com/vega/vega'}, {'type': 'WEB', 'url': 'https://github.com/vega/vega/releases/tag/v5.23.0'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-02T23:08:21Z', 'nvd_published_at': '2023-03-04T00:15:00Z'}
|
1.4.0
|
GHSA-ppxm-q2h4-v7mm
|
2023-03-24T17:12:47Z
|
2023-03-21T12:30:15Z
| null |
['CVE-2023-1545']
|
Teampass SQL Injection vulnerability
|
SQL Injection in GitHub repository nilsteampassnet/teampass prior to 3.0.0.22.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'nilsteampassnet/teampass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0.22'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1545'}, {'type': 'WEB', 'url': 'https://github.com/nilsteampassnet/teampass/commit/4780252fdb600ef2ec2758f17a37d738570cbe66'}, {'type': 'PACKAGE', 'url': 'https://github.com/nilsteampassnet/teampass'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/942c015f-7486-49b1-94ae-b1538d812bc2'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-21T22:33:02Z', 'nvd_published_at': '2023-03-21T11:15:00Z'}
|
1.4.0
|
GHSA-pqg3-xfx2-fmqp
|
2023-05-19T15:02:23Z
|
2023-03-10T21:30:19Z
| null |
['CVE-2023-27905']
|
Cross site scripting vulnerability in update-center2
|
Jenkins update-center2 3.13 and 3.14 renders the required Jenkins core version on plugin download index pages without sanitization, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide a plugin for hosting.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci:update-center2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.13'}, {'fixed': '3.15'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27905'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-03-08/#SECURITY-3063'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-16T16:00:42Z', 'nvd_published_at': '2023-03-10T21:15:00Z'}
|
1.4.0
|
GHSA-qjqc-vqcf-5qvj
|
2023-03-27T21:27:23Z
|
2023-03-24T21:58:44Z
| null |
['CVE-2023-25660']
|
TensorFlow vulnerable to seg fault in `tf.raw_ops.Print`
|
### Impact
When the parameter `summarize` of `tf.raw_ops.Print` is zero, the new method `SummarizeArray<bool>` will reference to a nullptr, leading to a seg fault.
```python
import tensorflow as tf
tf.raw_ops.Print(input = tf.constant([1, 1, 1, 1],dtype=tf.int32),
data = [[False, False, False, False], [False], [False, False, False]],
message = 'tmp/I',
first_n = 100,
summarize = 0)
```
### Patches
We have patched the issue in GitHub commit [6d423b8bcc9aa9f5554dc988c1c16d038b508df1](https://github.com/tensorflow/tensorflow/commit/6d423b8bcc9aa9f5554dc988c1c16d038b508df1).
The fix will be included in TensorFlow 2.12. We will also cherrypick this commit on TensorFlow 2.11.1.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yu Tian of Qihoo 360 AIVul Team
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qjqc-vqcf-5qvj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25660'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/6d423b8bcc9aa9f5554dc988c1c16d038b508df1'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]
|
{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-24T21:58:44Z', 'nvd_published_at': '2023-03-25T00:15:00Z'}
|
1.4.0
|
GHSA-55m9-hm92-xm8j
|
2023-03-28T02:41:53Z
|
2023-03-22T21:30:16Z
| null |
['CVE-2022-45004']
|
Gophish vulnerable to Cross-site Scripting via crafted landing page
|
Gophish through 0.12.1 was discovered to contain a cross-site scripting (XSS) vulnerability via a crafted landing page.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/gophish/gophish'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.12.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45004'}, {'type': 'PACKAGE', 'url': 'https://github.com/gophish/gophish'}, {'type': 'WEB', 'url': 'https://github.com/gophish/gophish/releases/tag/v0.12.1'}, {'type': 'WEB', 'url': 'https://pastebin.com/z5MD3z8c'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-22T22:22:09Z', 'nvd_published_at': '2023-03-22T21:15:00Z'}
|
1.4.0
|
GHSA-6f27-3p6c-p5jc
|
2023-03-22T21:49:33Z
|
2023-03-21T22:30:43Z
| null |
['CVE-2023-28114']
|
`cilium-cli` disables etcd authorization for clustermesh clusters
|
### Impact
`cilium-cli`, when used to configure cluster mesh functionality, can remove the enforcement of user permissions on the `etcd` store used to mirror local cluster information to remote clusters.
Due to an incorrect mount point specification, the settings specified by the `initContainer` that configures `etcd` users and their permissions are overwritten when using `cilium-cli` to configure a cluster mesh. An attacker who has already gained access to a valid key and certificate for an `etcd` cluster compromised in this manner could then modify state in that `etcd` cluster.
### Patches
This issue is patched in `cilium-cli` 0.13.2
All previous versions of `cilium-cli` are affected. Users who have set up cluster meshes using the Cilium Helm chart are not affected.
### Workarounds
Use Cilium's [Helm charts](https://artifacthub.io/packages/helm/cilium/cilium) to create your cluster instead.
### Acknowledgements
The Cilium community has worked together with members of Isovalent to prepare these mitigations. Special thanks to Marco Iorio for investigating and fixing the issue.
### For more information
If you have any questions or comments about this advisory, please reach out on [Slack](https://docs.cilium.io/en/latest/community/community/#slack).
As usual, if you think you found a related vulnerability, we strongly encourage you to report security vulnerabilities to our private security mailing list: [[email protected]](mailto:[email protected]) - first, before disclosing them in any public forums. This is a private mailing list where only members of the Cilium internal security team are subscribed to, and is treated as top priority.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cilium/cilium-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/cilium/cilium-cli/security/advisories/GHSA-6f27-3p6c-p5jc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28114'}, {'type': 'WEB', 'url': 'https://github.com/cilium/cilium-cli/commit/fb1427025764e1eebc4a7710d902c4f22cae2610'}, {'type': 'WEB', 'url': 'https://artifacthub.io/packages/helm/cilium/cilium'}, {'type': 'PACKAGE', 'url': 'https://github.com/cilium/cilium-cli'}, {'type': 'WEB', 'url': 'https://github.com/cilium/cilium-cli/releases/tag/v0.13.2'}]
|
{'cwe_ids': ['CWE-280'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-21T22:30:43Z', 'nvd_published_at': '2023-03-22T19:15:00Z'}
|
1.4.0
|
GHSA-hv5j-3h9f-99c2
|
2023-04-07T22:56:37Z
|
2023-03-31T06:30:15Z
| null |
['CVE-2023-28755']
|
Ruby URI component ReDoS issue
|
A ReDoS issue was discovered in the URI component through 0.12.0 in Ruby through 3.2.1. The URI parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to URI objects. The fixed versions are 0.12.1, 0.11.1, 0.10.2 and 0.10.0.1.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'RubyGems', 'name': 'uri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.12.0'}, {'fixed': '0.12.1'}]}], 'versions': ['0.12.0']}, {'package': {'ecosystem': 'RubyGems', 'name': 'uri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.11.0'}, {'fixed': '0.11.1'}]}], 'versions': ['0.11.0']}, {'package': {'ecosystem': 'RubyGems', 'name': 'uri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.10.1'}, {'fixed': '0.10.2'}]}], 'versions': ['0.10.1']}, {'package': {'ecosystem': 'RubyGems', 'name': 'uri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.0.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28755'}, {'type': 'PACKAGE', 'url': 'https://github.com/ruby/uri'}, {'type': 'WEB', 'url': 'https://github.com/ruby/uri/releases/'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/uri/CVE-2023-28755.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/04/msg00033.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/FFZANOQA4RYX7XCB42OO3P24DQKWHEKA/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/G76GZG3RAGYF4P75YY7J7TGYAU7Z5E2T/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/WMIOPLBAAM3FEQNAXA2L7BDKOGSVUT5Z/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230526-0003/'}, {'type': 'WEB', 'url': 'https://www.ruby-lang.org/en/downloads/releases/'}, {'type': 'WEB', 'url': 'https://www.ruby-lang.org/en/news/2022/12/25/ruby-3-2-0-released/'}, {'type': 'WEB', 'url': 'https://www.ruby-lang.org/en/news/2023/03/28/redos-in-uri-cve-2023-28755/'}]
|
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-31T22:43:59Z', 'nvd_published_at': '2023-03-31T04:15:00Z'}
|
1.4.0
|
GHSA-7j98-h7fp-4vwj
|
2023-03-29T18:31:35Z
|
2023-03-29T18:31:35Z
| null |
['CVE-2023-28447']
|
smarty Cross-site Scripting vulnerability in Javascript escaping
|
### Impact
An attacker could exploit this vulnerability to execute arbitrary JavaScript code in the context of the user's browser session. This may lead to unauthorized access to sensitive user data, manipulation of the web application's behavior, or unauthorized actions performed on behalf of the user.
### Patches
Please upgrade to the most recent version of Smarty v3 or v4.
### For more information
If you have any questions or comments about this advisory please open an issue in [the Smarty repo](https://github.com/smarty-php/smarty)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'smarty/smarty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'smarty/smarty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.48'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/smarty-php/smarty/security/advisories/GHSA-7j98-h7fp-4vwj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28447'}, {'type': 'WEB', 'url': 'https://github.com/smarty-php/smarty/commit/685662466f653597428966d75a661073104d713d'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/smarty/smarty/CVE-2023-28447.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/smarty-php/smarty'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/HSAUM3YHWHO4UCJXRGRLQGPJAO3MFOZZ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/JBB35GLYTL6JL6EOM6BOZNYP47JKNNHT/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/P7O7SKTATM6GAP45S64QFXNLWIY5I7HP/'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-29T18:31:35Z', 'nvd_published_at': '2023-03-28T21:15:00Z'}
|
1.4.0
|
GHSA-2g5w-29q9-w6hx
|
2023-04-22T00:07:09Z
|
2023-03-30T21:42:48Z
| null |
['CVE-2023-30620']
|
mindsdb arbitrary file write when extracting a remotely retrieved Tarball
|
### Summary
An unsafe extraction is being performed using `tarfile.extractall()` from a remotely retrieved tarball. Which may lead to the writing of the extracted files to an unintended location. Sometimes, the vulnerability is called a TarSlip or a ZipSlip variant.
### Details
I commented the following snippet of code as a vulnerability details. The code is from [file.py#L26..L134](https://github.com/mindsdb/mindsdb/blob/afedd37c16e579b6dc075b0814e42d0505ccdc07/mindsdb/api/http/namespaces/file.py#L26..L134)
```python
@ns_conf.route('/<name>')
@ns_conf.param('name', "MindsDB's name for file")
class File(Resource):
@ns_conf.doc('put_file')
def put(self, name: str):
''' add new file
params in FormData:
- file
- original_file_name [optional]
'''
data = {}
... omitted for brevity
url = data['source']
data['file'] = data['name']
... omitted for brevity
with requests.get(url, stream=True) as r: # Source: retrieve the URL which point to a remotely located tarball
if r.status_code != 200:
return http_error(
400,
"Error getting file",
f"Got status code: {r.status_code}"
)
file_path = os.path.join(temp_dir_path, data['file'])
with open(file_path, 'wb') as f:
for chunk in r.iter_content(chunk_size=8192): # write with chunks the remote retrieved file into file_path location
f.write(chunk)
original_file_name = data.get('original_file_name')
file_path = os.path.join(temp_dir_path, data['file'])
lp = file_path.lower()
if lp.endswith(('.zip', '.tar.gz')):
if lp.endswith('.zip'):
with zipfile.ZipFile(file_path) as f:
f.extractall(temp_dir_path)
elif lp.endswith('.tar.gz'):
with tarfile.open(file_path) as f: # Just after
f.extractall(temp_dir_path) # Sink: the tarball located by file_path is supposed to be extracted to temp_dir_path.
```
So, a remotely available tarball is being retrieved and written to the server filesystem in chunks, and then, if the extension ends with `.tar.gz` of a compressed tarball, the mindsdb app applies `tarfile.extractall()` directly with no checks for the destination.
However, according to the following [warning](https://docs.python.org/3/library/tarfile.html#tarfile.TarFile.extractall) from the official documentation;
> Warning: Never extract archives from untrusted sources without prior inspection. It is possible that files are created outside of path, e.g. members that have absolute filenames starting with "/" or filenames with two dots "..".
### PoC
The following PoC is provided for illustration purposes only. It showcases the risk of extracting a non-harmless text file `sim4n6.txt` to one of the parent locations rather than the intended current folder.
```bash
> tar --list -v -f archive.tar.gz
tar: Removing leading "../../../" from member names
../../../sim4n6.txt
> python3
Python 3.10.6 (main, Nov 2 2022, 18:53:38) [GCC 11.3.0] on linux
Type "help", "copyright", "credits" or "license" for more information.
>>> import tarfile
>>> with tarfile.open("archive.tar.gz") as tf:
>>> tf.extractall()
>>> exit()
> test -f ../../../sim4n6.txt && echo "sim4n6.txt exists"
sim4n6.txt exists
```
### Attack Scenario
An attacker could craft a malicious tarball with a filename path, such as ../../../../../../../../etc/passwd, and then serve the archive remotely, proceed to the PUT request of the tarball through mindsdb and overwrite the system files of the hosting server for instance.
### Mitigation
Potential mitigation could be to:
- Use a safer module, like `zipfile`.
- Use an alternative of `tarfile`, such as `tarsafe`.
- Validate the location or the absolute path of the extracted files and discard those with malicious paths such as relative path `../../..` or absolute path such as `/etc/password`. A simple wrapper could be written to raise an exception when a path traversal may be identified.
This is similar to the other report [GHSA-7x45-phmr-9wqp](https://github.com/mindsdb/mindsdb/security/advisories/GHSA-7x45-phmr-9wqp).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'mindsdb'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '23.1.5.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/mindsdb/mindsdb/security/advisories/GHSA-2g5w-29q9-w6hx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30620'}, {'type': 'WEB', 'url': 'https://github.com/mindsdb/mindsdb/commit/4419b0f0019c000db390b54d8b9d06e1d3670039'}, {'type': 'PACKAGE', 'url': 'https://github.com/mindsdb/mindsdb'}, {'type': 'WEB', 'url': 'https://github.com/mindsdb/mindsdb/blob/afedd37c16e579b6dc075b0814e42d0505ccdc07/mindsdb/api/http/namespaces/file.py#L26..L134'}, {'type': 'WEB', 'url': 'https://github.com/mindsdb/mindsdb/releases/tag/v23.2.1.0'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-30T21:42:48Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-8jhh-3jf2-pfwr
|
2023-04-07T21:23:36Z
|
2023-03-31T12:30:16Z
| null |
['CVE-2023-1775']
|
Mattermost vulnerable to information disclosure
|
When running in a High Availability configuration, Mattermost fails to sanitize some of the `user_updated` and` post_deleted` events broadcast to all users, leading to disclosure of sensitive information to some of the users with currently connected Websocket clients.
[Issue Identifier](https://mattermost.com/security-updates/): MMSA-2023-00138
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.0'}, {'fixed': '7.1.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.10.10'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.7.0'}, {'fixed': '7.7.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.7.1'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.1.0'}, {'fixed': '7.1.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.1.5'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '7.1.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.39.3'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '7.1.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.7.2'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1775'}, {'type': 'PACKAGE', 'url': 'https://github.com.mattermost/mattermost-server'}, {'type': 'WEB', 'url': 'https://mattermost.com/security-updates/'}]
|
{'cwe_ids': ['CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-07T21:23:36Z', 'nvd_published_at': '2023-03-31T12:15:00Z'}
|
1.4.0
|
GHSA-786g-xv8v-9h93
|
2023-03-13T19:16:01Z
|
2023-03-07T00:30:26Z
| null |
['CVE-2021-36398']
|
Moodle Cross-site Scripting vulnerability
|
In Moodle, ID numbers displayed in the web service token list required additional sanitizing to prevent a stored XSS risk.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11'}, {'fixed': '3.11.1'}]}], 'versions': ['3.11']}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36398'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=424804'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-08T00:20:29Z', 'nvd_published_at': '2023-03-06T22:15:00Z'}
|
1.4.0
|
GHSA-4hmq-ggrm-qfc6
|
2023-03-07T20:35:54Z
|
2023-03-07T20:35:54Z
| null |
['CVE-2023-27474']
|
directus vulnerable to HTML Injection in Password Reset email to custom Reset URL
|
### Impact
Instances relying on an allow-listed reset URL are vulnerable to an HTML injection attack through the use of query parameters in the reset URL.
### Patches
The problem has been resolved and released under version 9.23.0. People relying on a custom password reset URL should upgrade to 9.23.0 or later, or remove the custom reset url from the configured allow list.
### Workarounds
Disable the custom reset URL allow list.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'directus'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.23.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/directus/directus/security/advisories/GHSA-4hmq-ggrm-qfc6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27474'}, {'type': 'WEB', 'url': 'https://github.com/directus/directus/issues/17119'}, {'type': 'WEB', 'url': 'https://github.com/directus/directus/pull/17120'}, {'type': 'PACKAGE', 'url': 'https://github.com/directus/directus'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-07T20:35:54Z', 'nvd_published_at': '2023-03-06T17:15:00Z'}
|
1.4.0
|
GHSA-838x-pcvx-6p5w
|
2023-03-27T22:23:43Z
|
2023-03-27T22:23:43Z
| null |
['CVE-2023-28638']
|
Snappier vulnerable to buffer overrun due to improper restriction of operations within the bounds of a memory buffer
|
### Impact
This is a buffer overrun vulnerability that can affect any user of Snappier 1.1.0. In this release, much of the code was rewritten to use byte references rather than pointers to pinned buffers. This change generally improves performance and reduces workload on the garbage collector. However, when the garbage collector performs compaction and rearranges memory, it must update any byte references on the stack to refer to the updated location. The .NET garbage collector can only update these byte references if they still point within the buffer or to a point one byte past the end of the buffer. If they point outside this area, the buffer itself may be moved while the byte reference stays the same.
There are several places in 1.1.0 where byte references very briefly point outside the valid areas of buffers. These are at locations in the code being used for buffer range checks. While the invalid references are never dereferenced directly, if a GC compaction were to occur during the brief window when they are on the stack then it could invalidate the buffer range check and allow other operations to overrun the buffer.
This should be very difficult for an attacker to trigger intentionally. It would require a repetitive bulk attack with the hope that a GC compaction would occur at precisely the right moment during one of the requests. However, one of the range checks with this problem is a check based on input data in the decompression buffer, meaning malformed input data could be used to increase the chance of success.
Note that any resulting buffer overrun is likely to cause access to protected memory, which will then cause an exception and the process to be terminated. Therefore, the most likely result of an attack is a denial of service.
### Patches
This is patched in release 1.1.1.
### Workarounds
Pinning any buffers to a fixed location before using them for compression or decompression should mitigate some, but not all, of these cases. At least one temporary decompression buffer is internal to the library and never pinned.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H'}]
|
[{'package': {'ecosystem': 'NuGet', 'name': 'Snappier'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.1'}]}], 'versions': ['1.1.0']}]
|
[{'type': 'WEB', 'url': 'https://github.com/brantburnett/Snappier/security/advisories/GHSA-838x-pcvx-6p5w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28638'}, {'type': 'WEB', 'url': 'https://github.com/brantburnett/Snappier/pull/73'}, {'type': 'WEB', 'url': 'https://github.com/brantburnett/Snappier/commit/d7ac5267b5b18439e6d108f8138edf48c436b32f'}, {'type': 'PACKAGE', 'url': 'https://github.com/brantburnett/Snappier'}, {'type': 'WEB', 'url': 'https://github.com/brantburnett/Snappier/releases/tag/release%2F1.1.1'}]
|
{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-27T22:23:43Z', 'nvd_published_at': '2023-03-27T21:15:00Z'}
|
1.4.0
|
GHSA-2394-5535-8j88
|
2023-03-10T22:38:21Z
|
2023-03-01T21:30:18Z
| null |
['CVE-2022-3162']
|
Kubernetes vulnerable to path traversal
|
Users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group without authorization. Clusters are impacted by this vulnerability if all of the following are true: 1. There are 2+ CustomResourceDefinitions sharing the same API group 2. Users have cluster-wide list or watch authorization on one of those custom resources. 3. The same users are not authorized to read another custom resource in the same API group.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/kubernetes/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.25.0'}, {'fixed': '1.25.4'}]}], 'database_specific': {'last_known_affected_version_range': '< 1.25.3'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/kubernetes/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.24.0'}, {'fixed': '1.24.8'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/kubernetes/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.23.0'}, {'fixed': '1.23.14'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/kubernetes/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.22.0'}, {'fixed': '1.22.16'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3162'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/113756'}, {'type': 'PACKAGE', 'url': 'https://github.com/kubernetes/kubernetes'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/kubernetes-security-announce/c/iUd550j7kjA'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230511-0004/'}]
|
{'cwe_ids': ['CWE-22', 'CWE-23'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-10T22:38:21Z', 'nvd_published_at': '2023-03-01T19:15:00Z'}
|
1.4.0
|
GHSA-5w78-v688-cx9q
|
2023-03-13T15:32:35Z
|
2023-03-07T09:30:30Z
| null |
['CVE-2023-1238']
|
Answer vulnerable to Cross-site Scripting
|
Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.6'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1238'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/0566894a2c0e13cf07d877f41467e2e21529fee8'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/52f97267-1439-4bb6-862b-89b8fafce50d'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-08T17:11:32Z', 'nvd_published_at': '2023-03-07T08:15:00Z'}
|
1.4.0
|
GHSA-5w96-866f-6rm8
|
2023-03-30T22:23:36Z
|
2023-03-24T21:53:39Z
| null |
['CVE-2023-27579']
|
TensorFlow has Floating Point Exception in TFLite in conv kernel
|
### Impact
Constructing a tflite model with a paramater `filter_input_channel` of less than 1 gives a FPE.
### Patches
We have patched the issue in GitHub commit [34f8368c535253f5c9cb3a303297743b62442aaa](https://github.com/tensorflow/tensorflow/commit/34f8368c535253f5c9cb3a303297743b62442aaa).
The fix will be included in TensorFlow 2.12. We will also cherrypick this commit on TensorFlow 2.11.1.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability was reported by Wang Xuan of Qihoo 360 AIVul Team.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5w96-866f-6rm8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27579'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/34f8368c535253f5c9cb3a303297743b62442aaa'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]
|
{'cwe_ids': ['CWE-697'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-24T21:53:39Z', 'nvd_published_at': '2023-03-25T00:15:00Z'}
|
1.4.0
|
GHSA-c4jr-vjm4-27hq
|
2023-04-05T19:40:36Z
|
2023-03-28T21:30:20Z
| null |
['CVE-2023-25721']
|
Veracode Scan Jenkins Plugin vulnerable to information disclosure
|
Veracode Scan Jenkins Plugin before 23.3.19.0 is vulnerable to information disclosure of proxy credentials in job logs under specific configurations.
Users are potentially affected if they:
- are using Veracode Scan Jenkins Plugin prior to 23.3.19.0
- AND have configured Veracode Scan to run on remote agent jobs
- AND have enabled the "Connect using proxy" option
- AND have configured the proxy settings with proxy credentials
- AND a Jenkins admin has enabled debug in global system settings.
By default, even in this configuration only the job owner or Jenkins admin can view the job log.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.veracode.jenkins:veracode-scan'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '23.3.19.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25721'}, {'type': 'WEB', 'url': 'https://community.veracode.com/s/spotlight/frequently-asked-questions-for-cve-2023-25721-and-cve-2023-25722-MCFT34TH6OGRFR7F7JGDQQP4TNZE'}, {'type': 'WEB', 'url': 'https://docs.veracode.com/updates/r/c_all_int#veracode-jenkins-plugin-233190'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/veracode-scan-plugin'}, {'type': 'WEB', 'url': 'https://veracode.com'}]
|
{'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-05T19:40:36Z', 'nvd_published_at': '2023-03-28T20:15:00Z'}
|
1.4.0
|
GHSA-948f-j464-rfj2
|
2023-03-30T16:58:35Z
|
2023-03-24T21:30:49Z
| null |
['CVE-2022-40208']
|
Moodle may allow students to bypass sequential navigation during a quiz attempt
|
In Moodle, insufficient limitations in some quiz web services made it possible for students to bypass sequential navigation during a quiz attempt.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11.0'}, {'fixed': '3.11.9'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.16'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40208'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/025e0297b65e6a8bd61efad0fdf36168c613f918'}, {'type': 'WEB', 'url': 'https://git.moodle.org/gw?p=moodle.git;a=commitdiff;h=025e0297b65e6a8bd61efad0fdf36168c613f918'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=438761'}]
|
{'cwe_ids': ['CWE-285'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-24T21:59:29Z', 'nvd_published_at': '2023-03-24T20:15:00Z'}
|
1.4.0
|
GHSA-8vxc-r5wp-vgvc
|
2023-03-24T22:00:05Z
|
2023-03-24T22:00:05Z
| null |
['CVE-2023-28448']
|
Versionize::deserialize implementation for FamStructWrapper<T> is lacking bound checks, potentially leading to out of bounds memory accesses
|
### Impact
An issue was discovered in the `Versionize::deserialize` implementation provided by the `versionize` crate for `vmm_sys_util::fam::FamStructWrapper`, which can lead to out of bounds memory accesses.
### Patches
The impact started with version 0.1.1. The issue was corrected in version 0.1.10 by inserting a check that verifies, for any deserialized header, the lengths of compared flexible arrays are equal and aborting deserialization otherwise.
### Workarounds
\-
### References
- https://github.com/firecracker-microvm/versionize/pull/53
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L'}]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'versionize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.1'}, {'fixed': '0.1.10'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/firecracker-microvm/versionize/security/advisories/GHSA-8vxc-r5wp-vgvc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28448'}, {'type': 'WEB', 'url': 'https://github.com/firecracker-microvm/versionize/pull/53'}, {'type': 'WEB', 'url': 'https://github.com/firecracker-microvm/versionize/commit/a57a051ba006cfa3b41a0532f484df759e008d47'}, {'type': 'PACKAGE', 'url': 'https://github.com/firecracker-microvm/versionize'}, {'type': 'WEB', 'url': 'https://github.com/firecracker-microvm/versionize/releases/tag/v0.1.10'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0030.html'}]
|
{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-24T22:00:05Z', 'nvd_published_at': '2023-03-24T20:15:00Z'}
|
1.4.0
|
GHSA-pvp6-53r9-8vxh
|
2023-03-14T22:52:32Z
|
2023-03-09T00:30:18Z
| null |
['CVE-2023-24777']
|
SQL Injection in Funadmin
|
Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the id parameter at /databases/table/list.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'funadmin/funadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.2.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24777'}, {'type': 'WEB', 'url': 'https://github.com/funadmin/funadmin/issues/5'}, {'type': 'PACKAGE', 'url': 'https://github.com/funadmin/funadmin'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-14T22:52:32Z', 'nvd_published_at': '2023-03-08T22:15:00Z'}
|
1.4.0
|
GHSA-f49c-87jh-g47q
|
2023-03-27T21:23:48Z
|
2023-03-24T21:53:49Z
| null |
['CVE-2023-25801']
|
TensorFlow has double free in Fractional(Max/Avg)Pool
|
### Impact
`nn_ops.fractional_avg_pool_v2` and `nn_ops.fractional_max_pool_v2` require the first and fourth elements of their parameter `pooling_ratio` to be equal to 1.0, as pooling on batch and channel dimensions is not supported.
```python
import tensorflow as tf
import os
import numpy as np
from tensorflow.python.ops import nn_ops
try:
arg_0_tensor = tf.random.uniform([3, 30, 50, 3], dtype=tf.float64)
arg_0 = tf.identity(arg_0_tensor)
arg_1_0 = 2
arg_1_1 = 3
arg_1_2 = 1
arg_1_3 = 1
arg_1 = [arg_1_0,arg_1_1,arg_1_2,arg_1_3,]
arg_2 = True
arg_3 = True
seed = 341261001
out = nn_ops.fractional_avg_pool_v2(arg_0,arg_1,arg_2,arg_3,seed=seed,)
except Exception as e:
print("Error:"+str(e))
```
### Patches
We have patched the issue in GitHub commit [ee50d1e00f81f62a4517453f721c634bbb478307](https://github.com/tensorflow/tensorflow/commit/ee50d1e00f81f62a4517453f721c634bbb478307).
The fix will be included in TensorFlow 2.12. We will also cherrypick this commit on TensorFlow 2.11.1.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability was reported by [dmc1778](https://github.com/dmc1778), of [[email protected]](mailto:[email protected]).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f49c-87jh-g47q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25801'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/ee50d1e00f81f62a4517453f721c634bbb478307'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]
|
{'cwe_ids': ['CWE-415'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-24T21:53:49Z', 'nvd_published_at': '2023-03-25T00:15:00Z'}
|
1.4.0
|
GHSA-g6h6-4fp6-w33w
|
2023-03-13T19:15:55Z
|
2023-03-07T00:30:25Z
| null |
['CVE-2021-36401']
|
Moodle vulnerable to Stored Cross-site Scripting
|
In Moodle, ID numbers exported in HTML data formats required additional sanitizing to prevent a local stored XSS risk.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11.0-beta'}, {'fixed': '3.11.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10.0-beta'}, {'fixed': '3.10.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.8'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36401'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=424807'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-08T00:20:02Z', 'nvd_published_at': '2023-03-06T22:15:00Z'}
|
1.4.0
|
GHSA-rfv9-x7hh-xc32
|
2023-03-28T23:09:01Z
|
2023-03-28T18:59:28Z
| null |
['CVE-2022-36059']
|
matrix-js-sdk Prototype Pollution vulnerability
|
### Impact
Events sent with special strings in key places can temporarily disrupt or impede the matrix-js-sdk from functioning properly, potentially impacting the consumer's ability to process data safely. Note that the matrix-js-sdk can appear to be operating normally but be excluding or corrupting runtime data presented to the consumer.
### Patches
This is fixed in matrix-js-sdk 19.4.0.
### Workarounds
Redacting applicable events, waiting for the sync processor to store data, and restarting the client can often fix it. Alternatively, redacting the applicable events and clearing all storage will often fix most perceived issues.
In some cases, no workarounds are possible.
### References
https://learn.snyk.io/lessons/prototype-pollution/javascript/
### For more information
If you have any questions or comments about this advisory please email us at [security at matrix.org](mailto:[email protected]).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'matrix-js-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.4.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-rfv9-x7hh-xc32'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36059'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/matrix-js-sdk'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-js-sdk/releases/tag/v19.4.0'}]
|
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-28T18:59:28Z', 'nvd_published_at': '2023-03-28T21:15:00Z'}
|
1.4.0
|
GHSA-3g43-x7qr-96ph
|
2023-03-13T20:51:32Z
|
2023-03-13T20:51:32Z
| null |
['CVE-2023-25170']
|
Possible CSRF token fixation
|
### Impact
When authenticating users PrestaShop preserves session attributes. Because this does not clear CSRF tokens upon login, this might enables `same-site attackers` to bypass the CSRF protection mechanism by performing an attack similar to a session-fixation.
### Patches
The problem is fixed in version 8.0.1
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.0.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-3g43-x7qr-96ph'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25170'}, {'type': 'PACKAGE', 'url': 'https://github.com/PrestaShop/PrestaShop'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-13T20:51:32Z', 'nvd_published_at': '2023-03-13T17:15:00Z'}
|
1.4.0
|
GHSA-c25x-cm9x-qqgx
|
2023-05-01T21:25:28Z
|
2023-03-23T23:13:25Z
| null |
['CVE-2023-28445']
|
Deno improperly handles resizable ArrayBuffer
|
### Impact
[Resizable ArrayBuffers](https://github.com/tc39/proposal-resizablearraybuffer) passed to asynchronous native functions that are shrunk during the asynchronous operation could result in an out-of-bound read/write.
It is unlikely that this has been exploited in the wild, as the only version affected is Deno 1.32.0.
Deno Deploy users are not affected.
### Patches
The problem has been resolved by disabling resizable ArrayBuffers temporarily in Deno 1.32.1. A future version of Deno will re-enable resizable ArrayBuffers with a proper fix.
### Workarounds
Upgrade to Deno 1.32.1, or run with `--v8-flags=--no-harmony-rab-gsab` to disable resizable ArrayBuffers.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'Deno'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.32.0'}, {'fixed': '1.32.1'}]}], 'versions': ['1.32.0']}, {'package': {'ecosystem': 'crates.io', 'name': 'serde_v8'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.87.0'}, {'fixed': '0.88.0'}]}], 'versions': ['0.87.0']}, {'package': {'ecosystem': 'crates.io', 'name': 'deno_runtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.102.0'}, {'fixed': '0.103.0'}]}], 'versions': ['0.102.0']}]
|
[{'type': 'WEB', 'url': 'https://github.com/denoland/deno/security/advisories/GHSA-c25x-cm9x-qqgx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28445'}, {'type': 'WEB', 'url': 'https://github.com/denoland/deno/pull/18395'}, {'type': 'WEB', 'url': 'https://github.com/denoland/deno/pull/18452'}, {'type': 'PACKAGE', 'url': 'https://github.com/denoland/deno'}, {'type': 'WEB', 'url': 'https://github.com/denoland/deno/releases/tag/v1.32.1'}]
|
{'cwe_ids': ['CWE-125', 'CWE-787'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-23T23:13:25Z', 'nvd_published_at': '2023-03-24T00:15:00Z'}
|
1.4.0
|
GHSA-hh52-g5c4-wprh
|
2023-03-28T22:57:20Z
|
2023-03-23T21:30:18Z
| null |
['CVE-2023-28334']
|
Moodle may allow authenticated users to enumerate other user's names via learning plans page
|
Authenticated users were able to enumerate other users' names via the learning plans page.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11.0'}, {'fixed': '3.11.13'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.20'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28334'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/0e3c8eb740e1e49a62a5f452cda7e06258712bbf'}, {'type': 'WEB', 'url': 'https://git.moodle.org/gw?p=moodle.git;a=commit;h=0e3c8eb740e1e49a62a5f452cda7e06258712bbf'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=445066'}]
|
{'cwe_ids': ['CWE-200', 'CWE-639'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-23T23:09:19Z', 'nvd_published_at': '2023-03-23T21:15:00Z'}
|
1.4.0
|
GHSA-gv8f-43pg-c5qw
|
2023-03-13T22:06:46Z
|
2023-03-07T00:30:25Z
| null |
['CVE-2021-36402']
|
Moodle Improper Input Validation vulnerability
|
In affected versions of Moodle, users' names require additional sanitizing in the account confirmation email, to prevent a self-registration phishing risk. This issue has been patched in versions 3.9.8, 3.10.5 and 3.11.1.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11.0-beta'}, {'fixed': '3.11.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10.0-beta'}, {'fixed': '3.10.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.8'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36402'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=424808'}]
|
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-08T00:19:36Z', 'nvd_published_at': '2023-03-06T23:15:00Z'}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.